This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…
Available Open Access under CC-BY-NC-ND licence. In this illuminating study of working life, leading experts in the sociology of work draw on decades of large-scale survey data to consider various notions of the quality of work in the Britain. Exploring data on hundreds of occupations, it charts why some occupations feel more rewarding than others and sets out fresh policies that might generate…
This book intends to deepen the knowledge of the extended and uncertain transitions from school to work and to higher education by analysing the perspectives of youths and young adults and by addressing policies and institutional practices. The book critically examines the ‘transition machinery’ consisting of various education and training measures, projects and schemes, provided by educati…
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classification and processing; stochastic modelling; p…
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all in…
Siapa saja para pemain yang memiliki kekuatan untuk membentuk internet dan apa saja yang dipertaruhkan di masa mendatang? Anda akan diajak menelusuri lansekap digital dan memahami peran berbagai pemangku kepentingan—pemerintah, operator jaringan, dan para raksasa teknologi di balik layanan internet yang kita nikmati. Di lapisan konten, para pengguna juga memiliki kekuatan untuk membentuk inte…
Electronic publishing is continuously changing; new technologies open new ways for individuals, scholars, communities and networks to establish contacts, exchange data, produce information and share knowledge on a variety of devices, from personal computers to mobile media. There is an urgent need to rethink electronic publishing in order to develop and use new communication paradigms and techn…
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of …
This book summarizes work being undertaken within the collaborative MODAClouds research project, which aims to facilitate interoperability between heterogeneous Cloud platforms and remove the constraints of deployment, portability, and reversibility for end users of Cloud services. Experts involved in the project provide a clear overview of the MODAClouds approach and explain how it operates in…
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security ma…