![]() |
![]() |
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it poses. The RFID Handbook provides an overview of RFID technology, its associated security and privacy risks, and recommended practices that will enable organizations to realize productivity improvements while also protecting sensitive information and the privacy of individuals. Expert contributors present a host of applications including RFID enabled automated receiving, triage with RFID for massive incidents, RFID and NFC in relation to mobile phones, and RFID technologies for communication robots and a privacy preserving video surveillance system. The unprecedented coverage also includes detailed descriptions of adaptive splitting protocols as well as tree-based and probabilistic anti-collision protocols. Drawing on its distinguished editors and world-renowned contributors, this one-of-a-kind handbook serves as the ultimate reference on RFID, from basic research concepts to future applications.
This book shows how the grand aspiration of creating a Technology for Humanity can be practically achieved. Value-based Engineering helps embedding values into technology design and corporate business structures. Thriving on the knowledge created by over 100 experts in the IEEE 7000TM standardization project, Value-based Engineering gets the best out of 21st century technology while avoiding many tech-induced social dilemmas.
Explaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains. The book explores the latest thinking on computer ethics, including the normative ethical theories currently shaping the debate over the good and bad consequences of technology. It begins by making the case as to why IT professionals, managers, and engineers must consider the ethical issues when designing IT systems, and then uses a recognized system development process model as the structural baseline for subsequent chapters. For each system development phase, the author discusses: the ethical issues that must be considered, who must consider them, and how that thought process can be most productive. In this way, an 'Ethical SDLC' (System Development Life Cycle) is created. The book presents an extensive case study that applies the "Ethical SDLC" to the example of privacy protection in RFID enabled environments. It explains how privacy can be built into systems and illustrates how ethical decisions can be consciously made at each stage of development. The final chapter revisits the old debate of engineers' ethical accountability as well as the role of management. Explaining the normative theories of computer ethics, the book explores the ethical accountability of developers as well as stakeholders. It also provides questions at the end of each chapter that examine the ethical dimensions of the various development activities.
|
![]() ![]() You may like...
Indentured - Behind The Scenes At Gupta…
Rajesh Sundaram
Paperback
![]()
Remembering and Forgetting in the Age of…
Michelle D. Miller
Hardcover
R2,892
Discovery Miles 28 920
|