You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Social media has spread rapidly on the global stage, driving consumers’ attention and influence, both consciously and subconsciously. Whilst this type of platform may have been initially designed as a tool for open communication and expression, it is also being utilized as a digital tool, with widescale use cases. The intelligence explosion, information overload and disinformation play a significant part regarding individual, group and country perceptions. The complex nature of this data explosion created an increasing demand and use of artificial intelligence (AI) and machine learning (ML), to help provide ‘big insights’ to ‘big data’. AI and ML enable the analysis and disseminati...
This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or ethical connotations concerning the usage of digital twins. This publication will also give the reader a...
Supply chain security encompasses measures preventing theft, smuggling, and sabotage through heightened awareness, enhanced visibility, and increased transparency. This necessitates the adoption of a security-by-design paradigm to achieve effective and efficient security measures, yielding additional benefits such as diminished supply chain costs. Given their vulnerability, transportation and logistics service providers play a pivotal role in supply chain security. This thesis leverages systems security engineering and security-by-design to provide a methodology for designing and evaluating security measures for physical transport goods. It formulates nine principles that define security-by-design and establishes a supply chain security framework. An adaptation of the TOGAF architecture development facilitates the creation of secure-by-design enterprise architectures. Security measures are documented using security-enhanced processes based on BPMN. This enables an analysis and compliance assessment to ascertain the alignment of security with business objectives and the adequate implementation of requirements. The culmination of these efforts is exemplified through a case study.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change a...
This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR) and operational practice associated with computer network attack, computer network exploitation and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introdu...
In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber crime. The debate over how to plan for the cyber security of the future has focused the minds of developers and scientists alike. This book aims to provide a reference on current and emerging issues on systems security from the lens of autonomy, artificial intelligence and ethics as the race to fight and prevent cyber crime becomes increasingly pressing.
Wie sieht ethische Verantwortung im Zeitalter der Digitalisierung, Datafizierung und Künstlichen Intelligenz aus? Die Beiträger*innen geben fundierte Einsichten in die KI-gestützte Entscheidungs- und Urteilsfindung. Von der digitalen Operationalisierung über die Rolle des Menschen im Zentrum des technischen Fortschritts bis hin zur Konzeption von vertrauenswürdigen Systemen - im Fokus steht die Diskussion von Chancen und Herausforderungen, die nicht nur Akademiker*innen vielseitige Anregungen zur weiteren Auseinandersetzung mit dem Thema gibt.
Wie verändern Technologien Partizipation? Das Aufkommen digitaler Technologien hat neue Formen des Engagements ermöglicht, die Protestbewegungen, politische Kampagnen oder auch Initiativen der politischen Bildung prägen. Veränderte Aufmerksamkeitsökonomien und Affektpolitiken, von denen rechtspopulistische Akteur*innen profitieren, fordern die demokratische Selbstverständigung ebenso heraus wie die Macht der Daten. Der Band versammelt Perspektiven aus der Allgemeinen Erziehungswissenschaft und Medienpädagogik auf (post-)digitale demokratische Öffentlichkeiten.
This book provides a comprehensive examination of the use of MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A standards, providing a detailed reference to their application. In this book, the authors address five leading MPEG standards: MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A, focusing not only on the standards themselves, but specifically upon their application (e.g. for broadcasting media, personalised advertising and news, multimedia collaboration, digital rights management, resource adaptation, digital home systems, and so on); including MPEG cross-breed applications. In the evolving digital multimedia landscape, this book provides comprehensive coverage of the key MPEG standards used for...
Independent, rigorous and comprehensive analysis of the economic aspects of climate change.