52 results (0,23614 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Trust and Organizational Resilience

Privacy Trust and Social Media

Testimonial Injustice and Trust

Trust in Risk Management Uncertainty and Scepticism in the Public Mind

Vaccine Communication in a Pandemic Strengthening Vaccine Literacy Restoring Trust and Engaging Communities to Foster Vaccine Confidence and

Trust Security and Privacy for Big Data

Trust Security and Privacy for Big Data

Data has revolutionized the digital ecosystem. Readily available large datasets foster AI and machine learning automated solutions. The data generated from diverse and varied sources including IoT social platforms healthcare system logs bio-informatics etc. contribute to and define the ethos of Big Data which is volume velocity and variety. Data lakes formed by the amalgamation of data from these sources requires powerful scalable and resilient storage and processing platforms to reveal the true value hidden inside this data mine. Data formats and its collection from various sources not only introduce unprecedented challenges to different domains including IoT manufacturing smart cars power grids etc. but also highlight the security and privacy issues in this age of big data. Security and privacy in big data is facing many challenges such as generative adversary networks efficient encryption and decryption algorithms encrypted information retrieval attribute-based encryption attacks on availability and reliability. Providing security and privacy for big data storage transmission and processing have been attracting much attention in all big data related areas. The book provides timely and comprehensive information for researchers and industry partners in communications and networking domains to review the latest results in security and privacy related work of Big Data. It will serve computer science and cybersecurity communities including researchers academicians students and practitioners who have interest in big data trust privacy and security aspects. It is a comprehensive work on the most recent developments in security of datasets from varied sources including IoT cyber physical domains big data architectures studies for trustworthy computing and approaches for distributed systems and big data security solutions etc. | Trust Security and Privacy for Big Data

GBP 145.00
1

Betrayals And Treason Violations Of Trust And Loyalty

Betrayals And Treason Violations Of Trust And Loyalty

Betrayal and Treason examines betrayals as violations of both trust and loyalty. It offers a typology based on membership in or out of collectives within the contexts of secrecy/non-secrecy. The book shows that betrayals include such categories as espionage whistle-blowing infidelity political turncoating conversions collaboration with occupying forces informers mutinies defections strike-breakers professional intellectual and international betrayals human rights violations surveillance assassinations and state sponsored terror. Each one of the categories is presented with enticing stimulating and appropriate real-life illustrations and narratives. The book focuses on treason examines diverse cultures (European countries Israel Canada the United States) and such periods as World War II the conquest of Mexico and looks at such figures as Benedict Arnold Ezra Pound Edward VIII Malinche Vindkun Quisling Lord Haw Haw Tokyo Rose and a host of others. Since World War II is an excellent period through which one can examine issues of treason and since there has been such an increased interest in World War II this book places a particular emphasis on that period and war. Betrayal and Treason is original in its conceptual framework and in its breadth and depth of coverage. Yet judging by the amount of books published on similar topics in the past there can hardly be a doubt that there has always been a genuine demand and hunger for an inclusive and integrative book such as this one. By offering a new and interpretive framework for betrayals this book can serve both scholars and lay people alike in gaining a much better understanding of such a complex and fascinating behavior as betrayal. | Betrayals And Treason Violations Of Trust And Loyalty

GBP 130.00
1

Re-thinking Mediations of Post-truth Politics and Trust Globality Culture Affect

Re-thinking Mediations of Post-truth Politics and Trust Globality Culture Affect

This collection reaches beyond fake news and propaganda misinformation and charismatic liars to explore the lesser-publicized cultural forms and practices that serve as a cultural infrastructure for post-truth society and politics. Situating post-truth in specific contexts as a site of contestation or crisis the book critically explores it as a dynamic and shifting site around which political and cultural practices in specific contexts revolve and overlap. Through a breadth of perspectives the volume considers a number of overlapping cultural and political developments across varying national and transnational contexts: changing technologies and practices of cultural production that sometimes shift and at other times reproduce authority of traditional institutional truth-tellers; seismic cultural changes in representations values and roles regarding gender sexuality race and historical memory about them as well as corresponding reactionary discourses in the culture wars; questions of authenticity honesty and power relations that combine many of the former shifts within an all-encompassing culture of (self-)promotional attentional capitalism. These considerations lead scholars to focus on corresponding shifting cultural dynamics of popular truth-telling and (dis-)trust-making that inform political culture. In this more global view post-truth becomes foremost an influentially anxious public mood about the struggles to secure or undermine publicly accepted facts. This nuanced and insightful collection will interest scholars and students of communication studies media and cultural studies media ethics journalism media literacy sociology anthropology philosophy and politics. | Re-thinking Mediations of Post-truth Politics and Trust Globality Culture Affect

GBP 130.00
1

Security and Trust Issues in Internet of Things Blockchain to the Rescue

Mistrust Developmental Cultural and Clinical Realms

Chinese Social Networks in an Age of Digitalization Liquid Guanxi

Chinese Social Networks in an Age of Digitalization Liquid Guanxi

Chinese Social Networks in an Age of Digitalization investigates the impact of digital media on the traditional Chinese model of social interaction trust-building and social capital known as guanxi. Guanxi is a system of cultural and psychological rules of networking that orders every interaction in China from the labor market to politics to business and even law. It is the lifeblood of the nation and nearly just as old. But how has guanxi kept pace with the modern rapids of digitalization? This book is the first to examine how the rise of social networking sites is transforming guanxi in everyday networking in China home to the largest population of users worldwide and nearly universal adoption in the nation. This monograph argues that digitalization is making guanxi liquid: that social and geographical boundaries are being melted away – and with it people are experiencing a newfound liberation in how they network trust and feel toward others. Au asserts that Chinese modernity itself is transforming into what it calls a digital agora a new intermediary space between the public and private spheres that balances obligations to both realms. The book offers researchers and students a window into how digitalization is changing how people in guanxi fundamentally think about who to trust how to interact and compose themselves and what it takes to socially survive in a rapidly advancing age of digitalization. | Chinese Social Networks in an Age of Digitalization Liquid Guanxi

GBP 130.00
1

The Oedipus Complex Today Clinical Implications

Psychic Assaults and Frightened Clinicians Countertransference in Forensic Settings

Resolving Water Conflicts Workbook

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

News 2.0 Can journalism survive the Internet?

The School Years

African Pentecostalism in Britain Migration Inclusion and the Prosperity Gospel

Virtual Teams Across National Borders

Virtual Teams Across National Borders

Virtual teams can be traced back to the 1990s with the debauched development of communication technologies as well as the fast extension of the internet. Virtual teams possess unique features allowing them to combine cultural multiplicity specific tasks physical remoteness of team members continuous distant communication critical interdependence of tasks leadership cohesion empowerment confidence virtuality special trust creation and trust building. For a successful functioning of present-day organisations they need to employ geographically dispersed labour force. Creating virtual teams functioning across national borders organisations secure the most competent talent available world-wide. Employing the best available know-how virtual teams apply the knowledge of experts from various cultures having diverse capabilities as well as varied perceptions on dealing with multiple organisational challenges from strategic perspectives. Compositions of virtual teams operating across national borders alter depending on types of industry organisation and organisational unit. International virtual teams functioning across national borders perform from practically everywhere all over the world if there is a secure and constant internet connection. This book is dedicated to offering a comprehensive outlook and analysis of the theoretical and practical aspects related to the creation of virtual teams across national borders as well as the specifics of their implementation. The research published as chapters in the book allow the detection of the key aspects and trends concerning the creation and performance of virtual teams across national borders. The book presents topics not being investigated in-depth so far or not researched at all. The purpose of the book is to fill in certain gaps in the existing research and subsequent publications referring to a broad variety of issues concerning theoretical and empirical fundamentals of the creation of virtual teams and their functioning across national borders the role of virtual intelligence in relation to distance interpretation in international virtual teams geography of virtual teams in relation to digital nomads communication in virtual teams creation of communal identity via implementation of virtual teams tax implications for virtual work among numerous other issues.

GBP 130.00
1

John Wesley's Political World