![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > General
This two-volume set LNCS 11578 and 11579 constitutes the refereed proceedings of the 11th International Conference on Social Computing and Social Media, SCSM 2019, held in July 2019 as part of HCI International 2019 in Orlando, FL, USA. HCII 2019 received a total of 5029 submissions, of which 1275 papers and 209 posters were accepted for publication after a careful reviewing process. The 81 papers presented in these two volumes are organized in topical sections named: Social Media Design and Development, Human Behaviour in Social Media, Social Network Analysis, Community Engagement and Social Participation, Computer Mediated Communication, Healthcare Communities, Social Media in Education, Digital Marketing and Consumer Experience.
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.
This double volumes LNCS 11229-11230 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2018, Ontologies, Databases, and Applications of Semantics, ODBASE 2018, and Cloud and Trusted Computing, C&TC, held as part of OTM 2018 in October 2018 in Valletta, Malta. The 64 full papers presented together with 22 short papers were carefully reviewed and selected from 173 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, informationsystems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
This book constitutes revised selected papers from the 17th Workshop on e-Business, WeB 2018, which took place in Santa Clara, CA, USA, in December 2018. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2018 theme was "The Ecosystem of e-Business: Technologies, Stakeholders, and Connections." There was a total of 47 submissions and 41 papers were presented at the conference. Of these, 19 revised papers are presented in this volume. These contributions are organized in the following topical sections: social, policy, and privacy issues; e-market; FinTech; and artificial intelligence.
This book constitutes the refereed proceedings of the workshops and special session co-located with the 17th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2019, held in Avila, Spain, in June 2019. The total of 26 full and 8 short papers presented in this volume were carefully reviewed and selected from 47 submissions. The book also contains extended abstracts of the doctoral consortium contributions. The papers in this volume stem from the following meetings: Workshop on Agents-Based Solutions for Manufacturing and Supply Chain, AMSC; Second International Workshop on Blockchain Technology for Multi-Agent Systems, BTC4MAS; Workshop on MAS for Complex Networks and Social Computation; CNSC; Workshop on Multi-Agent Based Applications for Energy Markets, Smart Grids and Sustainable Energy Systems, MASGES; Workshop on Smart Cities and Intelligent Agents, SCIA; and Workshop on Swarm Intelligence and Swarm Robotics, SISR; as well as the special session on Software Agents and Virtualization for Internet of Things, SAVIoTS.
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.
This book constitutes the refereed proceedings of the 18th International Conference on Innovations for Community Services, I4CS 2018, held in Zilina, Slovakia, in June 2018. The 14 revised full papers and the three revised short papers presented in this volume were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on architectures and management; data analytics and models; community and public collaboration; innovations and digital transformation.
This book constitutes the proceedings of the 23rd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2018, held in Lisbon, Portugal, in June 2018. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They were organized in topical sections named: safety and security; Ada 202X; handling implicit overhead; real-time scheduling; and new application domains.
This book provides an extensive, up-to-date overview of the ways in which information and communication technologies (ICTs) can be used to develop tourism and hospitality. The coverage encompasses a wide variety of topics within the field, including virtual reality, sharing economy and peer-to-peer accommodation, social media use, hotel technology, big data, robotics, and recommendation systems, to name but a few. The content is based on the 2019 ENTER eTourism conference, organized in Nicosia, Cyprus by the International Federation for Information Technologies and Travel & Tourism (IFITT) - the leading independent global community for the discussion, exchange, and development of knowledge on the use and impact of new ICTs in the travel and tourism industry. The book offers a global perspective and rich source of information on important innovations and novel ideas. Though it will prove especially valuable for academics working in the eTourism field, it will also be of considerable interest to practitioners and students.
This two-volume set LNCS 11588 and 11589 constitutes the refereed proceedings of the 6th International Conference on Business, Government, and Organizations, HCIBGO 2019, held in July 2019 as part of HCI International 2019 in Orlando, FL, USA. HCII 2019 received a total of 5029 submissions, of which 1275 papers and 209 posters were accepted for publication after a careful reviewing process. The 63 papers presented in these two volumes are organized in topical sections named: Electronic, Mobile and Ubiquitous Commerce, eBanking and Digital Money, Consumer Behaviour, Business Information Systems, Dashboards and Visualization, Social Media and Big Data Analytics in B
Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes. Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes: Infrastructure security model components Systems security categorization Business impact analysis Risk management and mitigation Security configuration management Contingency planning Physical security The certification and accreditation process Facilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention.
Blockchain and artificial intelligence are perhaps the two most significant disruptive technologies this century and both will significantly rewire the world of global financial markets and the world in which we live. While blockchain offers a number of significant advantages over traditional forms of finance including lower cost and massive increases in operational efficiencies of traded markets, property records and a whole host of transaction processes, artificial intelligence is moving fast from basic structured machine learning doing menial yet important big data tasks like credit card fraud detection to predictive analysis and real-time real-world risk management and investment decision making. There is still a lot of confusion in the market about cryptocurrencies, bitcoin and the underlying blockchain technology. Blockchain and Artificial Intelligence highlights the underlying technologies of blockchain and the differences between cryptocurrencies and blockchain financial applications. It explores the current AI offerings and gives a vision of the fast-moving developments in this area including the many solutions that are expected to revolutionize the way financial and commodity markets will operate in the future.
This book constitutes the refereed proceedings of the Second International Conference on Digital Transformation and Global Society, DTGS 2017, held in St. Petersburg, Russia, in June 2017. The 34 revised full papers and three revised short papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on eSociety: social media analysis; eSociety: ICTs in education and science; eSociety: legal, security and usability issues; ePolity: electronic governance and electronic participation; ePolity: politics of cyberspace; eCity: urban planning and smart cities; eHealth: ICTs in public health management; eEconomy and eFinance: finance and knowledge management.
This book highlights the latest research articles presented at the Third Digital Marketing & eCommerce Conference in June 2022. Papers include a varied set of digital marketing and eCommerce-related topics such as user psychology and behavior in social commerce, influencer marketing in social commerce, social media monetization strategies and social commerce characteristics. The papers also extends to the topics of branding, business models, user and data privacy, social video marketing and commerce, among others.
This book constitutes the proceedings of the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018. The 63 full papers presented together with 3 keynotes in this volume were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: Microservices; Services and Processes; Service Trust and Security; Business Services and Processes; Edge + IoT Services; Social and Interactive Services; Recommendation; Service Analytics; Quality of Service; Service Engineering; Service Applications; Service Management.
Reduce the time spent analyzing infrastructure modules while lowering your cost and resources in the process. Most software project teams that develop custom software build the systems from scratch. With limited budgets and time, they often concentrate on the business functionality and try to minimize or ignore the infrastructure functionality. This book shows you how to develop flexible and and reusable modules that can be enhanced over time. Software infrastructure modules are the base modules in any software system. This book examines the key functionality supported by each of them and discusses the essential services for other modules.You'll explore the infrastructure modules required in large enterprise projects and each one will be explained with high-level use-cases, wireframes, and entities. Add Infrastructure Software Modules for Enterprises to your company's library today. What You'll Learn Review infrastructure modules and how they interact together or with other business modules Understand the main functionalities provided by infrastructure modules Explore the design of infrastructure modules via use-cases, wireframes, and entities Who This Book Is For Project team members that implement custom portals or software systems provided by public or private sector organizations.
Providing a central organisation for shared information, large businesses continue to rely on enterprise information systems to offer quality service when deadline with large volumes of data. Competition, Strategy, and Modern Enterprise Information Systems provides extensive coverage on the organisational, managerial and technologies concerns of enterprise information systems and its executive competitiveness. This collection of original research aims to bring together a discussion for innovative ideas and developments in the EIS field.
Learn how to institute and implement enterprise architecture in your organisation. You can make a quick start and establish a baseline for your enterprise architecture within ten weeks, then grow and stabilise the architecture over time using the proven Ready, Set, Go Approach. Reading this book will: Give you directions on how to institute and implement enterprise architecture in your organization. You will be able to build close relationships with stakeholders and delivery teams, but you will not need to micromanage the architectures operations; Increase your awareness that enterprise architecture is about business, not information technology; Enable you to initiate and facilitate dramatic business development. The architecture of an enterprise must be tolerant of currently unknown business initiatives; Show you how to get a holistic view of the process of implementing enterprise architecture; Make you aware that information is a key business asset and that information architecture is a key part of the enterprise architecture; Allow you to learn from our experiences. This book is based on our 30 years of work in the enterprise architecture field, colleagues in Europe, customer cases, and students. If your company is about to make a major change and you are looking for a way to reduce the changes into manageable pieces -- and still retain control of how they fit together -- this is your handbook. Maybe you are already acting as an enterprise architect and using a formal method, but you need practical hints. Or maybe you are about to set up an enterprise architect network or group of specialists and need input on how to organise your work. The Ready-Set-Go method for introducing enterprise architecture provides you, the enterprise architect, with an immediate understanding of the basic steps for starting, organising, and operating the entirety of your organisations architecture. Chapter 1 shows how to model and analyse your business operations, assess their current status, construct a future scenario, compare it to the current structure, analyse what you see, and show the result in a city plan. Chapter 2 deals with preparing for the implementation of the architecture with governance, enterprise architecture organisation, staffing, etc. This is the organising step before beginning the actual work. Chapter 3 establishes how to implement a city plan in practice. It deals with the practicalities of working as an enterprise architect and is called the running step. The common thread through all aspects of the enterprise architects work is the architects mastery of a number of tools, such as business models, process models, information models, and matrices. We address how to initiate the architecture process within the organisation in such a way that the overarching enterprise architecture and architecture-driven approach can be applied methodically and gradually improved.
Developments in information communication technologies (ICTs) have altered the fabric of youth culture in terms of a young person's access to information and ability to communicate with a global audience. The conditions, opportunities, and limitations of using digital media are different for marginalized urban youth. In order to harness the educational value of digital media in the lives of disenfranchised youth, we must understand its potential as a means of empowerment. Central to this book is the development of a model for working with youth using ICTs called digital youth praxis (DYP), which offers praxis orientation of ICTs that are critical, creative, and grounded in social justice. This model includes three tenets: the DYP H3 model, used for understanding context and ICT creation practices; the DYP phases, which offers six phases for critical ICT making; and the DYP typology, which offers insight on three different levels of ICT engagement and what they include. The purpose of this model is to clarify concepts and propose interdisciplinary relationships among concepts, provide a context for interpreting the findings, explain observations and creative content, and to encourage theory development that is useful to practice. Providing insight based on community-based fieldwork with marginalized youth, the interdisciplinary nature of Digital Youth Praxis is an excellent guide for formal and informal educators interested or engaged in youth media productions.
This book constitutes the refereed proceedings of the 11 workshops co-located with the 16th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2018, held in Toledo, Spain, in June 2018. The 47 full papers presented were carefully reviewed and selected from 72 submissions. The volume presents the papers that have been accepted for the following workshops: Workshop on Agents and Multi-agent Systems for AAL and e-HEALTH; Workshop on Agent based Applications for Air Transport; Workshop on Agent-based Artificial Markets Computational Economics; Workshop on Agent-Based Solutions for Manufacturing and Supply Chain; Workshop on MAS for Complex Networks and Social Computation; Workshop on Intelligent Systems and Context Information Fusion; Workshop on Multi-agent based Applications for Energy Markets, Smart Grids and Sustainable Energy Systems; Workshop on Multiagent System based Learning Environments; Workshop on Smart Cities and Intelligent Agents; Workshop on Swarm Intelligence and Swarm Robotics; Workshop on Multi-Agent Systems and Simulation.
This volume contains the technical papers presented in the workshops associated with the European Conference on Service-Oriented and Cloud Computing, ESOCC 2016, held in Vienna, Austria, in September 2016: 4th International Workshop on Cloud for IoT, CLloT 2016, Second International Workshop on Cloud Adoption and Migration, CloudWays 2016, First International Workshop on Patterns and Pattern Languages for SOCC: Use and Discovery, PATTWORLD 2016, combined with the First International Workshop on Performance and Conformance of Workflow Engines, PEaCE 2016, IFIP WG SOS Workshop 2016 Rethinking Services ResearCH, ReSeRCH 2016. Furthermore, there is a topical section presenting the results of the PhD Symposium. The abstracts of the presentations held at the European Projects Forum, EU Projects 2016, are included in the back-matter of the volume. The 15 full papers included in this volume were carefully reviewed and selected from 49 submissions. They focus on specific topics in service-oriented and cloud computing domains such as limits and/or advantages of existing cloud solutions, future internet technologies, efficient and adaptive deployment and management of service-based applications across multiple clouds, novel cloud service migration practices and solutions, digitization of enterprises in the cloud computing era, federated cloud networking services.
This book constitutes revised papers from the six workshops held at the 19th International Conference on Business Information Systems, BIS 2016, held in Leipzig, Germany, in July 2016. The workshops included in this volume are: * The 8th Workshop on Applications of Knowledge-Based Technologies in Business - AKTB2016 accepted 7 papers from 14 submissions and features 1 invited talk. * The 7th Workshop on Business and IT Alignment - BITA 2016 selected 6 papers from 12 submissions. * The Workshop on Big Data and Business Analytics Ecosystems - DeBASE 2016 has 4 papers in this volume. * The First International Workshop on Intelligent Data Analysis in Integrated Social CRM - iCRM 2016 features 5 contributions. * The Second International Workshop on Digital Enterprise Engineering and Architecture - IDEA 2016 contributes 4 papers to this volume. * The First International Workshop on Integrative Analysis and Computation of Life Data for Smart Ecosystems - INCLuDE 2016 publishes 4 research papers. In addition, BIS hosted a Doctoral Consortium which was organized in a workshop formula. The best papers from this event are included in the book. In total, the workshops had 84 submissions of which 38 were accepted for publication.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Web and Internet Economics, WINE 2016, held in Montreal, QC, Canada, in December 2016. The 35 regular papers presented together with 3 invited talks were carefully reviewed and selected from 88 submissions. The Conference on Web and Internet Economics (WINE) is an interdisciplinary forum for the exchange of ideas and results on incentives and computation arising from the following fields: Theoretical Computer Science, Artificial Intelligence, and Microeconomics. |
You may like...
World War II Rhode Island
Christian McBurney, Brian L Wallin, …
Paperback
The Cambridge Five - A Captivating Guide…
Captivating History
Hardcover
|