You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book presents in-depth insight through a case study approach into the current state of research in ICT as well as identified successful approaches, tools and methodologies in ICT research"--Provided by publisher.
Organizational Learning and Knowledge: Concepts, Methodologies, Tools and Applications demonstrates exhaustively the many applications, issues, and techniques applied to the science of recording, categorizing, using and learning from the experiences and expertise acquired by the modern organization. A much needed collection, this multi-volume reference presents the theoretical foundations, research results, practical case studies, and future trends to both inform the decisions facing today's organizations and the establish fruitful organizational practices for the future. Practitioners, researchers, and academics involved in leading organizations of all types will find useful, grounded resources for navigating the ever-changing organizational landscape.
"Bioinformatics: Concepts, Methodologies, Tools, and Applications highlights the area of bioinformatics and its impact over the medical community with its innovations that change how we recognize and care for illnesses"--Provided by publisher.
The Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements provides a comprehensive and reliable source of information on current developments in information communication technologies. This source includes ICT policies; a guide on ICT policy formulation, implementation, adoption, monitoring, evaluation and application; and background information for scholars and researchers interested in carrying out research on ICT policies.
Provides extensive information about pervasive computing and its implications from various perspectives so that current and future pervasive service providers can make responsible decisions about where, when and how to use this technology.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today’s technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative res...
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery. Security and Software for Cybercafes provides relevant theoretical frameworks and current empirical research findings on the security measures and software necessary for cybercafes, offering information technology professionals, scholars, researchers, and educators detailed knowledge and understanding of this innovative and leading-edge issue, both in industrialized and developing countries.
Information technology is everywhere. As we continue to expand our use of ICT in all aspects of our lives, the use of information communication technology has been developed in support of engaging citizens in the government decision making process. Cases on Progressions and Challenges in ICT Utilization for Citizen-Centric Governance is a collection of case studies on the advancements and challenges of information technology in the involvements of citizens with the government. With contributions from authors around the world, this compilation is relevant to researchers, academics, and practitioners who wish to stay informed of the new world of technology in the government.
Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.