Risk assessment and management in pervasive computing : operational, legal, ethical, and financial perspectives

Risk assessment and management in pervasive computing : operational, legal, ethical, and financial perspectives

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • مؤلف : Varuna Godara
  • ناشر : Hershey, PA : Information Science Reference
  • چاپ و سال / کشور: 2009
  • شابک / ISBN : 9781605662206

Description

Foreword ........................................................................................................................................... xiv Preface .............................................................................................................................................xviii Section I Foundation, Technology, and Infrastructure of Pervasive Computing Chapter I Pervasive Computing: A Conceptual Framework.................................................................................... 1 Varuna Godara, University of Western Sydney, Australia Chapter II Pervasive Business Infrastructure: The Network Technologies, Routing and Security Issues.............. 20 Varuna Godara, University of Western Sydney, Australia Chapter III Computational Mobile Grid: A Computing Infrastructure on Mobile Devices .................................... 40 Deo Prakash Vidyarthi, Jawaharlal Nehru University, India Section II Applications and Services Chapter IV Mobile and Pervasive Technology in Education and Training: Potential and Possibilities, Problems and Pitfalls .......................................................... 53 Mark J. W. Lee, Charles Sturt University, Australia Chapter V Ubiquitous Computing for Microbial Forensics and Bioterrorism........................................................ 86 Gaya Prasad, CCS Haryana Agricultural University, India Minakshi, CCS Haryana Agricultural University, India Table of Contents Chapter VI Falling Behind: A Case Study in Uncritical Assessment ................................................................... 102 Jonathan G. M. Pratt, University of Technology, Sydney, Australia Section III Business Models, Structures, and Strategies Chapter VII Strategizing in the Digital World: Aligning Business Model, Brand and Technology ....................... 135 Yvonne Lee, University of Technology, Sydney, Australia Martin Kornberger, University of Technology, Sydney, Australia & University of St Andrews, Scotland Chapter VIII Business Models and Organizational Processes Changes .................................................................. 155 Helena Halas, SETCCE, Slovenia Tomaž Klobučar, Jožef Stefan Institute & SETCCE, Slovenia Chapter IX The Critical Success Factors and Integrated Model for Implementing E-Business in Taiwan’s SMEs ................................................................................................................................................. 169 Te Fu Chen, Graduate Institute of Central Asia, Chin Yung University, Taiwan Section IV Risk Assessment and Management Chapter X Security Issues in Pervasive Computing ............................................................................................ 196 Lawan Ahmed Mohammed, King Fahd University of Petroleum and Minerals, HBCC Campus, Saudi Arabia Kashif Munir, King Fahd University of Petroleum and Minerals, Country, HBCC Campus, Saudi Arabia Chapter XI Deciphering Pervasive Computing: A Study of Jurisdiction, E-Fraud and Privacy in Pervasive Computing Environment .................................................................................................................... 218 Grace Li, University of Technology, Sydney, Australia Chapter XII Biometrical Identification as a Challenge for Legislation: The Finnish Case ................................... 233 Reima Suomi, Turku School of Economics, Finland Tuomas Aho, Bützow Attorneys Ltd., Finland Tom Björkroth, Finnish Competition Authority, Finland Aki Koponen, Turku School of Economics, Finland Chapter XIII Pervasive Computers in Aviation Passenger Risk Profiling ............................................................... 246 Antony Glambedakis, University of Western Sydney, Australia Genevieve Watson, University of Western Sydney, Australia Section V Cultural and Social Implications Chapter XIV Ethical Issues and Pervasive Computing ........................................................................................... 263 Penny Duquenoy, Middlesex University, London, UK Oliver K. Burmeister, Charles Sturt University, Wagga Wagga, Australia Chapter XV Knowledge Sharing and Pervasive Computing: The Need for Trust and a Sense of History ............ 285 Phillip W J Brook, University of Western Sydney, Australia Chapter XVI Advancing Women in the Digital Economy: eLearning Opportunities for Meta-Competency Skilling .................................................................. 298 Patrice Braun, University of Ballarat, Australia Chapter XVII Cultural Dimension in the Future of Pervasive Computing ............................................................... 311 B.K. Mangaraj, XLRI Jamshepur, School of Business and Human Resources, Jamshedpur, India Upali Aparajita, Utkal University, Bhubaneswar, India Chapter XVIII Outline of the Human Factor Elements Evident with Pervasive Computers ..................................... 330 Genevieve Watson, University of Western Sydney, Australia Antony Glambedakis, University of Western Sydney, Australia Chapter XIX Impact of Computer and Video Games on the Development of Children .......................................... 343 Kalawati Malik, Sydney Business and Travel Academy, Australia Compilation of References ............................................................................................................... 352 About the Contributors .................................................................................................................... 378 Index.................................................................................................................................................. 387
This book provides extensive information about pervasive computing, its implications from operational, legal and ethical perspective so that current and future pervasive service providers can make responsible decisions about where, when and how to use this technology"--Provided by publisher.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری