Information and Communications Technology for A2
by Julian Mott and Anne Leeming
Information and Communications Security (Security and Cryptology, #4861) (Lecture Notes in Computer Science, #4861)
by Sihan Qing
The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydn...
Provable Security (Lecture Notes in Computer Science, #4784) (Security and Cryptology, #8782)
This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia. The 10 revised full papers presented together with seven short papers were carefully reviewed and selected. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.
Your Marriage and the Internet
by Thomas Whiteman, Randy Petersen, and Tom Whiteman
Trust in Social Media (Synthesis Lectures on Information Security, Privacy & Trust)
by Jiliang Tang and Huan Liu
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or, in other words, exacerbates the information overload problem. On the other hand, the quality of user-generated content can vary dramatically from excellence to abuse or spam, resulting in a problem of info...
This innovative product uses interactive video to explain everything you need to know to promote your business using Facebook. An experienced instructor presents up to 4 hours of exceptional quality video tutorials, complete with lesson files, assessment quizzes, and review materials. The video is wrapped in a unique interface that allows the viewer to jump to any topic and also bookmark individual sections for later review. The unique Watch-and-Work mode shrinks the video into a small window to...
Key Element Guide Suite (Print Pack of 5) [Chinese Language]
The Politics of Education and Technology (Digital Education and Learning)
This book examines the struggles over technology's use in education, digging into what the purpose of education is, how we should achieve it, who the stakeholders are, and whose voices win out. Drawing on theoretical and empirical work, it lays bare the messy realities of technology use in education and their implications for contemporary society.
This text investigates how, in the the 21st century, the lives of ordinary individuals, businesses, and criminals are being recorded in every detail. It explores the implications of CCTV, listening operations, and their spies and examines the effect that computer technology has had on privacy.
Socioinformatics - The Social Impact of Interactions Between Humans and It (Springer Proceedings in Complexity)
Socioinformatics is a new scientific approach to study the interactions between humans and IT. These proceedings are a collection of the contributions during a workshop of the Gesellschaft fur Informatik (GI). Researchers in this emerging field discuss the main aspects of interactions between IT and humans with respect to; social connections, social changes, acceptance of IT and the social conditions affecting this acceptance, effects of IT on humans and in response changes of IT, structures of...
On the morning of Monday, April 3, 2000, Josh Harris woke to the knowledge that he was about to lose everything. Harris, the man Time magazine called 'The Warhol of the Web was reduced to the role of helpless spectator as the Nasdaq index collapsed like a house of cards, and his personal fortune dwindled from 85 million dollars...to 70 million...to 20... to nothing. If the mania attending the last six months of 1999 is hard to completely recall, it's because when the crash came the events, dre...
Emerging Pervasive and Ubiquitous Aspects of Information Systems: Cross-Disciplinary Advancements
From Digital Twins to Digital Selves and Beyond
by Franz Barachini and Christian Stary
This open access book aims at deepening the understanding of the relation between cyber-physical systems (CPSs) as socio-technical systems and their digital representations with intertwined artificial intelligence (AI). The authors describe why it is crucial for digital selves to be able to develop emotional behavior and why a humanity-inspired AI is necessary so that humans and humanoids can coexist. The introductory chapter describes major milestones in computer science which form the basis f...
DEMOCRACY AND THE INFORMATION SOCIETY
This publication sets out to make the case for giving everyone the possibility of participating in the development of a European vision of democracy in the age of the information society. It asks what impact the new media are having on politics and representative democracy, looking at the growing relationship between politics and the media and the new links between democracy and representation. It also examines the effect of technological development on the broadening of the political arena and...
Cyberculture (Electronic Meditations, Vol 4) (Electronic Mediations)
by Pierre Levy
Secure IT Systems (Security and Cryptology, #11252) (Lecture Notes in Computer Science, #11252)
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.The 29 full papers presented in this volume were carefully reviewed and selected from 81 submissions. They are organized in topical sections named: privacy; cryptography; network and cloud security; cyber security and malware; and security for software and software development.
AI Knowledge Transfer from the University to Society
AI Knowledge Transfer from the University to Society: Applications in High-Impact Sectors brings together examples from the "Innovative Ecosystem with Artificial Intelligence for Andalusia 2025" project at the University of Seville, a series of sub-projects composed of research groups and different institutions or companies that explore the use of Artificial Intelligence in a variety of high-impact sectors to lead innovation and assist in decision-making. Key Features Includes chapters on heal...