|
|
Books > Computing & IT > Social & legal aspects of computing > General
Africa 2.0 provides an important history of how two technologies -
mobile calling and internet - were made available to millions of
sub-Saharan Africans, and the impact they have had on their lives.
The book deals with the political challenges of liberalisation and
privatisation that needed to be in place in order for these
technologies to be built. It analyses how the mobile phone
fundamentally changed communications in sub-Saharan Africa and the
ways Africans have made these technologies part of their lives,
opening up a very different future. The book offers a critical
examination of the impact these technologies have had on
development practices, and the key role development actors played
in accelerating regulatory reform, fibre roll-out and mobile money.
Southwood shows how corruption in the industry is a prism through
which patronage relationships in government can be understood, and
argues that the arrival of a start-up ecosystem in the region has
the potential to change this. A vital overview of the changes of
the last three decades, Africa 2.0 examines the transformative
effects of mobile and internet technologies, and the very different
future they have opened out for sub-Saharan Africa. -- .
What opportunities do digital technologies present? How do
developments in digital media support scholarship and teaching yet
further social justice? Written by two experts in the field, this
accessible book is the first to look at scholarly practice in the
digital era and consider how it can connect academics, journalists
and activists in ways that foster transformation on issues of
social justice. The terra firma of scholarly practice is changing.
This book offers both a road map and a vision of what being a
scholar can be when reimagined in the digital era to enliven the
public good, as it discusses digital innovations in higher
education as well as reflecting upon what these mean in an age of
austerity. It is ideal for students and academics working in any
field of humanities or social sciences with a social justice focus.
This book introduces new trends of theory and practice of
information technologies in tourism. The book does not handle only
the fundamental contribution, but also discusses innovative and
emerging technologies to promote and develop new generation tourism
informatics theory and their applications. Some chapters are
concerned with data analysis, web technologies, social media and
their case studies. Travel information on the web provided by
travelers is very useful for other travelers make their travel
plan. A chapter in this book proposes a method for interactive
retrieval of information on accommodation facilities to support
travelling customers in their travel preparations. Also an adaptive
user interface for personalized transportation guidance system is
proposed. Another chapter in this book shows a novel support system
for the collaborative tourism planning by using the case reports
that are collected via Internet. Also, a system for recommending
hotels for the users is proposed and evaluated. Other chapters are
concerned with recommendation, personalization and other emerging
technologies.
Unique selling point: Exploration of the societal and ethical
issues surrounding the use and development of digital technology
Core audience: IT managers and executives; academic researchers;
students of IT Place in the market: Professional title with appeal
to academics and students
This book deals with the theoretical, methodological, and empirical
implications of bounded rationality in the operation of
institutions. It focuses on decisions made under uncertainty, and
presents a reliable strategy of knowledge acquisition for the
design and implementation of decision-support systems. Based on the
distinction between the inner and outer environment of decisions,
the book explores both the cognitive mechanisms at work when actors
decide, and the institutional mechanisms existing among and within
organizations that make decisions fairly predictable. While a great
deal of work has been done on how organizations act as patterns of
events for (boundedly) rational decisions, less effort has been
devoted to study under which circumstances organizations cease to
act as such reliable mechanisms. Through an empirical strategy on
open-ended response data from a survey among junior judges, the
work pursues two main goals. The first one is to explore the limits
of "institutional rationality" of the Spanish lower courts on-call
service, an optimal scenario to observe decision-making under
uncertainty. The second aim is to achieve a better understanding of
the kind of uncertainty under which inexperienced decision-makers
work. This entails exploring the demands imposed by problems and
the knowledge needed to deal with them, making this book also a
study on expertise achievement in institutional environments. This
book combines standard multivariate statistical methods with
machine learning techniques such as multidimensional scaling and
topic models, treating text as data. Doing so, the book contributes
to the collaboration between empirical social scientific approaches
and the community of scientists that provide the set of tools and
methods to make sense of the fastest growing resource of our time:
data.
Today, social media have attracted the attention of political
actors and administrative institutions to inform citizens as a
prerequisite of open and transparent administration, deliver public
services, contact stakeholders, revitalize democracy, encourage the
cross-agency cooperation, and contribute to knowledge management.
In this context, the social media tools can contribute to the
emergence of citizen-oriented, open, transparent and participatory
public administration. Taking advantage of the opportunities
offered by social media is not limited to central government. Local
governments deploy internet-based innovative technologies that
complement traditional methods in implementing different functions.
This book focuses on the relationship between the local governments
and social media, deals with the change that social media have
caused in the organization, understanding of service provision,
performance of local governments and in the relationships between
local governments and their partners, and aims to advance our
theoretical and empirical understanding of the growing use of
social media by local governments. This book will be of interest to
researchers and students in e-government, public administration,
political science, communication, information science, and social
media. Government officials and public managers will also find
practical use recommendations for social media in several aspects
of local governance
Small and medium-sized enterprises (SMEs) are recognized as the
backbone of today's world economy. However, SMEs are well known for
having limitations and acceptance barriers in adopting new
technology even though the internet and communications channel's
revolution has changed the way people conduct business today.
Further, the COVID-19 pandemic has disturbed the operations of SMEs
and increased the burden on social media application globally. It
is essential that SMEs utilize social media to strengthen their
performance. Strengthening SME Performance Through Social Media
Adoption and Usage explores experiences in different technological,
managerial, organizational, and entrepreneurial environmental
issues. It focuses on different conceptions of factors and
consequences influencing social media usage and SME performance.
Covering topics such as corporate social responsibility, marketing
frameworks, and social media adoption, this premier reference
source is a valuable resource for entrepreneurs, business leaders
and managers, human resource managers, marketers, consultants,
students and educators of higher education, librarians,
researchers, and academicians.
Advances in computing, communications, and control have bridged the
physical components of reality and cyberspace leading to the smart
internet of things (IoT). The notion of IoT has extraordinary
significance for the future of several industrial domains. Hence,
it is expected that the complexity in the design of IoT
applications will continue to increase due to the integration of
several cyber components with physical and industrial systems. As a
result, several smart protocols and algorithms are needed to
communicate and exchange data between IoT devices. Smart Devices,
Applications, and Protocols for the IoT is a collection of
innovative research that explores new methods and techniques for
achieving reliable and efficient communication in recent
applications including machine learning, network optimization,
adaptive methods, and smart algorithms and protocols. While
highlighting topics including artificial intelligence, sensor
networks, and mobile network architectures, this book is ideally
designed for IT specialists and consultants, software engineers,
technology developers, academicians, researchers, and students
seeking current research on up-to-date technologies in smart
communications, protocols, and algorithms in IoT.
What do philosophy and computer science have in common? It turns
out, quite a lot! In providing an introduction to computer science
(using Python), Daniel Lim presents in this book key philosophical
issues, ranging from external world skepticism to the existence of
God to the problem of induction. These issues, and others, are
introduced through the use of critical computational concepts,
ranging from image manipulation to recursive programming to
elementary machine learning techniques. In illuminating some of the
overlapping conceptual spaces of computer science and philosophy,
Lim teaches the reader fundamental programming skills and also
allows her to develop the critical thinking skills essential for
examining some of the enduring questions of philosophy. Key
Features Teaches readers actual computer programming, not merely
ideas about computers Includes fun programming projects (like
digital image manipulation and Game of Life simulation), allowing
the reader to develop the ability to write larger computer programs
that require decomposition, abstraction, and algorithmic thinking
Uses computational concepts to introduce, clarify, and develop a
variety of philosophical issues Covers various aspects of machine
learning and relates them to philosophical issues involving science
and induction as well as to ethical issues Provides a framework to
critically analyze arguments in classic and contemporary
philosophical debates
 |
Trust Management II
- Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
(Hardcover, 2008 ed.)
Yucel Karabulut, John C. Mitchell, Peter Herrmann, Christian Damsgaard Jensen
|
R2,859
Discovery Miles 28 590
|
Ships in 18 - 22 working days
|
|
|
This volume contains the proceedings of the IFIPTM 2008, the Joint
iTrust and PST Conferences on Privacy, Trust Management and
Security, held in Trondheim, Norway from June 18 to June 20, 2008.
IFIPTM 2008 provides a truly global platform for the reporting of
research, development, policy and practice in the interdependent
areas of Privacy, Security, and Trust. Following the traditions
inherited from the highly successful iTrust and PST conference
series, IFIPTM 2008 focuses on trust, privacy and security from
multidisciplinary perspectives. The conference is an arena for
discussion about re levant problems from both research and practice
in the areas of academia, busi ness, and government. IFIPTM 2008 is
an open IFIP conference, which only accepts contributed pa pers, so
all papers in these proceedings have passed strict peer review. The
pro gram of the conference features both theoretical research
papers and reports of real world case studies. IFIPTM 2008 received
62 submissions. The program commit tee selected 22 papers for
presentation and inclusion in the proceedings. In addi tion, the
program and the proceedings include 3 demo descriptions. The
highlights of IFIPTM 2008 include invited talks and tutorials by
industri al and academic experts in the fields of trust management,
privacy and security, including Jon Bing and Michael Steiner.
The EU strategy 2020 includes ambitious plans for e-regulation
that could improve Europe s competitiveness. However, the European
states have very different legal frameworks in this field. This
book introduces flagship initiatives and provides a detailed
overview and analysis of the current standards and latest
developments, offering practical insights and guidelines for
practitioners and policy-makers alike. Further, as it discusses the
main areas of e-regulation, it can serve as a useful platform for
university education in light of the growing need for new kinds of
specialists, i.e. IT lawyers. The book concentrates on fields that
are directly affected by e-regulation such as cyber-security,
databases, computer programs, e-governance, IP and competition law
and informatics."
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.
Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.
By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
|
|