Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Since privacy information can be inferred via social relations, the privacy confidentiality problem becomes increasingly challenging as online social network services are more popu...
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...