|
Showing 1 - 4 of
4 matches in All Departments
The past decade has witnessed a leap in the cyber revolution around
the world. Significant progress has been made across a broad
spectrum of terminologies used in the cyber world. Various threats
have also emerged due to this cyber revolution that requires far
greater security measures than ever before. In order to adapt to
this evolution effectively and efficiently, it calls for a better
understanding of the ways in which we are ready to embrace this
change. Advances in Cyberology and the Advent of the Next-Gen
Information Revolution creates awareness of the information threats
that these technologies play on personal, societal, business, and
governmental levels. It discusses the development of information
and communication technologies (ICT), their connection with the
cyber revolution, and the impact that they have on every facet of
human life. Covering topics such as cloud computing, deepfake
technology, and social networking, this premier reference source is
an ideal resource for security professionals, IT managers,
administrators, students and educators of higher education,
librarians, researchers, and academicians.
The past decade has witnessed a leap in the cyber revolution around
the world. Significant progress has been made across a broad
spectrum of terminologies used in the cyber world. Various threats
have also emerged due to this cyber revolution that requires far
greater security measures than ever before. In order to adapt to
this evolution effectively and efficiently, it calls for a better
understanding of the ways in which we are ready to embrace this
change. Advances in Cyberology and the Advent of the Next-Gen
Information Revolution creates awareness of the information threats
that these technologies play on personal, societal, business, and
governmental levels. It discusses the development of information
and communication technologies (ICT), their connection with the
cyber revolution, and the impact that they have on every facet of
human life. Covering topics such as cloud computing, deepfake
technology, and social networking, this premier reference source is
an ideal resource for security professionals, IT managers,
administrators, students and educators of higher education,
librarians, researchers, and academicians.
With the development of technology, software is becoming critical
for the success of many large systems. There are many risks
involved in creating high quality software on time and within
budget. The success of software product, both functionally and
financially is directly related to the quality of the requirements.
Software requirement risk addresses the possibility of suffering a
loss of any functional or non-functional requirement of the system.
It refers to the uncertainties caused by differences between the
requirements perceived by developers and user groups' expectation
of the system. Requirement risk can lower project performance
therefore effective management of it is critical to achieve desired
project performance. In our research work a Requirement Risk
Prioritization Model (RRPM) has been proposed. Implementation of
inspection technique is done to identify the key requirement risk
factors responsible in achieving successful outcome and use a
Bayesian network approach to prioritize the requirement risks that
leads to fail a software project. These Results can be used to
compute the overall risk metric associated with a project.
Human development aims at enlarging people's choices. By people it
is meant that both males and females are given the opportunities to
enhance their capabilities. In the usual systems of national
accounting, the economic contribution of men is majorly considered
in the form of activities performed for an exchange price in the
market. Such activities are measurable in terms of money for the
productive services rendered by labour. However, women perform
activities in the household that require the same or sometimes even
more labour efforts as men require outside the house. But due to
lack of the recognition and measurability imparted to such
activities, they remain outside the ambit of the economic
activities. This book is an attempt to highlight the importance of
valuing women's work that is largely unpaid and unrecognised. An
effort has been made to examine data related to the participation
of women in different activities. This is required to know the
nature of activities that include the involvement of women. A major
observation form such data reveals trends that are quite a
departure from the usually held beliefs.
|
|