Browse Results

Showing 26,876 through 26,900 of 57,367 results

Informatics in the Future: Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015

by Hannes Werthner Frank Van Harmelen

This book is open access under a CC BY-NC 4.0 license.This volume discusses the prospects and evolution of informatics (or computer science), which has become the operating system of our world, and is today seen as the science of the information society. Its artifacts change the world and its methods have an impact on how we think about and perceive the world. Classical computer science is built on the notion of an “abstract” machine, which can be instantiated by software to any concrete problem-solving machine, changing its behavior in response to external and internal states, allowing for self-reflective and “intelligent” behavior. However, current phenomena such as the Web, cyber physical systems or the Internet of Things show us that we might already have gone beyond this idea, exemplifying a metamorphosis from a stand-alone calculator to the global operating system of our society.Thus computer scientists will need to reconsider the foundations of their discipline to realize the full potential of our field. Taking often contradictory developments into consideration, researchers will not be able to tackle specific technological or methodological problems in the future without also a broader reflection on their field. The papers in this book take a first step forward and reflect on these issues from different perspectives. The broad spectrum of topics includesInformatics: a discipline with a (short) history and a high impactInterdisciplinarity: how to do researchEthics: what is our responsibilityDiversity: why are there so few women in informaticsCombining informatics, history and art: a special contribution.This book is intended for all informatics researchers, in academia as well as in industry. It is our responsibility – not only as scientists but also as citizens – to make the public aware of the dichotomies and dialectic relationships of computer science.

Informatik-Management: Aufgabengebiete - Lösungswege - Controlling

by Karl-Rudolf Moll

Die Bereitstellung effizienter EDV-Systeme ist für viele Großunternehmen wie z.B. Automobilhersteller, Banken und Versicherungen zu einem wichtigen Erfolgsfaktor geworden. Informatik-Management umfaßt alle in diesem Zusammenhang notwendigen operativen Aufgabengebiete wie Entwicklung und Wartung, Schulung und Beratung, Planung, Kontrolle und Stabsaufgaben sowie Betrieb von EDV-Systemen. Schwerpunkt des Buches ist die Darstellung der Management-Aspekte dieser Aufgabengebiete, gegliedert in Aufgaben und Ziele, Erfolgsfaktoren, Lösungswege und deren Konstruktionsprinzipien, Aufbauorganisation und Methoden für wirksames Controlling einschließlich Kennzahlen. Als Randergebnisse werden Informatik-spezifische Arbeitsplätze und deren Anforderungsprofile dargestellt sowie offene Fragen für die Wissenschaft und für Hersteller von Informatik-Produkten aufgezeigt.

Informatikrecht: Grundlagen, Rechtsprechung und Fallbeispiele

by Karl Wolfhart Nitsch

Dieses Buch bietet eine umfassende und praxisbezogene Darstellung des IT-Rechts. Anhand zahlreicher Fallbeispiele und Urteile werden in verständlicher Form alle wichtigen Aspekte des Rechts im elektronischer Geschäftsverkehr behandelt. Das Buch wendet sich an IT-Praktiker in Unternehmen und Verbänden; es eignet sich auch für Studierende an Fachhochschulen und beruflichen Weiterbildungsinstitutionen.

Informatikrecht (Springers Kurzlehrbücher der Rechtswissenschaft)


Rechtliche Fragen und Probleme, die im Zusammenhang mit EDV-Anwendungen und Verwendung von EDV entstehen, berühren zahlreiche Rechtsgebiete. Einzelne Problemkreise wurden in der Zwischenzeit zwar in Monografien bearbeitet, eine fächerübergreifende Gesamtdarstellung in knapper Form fehlte jedoch bislang. Dieses Kurzlehrbuch schließt diese Lücke und wendet sich damit nicht nur an Juristen und fortgeschrittene Jus-Studenten, sondern vermittelt auch Personen aus dem Bereich des Managements (z.B. Personalchefs, Geschäftsführer von EDV-Firmen, etc.) die notwendigen Informationen, um IT-rechtliche Sachverhalte juristisch einordnen zu können. Im einzelnen werden folgende Gebiete behandelt: Vertragsrecht • Handelsrecht • Electronic Commerce • Gewerblicher Rechtsschutz (u.a. Urheberrecht, Wettbewerbsrecht) • Arbeitnehmerschutz • Arbeitsvertragsrecht • Datenschutzrecht • Gewerberecht • Telekommunikationsrecht • Steuerrecht • Strafrecht

Informatikrecht - Schnell erfasst (Recht - schnell erfasst)

by Rainer Koitz

Informatiker und andere an Entwicklung und Nutzung von Informationstechnologien Beteiligte sind täglich mit Rechtsfragen konfrontiert. Sie dabei zu unterstützen, ist primäres Ziel des Buches. Die Darstellung erstreckt sich auf das Software-Recht, Multimedia- und Datenkommunikationsrecht sowie den Datenschutz. Da komplexe gesetzliche Regelungen überwiegend fehlen, werden nicht nur die wichtigsten Normen erläutert, sondern auch Tendenzen der Rechtsprechung und Literatur einschließlich wesentlicher Meinungsverschiedenheiten und offener Fragen nachgezeichnet.

Information Agglomeration of Japanese Auto Parts Suppliers

by Yosuke Takeda Ichihiro Uchida

This book explains information agglomeration, a new concept we devise under the influence of Hidalgo (2015). Our concept of information agglomeration applies to an economy with horizontal divisions, while an ordinary concept of industry agglomeration means spillover effects of corporate firms on another ones in vertically integrated industries. In a horizontally divided economy of ‘a society in which the capacities of individuals greatly surpass their individual knowledge’ as Hidalgo (2015) envisages, ‘the combinatorial creativity emerges from our species’ ability to crystallize imagination.” Consequently, it is likely that information agglomerates in such knowledge-oriented economies. We take the Japanese auto parts suppliers for example. The production system in which highly modularized products are crafted by skilled labors and multipurpose machines was called flexible specialization instead of mass production by Piore and Sabel (1984). However, the conventional economics of transaction costs pioneered by Ronald Coase and Oliver Williamson suggests that it is costly for dispersed organizational networks to make and sustain creational links to accumulate vast volumes of knowledge/ information. We wonder what has made information agglomeration possible for the Japanese auto parts suppliers with the flexible specialization. What has lowered the transaction costs associated with the organizational links? We consider what causes the information agglomeration to amplify in the supply chains, constructing economic models of some hypotheses on the driving forces of information agglomeration and utilizing firm-level and establish-level micro data to empirically test these hypotheses. Finally, based on the empirical evidence on information agglomeration, we shed light on whither fast-evolving automobile manufacturing in Japan that autonomous driving technology is likely to exert traction on.

Information and Communication Technology for Sustainable Development

by Cesar Marolla

Information and Communication Technology for Sustainable Development shows how ICT, as an enabler for all spheres of development, can help innovate business processes and operations, and provide faster integration of new technologies into business systems. Focused on sustainability, the book addresses strategic approaches to cope with a range of climatic, environmental, cyber-security threats and other global risks, and aims to promote prosperity and economic growth. Furthermore, it explores how the adoption of new technologies, and collective action based upon a strategic behavioral theory of new leadership, can be applied when responding to specific set of conditions that allow for the proposed strategies to cope with risks. Information technology and strategic planning complement each other to attain the sustainable development goals (SDGs). Risk management frameworks, business continuity systems, and strategic planning methodologies such as mechanism design theory, strategic adaptive cognition (SAC), and risk mechanism theory (RMT) are the fundamental components needed to have a universal approach embedded into the national development plans agenda. As technology no longer follows an orderly, linear path, but improves exponentially, developing a strategic approach to ICT implementation help world leaders in the difficult but inspiring task of making a sustainable world and consequently find solutions to achieve the SDGs and the desired growth pattern that must be sustained, inclusive and equitable. Features: Discusses for the first time the potential of ICT as a transformative power in finding solutions to climatic and economic issues. Illustrates comprehensive strategic planning for leaders to implement in both public and private organizations. Integrates standards and frameworks in the context of sustainable development along with the UN Sustainable Development Goals. Describes in detail how mechanism design, risk management, business continuity systems, a comprehensive strategic planning using SAC (Strategic Adaptive Cognition) and risk mechanism theory can be used to address environmental risks and attain sustainable development goals (SDGs). Explains eHealth as an adaptation strategy to address future changes in climate and impacts, and the links between mitigation and adaptation to ICTs.

Information and Communication Technology for Sustainable Development

by Cesar Marolla

Information and Communication Technology for Sustainable Development shows how ICT, as an enabler for all spheres of development, can help innovate business processes and operations, and provide faster integration of new technologies into business systems. Focused on sustainability, the book addresses strategic approaches to cope with a range of climatic, environmental, cyber-security threats and other global risks, and aims to promote prosperity and economic growth. Furthermore, it explores how the adoption of new technologies, and collective action based upon a strategic behavioral theory of new leadership, can be applied when responding to specific set of conditions that allow for the proposed strategies to cope with risks. Information technology and strategic planning complement each other to attain the sustainable development goals (SDGs). Risk management frameworks, business continuity systems, and strategic planning methodologies such as mechanism design theory, strategic adaptive cognition (SAC), and risk mechanism theory (RMT) are the fundamental components needed to have a universal approach embedded into the national development plans agenda. As technology no longer follows an orderly, linear path, but improves exponentially, developing a strategic approach to ICT implementation help world leaders in the difficult but inspiring task of making a sustainable world and consequently find solutions to achieve the SDGs and the desired growth pattern that must be sustained, inclusive and equitable. Features: Discusses for the first time the potential of ICT as a transformative power in finding solutions to climatic and economic issues. Illustrates comprehensive strategic planning for leaders to implement in both public and private organizations. Integrates standards and frameworks in the context of sustainable development along with the UN Sustainable Development Goals. Describes in detail how mechanism design, risk management, business continuity systems, a comprehensive strategic planning using SAC (Strategic Adaptive Cognition) and risk mechanism theory can be used to address environmental risks and attain sustainable development goals (SDGs). Explains eHealth as an adaptation strategy to address future changes in climate and impacts, and the links between mitigation and adaptation to ICTs.

Information and Communications Security: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12918)

by Debin Gao Qi Li Xiaohong Guan Xiaofeng Liao

This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part I are organized in the following thematic blocks:​ blockchain and federated learning; malware analysis and detection; IoT security; software security; Internet security; data-driven cybersecurity.

Information and Communications Security: 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12282)

by Weizhi Meng Dieter Gollmann Christian D. Jensen Jianying Zhou

This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography.*The conference was held virtually due to the COVID-19 pandemic.

Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Lecture Notes in Computer Science #10631)

by Sihan Qing Chris Mitchell Liqun Chen Dongmei Liu

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security.

Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11999)

by Jianying Zhou Xiapu Luo Qingni Shen Zhen Xu

This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.

Information and Communications Technology in Support of Migration (Security Informatics and Law Enforcement)

by Babak Akhgar Karen Latricia Hough Yara Abdel Samad Petra Saskia Bayerl Anastasios Karakostas

The book provides a holistic review, presenting a multi-stakeholder, multi-disciplinary, international, and evidence-based approach to Information and Communications Technology (ICT) in migration. The book brings together different views and multifaceted responses to ICT-based migration management, examining their overlap, conflict, and synergies. The book is a major addition to the field, tackling important debates concerning humanitarianism and securitization in the reception of migrants, as well as exploring the role of digital technology in aiding migrant integration. The authors explore contentious areas such as the use of new technologies deployed on borders for migration management and border security under the umbrella of smart border solutions including drones, AI algorithms, and face recognition, which are widely criticized for ignoring the fundamental human rights of migrants. The research presented will depart from the euphoric appraisals that technology has made things easier for migrants and those who assist them, to critically examine the bane and boon, benefits and afflictions, highlighting the barriers, as well as the solutions, including several under-researched aspects of digital surveillance and the digital divide.This edited volume has been developed by the MIICT project, funded under the EU Horizon 2020 Action and Innovation programme, under grant agreement No 822380. Provides a positive approach to the integration of migrants, asylum seekers, and refugees using Information and Communications Technology (ICT) solutions Offers a strategic approach to providing digital services for migrants at an EU, national and local level Bridges the gap between academia and front-line practitioners’ work by providing theoretical, policy, ethical, and methodological recommendations

Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers (Communications in Computer and Information Science #1339)

by Hein Venter Marianne Loock Marijke Coetzee Mariki Eloff Jan Eloff Reinhardt Botha

This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.

Information as a Driver of Sustainable Finance: The European Regulatory Framework (Palgrave Studies in Impact Finance)

by Nadia Linciano Paola Soccorso Claudia Guagliano

The Sustainable Development Goals introduced by the United Nations in 2016 call for the significant mobilisation of finance. However, although sustainable investments are steadily increasing, there still remain large gaps within financing and the information that financial markets rely on is often incomplete or incorrect. For instance, the financial system has been structured around short-term frameworks and goals while the most pressing environmental and social challenges are long-term. Prices do not convey the cost of externalities associated with social and environmental challenges. It is therefore important to implement the effective pricing of externalities and create a common language and taxonomy between investors, issuers and policy-makers in order to best serve sustainable development. Addressing this challenge, the authors delve deeper into the levers that can be pulled within the financial system to prompt an efficient ecosystem of sustainability-related information, allowing social and environmental externalities to be incorporated into the decision-making process of all market agents. Incentives needed for investors, issuers and intermediaries are proposed along with regulation that can trigger these incentives. This book offers a comprehensive collection of chapters which explore the ongoing evolution of the European regulatory framework, providing essential reading for policymakers, practitioners and researchers alike.

Information Assurance: Security in the Information Environment (Computer Communications and Networks)

by Andrew Blyth Gerald L. Kovacich

This updated edition will help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets. It contains major updates and three new chapters. The book uniquely bridges the gap between information security, information systems security and information warfare. It re-examines why organizations need to take information assurance seriously.

Information Asymmetries in EU VAT (EUCOTAX Series on European Taxation)

by Frank J.G. Nellen

"Unlike conventional direct taxes, the application and administration of value-added tax (VAT) depends to a considerable extent on the exchange of information between the taxable person and his transaction counterparts. In practice, the taxable person often fails to obtain necessary information from his transaction counterparts, giving rise to information asymmetries that can induce VAT assessments, sanctions, and audits. In its up-to-date overview of European Union (EU) VAT law, this book assesses legislation, case law, and practice at EU and national levels, in the process of examining how to minimize the risks and negative consequences associated with information asymmetries. As a result of his in-depth treatment of the subject, the author establishes the following: – to what extent information asymmetries in EU VAT have legal implications (e.g., VAT assessments, fines) for the taxable person; – to what extent information asymmetries shouldhave legal implications for the taxable person, taking into account the legal principles applicable in EU VAT; – to what extent positive EU VAT law indeed implies the risk of information asymmetries and any associated unjustified legal implications; and – to what extent legal remedies should be employed to avoid or to reduce information asymmetries for the taxable person. This is the first book to conduct thorough research into the causes and legal implications of information asymmetries, as well as the instruments which can be employed to counter their materialization. As such, it will be of inestimable value to practitioners, legislators, policymakers, entrepreneurs, judicial professionals, and academics concerned with EU VAT law."

Information Cultures in the Digital Age: A Festschrift in Honor of Rafael Capurro

by Matthew Kelly Jared Bielby

For several decades Rafael Capurro has been at the forefront of defining the relationship between information and modernity through both phenomenological and ethical formulations. In exploring both of these themes Capurro has re-vivified the transcultural and intercultural expressions of how we bring an understanding of information to bear on scientific knowledge production and intermediation. Capurro has long stressed the need to look deeply into how we contextualize the information problems that scientific society creates for us and to re-incorporate a pragmatic dimension into our response that provides a balance to the cognitive turn in information science.With contributions from 35 scholars from 15 countries, Information Cultures in the Digital Age focuses on the culture and philosophy of information, information ethics, the relationship of information to message, the historic and semiotic understanding of information, the relationship of information to power and the future of information education. This Festschrift seeks to celebrate Rafael Capurro’s important contribution to a global dialogue on how information conceptualisation, use and technology impact human culture and the ethical questions that arise from this dynamic relationship.

Information Discovery on Electronic Health Records

by Vagelis Hristidis

Exploiting the rich information found in electronic health records (EHRs) can facilitate better medical research and improve the quality of medical practice. Until now, a trivial amount of research has been published on the challenges of leveraging this information. Addressing these challenges, Information Discovery on Electronic Health Records exp

Information Exchange and EU Law Enforcement

by Anna Fiodorova

Presenting an integrated approach to information exchange among law enforcement institutions within the EU, this book addresses the dilemma surrounding the need to balance the security of individuals and the need to protect their privacy and data. Providing the reader with a comprehensive analysis of information exchange tools, exploring their history, political background, the most recent legal modifications and the advantages and disadvantages of their use, it includes a comparison between different information exchange tools. Written by an author who has worked as a police officer, Home Affairs counsellor and academic, this is an important read for scholars working with EU Law, Criminal Procedure Law, and International Law as well as for practitioners who directly deal with international police cooperation or who perform criminal investigation both within and outside the EU.

Information Exchange and EU Law Enforcement

by Anna Fiodorova

Presenting an integrated approach to information exchange among law enforcement institutions within the EU, this book addresses the dilemma surrounding the need to balance the security of individuals and the need to protect their privacy and data. Providing the reader with a comprehensive analysis of information exchange tools, exploring their history, political background, the most recent legal modifications and the advantages and disadvantages of their use, it includes a comparison between different information exchange tools. Written by an author who has worked as a police officer, Home Affairs counsellor and academic, this is an important read for scholars working with EU Law, Criminal Procedure Law, and International Law as well as for practitioners who directly deal with international police cooperation or who perform criminal investigation both within and outside the EU.

Information Exchange Between Competitors in EU Competition Law

by Martin Gassler

Information Exchange Between Competitors in EU Competition Law Martin Gassler Competing firms often exchange information in order to make more informed market decisions which can help to overcome market inefficiencies. However, an abundance of legal and economic research as well as case law has shown that information exchange may also enable firms to engage in collusion more readily and sustain it longer. This book is the first to concentrate on this challenging topic of EU competition law in such depth. It focuses on ‘pure’ information exchanges – exchanges that are not ancillary to a wider pro-competitive or anticompetitive conduct – and thoroughly explains the characteristics of such information exchanges, their pro-competitive and anticompetitive effects and discusses all the relevant legal aspects for their assessment. The author provides a robust analytical framework for assessing information exchanges under Article 101 TFEU, focusing on the risk of collusive outcomes and what types of information exchange are particularly harmful. With detailed attention to the leading cases on information exchange, the analysis examines the most important aspects for assessing information exchange between competitors, in particular: the concept of a concerted practice; the concepts of a restriction by object and effect, including their similarities and differences; the importance of evidentiary issues; the issue of signalling via advance public announcements; factors that facilitate collusion; efficiencies of information exchange, including market transparency; the legal challenges of tackling mere parallel conduct; facilitative practices in the Commission Guidelines, including the Horizontal Cooperation Guidelines; and safe harbours for certain types of information exchange. The book offers clear guidance on how to identify and thus distinguish information exchange that restricts competition by its object and information exchange that restricts competition (only) by its effects. It offers practical solutions to some of the perceived issues when assessing information exchanges. With its wealth of analysis not available from other sources, this concise yet comprehensive review of a much-debated topic in competition law offers clear guidance for practitioners in assessing the issues surrounding information exchange. The book will also be welcomed by competition law academics, competition lawyers and competition authority officials throughout Europe.

Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology

by Mireille Hildebrandt Bibi Van Den Berg

This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy. It inquires into the physics, the technologies, the business models, the governmental strategies and last but not least the legal frameworks concerning access, organisation and control of information. It debates whether it is in the very nature of information to be either free or monopolized, or both. Analysing upcoming power structures, new types of colonization and attempts to replace legal norms with techno-nudging, this book also presents the idea of an infra-ethics capable of pre-empting our pre-emption. It discusses the interrelations between open access, the hacker ethos, the personal data economy, and freedom of information, highlighting the ephemeral but pivotal role played by information in a data-driven society. This book is a must-read for those working on the contemporary dimensions of freedom of information, data protection, and intellectual property rights.

Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology

by Mireille Hildebrandt Bibi van den Berg

This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy. It inquires into the physics, the technologies, the business models, the governmental strategies and last but not least the legal frameworks concerning access, organisation and control of information. It debates whether it is in the very nature of information to be either free or monopolized, or both. Analysing upcoming power structures, new types of colonization and attempts to replace legal norms with techno-nudging, this book also presents the idea of an infra-ethics capable of pre-empting our pre-emption. It discusses the interrelations between open access, the hacker ethos, the personal data economy, and freedom of information, highlighting the ephemeral but pivotal role played by information in a data-driven society. This book is a must-read for those working on the contemporary dimensions of freedom of information, data protection, and intellectual property rights.

Information Fusion and Geographic Information Systems: Towards the Digital Ocean (Lecture Notes in Geoinformation and Cartography)

by Vasily V. Popovich, Christophe Claramunt, Thomas Devogele, Manfred Schrenk and Kyrill Korolenko

The Workshop Proceedings reflect problems of advanced geo-information science as far as they are specifically concerned with the maritime environment at large. The Proceedings incorporate papers presented by leading scientists researching in the considered professional area and by practitioners engaged in GIS and GIS applications development. They pay close attention to the problems of scientific and technological innovations and the ensuing opportunities to make seas safer and cleaner. Furthermore, they periodically measure the ground covered and new challenges with respect to economic and shipping trends as related to Artificial Intelligence; GIS ontologies; GIS data integration and modelling; Underwater acoustics; GIS data fusion; GIS and corporate information systems; GIS and real-time monitoring systems; GIS algorithms and computational issues; Novel and emerging marine GIS research areas; Monitoring of maritime terrorist threat; Maritime and environmental GIS; Navigation-based and maritime transportation GIS; Human factors in maritime GIS; Coastal and environmental GIS.

Refine Search

Showing 26,876 through 26,900 of 57,367 results