Browse Results

Showing 48,176 through 48,200 of 61,625 results

Rick Sammon's HDR Secrets for Digital Photographers

by Rick Sammon

Top photographer Rick Sammon shares his greatest HDR tips and tricksHigh Dynamic Range (HDR) photography is a process in which a photographer shoots multiple shots of the same subject at varying exposure settings and then "stitches" the images together with photo-editing software into a single photo that presents sharper color and focus than a single image. World-renowned digital photographer and Canon Explorer of Light Rick Sammon reveals his most amazing HDR tips, tricks, and techniques for creating the best possible HDR images.Packed with more than 150 of Sammon's stunning full-color photos and more than 200 techniques, this invaluable guide inspires and motivates you to capture and edit your own unique still-life images.World-renowned digital photographer and Canon Explore of Light Rick Sammon reveals a wealth of unparalleled High Dynamic Range (HDR) tips, tricks, and techniquesInspires both amateur and experienced photographers to boost their creativity, and improve the quality of their images in the digital darkroomFeatures more than 150 beautiful images from Sammon's own portfolio as well as more than 200 tips and tricks for shooting and editing HDR imagesHDR Secrets for Digital Photographers unveils an abundance of tips and tricks that will help you make your good HDR photos great.

Riding the Wave: Applying Project Management Science in the Field of Emergency Management (ISSN)

by Andrew Boyarsky

Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and intensity of hazards, threats, and community vulnerabilities. Much of the work that falls into the scope of emergency managers – prevention, preparedness, mitigation – is “blue sky planning” and can be contained and effectively managed within projects. This book provides a foundational project management methodology relevant to emergency management practice, and explains and demonstrates how project management can be applied in the context of emergency and public safety organizations.Special features include: an initial focus on risk assessment and identification of mitigation and response planning measures; a clear set of better practices, using a diverse set of examples relevant to today’s emergency environment, from projects to develop emergency response exercises to application development to hazard mitigation; a framework for managing projects at a strategic level and how to incorporate this into an organization’s program, and presents how to develop and manage an emergency program and project portfolio; and suitability as both a hands-on training guide for emergency management programs and a textbook for academic emergency management programs. This book is intended for emergency managers and public safety professionals who are responsible for developing emergency programs and plans, including training courses, job aids, computer applications and new technology, developing exercises, and for implementing these plans and components in response to an emergency event. This audience includes managers in emergency and first response functions such as fire protection, law enforcement and public safety, emergency medical services, public health and healthcare, sanitation, public works, business continuity managers, crisis managers, and all managers in emergency support functions as described by FEMA. This would include those who have responsibility for emergency management functions, even without the related title.

Riemannian Computing in Computer Vision

by Anuj Srivastava Pavan K. Turaga

This book presents a comprehensive treatise on Riemannian geometric computations and related statistical inferences in several computer vision problems. This edited volume includes chapter contributions from leading figures in the field of computer vision who are applying Riemannian geometric approaches in problems such as face recognition, activity recognition, object detection, biomedical image analysis, and structure-from-motion. Some of the mathematical entities that necessitate a geometric analysis include rotation matrices (e. g. in modeling camera motion), stick figures (e. g. for activity recognition), subspace comparisons (e. g. in face recognition), symmetric positive-definite matrices (e. g. in diffusion tensor imaging), and function-spaces (e. g. in studying shapes of closed contours).

Rig it Right! Maya Animation Rigging Concepts, 2nd edition

by Tina O'Hailey

Rig it Right! breaks down rigging so that you can achieve a fundamental understanding of the concept. The author will get you up and rigging with step-by-step tutorials covering multiple animation control types, connection methods, interactive skinning, BlendShapes, edgeloops, and joint placement, to name a few. The concept of a bi-ped is explored as a human compared to a bird character allowing you to see that a bi-ped is a bi-ped and how to problem solve for the limbs at hand. Rig it Right! will take you to a more advanced level where you will learn how to create stretchy rigs with invisible control systems and use that to create your own types of rigs. <P><P>Key Features <li>Hone your skills every step of the way with short tutorials and editable rigs that accompany each chapter. (17+ rigs!!). <li>Read "Tina’s 10 Rules of Rigging" and build the foundational knowledge needed to successfully rig your characters. <li>Visit the companion website and expand your newfound knowledge with editable rigs, exercises, and videos that elaborate on techniques covered in the book. <li>Companion data filled with example files at http://routledgetextbooks.com/textbooks/_author/ohailey/ <li>AR(Augmented Reality) enabled images throughout the book! <li>Coffee is not required – but encouraged.

Rig it Right!: Maya Animation Rigging Concepts

by Tina O'Hailey

Rig It Right! breaks down rigging so that you can achieve a fundamental understanding of the concept. The author will get you up and rigging with step-by-step tutorials covering multiple animation control types, connection methods, interactive skinning, BlendShapes, edgeloops, and joint placement, to name a few. The concept of a biped is explored as a human compared to a bird character allowing you to see that a biped is a biped and how to problem solve for the limbs at hand. Rig It Right! will take you to a more advanced level where you will learn how to create stretchy rigs with invisible control systems and use that to create your own types of rigs.This highly anticipated Third Edition features updated chapters and images, including new chapters on modeling with proper edgeloop (Rule #1!), how to Rig It Right then Rig it Fast with parallel processing, and new helpful scripts for evaluating your rig with the profiler tools.Key Features Hone your skills every step of the way with short tutorials and editable rigs that accompany each chapter (17+ rigs!!) Read "Tina’s 10 Rules of Rigging" and build the foundational knowledge needed to successfully rig your characters New content: Edgeloops for Good Deformation and Rigging for a Parallel World New scripts for evaluating your rigs’ performance Access the Support Materials and expand your newfound knowledge with editable rigs, exercises, and videos that elaborate on techniques covered in the book

Rigged: America, Russia, and One Hundred Years of Covert Electoral Interference

by David Shimer

"This pioneering and judicious history of foreign intervention in elections should be read by everyone who wants to defend democracy now." --Timothy Snyder, author of On TyrannyThe definitive account of covert operations to influence elections from the Cold War to 2016, why the threat to American democracy is greater than ever in 2020, and what we can do about it.Russia's interference in 2016 marked only the latest chapter of a hidden and revelatory history. In Rigged, David Shimer tells the sweeping story of covert electoral interference past and present. He exposes decades of secret operations--by the KGB, the CIA, and Vladimir Putin's Russia--to shape electoral outcomes, melding deep historical research with groundbreaking interviews with more than 130 key players, from leading officials in both the Trump and Obama administrations, to CIA and NSA directors, to a former KGB general.What Americans should make of Russia's attack in 2016 is still hotly debated, even after the Mueller report and years of media coverage. Shimer shows that Putin's operation was, in fact, a continuation of an ongoing struggle, using familiar weapons radically enhanced by new technology. Throughout history and in 2016, both Russian and American operations achieved their greatest success by influencing the way voters think, rather than tampering with actual vote tallies.Casting aside partisanship and sensationalism, Rigged reveals new details about what Russia achieved in 2016, how the Obama administration responded, and why Putin has also been interfering covertly in elections across the globe in recent years, while American presidents have largely refrained from doing so. Shimer also makes disturbingly clear that this type of intrusion can be used to harm Democrats and Republicans alike. Russia's central aim is to undermine and disrupt our democracy, to the detriment of all Americans.Understanding 2016 as one battle in a much longer war is essential to understanding the critical threat currently posed to America's electoral sovereignty and how to defend against it. Illuminating how the lessons of the past can be used to protect our democracy in the future, Rigged is an essential book for readers of every political persuasion.

Rigged: How the Media, Big Tech, and the Democrats Seized Our Elections

by Mollie Hemingway

FROM THE AUTHOR OF THE #1 NATIONAL BESTSELLER JUSTICE ON TRIAL Stunned by the turbulence of the 2020 election, millions of Americans are asking the forbidden question: what really happened? It was a devastating triple punch. Capping their four-year campaign to destroy the Trump presidency, the media portrayed a Democratic victory as necessary and inevitable. Big Tech, wielding unprecedented powers, vaporized dissent and erased damning reports about the Biden family's corruption. And Democratic operatives, exploiting a public health crisis, shamelessly manipulated the voting process itself. Silenced and subjected, the American people lost their faith in the system. RIGGED is the definitive account of the 2020 election. Based on Mollie Hemingway's exclusive interviews with campaign officials, reporters, Supreme Court justices, and President Trump himself, it exposes the fraud and cynicism behind the Democrats' historic power-grab. Rewriting history is a specialty of the radical left, now in control of America's political and cultural heights. But they will have to contend with the determination, insight, and eloquence of Mollie Hemingway. RIGGED is a reminder for weary patriots that truth is still the most powerful weapon. The stakes for our democracy have never been higher.

Rigging for Games: A Primer for Technical Artists Using Maya and Python

by Eyal Assaf

Rigging for Games: A Primer for Technical Artists Using Maya and Python is not just another step-by-step manual of loosely related tutorials. Using characters from the video game Tin, it takes you through the real-world creative and technical process of rigging characters for video games and cinematics, allowing readers a complete inside look at a single project. You’ll explore new ways to write scripts and create modular rigs using Maya and Python, and automate and speed up the rigging process in your creative pipeline. Finally, you’ll learn the most efficient ways of exporting your rigs into the popular game engine Unity. This is the practical, start-to-finish rigging primer you’ve been waiting for! Enhance your skillset by learning how to efficiently rig characters using techniques applicable to both games and cinematics Keep up with all the action with behind-the-scenes images and code scripts Refine your rigging skills with tutorials and project files available on the companion website

Rights for Intelligent Robots?: A Philosophical Inquiry into Machine Moral Status

by Kęstutis Mosakas

In recent years, the question of human moral duties toward robots has gained momentum in scholarly research due to great advancements in the fields of artificial intelligence (AI) and robotics. Although the current machines fall short of the level of sophistication and human likeness portrayed in science fiction (e.g., the Westworld series or the movie Blade Runner 2049), they are increasingly assuming roles in our society in various important areas, including manufacturing, healthcare, education, customer service, entertainment, and many others. This book makes a meaningful contribution to the ongoing philosophical discourse surrounding the moral treatment of robots. By providing a rigorous and systematic examination of key moral concepts (e.g., moral rights, moral status, moral considerability, and moral value) within the context of robotics and exploring other closely related issues (e.g., the moral implications of artificial consciousness and the associated epistemic challenges), this book offers fresh insights into the necessary and sufficient conditions for machine moral status and rights.

Rights for Robots: Artificial Intelligence, Animal and Environmental Law

by Joshua C. Gellers

Bringing a unique perspective to the burgeoning ethical and legal issues surrounding the presence of artificial intelligence in our daily lives, the book uses theory and practice on animal rights and the rights of nature to assess the status of robots. Through extensive philosophical and legal analyses, the book explores how rights can be applied to nonhuman entities. This task is completed by developing a framework useful for determining the kinds of personhood for which a nonhuman entity might be eligible, and a critical environmental ethic that extends moral and legal consideration to nonhumans. The framework and ethic are then applied to two hypothetical situations involving real-world technology—animal-like robot companions and humanoid sex robots. Additionally, the book approaches the subject from multiple perspectives, providing a comparative study of legal cases on animal rights and the rights of nature from around the world and insights from structured interviews with leading experts in the field of robotics. Ending with a call to rethink the concept of rights in the Anthropocene, suggestions for further research are made. An essential read for scholars and students interested in robot, animal and environmental law, as well as those interested in technology more generally, the book is a ground-breaking study of an increasingly relevant topic, as robots become ubiquitous in modern society.

Rigor in the Remote Learning Classroom: Instructional Tips and Strategies

by Barbara R. Blackburn

Learn how to keep the rigor and motivation alive in a remote learning or hybrid K–12 classroom. In this essential book, bestselling author Barbara R. Blackburn shares frameworks and tools to help you move online without compromising the rigor of your instruction. You’ll learn… how to create a remote culture of high expectations; how to scaffold so students reach higher levels of learning; how to have students collaborate in different settings; and how to provide virtual feedback and deliver effective assessments. You’ll also discover how common activities, such as virtual field trips, can lack rigor without critical thinking prompts. The book provides practical strategies you can implement immediately to help all students reach higher levels of success.

Rigorous Software Development

by Maria João Frade Jorge Sousa Pinto José Bacelar Almeida Simão Melo de Sousa

The use of mathematical methods in the development of software is essential when reliable systems are sought; in particular they are now strongly recommended by the official norms adopted in the production of critical software. Program Verification is the area of computer science that studies mathematical methods for checking that a program conforms to its specification. This text is a self-contained introduction to program verification using logic-based methods, presented in the broader context of formal methods for software engineering. The idea of specifying the behaviour of individual software components by attaching contracts to them is now a widely followed approach in program development, which has given rise notably to the development of a number of behavioural interface specification languages and program verification tools. A foundation for the static verification of programs based on contract-annotated routines is laid out in the book. These can be independently verified, which provides a modular approach to the verification of software. The text assumes only basic knowledge of standard mathematical concepts that should be familiar to any computer science student. It includes a self-contained introduction to propositional logic and first-order reasoning with theories, followed by a study of program verification that combines theoretical and practical aspects - from a program logic (a variant of Hoare logic for programs containing user-provided annotations) to the use of a realistic tool for the verification of C programs (annotated using the ACSL specification language), through the generation of verification conditions and the static verification of runtime errors.

Rigorous State-Based Methods: 10th International Conference, ABZ 2024, Bergamo, Italy, June 25–28, 2024, Proceedings (Lecture Notes in Computer Science #14759)

by Patrizia Scandurra Elvinia Riccobene Michael Leuschel Angelo Gargantini Silvia Bonfanti

This book constitutes the refereed proceedings of the 10th International Conference on Rigorous State-Based Methods, ABZ 2024, held in Bergamo, Italy, during June 25–28, 2024. The 29 papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: research papers; short research papers; case study; doctoral symposium.

Rigorous State-Based Methods: 7th International Conference, ABZ 2020, Ulm, Germany, May 27–29, 2020, Proceedings (Lecture Notes in Computer Science #12071)

by Alexander Raschke Dominique Méry Frank Houdek

This book constitutes the refereed proceedings of the 7th International Conference on Rigorous State-Based Methods, ABZ 2020, which was due to be held in Ulm, Germany, in May 2020. The conference was cancelled due to the COVID-19 pandemic. The 12 full papers and 9 short papers were carefully reviewed and selected from 61 submissions. They are presented in this volume together with 2 invited papers, 6 PhD-Symposium-contributions, as well as the case study and 6 accepted papers outlining solutions to it. The papers are organized in the following sections: keynotes and invited papers; regular research articles; short articles; articles contributing to the case study; short articles of the PhD-symposium (work in progress).

Rigorous State-Based Methods: 8th International Conference, ABZ 2021, Ulm, Germany, June 9–11, 2021, Proceedings (Lecture Notes in Computer Science #12709)

by Alexander Raschke Dominique Méry

This book constitutes the proceedings of the 8th International Conference on Rigorous State-Based Methods, ABZ 2021, which was planned to take place in Ulm, Germany, during June 6-11, 2021. The conference changed to an online format due to the COVID-19 pandemic. The 6 full and 8 short papers included in this volume were carefully reviewed and selected from 18 submissions. The proceedings also include 3 PhD symposium contributions. They deal with state-based and machine-based formal methods, mainly Abstract State Machines (ASM), Alloy, B, TLA+, VDM, and Z.

Ripple Quick Start Guide: Get started with XRP and develop applications on Ripple's blockchain

by Febin John James

Learn to work with XRP and build applications on Ripple's blockchain Key Features Learn to use Ripple's decentralized system for transfering digital assets globally A simpilfied and shortened learning curve to understand the Ripple innovation and Blockchain Takes a hands-on approach to work with XRP – Ripple's native currency Book Description This book starts by giving you an understanding of the basics of blockchain and the Ripple protocol. You will then get some hands-on experience of working with XRP. You will learn how to set up a Ripple wallet and see how seamlessly you can transfer money abroad. You will learn about different types of wallets through which you can store and transact XRP, along with the security precautions you need to take to keep your money safe. Since Ripple is currency agnostic, it can enable the transfer of value in USD, EUR, and any other currency. You can even transfer digital assets using Ripple. You will see how you can pay an international merchant with their own native currency and how Ripple can exchange it on the ?y. Once you understand the applications of Ripple, you will learn how to create a conditionally-held escrow using the Ripple API, and how to send and cash checks. Finally, you will also understand the common misconceptions people have about Ripple and discover the potential risks you must consider before making investment decisions. By the end of this book, you will have a solid foundation for working with Ripple's blockchain. Using it, you will be able to solve problems caused by traditional systems in your respective industry. What you will learn Understand the fundamentals of blockchain and Ripple Learn how to choose a Ripple wallet Set up a Ripple wallet to send and receive XRP Learn how to protect your XRP Understand the applications of Ripple Learn how to work with the Ripple API Learn how to build applications on check and escrow features of Ripple Who this book is for This book is for anyone interested in getting their hands on Ripple technology and learn where it can be used to gain competitive advantages in their respective fields. For most parts of the book, you need not have any pre-requisite knowledge. However, you need to have basic background of JavaScript to write an escrow.

Ripple-Down Rules: The Alternative to Machine Learning

by Byeong Ho Kang Paul Compton

"In this era of deep learning, where is our deeper understanding of AI? The answer is, here, in this book. Compton and Kang's ideas are a ‘must-read’ for anyone working with AI. Based on examples of real-world applications, they show us a better way to use AI. If your AI models are confusing to understand and hard to maintain, then this book is for you." Tim Menzies, Professor, North Carolina State University Machine learning algorithms hold extraordinary promise, but the reality is that their success depends entirely on the suitability of the data available. This book is about Ripple-Down Rules (RDR), an alternative manual technique for rapidly building AI systems. With a human in the loop, RDR is much better able to deal with the limitations of the data. Ripple-Down Rules: The Alternative to Machine Learning starts by reviewing the problems with data quality and the problems with conventional approaches to incorporating expert human knowledge into AI systems. It suggests that problems with knowledge acquisition arise because of mistaken philosophical assumptions about knowledge. It argues people never really explain how they reach a conclusion, rather they justify their conclusion by differentiating between cases in a context. RDR is based on this more situated understanding of knowledge. The central features of a RDR approach are explained, and detailed worked examples are presented for different types of RDR, based on freely available software developed for this book. The examples ensure developers have a clear idea of the simple yet counter-intuitive RDR algorithms to easily build their own RDR systems. It has been proven in industrial applications that it takes only a minute or two per rule to build RDR systems with perhaps thousands of rules. The industrial uses of RDR have ranged from medical diagnosis through data cleansing to chatbots in cars. RDR can be used on its own or to improve the performance of machine learning or other methods.

Rise of the Machines: A Cybernetic History

by Thomas Rid

A sweeping history of our deep entanglement with technology. As lives offline and online merge even more, it's easy to forget how we got here. Rise of the Machines reclaims the spectacular story of cybernetics, a control theory of man and machine. In a history that unpacks one of the twentieth century's pivotal ideas, Thomas Rid delivers a thought-provoking portrait of our technology-enraptured era. Springing from the febrile mind of mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision underpinned a host of seductive myths about the future of machines. This vision would radically transform the postwar world, ushering in sweeping cultural change. From the Cold War's monumental SAGE bomber defense system to enhanced humans, Wiener's scheme turned computers from machines of assured destruction into engines of brilliant utopias. Cybernetics triggered blissful cults, the Whole Earth Catalog, and feminist manifestos, just as it fueled martial gizmos and the air force's foray into virtual space. As Rid shows, cybernetics proved a powerful tool for two competing factions--those who sought to make a better world and those who sought to control the one at hand. In the Bay Area, techno-libertarians embraced networked machines as the portal to a new electronic frontier: a peaceful, open space of freedom. In Washington, DC, cyberspace provided the perfect theater for dominance and war. Meanwhile the future arrived secretly in 1996, with Moonlight Maze, dawn of a new age of digital state-on-state espionage. That "first cyberwar," as Rid reveals in a blow-by-blow account, went on for years--and indeed has never stopped. In our long-promised cybernetic future, the line between utopia and dystopia continues to be disturbingly thin. Drawing on new sources and interviews with hippies, anarchists, sleuths, and spies, Rise of the Machines offers an unparalleled perspective into our anxious embrace of technology and today's clash of digital privacy and security.

Rise of the Machines: A Project Zero Trust Story

by George Finney

Expert guide to create Zero Trust digital environments in an AI-everywhere landscape Rise of the Machines: A Project Zero Trust Story is a continuation of the 2023 bestseller Project Zero Trust, picking up where the first book left off and addressing issues not covered in the first installment: artificial intelligence, mergers and acquisitions, antivirus, business continuity, and remote work. Artificial Intelligence is the dominant issue discussed in every chapter, providing a case-study-based approach to applying zero trust principles to all the various aspects of artificial intelligence, from MLOps, used by security teams, to use of GPTs, chatbots, and adversarial AI. AI transforms technology by enabling unprecedented automation and decision-making, but securing it with a Zero Trust approach is essential because AI inherently relies on trusted data and systems, making it a target for manipulation. The book also includes discussion around regulatory issues and the alignment of regulation around Zero Trust practices. Written by George Finney, 2024 recipient of the Baldrige Foundation Leadership Award for Cybersecurity and recognized as one of the top 100 CISOs in the world in 2022, this book provides key insights on: Appling the four Principles of Zero Trust to AI: Focusing On Business Outcomes, Designing From The Inside Out, Determining Who Or What Needs Access, and Inspecting And Logging All Traffic Using the five steps of the Zero Trust Methodology to secure AI technologies: Defining Your Protect Surface, Mapping Transaction Flows, Architecting Your Environment, Creating Zero Trust Policies, and Monitoring and Maintaining Your Environment The evolution of Adversarial AI to scale attacks and how security operations teams can integrate into the Zero Trust strategy to use AI to accelerate defense Rise of the Machines: A Project Zero Trust Story is a timely, essential read for all IT professionals across industries, including network engineers, system administrators, and cloud architects.

Rising Threats in Expert Applications and Solutions: Proceedings of FICR-TEAS 2020 (Advances in Intelligent Systems and Computing #1187)

by Vincenzo Piuri João Manuel R. S. Tavares Nilanjan Dey Rosalina Babo Vijay Singh Rathore Zdzislaw Polkowski

This book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2020, held at IIS University Jaipur, Rajasthan, India, on January 17–19, 2020. Featuring innovative ideas from researchers, academics, industry professionals and students, the book covers a variety of topics, including expert applications and artificial intelligence/machine learning; advanced web technologies, like IoT, big data, and cloud computing in expert applications; information and cybersecurity threats and solutions; multimedia applications in forensics, security and intelligence; advances in app development; management practices for expert applications; and social and ethical aspects of expert applications in applied sciences.

Rising Threats in Expert Applications and Solutions: Proceedings of FICR-TEAS 2022 (Lecture Notes in Networks and Systems #434)

by Vijay Singh Rathore Subhash Chander Sharma Joao Manuel R. S. Tavares Catarina Moreira B. Surendiran

The book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2022 organized by IIS (Deemed to be University), Jaipur, Rajasthan, India, during January 7–8, 2022. The volume is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences.

Rising from the Mailroom to the Boardroom: Unique Insights for Governance, Risk, Compliance and Audit Leaders (Internal Audit and IT Audit)

by Bruce R. Turner

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the ‘mailroom to the boardroom’ follows the story of a young banker who moved into the internal auditing profession as part of the ‘new breed’, then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Risk Analysis and Security Countermeasure Selection

by Thomas L. Norman CPP/PSP/CSC

This new edition of Risk Analysis and Security Countermeasure Selection presents updated case studies and introduces existing and new methodologies and technologies for addressing existing and future threats. It covers risk analysis methodologies approved by the U.S. Department of Homeland Security and shows how to apply them to other organizations

Risk Analysis for the Digital Age (Studies in Systems, Decision and Control #219)

by Anton Gerunov

This book presents a foray into the fascinating process of risk management, beginning from classical methods and approaches to understanding risk all the way into cutting-age thinking. Risk management by necessity must lie at the heart of governing our ever more complex digital societies. New phenomena and activities necessitate a new look at how individuals, firms, and states manage the uncertainty they must operate in. Initial chapters provide an introduction to traditional methods and show how they can be built upon to better understand the workings of the modern economy. Later chapters review digital activities and assets like cryptocurrencies showing how such emergent risks can be conceptualized better. Network theory figures prominently and the book demonstrates how it can be used to gauge the risk in the digital sectors of the economy. Predicting the unpredictable black swan events is also discussed in view of a wider adoption of economic simulations. The journey concludes by looking at how individuals perceive risk and make decisions as they operate in a virtual social network. This book interests the academic audience, but it also features insights and novel research results that are relevant for practitioners and policymakers.

Risk Analytics: Data-Driven Decisions under Uncertainty

by Eduardo Rodriguez

The 2022 World Economic Forum surveyed 1,000 experts and leaders who indicated their risk perception that the earth’s conditions for humans are a main concern in the next 10 years. This means environmental risks are a priority to study in a formal way. At the same time, innovation risks are present in theminds of leaders, newknowledge brings new risk, and the adaptation and adoption of risk knowledge is required to better understand the causes and effects can have on technological risks. These opportunities require not only adopting new ways of managing and controlling emerging processes for society and business, but also adapting organizations to changes and managing newrisks. Risk Analytics: Data-Driven Decisions Under Uncertainty introduces a way to analyze and design a risk analytics system (RAS) that integrates multiple approaches to risk analytics to deal with diverse types of data and problems. A risk analytics system is a hybrid system where human and artificial intelligence interact with a data gathering and selection process that uses multiple sources to the delivery of guidelines to make decisions that include humans and machines. The RAS system is an integration of components, such as data architecture with diverse data, and a risk analytics process and modeling process to obtain knowledge and then determine actions through the new knowledge that was obtained. The use of data analytics is not only connected to risk modeling and its implementation, but also to the development of the actionable knowledge that can be represented by text in documents to define and share explicit knowledge and guidelines in the organization for strategy implementation. This book moves from a review of data to the concepts of a RAS. It reviews RAS system components required to support the creation of competitive advantage in organizations through risk analytics. Written for executives, analytics professionals, risk management professionals, strategy professionals, and postgraduate students, this book shows a way to implement the analytics process to develop a risk management practice that creates an adaptive competitive advantage under uncertainty.

Refine Search

Showing 48,176 through 48,200 of 61,625 results