|
|
Books > Computing & IT > Social & legal aspects of computing > General
Service delivery in the digital era is all about bringing together
innovative ideas from various stakeholders in the private, public,
and civil sectors to meet customer expectations. Like any business,
government public service entities must provide public service
delivery to their customers in an age that is heavily influenced by
technological advancements. Information Systems Strategic Planning
for Public Service Delivery in the Digital Era is an essential
reference source that discusses issues related to public service
delivery in the digital era and the degree to which governments may
take advantage of the transformational potential of ICT to move
towards seamless government, particularly for improving service
delivery, democratic responsiveness, and public outreach. The book
also provides a pragmatic framework for government entities to
define their information systems strategic plan (ISSP), guiding the
reader in a step-by-step practical description of the various
technical concepts, current and future technology trends, and
implementation considerations for formulating their ISSP to ensure
the maximum gain from public service delivery. Including research
on topics such as human capital, knowledge economy, and block chain
technology, this book is ideally designed for academicians, public
administrators, government officials, IT consultants.
YouTube has afforded new ways of documenting, performing and
circulating musical creativity. This first sustained exploration of
YouTube and music shows how record companies, musicians and amateur
users have embraced YouTube's potential to promote artists, stage
performances, build artistic (cyber)identity, initiate interactive
composition, refresh music pedagogy, perform fandom, influence
musical tourism and soundtrack our everyday lives. Speaking from a
variety of perspectives, musicologists, film scholars,
philosophers, new media theorists, cultural geographers and
psychologists use case studies to situate YouTube as a vital
component of contemporary musical culture. This book works together
with its companion text Remediating Sound: Repeatable Culture,
YouTube and Music.
Recent advancements and innovations in medical image and data
processing have led to a need for robust and secure mechanisms to
transfer images and signals over the internet and maintain
copyright protection. The Handbook of Research on Information
Security in Biomedical Signal Processing provides emerging research
on security in biomedical data as well as techniques for accurate
reading and further processing. While highlighting topics such as
image processing, secure access, and watermarking, this publication
explores advanced models and algorithms in information security in
the modern healthcare system. This publication is a vital resource
for academicians, medical professionals, technology developers,
researchers, students, and practitioners seeking current research
on intelligent techniques in medical data security.
This publication contributes to the serious games field by
investigating original contributions and methods that use serious
games in various domains. This comprehensive and timely publication
works as an essential reference source, building on the available
literature in the field of Serious Games for the economic and
social development of countries while providing for further
research opportunities in this dynamic and growing field. Thus, the
book provides the opportunity for a reflection on this important
issue, increasing the understanding of the importance of Serious
Games in the context of organizations' improvements, providing
relevant academic work, empirical research findings, and an
overview of this relevant field of study. This text provides the
resources necessary for policy makers, technology developers and
managers to adopt and implement solutions for a more digital era.
Businesses in today's world are adopting technology-enabled
operating models that aim to improve growth, revenue, and identify
emerging markets. However, most of these businesses are not suited
to defend themselves from the cyber risks that come with these
data-driven practices. To further prevent these threats, they need
to have a complete understanding of modern network security
solutions and the ability to manage, address, and respond to
security breaches. The Handbook of Research on Intrusion Detection
Systems provides emerging research exploring the theoretical and
practical aspects of prominent and effective techniques used to
detect and contain breaches within the fields of data science and
cybersecurity. Featuring coverage on a broad range of topics such
as botnet detection, cryptography, and access control models, this
book is ideally designed for security analysts, scientists,
researchers, programmers, developers, IT professionals, scholars,
students, administrators, and faculty members seeking research on
current advancements in network security technology.
As the disciplines of art, technology, and information science
collide, computer graphics and multimedia are presenting a myriad
of applications and problems to professionals and scholars in
Computer Science, Information Science, Digital Art, Multimedia,
Educational Technology, and Media Arts. Today's digital scholar can
use Computer Graphics and Multimedia: Applications, Problems and
Solutions as a tool to explore the vast parameters of the
applications, problems, and solutions related to digital
disciplines. Contributing authors include computer scientists,
multimedia researchers, computer artists, graphic designers, and
digital media specialists. The book has an extensive range of
topics for the digital scholar who wants to discover and research
other areas within the computer graphics and multimedia disciplines
beyond their own.
This book focuses on novel and state-of-the-art scientific work in
the area of detection and prediction techniques using information
found generally in graphs and particularly in social networks.
Community detection techniques are presented in diverse contexts
and for different applications while prediction methods for
structured and unstructured data are applied to a variety of fields
such as financial systems, security forums, and social networks.
The rest of the book focuses on graph-based techniques for data
analysis such as graph clustering and edge sampling. The research
presented in this volume was selected based on solid reviews from
the IEEE/ACM International Conference on Advances in Social
Networks, Analysis, and Mining (ASONAM '17). Chapters were then
improved and extended substantially, and the final versions were
rigorously reviewed and revised to meet the series standards. This
book will appeal to practitioners, researchers and students in the
field.
Alarm or alert detection remains an issue in various areas from
nature, i.e. flooding, animals or earthquake, to software systems.
Liveness, dynamicity, reactivity of alarm systems: how to ensure
the warning information reach the right destination at the right
moment and in the right location, still being relevant for the
recipient, in spite of the various and successive filters of
confidentiality, privacy, firewall policies, etc.? Also relevant in
this context are to technical contingency issues: material failure,
defect of connection, break of channels, independence of
information routes and sources? Alarms with crowd media,
(mis)information vs. rumours: how to make the distinction? The
prediction of natural disasters (floods, avalanches, etc.), health
surveillance (affectionate fevers of cattle, pollution by
pesticides, etc.), air, sea and land transport, or space
surveillance to prevent Risks of collisions between orbital objects
involve more and more actors within Information Systems, one of
whose purposes is the dissemination of alerts. By expanding the
capabilities and functionality of such national or international
systems, social networks are playing a growing role in
dissemination and sharing, eg. with the support of systems like the
Google Alert (https://www.google.fr/alerts) which concerns the
publication of contents online. Recently, the Twitter microblogging
platform announced a broadcast service, designed to help government
organizations with alerts to the public. The proper functioning of
such systems depends on fundamental properties such as resilience,
liveliness and responsiveness: any alert must absolutely reach the
right recipient at the right time and in the right place, while
remaining relevant to him, despite the various constraints. on the
one hand to external events, such as hardware failures, connection
faults, breaks in communication channels, on the other hand to
confidentiality, such as the collection and use of personal data
(with or without the consent of the user), or the disparity of
access policies (generation according to industrial, technological,
security constraints, management of internal / external policies,
etc.) between actors. This book opens the discussion on the
"procrastination", the dynamics and the reactivity of the alert
systems, but also the problems of confidentiality, filtering of
information, and the means of distinguishing information and rumor.
Social media and new social facilities have made it necessary to
develop new media design processes with different communication
strategies in order to promote sustainable communication. Visual
communication emphasizes messages that are transmitted through
visual materials in order to effectively communicate emotions,
thoughts, and concepts using symbols instead of words. Social
networks present an ideal environment for utilizing this
communication technique. New Media and Visual Communication in
Social Networks is a pivotal scholarly publication that examines
communication strategies in the context of social media and new
digital media platforms and explores the effects of visual
communication on social networks, visual identity, television,
magazines, newspapers, and more. Highlighting a range of topics
such as consumer behavior, visual identity, and digital pollution,
this book is essential for researchers, practitioners,
entrepreneurs, policymakers, and educators.
This volume presents the most recent studies of work and labor in
the digital age as it unfolds in both Europe and the United States.
One of the critical questions facing modernity concerns the
reconfiguration of paid employment, which has been subject to
wholesale changes that have widespread consequences for workers,
their families, and the institutional structure that characterizes
capitalist societies. A key driver of these changes has been the
digital revolution and the rapid proliferation of the gig economy.
Together with social network sites for hiring, the spread of
robotics, and the rise of artificial intelligence and machine
learning, they leave virtually no occupation untouched.
This book addresses the question of how competition authorities
assess mergers in the Information Communication Technology (ICT)
sector so as to promote competition in innovation. A closer look at
the question reveals that it is far more complex and difficult to
answer for the ICT, telecommunications and multi-sided platform
(MSP) economy than for more traditional sectors of the economy.
This has led many scholars to re-think and question whether the
current merger control framework is suitable for the ICT sector,
which is often also referred to as the new economy. The book
pursues an interdisciplinary approach combining insights from law,
economics and corporate strategy. Further, it has a comparative
dimension, as it discusses the practices of the US, the EU and,
wherever relevant, of other competition authorities from around the
globe. Considering that the research was conducted in the EU, the
practices of the European Commission remain a key aspect of the
content.Considering its normative dimension, the book concentrates
on the substantive aspects of merger control. To facilitate a
better understanding of the most important points, the book also
offers a brief overview of the procedural aspects of merger control
in the EU, the US and the UK, and discusses recent amendments to
Austrian and German law regarding the notification threshold. Given
its scope, the book offers an invaluable guide for competition law
scholars, practitioners in the field, and competition authorities
worldwide.
In today's society, the utilization of social media platforms has
become an abundant forum for individuals to post, share, tag, and,
in some cases, overshare information about their daily lives. As
significant amounts of data flood these venues, it has become
necessary to find ways to collect and evaluate this information.
Social Media Data Extraction and Content Analysis explores various
social networking platforms and the technologies being utilized to
gather and analyze information being posted to these venues.
Highlighting emergent research, analytical techniques, and best
practices in data extraction in global electronic culture, this
publication is an essential reference source for researchers,
academics, and professionals.
The rate of cybercrimes is increasing because of the fast-paced
advancements in computer and internet technology. Crimes employing
mobile devices, data embedding/mining systems, computers, network
communications, or any malware impose a huge threat to data
security. Countering Cyber Attacks and Preserving the Integrity and
Availability of Critical Systems addresses current problems and
issues emerging in cyber forensics and investigations and proposes
new solutions that can be adopted and implemented to counter
security breaches within various organizations. The publication
examines a variety of topics such as advanced techniques for
forensic developments in computer and communication-link
environments and legal perspectives including procedures for cyber
investigations, standards, and policies. It is designed for
policymakers, forensic analysts, technology developers, security
administrators, academicians, researchers, and students.
The COVID-19 pandemic has accelerated the implementation of digital
transformation strategies, and there has been an exponential
increase in the demand for intelligent and reliable communications
solutions. The pandemic brings huge challenges for all economic
agents, as resilience and the capacity to adapt to new risks and
hindrances are now fundamental elements in our societies. In this
context, it is essential that digitalization brings opportunities
to transition to a smarter economy based on innovation,
sustainability, and well-being. The Handbook of Research on
Digitalization as a Driver for Smart Economy in the Post-COVID-19
Era discusses digitalization, information and communication
technologies, marketing, entrepreneurship, and innovation in an
organizational context to optimize the practices established in the
most diverse domains of knowledge, specifically attending to the
relation between digitalization and sustainability in a
post-pandemic era. It is ideal for academicians, instructors,
researchers, industry professionals, business managers, private
institutions, and students as it covers a range of key topics such
as sustainability and smart economy.
To survive in today's competitive business environment, marketing
professionals must look to develop innovative methods of reaching
their customers and stakeholders. Web 2.0 provides a useful tool in
developing the relationships between business and consumer. The
Handbook of Research on Integrating Social Media into Strategic
Marketing explores the use of social networking and other online
media in marketing communications, including both best practices
and common pitfalls to provide comprehensive coverage of the topic.
This book is intended for marketing professionals, business
managers, and anyone interested in how social media fits into
today's marketing environments.
This important text/reference presents the first dedicated review
of techniques for contactless 3D fingerprint identification,
including novel and previously unpublished research. The text
provides a systematic introduction to 3D fingerprint
identification, covering the latest advancements in contactless 2D
and 3D sensing technologies, and detailed discussions on each key
aspect in the development of an effective 3D fingerprint
identification system. Topics and features: introduces the key
concepts and trends in the acquisition and identification of
fingerprint images, and a range of 3D fingerprint imaging
techniques; proposes a low-cost method for online 3D fingerprint
image acquisition, and an efficient 3D fingerprint imaging approach
using coloured photometric stereo; describes pre-processing
operations on point cloud 3D fingerprint data, and explains the
specialized operations for reconstructing 3D fingerprints from live
finger scans; examines the representation of minutiae in 3D space,
providing details on recovering these features from point cloud
data, and on matching such 3D minutiae templates; reviews various
3D fingerprint matching methods, including binary surface
code-based approaches and a tetrahedron-based matching approach;
discusses the uniqueness of 3D fingerprints, evaluating the
benefits of employing 3D fingerprint identification over
conventional 2D fingerprint techniques. This unique work is a
must-read for all researchers seeking to make further advances in
this area, towards the exciting opportunities afforded by
contactless 3D fingerprint identification for improving the
hygiene, user convenience, and matching accuracy of fingerprint
biometric technologies.
Since the dawn of the digital era, the transfer of knowledge has
shifted from analog to digital, local to global, and individual to
social. Complex networked communities are a fundamental part of
these new information-based societies. Emerging Pedagogies in the
Networked Knowledge Society: Practices Integrating Social Media and
Globalization examines the production, dissemination, and
consumption of knowledge within networked communities in the wider
global context of pervasive Web 2.0 and social media services. This
book will offer insight for business stakeholders, researchers,
scholars, and administrators by highlighting the important concepts
and ideas of information- and knowledge-based economies.
This book introduces social manufacturing, the next generation
manufacturing paradigm that covers product life cycle activities
that deal with Internet-based organizational and interactive
mechanisms under the context of socio-technical systems in the
fields of industrial and production engineering. Like its subject,
the book's approach is multi-disciplinary, including manufacturing
systems, operations management, computational social sciences and
information systems applications. It reports on the latest research
findings regarding the social manufacturing paradigm, the
architecture, configuration and execution of social manufacturing
systems and more. Further, it describes the individual technologies
enabled by social manufacturing for each topic, supported by case
studies. The technologies discussed include manufacturing resource
minimalization and their socialized reorganizations, blockchain
models in cybersecurity, computing and decision-making, social
business relationships and organizational networks, open product
design, social sensors and extended cyber-physical systems, and
social factory and inter-connections. This book helps engineers and
managers in industry to practice social manufacturing, as well as
offering a systematic reference resource for researchers in
manufacturing. Students also benefit from the detailed discussions
of the latest research and technologies that will have been put
into practice by the time they graduate.
As recently as 1968, computer scientists were uncertain how best to
interconnect even two computers. The notion that within a few
decades the challenge would be how to interconnect millions of
computers around the globe was too far-fetched to contemplate. Yet,
by 1988, that is precisely what was happening. The products and
devices developed in the intervening years-such as modems,
multiplexers, local area networks, and routers-became the linchpins
of the global digital society. How did such revolutionary
innovation occur? This book tells the story of the entrepreneurs
who were able to harness and join two factors: the energy of
computer science researchers supported by governments and
universities, and the tremendous commercial demand for
Internetworking computers. The centerpiece of this history comes
from unpublished interviews from the late 1980s with over 80
computing industry pioneers, including Paul Baran, J.C.R.
Licklider, Vint Cerf, Robert Kahn, Larry Roberts, and Robert
Metcalfe. These individuals give us unique insights into the
creation of multi-billion dollar markets for
computer-communications equipment, and they reveal how
entrepreneurs struggled with failure, uncertainty, and the limits
of knowledge.
|
You may like...
Roman
Cas Wepener
Paperback
R307
Discovery Miles 3 070
|