You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes revised selected papers from the 17th Workshop on e-Business, WeB 2018, which took place in Santa Clara, CA, USA, in December 2018. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2018 theme was “The Ecosystem of e-Business: Technologies, Stakeholders, and Connections.” There was a total of 47 submissions and 41 papers were presented at the conference. Of these, 19 revised papers are presented in this volume. These contributions are organized in the following topical sections: social, policy, and privacy issues; e-market; FinTech; and artificial intelligence.
The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2021), held in Government Engineering College Bikaner, Bikaner, India, during 20–21 December 2021. The book covers ICT-based approaches in the areas of ICT for energy efficiency, life cycle assessment of ICT, green IT, green information systems, environmental informatics, energy informatics, sustainable HCI or Artificial intelli computational sustainability.
In an unsettling time in American history, the outbreak of right-wing violence is among the most disturbing developments. In recent years, attacks originating from the far right of American politics have targeted religious and ethnic minorities, with a series of antigovernment militants, religious extremists, and lone-wolf mass shooters inspired by right-wing ideologies. The need to understand the nature and danger of far-right violence is greater than ever. In American Zealots, Arie Perliger provides a wide-ranging and rigorously researched overview of right-wing domestic terrorism. He analyzes its historical roots, characteristics, tactics, rhetoric, and organization, assessing the current...
A Brookings Institution Press and Ash Center for Democratic Governance and Innovation publication The era of strict top-down, stovepiped public management in America is over. The traditional dichotomy between public ownership and privatization is an outdated notion. Public executives have shifted their focus from managing workers and directly providing services to orchestrating networks of public, private, and nonprofit organizations to deliver those services. Unlocking the Power of Networks employs original sector-specific analyses to reveal how networked governance achieves previously unthinkable policy goals. Stephen Goldsmith and Donald F. Kettl head a stellar cast of policy practitioner...
Comprehensively presents the foundations and leading application research in medical informatics/biomedicine. The concepts and techniques are illustrated with detailed case studies. Authors are widely recognized professors and researchers in Schools of Medicine and Information Systems from the University of Arizona, University of Washington, Columbia University, and Oregon Health & Science University. Related Springer title, Shortliffe: Medical Informatics, has sold over 8000 copies The title will be positioned at the upper division and graduate level Medical Informatics course and a reference work for practitioners in the field.
This book constitutes the refereed proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2016, held in Auckland, New Zealand, in April 2016 in conjunction with PAKDD 2016, the 20th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with 7 short papers were carefully reviewed and selected from 23 submissions. The papers cover network-based data analytics, data and text mining, and cyber security and infrastructure protection.
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005. The 28 revised full papers, 34 revised short papers, and 32 poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data and text mining, infrastructure protection and emergency response, information management and security education, deception detection and authorship analysis, monitoring and surveillance, and terrorism informatics.
This book covers content recognition in text, elaborating on past and current most successful algorithms and their application in a variety of settings: news filtering, mining of biomedical text, intelligence gathering, competitive intelligence, legal information searching, and processing of informal text. Today, there is considerable interest in integrating the results of information extraction in retrieval systems, because of the demand for search engines that return precise answers to flexible information queries.
This book constitutes the thoroughly refereed post-workshop proceedings at PAKDD Workshops 2018, held in conjunction with the 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2018, in Melbourne, Australia, in June 2018. The 32 revised papers presented were carefully reviewed and selected from 46 submissions. The workshops affiliated with PAKDD 2018 include: Workshop on Big Data Analytics for Social Computing, BDASC, Australasian Workshop on Machine Learning for Cyber-security, ML4Cyber, Workshop on Biologically-inspired Techniques for Knowledge Discovery and Data Mining, BDM, Pacific Asia Workshop on Intelligence and Security Informatics, PAISI, and Workshop on Data Mining for Energy Modeling and Optimization, DaMEMO.
The Piracy Years: Internet File Sharing in a Global Context is the first collection to provide an overview of digital piracy’s recent past and its potential futures. Combining research essays, interviews, and overviews, the volume brings together leading scholars and infamous digital pirates from China, Germany, the Netherlands, Nigeria, Russia, the United Kingdom, and the United States. In June 1999, the peer-to-peer (P2P) file sharing website Napster transformed the availability of online content, but the site was quickly sued into oblivion. Despite the highly publicised shutdowns of a number of P2P websites, many continue to thrive, and digital piracy has become a global phenomenon. Thi...