You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Third International Conference on Trust Management, iTrust 2005, held in Paris, France in May 2005. The 21 revised full papers and 4 revised short papers presented together with 2 keynote papers and 7 trust management tool and systems demonstration reports were carefully reviewed and selected from 71 papers submitted. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and psychology are addressed in order to develop a deeper and more comprehensive understanding of current aspects and challenges in the area of trust management in dynamic open systems.
In many respects cyberspace has created a new world. The online phenomena encompass social, cultural, economic, and legal facets. Exceeding the present Internet Governance concept the book analyses the normative foundations and guiding principles of a global cyberspace regime that includes the exchange of people, businesses, governments, and other entities. Based on this assessment and philosophical theories the book attempts to outline a model for a general legal framework enshrining key principles of civil society (such as human rights, ethics). The proposed global framework, not in the form of a multilateral treaty but a morally convincing declaration, could then be complemented by additional polycentric regulations with binding effect, developed on the basis of multistakeholder participation in a multi-layer concept.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013. The revised full papers were carefully reviewed and selected from 13 submissions. The papers are organized in topical sections on risk analysis, risk modeling and risk-based testing.
This timely and original book provides an exploration of the factors that combine to determine the form of regulatory problems and the overall success or failure of regulation. Using environmental regulation as a basis for analysis, this book puts forward a theoretical framework for the design of effective regulation and demonstrates how businesses’ compliance with environmental regulation, in particular, could be improved.
While the military use of drones has been the subject of much scrutiny, the use of drones for humanitarian purposes has so far received little attention. As the starting point for this study, it is argued that the prospect of using drones for humanitarian and other life-saving activities has produced an alternative discourse on drones, dedicated to developing and publicizing the endless possibilities that drones have for "doing good". Furthermore, it is suggested that the Good Drone narrative has been appropriated back into the drone warfare discourse, as a strategy to make war "more human". This book explores the role of the Good Drone as an organizing narrative for political projects, tech...
Adaptation of applied information and communication technologies (ICT) research results is one of the greatest challenges faced in building the global knowledge economy. This set of two books brings together a collection of contributions on commercial, government or societal exploitation of applied ICT.
Spanning two centuries and five Nordic countries, this book questions the view that political lawyers are required for the development of a liberal political regime. It combines cross-disciplinary theory and careful empirical case studies by country experts whose regional insights are brought to bear on wider global contexts. The theory of the legal complex posits that lawyers will not simply mobilize collectively for material self-interest; instead they will organize and struggle for the limited goal of political liberalism. Constituted by a moderate state, core civil rights, and civil society freedoms, political liberalism is presented as a discrete but professionally valued good to which ...
Progress in collaborative networks continues showing a growing number of manifestations and has led to the acceptance of Collaborative Networks (CN) as a new scientific discipline. Contributions to CN coming from multiple reference disciplines has been extensively investigated. In fact developments in CN have benefited from contributions of multiple areas, namely computer science, computer engineering, communications and networking, management, economy, social sciences, law and ethics, etc. Furthermore, some theories and paradigms defined elsewhere have been suggested by several research groups as promising tools to help define and characterize emerging collaborative organizational forms. Al...
"This book brings together a comprehensive collection on commercial, government or societal exploitation of the Internet and ICT, representing cutting edge research from over 30 countries. The issues, applications and case studies presented facilitate knowledge sharing, which is key to addressing global eAdoption issues and the Digital Divide. It can be sued to benchmark regional and national developments, avoid previous mistakes and identify potential partners and exploitation opportunities." -- Preface.
This book constitutes the refereed proceedings of the 24th Nordic Conference on Secure IT Systems, NordSec 2019, held in Aalborg, Denmark, in November 2019. The 17 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They are organized in topical sections named: privacy; network security; platform security and malware; and system and software security.