|
|
Books > Computing & IT > Social & legal aspects of computing > General
Africa 2.0 provides an important history of how two technologies -
mobile calling and internet - were made available to millions of
sub-Saharan Africans, and the impact they have had on their lives.
The book deals with the political challenges of liberalisation and
privatisation that needed to be in place in order for these
technologies to be built. It analyses how the mobile phone
fundamentally changed communications in sub-Saharan Africa and the
ways Africans have made these technologies part of their lives,
opening up a very different future. The book offers a critical
examination of the impact these technologies have had on
development practices, and the key role development actors played
in accelerating regulatory reform, fibre roll-out and mobile money.
Southwood shows how corruption in the industry is a prism through
which patronage relationships in government can be understood, and
argues that the arrival of a start-up ecosystem in the region has
the potential to change this. A vital overview of the changes of
the last three decades, Africa 2.0 examines the transformative
effects of mobile and internet technologies, and the very different
future they have opened out for sub-Saharan Africa. -- .
What opportunities do digital technologies present? How do
developments in digital media support scholarship and teaching yet
further social justice? Written by two experts in the field, this
accessible book is the first to look at scholarly practice in the
digital era and consider how it can connect academics, journalists
and activists in ways that foster transformation on issues of
social justice. The terra firma of scholarly practice is changing.
This book offers both a road map and a vision of what being a
scholar can be when reimagined in the digital era to enliven the
public good, as it discusses digital innovations in higher
education as well as reflecting upon what these mean in an age of
austerity. It is ideal for students and academics working in any
field of humanities or social sciences with a social justice focus.
This book introduces new trends of theory and practice of
information technologies in tourism. The book does not handle only
the fundamental contribution, but also discusses innovative and
emerging technologies to promote and develop new generation tourism
informatics theory and their applications. Some chapters are
concerned with data analysis, web technologies, social media and
their case studies. Travel information on the web provided by
travelers is very useful for other travelers make their travel
plan. A chapter in this book proposes a method for interactive
retrieval of information on accommodation facilities to support
travelling customers in their travel preparations. Also an adaptive
user interface for personalized transportation guidance system is
proposed. Another chapter in this book shows a novel support system
for the collaborative tourism planning by using the case reports
that are collected via Internet. Also, a system for recommending
hotels for the users is proposed and evaluated. Other chapters are
concerned with recommendation, personalization and other emerging
technologies.
This book deals with the theoretical, methodological, and empirical
implications of bounded rationality in the operation of
institutions. It focuses on decisions made under uncertainty, and
presents a reliable strategy of knowledge acquisition for the
design and implementation of decision-support systems. Based on the
distinction between the inner and outer environment of decisions,
the book explores both the cognitive mechanisms at work when actors
decide, and the institutional mechanisms existing among and within
organizations that make decisions fairly predictable. While a great
deal of work has been done on how organizations act as patterns of
events for (boundedly) rational decisions, less effort has been
devoted to study under which circumstances organizations cease to
act as such reliable mechanisms. Through an empirical strategy on
open-ended response data from a survey among junior judges, the
work pursues two main goals. The first one is to explore the limits
of "institutional rationality" of the Spanish lower courts on-call
service, an optimal scenario to observe decision-making under
uncertainty. The second aim is to achieve a better understanding of
the kind of uncertainty under which inexperienced decision-makers
work. This entails exploring the demands imposed by problems and
the knowledge needed to deal with them, making this book also a
study on expertise achievement in institutional environments. This
book combines standard multivariate statistical methods with
machine learning techniques such as multidimensional scaling and
topic models, treating text as data. Doing so, the book contributes
to the collaboration between empirical social scientific approaches
and the community of scientists that provide the set of tools and
methods to make sense of the fastest growing resource of our time:
data.
Today, social media have attracted the attention of political
actors and administrative institutions to inform citizens as a
prerequisite of open and transparent administration, deliver public
services, contact stakeholders, revitalize democracy, encourage the
cross-agency cooperation, and contribute to knowledge management.
In this context, the social media tools can contribute to the
emergence of citizen-oriented, open, transparent and participatory
public administration. Taking advantage of the opportunities
offered by social media is not limited to central government. Local
governments deploy internet-based innovative technologies that
complement traditional methods in implementing different functions.
This book focuses on the relationship between the local governments
and social media, deals with the change that social media have
caused in the organization, understanding of service provision,
performance of local governments and in the relationships between
local governments and their partners, and aims to advance our
theoretical and empirical understanding of the growing use of
social media by local governments. This book will be of interest to
researchers and students in e-government, public administration,
political science, communication, information science, and social
media. Government officials and public managers will also find
practical use recommendations for social media in several aspects
of local governance
Small and medium-sized enterprises (SMEs) are recognized as the
backbone of today's world economy. However, SMEs are well known for
having limitations and acceptance barriers in adopting new
technology even though the internet and communications channel's
revolution has changed the way people conduct business today.
Further, the COVID-19 pandemic has disturbed the operations of SMEs
and increased the burden on social media application globally. It
is essential that SMEs utilize social media to strengthen their
performance. Strengthening SME Performance Through Social Media
Adoption and Usage explores experiences in different technological,
managerial, organizational, and entrepreneurial environmental
issues. It focuses on different conceptions of factors and
consequences influencing social media usage and SME performance.
Covering topics such as corporate social responsibility, marketing
frameworks, and social media adoption, this premier reference
source is a valuable resource for entrepreneurs, business leaders
and managers, human resource managers, marketers, consultants,
students and educators of higher education, librarians,
researchers, and academicians.
Advances in computing, communications, and control have bridged the
physical components of reality and cyberspace leading to the smart
internet of things (IoT). The notion of IoT has extraordinary
significance for the future of several industrial domains. Hence,
it is expected that the complexity in the design of IoT
applications will continue to increase due to the integration of
several cyber components with physical and industrial systems. As a
result, several smart protocols and algorithms are needed to
communicate and exchange data between IoT devices. Smart Devices,
Applications, and Protocols for the IoT is a collection of
innovative research that explores new methods and techniques for
achieving reliable and efficient communication in recent
applications including machine learning, network optimization,
adaptive methods, and smart algorithms and protocols. While
highlighting topics including artificial intelligence, sensor
networks, and mobile network architectures, this book is ideally
designed for IT specialists and consultants, software engineers,
technology developers, academicians, researchers, and students
seeking current research on up-to-date technologies in smart
communications, protocols, and algorithms in IoT.
 |
Trust Management II
- Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
(Hardcover, 2008 ed.)
Yucel Karabulut, John C. Mitchell, Peter Herrmann, Christian Damsgaard Jensen
|
R2,859
Discovery Miles 28 590
|
Ships in 18 - 22 working days
|
|
|
This volume contains the proceedings of the IFIPTM 2008, the Joint
iTrust and PST Conferences on Privacy, Trust Management and
Security, held in Trondheim, Norway from June 18 to June 20, 2008.
IFIPTM 2008 provides a truly global platform for the reporting of
research, development, policy and practice in the interdependent
areas of Privacy, Security, and Trust. Following the traditions
inherited from the highly successful iTrust and PST conference
series, IFIPTM 2008 focuses on trust, privacy and security from
multidisciplinary perspectives. The conference is an arena for
discussion about re levant problems from both research and practice
in the areas of academia, busi ness, and government. IFIPTM 2008 is
an open IFIP conference, which only accepts contributed pa pers, so
all papers in these proceedings have passed strict peer review. The
pro gram of the conference features both theoretical research
papers and reports of real world case studies. IFIPTM 2008 received
62 submissions. The program commit tee selected 22 papers for
presentation and inclusion in the proceedings. In addi tion, the
program and the proceedings include 3 demo descriptions. The
highlights of IFIPTM 2008 include invited talks and tutorials by
industri al and academic experts in the fields of trust management,
privacy and security, including Jon Bing and Michael Steiner.
The proposed title intends to provide a comprehensive view of
emerging paradigms of computer science. The initial chapters will
introduce various emerging paradigms and discuss research
challenges related to them. Then some of the chapters will focus on
the research solutions to address the identified challenges. The
last few chapters will provide a discussion on future research
directions.
AI's impact on human societies is and will be drastic in so many
ways. AI is being adopted and implemented around the world, and
government and universities are investing in AI studies, research,
and development. However, very little research exists about the
impact of AI on our lives. This book will address this gap; it will
gather reflections from around the world to assess the impact of AI
on different aspects of society as well as propose ways in which we
can address this impact and the research agendas needed.
* Provides evidence, examples, and explanation of the developing
tactics-illustrated recently in politics in particular-of embedding
internal saboteurs bent on dismantling their own institutions from
within * Presents numerous case studies to examine instances of
insider compromises, including the circumstances and warning signs
that led to events * Outlines solutions on how to train
organizations and individuals on recognizing, reporting,
mitigating, and deterring insider threats
The EU strategy 2020 includes ambitious plans for e-regulation
that could improve Europe s competitiveness. However, the European
states have very different legal frameworks in this field. This
book introduces flagship initiatives and provides a detailed
overview and analysis of the current standards and latest
developments, offering practical insights and guidelines for
practitioners and policy-makers alike. Further, as it discusses the
main areas of e-regulation, it can serve as a useful platform for
university education in light of the growing need for new kinds of
specialists, i.e. IT lawyers. The book concentrates on fields that
are directly affected by e-regulation such as cyber-security,
databases, computer programs, e-governance, IP and competition law
and informatics."
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.
Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.
By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
|
You may like...
Facebook
Dana Kilroy
Fold-out book or chart
R229
Discovery Miles 2 290
Blockland
Elias Ahonen
Hardcover
R1,561
Discovery Miles 15 610
|