Browse Results

Showing 53,951 through 53,975 of 57,197 results

Truly, Madly, Like Me: The glorious and hilarious new rom-com from the smash-hit bestseller (Starting Over)

by Jo Watson

'A hilarious, laugh-out-loud romance that is a breath of fresh air' 5* reader reviewFrom the author of the 100,000 copy-selling rom-com, Love to Hate You! No one makes you laugh like Jo Watson! If you love by Mhairi McFarlane, Sophie Ranald, Sophie Kinsella and Paige Toon, you'll LOVE Jo's rom-coms!Preorder Jo's hilarious and heartfelt new rom-com, Just The Way I Am, now! Just search: 9781472265586Readers are raving about Truly, Madly, Like Me!'A masterclass in character development... This is truly a novel for the times we live in. I would highly recommend' 5* reader review'Another absolutely gorgeous read by one of my favourite authors...completely impossible to put down' 5* reader review'I can't heap any more praise on this book, it just made me feel so happy! I laughed, I cried, I smiled, but most of all I LOVED!!' 5* reader reviewShe's used to faking it. Now it's time to get real.It all started with a faulty elevator... When social media influencer Frankie Paulson's followers turn on her after an embarrassing public break-up with her perfect #couplegoals boyfriend, and she almost plummets to her death with two strangers in a faulty elevator, all she wants to do is hide. A town with no internet is the ideal sanctuary, but Frankie has never done anything without sharing it on one of many apps she can't live without. After all, surely it's much more satisfying to take the perfect photograph of her breakfast than eat it? When Fate, in the form of a new four-legged companion, plays a hand in keeping her in the town, Frankie starts to make tentative but genuine connections with the people she meets. Suddenly every rule she's been living by seems far less meaningful and she begins to wonder if her apparently #blessed life wasn't as real as she thought...Love funny, romantic stories? You don't want to miss Jo Watson:'The perfect choice for fans of romantic comedies' Gina's Bookshelf'It was amazing, it was hilarious' Rachel's Random Reads'A brilliant read from beginning to end' Hopeless Romantics'Sitting here open mouthed in disbelief at just how wonderful this book is' Rachel's Random Reads 'A stunning heart-warming read' Donna's Book Blog

Trump and the Media

by Pablo Boczkowski Zizi Papacharissi

The election of Donald Trump and the great disruption in the news and social media. Donald Trump's election as the 45th President of the United States came as something of a surprise—to many analysts, journalists, and voters. The New York Times's The Upshot gave Hillary Clinton an 85 percent chance of winning the White House even as the returns began to come in. What happened? And what role did the news and social media play in the election? In Trump and the Media, journalism and technology experts grapple with these questions in a series of short, thought-provoking essays. Considering the disruption of the media landscape, the disconnect between many voters and the established news outlets, the emergence of fake news and “alternative facts,” and Trump's own use of social media, these essays provide a window onto broader transformations in the relationship between information and politics in the twenty-first century. The contributors find historical roots to current events in Cold War notions of "us" versus "them," trace the genealogy of the assault on facts, and chart the collapse of traditional news gatekeepers. They consider such topics as Trump's tweets (diagnosed by one writer as “Twitterosis”) and the constant media exposure given to Trump during the campaign. They propose photojournalists as visual fact checkers (“lessons of the paparazzi”) and debate whether Trump's administration is authoritarian or just authoritarian-like. Finally, they consider future strategies for the news and social media to improve the quality of democratic life. Contributors Mike Ananny, Chris W. Anderson, Rodney Benson, Pablo J. Boczkowski, danah boyd, Robyn Caplan, Michael X. Delli Carpini, Josh Cowls, Susan J. Douglas, Keith N. Hampton, Dave Karpf, Daniel Kreiss, Seth C. Lewis, Zoey Lichtenheld, Andrew L. Mendelson, Gina Neff, Zizi Papacharissi, Katy E. Pearce, Victor Pickard, Sue Robinson, Adrienne Russell, Ralph Schroeder, Michael Schudson, Julia Sonnevend, Keren Tenenboim-Weinblatt, Tina Tucker, Fred Turner, Nikki Usher, Karin Wahl-Jorgensen, Silvio Waisbord, Barbie Zelizer

The Trump Presidency, Journalism, and Democracy (Routledge Research in Journalism)

by Robert E. Gutsche Jr.

This book examines the disruptive nature of Trump news – both the news his administration makes and the coverage of it – related to dominant paradigms and ideologies of U.S. journalism. By relying on conceptualizations of media memory and "othering" through news coverage that enhances socio-conservative positions on issues such as immigration, the book positions this moment in a time of contestation. Contributors ranging from scholars, professionals, and media critics operate in unison to analyze today’s interconnected challenges to traditional practices within media spheres posed by Trump news. The outcomes should resonate with citizens who rely on journalism for civic engagement and who are active in social change

Trump Was a Joke: How Satire Made Sense of a President Who Didn’t (Routledge Advances in Theatre & Performance Studies)

by Sophia A Mcclennen

Written by a scholar of satire and politics, Trump Was a Joke explains why satire is an exceptional foil for absurd political times and why it did a particularly good job of making sense of Trump. Covering a range of comedic interventions, Trump Was a Joke analyzes why political satire is surprisingly effective at keeping us sane when politics is making us crazy. Its goal is to highlight the unique power of political satire to encourage critical thinking, foster civic action, and further rational debate in moments of political hubris and hysteria. The book has been endorsed by Bassem Youssef, who has been referred to as the “Jon Stewart of Egypt,” and Srdja Popovic, author of Blueprint for Revolution, who used satirical activism to bring down Serbian dictator Slobodan Milosevic. With a foreword by award-winning filmmaker, satirist, and activist Michael Moore, this study will be of interest to readers who follow politics and enjoy political comedy and will appeal to the communications, comedy studies, media studies, political science, rhetoric, cultural studies, and American studies markets.

Trust and Communication in a Digitized World

by Bernd Blöbaum

This book explores models and concepts of trust in a digitized world. Trust is a core concept that comes into play in multiple social and economicrelations of our modern life. The book provides insights into the current stateof research while presenting the viewpoints of a variety of disciplines such ascommunication studies, information systems, educational and organizational psychology,sports psychology and economics. Focusing on an investigation of how the Internetis changing the relationship between trust and communication, and the impact thischange has on trust research, this volume facilitates a greater understandingof these topics, thus enabling their employment in social relations.

Trust and Records in an Open Digital Environment (Routledge Guides to Practice in Libraries, Archives and Information Science)

by Hrvoje Stančić

Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stančić and the contributors address these challenges by taking three themes – state, citizens, and documentary form – and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.

Trust and Reputation Management Systems

by Denis Trček

This book provides an understanding of the core pillars of trust and reputation systems in electronic business settings. It presents the main existing methods and evaluates them from a managerial point of view. The book outlines the necessary technological environment without entangling the reader in too much technical detail. An implementation roadmap on a strategic and tactical level is given as well as guidance on linking trust and reputation management to existing information systems. Existing standards and solutions like recommendation systems, web services, semantic and big data technologies are put into context to prevent subverting efforts using false ratings, faked identities and other security issues. An outlook into recent and future developments completes the book.

Trust and Trustworthy Computing

by Mauro Conti Matthias Schunter Ioannis Askoxylakis

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

Trust and Trustworthy Computing

by Michael Franz Panos Papadimitratos

This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs.

Trust-based Collective View Prediction

by Su Chen Guandong Xu Jia Zhou Tiejian Luo

Collective view prediction is to judge the opinions of an active web user based on unknown elements by referring to the collective mind of the whole community. Content-based recommendation and collaborative filtering are two mainstream collective view prediction techniques. They generate predictions by analyzing the text features of the target object or the similarity of users' past behaviors. Still, these techniques are vulnerable to the artificially-injected noise data, because they are not able to judge the reliability and credibility of the information sources. Trust-based Collective View Prediction describes new approaches for tackling this problem by utilizing users' trust relationships from the perspectives of fundamental theory, trust-based collective view prediction algorithms and real case studies. The book consists of two main parts - a theoretical foundation and an algorithmic study. The first part will review several basic concepts and methods related to collective view prediction, such as state-of-the-art recommender systems, sentimental analysis, collective view, trust management, the Relationship of Collective View and Trustworthy, and trust in collective view prediction. In the second part, the authors present their models and algorithms based on a quantitative analysis of more than 300 thousand users' data from popular product-reviewing websites. They also introduce two new trust-based prediction algorithms, one collaborative algorithm based on the second-order Markov random walk model, and one Bayesian fitting model for combining multiple predictors. The discussed concepts, developed algorithms, empirical results, evaluation methodologies and the robust analysis framework described in Trust-based Collective View Prediction will not only provide valuable insights and findings to related research communities and peers, but also showcase the great potential to encourage industries and business partners to integrate these techniques into new applications.

Trust, Computing, and Society

by Richard H.R. Harper

The internet has altered how people engage with each other in myriad ways, including offering opportunities for people to act distrustfully. This fascinating set of essays explores the question of trust in computing from technical, socio-philosophical, and design perspectives. Why has the identity of the human user been taken for granted in the design of the internet? What difficulties ensue when it is understood that security systems can never be perfect? What role does trust have in society in general? How is trust to be understood when trying to describe activities as part of a user requirement program? What questions of trust arise in a time when data analytics are meant to offer new insights into user behavior and when users are confronted with different sorts of digital entities? These questions and their answers are of paramount interest to computer scientists, sociologists, philosophers and designers confronting the problem of trust.

Trust & Fault in Multi Layered Cloud Computing Architecture

by Pradeep Kumar Gupta Punit Gupta

This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing;Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system;Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.

Trust for Intelligent Recommendation

by Touhid Bhuiyan

Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can be achieved using an inferred trust network which mimics the real world "friend of a friend" recommendations. To extend the boundaries of the neighbor, an effective trust inference technique is required. This book proposes a trust interference technique called Directed Series Parallel Graph (DSPG) that has empirically outperformed other popular trust inference algorithms, such as TidalTrust and MoleTrust. For times when reliable explicit trust data is not available, this book outlines a new method called SimTrust for developing trust networks based on a user's interest similarity. To identify the interest similarity, a user's personalized tagging information is used. However, particular emphasis is given in what resources the user chooses to tag, rather than the text of the tag applied. The commonalities of the resources being tagged by the users can be used to form the neighbors used in the automated recommender system. Through a series of case studies and empirical results, this book highlights the effectiveness of this tag-similarity based method over the traditional collaborative filtering approach, which typically uses rating data. Trust for Intelligent Recommendation is intended for practitioners as a reference guide for developing improved, trust-based recommender systems. Researchers in a related field will also find this book valuable.

Trust in Computer Systems and the Cloud

by Mike Bursell

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.

Trust in Cyberspace

by National Research Council

Whether or not you use a computer, you probably use a telephone, electric power, and a bank. Although you may not be aware of their presence, networked computer systems are increasingly becoming an integral part of your daily life. Yet, if such systems perform poorly or don't work at all, then they can put life, liberty, and property at tremendous risk. Is the trust that we--as individuals and as a society--are placing in networked computer systems justified? And if it isn't, what can we do to make such systems more trustworthy?This book provides an assessment of the current state of the art procedures for building trustworthy networked information systems. It proposes directions for research in computer and network security, software technology, and system architecture. In addition, the book assesses current technical and market trends in order to better inform public policy as to where progress is likely and where incentives could help. Trust in Cyberspace offers insights into:--The strengths and vulnerabilities of the telephone network and Internet, the two likely building blocks of any networked information system.--The interplay between various dimensions of trustworthiness: environmental disruption, operator error, "buggy" software, and hostile attack.--The implications for trustworthiness of anticipated developments in hardware and software technology, including the consequences of mobile code.--The shifts in security technology and research resulting from replacing centralized mainframes with networks of computers.--The heightened concern for integrity and availability where once only secrecy mattered.--The way in which federal research funding levels and practices have affected the evolution and current state of the science and technology base in this area.You will want to read this book if your life is touched in any way by computers or telecommunications. But then, whose life isn't?

Trust Management in Cloud Services

by Talal H. Noor Quan Z. Sheng Athman Bouguettaya

This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers' privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.

Trust Management in the Chinese E-Commerce Market: Based on the Perspective of the Adverse Selection (Advanced Studies in E-Commerce)

by Yong Pan

Based on the classic adverse selection model, this book sets up the cyber “lemons” market model and analyzes the basic rule of asymmetric information. This book focuses on the topics as following: Is there “lemons” in e-commerce market? What rule do the cyber “lemons” characterize? How to build the cyber “lemon” market model? What is the particularity of adverse selection in cyber markets? What is more, how to eliminate or avoid the cyber “lemons” in Chinse e-commerce market?This book aims to provide the accumulation for e-commerce research and support decision-making for management in Chinese e-commerce markets, and suggests trust management solutions to eliminate or decrease the cyber ‘lemons’. Through this book, it helps readers understand the ideas and effective methods of trust management in the Chinse e-commerce market, while deepening the reverse selection model and theory.

Trust Management in the Internet of Vehicles

by Adnan Mahmood Michael Sheng Wei Emma Zhang Sira Yongchareon

The Internet of Vehicles (IoV) is referred to as an efficient and inevitable convergence of the Internet of Things, intelligent transportation systems, edge / fog and cloud computing, and big data, all of which could be intelligently harvested for the cooperative vehicular safety and non-safety applications as well as cooperative mobility management. A secure and low-latency communication is, therefore, indispensable to meet the stringent performance requirements of the safety-critical vehicular applications. Whilst the challenges surrounding low latency are being addressed by the researchers in both academia and industry, it is the security of an IoV network which is of paramount importance, as a single malicious message is perfectly capable enough of jeopardizing the entire networking infrastructure and can prove fatal for the vehicular passengers and the vulnerable pedestrians. This book thus investigates the promising notion of trust in a bid to strengthen the resilience of the IoV networks. It not only introduces trust categorically in the context of an IoV network, i.e., in terms of its fundamentals and salient characteristics, but further envisages state-of-the-art trust models and intelligent trust threshold mechanisms for segregating both malicious and non-malicious vehicles. Furthermore, open research challenges and recommendations for addressing the same are discussed in the same too.

Trust Management IX

by Christian Damsgaard Jensen Stephen Marsh Theo Dimitrakos Yuko Murayama

This book constitutes the refereed proceedings of the 9th IFIP WG 11. 11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems. The papers cover a wide range of topics including trust and reputation and models thereof, the relationship between trust and security, socio-technical aspects of trust, reputation and privacy, trust in the cloud and behavioural models of trust.

Trust Management XI: 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings (IFIP Advances in Information and Communication Technology #505)

by Jan-Philipp Steghöfer and Babak Esfandiari

This book constitutes the refereed proceedings of the 11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2017, held in Gothenburg, Sweden, in June 2017. The 8 revised full papers and 6 short papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: information sharing and personal data; novel sources of trust and trust information; applications of trust; trust metrics; and reputation systems. Also included is the 2017 William Winsborough commemorative address and three short IFIPTM 2017 graduate symposium presentations.

Trust Management XII: 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedings (IFIP Advances in Information and Communication Technology #528)

by Nurit Gal-Oz Peter R. Lewis

This book constitutes the refereed proceedings of the 12th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2018, held in Toronto, ON, Canada, in July 2018.The 7 revised full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers feature both theoretical research and real-world case studies and cover the following topical areas: trust in information technology; socio-technical, economic, and sociological trust; trust and reputation management systems; identity management and trust; secure, trustworthy and privacy-aware systems; trust building in large scale systems; and trustworthyness of adaptive systems. Also included is the 2018 William Winsborough commemorative address.

Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings (IFIP Advances in Information and Communication Technology #563)

by Weizhi Meng Piotr Cofta Christian Damsgaard Jensen Tyrone Grandison

This book constitutes the refereed proceedings of the 13th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2019, held in Copenhagen, Denmark, in July 2019.The 7 revised full papers, 3 short papers, and 6 work-in-progress papers presented were carefully reviewed and selected from 32 submissions. The papers cover a broad range of topics related to trust, security and privacy and focus on trust in information technology and identity management, socio-technical and sociological trust, and emerging technology for trust.

The Trust Manifesto: What you Need to do to Create a Better Internet

by Damian Bradfield

From the moment we wake up and unlock our phones, we're producing data. We offer up our unique fingerprint to the online world, scan our route to work, listen to a guided meditation or favourite playlist, slide money around, share documents and update our social media accounts. We reach for our phones up to 200 times a day, not knowing which companies are storing, using, selling and manipulating our data. But do we care? We're busy. We've got lives. We're pressed for time! There aren't enough hours in the day to read the terms and conditions. Or, maybe we're happy to trade our personal data for convenient services and to make our lives easier?Big data is the phenomenon of our age, but should we trust it without question? This is the trust dilemma.In 2009, Damian Bradfield founded WeTransfer, the largest file-sharing platform in the world with 50 million global users shipping more than one billion files of data a month. His unique experience of the big data economy has led him to question if there is another way to build the internet, one that is fairer and safer for everyone and, in The Trust Manifesto, he lays out this vision.

Trust Me

by Romily Bernard

New York Times bestselling author Jay Asher called Find Me "a thriller that keeps picking up speed," while New York Times bestselling author Sophie Jordan hailed Romily Bernard as "an exceptional new voice in YA."Trust Me is the thrilling conclusion to the Find Me trilogy, in which loose ends come together and chilling plot twists complicate Wick Tate's life more than ever. Perfect for fans of The Girl with the Dragon Tattoo.With all of Wick Tate's secrets--who can she really trust? Wick is used to relying on only herself, but when she has nowhere left to turn, she's going to have to learn to trust someone if she's going to finally escape her demons. . . .

Trust Models for Next-Generation Blockchain Ecosystems (EAI/Springer Innovations in Communication and Computing)

by Muhammad Habib ur Rehman Davor Svetinovic Khaled Salah Ernesto Damiani

This book discusses the trust models for next-generation Blockchain ecosystems. The book provides a comprehensive discussion on various trust factors involving security, anonymization, reputation, governance, economic models, and other relevant determinants. The book covers various topics in breadth and depth. In addition, it sets the foundation to involve the readers in understanding the core theories supplemented with technical and experimental discussion. The book starts by laying out the foundations of trust models in Blockchain ecosystems. The authors then provide a study of existing trust models Blockchain networks. They then provide identification of trust factors and discuss each trust factor. The book concludes with a future outlook of trust-enabling Blockchain ecosystems.Outlines the trust models for next-generation Blockchain ecosystems;Covers the trust issues in various Blockchain ecosystems running in public, private, consortium, and cloud environments;Features issues such has privacy, security, scalability, and requirements in Blockchain.

Refine Search

Showing 53,951 through 53,975 of 57,197 results