Although it was always an important issue, digital era increases the importance of both questions “what identity is” and “why is important to manage and protect one.” There are many views and definitions of digital identity in the literature; however, this chapter explains the identity related to the identification of an individual, his/her qualification, and his/her status in society
Although it was always an important issue, digital era increases the importance of both questions “what identity is” and “why is important to manage and protect one.” There are many views and definitions of digital identity in the literature; however, this chapter explains the identity related to the identification of an individual, his/her qualification, and his/her status in society…
This open access book addresses the protection of privacy and personality rights in public records, records management, historical sources, and archives; and historical and current access to them in a broad international comparative perspective. Considering the question “can archiving pose a security risk to the protection of sensitive data and human rights?”, it analyses data security and …
This book explores both the state of the art and the latest developments in QKD. It describes the fundamental concepts and practical aspects of QKD from a viewpoint of information security and quantum channel efficiency improvement. The purpose of this book is to extend and update the knowledge of the readers in the dynamically changing field of QKD. The authors attempt to present in detail the…
Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner
This open access volume explores Ukraine's challenges post-war, focusing on economic revival and sustainable development. Addressing scholars, policymakers, and practitioners the book discusses pivotal issues for the rebuilding of Ukraine, such as institutional changes, economic hurdles, social stability, and environmental rejuvenation. The book highlights the inevitable need for Ukraine's i…
This open access book focuses on the geopolitical competition in the South China Sea, an area with highly concentrated choke points in the Indo-Pacific, presenting ideas and recommendations to manage this competition and foster cooperation to maintain a peaceful and stable environment and promote sustainable governance of the South China Sea and of the Indo-Pacific in a broader sense. The inc…
It is a well-known fact both among scholars of propaganda and disinformation, and among political leaders that Sputnik and RT are using their news coverage for disinformation purposes to harm Western and European societies. Following the Russian invasion of Ukraine, which enhanced the security threat by disinformation, the EU decided to ban these two media. Against this backdrop, the study asks…
Forgotten People deals with people living at the fringes of the Indonesian society. It describes and analyses their livelihoods and styles of making a living from an insider perspective. While Indonesia has experienced steady economic growth for more than a decade, the livelihoods and lifestyles of poor people and migrants confronted with poverty and insecurity have received less attention. Thi…
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved sec…