You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Shortlisted for the 2020 Business Book Awards I Am My Brand is a toolkit for personal brand success. Featuring dynamic female brand builders from around the world, the book is a woven tapestry of personal brand advice with storytelling and support that offers a practical guide for female entrepreneurs, freelancers and executives. I Am My Brand explores the techniques used by different women across cultures to build their personal brand, as well as the challenges they faced and their paths to overcoming them. Focused on the skills needed to succeed, their stories – coupled with the author's expertise – will support readers on their own journey to brand success and self-empowerment in work and life. The book is written in a down-to-earth style, with light entertainment and real-life anecdotes, providing insights into how to create, package and grow your personal brand. Written by one of the most influential female brand builders in the UK, I Am My Brand is a testament to the power of being a woman and illustrates what it takes to build a powerful female brand in today's male dominated business world.
This open access book provides a glimpse into the Japanese management technique known as “Kaizen,” and the ways it has been disseminated around the developing world. The novelty of this book is three-fold: it provides a contextualized view of the mechanisms of initiatives implementing Kaizen in developing countries; compared with productivity studies, it places the relationship between workers and managers at the center of inquiry, reflecting the intent of SDG8 concerning decent work and economic growth; and it provides an overview of the heterogeneity of Kaizen in terms of geography and firm size. This book explores how improving management techniques can support firms’ productivity and quality. Given its wide range of case studies from across Africa, Asia and Latin America, this book will be of value to scholars, policymakers and advocates of sustainable development alike.
This open access edited volume provides theoretical, practical, and historical perspectives on art and education in a post-digital, post-internet era. Recently, these terms have been attached to artworks, artists, exhibitions, and educational practices that deal with the relationships between online and offline, digital and physical, and material and immaterial. By taking the current socio-technological conditions of the post-digital and the post-internet seriously, contributors challenge fixed narratives and field-specific ownership of these terms, as well as explore their potential and possible shortcomings when discussing art and education. Chapters also recognize historical forebears of digital art and education while critically assessing art, media, and other realms of engagement. This book encourages readers to explore what kind of educational futures might a post-digital, post-internet era engender.
Social robots not only work with humans in collaborative workspaces – we meet them in shopping malls and even more personal settings like health and care. Does this imply they should become more human, able to interpret and adequately respond to human emotions? Do we want them to help elderly people? Do we want them to support us when we are old ourselves? Do we want them to just clean and keep things orderly – or would we accept them helping us to go to the toilet, or even feed us if we suffer from Parkinson’s disease? The answers to these questions differ from person to person. They depend on cultural background, personal experiences – but probably most of all on the robot in quest...
The first edition of Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques was originally put together to offer a basic introduction to the various search and optimization techniques that students might need to use during their research, and this new edition continues this tradition. Search Methodologies has been expanded and brought completely up to date, including new chapters covering scatter search, GRASP, and very large neighborhood search. The chapter authors are drawn from across Computer Science and Operations Research and include some of the world’s leading authorities in their field. The book provides useful guidelines for implementing the m...
This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers was submitted. For the DETIPS Workshop 8 regular papers were selected for present...
This book constitutes the refereed proceedings of the Third International Conference on Artificial Immune Systems, ICARIS 2004, held in Catania, Sicily, Italy, in September 2004. The 34 revised full papers presented were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on applications of artificial immune systems; conceptual, formal, and theoretical frameworks; artificial immune systems for robotics; emerging metaphors; immunoinformatics; theoretical and experimental studies; future applications; networks; modeling; and distinguishing properties of artificial immune systems.
MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITY This book covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions The aim of Machine Learning Techniques and Analytics for Cloud Security is to integrate machine learning approaches to meet various analytical issues in cloud security. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The conventional cryptography approach is less applied in resource-constrained devices. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud ...
Inequality in Education: Comparative and International Perspectives is a compilation of conceptual chapters and national case studies that includes a series of methods for measuring education inequalities. The book provides up-to-date scholarly research on global trends in the distribution of formal schooling in national populations. It also offers a strategic comparative and international education policy statement on recent shifts in education inequality, and new approaches to explore, develop and improve comparative education and policy research globally. Contributing authors examine how education as a process interacts with government finance policy to form patterns of access to educatio...
Of the global population of more than 7 billion people, some 800 million do not have enough to eat today. By 2050, the population is expected to exceed 9 billion. It has been estimated that some 15% of food production is lost to plant diseases; in developing countries losses may be much higher. Historically, plant diseases have had catastrophic impact on food production. For example: potato blight caused the Irish famine in 1845; brown spot of rice caused the Great Bengal Famine of 1943; southern corn leaf blight caused a devastating epidemic on the US corn crop in 1970. Food security is threatened by an ongoing sequence of plant diseases, some persistent for decades or centuries, others more opportunistic. Wheat blast and banana xanthomonas wilt are two contrasting examples of many that currently threaten food production. Other emerging diseases will follow. The proposed title aims to provide a synthesis of expert knowledge to address this central challenge to food security for the 21st century. Chapters [5] and [11] are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.