You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book covers a very broad range of topics in marketing, communication, and tourism, focusing especially on new perspectives and technologies that promise to influence the future direction of marketing research and practice in a digital and innovational era. Among the areas covered are product and brand management, strategic marketing, B2B marketing and sales management, international marketing, business communication and advertising, digital and social marketing, tourism and hospitality marketing and management, destination branding and cultural management, and event marketing. The book comprises the proceedings of the International Conference on Strategic Innovative Marketing and Tourism (ICSIMAT) 2019, where researchers, academics, and government and industry practitioners from around the world came together to discuss best practices, the latest research, new paradigms, and advances in theory. It will be of interest to a wide audience, including members of the academic community, MSc and PhD students, and marketing and tourism professionals.
Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
This Research Handbook provides a rigorous analysis of cyberwarfare, a widely misunderstood field of contemporary conflict and geopolitical competition. Gathering insights from leading scholars and practitioners, it examines the actors involved in cyberwarfare, their objectives and strategies, and scrutinises the impact of cyberwarfare in a world dependent on connectivity.
Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe.
Complete proceedings of the 14th European Conference on Cyber Warfare and Security Hatfield UK Published by Academic Conferences and Publishing International Limited
Learn Why, What, Where, When Who and How behind the technologies of the AI & ML powering the Agents of Automation in a simple mannerKey features Explore various trends of Automation impacting our lives today. Explains the reasons behind the proliferations of the various bots and autonomous agents. Explores the various areas being impacted by the use of these new workforce made of machines. Examines the components that make up Robots, Chatbots, Autonomous cars and Drones. Throws a light on the various limitations and threats encountered by the Agents of Automation Explores how, Blockchain can be used to protect IOT, Robots, Drones and Autonomous cars. Throws a light on the various tools used ...
Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.
An Approach to Modelling Software Evolution Processes describes formal software processes that effectively support software evolution. The importance and popularity of software evolution increase as more and more successful software systems become legacy systems. For one thing, software evolution has become an important characteristic in the software life cycle; for another, software processes play an important role in increasing efficiency and quality of software evolution. Therefore, the software evolution process, the inter-discipline of software process and software evolution, becomes a key area in software engineering. The book is intended for software engineers and researchers in computer science. Prof. Tong Li earned his Ph.D. in Software Engineering at De Montfort University, U.K.; he has published five monographs and over one hundred papers.
Foreword by Robert Hauptman As discussions about the roles played by information in economic, political, and social arenas continue to evolve, the need for an intellectual primer on information ethics that also functions as a solid working casebook for LIS students and professionals has never been more urgent. This text, written by a stellar group of ethics scholars and contributors from around the globe, expertly fills that need. Organized into twelve chapters, making it ideal for use by instructors, this volume from editors Burgess and Knox thoroughly covers principles and concepts in information ethics, as well as the history of ethics in the information professions; examines human rights...