6. ICGS3 2010: Braga, Portugal
Sérgio Tenreiro de Magalhães, Hamid Jahankhani, Ali G. Hessami (Eds.): Global Security, Safety, and Sustainability - 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings. Springer 2010 Communications in Computer and Information Science 92 ISBN 978-3-642-15716-5
Isabel F. Loureiro, Celina P. Leão, Pedro Arezes: Management of the Benefits on the Client's Involvement on Ergonomic Analysis. 1-8
Teresa Susana Mendes Pereira, Henrique Santos: A Security Audit Framework to Manage Information System Security. 9-18

Filipe Caldeira, Edmundo Monteiro, Paulo Simões: Trust and Reputation Management for Critical Infrastructure Protection. 39-47
Ameer Al-Nemrat, Hamid Jahankhani, David S. Preston: Cybercrime Victimisations/Criminalisation and Punishment. 55-62

Kenneth Revett, Sérgio Tenreiro de Magalhães: Cognitive Biometrics: Challenges for the Future. 79-86
Abdullah Rashed, Henrique Santos: Multimodal Biometrics and Multilayered IDM for Secure Authentication. 87-95
Bobby L. Tait: Secure Biometric Multi-Logon System Based on Current Authentication Technologies. 96-103
José Martins, Henrique dos Santos: Methods of Organizational Information Security - (A Literature Review). 120-130
Hamid Reza Peikari: A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust. 139-148
Hamid Reza Peikari: Does Nationality Matter in the B2C Environment? Results from a Two Nation Study. 149-159
Hatamirad Ali, Mehrjerdi Hasan: Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company). 160-169
Ali Sanayei, Reza Shafe'ei: The Effect of Non-technical Factors in B2C E-Commerce - (A Case Study in Iran). 178-192
Cristiana Gonilho-Pereira, Emilija Zdraveva, Raul Fangueiro, S. Lanceros-Mendez, Said Jalali, Mário de Araújo: Self-monitoring Composite Rods for Sustainable Construction. 193-201
Ali G. Hessami, Nicos Karcanias: Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approach. 202-215
Amin Hosseinian Far, Elias Pimenidis, Hamid Jahankhani, D. C. Wijeyesekera: A Review on Sustainability Models. 216-222
Hamid Reza Peikari: The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling. 223-231
Paulo Mourão: "Fiscal Illusion Causes Fiscal Delusion - Please Be Careful!". 232-237
Christos K. Georgiadis, Ioannis Kokkinidis, Elias Pimenidis: A Coloured Petri Net Analysis of the Transaction Internet Protocol. 238-249
Ali Shayan, Behnam Abdi, Malihe Qeisari: Identification of the Required Security Practices during e-Government Maturity. 250-262
Abdullahi Arabo, Qi Shi, Madjid Merabti: Dynamic Device Configuration in Ubiquitous Environments. 263-273
Abolfazl Falahati, Mahdi Azarafrooz: Mitigation of Control Channel Jamming via Combinatorial Key Distribution. 274-281
Saeed Ebadi Tavallaei, Abolfazl Falahati: Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes. 291-299



