![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
This book introduces readers to Web content credibility evaluation and evaluation support. It highlights empirical research and establishes a solid foundation for future research by presenting methods of supporting credibility evaluation of online content, together with publicly available datasets for reproducible experimentation, such as the Web Content Credibility Corpus. The book is divided into six chapters. After a general introduction in Chapter 1, including a brief survey of credibility evaluation in the social sciences, Chapter 2 presents definitions of credibility and related concepts of truth and trust. Next, Chapter 3 details methods, algorithms and user interfaces for systems supporting Web content credibility evaluation. In turn, Chapter 4 takes a closer look at the credibility of social media, exemplified in sections on Twitter, Q&A systems, and Wikipedia, as well as fake news detection. In closing, Chapter 5 presents mathematical and simulation models of credibility evaluation, before a final round-up of the book is provided in Chapter 6. Overall, the book reviews and synthesizes the current state of the art in Web content credibility evaluation support and fake news detection. It provides researchers in academia and industry with both an incentive and a basis for future research and development of Web content credibility evaluation support services.
Chris Stringman gambled, and lost, GBP130,000, destroying his savings, losing his car, and almost his house...but he managed to escape his addiction just before he fell over the precipice. This is not a book about how to win, rather a book about how not to lose. Chris Stringman's personal demon was financial spread-betting - where punters trade on the price movement of a particular market. He explains how it operates, how it sucks gamblers in and keeps them there, and how it nearly cost him everything.He also takes a look at high-street bookies, fruit machines, casinos, poker and bingo, and then goes on to answer some important questions: How do we gamble? Why do we gamble? How can we spot the signs in others? How can we help them? Chris Stringman writes from the heart and tells it like it is in this searingly honest, and highly readable work. It entertains as well as educates - essentially a self-help book for the delusional gambler.
The Internet is already more widely deployed than any other computing system in history and continues to grow rapidly. New technologies, including high speed wide area network and improved software support for distribution, promise to make the Internet much more useful for general purpose distributed computing in the future. Web Information Systems is dedicated to the new era of information systems on web environments, due to not only the growing popularity of the web technology but also the roles that web technology play in modern information systems. The major elements of web information systems include web semantics, XML technologies, web mining and querying, web-based information systems, information extraction, and web semantics.
Like many other incipient technologies, Web services are still surrounded by a tremendous level of noise. This noise results from the always dangerous combination of wishful thinking on the part of research and industry and of a lack of clear understanding of how Web services came to be. On the one hand, multiple contradictory interpretations are created by the many attempts to realign existing technology and strategies with Web services. On the other hand, the emphasis on what could be done with Web services in the future often makes us lose track of what can be really done with Web services today and in the short term. These factors make it extremely difficult to get a coherent picture of what Web services are, what they contribute, and where they will be applied. Alonso and his co-authors deliberately take a step back. Based on their academic and industrial experience with middleware and enterprise application integration systems, they describe the fundamental concepts behind the notion of Web services and present them as the natural evolution of conventional middleware, necessary to meet the challenges of the Web and of B2B application integration. Rather than providing a reference guide or a "how to write your first Web service" kind of book, they discuss the main objectives of Web services, the challenges that must be faced to achieve them, and the opportunities that this novel technology provides. Established, as well as recently proposed, standards and techniques (e.g., WSDL, UDDI, SOAP, WS-Coordination, WS-Transactions, and BPEL), are then examined in the context of this discussion in order to emphasize their scope, benefits, and shortcomings. Thus, the book is ideally suited both for professionals considering the development of application integration solutions and for research and students interesting in understanding and contributing to the evolution of enterprise application technologies.
This authoritative text/reference describes the state of the art of fog computing, presenting insights from an international selection of renowned experts. A particular focus is provided on development approaches, architectural mechanisms, and measurement metrics for building smart adaptable environments. The coverage also includes important related topics such as device connectivity, security and interoperability, and communication methods. Topics and features: introduces the core concepts and principles of fog computing, and reviews the latest research and best practice relating to fog/edge environments; discusses the vision for an Internet of Things (IoT) in terms of fog computing and other related distributed computing paradigms, such as cloud computing; presents a survey of the key issues and broader aspects of the fog paradigm, as well as the factors that affect adoption of fog computing; examines frameworks and methodologies for fog-based architecture design, improving performance, and measuring quality of experience; proposes tools and methodologies for analyzing large amounts of sensor data from smart city initiatives; describes approaches for designing robust services, management of data-intensive applications, context-aware data analysis, and vehicular networking; identifies potential future research directions and technological innovations in relation to distributed computing environments such as the IoT. This enlightening volume offers essential perspectives for researchers of distributed computing and computer networking, as well as for advanced undergraduate and graduate students pursuing interests in this area. Professional engineers seeking to enhance security and connectivity in their IoT systems will also find this work to be a valuable reference.
Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book
As the Internet's presence in health care grows more pervasive, an increasing number of health care providers have begun to implement eHealth innovations in their practice. The interactive health communication system (IHCS), one such eHealth solution, provides consumers with information, informal support, and a venue for communication. Investing in eHealth: What it Takes to Sustain Consumer Health Informatics examines the evolution of the IHCS and the significant changes in organizational culture and operational systems that may be required for successful and sustained implementation. This book explores the development of a model (funded by the Agency for Healthcare Research and Quality in 1998) to predict and explain the degree of success of such implementation efforts. This model allows an institution to benchmark its progress towards IHCS implementation and advises administrators where to invest resources to increase the chance of successful implementation. A set of case studies highlights key features of the model; each study describes an attempt by an organization to implement the Comprehensive Health Enhancement Support System (CHESS), a proven IHCS.After examining the success or failure of each particular implementation, the book suggests steps that could have been taken to address weaknesses identified by the model. Investing in eHealth culminates in a set of general guidelines for any health care provider striving to successfully employ the model, and suggests directions for future research.
Recent advances in mobile and wireless communication and personal computer technology have created a new paradigm for information processing. Today, mobile and wireless communications exit in many forms, providing different types of services. Existing forms of mobile and wireless communications continue to experience rapid growth and new applications and approaches are being spawned at an increasing rate. Recently, the mobile and wireless Internet has become one of the most important issues in the telecommunications arena. The development of the mobile and wireless Internet is the evolution of several different technologies coming together to make the Internet more accessible. Technologies such as the Internet, wireless networks, and mobile computing have merged to form the mobile and wireless Internet. The mobile and wireless Internet extends traditional Internet and World Wide Web services to wireless devices such as cellular phones, Personal Digital Assistants (PDAs) and notebooks. Mobile and wireless Internet c: an give users access to personalized information anytime and anywhere they need it, and thus empower them to make decisions more quickly, and bring them closer to friends, family, and work colleagues. Wireless data communication methods have been around for sometime
Key features Provides an in-depth understanding of emerging technologies and integration of artificial intelligence, deep learning, big data, IoT in healthcare Details specific applications for the use of AI, big data, and IoT in healthcare Discusses how AI technology can help in formulating protective measures for COVID-19 and other diseases Includes case studies
A fascinating perspective on what the Web is and what it will be Has the World Wide Web evolved into a new life form? The author of this provocative book, Philip Tetlow, presents a very compelling argument that it indeed has. Drawing from theories originating in the natural sciences, mathematics, and information technology, The Web's Awake explores how the continued growth and increasing complexity of the Web are quickly outstripping our capability to control it. In other words, the Web has quite literally taken on a life of its own. Stringently researched and clearly presented, the book examines a number of emergent characteristics and behaviors of the Web that have not been programmed, but rather have evolved. As the number and strength of these new Web characteristics and behaviors continue to increase, the author persuasively argues that the Web should be considered a living organism in its own right, a new post-human species consisting of a single member. Having established a new understanding of what the Web is, the author next offers a remarkable perspective on how the Web is evolving towards independence. He further argues that understanding the Web's evolution as an act of nature enables us to better harness the Web's resources for the good of society. While researchers in the emerging field of Web science have attempted to categorize what the Web is, this book takes a radically new approach that will change your understanding of the very nature and essence of the Web--what it is and where it is heading. Whether your interest lies in computing, information technology, evolution, physics, or biology, the author's clearly written, plain-English arguments arefascinating material for thought.
The Dark Side of Social Media: Psychological, Managerial, and Societal Perspectives examines how social media can negatively affect our lives. The book tackles issues related to social media such as emotional and mental health, shortened attention spans, selective self-presentation and narcissism, the declining quality of interpersonal relationships, privacy and security, cyberstalking, cyberbullying, misinformation and online deception, and negative peer effects. It goes on to discuss social media and companies (loss of power, challenging control mechanisms) and societies as a whole (fake news, chatbots, changes in the workplace). The Dark Side of Social Media: Psychological, Managerial, and Societal Perspectives empowers readers to have a more holistic understanding of the consequences of utilizing social media. It does not necessarily argue that social media is a bad development, but rather serves to complement the numerous empirical findings on the "bright side" of social media with a cautionary view on the negative developments.
Up relevance scores, improve page speed, optimize voice search questions, and more! Search Engine Optimization For Dummies shows website owners, developers, and search engine optimizers (SEOs) how to create a website that ranks at the top of search engines and has high-volume traffic, while answering the essential question of "how do I get people to visit my site?" By understanding search engine basics (what are they, which ones are important, how to get started), building a search engine-friendly site, registering your site with directories and indexes, using analysis tools to track results and link popularity to boost rankings, and advertising your site by using pay-per-click options, you can use the tricks of SEO masters to drive traffic to your site. You'll also discover how to write effective content, use social media to boost your profile, and manage your platform and reputation to positively impact your search engine rankings. Develop a search strategy and use new SERP features Maximize the effects of personalized search Analyze results with improved analytics tools Optimize voice search strategies There's no time like the present to create a website that ranks at the top of search engines and drives traffic to your site with these tips, tricks, and secrets.
Social Media: The Academic Library Perspective provides a step-by-step guide on social media as written by somebody who has already done the work. Made up of case studies written by authors at various institutions who provide different perspectives on their institution's use of social media, the book highlights successes and failures, while also focusing on tips for social media management in the academic library that anybody in the community can interpret and adapt. Social media platforms are dealt with systematically, making this an essential guide for librarians who want to use social media to the benefit of their library.
Internet of Things: Technologies and Applications for a New Age of Intelligence outlines the background and overall vision for the Internet of Things (IoT) and Cyber-Physical Systems (CPS), as well as associated emerging technologies. Key technologies are described including device communication and interactions, connectivity of devices to cloud-based infrastructures, distributed and edge computing, data collection, and methods to derive information and knowledge from connected devices and systems using artificial intelligence and machine learning. Also included are system architectures and ways to integrate these with enterprise architectures, and considerations on potential business impacts and regulatory requirements. New to this edition: * Updated material on current market situation and outlook. * A description of the latest developments of standards, alliances, and consortia. More specifically the creation of the Industrial Internet Consortium (IIC) and its architecture and reference documents, the creation of the Reference Architectural Model for Industrie 4.0 (RAMI 4.0), the exponential growth of the number of working groups in the Internet Engineering Task Force (IETF), the transformation of the Open Mobile Alliance (OMA) to OMA SpecWorks and the introduction of OMA LightweightM2M device management and service enablement protocol, the initial steps in the specification of the architecture of Web of Things (WoT) by World Wide Consortium (W3C), the GS1 architecture and standards, the transformation of ETSI-M2M to oneM2M, and a few key facts about the Open Connectivity Forum (OCF), IEEE, IEC/ISO, AIOTI, and NIST CPS. * The emergence of new technologies such as distributed ledgers, distributed cloud and edge computing, and the use of machine learning and artificial intelligence for IoT. * A chapter on security, outlining the basic principles for secure IoT installations. * New use case description material on Logistics, Autonomous Vehicles, and Systems of CPS
In order to establish technical prerequisites for efficient electronic business and education on the Internet, appropriate system support is needed as a vital condition for maximization of both short-term and long-term profits. Electronic Business and Education: Recent Advances in Internet Infrastructures discusses current research topics in the domain of system support for e-business and e-education on the Internet, and stresses the synergistic interaction of these two components. Attention is given to both scientific and engineering issues. Electronic Business and Education: Recent Advances in Internet Infrastructures is suitable as a secondary text for a graduate level course and as a reference for researchers and practitioners in industry, particularly in the area of e-business and e-education on the Internet. There is no longer any question that the Internet and electronic communication are the major new tools for collaborative advances in the creation of new knowledge and in future learning.' Excerpt from Foreword by Robert C. Richardson, Nobel Laureate 1996, Cornell University, USA
The Internet has had a tremendous impact on worldwide advertising and marketing practices. This comprehensive guide provides information on the international marketing and advertising industries of over 150 countries and regions and includes over 2,000 Web sites containing free information on the subject. Also covered is information on many related marketing subspecialities including direct marketing, customer relationship management, graphic design, retailing, distribution, and packaging. Each Internet resource listed includes a title, a URL, and an annotation. Resources are indexed by Web site title, site sponsor, country, and subject.
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.
This newly revised edition of the highly successful 1997 book offers professionals and students an up-to-date, in-depth understanding of how payments are made electronically across the Internet. The second edition explores the very latest developments in this quickly expanding area, including the newest security techniques and methods, and features a completely new chapter on the exciting advances in mobile commerce. Pub 8/01.
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment. Focusing on Facebook pages dedicated to hosting footage of street fights, brawls, and other forms of bareknuckle violence, Wood demonstrates that to properly grapple with antisocial media, we must address not only their content, but also their software. In doing so, this study goes a long way to addressing the fundamental question: how have social media changed the way we consume crime? Synthesizing criminology, media theory, software studies, and digital sociology, Antisocial Media is media criminology for the Facebook age. It is essential reading for students and scholars interested in social media, cultural criminology, and the crime-media interface.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices and IoE systems should speak only to each other, to humans or to both. Further, the book explores how IoE systems affect targeted audiences (researchers, machines, robots, users) and society, as well as future ecosystems. It examines the meaning, value and effect that IoT has had and may have on ordinary life, in business, on the battlefield, and with the rise of intelligent and autonomous systems. Based on an artificial intelligence (AI) perspective, this book addresses how IoE affects sensing, perception, cognition and behavior. Each chapter addresses practical, measurement, theoretical and research questions about how these "things" may affect individuals, teams, society or each other. Of particular focus is what may happen when these "things" begin to reason, communicate and act autonomously on their own, whether independently or interdependently with other "things".
Is Your Company Getting the Most from Its Investment in Change? Many companies have already invested heavily in infrastructure change, some are making that investment now, and all are contemplating the costs of becoming or evolving as an e-business. Is your company a "greenfield" organization with no back-end systems, or one whose infrastructure support systems are integrated across the enterprise? Are you just beginning to think about e-business capabilities, or are you on the leading edge of convergence? Whatever your company’s position on the ERP/E-Business Matrix, E-Business and ERP: Transforming the Enterprise provides the proven techniques you need to know to meld enterprise resource planning capabilities with the communications power of the Internet. Is Your Company Positioned for E-Business Success? The Internet has revolutionized twenty-first century business. Organizations today can communicate with customers, suppliers, and sellers at e-speed with the click of a mouse. Yet, with all of the excitement about the external possibilities of the Internet, companies still need efficient internal processes to make and move products, manage finances, recruit and motivate employees, and excel. E-Business and ERP: Transforming the Enterprise covers the skills and tools you will need to combine existing ERP software and capabilities with emerging Web-based technologies. In this forward-thinking outline for a new business structure, executives and managers will discover:
The companies best positioned to succeed in the near future are those that can balance existing ERP-based infrastructures and capabilities with exciting new e-business innovations. E-Business and ERP: Transforming the Enterprise examines the changing but essential role of ERP, places it in the context of the Web-based technologies defining today’s e-business environment, and reveals how to blend the best aspects of both to create a strong and flexible twenty-first century business enterprise. |
You may like...
Companion to the Public School…
William 1845-1920 Scott, Charles A. Barnes
Hardcover
R889
Discovery Miles 8 890
A History of the Old English Letter…
Talbot Baines 1852-1893 Reed
Hardcover
R983
Discovery Miles 9 830
Higher Arithmetic, or, The Science and…
James B (James Bates) 1808 Thomson
Hardcover
R983
Discovery Miles 9 830
|