You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
We take great pleasure in presenting the proceedings of the fifth edition of the International Conference on Applied Economics and Social Science (ICAESS), 2023, held on the 7th of November 2023 in Batam. The conference envisions a future where economic prosperity and environmental well-being are harmonized. By fostering interdisciplinary collaborations, it aims to unite environmental experts, technologists, and policymakers in crafting holistic solutions. The theme of ICAESS 2023 was “Harmonizing Green Economy, Sustainable Development, and Digitalization for a Thriving Future”. The technical program for ICAESS 2023 comprised 37 full papers, boasting an acceptance rate of 45%. The confer...
Perkembangan manajemen tidak jauh berbeda dengan pembangunan manusia itu sendiri. Artinya pengelolaan telah berlangsung sejak manusia ada di muka bumi ini, seiring dengan perkembangan dan tuntutan manusia untuk memenuhi kebutuhan hidupnya. Pada zaman dahulu atau batu Kaman, manusia juga menggunakan keterampilan dan keahliannya membuat alat dari batu untuk mewujudkan tujuan hidupnya. Berbagai konsep dan praktik manajemen dalam konteks dunia yang kompleks, dinamis, bergejolak, dan semakin mengglobal. Diskusi menekankan pendekatan fungsional atau proses untuk studi manajemen. Materi diskusi mencakup semua fungsi manajemen. Hal ini diharapkan dapat memberikan kerangka kerja untuk menganalisis dan memahami sifat pekerjaan dan keberhasilan manajerial, serta informasi yang dapat digunakan untuk meningkatkan kinerja fungsi manajerial dalam masyarakat bisnis yang semakin kompetitif.
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the viability of a free and open information society. While economics and information security comprise the nucleus of an academic movement that quickly drew the attention of thinktanks, industry, and governments, the field has expanded to surrounding areas such as management of information security, privacy,...
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.
The updated Fourth Edition of Gretchen B. Rossman and Sharon F. Rallis’s popular introductory text leads the new researcher into the field by explaining the core concepts through theory, research, and applied examples. Woven into the chapters are three themes that are the heart of the book: first, research is about learning; second, research can and should be useful; and finally, a researcher should practice the highest ethical standards to ensure that a study is trustworthy. The Fourth Edition includes an elaborate discussion of systematic inquiry as well as a nuanced discussion of developing a conceptual framework.
Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. Here the positions of the experts involved are very diverse: some strive for as much security as possible, others only for as much security as is necessary. The conference ISSE (Information Security Solutions Europe) is the outstanding forum for the interdisciplinary search for sustainable compromises and for the presentation of concepts which hold up in real life. This book offers the most recent papers in the area of strategies, technologies, applications and best practice.