**1. Introduction**

52 Security Enhanced Applications for Information Systems

Kim, H.K., Cho, Y.H., Kim, W.J., Kim J.R., Suh, J.H. (2002). A personalized recommendation

Lee, M.G. (2001). Profiling Students' Adaptation Styles in Web-Based Learning, *Computers* 

Papanikolaou, K.A., Grigoriadou, M. (2002). Towards New Forms of Knowledge

Progoulaki M., Theotokas I. (2008). Human resource management and competitiveness in

Progoulaki M., Polydoropoulou A. and Theotokas I. (2005). Multicultural Training and e-

Rashid, A. M., Albert, I., Cosley, D., Lam, S.K., McNee, S., Konstan, J.A. (2002). Getting to

Sarwar, B., Karypis, G., Konstan, J.A.,Riedl, J.T. (2000). Analysis of Recommendation

Theotokas I., Progoulaki M. (2007). Cultural diversity, manning strategies and management

Zanker, M., Jessenitschnig, M. (2006). Case-studies on exploiting explicit customer

the International Conference on Intelligent User Interfaces, pp. 127–134. Ricci, F., Werthner, H. (2006). Recommender systems. *International Journal of Electronic* 

*of Maritime Economist (IAME) Annual Conference,* Dalian, China.

Vol.1, pp.301–313.

Patras, Greece

*& Education*, Vol. 36 , pp. 121–132.

*Commerce*, Vol. 11, No 2, pp. 5–9.

*Commerce*, pp. 158-167.

Vol. 19, pp. 133–166.

383-403.

*Computers & Education*, Vol. 39, pp. 333–360.

procedure for Internet shopping. *Electronic Commerce Research and Applications,*

Communication: The Adaptive Dimensions of a Web-Based Learning Environment.

the shipping industry: a resource based view, *Proceedings of International Association* 

Learning in Shipping Industry, *Proceedings of ICODL 2005, 3rd International Conference on Open and Distance Learning 'Applications of Pedagogy and Technology'*,

know you: Learning new user preferences in recommender systems, Proceedings of

Algorithms for e-Commerce, *Proceedings of the Second ACM Conference of Electronic* 

practices in Greek shipping. *Maritime Policy and Management*, Vol. 34, No. 4, pp.

requirements in recommender systems. *User Modeling and User-Adapted Interaction*,

With the rapid development and comprehensive application of network technology, network security problems gradually appear serious. Traditional firewall technologies can't provide sufficient security protection against various attacks and intrusions (Anderson, 1980), while intrusion detection systems (IDS) are faced with compromise between false alarms and false positives (Denning, 1987). In this chapter, we investigate intrusion detection and intrusion prevention in high speed network, introduce related technology and our research results.
