Browse Results

Showing 14,326 through 14,350 of 61,729 results

Crisis and Escalation in Cyberspace

by Martin C. Libicki

The chances are growing that the United States will find itself in a crisis in cyberspace-the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. Such crises can be managed by taking steps to reduce the incentives for other states to step in, controlling the narrative, understanding the stability parameters of the crises, and recognizing escalation risks.

Crisis on the Coast and Hinterland: Assessing India’s East Coast with Geomorphological, Environmental and Remote Sensing and GIS Approaches

by Ashis Kumar Paul Anurupa Paul

This contributed volume assesses the state and future of India’s East Coast through a wide variety of chapters grouped by methodology and approach. Part I: Assessment through Geomorphological Approaches describes geomorphological diversities of the eastern shorelines of India, Coastal Modelling System- SMC and morphodynamics of Odisha coast, Paleo shorelines and beach ridge chenier formations of Subarnarekha delta, seasonal sediment budget of Chandrabhaga beachdune system, Beach stage and dune stage modelling Mandarmoni coast, drainage characters of South Andaman Islands, coastal foredune morphology and sediment of Odisha and West Bengal, Geo-archaeological pieces of evidence of ancient coastal environment, coastal sediment characters, beach ridge formation in the chenier coast, and geomorphological changes of ancient ports and harbours in the shoreline of West Bengal. Part II: Assessment through Environmental Approaches addresses various environmental assessment techniques of mangrove sensitivity to the sea level rise process in the Sundarban, land degradation of the hinterland drainage basins, the riparian environment of the coastal drainage basins, agricultural adaptability in response to climate variability in the coastal areas of West Bengal, forest degradations of the lateritic upland tracts, coastal tourism potentialities in Odisha and West Bengal, Climate variabilities and agricultural modifications in the hinterland areas of West Bengal districts, the tidal flat environment of Sagar Island, landforms and Geomorphosites for the promotion of Geotourism in South Andaman Perils of Premature Reclamation of Sundarban, marine litter in the coastal regions of West Bengal and Odisha on flora, fauna and humans, Ground water contamination due to saline water encroachment in coastal Andhra Pradesh and Spatio-temporal changes in the Hugli estuarine environment and coastal hazards and flood risk of southwestern Sundarban. Part III: Assessment through Remote Sensing & GIS Approaches uses the aforementioned techniques in service of exploration of monitoring health of Mangrove forest, Geomorphological analysis of the coral fringed coasts of Andaman, hydrological and morphological variations of Ichhamati Tidal estuary, multivariate analysis of coastal vulnerabilities, geography of tourism resources in Andaman group of islands, tourism climate index with application geospatial techniques, diversity of landscape ecology in the coastal blocks of Purba Medinipur, overwash vulnerability in Odisha coast, livelihood security index of the coastal communities, managing coastal squeeze response and wetland loss in the estuarine coastal tract of West Bengal, environmental effects of historical land reclamation process in the Sundarban, and emerging environmental problems of coastal urbanization in Digha, Kanthi, and Haldia.

Critical Code Studies: Initial Methods (Software Studies)

by Mark C. Marino

An argument that we must read code for more than what it does—we must consider what it means.Computer source code has become part of popular discourse. Code is read not only by programmers but by lawyers, artists, pundits, reporters, political activists, and literary scholars; it is used in political debate, works of art, popular entertainment, and historical accounts. In this book, Mark Marino argues that code means more than merely what it does; we must also consider what it means. We need to learn to read code critically. Marino presents a series of case studies—ranging from the Climategate scandal to a hactivist art project on the US-Mexico border—as lessons in critical code reading.Marino shows how, in the process of its circulation, the meaning of code changes beyond its functional role to include connotations and implications, opening it up to interpretation and inference—and misinterpretation and reappropriation. The Climategate controversy, for example, stemmed from a misreading of a bit of placeholder code as a “smoking gun” that supposedly proved fabrication of climate data. A poetry generator created by Nick Montfort was remixed and reimagined by other poets, and subject to literary interpretation.Each case study begins by presenting a small and self-contained passage of code—by coders as disparate as programming pioneer Grace Hopper and philosopher Friedrich Kittler—and an accessible explanation of its context and functioning. Marino then explores its extra-functional significance, demonstrating a variety of interpretive approaches.

Critical Code: Software Producibility for Defense

by National Research Council of the National Academies

Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. Building on two prior books--Summary of a Workshop on Software Intensive Systems and Uncertainty at Scale and Preliminary Observations on DoD Software Research Needs and Priorities--the present volume assesses the nature of the national investment in software research and, in particular, considers ways to revitalize the knowledge base needed to design, produce, and employ software-intensive systems for tomorrow's defense needs. Critical Code discusses four sets of questions: To what extent is software capability significant for the DoD? Is it becoming more or less significant and strategic in systems development? Will the advances in software producibility needed by the DoD emerge unaided from industry at a pace sufficient to meet evolving defense requirements? What are the opportunities for the DoD to make more effective use of emerging technology to improve software capability and software producibility? In which technology areas should the DoD invest in research to advance defense software capability and producibility?

Critical Conditions: Addressing Education Emergencies Through Integrated Student Supports

by Elaine Weiss Bruce Levine Kimberly Sterin

A proactive, ground-level approach to student support that helps ameliorate the effects of socioeconomic challenges and improves outcomes for students, families, and communities

Critical Data Literacies: Rethinking Data and Everyday Life

by Neil Selwyn Luci Pangrazio

A guide to everything you need to understand to navigate a world increasingly governed by data.Data has become a defining issue of current times. Our everyday lives are shaped by the data that is produced about us (and by us) through digital technologies. In this book, Critical Data Literacies, Luci Pangrazio and Neil Selwyn introduce readers to the central concepts, ideas, and arguments required to make sense of life in the data age. The authors challenge the idea that datafication is an inevitable and inescapable condition. Drawing on emerging areas of scholarship such as data justice, data feminism, and other critical data studies approaches, they explore how individuals and communities can empower themselves to engage with data critically and creatively.Over the course of eight wide-ranging chapters, the book introduces readers to the main components of critical data literacies—from the fundamentals of identifying and understanding data to the complexities of engaging with more combative data tactics. Critical Data Literacies explores how the tradition of critical literacies can offer a powerful foundation to address the big concerns of the data age, such as issues of data justice and privacy, algorithmic bias, dataveillance, and disinformation. Bringing together cutting-edge thinking and discussion from across education, sociology, psychology, and media and communication studies, Critical Data Literacies develops a powerful argument for collectively rethinking the role that data plays in our everyday lives and re-establishing agency, free will, and the democratic public sphere.

Critical Data Studies: An A to Z Guide to Concepts and Methods

by Rob Kitchin

Critical Data Studies has come of age as a vibrant, interdisciplinary field of study. Taking data as its primary analytical focus, the field theorises the nature of data; examines how data are produced, managed, governed and shared; investigates how they are used to make sense of the world and to perform practical action; and explores whose agenda data-driven systems serve.This book is the first comprehensive A-Z guide to the concepts and methods of Critical Data Studies, providing succinct definitions and descriptions of over 400 key terms, along with suggested further reading. The book enables readers to quickly navigate and improve their comprehension of the field, while also acting as a guide for discovering ideas and methods that will be of value in their own studies. Critical Data Studies is essential reading for students and scholars from across the sciences, social sciences and humanities, as well as those who work with data professionally who want to extend and enrich their conceptual and practical understanding of data and their use.This will be available as an Open Access book.

Critical Digital Humanities: The Search for a Methodology (Topics in the Digital Humanities)

by James E Dobson

Can established humanities methods coexist with computational thinking? It is one of the major questions in humanities research today, as scholars increasingly adopt sophisticated data science for their work. <P><P>James E. Dobson explores the opportunities and complications faced by humanists in this new era. Though the study and interpretation of texts alongside sophisticated computational tools can serve scholarship, these methods cannot replace existing frameworks. <P><P>As Dobson shows, ideas of scientific validity cannot easily nor should be adapted for humanities research because digital humanities, unlike science, lack a leading-edge horizon charting the frontiers of inquiry. <P><P>Instead, the methods of digital humanities require a constant rereading. At the same time, suspicious and critical readings of digital methodologies make it unwise for scholars to defer to computational methods. <P><P>Humanists must examine the tools--including the assumptions that went into the codes and algorithms--and questions surrounding their own use of digital technology in research. <P><P>Insightful and forward thinking, Critical Digital Humanities lays out a new path of humanistic inquiry that merges critical theory and computational science.

Critical Digital Pedagogy in Higher Education (Issues in Distance Education)

by George Veletsianos Chris Rowell Suzan Köseoğlu

Recent efforts to solve the problems of education—created by neoliberalism in and out of higher education—have centred on the use of technology that promises efficiency, progress tracking, and automation. The editors of this volume argue that using technology in this way reduces learning to a transaction. They ask administrators, instructors, and learning designers to reflect on our relationship with these tools and explore how to cultivate a pedagogy of care in an online environment. With an eye towards identifying different and better possibilities, this collection investigates previously under-examined concepts in the field of digital pedagogy such as shared learning and trust, critical consciousness, change, and hope.

Critical Fabulations: Reworking the Methods and Margins of Design (Design Thinking, Design Theory)

by Daniela K Rosner

A proposal to redefine design in a way that not only challenges the field's dominant paradigms but also changes the practice of design itself.In Critical Fabulations, Daniela Rosner proposes redefining design as investigative and activist, personal and culturally situated, responsive and responsible. Challenging the field's dominant paradigms and reinterpreting its history, Rosner wants to change the way we historicize the practice, reworking it from the inside. Focusing on the development of computational systems, she takes on powerful narratives of innovation and technology shaped by the professional expertise that has become integral to the field's mounting status within the new industrial economy. To do so, she intervenes in legacies of design, expanding what is considered “design” to include long-silenced narratives of practice, and enhancing existing design methodologies based on these rediscovered inheritances. Drawing on discourses of feminist technoscience, she examines craftwork's contributions to computing innovation—how craftwork becomes hardware manufacturing, and how hardware manufacturing becomes craftwork. She reclaims, for example, NASA's “Little Old Ladies,” the women who built information storage for the Apollo missions by weaving wires through magnetized metal rings.Mixing history, theory, personal experience, and case studies, Rosner reweaves fibers of technoscience by slowly reworking the methods and margins of design. She suggests critical fabulations as ways of telling stories that awaken alternative histories, and offers a set of techniques and orientations for fabulating its future. Critical Fabulations shows how design's hidden inheritances open different possibilities for practice.

Critical Factors for Adoption of Customer Relationship Management: A Study of Palestine SMEs (SpringerBriefs in Business)

by Nur Fazidah Elias Hazura Mohamed Omar Hasan Salah Zawiyah Mohammad Yusof

This book explores the challenges in adopting customer relationship management (CRM) models in developing countries, with a focus on Palestine. Examining the cultural, organizational, and technological contexts, it reveals how these factors create adoption gaps, impacting customer pressure, employee engagement, and security. The narrative, enriched by real-world examples from Palestine, underscores the unique hurdles faced by firms in such environments. Emphasizing the central role of customers in business, the book delves into the initiatives many firms take to enhance customer services, target profitable segments, and improve acquisition and retention. However, in developing nations, these efforts encounter distinctive challenges. The book offers a practical CRM model tailored to the specific needs of small and medium-sized enterprises (SMEs), illustrating how technology can elevate competitiveness. With a strategic perspective, it positions CRM as a catalyst for SMEs to navigate the complexities of the dynamic economy, providing actionable insights for professionals, scholars, and business management students. This comprehensive guide encapsulates the nuances of CRM adoption, making it an invaluable resource for those seeking sustainable growth in developing country contexts.

Critical Gaming: Interactive History and Virtual Heritage (Digital Research in the Arts and Humanities)

by Erik Champion

This book explains how designing, playing and modifying computer games, and understanding the theory behind them, can strengthen the area of digital humanities. This book aims to help digital humanities scholars understand both the issues and also advantages of game design, as well as encouraging them to extend the field of computer game studies, particularly in their teaching and research in the field of virtual heritage. By looking at re-occurring issues in the design, playtesting and interface of serious games and game-based learning for cultural heritage and interactive history, this book highlights the importance of visualisation and self-learning in game studies and how this can intersect with digital humanities. It also asks whether such theoretical concepts can be applied to practical learning situations. It will be of particular interest to those who wish to investigate how games and virtual environments can be used in teaching and research to critique issues and topics in the humanities, particularly in virtual heritage and interactive history.

Critical Hits: Writers Playing Video Games

by J. Robert Lennon Carmen Maria Machado

From the earliest computers to the smartphones in our pockets, video games have been on our screens and part of our lives for over fifty years. Critical Hits celebrates this sophisticated medium and considers its lasting impact on our culture and ourselves. This collection of stylish, passionate, and searching essays opens with an introduction by Carmen Maria Machado, who edited the anthology alongside J. Robert Lennon. In these pages, writer-gamers find solace from illness and grief, test ideas about language, bodies, power, race, and technology, and see their experiences and identities reflected in―or complicated by―the interactive virtual worlds they inhabit. Elissa Washuta immerses herself in The Last of Us during the first summer of the pandemic. Nana Kwame Adjei-Brenyah describes his last goodbye to his father with the help of Disco Elysium. Jamil Jan Kochai remembers being an Afghan American teenager killing Afghan insurgents in Call of Duty. Also included are a comic by MariNaomi about her time as a video game producer; a deep dive into “portal fantasy” movies about video games by Charlie Jane Anders; and new work by Alexander Chee, Hanif Abdurraqib, Larissa Pham, and many more.

Critical Incident Management

by Alan B. Sterneckert

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they have taken to secure people, information and infrastructure from outside attacks are inefficient or incomplete. Responding to security threats and incidents requires a competent

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues

by Committee on Critical Information Infrastructure Protection

All critical infrastructures are increasingly dependent on the information infrastructure for information management, communications, and control functions. Protection of the critical information infrastructure (CIIP), therefore, is of prime concern. To help with this step, the National Academy of Engineering asked the NRC to assess the various legal issues associated with CIIP. These issues include incentives and disincentives for information sharing between the public and private sectors, and the role of FOIA and antitrust laws as a barrier or facilitator to progress. The report also provides a preliminary analysis of the role of criminal law, liability law, and the establishment of best practices, in encouraging various stakeholders to secure their computer systems and networks.

Critical Information Infrastructures Security: 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9578)

by Marianthi Theocharidou Erich Rome Stephen Wolthusen

This book constitutesrevised selected papers from the 10th International Conference on CriticalInformation Infrastructures Security, CRITIS 2015, held in Berlin, Germany, inOctober 2015. The 18 full and 6short papers presented in this volume were carefully reviewed and selected from54 submissions. They are organized in topical sections named: critical informationinfrastructure protection; critical infrastructure resilience assessment; emergencymanagement: critical infrastructure preparedness; modelling, simulation and analysisapproaches; electric grid protection and resilience; and CIPRNet young CRITIS awardcandidate papers.

Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10242)

by Stephen Wolthusen Roberto Setola Grigore Havarneanu Hypatia Nassopoulos

This volume contains the proceedings of the Third International Workshop on Critical Information Infrastructure Security (CRITIS 2008), which was held - tober 13-15, 2008 in Villa Mondragone (Rome), Italy, and was co-organized by AIIC (The Italian Society of Critical Infrastructures Experts) and ENEA (The Italian National Agency for New Technology, Energy and the Environment). This year's workshop was focused on an interdisciplinary and multifaced - alogue about the third millennium security strategies for critical information infrastructures (CII) and their protection (CIP). The aim was to explore the new challenges posed by the CII, bringing together researchersand professionals from universities, private companies and public administrations interested in all security-related aspects, and actively involved in the scienti?c communities at a national, European and trans-European level. More than 70 papers were submitted to the conference, which were screened by a very selective double-blind review process to identify the 39 papers selected for presentation, based on their signi?cance, novelty and technical quality. - visions were not checked and the authors bear full responsibility for the content of their papers. CRITIS 2008 also had six outstanding invited speakers: Erol Gelenbe (- perial College, UK), Massoud Amin (University of Minnesota, USA), George Apostolakis(MIT, USA), AndreaValboni(Microsoft, Italy), SujeetShenoi(U- versity of Tulsa, USA) and Angelo Marino (DG Information Society and Media, European Commission).

Critical Information Infrastructures Security: 12th International Conference, Critis 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10707)

by Gregorio D'Agostino Antonio Scala

This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017. The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.

Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11260)

by Eric Luiijf Inga Žutautaitė Bernhard M. Hämmerli

This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.The 16 full papers and 3 short papers presented were carefully reviewed and selected from 61 submissions. They are grouped in the following topical sections: advanced analysis of critical energy systems, strengthening urban resilience, securing internet of things and industrial control systems, need and tool sets for industrial control system security, and advancements in governance and resilience of critical infrastructures.

Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11777)

by Simin Nadjm-Tehrani

This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linköping, Sweden, in September 2019.The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports.

Critical Information Infrastructures Security: 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings (Lecture Notes in Computer Science #12332)

by Awais Rashid Peter Popov

This book constitutes the revised selected papers of the 15th International Conference on Critical Information Infrastructures Security, CRITIS 2020, held in Bristol, UK*, in September 2020. The 5 full papers and 1 short paper presented were carefully reviewed and selected from 17 submissions. They are grouped in the following topical sections: invited papers, attacks and vulnerabilities, threat modelling and monitoring, and networks and IoT. *The conference was held virtually due to the COVID-19 pandemic.

Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13139)

by Dimitri Percia David Alain Mermoud Thomas Maillart

This book constitutes the refereed proceedings of the 16th International Conference on Critical Information Infrastructures Security, CRITIS 2021, which took place in Lausanne, Switzerland, during September 27-29, 2021.The 12 full papers included in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services.

Critical Information Infrastructures Security: 17th International Conference, CRITIS 2022, Munich, Germany, September 14–16, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13723)

by Stefan Pickl Bernhard Hämmerli Leonhard Kunczik Wolfgang Hommel Udo Helmbrecht

This book constitutes the refereed proceedings of the 17th International Conference on Critical Information Infrastructures Security, CRITIS 2022, which took place in Munich, Germany, during September 14–16, 2022.The 16 full papers and 4 short papers included in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services.

Critical Information Infrastructures Security: 18th International Conference, CRITIS 2023, Helsinki Region, Finland, September 13–15, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14599)

by Stefan Pickl Bernhard Hämmerli Päivi Mattila Annaleena Sevillano

This book constitutes the refereed proceedings of the 18th International Conference on Critical Information Infrastructures Security, CRITIS 2023, held in Helsinki region, Finland, during September 13–15 2023. The 13 full papers and 3 short papers and one Paper in Progress were carefully selected from 25 submissions. The conference addressed four scientific focus areas, namely information, infrastructures, security and hybrid threats in an interdisciplinary manner and specifically in the context-based analyses and complex optimization methods.

Critical Information Infrastructures Security: 19th International Conference, CRITIS 2024, Rome, Italy, September 18–20, 2024, Revised Selected Papers (Lecture Notes in Computer Science #15549)

by Bernhard Hämmerli Federica Pascucci Gabriele Oliva Stefano Panzieri Luca Faramondi

This book constitutes the refereed proceedings of the 19th International Conference on Critical Information Infrastructures Security, CRITIS 2024, held in Rome, Italy, during September 18–20, 2024. The 24 full papers were included in this volume were carefully reviewed and selected from 32 submissions. The presentations mainly revolved around cyber security, cyber-physical systems, climate change and natural threats.

Refine Search

Showing 14,326 through 14,350 of 61,729 results