Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment…
Over the last five years, widespread concern about the effects of social media on democracy has led to an explosion in research from different disciplines and corners of academia. This book is the first of its kind to take stock of this emerging multi-disciplinary field by synthesizing what we know, identifying what we do not know and obstacles to future research, and charting a course for the …
"This boldly original book traces the evolution of documentary film and photography as they migrated onto digital platforms during the first decades of the twenty-first century. Kris Fallon examines the emergence of several key media forms—social networking and crowdsourcing, video games and virtual environments, big data and data visualization—and demonstrates the formative influence of po…
Electronic Iran introduces the concept of the Iranian Internet, a framework that captures interlinked, transnational networks of virtual and offline spaces. Taking her cues from early Internet ethnographies that stress the importance of treating the Internet as both a site and product of cultural production, accounts in media studies that highlight the continuities between old and new media, an…
‘The Internet is broken and Paolo Bory knows how we got here. In a powerful book based on original research, Bory carefully documents the myths, imaginaries, and ideologies that shaped the material and cultural history of the Internet. As important as this book is to understand our shattered digital world, it is essential for those who would fix it.’ — Vincent Mosco, author of The Smart C…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classification and processing; stochastic modelling; p…
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all in…
Siapa saja para pemain yang memiliki kekuatan untuk membentuk internet dan apa saja yang dipertaruhkan di masa mendatang? Anda akan diajak menelusuri lansekap digital dan memahami peran berbagai pemangku kepentingan—pemerintah, operator jaringan, dan para raksasa teknologi di balik layanan internet yang kita nikmati. Di lapisan konten, para pengguna juga memiliki kekuatan untuk membentuk inte…
Electronic publishing is continuously changing; new technologies open new ways for individuals, scholars, communities and networks to establish contacts, exchange data, produce information and share knowledge on a variety of devices, from personal computers to mobile media. There is an urgent need to rethink electronic publishing in order to develop and use new communication paradigms and techn…