- Table View
- List View
Undergraduate Research in Online, Virtual, and Hybrid Courses: Proactive Practices for Distant Students
by Jennifer G. Coleman Nancy H. Hensel Wm. E. CampbellCo-published with and With the growing interest in undergraduate research as a high-impact practice, and the recognition that college education is increasingly moving online, this book – the first to do so – provides a framework, guidance from pioneering practitioners, and a range of examples across disciplines on how to engage remote students in research.Two foundational chapters set the scene. For those new to incorporating undergraduate research in their courses, the opening chapter provides an introduction to its evolution and practice, and reviews the evidence of its benefits for students, faculty, and institutions. The second addresses the benefit that undergraduate research can bring to online learning and provides an overview of the ways research can be incorporated into online and virtual courses to meet the course and student learning objectives. The remaining chapters illustrate implementation of undergraduate research in courses across many disciplines. They address thematic issues related to the work and its effects on students, such as transitioning them from users of, to active participants in, research; and consideration of the technological tools needed to support students in a virtual environment. The contributors, some of whom have been implementing these practices for some years, offer important insights and expertise.While the examples range across the behavioral sciences, business, education, the health professions, the humanities, social sciences, and STEM, readers will find much of value and inspiration from reading the chapters beyond their disciplines.
Underlying Standards that Support Population Health Improvement (HIMSS Book Series)
by Laura Bright Johanna GoderreThis book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that demonstrate to an international community of health and IT experts how to bring the right stakeholders together and bridge classic divides between software architects and clinical end users, health system decision-makers and standard authors.
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
by Ryan LeirvikWhen it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are available—many with sound advice, management approaches, and technical solutions—but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy foundational cyber risk management approach applicable to your entire organization.The book provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and helps practitioners pull cyber from a “technical” problem to a “business risk management” problem, equipping you with a simple approach to understand, manage, and measure cyber risk for your enterprise. What You Will Learn Educate the executives/board on what you are doing to reduce riskCommunicate the value of cybersecurity programs and investments through insightful risk-informative metricsKnow your key performance indicators (KPIs), key risk indicators (KRIs), and/or objectives and key resultsPrioritize appropriate resources through identifying program-related gapsLay down the foundational components of a program based on real examples, including pitfalls to avoid Who This Book Is For CISOs, CROs, CIOs, directors of risk management, and anyone struggling to pull together frameworks or basic metrics to quantify uncertainty and address risk
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
by Ryan LeirvikWhen it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are available—many with sound advice, management approaches, and technical solutions—but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy "playbook" for a cyber risk management approach applicable to your entire organization.This second edition provides tools and methods in a straight-forward, practical manner to guide the management of a cybersecurity program. Expanded sections include the critical integration of cyber risk management into enterprise risk management, the important connection between a Software Bill of Materials and Third-party Risk Programs, and additional "how to" tools and material for mapping frameworks to controls.Praise for Understand, Manage, and Measure Cyber RiskWhat lies ahead of you in the pages of this book? Clean practicality, not something that just looks good on paper—brittle and impractical when exposed to the real world. I prize flexibility and simplicity instead of attempting to have answers for everything and the rigidity that results. This simplicity is what I find valuable within Ryan's book. Tim Collyer, Motorola SolutionsIt seems that I have found a kindred spirit—a builder who has worked with a wide variety of client CISOs on their programs, gaining a deep understanding of how a successful and sustainable program should be constructed. Ryan's cyber work in the US Department of Defense, his McKinsey & Company consulting, and his advisory and survey work with IANS give him a unique global view of our shared passion. Nicholas J. Mankovich, PhD, MS, CISPPWho This Book Is For CISOs, CROs, CIOs, directors of risk management, and anyone struggling to pull together frameworks or basic metrics to quantify uncertainty and address risk
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
by Tobias BaerAre algorithms friend or foe?The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we decide not take a bite of food that appears to have gone bad. However, inherent bias negatively affects work environments and the decision-making surrounding our communities. While the creation of algorithms and machine learning attempts to eliminate bias, they are, after all, created by human beings, and thus are susceptible to what we call algorithmic bias.In Understand, Manage, and Prevent Algorithmic Bias, author Tobias Baer helps you understand where algorithmic bias comes from, how to manage it as a business user or regulator, and how data science can prevent bias from entering statistical algorithms. Baer expertly addresses some of the 100+ varieties of natural bias such as confirmation bias, stability bias, pattern-recognition bias, and many others. Algorithmic bias mirrors—and originates in—these human tendencies. Baer dives into topics as diverse as anomaly detection, hybrid model structures, and self-improving machine learning. While most writings on algorithmic bias focus on the dangers, the core of this positive, fun book points toward a path where bias is kept at bay and even eliminated. You’ll come away with managerial techniques to develop unbiased algorithms, the ability to detect bias more quickly, and knowledge to create unbiased data. Understand, Manage, and Prevent Algorithmic Bias is an innovative, timely, and important book that belongs on your shelf. Whether you are a seasoned business executive, a data scientist, or simply an enthusiast, now is a crucial time to be educated about the impact of algorithmic bias on society and take an active role in fighting bias.What You'll LearnStudy the many sources of algorithmic bias, including cognitive biases in the real world, biased data, and statistical artifactUnderstand the risks of algorithmic biases, how to detect them, and managerial techniques to prevent or manage themAppreciate how machine learning both introduces new sources of algorithmic bias and can be a part of a solutionBe familiar with specific statistical techniques a data scientist can use to detect and overcome algorithmic biasWho This Book is ForBusiness executives of companies using algorithms in daily operations; data scientists (from students to seasoned practitioners) developing algorithms; compliance officials concerned about algorithmic bias; politicians, journalists, and philosophers thinking about algorithmic bias in terms of its impact on society and possible regulatory responses; and consumers concerned about how they might be affected by algorithmic bias
Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats
by Sarah Armstrong-SmithTo counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber attackers in the digital age and presents a set of strategies that organizations can deploy to counteract them. With technological advancements in cybersecurity, attackers are increasingly falling back to social engineering and preying on people's vulnerabilities. This book examines different types of cyber attackers, explores their motivations, and examines the methods used. It also reviews key industry developments such as cybercrime as a service, brokers and syndicates, nation-sponsored actors, insider sabotage and the challenges faced by law enforcement in tracking and apprehending attackers. Understand the Cyber Attacker Mindset offers expert, strategic guidance on how organizations can improve their cybersecurity operations in response, including enhancing security awareness training, educating employees to identify and resist manipulation, understanding the importance of cultural variances and how board-level decision-making can directly influence attacks. Written by a renowned cybersecurity leader, the book draws on interviews with ex-criminals and top experts in the field to share rich insights and a wide range of case studies profiling notable groups, such as Anonymous, Lapsus$, FIN7, Nigeria's Yahoo Boys, Sandworm, and the Lazarus Group. The human side of cybersecurity has never been so important.
Understanding Analog Side Channels Using Cryptography Algorithms
by Alenka Zajić Milos PrvulovicThis book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection.Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program’s algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood.This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book.
Understanding and Applying Machine Vision, Revised and Expanded
by Nello ZeuchA discussion of applications of machine vision technology in the semiconductor, electronic, automotive, wood, food, pharmaceutical, printing, and container industries. It describes systems that enable projects to move forward swiftly and efficiently, and focuses on the nuances of the engineering and system integration of machine vision technology.
Understanding and Changing the World: From Information to Knowledge and Intelligence
by Joseph SifakisThis book discusses the importance of knowledge as an intangible asset, separate from physical entities, that can enable us to understand and/or change the world. It provides a thorough treatment of knowledge, one that is free of ideological and philosophical preconceptions, and which relies exclusively on concepts and principles from the theory of computing and logic. It starts with an introduction to knowledge as truthful and useful information, and its development and management by computers and humans. It analyses the relationship between computational processes and physical phenomena, as well as the processes of knowledge production and application by humans and computers. In turn, the book presents autonomous systems that are called upon to replace humans in complex operations as a step toward strong AI, and discusses the risks – real or hypothetical – of the careless use of these systems. It compares human and machine intelligence, attempting to answer the question of whether and to what extent computers, as they stand today, can approach human-level situation awareness and decision-making. Lastly, the book explains the functioning of individual consciousness as an autonomous system that manages short- and long-term objectives on the basis of value criteria and accumulated knowledge. It discusses how individual values are shaped in society and the role of institutions in fostering and maintaining a common set of values for strengthening social cohesion. The book differs from books on the philosophy of science in many respects, e.g. by considering knowledge in its multiple facets and degrees of validity and truthfulness. It follows the dualist tradition of logicians, emphasizing the importance of logic and language and considering an abstract concept of information very different from the one used in the physical sciences. From this perspective, it levels some hopefully well-founded criticism at approaches that consider information and knowledge as nothing more than the emergent properties of physical phenomena. The book strikes a balance between popular books that sidestep fundamental issues and focus on sensationalism, and scientific or philosophical books that are not accessible to non-experts. As such, it is intended for a broad audience interested in the role of knowledge as a driver for change and development, and as a common good whose production and application could shape the future of humanity.
Understanding and Improving Information Search: A Cognitive Approach (Human–Computer Interaction Series)
by Wai Tat Fu Herre Van OostendorpThis edited book adopts a cognitive perspective to provide breadth and depth to state-of-the-art research related to understanding, analyzing, predicting and improving one of the most prominent and important classes of behavior of modern humans, information search. It is timely as the broader research area of cognitive computing and cognitive technology have recently attracted much attention, and there has been a surge in interest to develop systems and technology that are more compatible with human cognitive abilities. Divided into three interlocking sections, the first introduces the foundational concepts of information search from a cognitive computing perspective to highlight the research questions and approaches that are shared among the contributing authors. Relevant concepts from psychology, information and computing sciences are addressed. The second section discusses methods and tools that are used to understand and predict information search behavior and how the cognitive perspective can provide unique insights into the complexities of the behavior in various contexts. The final part highlights a number of areas of applications of which education and training, collaboration and conversational search interfaces are important ones. Understanding and Improving Information Search - A Cognitive Approach includes contributions from cognitive psychologists, information and computing scientists around the globe, including researchers from Europe (France, Netherlands, Germany), the US, and Asia (India, Japan), providing their unique but coherent perspectives to the core issues and questions most relevant to our current understanding of information search behavior and improving information search.
Understanding and Interpreting Machine Learning in Medical Image Computing Applications: First International Workshops, Mlcn 2018, Dlf 2018, And Imimic 2018, Held In Conjunction With Miccai 2018, Granada, Spain, September 16-20, 2018, Proceedings (Lecture Notes in Computer Science #11038)
by Danail Stoyanov Zeike Taylor Seyed Mostafa Kia Ipek Oguz Mauricio Reyes Anne Martel Lena Maier-Hein Andre F. Marquand Edouard Duchesnay Tommy Löfstedt Bennett Landman M. Jorge Cardoso Carlos A. Silva Sergio Pereira Raphael MeierThis book constitutes the refereed joint proceedings of the First International Workshop on Machine Learning in Clinical Neuroimaging, MLCN 2018, the First International Workshop on Deep Learning Fails, DLF 2018, and the First International Workshop on Interpretability of Machine Intelligence in Medical Image Computing, iMIMIC 2018, held in conjunction with the 21st International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2018, in Granada, Spain, in September 2018. The 4 full MLCN papers, the 6 full DLF papers, and the 6 full iMIMIC papers included in this volume were carefully reviewed and selected. The MLCN contributions develop state-of-the-art machine learning methods such as spatio-temporal Gaussian process analysis, stochastic variational inference, and deep learning for applications in Alzheimer's disease diagnosis and multi-site neuroimaging data analysis; the DLF papers evaluate the strengths and weaknesses of DL and identify the main challenges in the current state of the art and future directions; the iMIMIC papers cover a large range of topics in the field of interpretability of machine learning in the context of medical image analysis.
Understanding and Managing IT Outsourcing: A Partnership Approach
by Surja Datta Neil Oschlag-MichaelThis book explains and illustrates how uncertainty and trust interact with each other, and how an understanding of this interaction is critical to success in IT outsourcing. A partnership approach that is built on trust can determine success but this book explains in which particular outsourcing context this approach is likely to pay dividends.
Understanding and Managing the Impact of Airbnb: The Case of Western Australia from 2015 to the COVID-19 Pandemic in 2020
by Michael Volgger Christof Pforr Sara Cavalcanti Marques Aji Cahya NusantaraThis book explores the rapid growth of the sharing economy, specifically of Airbnb, in recent years and how it has challenged traditional economies in many countries around the globe. With almost 5 million listings in more than 190 countries, many consider Airbnb as one of the most disruptive developments in tourism over the past decade. While this is a book about Western Australia as a case in point, the issues addressed in this book speak to the broader development of the sharing economy and its effects experienced nationally and indeed internationally. Thus, through the adoption of a case-specific analysis of the growth and impact of Airbnb, the book significantly contributes to closing existing knowledge gaps on the Airbnb phenomenon by exploring not only stakeholder perceptions of the sharing economy and Airbnb, the extent of Airbnb supply and demand, and how this differs from conventional accommodation demand, but also what policy responses have been employed in other tourism destinations worldwide. Western Australia in this regard serves as an exemplar case to shed light on the Airbnb phenomenon. This book presents a comprehensive global study that has investigated the Airbnb phenomenon from a supply, demand, stakeholder, and government response perspective and thus offers new empirical insights, which are of interest to government agencies and the tourism sector and are a valuable source of data to inform current policy debate.
Understanding and Using C Pointers: Core Techniques for Memory Management
by Richard ReeseImprove your programming through a solid understanding of C pointers and memory management. With this practical book, you'll learn how pointers provide the mechanism to dynamically manipulate memory, enhance support for data structures, and enable access to hardware. Author Richard Reese shows you how to use pointers with arrays, strings, structures, and functions, using memory models throughout the book. Difficult to master, pointers provide C with much flexibility and power--yet few resources are dedicated to this data type. This comprehensive book has the information you need, whether you're a beginner or an experienced C or C++ programmer or developer. Get an introduction to pointers, including the declaration of different pointer types Learn about dynamic memory allocation, de-allocation, and alternative memory management techniques Use techniques for passing or returning data to and from functions Understand the fundamental aspects of arrays as they relate to pointers Explore the basics of strings and how pointers are used to support them Examine why pointers can be the source of security problems, such as buffer overflow Learn several pointer techniques, such as the use of opaque pointers, bounded pointers and, the restrict keyword
Understanding and Using Rough Set Based Feature Selection: Concepts, Techniques and Applications
by Muhammad Summair Raza Usman QamarThis book provides a comprehensive introduction to rough set-based feature selection. Rough set theory, first proposed by Zdzislaw Pawlak in 1982, continues to evolve. Concerned with the classification and analysis of imprecise or uncertain information and knowledge, it has become a prominent tool for data analysis, and enables the reader to systematically study all topics in rough set theory (RST) including preliminaries, advanced concepts, and feature selection using RST. The book is supplemented with an RST-based API library that can be used to implement several RST concepts and RST-based feature selection algorithms.The book provides an essential reference guide for students, researchers, and developers working in the areas of feature selection, knowledge discovery, and reasoning with uncertainty, especially those who are working in RST and granular computing. The primary audience of this book is the research community using rough set theory (RST) to perform feature selection (FS) on large-scale datasets in various domains. However, any community interested in feature selection such as medical, banking, and finance can also benefit from the book. This second edition also covers the dominance-based rough set approach and fuzzy rough sets. The dominance-based rough set approach (DRSA) is an extension of the conventional rough set approach and supports the preference order using the dominance principle. In turn, fuzzy rough sets are fuzzy generalizations of rough sets. An API library for the DRSA is also provided with the second edition of the book.
Understanding and Using the Controller Area Network Communication Protocol
by Paolo Giusto Arkadeb Ghosal Haibo Zeng Marco Di NataleThis book to offers a hands-on guide to designing, analyzing and debugging a communication infrastructure based on the Controller Area Network (CAN) bus. Although the CAN bus standard is well established and currently used in most automotive systems, as well as avionics, medical systems and other devices, its features are not fully understood by most developers, who tend to misuse the network. This results in lost opportunities for better efficiency and performance. These authors offer a comprehensive range of architectural solutions and domains of analysis. It also provides formal models and analytical results, with thorough discussion of their applicability, so that it serves as an invaluable reference for researchers and students, as well as practicing engineers.
Understanding Artificial Intelligence
by Editors of Scientific AmericanEssays from the world's experts in AI.
Understanding Artificial Intelligence: Fundamentals, Use Cases and Methods for a Corporate AI Journey (Management for Professionals)
by Ralf T. Kreutzer Marie SirrenbergArtificial Intelligence (AI) will change the lives of people and businesses more fundamentally than many people can even imagine today. This book illustrates the importance of AI in an era of digitalization. It introduces the foundations of AI and explains its benefits and challenges for companies and entire industries. In this regard, AI is approached not just as yet another technology, but as a fundamental innovation, which will spread into all areas of the economy and life, and will disrupt business processes and business models in the years to come. In turn, the book assesses the potential that AI holds, and clarifies the framework that is necessary for pursuing a responsible approach to AI. In a series of best-practice cases, the book subsequently highlights a broad range of sectors and industries, from production to services; from customer service to marketing and sales; and in industries like retail, health care, energy, transportation and many more. In closing, a dedicated chapter outlines a roadmap for a specific corporate AI journey.No one can ignore intensive work with AI today - neither as a private person, let alone as a top performer in companies. This book offers a thorough, carefully crafted, and easy to understand entry into the field of AI. The central terms used in the AI context are given a very good explanation. In addition, a number of cases show what AI can do today and where the journey is heading. An important book that you should not miss!Professor Dr. Harley KrohmerUniversity of Bern"Inspiring, thought provoking and comprehensive, this book is wittingly designed to be a catalyst for your individual and corporate AI journey.”Avo Schönbohm, Professor at the Berlin School of Economics and Law, Enterprise Game Designer at LUDEO and Business Punk
Understanding Artificial Intelligence: Fundamentals and Applications
by Albert Chun-Chen Liu Oscar Ming Law Iain LawUnderstanding Artificial Intelligence Provides students across majors with a clear and accessible overview of new artificial intelligence technologies and applications Artificial intelligence (AI) is broadly defined as computers programmed to simulate the cognitive functions of the human mind. In combination with the Neural Network (NN), Big Data (BD), and the Internet of Things (IoT), artificial intelligence has transformed everyday life: self-driving cars, delivery drones, digital assistants, facial recognition devices, autonomous vacuum cleaners, and mobile navigation apps all rely on AI to perform tasks. With the rise of artificial intelligence, the job market of the near future will be radically different???many jobs will disappear, yet new jobs and opportunities will emerge. Understanding Artificial Intelligence: Fundamentals and Applications covers the fundamental concepts and key technologies of AI while exploring its impact on the future of work. Requiring no previous background in artificial intelligence, this easy-to-understand textbook addresses AI challenges in healthcare, finance, retail, manufacturing, agriculture, government, and smart city development. Each chapter includes simple computer laboratories to teach students how to develop artificial intelligence applications and integrate software and hardware for robotic development. In addition, this text: Focuses on artificial intelligence applications in different industries and sectors Traces the history of neural networks and explains popular neural network architectures Covers AI technologies, such as Machine Vision (MV), Natural Language Processing (NLP), and Unmanned Aerial Vehicles (UAV) Describes various artificial intelligence computational platforms, including Google Tensor Processing Unit (TPU) and Kneron Neural Processing Unit (NPU) Highlights the development of new artificial intelligence hardware and architectures Understanding Artificial Intelligence: Fundamentals and Applications is an excellent textbook for undergraduates in business, humanities, the arts, science, healthcare, engineering, and many other disciplines. It is also an invaluable guide for working professionals wanting to learn about the ways AI is changing their particular field.
Understanding Artificial Intelligence
by Nicolas SabouretArtificial Intelligence (AI) fascinates, challenges and disturbs us. There are many voices in society that predict drastic changes that may come as a consequence of AI – a possible apocalypse or Eden on earth. However, only a few people truly understand what AI is, what it can do and what its limitations are. Understanding Artificial Intelligence explains, through a straightforward narrative and amusing illustrations, how AI works. It is written for a non-specialist reader, adult or adolescent, who is interested in AI but is missing the key to understanding how it works. The author demystifies the creation of the so-called "intelligent" machine and explains the different methods that are used in AI. It presents new possibilities offered by algorithms and the difficulties that researchers, engineers and users face when building and using such algorithms. Each chapter allows the reader to discover a new aspect of AI and to become fully aware of the possibilities offered by this rich field.
Understanding Atmospheric Rivers Using Machine Learning (SpringerBriefs in Applied Sciences and Technology)
by Manish Kumar Goyal Shivam SinghThis book delves into the characterization, impacts, drivers, and predictability of atmospheric rivers (AR). It begins with the historical background and mechanisms governing AR formation, giving insights into the global and regional perspectives of ARs, observing their varying manifestations across different geographical contexts. The book explores the key characteristics of ARs, from their frequency and duration to intensity, unraveling the intricate relationship between atmospheric rivers and precipitation. The book also focus on the intersection of ARs with large-scale climate oscillations, such as El Niño and La Niña events, the North Atlantic Oscillation (NAO), and the Pacific Decadal Oscillation (PDO). The chapters help understand how these climate phenomena influence AR behavior, offering a nuanced perspective on climate modeling and prediction. The book also covers artificial intelligence (AI) applications, from pattern recognition to prediction modeling and early warning systems. A case study on AR prediction using deep learning models exemplifies the practical applications of AI in this domain. The book culminates by underscoring the interdisciplinary nature of AR research and the synergy between atmospheric science, climatology, and artificial intelligence
Understanding Auctions: Understanding Auctions In Real Life (Routledge Focus on Management and Society)
by Srobonti Chattopadhyay Rittwik ChatterjeeThe book elaborates the basic principles of Auction Theory in a non-technical language so as to make them easily accessible to even those not trained in the discipline. Auctions as allocation mechanisms have been in use across the world since antiquity and are still employed in different countries for purchase and sales of a wide range of objects, both by governments and by private agents. Auction has gained popularity over other allocation mechanisms since the rules of auctions are very precise, involve much less subjective judgements compared to other alternative allocation mechanisms and lead to a more efficient process of discovering the true willingness of the buyers to pay. Moreover, the principles of Auction Theory are used in other contexts, for example in designing contests, or in controlling emission levels through allocation of permits and licenses.
Understanding Audiences, Customers, and Users via Analytics: An Introduction to the Employment of Web, Social, and Other Types of Digital People Data (Synthesis Lectures on Information Concepts, Retrieval, and Services)
by Bernard J. Jansen Kholoud K. Aldous Joni Salminen Hind Almerekhi Soon-gyo JungThis book presents the foundations of using analytics from the laboratory, social media platforms, and the web. The authors cover key topics including analytics strategy, data gathering approaches, data preprocessing, data quality assessment, analytical methods, tools, and validation methods. The book includes chapters explaining web analytics, social media analytics, and how to create an analytics strategy. The authors also cover on data sources, such as online surveys, crowdsourcing, eye tracking, mouse tracking, social media APIs, search logs, and analytics triangulation. The book also discusses analytical tools for social media analytics, search analytics, persona analytics, user studies, and website analytics. The authors conclude by examining the validity of online analytics.
Understanding Azure Data Factory: Operationalizing Big Data And Advanced Analytics Solutions
by Sudhir Rawat Abhishek NarainImprove your analytics and data platform to solve major challenges, including operationalizing big data and advanced analytics workloads on Azure. You will learn how to monitor complex pipelines, set alerts, and extend your organization's custom monitoring requirements.This book starts with an overview of the Azure Data Factory as a hybrid ETL/ELT orchestration service on Azure. The book then dives into data movement and the connectivity capability of Azure Data Factory. You will learn about the support for hybrid data integration from disparate sources such as on-premise, cloud, or from SaaS applications. Detailed guidance is provided on how to transform data and on control flow. Demonstration of operationalizing the pipelines and ETL with SSIS is included. You will know how to leverage Azure Data Factory to run existing SSIS packages. As you advance through the book, you will wrap up by learning how to create a single pane for end-to-end monitoring, which is a key skill in building advanced analytics and big data pipelines. What You'll LearnUnderstand data integration on Azure cloudBuild and operationalize an ADF pipelineModernize a data warehouseBe aware of performance and security considerations while moving data Who This Book Is ForData engineers and big data developers. ETL (extract, transform, load) developers also will find the book useful in demonstrating various operations.