Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book provides a guide for those looking to understand the potential of blockchain technology and its impact on various industries. The book provides an in-depth exploration of blockchain technology, its use cases, and the opportunities and challenges it presents. From digital currencies and smart contracts to supply chain management and decentralized finance, the book covers all the key aspects of blockchain technology. The authors also go beyond the technical details, providing valuable insights and practical advice on how to navigate this new era of decentralization and trustless transactions. The book is an ideal read for researchers, entrepreneurs, investors, or anyone looking to stay ahead of the curve and stay informed about the future of blockchain technology.
¿This book follows a Goffmanian approach to self-presentation to focus on the different strategies Spanish users employ to construct their digital identity in profiles, biographies, pictures, and statuses on platforms such WhatsApp, Twitter, Facebook, Instagram and LinkedIn. The author presents a functioning taxonomy of self-presentation strategies along the front-stage/back-stage continuum, including common strategies such as eudaimonic (or inspirational) messages and the use of humour. Special attention is paid to the effects of social variables such as the users' gender and age, and the perceived purposes of the different platforms (e.g. LinkedIn is often intended as a professional market for job hunting, whereas Facebook is rarely used in this context). The book will be of interest to students and scholars of Technologically Mediated Communication (traditionally known as Computer-Mediated Communication or CMC), media communication, internet pragmatics, digital discourse analysis, and related fields.
This book constitutes the First Segmentation of the Aorta Challenge, SEG.A. 2023, which was held in conjunction with the 26th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2023, on October 8, 2023. The 8 full and 3 short papers presented have been carefully reviewed and selected for inclusion in the book. They focus specifically on robustness, visual quality and meshing of automatically generated segmentations of aortic vessel trees from CT imaging. The challenge was organized as a ¿container submission¿ challenge, where participants had to upload their algorithms to Grand Challenge in the form of Docker containers. Three tasks were created for SEG.A. 2023.
The book ¿Applied Assistive Technologies and Informatics for Students with Disabilities¿ provides a comprehensive guide to assist students with learning disabilities in higher education via modern assistive technologies and informatics. This book will take us on a tour of the various modern assistive technologies, such as artificial intelligence (AI), blockchain, computer vision (CV), text analytics (TA), the metaverse, human-computer interaction (HCI), digital twins (DT), and federated learning (FL), and how they support higher education students with learning disabilities.This book is intended for students with learning disabilities, scientists and researchers, lecturers and teachers, academic and corporate libraries, practitioners, and professionals who are interested in providing inclusive education to students with learning disabilities through the application of modern assistive technologies and informatics. This book is ideal for readers who are new to the subject and knowledgeable about the principles of inclusive education. In addition, it is a fantastic resource for teachers and parents assisting students with learning disabilities. This book can be a powerful tool to educate more students about learning disabilities, which can help eradicate the bullying of these students.
Based on the classic adverse selection model, this book sets up the cyber ¿lemons¿ market model and analyzes the basic rule of asymmetric information. This book focuses on the topics as following: Is there ¿lemons¿ in e-commerce market? What rule do the cyber ¿lemons¿ characterize? How to build the cyber ¿lemon¿ market model? What is the particularity of adverse selection in cyber markets? What is more, how to eliminate or avoid the cyber ¿lemons¿ in Chinse e-commerce market?This book aims to provide the accumulation for e-commerce research and support decision-making for management in Chinese e-commerce markets, and suggests trust management solutions to eliminate or decrease the cyber ¿lemons¿. Through this book, it helps readers understand the ideas and effective methods of trust management in the Chinse e-commerce market, while deepening the reverse selection model and theory.
¿This book constitutes the proceedings of the 14th International Workshop on Statistical Atlases and Computational Models of the Heart, STACOM 2023, as well as the Cardiac MRI Reconstruction Challenge, CMRxRecon Challenge. There was a total of 53 submissions to the workshop. The 24 regular workshop papers included in this volume were carefully reviewed and selected from 29 paper submissions. They deal with cardiac segmentation, modelling, strain quantification, registration, statistical shape analysis, and quality control. In addition, 21 papers from the CMRxRecon challenge are included in this volume. They focus on fast CMR image reconstruction and provide a benchmark dataset that enables the broader research community to promote advances in this area of research.
Für den stabilen und sicheren Betrieb des Internets ist die US-amerikanische gemeinnützige Organisation Internet Corporation for Assigned Names and Numbers (ICANN) verantwortlich, wozu die Koordination der Vergabe von Domain-Namen gehört. Die Europäische Datenschutz-Grundverordnung (EU-DSGVO) dient der Vereinheitlichung des Datenschutzrechts und schützt die Verarbeitung von personenbezogenen Daten. Dies hat einen Einfluss auf die öffentlich zugänglichen Informationen von registrierten Domain-Namen, deren Veröffentlichung die ICANN in ihren Richtlinien vorschreibt. Diese Informationen umfassen personenbezogene Daten wie den Namen, die Postanschrift und die E-Mail-Adresse der Domain-innehabenden Person. Die ICANN änderte ihre Richtlinien, jedoch ist weiterhin die Veröffentlichung dieser Angaben möglich. In dem vorliegenden Buch werden die Auswirkungen der EU-DSGVO auf das E-Mail-Marketing und die Verwendung von E-Mail-Adressen für E-Mail-Kampagnen untersucht, insbesondere in Bezug aufunerwünschte E-Mail-Werbung. Dazu wird die folgende Forschungsfrage gestellt: Welchen Effekt hat die Veröffentlichung der E-Mail-Adresse der Domain-innehabenden Person in den WHOIS-Datenbanken auf die Anzahl eingehender unerwünschter Marketing-E-Mails?
This book constitutes the refereed revised selected papers of the 10th Latin American Conference on High Performance Computing, CARLA 2023, held in Cartagena, Colombia, during September 18¿22, 2023.The 14 full papers included in this book were carefully reviewed and selected from 26 submissions. They were organized in topical sections as follows: High Performance Computing (HPC), Artificial Intelligence using HPC Scale and High Performance Computing Applications.
This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situation and requirements of security management, defines its nature, function, object and system, and designs and constructs the whole process security management organization and operation system of e-commerce. It focuses on the core and most prominent risk control links (i.e. security impact factors) in e-commerce security, including e-commerce information and network security risk, e-commerce transaction risk, e-commerce credit risk, e-commerce personnel risk, etc. Then, the tools and methods for identifying and controlling various risks are described in detail, at the same time, management decision-making and coordination are integrated into the risk management. Finally, a closed loop of self-optimization is established by a continuous optimization evolution path of e-commerce security management.
This book constitutes the refereed proceedings of the 29th International Conference on Information and Software Technologies, ICIST 2023, held in Kaunas, Lithuania, in October 2023.The 27 full papers included in this volume were carefully reviewed and selected from 75 submissions. These proceedings contain a diverse array of research and insights in the field of Information Technology and related areas, such as: intelligent systems and software engineering advances, intelligent methods for data analysis and computer aided software engineering, language technologies and smart e-learning applications, AI-based it solutions.
This book shows how in nineteenth-century Britain, confronted with the newly industrialized and urbanized modern world, writers, artists, journalists and impresarios tried to gain an overview of contemporary history. They drew on two successive but competing conceptual models of overview: the panorama and the compilation. Both models claimed to offer a holistic picture of the present moment, but took very different approaches. This book shows that panoramas (360° views previously associated with the Romantic period) and compilations (big data projects previously associated with the Victorian fin de siècle) are intertwined, relevant across the entire century, and often remediated, making them crucial lenses through which to view a broad range of genre and forms. It brings together interdisciplinary research materials belonging to different period silos to create new understandings of how nineteenth-century audiences dealt with information overload. It argues for a new politics of distance: one that recognizes the value of immersing oneself in a situation, event or phenomenon, but which also does not chastise us for trying to see the big picture. This book is essential reading for students and scholars of nineteenth-century literature, history, visual culture and information studies.
From climate catastrophes to sudden wars, the world faces conflicts of unprecedented scale. Yet around the globe, Indigenous leaders continue to move forward with determination and hope. Leaders demand change, resisting the destruction of the environment and suggesting solutions to today¿s global crisis. Age-old practices are experiencing a cultural revival and the lessons call for all of us to walk alongside Indigenous peoples. In the face of crisis and the progress of technology, this book shows how to stand with Indigenous peoples through uncertainty and chaos. How to stand with Indigenous peoples is about how to listen, how to walk together and how to act.
This book constitutes the refereed proceedings of the International Joint Conference on Rough Sets, IJCRS 2023, held in Krakow, Poland, during October 5¿8, 2023.The 43 full papers included in this book were carefully reviewed and selected from 83 submissions. They were organized in topical sections as follows: Rough Set Models, Foundations, Three-way Decisions, Granular Models, Distances and Similarities, Hybrid Approaches, Applications, Cybersecurity and IoT.
This book constitutes the refereed proceedings of the 52nd Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2023, held in Gauteng, South Africa, during July 19¿21, 2023. The 12 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: student centered teaching and learning; AI and future movements; programming; and beyond the classroom.
This book presents a set of models, methods, and techniques that allow the successful implementation of data governance (DG) in an organization and reports real experiences of data governance in different public and private sectors.To this end, this book is composed of two parts. Part I on ¿Data Governance Fundamentals¿ begins with an introduction to the concept of data governance that stresses that DG is not primarily focused on databases, clouds, or other technologies, but that the DG framework must be understood by business users, systems personnel, and the systems themselves alike. Next, chapter 2 addresses crucial topics for DG, such as the evolution of data management in organizations, data strategy and policies, and defensive and offensive approaches to data strategy. Chapter 3 then details the central role that human resources play in DG, analysing the key responsibilities of the different DG-related roles and boards, while chapter 4 discusses the most common barriers to DG in practice. Chapter 5 summarizes the paradigm shifts in DG from control to value creation. Subsequently chapter 6 explores the needs, characteristics and key functionalities of DG tools, before this part ends with a chapter on maturity models for data governance. Part II on ¿Data Governance Applied¿ consists of five chapters which review the situation of DG in different sectors and industries. Details about DG in the banking sector, public administration, insurance companies, healthcare and telecommunications each are presented in one chapter.The book is aimed at academics, researchers and practitioners (especially CIOs, Data Governors, or Data Stewards) involved in DG. It can also serve as a reference for courses on data governance in information systems.
This book constitutes the refereed proceedings of the 22nd IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2023, held in Curitiba, Brazil, during November 9¿11, 2023.The 29 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 68 submissions. The contributions were organized in topical sections as follows: Artificial Intelligence and Algorithm; Digital Transformation and New Technologies; and Sustainable Technologies and Smart Cities.
Schummeln ist neben Schwindeln mit Sicherheit Teil menschlichen Lebens. Es fängt schon im Kindergarten an mit Klauen von Spielsachen oder von Süßigkeiten. In der Schule wird abgeschrieben oder es werden Spicker benutzt. In der Berufswelt eröffnet die digitale Welt neue Möglichkeiten und berührt alle Lebensbereiche. Datenbetrug zielt auf geldliche Vorteile und Prestige ab oder wird vom Hass getrieben. Seine gesamte Breite wird sachlich vorgestellt und begründet, jedoch so, dass in vielen Fällen noch Schmunzeln über Einfallsreichtum und Tricksereien der Datenbetrüger möglich ist.Der Begriff Datenbetrug ist umfassend und reicht von A (Arzt im Profisport) bis Z (Zocken beim Fußball). Er ist nicht ausschließlich juristisch zu sehen, sondern ist ein gesellschaftlich-wirtschaftliches Phänomen jeder zivilisierten Gesellschaft. Die digitale Welt mit ihren virtuellen Räumen eröffnet allen Unredlichen künftig ganz neue, beängstigende Perspektiven.
This book constitutes the proceedings of the 11th International Conference on Big Data and Artificial Intelligence, BDA 2023, held in Delhi, India, during December 7¿9, 2023. The17 full papers presented in this volume were carefully reviewed and selected from 67 submissions. The papers are organized in the following topical sections: ¿Keynote Lectures, Artificial Intelligence in Healthcare, Large Language Models, Data Analytics for Low Resource Domains, Artificial Intelligence for Innovative Applications and Potpourri.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.