Browse Results

Showing 3,801 through 3,825 of 18,995 results

Cultures of Forgery: Making Nations, Making Selves (CultureWork: A Book Series from the Center for Literacy and Cultural Studies at Harvard)

by Judith Ryan Alfred Thomas

In Cultures of Forgery, leading literary studies and cultural studies scholars examine the double meaning of the word "forge"-to create or to form, on the one hand, and to make falsely, on the other.

Cultures, Politics, and Research Programs: An International Assessment of Practical Problems in Field Research (Routledge Communication Series)

by Uma Narula W. Barnett Pearce

A compilation of authoritative reports from seasoned researchers working in eight different countries on five continents, this volume examines the concept that conditions of local feasibility are constitutive of research practices not simply obstructions to the realization of an ideal. The result documents the effects of political and cultural factors on research projects and offers culturally sensitive researchers a wealth of practical knowledge.

Cupcakes and Kalashnikovs: 100 Years Of The Best Journalism By Women

by Naomi Wolf Eleanor Mills

Many female journalists came to the fore during the first and second world wars, and their perspective was very different to that of their male peers, who were reporting from the field. Specifically, they often wrote about war from the perspective of those left at home, struggling to keep the household afloat. And with 'How it feels to be forcibly fed' (1914) by Djuna Barnes, one of the world's very first experiential, or 'gonzo' journalists, came a new age of reporting.Since then, women have continued to break new ground in newspapers and magazines, redefining the world as we see it. Many of the pieces here feel almost unsettlingly relevant today -- the conclusions Emma 'Red' Goldman drew in her 1916 'The social aspects of birth control', Maddy Vegtel's 1930s article about becoming pregnant at 40, Eleanor Roosevelt's call for greater tolerance after America's race riots in 1943. Many have pushed other limits: Naomi Wolf's Beauty Myth brought feminism to a new generation; Helen Fielding's Bridget Jones caused a media revolution; Ruth Picardie's unflinchingly honest column about living with cancer in 1997 brought a wave of British candour and a host of imitators; and when two iconic women come face to face, we have at one end Dorothy Parker on Isadora Duncan (1928) and at the other Julie Burchill on Margaret Thatcher (2004). This collection of superlative writing, selected by the Sunday Times's most senior female editor, brings together the most influential, incisive, controversial, affecting and entertaining pieces of journalism by the best women in the business. Covering: War; Crime; Politics & Society; Sex & Romance; Body Image & Health; Family, Friendship & Birth; Emancipation & Having it All; Hearth & Home; Icons & Interviews. Including: Lynn Barber, Djuna Barnes, Julie Burchill, Angela Carter, Marie Colvin, Jilly Cooper, Joan Didion, Margaret Drabble, Helen Fielding, Zelda Fitzgerald, Kathryn Flett, Martha Gellhorn, Nicci Gerrard, Emma Goldman, Germaine Greer, Nicola Horlick, Erica Jong, Jamaica Kincaid, India Knight, Christina Lamb, Daphne du Maurier, Nancy Mitford, Suzanne Moore, Camille Paglia, Sylvia Pankhurst, Dorothy Parker, Allison Pearson, Ruth Picardie, Erin Pizzey, Eleanor Roosevelt, Zadie Smith, Susan Sontag, Gloria Steinem, Martha Stewart, Mary Stott, Jill Tweedie, Rebecca West, Zoe Williams, Jeanette Winterson, Naomi Wolf.

Cupcakes and Kalashnikovs: 100 years of the best Journalism by women

by Eleanor Mills

Many female journalists came to the fore during the first and second world wars, and their perspective was very different to that of their male peers, who were reporting from the field. Specifically, they often wrote about war from the perspective of those left at home, struggling to keep the household afloat. And with 'How it feels to be forcibly fed' (1914) by Djuna Barnes, one of the world's very first experiential, or 'gonzo' journalists, came a new age of reporting.Since then, women have continued to break new ground in newspapers and magazines, redefining the world as we see it. Many of the pieces here feel almost unsettlingly relevant today -- the conclusions Emma 'Red' Goldman drew in her 1916 'The social aspects of birth control', Maddy Vegtel's 1930s article about becoming pregnant at 40, Eleanor Roosevelt's call for greater tolerance after America's race riots in 1943. Many have pushed other limits: Naomi Wolf's Beauty Myth brought feminism to a new generation; Helen Fielding's Bridget Jones caused a media revolution; Ruth Picardie's unflinchingly honest column about living with cancer in 1997 brought a wave of British candour and a host of imitators; and when two iconic women come face to face, we have at one end Dorothy Parker on Isadora Duncan (1928) and at the other Julie Burchill on Margaret Thatcher (2004). This collection of superlative writing, selected by the Sunday Times's most senior female editor, brings together the most influential, incisive, controversial, affecting and entertaining pieces of journalism by the best women in the business. Covering: War; Crime; Politics & Society; Sex & Romance; Body Image & Health; Family, Friendship & Birth; Emancipation & Having it All; Hearth & Home; Icons & Interviews. Including: Lynn Barber, Djuna Barnes, Julie Burchill, Angela Carter, Marie Colvin, Jilly Cooper, Joan Didion, Margaret Drabble, Helen Fielding, Zelda Fitzgerald, Kathryn Flett, Martha Gellhorn, Nicci Gerrard, Emma Goldman, Germaine Greer, Nicola Horlick, Erica Jong, Jamaica Kincaid, India Knight, Christina Lamb, Daphne du Maurier, Nancy Mitford, Suzanne Moore, Camille Paglia, Sylvia Pankhurst, Dorothy Parker, Allison Pearson, Ruth Picardie, Erin Pizzey, Eleanor Roosevelt, Zadie Smith, Susan Sontag, Gloria Steinem, Martha Stewart, Mary Stott, Jill Tweedie, Rebecca West, Zoe Williams, Jeanette Winterson, Naomi Wolf.

Curious About Culture: Refocus your lens on culture to cultivate cross cultural understanding

by Gaiti Rabbani

Whether you are on a journey of self-reflection or wish to influence others, this definitive guide to cross-cultural engagement will help you to understand your own cultural narrative and better connect with people of other cultural backgrounds.Curious about Culture by Gaiti Rabbani invites readers on a journey of introspection to discover the multitude of cultural influences that shape their view of the world.Culture is not geographically bound. It is about more than just where you were born and where you live. Gender, generation and language, among other factors, all contribute to your cultural lens and how well you can connect with others.Improving cross-cultural engagement starts with understanding yourself. You will uncover your own cultural drivers that will help you cultivate meaningful cross-cultural conversations. We all have multiple facets to our identities and some of them are likely to be stigmatised. The author encourages readers to be curious and dive beyond the apparent cues when engaging across cultures, highlighting the pitfalls of drawing upon assumptions and defaulting to stereotypes.Anecdotes from the leading cultural intelligence specialist, Gaiti Rabbani's rich personal and professional experiences along with research-based insights, create a relatable, insightful and thought-provoking read. Whether you are on a journey of self-reflection or wish to influence others, this book will help you to understand your own cultural narrative and better connect with people of other cultural backgrounds.Curious about Culture is a practical reference for the enterprising and curious professional.

Current Issues in Political Marketing

by Jennifer Lees-Marshment Walter W Wymer Jr

Explore the increased need for marketing within the political arenaCurrent Issues in Political Marketing presents up-to-date theory and research findings from academics working in political science, advertising, and management, and guidance from successful practitioners who know what it takes to make a nonprofit organization stand out i

Current Issues in Stuttering Research and Practice

by Nan Bernstein Ratner John Tetnowski

This state-of-the art volume is a follow-up to the 1999 publication, Stuttering Research and Practice: Bridging the Gap, edited by Nan Ratner and E. Charles Healey. Like its predecessor, the current book is an edited collection of the presentations from the American Speech-Language-Hearing Association’s Annual Leadership Conference in Fluency and Fluency Disorders. Among the topics covered are evidence-based practice, impact of the self-help and support groups, meta-analyses of selected assessment and intervention programs, current theories of stuttering, and the predicted path of stuttering intervention in the future. The authoritative representation of contributors offers the reader the most up to date presentation of fluency issues, with a special emphasis placed on the practical clinical implications of fluency assessment, treatment, and evolving theories of the disorder. The book is written for fluency specialists and graduate students in programs of fluency disorders. It will also be valuable for the clinicians who wish to upgrade their skills in treating fluency disorders.

Current Trends in Communication and Information Technologies (Lecture Notes in Networks and Systems #212)

by Mykhailo Ilchenko Petro Vorobiyenko Iryna Strelkovska

This book highlights the most important research areas in Information and Communication Technologies as well as research in fields of telecommunication system characteristics at the physical level, deep discussion of telecommunication traffic and its performance indicators, studying of information systems technological parameters, review of public and special applications of information technologies. The book includes strictly selected results of the most interesting scientific research presented at the 10th International Conference “Infocommunications – Present and Future” (IPF’2020) that was held in Odesa, Ukraine. The respective chapters share in-depth and extended results in these areas with a view to resolving practically relevant and challenging issues including: 1. research of telecommunication system characteristics at the physical level: the discussion of various aspects of the signal transmission quality indicators analysis for solving practically important issues in telecommunication systems; 2. research of telecommunication traffic and its performance indicators: the significant aspects of research for forecasting of services characteristics of telecommunication systems; 3.research of information systems technological parameters: the discission of some effective technological solutions that can be used for the implementation of novel systems; 4. research of public and special applications of information technologies: the discussion of the various aspects of scientific and educational applications, etc. These results can be used in the implementation of novel systems and to promote the exchange of information in e-societies. Given its scope, the book offers a valuable resource for scientists, lecturers, specialists working at enterprises, graduate and undergraduate students who engage with problems in Information and Communication Technologies as well as Radio Electronics.

Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media

by Tarleton Gillespie

A revealing and gripping investigation into how social media platforms police what we post online—and the large societal impact of these decisions Most users want their Twitter feed, Facebook page, and YouTube comments to be free of harassment and porn. Whether faced with “fake news” or livestreamed violence, “content moderators”—who censor or promote user†‘posted content—have never been more important. This is especially true when the tools that social media platforms use to curb trolling, ban hate speech, and censor pornography can also silence the speech you need to hear. In this revealing and nuanced exploration, award†‘winning sociologist and cultural observer Tarleton Gillespie provides an overview of current social media practices and explains the underlying rationales for how, when, and why these policies are enforced. In doing so, Gillespie highlights that content moderation receives too little public scrutiny even as it is shapes social norms and creates consequences for public discourse, cultural production, and the fabric of society. Based on interviews with content moderators, creators, and consumers, this accessible, timely book is a must†‘read for anyone who’s ever clicked “like” or “retweet.”

Customer Engagement Marketing

by V. Kumar Robert W. Palmatier Colleen M. Harmeling

This book provides a synthesis of research perspectives on customer engagement through a collection of chapters from thought leaders. It identifies cutting-edge metrics for capturing and measuring customer engagement and highlights best practices in implementing customer engagement marketing strategies. Responding to the rapidly changing business landscape where consumers are more connected, accessible, and informed than ever before, many firms are investing in customer engagement marketing. The book will appeal to academics, practitioners, consultants, and managers looking to improve customer engagement.

Customer Is King: How to Exceed Their Expectations

by Robert Craven

Updated eBook editionWhat happens to your customers when you do business with them? Customer is King helps you to approach the problem from the point of view of the clients and work towards the level of customer satisfaction that makes them come back to you again and again.Practical and packed full of easy-to-understand advice, you'll find:* checklists and worksheets* case studies of real businesses* frequently asked questions

Customer Service Over the Phone: Techniques and Technology for Handling Customers Over the Phone

by Stephen Coscia

Exceptional customer service is crucial to a successful phone-based business. Quality service can secure customer loyalty, while poor service can lose it. This concise guide examines various important scenarios that a customer service representative is likely to encounter and shows how to best handle each situation. This guide also explains how to make effective use of voice mail, email, fax, and letters.

Cutting Edge PowerPoint 2007 For Dummies

by Geetesh Bajaj

Get ready to add punch and pizzazz to your presentations and wow your audience using the latest PowerPoint techniques. This friendly book/CD-ROM combo covers all of the new features of Microsoft PowerPoint 2007, including interface changes, presentation themes, multimedia, the Slide Library, and more. The guide introduces you to the elements of PowerPoint: text; background, images, and info-graphics; shapes; fills, lines, and effects; sound and video; animations and transitions; and interactivity, flow, and navigation. Packed with numerous tips, shortcuts, workarounds, and timesaving techniques, it shows you step-by-step how to:Dress up your text by using fonts creatively and using WordArt to create artistic effectsWork with masters and layouts, templates and themes, and fills, lines, and effectsMaximize visual appeal by combining Photoshop with PowerPointAdd transitions, photos, motion, sound (narration and music), video, and animationUse SmartArt to create diagramsCreate dynamic charts, equations, maps, and moreUse PowerPoint's extensive clip art collectionTest and set up your presentationLink to Flash, Acrobat, Word, and ExcelPrint presentation materials and create helpful handoutsThe CD includes templates, textures, backgrounds, background music scores, images, alpha channel equipped graphics, maps, illustrations, and more, so this combo gives you the know-how and the tools. An 8-page color insert shows you how to use color effectively. With this friendly guide, you're ready to bring your presentation to life with PowerPoint 2007.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Cutting the Cost of Confusion: Eliminate the High Price of Failure to Communicate

by Richard A. Layton

Confusion is more than just another daily inconvenience, though its impacts are often hidden in metrics such as market share, productivity, and ROI. This book shows how to identify and eliminate the Cost of Confusion in workplaces, marketplaces, and communities. Cutting that cost demands the ability to distill, integrate, and synthesize ever more complex information from a broad range of perspectives and disciplines. Any gaps in understanding can and do negatively impact performance. Based on Richard Layton’s 20 years of experience helping organizations to be heard and understood, this book offers a powerful universal lens to view the costly impacts of confusion, and provides a framework to identify and manage the risk of failure to communicate with a range of stakeholders and audiences – and save millions of dollars in the process. Decision-makers, practitioners, and students in marketing and advertising, organizational development, knowledge management, information technology, project management, and other fields will appreciate this unique set of insights and tools they can employ to great effect within their companies, organizations, and public institutions.

Cutting the Cost of Confusion: Eliminate the High Price of Failure to Communicate

by Richard Layton

Confusion is more than just another daily inconvenience, though its impacts are often hidden in metrics such as market share, productivity, and ROI. This book shows how to identify and eliminate the Cost of Confusion in workplaces, marketplaces, and communities.Cutting that cost demands the ability to distill, integrate, and synthesize ever more complex information from a broad range of perspectives and disciplines. Any gaps in understanding can and do negatively impact performance. Based on Richard Layton’s 20 years of experience helping organizations to be heard and understood, this book offers a powerful universal lens to view the costly impacts of confusion, and provides a framework to identify and manage the risk of failure to communicate with a range of stakeholders and audiences – and save millions of dollars in the process. Decision-makers, practitioners, and students in marketing and advertising, organizational development, knowledge management, information technology, project management, and other fields will appreciate this unique set of insights and tools they can employ to great effect within their companies, organizations, and public institutions.

Cyber Malware: Offensive and Defensive Systems (Security Informatics and Law Enforcement)

by Leandros A. Maglaras Iman Almomani Mohamed Amine Ferrag Nick Ayres

This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.

Cyber Physical System 2.0: Communication and Computational Technologies

by Bhargav Appasani Amitkumar Vidyakant Jha

The book covers the emerging communication and computational technologies for future cyber-physical systems and discusses the security of in-vehicle communication protocols using automotive embedded systems, presenting an in-depth analysis across various domains, such as manufacturing, transportation, health-care, and smart cities.This book: Discusses how communication and computing co-design provides dynamic adaptability and centralized control. Presents the convergence of physical and digital realities within the metaverse and multiverse, setting the stage for the future of cyber-physical-social systems (CPSS). Presents emerging communication and computational technologies, such as 6G, software-defined networking, cloud computing, blockchain, artificial intelligence, machine learning, virtual reality, and blockchain, for the design and implementation of cyber-physical systems. Explores advanced topics such as security and privacy in industrial CPS, strategies for protecting serial industrial networks, and enhancing firmware update security in automotive systems. It is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer science and engineering, and information technology.

Cyber Physical, Computer and Automation System: A Study of New Technologies (Advances in Intelligent Systems and Computing #1291)

by Endra Joelianto Arjon Turnip Augie Widyotriatmo

This book is a collection of extended papers presented at the Cyber Physical, Computer and Automation System (CPCAS 2019), Bali – Indonesia, 13–15 November 2019. The book includes chapters in three prime areas: (1) autonomous systems and controls; (2) human–machine interaction and human-related engineering; and (3) interconnected things. Autonomous systems and controls are systems of engineering that work with or without human intervention. Human–machine interaction involves sensor and actuator technology to detect human behavior, intentions, and decisions and also to provide the ability of a machine to interact with humans to achieve the expected performance. Interconnected things consist of a network of computer-controlled physical mechanisms communicating with each other for efficient operation and improving system capabilities.

Cyber Security

by John G. Voeller

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Lecture Notes in Computer Science #10332)

by Shlomi Dolev Sachin Lodha

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.

Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (Lecture Notes on Data Engineering and Communications Technologies #73)

by Vania Vieira Estrela Kavita Khanna Joel José Puga Coelho Rodrigues

This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3–4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.

Cyber Security and Digital Forensics: Select Proceedings of the International Conference, ReDCySec 2023 (Lecture Notes in Networks and Systems #896)

by Usha Batra Nihar Ranjan Roy Sudeep Tanwar

The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023. This volume focuses on privacy and secrecy of information, cryptography, applications and analysis, cyber threat intelligence and mitigation, cyber-physical systems, cyber threat intelligence, quantum cryptography and blockchain technologies and their application, etc. This book is a unique collection of chapters from different areas with a common theme and will be immensely useful to academic researchers and practitioners in the industry.

Cyber Security and Intelligent Systems: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 1 (Lecture Notes in Networks and Systems #1056)

by Vikrant Bhateja Hong Lin Harish Garg Milan Simic Muhammad Attique Khan

This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.

Cyber Security in India: Education, Research and Training (IITK Directions #4)

by Sandeep Kumar Shukla Manindra Agrawal

This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur's Computer Science and Engineering Department established an ‘Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3I Center)’ in 2016 with funding from the Science and Engineering Research Board (SERB), and other funding agencies. The work at the center focuses on smart grid security, manufacturing and other industrial control system security; network, web and data security; cryptography, and penetration techniques. The founders are involved with various Indian government agencies including the Reserve Bank of India, National Critical Information Infrastructure Protection Center, UIDAI, CCTNS under home ministry, Ministry of IT and Electronics, and Department of Science & Technology. The center also testifies to the parliamentary standing committee on cyber security, and has been working with the National Cyber Security Coordinator's office in India. Providing glimpses of the work done at IIT Kanpur, and including perspectives from other Indian institutes where work on cyber security is starting to take shape, the book is a valuable resource for researchers and professionals, as well as educationists and policymakers.

Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 (Lecture Notes in Networks and Systems #370)

by Gregorio Martinez Perez Nadia Nedjah Dharma P. Agrawal B. B. Gupta

This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.

Refine Search

Showing 3,801 through 3,825 of 18,995 results