001441115 000__ 04417cam\a2200565\i\4500 001441115 001__ 1441115 001441115 003__ OCoLC 001441115 005__ 20230309004720.0 001441115 006__ m\\\\\o\\d\\\\\\\\ 001441115 007__ cr\un\nnnunnun 001441115 008__ 211201s2021\\\\sz\a\\\\o\\\\\000\0\eng\d 001441115 019__ $$a1286927973$$a1286950810 001441115 020__ $$a9783030871666$$q(electronic bk.) 001441115 020__ $$a3030871665$$q(electronic bk.) 001441115 020__ $$z9783030871659 001441115 020__ $$z3030871657 001441115 0247_ $$a10.1007/978-3-030-87166-6$$2doi 001441115 035__ $$aSP(OCoLC)1286794621 001441115 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dOCLCO$$dN$T$$dOCLCQ$$dOCLCO$$dOCLCQ$$dUKAHL$$dOCLCQ 001441115 049__ $$aISEA 001441115 050_4 $$aTK5105.8857$$b.C53 2021 001441115 08204 $$a004.67/8$$223 001441115 24500 $$aChallenges in the IoT and smart environments :$$ba practitioners' guide to security, ethics and criminal threats /$$cReza Montasari, Hamid Jahankhani, Haider Al-Khateeb, editors. 001441115 264_1 $$aCham :$$bSpringer,$$c[2021] 001441115 264_4 $$c©2021 001441115 300__ $$a1 online resource :$$billustrations (chiefly color) 001441115 336__ $$atext$$btxt$$2rdacontent 001441115 337__ $$acomputer$$bc$$2rdamedia 001441115 338__ $$aonline resource$$bcr$$2rdacarrier 001441115 4901_ $$aAdvanced sciences and technologies for security applications,$$x2363-9466 001441115 5050_ $$a1. Digital leadership, strategies and governance in cyberspace -- 2. Dynamic cyber risk analysis through maturity models -- 3. Emerging areas at the intersection of Artificial Intelligence, Machine Learning, Deep Learning Cognitive Computing and Digital Forensics -- 4. Current Cyber Threats and Cyber Security Landscape -- 5. Zero trust security strategies and guidelines -- 6. Applications of Machine Learning in crime Investigation including Cyber Terrorism Cases -- 7. Legal and ethical applications and implications of smart cities -- 8. Legal consideration and ethics of AI Cyber abuse and investigatory models in smart societies -- 9. Cyber defence, ransomware attacks in the next-generation systems -- 10. System of systems in cyber-physical environments -- 11. Dark Web Forensic Investigation. 001441115 506__ $$aAccess limited to authorized users. 001441115 520__ $$aThis book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients' lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics. Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master's degree students as well as undergraduates at their final years of studies in the stated fields. 001441115 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 3, 2021). 001441115 650_0 $$aInternet of things$$xSecurity measures. 001441115 650_0 $$aInternet of things$$xMoral and ethical aspects. 001441115 650_6 $$aInternet des objets$$xSécurité$$xMesures. 001441115 650_6 $$aInternet des objets$$xAspect moral. 001441115 655_0 $$aElectronic books. 001441115 7001_ $$aMontasari, Reza,$$eeditor. 001441115 7001_ $$aJahankhani, Hamid,$$eeditor. 001441115 7001_ $$aAl-Khateeb, Haider,$$eeditor. 001441115 77608 $$iPrint version:$$z3030871657$$z9783030871659$$w(OCoLC)1264137094 001441115 830_0 $$aAdvanced sciences and technologies for security applications.$$x2363-9466 001441115 852__ $$bebk 001441115 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-87166-6$$zOnline Access$$91397441.1 001441115 909CO $$ooai:library.usi.edu:1441115$$pGLOBAL_SET 001441115 980__ $$aBIB 001441115 980__ $$aEBOOK 001441115 982__ $$aEbook 001441115 983__ $$aOnline 001441115 994__ $$a92$$bISE