Browse Results

Showing 101 through 125 of 60,509 results

The 2013 Legal Technology Guide Solo and Small Firm

by Sharon D. Nelson John W. Simek Michael C. Maschke

This annual guide is the only one of its kind written to help solo and small firm lawyers find the best technology for their dollar. You'll find the most current information and recommendations on computers, servers, networking equipment, legal software, printers, security products, smartphones, the iPad and anything else a law office might need. It's written in clear, easily understandable language to make implementation easier if you choose to do it yourself, or you can use it in conjunction with your IT consultant. Either way, you'll learn how to make technology work for you

The 2018 Yearbook of the Digital Ethics Lab (Digital Ethics Lab Yearbook #1)

by Carl Öhman David Watson

This book explores a wide range of topics in digital ethics. It features 11 chapters that analyze the opportunities and the ethical challenges posed by digital innovation, delineate new approaches to solve them, and offer concrete guidance to harness the potential for good of digital technologies. The contributors are all members of the Digital Ethics Lab (the DELab), a research environment that draws on a wide range of academic traditions.The chapters highlight the inherently multidisciplinary nature of the subject, which cannot be separated from the epistemological foundations of the technologies themselves or the political implications of the requisite reforms. Coverage illustrates the importance of expert knowledge in the project of designing new reforms and political systems for the digital age. The contributions also show how this task requires a deep self-understanding of who we are as individuals and as a species.The questions raised here have ancient -- perhaps even timeless -- roots. The phenomena they address may be new. But, the contributors examine the fundamental concepts that undergird them: good and evil, justice and truth. Indeed, every epoch has its great challenges. The role of philosophy must be to redefine the meaning of these concepts in light of the particular challenges it faces. This is true also for the digital age. This book takes an important step towards redefining and re-implementing fundamental ethical concepts to this new era.

The 2019 Yearbook of the Digital Ethics Lab (Digital Ethics Lab Yearbook)

by Christopher Burr Silvia Milano

This edited volume presents an overview of cutting-edge research areas within digital ethics as defined by the Digital Ethics Lab of the University of Oxford. It identifies new challenges and opportunities of influence in setting the research agenda in the field.The yearbook presents research on the following topics: conceptual metaphor theory, cybersecurity governance, cyber conflicts, anthropomorphism in AI, digital technologies for mental healthcare, data ethics in the asylum process, AI’s legitimacy and democratic deficit, digital afterlife industry, automatic prayer bots, foresight analysis and the future of AI. This volume appeals to students, researchers and professionals.

2020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2020) (Advances in Intelligent Systems and Computing #1244)

by Jemal H. Abawajy Kim-Kwang Raymond Choo Zheng Xu Mohammed Atiquzzaman

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems: DPTA 2020 (Advances in Intelligent Systems and Computing #1379)

by Chuanchao Huang Yu-Wei Chan Neil Yen

This book covers cutting-edge and advanced research on data processing techniques and applications for cyber-physical systems, gathering the proceedings of the International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2020), held in Laibin City, Guangxi Province, China, on December 11–12, 2020. It examines a wide range of topics, including distributed processing for sensor data in CPS networks; approximate reasoning and pattern recognition for CPS networks; data platforms for efficient integration with CPS networks; machine learning algorithms for CPS networks; and data security and privacy in CPS networks. Outlining promising future research directions, the book offers a valuable resource for students, researchers, and professionals alike, while also providing a useful reference guide for newcomers to the field.

The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2020, Volume 1 (Advances in Intelligent Systems and Computing #1282)

by John MacIntyre Jinghua Zhao Xiaomeng Ma

This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020 conference was held online by Tencent Meeting. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.

The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2020, Volume 2 (Advances in Intelligent Systems and Computing #1283)

by John MacIntyre Jinghua Zhao Xiaomeng Ma

This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020 conference was held online by Tencent Meeting. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.

2020 Vision: Turbocharge Your Business Today to Thrive in Tomorrow's Economy

by Stan Davis Bill Davidson

Information management and biotechnology are reshaping the basic structure of American enterprise. In this bold and innovative analysis, Davis and Davidson explain what these changes mean and how entrepreneurs and executives can prepare challenges of tomorrow.

2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 1 (Advances in Intelligent Systems and Computing #1398)

by Jemal Abawajy Zheng Xu Mohammed Atiquzzaman Xiaolu Zhang

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #81)

by Jemal Abawajy Zheng Xu Mohammed Atiquzzaman Xiaolu Zhang

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users. 1. Highlights recent applications and techniques in cyber intelligence2. Includes the proceedings of the 2021 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2021) 3. Presents a broad range of scientific research on cyber intelligence

2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #102)

by Mohammed Atiquzzaman Neil Yen Zheng Xu

This book gathers a selection of peer-reviewed papers presented at the third Big Data Analytics for Cyber-Physical System in Smart City (BDCPS 2021) conference, held in Shanghai, China, on Nov. 27, 2021. The contributions, prepared by an international team of scientists and engineers, cover the latest advances made in the field of machine learning, and big data analytics methods and approaches for the data-driven co-design of communication, computing, and control for smart cities. Given its scope, it offers a valuable resource for all researchers and professionals interested in big data, smart cities, and cyber-physical systems.

2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #103)

by Mohammed Atiquzzaman Neil Yen Zheng Xu

This book gathers a selection of peer-reviewed papers presented at the third Big Data Analytics for Cyber-Physical System in Smart City (BDCPS 2021) conference, held in Shanghai, China, on Nov. 27, 2021. The contributions, prepared by an international team of scientists and engineers, cover the latest advances made in the field of machine learning, and big data analytics methods and approaches for the data-driven co-design of communication, computing, and control for smart cities. Given its scope, it offers a valuable resource for all researchers and professionals interested in big data, smart cities, and cyber-physical systems.

The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2021 Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #97)

by John Macintyre Jinghua Zhao Xiaomeng Ma

This book presents the proceedings of the 2020 2nd International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), online conference, on 30 October 2021. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.

The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2021 Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #98)

by John Macintyre Jinghua Zhao Xiaomeng Ma

This book presents the proceedings of the 2020 2nd International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), online conference, on 30 October 2021. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.

2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (Smart Innovation, Systems and Technologies #314)

by George A. Tsihrintzis Shiuh-Jeng Wang Iuon-Chang Lin

This book aims to attract researchers and practitioners who are working in information technology and computer science. This edited book is about basics and high-level concepts regarding blockchain technology and application, multimedia security, information processing, security of network, cloud and IoT, cryptography and information hiding, cyber-security and evidence investigations, and learning and intelligent computing. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure, and privacy-aware mechanisms in high-performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security-related areas. We believe that this book not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas.

2023 4th International Conference on E-Commerce and Internet Technology (Atlantis Highlights in Engineering #18)

by Vilas Gaikar Bijay Kumar Kandel Hrushikesh Mallick

This is an open access book.E-commerce is a commercial activity centered on commodity exchange by means of information network technology. In the open network environment of the Internet, based on the client/server application method, buyers and sellers carry out various commercial activities online, realizing online shopping for consumers, online transactions between merchants and online electronic payment, as well as various business activities, trading activities, financial activities and related comprehensive service activities of a new business operation mode. It is the electronicization, networking and informatization of all aspects of traditional business activities.Internet technology is the prerequisite for e-commerce to be realized. The development and popularization of Internet technology has also played a positive role in promoting the development of e-commerce. Internet technology is a double-edged sword, with advantages and disadvantages, since it can promote the development of e-commerce, it may also affect its normal construction, such as the existence of theft of information, tampering with information, counterfeiting, malicious damage and other security risks, but also through the firewall technology, data encryption technology, authentication technology, digital signature technology and other technologies to regulate the transaction process.Therefore, the influence of the two is mutual, and only through continuous friction can we continuously promote the development of both sides in a benign direction.ECIT 2023 provides a platform in order toCreate a forum for sharing, research and exchange at the international level, so that participants can be informed of the latest research directions, results and contents of applied Internet technologies on e-commerce, thus stimulating them to generate new research ideas.Promote the development of e-commerce by studying its problems.To open up new perspectives, broaden horizons and examine the issues under discussion by the participants.Each accepted article requires at least one author to attend the meeting and present it.

The 2024 Presidential Campaign: A Communication Perspective

by Robert E. Denton Jr.

A comprehensive communication analysis of the 2024 presidential campaign Presidential campaigns are more than elections, they are cultural touchstones that shape national identity and political discourse. The 2024 presidential campaign was a defining moment in American history, marked by political polarization and cultural turns. In The 2024 Presidential Campaign: A Communication Perspective Robert E. Denton, Jr. and a team of esteemed scholars offer an incisive look at the strategies, narratives, and media that influenced this landmark election. Examining all key areas of the 2024 election through the lens of communication, this timely volume delves into critical facets of campaign messaging, including political advertising and established news media. Discussions of recent developments such as AI-generated content and the expansion of alternative media provide a deeper understanding of how rapid technological advancement impacts both presidential campaigns and American democracy. Each chapter provides unique insights, connecting communication theory to real-world electoral phenomena. Presents in-depth analyses of televised debates, social media strategies, and advertising Explores the use of humor in computer-generated images and political cartoons Includes chapters on candidate branding and political party conventions Addresses the impact of campaign finance on electoral outcomes Offers the latest insights into digital and mediated campaign practices Provides a unique perspective on cultural and generational shifts in U.S. politics The 2024 Presidential Campaign: A Communication Perspective is essential reading for scholars and students in Political Science, Journalism, and Communication, particularly those studying presidential campaigns, media and politics, and the presidency. Ideal for upper-level undergraduate and graduate courses, it is also a valuable resource for professionals in political campaign management.

2030 - Strategieentwicklung für Innovation Leaders: Mit Handlungsanweisungen unter Einbezug neuester Methoden der Datennutzung

by Philipp Futterknecht Tobias Hertfelder

Seit der Relativitätstheorie wissen wir, dass massereiche Objekte durch ihre Gravitation Dinge anziehen. Je größer die Masse desto größer ist auch die Anziehungskraft. Genauso verhält es sich auch in Strategieprojekten. Jeder Projektteilnehmer ist dabei ein massereicher Teilnehmer und hat Auswirkungen auf das Zusammenspiel. Was sich gravierend geändert hat ist der Einfluss der Daten auf diesen Prozess. Wer dies nicht berücksichtigt, wird in Zukunft enorme Einbußen hinnehmen müssen. Da sich durch diese Veränderung ein neues Gleichgewicht einstellt, ändern sich auch die Erfolgsaussichten der angewandten Methoden und Verhaltensweisen. Wie Sie diesen Wandel meistern können und was Sie dazu benötigen erfahren Sie in diesem Buch.

2084 and the AI Revolution, Updated and Expanded Edition: How Artificial Intelligence Informs Our Future

by John C. Lennox

Will technology change what it means to be human??You don't have to be a computer scientist to have discerning conversations about artificial intelligence and technology. We all wonder where we're headed. Even now, technological innovations and machine learning have a daily impact on our lives, and many of us see good reasons to dread the future. Are we doomed to the surveillance society imagined in George Orwell's 1984??Mathematician and philosopher John Lennox believes that there are credible responses to the daunting questions that AI poses, and he shows that Christianity has some very serious, sensible, evidence-based things to say about the nature of our quest for superintelligence.This newly updated and expanded edition of 2084 will introduce you to a kaleidoscope of ideas:?Key recent developments in technological enhancement, bioengineering, and, in particular, artificial intelligence.?Consideration of the nature of AI systems with insights from neuroscience?The way AI is changing how we communicate, implications for medicine, manufacturing and the military, its use in advertising and automobiles, and education and the future of work??How data is used today for surveillance, thought control?The rise of virtual reality and the metaverse??The transhumanist agenda and longtermism?The agreements and disagreements that scientists and experts have about the future of AI?The urgent need for regulation and control in light of the development of large language transformers like CHATGPT.?Key insights from Scripture about the nature of human beings, the soul, our moral sense, our future, and what separates us from machines.? In straight-forward, accessible language, you will get a better understanding of the current capacity of AI, its potential benefits and dangers, the facts and the fiction, as well as possible future implications.?Since the questions posed by AI, daunting as they might be, affect most of us, they demand answers. 2084 and the AI Revolution, Updated and Expanded Edition has been written to challenge and ignite the curiosity of all readers. Whatever your worldview, Lennox provides clear information and credible answers that will bring you real hope for the future of humanity.

21 Recipes for Mining Twitter: Distilling Rich Information from Messy Data

by Matthew A. Russell

Millions of public Twitter streams harbor a wealth of data, and once you mine them, you can gain some valuable insights. This short and concise book offers a collection of recipes to help you extract nuggets of Twitter information using easy-to-learn Python tools. Each recipe offers a discussion of how and why the solution works, so you can quickly adapt it to fit your particular needs. The recipes include techniques to:Use OAuth to access Twitter dataCreate and analyze graphs of retweet relationshipsUse the streaming API to harvest tweets in realtimeHarvest and analyze friends and followersDiscover friendship cliquesSummarize webpages from short URLsThis book is a perfect companion to O’Reilly's Mining the Social Web.

21st Century C

by Ben Klemens

Throw out your old ideas of C, and relearn a programming language that's substantially outgrown its origins. With 21st Century C, you'll discover up-to-date techniques that are absent from every other C text available. C isn't just the foundation of modern programming languages, it is a modern language, ideal for writing efficient, state-of-the-art applications. Learn to dump old habits that made sense on mainframes, and pick up the tools you need to use this evolved and aggressively simple language. No matter what programming language you currently champion, you'll agree that C rocks. Set up a C programming environment with shell facilities, makefiles, text editors, debuggers, and memory checkers Use Autotools, C's de facto cross-platform package manager Learn which older C concepts should be downplayed or deprecated Explore problematic C concepts that are too useful to throw out Solve C's string-building problems with C-standard and POSIX-standard functions Use modern syntactic features for functions that take structured inputs Build high-level object-based libraries and programs Apply existing C libraries for doing advanced math, talking to Internet servers, and running databases

21st Century C: C Tips from the New School

by Ben Klemens

Throw out your old ideas about C and get to know a programming language that’s substantially outgrown its origins. With this revised edition of 21st Century C, you’ll discover up-to-date techniques missing from other C tutorials, whether you’re new to the language or just getting reacquainted.C isn’t just the foundation of modern programming languages; it is a modern language, ideal for writing efficient, state-of-the-art applications. Get past idioms that made sense on mainframes and learn the tools you need to work with this evolved and aggressively simple language. No matter what programming language you currently favor, you’ll quickly see that 21st century C rocks.Set up a C programming environment with shell facilities, makefiles, text editors, debuggers, and memory checkersUse Autotools, C’s de facto cross-platform package managerLearn about the problematic C concepts too useful to discardSolve C’s string-building problems with C-standard functionsUse modern syntactic features for functions that take structured inputsBuild high-level, object-based libraries and programsPerform advanced math, talk to internet servers, and run databases with existing C librariesThis edition also includes new material on concurrent threads, virtual tables, C99 numeric types, and other features.

21st Century Chinese Cyberwarfare

by William T. Hagestad II

21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author s personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People's Republic of China is using a combination of their unique culture, language, and political will, known as Chinese Communism, to maintain their cultural heritage. This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People's Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and present danger to the experienced and innocent alike and will be economically, societally and culturally changing and damaging for the nations that are targeted.

The 21st Century in 100 Games (Games and Contemporary Culture)

by Aditya Deshbandhu

The 21st Century in 100 Games is an interactive public history of the contemporary world. It creates a ludological retelling of the 21st century through 100 games that were announced, launched, and played from the turn of the century. The book analyzes them and then uses the games as a means of entry to examine both key events in the 21st century and the evolution of the gaming industry. Adopting a tri-pronged perspective — the reviewer, the academic, and an industry observer — it studies games as ludo-narratological artefacts and resituates games in a societal context by examining how they affect and are engaged with by players, reviewers, the gaming community, and the larger gaming industry.This book will be a must read for readers interested in video games, new media, digital culture (s), culture studies, and history.

21st Century Prometheus: Managing CBRN Safety and Security Affected by Cutting-Edge Technologies

by Maurizio Martellini Ralf Trapp

This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks, challenging certain assumptions that underlie current control regimes. The book also shows how technologies can be enablers for more effective strategies to mitigate these risks.21st-century safety and security risks emanating from chemical, biological, radiological and nuclear materials – whether resulting from natural events, accidents or malevolent use - are increasingly shaped by technologies that enable their development, production or use in ways that differ from the past. Artificial intelligence, the use of cyberspace, the revolution in the life sciences, new manufacturing methods, new platforms and equipment for agent delivery, hypersonic weapons systems, information tools utilised in hybrid warfare – these and other technologies are reshaping the global security environment and CBRN landscape. They are leading to a growing potential for highly targeted violence, and they can lead to greater instability and vulnerability worldwide. At the same time, technology offers solutions to manage CBRN risks. Examples are faster detection, more accurate characterisation of the nature and origin of CBRN agents, new forensic investigation methods, or new medical treatments for victims of CBRN incidents. New educational concepts help to foster a culture of responsibility in science and technology and strengthen governance. New training methods help develop practical skills to manage CBRN risks more effectively.The book concludes that there is a growing need for a holistic framework towards CBRN risk mitigation. Traditional arms control mechanisms such as global, regional or bilateral treaties and export controls are still needed, as they provide a necessary legal and institutional framework. But laws and technology denial alone will not suffice, and institutional mechanisms can at times be weak. Given the pace of technological progress and the diffusion of critical knowledge, tools and materials, policymakers must accept that CBRN risks cannot be eliminated altogether. Instead, society has to learn to manage these risks and develop resilience against them. This requires a “softer”, broadly based multi-stakeholder approach involving governments, industry, the research and development communities, educators, and civil society. Furthermore, educating policymakers that cutting-edge technologies may seriously affect global strategic stability could create incentives for developing a more creative and contemporary arms control strategy that fosters cooperation rather than incremental polarisation.

Refine Search

Showing 101 through 125 of 60,509 results