![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > General
This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual technologies enabled by social manufacturing for each topic, supported by case studies. The technologies discussed include manufacturing resource minimalization and their socialized reorganizations, blockchain models in cybersecurity, computing and decision-making, social business relationships and organizational networks, open product design, social sensors and extended cyber-physical systems, and social factory and inter-connections. This book helps engineers and managers in industry to practice social manufacturing, as well as offering a systematic reference resource for researchers in manufacturing. Students also benefit from the detailed discussions of the latest research and technologies that will have been put into practice by the time they graduate.
Computer-mediated communication and cyberculture are dramatically changing the nature of social relationships. Whether cyberspace will simply retain vestiges of traditional communities with hierarchical social links and class-structured relationships or create new egalitarian social networks remains an open question. The chapters in this volume examine the issue of social justice on the Internet by using a variety of methodological and theoretical perspectives. Political scientists, sociologists, and communications and information systems scholars address issues of race, class, and gender on the Internet in chapters that do not assume any specialized training in computer technology.
Advances in Electronic Business, Volume 1 advances the understanding of management methods, information technology, and their joint application in business processes. The applications of electronic commerce draw great attention of the practitioners in applying digital technologies to the buy-and-sell activities. This first volume addresses the importance of management and technology issues in electronic business, including collaborative design, collaborative engineering, collaborative decision making, electronic collaboration, communication and cooperation, workflow collaboration, knowledge networking, collaborative e-learning, costs and benefits analysis of collaboration, collaborative transportation, and ethics.
Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.
This work discusses issues relating to distance education and distributed learning. There are essays covering: rethinking assessment for the online environment; the role of collaborative learning in social and intellectual development; and the embodiment of knowledge in virtual environments.
Social Media has transformed the ways in which individuals keep in touch with family and friends. Likewise, businesses have identified the profound opportunities present for customer engagement and understanding through the massive data available on social media channels, in addition to the customer reach of such sites. Social Media Listening and Monitoring for Business Applications explores research-based solutions for businesses of all types interested in an understanding of emerging concepts and technologies for engaging customers online. Providing insight into the currently available social media tools and practices for various business applications, this publication is an essential resource for business professionals, graduate-level students, technology developers, and researchers.
The Web is notoriously unreliable, yet it is the first place many students look for information. How can students, teachers, parents, and librarians be certain that the information a Web site provides is accurate and age appropriate? In this unique book, experienced science educator Judith A. Bazler reviews hundreds of the most reliable earth science-related Web sites. Each review discusses the most appropriate grade level of the site, analyzes its accuracy and usefulness, and provides helpful hints for getting the most out of the resource. Sites are organized by topic, from "Air Movements" to "Wetlands," making it easy to locate the most useful sites. A handy summary presents the best places on the Web to find information on science museums, science centers, careers in the earth sciences, and supplies.
As blogs have evolved over the last few years, they have begun to take on distinct characteristics depending on audience and purpose. Though political blogs remain the most high profile (and most read), other types of blogs are gaining in strength and visibility. This book-a follow-up volume to Barlow's Rise of the Blogosphere, which examined the historical context for the modern blog-provides an examination of the many current aspects of the blogosphere, from the political to the professional to the personal, with many stops in between. Given that millions of blogs have been created over the past five years and yet more come online at an undiminished rate, and given that enthusiasm for both reading them and writing them has yet to wane, it is likely that the blog explosion will continue indefinitely. As blogs have evolved over the last few years, they have begun to take on distinct characteristics depending on audience and purpose. Though political blogs remain the most high profile (and most read), other types of blogs are gaining in strength and visibility. This book-a follow-up volume to Barlow's Rise of the Blogosphere, which examined the historical context for the modern blog-provides an examination of the many current aspects of the blogosphere, from the political to the professional to the personal, with many stops in between. Areas covered include the personal blog; the political blog; the use of blogs by various religious communities both for discussion within communities and for outreach; the growth of blogs dedicated to specific geographic communities, and their relations with older local media; blogs dedicated to technical subjects, particularly relating to computers; blogs and business; blogs sparked by video games, movies, music, and other forms of entertainment; and more. Given that millions of blogs have been created over the past five years and yet more come online at an undiminished rate, and given that enthusiasm for both reading them and writing for them has yet to wane, it is likely that the blog explosion will continue indefinitely.
Let an award-winning school library media specialist who has implemented a local area network (LAN) in her media center help you plan this important addition to your media center while avoiding the pitfalls. This hands-on practical guide contains all the information the network novice needs to plan, fund, create, and maintain a LAN in the media center. Based on the experience of the school library media specialist who received the 1994 Follett/AASL "Microcomputer in the Media Center Award" for creating a local area network in the high school media center, this guide describes the procedures for planning, designing, funding, installing, organizing, training, evaluating, and maintaining a LAN in a library media center setting. Step-by-step nontechnical instructions and advice for creating an information network are presented in an understandable format. How to expand into a school-district wide area network (WAN) and gain access to the Internet are also discussed. This comprehensive work takes the network novice from dream to implementation, maintenance, and evaluation of a local area network. It covers funding sources, tips for writing technology grants, requests for proposals from vendors, staff inservice and student training, evaluation and assessment, student internships, technology teams, troubleshooting equipment, and network administration. Useful forms, simple network schematic diagrams, a model school-board approved electronic resources policy, a glossary of technical terms, and sample assessment tools are included. No other book walks the library media specialist through every step in creating a LAN. Media professionals who want to provide networked electronic information to thestaff and students but are not sure of how to proceed will benefit from this clear, nontechnical guide to the process.
As software and computer hardware grows in complexity, networks have grown to match. The increasing scale, complexity, heterogeneity, and dynamism of communication networks, resources, and applications has made distributed computing systems brittle, unmanageable, and insecure. Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications is a vital compendium of chapters on the latest research within the field of distributed computing, capturing trends in the design and development of Internet and distributed computing systems that leverage autonomic principles and techniques. The chapters provided within this collection offer a holistic approach for the development of systems that can adapt themselves to meet requirements of performance, fault tolerance, reliability, security, and Quality of Service (QoS) without manual intervention.
The Internet has transformed the way people research, shop, conduct business, and communicate. But the Internet and technologies that enable online interaction and access to a variety of content can be a perilous place for minors 8 to 18. The dangers are real, and parents and teachers today are confronted with many threats they simply do not understand. This book shares the risks of the Internet by detailing recent, real-world tragedies and revealing some of the secrets of online activities. It provides a pragmatic approach to help parents and teachers protect children against the threats of going online. Parents and teachers are often ill-equipped to deal with the variety of devices and applications such as email, instant messaging, browsing, blogs, cell phones, and personal digital assistant devices (PDAs) that can facilitate the dangers lurking online. How to Protect Your Children on the Internet offers a comprehensive overview of the ways in which youth use such technologies and exposes the risks they represent. At the same time, it provides a roadmap that will enable parents and teachers to become more engaged in children's online activities, arming them with techniques and tips to help protect their children. Smith underscores his arguments through chilling, real-life stories, revealing approaches people are using to deceive and to conceal their activities online. Filled with practical advice and recommendations, his book is indispensable to anyone who uses the Internet and related technologies, and especially to those charged with keeping children safe.
This book provides a thorough overview of the Wisdom Web of Things (W2T), a holistic framework for computing and intelligence in an emerging hyper-world with a social-cyber-physical space. Fast-evolving Web intelligence research and development initiatives are now moving toward understanding the multifaceted nature of intelligence and incorporating it at the Web scale in a ubiquitous environment with data, connection and service explosion. The book focuses on the framework and methodology of W2T, as well as its applications in different problem domains, such as intelligent businesses, urban computing, social computing, brain informatics and healthcare. From the researcher and developer perspectives, the book takes a systematic, structured view of various W2T facets and their overall contribution to the development of W2T as a whole. Written by leading international researchers, this book is an essential reference for researchers, educators, professionals, and tertiary HDR students working on the World Wide Web, ubiquitous computing, knowledge management, and business intelligence.
Teachers of political science, social studies, and economics, as well as school library media specialists, will find this resource invaluable for incorporating the Internet into their classroom lessons. Over 150 primary source Web sites are referenced and paired with questions and activities designed to encourage critical thinking skills. Completing the activities for the lessons in this book will allow students to evaluate the source of information, the content presented, and it usefulness in the context of their assignments. Along with each Web site, a summary of the site's contents identifies important primary source documents such as constitutions, treaties, speeches, court cases, statistics, and other official documents. The questions and activites invite the students to log on to the Web site, read the information presented, interact with the data, and analyze it critically to answer such questions as: Who created this document? Is the source reliable? How is the information useful and how does it relate to present-day circumstances? If I were in this situation, would I have responded the same way as the person in charge? Strengthening these critical thinking skills will help prepare students for both college and career in the 21st century.
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment. Focusing on Facebook pages dedicated to hosting footage of street fights, brawls, and other forms of bareknuckle violence, Wood demonstrates that to properly grapple with antisocial media, we must address not only their content, but also their software. In doing so, this study goes a long way to addressing the fundamental question: how have social media changed the way we consume crime? Synthesizing criminology, media theory, software studies, and digital sociology, Antisocial Media is media criminology for the Facebook age. It is essential reading for students and scholars interested in social media, cultural criminology, and the crime-media interface.
The Semantic Web has been around for some years with recent advances in mature technologies and applications. Lately, its development has been demonstrated in its contribution to businesses through the enhancement of e-commerce. Semantic Web for Business: Cases and Applications delivers real-life cases that illustrate the benefits of Semantic Web technologies as applied to e-business and e-commerce scenarios. Covering topics such as business integration, organizational knowledge management, and Semantic Web services, this book provides academic research libraries with a comprehensive reference to the commercial capabilities of Semantic Web technologies, as well as practical applications for the benefit of IT professionals, business executives, consultants, and students.
The Internet has dramatically altered the landscape of crime and national security, creating new threats, such as identity theft, computer viruses, and cyberattacks. Moreover, because cybercrimes are often not limited to a single site or nation, crime scenes themselves have changed. Consequently, law enforcement must confront these new dangers and embrace novel methods of prevention, as well as produce new tools for digital surveillance-which can jeopardize privacy and civil liberties. Cybercrime brings together leading experts in law, criminal justice, and security studies to describe crime prevention and security protection in the electronic age. Ranging from new government requirements that facilitate spying to new methods of digital proof, the book is essential to understand how criminal law-and even crime itself-have been transformed in our networked world. Contributors: Jack M. Balkin, Susan W. Brenner, Daniel E. Geer, Jr., James Grimmelmann, Emily Hancock, Beryl A. Howell, Curtis E.A. Karnow, Eddan Katz, Orin S. Kerr, Nimrod Kozlovski, Helen Nissenbaum, Kim A. Taipale, Lee Tien, Shlomit Wagman, and Tal Zarsky. Jack M. Balkin is Knight Professor of Constitutional Law and the First Amendment at Yale Law School, and the Founder and Director of Yale's Information Society Project (ISP). He is the co-editor of The State of Play: Law, Games, and Virtual Worlds, also from NYU Press. James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman, and Tal Zarsky are Fellows of the ISP. Eddan Katz is the Executive Director of the Information Society Project. |
![]() ![]() You may like...
Biomedicine & Beatitude - An…
Nicanor Pier Giorgio Austriaco O.P.
Paperback
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet
Paperback
Advances in Infrared Photodetectors…
Chennupati Jagadish, Sarath Gunapala, …
Hardcover
R5,928
Discovery Miles 59 280
|