You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Militarized Conflict Modeling Using Computational Intelligence examines the application of computational intelligence methods to model conflict. Traditionally, conflict has been modeled using game theory. The inherent limitation of game theory when dealing with more than three players in a game is the main motivation for the application of computational intelligence in modeling conflict. Militarized interstate disputes (MIDs) are defined as a set of interactions between, or among, states that can result in the display, threat or actual use of military force in an explicit way. These interactions can result in either peace or conflict. This book models the relationship between key variables a...
Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information (“big data”) held by many companies, misuse including accidental misuse or lack of use of such data, loss of key intellectual property, and the theft of health and medical data which can have a profound effect on the insurance sector. This book assesses the major cyber risks to businesses and discusses how they can be managed and the risks reduced. It includes case studies of the situation in different financial sectors and countries in relation to East Asia, Europe and the United States. It takes an interdisciplinary approach assessing cyber risks and management solutions from an economic, management risk, legal, security intelligence, insurance, banking and cultural perspective.
This is the first major study in English of Fascist Italy’s overseas propaganda. Using rare Italian and French captured documents, this is also the first investigation into the relationship between Mussolini’s regime and Arab nationalist movements This new account covers propaganda and subversive activities engineered by the Italian government in the Mediterranean and the Middle East from 1935 until 1940, when Italy entered the war. It assesses the nature of the challenge brought by the Fascist regime to British security and colonial interests in the region. Fascist propaganda, in particular in the Arab Middle East, must be regarded as an expression of Mussolini’s foreign policy and hi...
Surveillance in Europe is an accessible, definitive and comprehensive overview of the rapidly growing multi-disciplinary field of surveillance studies in Europe. Written by experts in the field, including leading scholars, the Companion’s clear and up to date style will appeal to a wide range of scholars and students in the social sciences, arts and humanities. This book makes the case for greater resilience in European society in the face of the growing pervasiveness of surveillance. It examines surveillance in Europe from several different perspectives, including: the co-evolution of surveillance technologies and practices the surveillance industry in Europe the instrumentality of survei...
Economic Modeling Using Artificial Intelligence Methods examines the application of artificial intelligence methods to model economic data. Traditionally, economic modeling has been modeled in the linear domain where the principles of superposition are valid. The application of artificial intelligence for economic modeling allows for a flexible multi-order non-linear modeling. In addition, game theory has largely been applied in economic modeling. However, the inherent limitation of game theory when dealing with many player games encourages the use of multi-agent systems for modeling economic phenomena. The artificial intelligence techniques used to model economic data include: multi-layer p...
This open access collection examines how higher education responds to the demands of the automation economy and the fourth industrial revolution. Considering significant trends in how people are learning, coupled with the ways in which different higher education institutions and education stakeholders are implementing adaptations, it looks at new programs and technological advances that are changing how and why we teach and learn. The book addresses trends in liberal arts integration of STEM innovations, the changing role of libraries in the digital age, global trends in youth mobility, and the development of lifelong learning programs. This is coupled with case study assessments of the vari...
An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations. Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on ...
divA critical reexamination of the work of J. David Singer's influential Correlates of War project /DIV
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood. Ever since the major London banks purchased their first computers in the early 1960s, they have had to balance their dependence on those machines with the need to secure their operations and retain the trust of their customers. Technological change in the second half of the 20th century prompted British banks to reevaluate their function as trusted protectors of wealth. In the City of London, the capital’s oldest area and historically its business and commerce hub, the colossal clearing banks employed newly commercialised electro...
This volume provides an analysis of insurance in private international law for international business lawyers, including discussion of the jurisdictional and choice of laws issues arising from cross-border contracts of insurance and reinsurance concluded by electronic means.