|
|
Books > Computing & IT > Internet > General
Internet trolling is a major feature of internet culture and
jargon. As such it holds many different connotations that are often
negative. Therefore, it is important to observe the implications
and issues on multiple levels to gain a better understanding of
this behavior. Examining the Concepts, Issues, and Implications of
Internet Trolling provides current research on the technical
approaches as well as more social and behavioural involvements for
gaining a better understanding of internet trolling. This book is
useful to researchers, students and practitioners interested in
building a share meaning for online community users.
Industry 4.0 is a challenge for today's businesses. It's a concept
that encompasses the technological innovations of automation,
control, and information technology, as it's applied to
manufacturing processes. It's a new topic that recently emerged in
academia and industry, with few books that target both management
and engineering. This book will cover the new advances and the way
to manage competitive organizations. The chapters will include
terms of theory, evidence, and/or methodology, and significantly
advance social scientific research. This book: Focuses on the
latest and most recent research findings occurring on the topic of
Industry 4.0 Presents the ways companies around the world are
facing today's technological challenges Assists researchers and
practitioners in selecting the correct options and strategies to
manage competitive organizations Provides recent advances in
international studies Encompasses the main technological
innovations in the fields of automation, control, and information
technology applied to the manufacturing processes Industry 4.0:
Challenges, Trends, and Solutions in Manangment and Engineering is
designed to increase the knowledge and effectiveness of all
managers and engineers in all organizations and activity sectors
Carolina Machado has been teaching in the Human Resources
Management subjects since 1989 at University of Minho, Portugal.
She has been an associate professor since 2004, with experience and
research interest areas in the field of Human Resource Management,
International Human Resource Management, Human Resource Management
in SMEs, Training and Development, Emotional Intelligence,
Management Change, Knowledge Management, and Management/HRM in the
Digital Age. She is head of the Department of Management and head
of the Human Resources Management Work Group at University of
Minho, as well as chief editor of the International Journal of
Applied Management Sciences and Engineering (IJAMSE). J. Paulo
Davim is a professor at the Department of Mechanical Engineering of
the University of Aveiro, Portugal. He has more than 30 years of
teaching and research experience in Manufacturing, Materials,
Mechanical, and Industrial Engineering, with special emphasis in
Machining & Tribology. He has also interest in Management,
Engineering Education, and Higher Education for Sustainability. He
has worked as evaluator of projects for ERC (European Research
Council) and other international research agencies.
The book will focus on exploiting state of the art research in
semantic web and web science. The rapidly evolving world-wide-web
has led to revolutionary changes in the whole of society. The
research and development of the semantic web covers a number of
global standards of the web and cutting edge technologies, such as:
linked data, social semantic web, semantic web search, smart data
integration, semantic web mining and web scale computing. These
proceedings are from the 6th Chinese Semantics Web Symposium.
Social engineering attacks target the weakest link in an
organization's security human beings. Everyone knows these attacks
are effective, and everyone knows they are on the rise. Now,
"Social Engineering Penetration Testing" gives you the practical
methodology and everything you need to plan and execute a social
engineering penetration test and assessment. You will gain
fascinating insights into how social engineering techniques
including email phishing, telephone pretexting, and physical
vectors can be used to elicit information or manipulate individuals
into performing actions that may aid in an attack. Using the book's
easy-to-understand models and examples, you will have a much better
understanding of how best to defend against these attacks.
The authors of "Social Engineering Penetration Testing "show you
hands-on techniques they have used at RandomStorm to provide
clients with valuable results that make a real difference to the
security of their businesses. You will learn about the differences
between social engineering pen tests lasting anywhere from a few
days to several months. The book shows you how to use widely
available open-source tools to conduct your pen tests, then walks
you through the practical steps to improve defense measures in
response to test results.
Understand how to plan and execute an effective social engineering
assessment Learn how to configure and use the open-source tools
available for the social engineer Identify parts of an assessment
that will most benefit time-critical engagements Learn how to
design target scenarios, create plausible attack situations, and
support various attack vectors with technology Create an assessment
report, then improve defense measures in response to test
results"
This book explores various e-Services related to health, learning,
culture, media and the news, and the influences the Web and related
technologies have had and continue to have in each of these areas,
both on service providers and service users. It provides insights
into the main technological and human issues regarding healthcare,
aging population, recent challenges in the educational environment,
the impact of digital technologies on culture and heritage,
cultural diversity, freedom of expression, intellectual property,
fake news and, last but not least, public opinion manipulation and
ethical issues. Its main aim is to bridge the gap between
technological solutions, their successful implementation, and the
fruitful utilization of the main set of e-Services mostly delivered
by private or public companies. Today, various parameters actively
influence e-Services' success or failure: cultural aspects,
organisational and privacy issues, bureaucracy and workflows,
infrastructure and technology in general, user habits, literacy,
capacity or merely interaction design. This includes having a
significant population of citizens who are willing and able to
adopt and use online services; as well as developing the managerial
and technical capability to implement applications that meet
citizens' needs. This book helps readers understand the mutual
dependencies involved; further, a selection of success stories and
failures, duly commented on, enables readers to identify the right
approach to innovation in areas that offer the opportunity to reach
a wide audience with minimal effort. With its balanced humanistic
and technological approach, the book mainly targets public
authorities, decision-makers, stakeholders, solution developers,
and graduate students.
Digitising Enterprise in an Information Age is an effort that
focuses on a very vast cluster of Enterprises and their digitising
technology involvement and take us through the road map of the
implementation process in them, some of them being ICT, Banking,
Stock Markets, Textile Industry & ICT, Social Media, Software
Quality Assurance, Information Systems Security and Risk
Management, Employee Resource Planning etc. It delves on increased
instances of cyber spamming and the threat that poses to e-Commerce
and Banking and tools that help and Enterprise toward of such
threats. To quote Confucius, "As the water shapes itself to the
vessel that contains it, so does a wise man adapts himself to
circumstances." And the journey of evolution and progression will
continue and institutions and enterprises will continue to become
smarter and more and more technology savvy. Enterprises and
businesses across all genre and spectrum are trying their level
best to adopt to change and move on with the changing requirements
of technology and as enterprises and companies upgrade and speed up
their digital transformations and move their outdate heirloom
systems to the cloud, archaic partners that don't keep up will be
left behind. Note: T&F does not sell or distribute the Hardback
in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.
Internet Strategy: The Road to Web Services Solutions reminds
readers that several attempts have been made to convince the world
that DOT.COM was developed to take over businesses, and the
traditional way of creating businesses and running organizations
would be condemned to the past. One of those attempts led to the
Application Service Provision model, from which the current Web
Services business model takes its origins. As organizations start
to carefully invest again, ""Internet Strategy: The Road to Web
Services Solutions"" shows that the focus is on delivering value
and enabling growth. The book concentrates on how to create,
execute and evolve a customer-centric strategy of any
Internet-based management strategy in order to provide valuable
customer experiences. ""Internet Strategy: The Road to Web Services
Solutions"" presents how enabling technologies are as important as
ever. It points out that there's a need to move to new levels in
thinking and execution, to help organizations maintain cost
efficiencies and enable growth in revenues and profitability.
Across Africa, digital media are providing scholars with a reason
and opportunity for revisiting the question, and the analytical
lens, of publics with new vigour and less normative baggage. This
book brings together a rich set of empirically grounded analyses of
the diverse digital spaces and networks of communication springing
up across the Eastern African region. The contributions offer a
plural set of reflections on whether and how we can usefully think
about these spaces and networks as convening publics, where
citizens come together to discuss matters of common interest. The
authors make clear the need to unshackle such studies from slavish
acceptance of outsiders' prescriptions on what constitutes
desirable publics. They highlight the importance of being attentive
to rapidly changing everyday realities across Africa in which
people are coming together around the circulation of ideas in ways
that include digital means of communications. In so doing, the
contributions bring forward new ways of thinking about, through and
with publics, alongside other heritages in Africanist scholarship
that have continued salience. Looking outwards from the region,
such different perspectives on our digitally mediated world offer
theoretical novelty that advances how we think about the notion of
publics and their political significance. This book was originally
published as a special issue of the Journal of Eastern African
Studies.
Offers research-based examples and case studies to facilitate the
understanding of each IoT primitive Highlights IoT's connection to
blockchain Provides an understanding of benefits and challenges of
IoT and its importance to a variety of engineering disciplines
Very topical. The first book to analyse these conflicts in detail,
from a multi-disciplinary perspective
'A fascinating expose of the world behind your screen. Timely,
often disturbing, and so important' Caroline Criado Perez, author
of Invisible Women 'Takes us beyond Zuckerberg, Bezos et al to a
murkier world where we discover how everything online works and who
benefits from it. Fascinating, engaging and important' Observer
'Could not be more timely' Spectator The internet is a network of
physical cables and connections, a web of wires enmeshing the
world, linking huge data centres to one another and eventually to
us. All are owned by someone, financed by someone, regulated by
someone. We refer to the internet as abstract from reality. By
doing so, we obscure where the real power lies. In this powerful
and necessary book, James Ball sets out on a global journey into
the inner workings of the system. From the computer scientists to
the cable guys, the billionaire investors to the ad men, the
intelligence agencies to the regulators, these are the real-life
figures powering the internet and pulling the strings of our
society. Ball brilliantly shows how an invention once hailed as a
democratising force has concentrated power in places it already
existed - that the system, in other words, remains the same as it
did before.
- Provides both students and artists with a practice-orientated
guide to socially engaged art practices in the twenty-first
century. - Features first-hand insight into the individual
processes and methodologies of twenty-eight established artists
including: Kim Abeles, Christopher Blay, Joseph DeLappe, Mary Beth
Heffernan, Chris Johnson, Rebekah Modrak, Praba Pilar, Tabita
Rezaire, Sylvain Souklaye, and collaborators Victoria Vesna and
Siddharth Ramakrishnan. - Demonstrates a range of creative projects
that engage different forms of technologies for readers interested
in making the social turn in their artistic practice, and offers
creative prompts that readers can respond to in their own
practices.
Carol Smallwood's The Complete Guide to Using Google in Libraries,
Volume 1: Instruction, Administration, and Staff Productivity
explores how Google's suite of tools, from Google Docs (now Google
Drive), Google Scholar, Hangout, Forms, and others made freely
available to the Internet Community can be used by libraries to
expand the role of digital operations in the management of library
materials, to communicate with their patrons and collaborators, to
exploit the resources on the Web, and many others. The book has 29
chapters organized into sections that focus on ways that Google's
suite of tools can be applied to address problems in a specific
area of library concern. The section headings are: Library
Instruction for Users; Collaboration within and among libraries;
Library Administration; Collection Management; and Library
Productivity. In each topical area, the chapters show how
librarians are taking advantage of these tools to change the way
that their library works. All of this without the burden of an
additional bill to pay. Through these carefully selected case
studies from real libraries, you will be able to learn about the
surprising and powerful potential that exists through Google tools
to improve library operations.
This book develops the core system science needed to enable the
development of a complex industrial internet of
things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering
contributions from leading experts in the field with years of
experience in advancing manufacturing, it fosters a research
community committed to advancing research and education in
IIoT/M-CPS and to translating applicable science and technology
into engineering practice. Presenting the current state of IIoT and
the concept of cybermanufacturing, this book is at the nexus of
research advances from the engineering and computer and information
science domains. Readers will acquire the core system science
needed to transform to cybermanufacturing that spans the full
spectrum from ideation to physical realization.
In this book, the author outlines a Robust Web Parking, Truck and
Transportation Portal (RWPTTP) for integrating parking and
transportation services - a revolutionary approach in contrast to
incremental change for managing traffic congestion. Autonomous
vehicle technology, artificial intelligence, internet of things
(IOT), and other interconnected hardware and software tools will
assist autonomous parking and transportation services and provide
next-century infrastructure for consolidated transportation
customer services. The book highlights currently available
autonomous parking and transportation technologies, and the
development of an integrated and intelligent transportation
service/system (IITS) platform, with specific use of technologies
to reconfigure the transportation industry. The author also
suggests many regulatory and policy changes to simplify data
collection, traffic operation, introduction of a duplicate
transportation system using light rail (LRs) and high speed rail
(SPRs), and redistribution of parking spaces along such routes,
using renewable energy.
* Fills a gap in the current Business and Management literature by
addressing the relationship between a brand's visual identity and
their stakeholders. * Combines a literature-based and theoretical
approach with real life case studies from a broad range of
industries. * Covers the full process of corporate brand design
management, making the book suitable recommended reading for a
broad range of modules and disciplines.
The Handbook on Socially Interactive Agents provides a
comprehensive overview of the research fields of Embodied
Conversational Agents, Intelligent Virtual Agents, and Social
Robotics. Socially Interactive Agents (SIAs), whether virtually or
physically embodied, are autonomous agents that are able to
perceive an environment including people or other agents, reason,
decide how to interact, and express attitudes such as emotions,
engagement, or empathy. They are capable of interacting with people
and one another in a socially intelligent manner using multimodal
communicative behaviors, with the goal to support humans in various
domains. Written by international experts in their respective
fields, the book summarizes research in the many important research
communities pertinent for SIAs, while discussing current challenges
and future directions. The handbook provides easy access to
modeling and studying SIAs for researchers and students, and aims
at further bridging the gap between the research communities
involved. In two volumes, the book clearly structures the vast body
of research. The first volume starts by introducing what is
involved in SIAs research, in particular research methodologies and
ethical implications of developing SIAs. It further examines
research on appearance and behavior, focusing on multimodality.
Finally, social cognition for SIAs is investigated using different
theoretical models and phenomena such as theory of mind or
pro-sociality. The second volume starts with perspectives on
interaction, examined from different angles such as interaction in
social space, group interaction, or long-term interaction. It also
includes an extensive overview summarizing research and systems of
human-agent platforms and of some of the major application areas of
SIAs such as education, aging support, autism, and games.
Cybernetic-Existentialism: Freedom, Systems, and Being-for-Others
in Contemporary Arts and Performance offers a unique discourse and
an original aesthetic theory. It argues that fusing perspectives
from the philosophy of Existentialism with insights from the
'universal science' of cybernetics provides a new analytical lens
and deconstructive methodology to critique art. In this study,
Steve Dixon examines how a range of artists' works reveal the ideas
of Existentialist philosophers including Kierkegaard, Camus, de
Beauvoir, and Sartre on freedom, being and nothingness, eternal
recurrence, the absurd, and being-for-others. Simultaneously, these
artworks are shown to engage in complex explorations of concepts
proposed by cyberneticians including Wiener, Shannon, and Bateson
on information theory and 'noise', feedback loops, circularity,
adaptive ecosystems, autopoiesis, and emergence. Dixon's
groundbreaking book demonstrates how fusing insights and knowledge
from these two fields can throw new light on pressing issues within
contemporary arts and culture, including authenticity, angst and
alienation, homeostasis, radical politics, and the human as system.
Wireless Sensor Networks and the Internet of Things: Future
Directions and Applications explores a wide range of important and
real-time issues and applications in this ever-advancing field.
Different types of WSN and IoT technologies are discussed in order
to provide a strong framework of reference, and the volume places
an emphasis on solutions to the challenges of protection,
conservation, evaluation, and implementation of WSN and IoT that
lead to low-cost products, energy savings, low carbon usage, higher
quality, and global competitiveness. The volume is divided into
four sections that cover: Wireless sensor networks and their
relevant applications Smart monitoring and control systems with the
Internet of Things Attacks, threats, vulnerabilities, and defensive
measures for smart systems Research challenges and opportunities
This collection of chapters on an important and diverse range of
issues presents case studies and applications of cutting-edge
technologies of WSN and IoT that will be valuable for academic
communities in computer science, information technology, and
electronics, including cyber security, monitoring, and data
collection. The informative material presented here can be applied
to many sectors, including agriculture, energy and power, resource
management, biomedical and health care, business management, and
others.
Successful technical blogging is not easy but it's also not magic.
Use these techniques to attract and keep an audience of loyal,
regular readers. Leverage this popularity to reach your goals and
amplify your influence in your field. Get more more users for your
startup or open source project, or simply find an outlet to share
your expertise. This book is your blueprint, with step-by-step
instructions that leave no stone unturned. Plan, create, maintain,
and promote a successful blog that will have remarkable effects on
your career or business. Successful people often get recognition by
teaching what they know. Blogging is a reliable path to do that,
while gaining influence in the process. The problem is getting it
right. Far too often professionals start a blog with big hopes,
only to quickly give up because they don't get speedy results. This
book will spare you that fate, by outlining a careful plan of
action. A plan that will bring amazing benefits to your career, new
job possibilities, as well as publishing, speaking, and consulting
opportunities. And if you are blogging for business, you'll attract
new customers, partners, and outstanding employees. Understand what
blogging is and how it can improve your professional (and personal)
life. Devise a plan for your new or existing blog. Create
remarkable content that ranks well in Google and is shared by
readers. Beat procrastination by employing proven time-management
techniques that make you an efficient and effective blogger.
Promote your blog by mastering on-page and off-page SEO, as well as
social media promotion, without compromising your ethics. Analyze
your traffic to understand your audience and measure growth. Build
a community around your blog and make the best of your newfound
popularity, by maximizing its benefits for your career, business,
or simply for extra income. Create and maintain a successful
technical blog that will amplify your impact, influence, and reach
by following Antonio's step-by-step plan.
Social Media in the Digital Age: History, Ethics, and Professional
Uses details how the growth and development of social media has
influenced how people interact with one another, receive news, and
form social bonds. Part I of the book focuses on the history and
study of social media, addressing the rise of social media,
theories used to study social media, the widespread impacts of
user-generated content, and more. Part II examines the legal and
ethical implications of social media with chapters covering the
legalities of social and digital media use, user policies, and
image and brand management. Part III addresses the professional
uses of social media within the disciplines of public relations,
advertising, marketing, journalism, mass media, nonprofit work, and
U.S. politics, as well as the role of social media in national and
global movements. The second edition features new content on fake
news, disinformation, conspiracy theories, bots and trolls, social
media influencers, the growth of Instagram and TikTok, the
Communications Decency Act, podcasts, and the confluence of social
media and the 2020 United States presidential election. Social
Media in the Digital Age is ideal for undergraduate courses in mass
communication, broadcasting, history, and popular culture. It is
also a valuable resource for communication professionals.
|
|