Browse Results

Showing 7,076 through 7,100 of 18,673 results

Infodemic in the Era of Post-Truth (China Perspectives)

by Yan Su

With the revolution in information technology, concerns about the proliferation of false, unverified, and misleading information have been growing. As one of the severe public health crises in modern history, the COVID-19 pandemic has provided a novel context for the "post-truth" research. In a "post-truth" era, people are no longer interested in investigating objective facts, but tend to curl up in echo chambers and resonate with like-minded others. Against this backdrop, this book (1) systematically conceptualises "post-truth" and analyzes its defining characteristics and driving forces, (2) examines the nuanced effects of information sources and news consumption behaviours and strategies on COVID-19 misperceptions and knowledge, (3) explores the role of social media in shaping COVID-19-related misperceptions and knowledge, and (4) highlights the importance of news media literacy in navigating the "post-truth" era. The book will be essential reading for students and scholars of media and film studies, communication studies and comparative studies. It will also be a useful reference for medical and media professionals such as doctors, nurses and journalists.

Informal English: Puncture Ladies, Egg Harbors, Mississippi Marbles, and Other Curious Words and Phrases of North America

by Jeffrey Kacirk

Gleaned from antiquated dictionaries, dialect glossaries, studies of folklore, nautical lexicons, historical writings, letters, novels, and miscellaneous sources, Informal English offers a captivating treasure trove of linguistic oddities that will not only entertain but also shed light on America's colloquial past. Among the gems are: Surface-coal: cow dung, widely used for fuel in Texas Bone-orchard: in the Southwest slang for a cemetery Chawswizzled: "confounded" in Nebraskan idiom. "I'll be chawswizzled!" Leather-ears: to Cape Cod inhabitants, a person of slow comprehension Puncture lady: a southwestern expression for a woman who prefers to sit on the sidelines at a dance and gossip rather than dance, often puncturing someone's reputation Whether the entries are unexpected twists on familiar-sounding expressions or based on curious old customs, this wide-ranging assortment of vernacular Americanisms will amaze and amuse even the most hard-boiled curmudgeon.

Informal Leadership, Strategy and Organizational Change: The Power of Silent Authority (Routledge Focus on Business and Management)

by Brenetia J. Adams-Robinson

Across the spectrum of organizational operations, workplace interactions have proven to be one of the most difficult activities for leaders to manage effectively, especially during any level of change. In these circumstances, leadership strategies, especially related to change and leadership transition, consistently fail at an alarming rate. Additionally, employee engagement and team collaboration continue to be among the most elusive concepts for those in leadership to master. This book explores the influence of the informal leader on team member engagement during major change initiative in the organizational paradigm, with a special emphasis on leaders who are new to the team composite. This book examines the role of the informal leader in promoting or hindering team member engagement and organizational citizenship behaviors in change dynamics with a focus on change in the leadership structure and major initiatives. The relationship between the formal and informal leader is explored to assess impact on team interactions and capacity to effectively execute change strategies. This book provides critical information to aid in organizations achieving long-term success and will be of interest to researchers, academics, and students in the fields of leadership, organizational studies, strategy, and human resource management.

Informal Learning and Institution-wide Language Provision: University Language Learners in the 21st Century (New Language Learning and Teaching Environments)

by Denyze Toffoli

“Theoretically wise and practically powerful, this book is about how to take full advantage of advances in technology and the learner autonomy they afford, rather than simply adapt to or deny them. It issues a clarion call to language educators and administrators interested in building on recent advances in language learning via the informal avenues of digital communications.” --Mark Dressman, Professor Emeritus, University of Illinois at Urbana-Champaign, US, Professor and Chair of English at Khalifa University, UAE “This important and original book challenges us to rethink the design and delivery of the language learning opportunities universities provide for their students. Drawing on Complex Dynamic Systems Theory, Self-Determination Theory and her own empirical explorations of informal online language learning, Denyze Toffoli paints a portrait of today’s university language learner that is novel, unexpected and urgent.” --David Little, Fellow and Associate Professor Emeritus at Trinity College, IrelandThis book takes a fresh look at both context and the language learner in an attempt to shed light on the holistic and ever-changing system of the contemporary L2 speaker’s language development. Drawing on complex dynamic systems theory as a means to more fully understand the holistic nature of contemporary language learning, the author attempts to bridge the longstanding gap between formal language provision in Higher Education institutions, and more informal language acquisition achieved through activities such as listening to music, watching films and television, and playing games. Based on a theoretical understanding of the interplay between these contexts, contents and practices, the author offers suggestions concerning the shape of language centres in higher education and the role of teachers in readying the contemporary language learner for autonomous lifelong and lifewide language development. This book will be of particular interest to language teachers, teacher trainers, and higher education administrators.

Informantenschutz: Ethische, rechtliche und technische Praxis in Journalismus und Organisationskommunikation (Journalistische Praxis)

by Peter Welchering Manfred Kloiber

Die Kommunikation der B#65533;rger - vor allem im Internet - wird fl#65533;chendeckend kontrolliert und #65533;berwacht. Das stellt Journalistinnen und Journalisten vor gro#65533;e Herausforderungen: Wie k#65533;nnen sie die Kommunikation mit Informanten und Gew#65533;hrsleuten so absichern, dass sie Ihre Quelle nicht in Gefahr bringen? Wie sichert man Rechercheergebnisse vor Manipulation, Diebstahl oder Verlust? Das Buch beantwortet Fragen rund um die ethischen, rechtlichen und technischen Aspekte des Informantenschutzes. Nach der Lekt#65533;re k#65533;nnen die Leser wichtige Sicherungsma#65533;nahmen sofort umsetzen: Vom Verschl#65533;sseln der Festplatte bis hin zur stenografischen Sicherung wichtiger Informationen.

Information Architecture: For the Web and Beyond

by Peter Morville Louis Rosenfeld Jorge Arango

Information architecture (IA) is far more challenging—and necessary—than ever. With the glut of information available today, anything your organization wants to share should be easy to find, navigate, and understand. But the experience you provide has to be familiar and coherent across multiple interaction channels, from the Web to smartphones, smartwatches, and beyond.To guide you through this broad ecosystem, this popular guide—now in its fourth edition—provides essential concepts, methods, and techniques for digital design that have withstood the test of time. UX designers, product managers, developers, and anyone involved in digital design will learn how to create semantic structures that will help people engage with your message.This book includes:An overview of IA and the problems it solves for creating effective digital products and servicesA deep dive into IA components, including organization, labeling, navigation, search, and metadataProcesses and methods that take you from research to strategy, design, and IA implementation

Information Centric Networks: Architecture & Current Trends (Practical Networking)

by Hiren Kumar Sarma Nitul Dutta Rajendrasinh Jadeja Krishna Delvadia Gheorghita Ghinea

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.

Information Experience: The Strategy and Tactics of Design Thinking (SUNY series, Studies in Technical Communication)

by Craig Baehr

Information isn't simply read or used, rather it creates a holistic experience for users.Information Experience provides a usable framework for developing information products and design thinking practices for a wide range of projects, including application development, content creation, instructional materials, and user experience design. Whether content is created by human, machine, or artificial intelligence, memorable information experiences begin with the user, encompassing how user research, content development strategies, and design tactics fit together in creating engaging information experiences and products. The book provides an in-depth discussion of the components of information experience, including user perception, cognition, environment design, strategic branding, and tactical design. Collectively, these elements provide a foundation for understanding how information products function on a level beyond utility, as holistic and immersive experiences for users.

Information Hiding in Communication Networks

by Krzysztof Szczypiorski Sebastian Zander Amir Houmansadr Steffen Wendzel Wojciech Mazurczyk

Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. Highlights development trends and potential future directions of Information Hiding Introduces a new classification and taxonomy for modern data hiding techniques Presents different types of network steganography mechanisms Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services

Information Politics, Protests, and Human Rights in the Digital Age

by Mahmood Monshipouri

We live in a highly complex and evolving world that requires a fuller and deeper understanding of how modern technological tools, ideas, practices, and institutions interact, and how different societies adjust themselves to emerging realities of the digital age. This book conveys such issues with a fresh perspective and in a systematic and coherent way. While many studies have explained in depth the change in the aftermath of the unrests and uprisings throughout the world, they rarely mentioned the need for constructing new human rights norms and standards. This edited collection provides a balanced conceptual framework to demonstrate not only the power of autonomous communication networks but also their limits and the increasing setbacks they encounter in different contexts.

Information Science and Applications 2018: ICISA 2018 (Lecture Notes in Electrical Engineering #514)

by Kuinam J. Kim Nakhoon Baek

This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.

Information Science and Applications: ICISA 2019 (Lecture Notes in Electrical Engineering #621)

by Kuinam J. Kim Hye-Young Kim

This book presents selected papers from the 10th International Conference on Information Science and Applications (ICISA 2019), held on December 16–18, 2019, in Seoul, Korea, and provides a snapshot of the latest issues regarding technical convergence and convergences of security technologies. It explores how information science is at the core of most current research as well as industrial and commercial activities. The respective chapters cover a broad range of topics, including ubiquitous computing, networks and information systems, multimedia and visualization, middleware and operating systems, security and privacy, data mining and artificial intelligence, software engineering and web technology, as well as applications and problems related to technology convergence, which are reviewed and illustrated with the aid of case studies. Researchers in academia, industry, and at institutes focusing on information science and technology will gain a deeper understanding of the current state of the art in information strategies and technologies for convergence security. ​

Information Science and Applications: Proceedings of ICISA 2020 (Lecture Notes in Electrical Engineering #739)

by Kuinam J. Kim Hyuncheol Kim Suhyun Park

This book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.

Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders

by Susan E. McGregor

As technological and legal changes have hollowed out the protections that reporters and news organizations have depended upon for decades, information security concerns facing journalists as they report, produce, and disseminate the news have only intensified. From source prosecutions to physical attacks and online harassment, the last two decades have seen a dramatic increase in the risks faced by journalists at all levels even as the media industry confronts drastic cutbacks in budgets and staff. As a result, few professional or aspiring journalists have a comprehensive understanding of what is required to keep their sources, stories, colleagues, and reputations safe.This book is an essential guide to protecting news writers, sources, and organizations in the digital era. Susan E. McGregor provides a systematic understanding of the key technical, legal, and conceptual issues that anyone teaching, studying, or practicing journalism should know. Bringing together expert insights from both leading academics and security professionals who work at and with news organizations from BuzzFeed to the Associated Press, she lays out key principles and approaches for building information security into journalistic practice. McGregor draws on firsthand experience as a Wall Street Journal staffer, followed by a decade of researching, testing, and developing information security tools and practices. Filled with practical but evergreen advice that can enhance the security and efficacy of everything from daily beat reporting to long-term investigative projects, Information Security Essentials is a vital tool for journalists at all levels.

Information Security and Cryptology

by Moti Yung Dongdai Lin Xiaofeng Wang

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.

Information Security and Cryptology - ICISC 2015

by Soonhak Kwon Aaram Yun

This book constitutes the thoroughly refereedpost-conference proceedings of the 18th International Conference on InformationSecurity and Cryptology, ICISC 2015, held in Seoul, South Korea, in November2015. The 23 revised full papers presented were carefullyselected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applicationsin the field of information security and cryptology. They are grouped aroundthe following topics: digital signatures; public-key cryptography; block ciphercryptanalysis; elliptic curve cryptography; protocols; security; side-channelattacks.

Information Security and Cryptology -- ICISC 2013

by Hyang-Sook Lee Dong-Guk Han

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Information Security for Automatic Speaker Identification

by Fathi E. El-Samie

The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.

Information Seeking and Communicating Behavior of Scientists and Engineers

by Cynthia Steinke

This inspiring book addresses a topic that is far too often ignored or disregarded by sci-tech librarians: Exactly how do scientists and engineers really discover, select, and use the countless information and communications resources available to them when conducting research? The answer to this question should be a major influence on the way information specialists develop information systems in their libraries. Unfortunately, many librarians are not as familiar with the work, information needs, and communicating behavior of the research worker. Information Seeking and Communications Behavior of Scientists and Engineers looks at this question from several perspectives to give an overall view of how to best serve the needs of the scientific community.This book is an encouragement and a challenge to sci-tech librarians to make an ever greater effort to understand the work of their users, the differing information channels and sources they employ, and thus tailor the library’s systems and services to best support their information-seeking behavior.

Information Support and Aircraft Flight Management (Springer Aerospace Technology)

by Oleg Ivanovich Zavalishin Anatoly Nikolaevich Korotonoshko Dmitry Alexandrovich Zatuchny Yury Grigorievich Shatrakov

This book presents materials on the implementation of modern technologies for aircraft information support and ground-based radio equipment for flights in the Russian Federation, especially in the Arctic and far Eastern regions, as well as new methods for monitoring the flight of civil aviation aircraft based on the use of local control and correction stations and optical systems that fully meet the requirements of international and domestic organizations for the reliability and integrity of transmitted information. The book is intended for engineering and technical specialists involved in the development, manufacturing and operation of aircraft avionics and ground-based radio electronic flight support systems, as well as graduate students and senior students of radio engineering specialties. It is useful to researchers and professionals whose activities are related to air traffic control.

Information System Design: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 2 (Lecture Notes in Networks and Systems #1057)

by Vikrant Bhateja Dilip Kumar Sharma Zdzislaw Polkowski Jinshan Tang Afaq Ahmad

This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.

Information System Design: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 4 (Lecture Notes in Networks and Systems #1107)

by Vikrant Bhateja Zdzislaw Polkowski Milan Simic V. V. S. S. S. Chakravarthy Jinshan Tang

This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.

Information Systems Architecture and Technology: Part I (Advances in Intelligent Systems and Computing #1050)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem. Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems. This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections: Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing. Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling. Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Information Systems Architecture and Technology: Part II (Advances in Intelligent Systems and Computing #1051)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Information Systems Architecture and Technology: Part III (Advances in Intelligent Systems and Computing #1052)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Refine Search

Showing 7,076 through 7,100 of 18,673 results