You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.
One of the integral parts of determining business success directly correlates to how well a company interacts with their customers. This increased demand for direct communication has evolved how companies cooperate with their patrons and examines how essential ethics is related to these communications. Ethical Consumerism and Comparative Studies Across Different Cultures: Emerging Research and Opportunities provides emerging research exploring the theoretical and practical aspects of the fundamental issues related to ethical consumerism and applications within business, science, engineering, and technology and examines the impact Arab and global cultures have on consumerism. Featuring coverage on a broad range of topics such as business ethics, data management, and global business, this book is ideally designed for managers, executives, advertisers, marketers, sales directors, practitioners, researchers, academicians, and students.
The field of Information Science is intertwined with the complexity present in society. The study object in this field refers to data, information, and knowledge generated, mediated, and appropriated by different individuals in the most diverse human activities. Thus, discussing complex issues that are intertwined with information management, knowledge management, innovation management, organizational intelligence, information mediation, information appropriation, and information literacy is essential for understanding the future perspectives of digital humanity. Role of Information Science in a Complex Society presents discussions that can be applied to local, regional, and national policies aimed at economic and social development and supports innovative actions in economic segments that depend on innovation. Highlighting topics that include information literacy, ethics, knowledge management, and organizational learning, this book is an ideal reference source for academicians, professionals, researchers, and students, as well as entrepreneurs from different economic segments.
The number of practice-based or practice-led doctorate programs continues to grow across the U.S. Doctoral students who seek a terminal practitioner doctorate typically conduct practice-based research within the dissertation research used as the culmination of the degree program. These terminally degreed graduates return to educational practice to improve practice, impact innovation, and solve the complex problems of practice through research-based decision making. Practice-Based and Practice-Led Research for Dissertation Development provides the most current research, innovation, and insights into practice-based research conducted within U.S. practitioner doctorate programs across fields th...
The fast-paced world created by the accessibility of consumer information through internet-generated data requires improved information-management platforms. The continuous evaluation and evolution of these systems facilitate enhanced data reference and output. Optimizing Data and New Methods for Efficient Knowledge Discovery and Information Resources Management is a critical research publication that provides insight into the varied and rapidly changing fields of knowledge discovery and information resource management. Highlighting a range of topics such as datamining, artificial intelligence, and risk assessment, this book is essential for librarians, academicians, policymakers, information managers, professionals, and researchers in fields that include artificial intelligence, knowledge discovery, data visualization, big data, and information resources management.
No matter the industry, the development of information technologies has transformed how information is distributed and used to predict trends. Collecting and identifying the most vital information, however, requires constant management and manipulation. Current Issues and Trends in Knowledge Management, Discovery, and Transfer is an essential reference source that discusses crucial practices for collaborating and distributing work as well as validating accrued knowledge from real-time data. Featuring research on topics such as dynamic knowledge, management systems, and sharing behavior, this book is ideally designed for academics, researchers, librarians, managing professionals, and students seeking coverage on knowledge acquisition and implementation across systems.
The public sector provides services to the public and does not expect to acquire financial gain; hence, the practices from the private sector could not be used efficiently without modification, bearing in mind that the main scope of the public organization is to provide quality services to the citizens. Knowledge management can acquire and transfer knowledge in order to succeed in this effort and to confront challenges that exist in the modern knowledge economy. Therefore, knowledge management can play a vital role in the reorganization of the public sector and its necessary organizational change. Knowledge Management Practices in the Public Sector is a collection of innovative research on the methods and applications of improving the quality of public services through the implementation of knowledge management in public organizations. While highlighting topics including intellectual capital, risk assessment, and organizational strategy, this book is ideally designed for policymakers, ICT consultants, public sector workers, public administrators, government officials, researchers, scholars, and students.
Traditional knowledge is largely oral collective of knowledge, beliefs, and practices of indigenous people on sustainable use and management of resources. The survival of this knowledge is at risk due to various difficulties faced by the holders of this knowledge, the threat to the cultural survival of many communities, and the international lack of respect and appreciation of traditional knowledge. However, the greatest threat is that of appropriation by commercial entities in derogation of the rights of the original holders. Though this practice is morally questionable, in the absence of specific legal provisions, it cannot be regarded as a crime. Intellectual Property Rights and the Prote...
In the next few years, it is expected that most businesses will have transitioned to the use of electronic commerce technologies, namely e-commerce. This acceleration in the acceptance of e-commerce not only changes the face of business and retail, but also has introduced new, adaptive business models. The experience of consumers in online shopping and the popularity of the digital marketplace have changed the way businesses must meet the needs of consumers. To stay relevant, businesses must develop new techniques and strategies to remain competitive in a changing commercial atmosphere. The way in which e-commerce is being implemented, the business models that have been developed, and the ap...
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, ...