4 | -- | 9 | Sunil Mithas, San Murugesan, Priya Seetharaman. What is Your Artificial Intelligence Strategy? |
10 | -- | 13 | Markus Schordan. Introduction of the Software Technology Department |
14 | -- | 18 | Nir Kshetri. China's Social Credit System: Data, Algorithms and Implications |
19 | -- | 20 | George Loukas, Charalampos Z. Patrikakis, Linda Wilbanks. Digital Deception: Cyber Fraud and Online Misinformation |
21 | -- | 27 | Pranshu Bajpai, Richard J. Enbody. Attacking Key Management in Ransomware |
28 | -- | 34 | Konstantinos P. Demestichas, Konstantina Remoundou, Evgenia F. Adamopoulou. Food for Thought: Fighting Fake News and Online Disinformation |
35 | -- | 44 | Michail Tsikerdekis, Sherali Zeadally. Detecting Online Content Deception |
45 | -- | 52 | Amit Kumar Singh 0001, Chandan Kumar. Encryption-Then-Compression-Based Copyright Protection Scheme for E-Governance |
53 | -- | 59 | Paula Fraga-Lamas, Tiago M. Fernández-Caramés. Fake News, Disinformation, and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality |
60 | -- | 66 | Zhiyong Yu, Wenzhong Guo, Daqing Zhang 0001, Leye Wang, Bin Guo 0001. Cyber-Physical-Social-Mediated Communication |
67 | -- | 72 | Karthik Mohanarangam. Transitioning to Agile - In a Large Organization |