You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The quest for a natural law that can be applied to a digital society may sound like an oxymoron, but it is a necessary quest if we hope to institute a “Digital New Deal”: Hence the title of this book. Today once again, mass media is disrupting society, much as radio and cinema were used to buttress totalitarianism in the 1920s … or even worse, in the 15th century, when the printing of the Bible unleashed 100 years of war, plague and instability. Things get messy when people disagree on facts rather than ideas. Natural law springs from the features of the physical world, which contains boundaries (an inside and an outside), limited resources, living individuals, objects, living animals,...
This book presents the most interesting talks given at ISSE 2010 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity and Security Management - Technical and Economical Aspects of Cloud Security - Security Services and Large Scale Public Applications - Smart Grid Security and Emerging Security Solutions - Privacy and Data Protection Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2010.
This book presents the most interesting talks given at ISSE 2011 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Computing & Enterprise Security Services - Awareness, Education, Privacy & Trustworthiness - Smart Grids, Mobile & Wireless Security - Security Management, Identity & Access Management - eID & eGovernment - Device & Network Security Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2011.
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Each communication exchange contains an identifier which may, or may not, be intended by the parties involved. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked infonnation society? th th From the 6 to the 10 August 2007, IFIP (International Federation for Infonnation Processing) working groups 9. 2 (Social Accountability), 9. 6/11. 7 (IT rd Misuse and the Law) and 11. 6 (Identity Management) hold the...
This book presents the most interesting talks given at ISSE 2009 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Economics of Security and Identity Management - Security Services and Large Scale Public Applications - Privacy and Data Protection and Awareness Raising - Standards and Technical Solutions - Secure Software, Trust and Assurance Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2009.
None
The Psychology of Work integrates psychological theory with personal narrative from global industry leaders, as well as those entering the workforce, to offer tangible insights into the real world of work. It is ideal for students, professionals and anyone with an interest in how successful organizations operate. It charts the development of the field of organizational psychology and provides the key theoretical frameworks. Crucially, it explores how these can be utilized to enhance organizational culture, and why this is so relevant and important in the modern workplace. Through the inclusion of interviews with students, The Psychology of Work reveals what the future workforce expect of the organizations that they are going into and encourages students reading the book to reflect on what kind of leaders they would like to be. The book is also a valuable resource to support professionals and practitioners, highlighting current working practices and the need for change, offering practical guidance on how to bring the 'humane' back into organizational life.
This book presents the most interesting talks given at ISSE 2004 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2004.