Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
There has always been some degree of controversy surrounding computers and computers have always been vulnerable. In the early days of computing there were cases of theft and criminal damage to new computer installations. Computers have been shot at and even bombed, causing extensive damage.Over the years there have been many attempts at computer fraud. One of the most celebrated was the so-called Salami Fraud where small amounts of money, which would be hardly noticed by any individual, were taken from a very large number of bank accounts, thus enriching the fraudsters. However, these were largely limited to corporate situations where the damage was contained. With the arrival of the personal computer and especially mobile devices such as laptops and smart phones the damage achievable by fraudsters and vandals and others wishing to inflict damage on elements of cyberspace has grown and a considerable number of people have had a lot of money swindled from them. In a similar vein computers are now also used as weapons to target other computers and electronic devices.The past 20 years has seen a massive escalation in the damage done in cyberspace and this has been accompanied by a growing concern about all aspects of Cyber Security. The ever increasing number of cyber attacks on individuals, organisations and national government agencies has reached epidemic proportions. It is not possible to know the exact extent of these attacks and the damage which they have done as no one wishes to advertise their vulnerability - even their past vulnerability. However, estimates suggest that the cost of these attacks have run into tens or even hundreds of billions of dollars. What is certain is that billions of dollars are being spent every year in order to improve cyber security.
One of the most interesting aspects of research methodology is that there is a constant flow of new ideas and thus new concepts and new terminology. This second edition is an attempt to keep up with such changes and thus 200 new entries have been added to the Dictionary. However, it is well known that no sooner than the ink is dry a new concept and new jargon appears.
Leading Issues in e-Government Research Volume 2 brings together a collection of papers looking at the latest ideas in the field. e-Government is a truly international research field which is ever expanding to meet the goals and needs of governments and citizens around the world. The papers in this book represent research from 15 different countries and illustrate the need for this important research to continue. Areas such as how the cloud and social media can be used in an e-government setting and the issues to be considered when implementing an e-democratic process are just a few of the topics that are discussed in the book. Dr Shawren Singh and Dr Walter Castelnovo have put together an excellent collection of leading research papers on e-government innovations that are part of the current digital revolution. The general reader as well as researchers, teachers and students concerned with the field of e-Government will find this book rewarding.
Innovation is among the most important issues which need to be mastered today to produce an effective 21st century society. It is a moving target which demands continual attention as todays innovation soon becomes tomorrow old news. It is not well understood and not researched and taught as frequently or as enthusiastically as it should be. This book is a compilation of a number of important papers on this subject selected by a leading academic in this field. A wide range of topic have been chosen which leads the reader through some of the most important aspects of innovation research being practiced today. Some of these papers explore issues relating to innovation stimulation and management in SMEs. The studies reported here provide starting points for thought-provoking discussion and reflection on themes such as innovation and growth, innovation alliances, open innovation, and resource management for innovation. This book is an important text for academics, researchers, students and practitioners.
Knowledge Management is here to stay. This book is a compilation of a number of important papers on this subject selected by two leaders in this field of study. A wide range of topic have been chosen which leads the reader through some of the most important considerations in the field today. The book argues that this thing called Knowledge Management has been around for at least 25 years. Yet despite being accused, at several times in that period, of being nothing more than a passing management fad or fashion, it has retained or rather sustained interest by both academics and practitioners. Publication levels in a variety of related journals remains high and organisations continue to implement strategies, processes and systems to create and share knowledge assets of importance to their business. One reason for this situation is the reality that Knowledge Management is, to a large degree, an amalgam of a number of different academic areas. A variety of academic disciplines (strategy, sociology, psychology, IT, library sciences and accounting, to mention only a few) have all made contributions. Practitioners recognize the key terms and have a loose understanding of the general subject matter, however formal education in the field is still limited and focused in a few areas. Indeed only a few KM departments exist across the world and most KM education seems to occur in the library science and IT faculties, and not in the business studies departments, where it truly belongs. This book is an important text for academics, researchers, students and practitioners.
Modern society is highly dependent on key critical systems either physical or technology based. They have become more significant as the information age has developed and societies have found themselves dependant on these systems. The issue is that these critical systems can be attacked and disrupted via Information Warfare attacks and this is the major theme of this collection of leading edge research. The book assesses how individual countries deal with Information Warfare in terms of protecting critical infrastructures or raising security awareness amongst a population and reflects on other considerations of Information Warfare in terms of the neutrality in Information Warfare, cooperation and the role of activism. The paper uses a number case studies and examples from around the around and particular emphasis is placed upon the Estonian Cyber War and understanding what happened, why it happened and ways to mitigate the situation. This book includes 9 important case studies in this field from 6 different countries and an introduction to the subject by Professor Matthew Warren from Deakin University, Australia. Print version. This book contains 157 pages
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.