Your Search Results

      • Trusted Partner
        Humanities & Social Sciences
        May 2020

        Constructing cybersecurity

        Power, expertise and the internet security industry

        by Andrew Whiting

        Constructing cybersecurity adopts a constructivist approach to cybersecurity and problematises the state of contemporary knowledge within this field. Setting out by providing a concise overview of such knowledge this book subsequently adopts Foucauldian positions on power and security to highlight assumptions and limitations found herein. What follows is a detailed analysis of the discourse produced by various internet security companies demonstrating the important role that these security professionals play constituting and entrenching this knowledge by virtue of their specific epistemic authority. As a relatively new source within a broader security dispositif these security professionals have created relationships of mutual recognition and benefit with traditional political and security professionals.

      • Trusted Partner
        Computing & IT
        February 2021

        Digital contention in a divided society

        Social media, parades and protests in Northern Ireland

        by Paul Reilly

        How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

      • Trusted Partner
        Computing & IT
        February 2021

        Digital contention in a divided society

        Social media, parades and protests in Northern Ireland

        by Paul Reilly

        How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

      • Trusted Partner
        Computing & IT
        March 2024

        Digital contention in a divided society

        Social media, parades and protests in Northern Ireland

        by Paul Reilly

        How are platforms such as Facebook and Twitter (now X) used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media channels were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

      • Trusted Partner
        Computing & IT
        January 2021

        Digital contention in a divided society

        Social media, parades and protests in Northern Ireland

        by Paul Reilly

        How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

      • Computing & IT
        February 2008

        fruITion

        Creating the Ultimate Corporate Strategy for Information Technology

        by Chris Potts

        Ian is a Chief Information Officer (CIO) who is about to go on a journey of change - whether he likes it or not.  He will be expected to explore, challenge and radically recast the complex, often hostile relationships that can exist between a business and the people in its Information Technology (IT) department.  On the way, Ian, his Chief Executive Officer, Chief Financial Officer and other key stakeholders, experience a transformation in how a business needs to think about the value of its IT people and the work that they do. This results in some truly groundbreaking innovations in the scope and contribution of Ian's role as CIO, the people that work for him and the strategy that he leads. Watch the characters in this extraordinary business novel as they meet the challenge, struggle and grow. Share in Ian's transformation, and join the author in observing key messages as the adventure unfolds. Part entertaining novel and part enlightening textbook - FruITion takes the reader through a discovery process revealing indispensable messages about the next generation of strategies for Information Technology. - Jeremy Hall, Managing Director, IRM UK Strategic IT Training FruITion brings vividly to life the issues of being a CIO in today's corporate world and how IT, when properly integrated into the objectives of a business can drive massive value creation. His insights into how to win the engagement war and bring technology strategies alive for the non technical are absolutely spot on. - Steve Adams, COO and Managing Director for Card Services, Euronet Worldwide The modern CIO is to be seen as part of the business rather than a service provider to the business. Chris Potts is at the forefront of thinking that will put us all there if we act on his inspiration. - David Brown, CIO of Scottish WaterMore from the author, Chris PottsThe debate over the CIO role, and about the extent to which it should be about business or technology, is taking place in an increasing vacuum of strategic context.  Some CIOs have abandoned strategy altogether, while others persevere with a traditional IT Strategy founded in the mindset of the mainframe era.  Meanwhile, business managers and staff continue to develop their knowledge of technology and understanding of how to exploit it.  There seems to be a presumption that the next-generation strategic purpose of the CIO will be an incremental step on from what has gone before - significant, maybe, but still incremental.  What if the CIO's new strategic context is not incremental but disruptive, requiring a very different mindset and skillset?  And, most crucially, what if the corporate strategists - rather than the CIO community - are the ones deciding what context is?   Their offer to the CIO:  you can become one of the corporate strategists like us, but not with your traditional scope and approach to strategy.  What does that offer look like and what does it mean for incumbent CIOs and the people who work for them? Chris Potts works with executives and CIOs in industry-leading companies around the world, formulating and executing the new generation of corporate strategies for exploiting IT. He delivers public seminars that are founded on his own breakthrough work with clients, and has provided training to some of the worlds leading consultancies.

      • Computing & IT
        January 2014

        The Audacity to Spy

        How Government, Business, and Hackers Rob Us of Privacy

        by Catherine Nolan and Ashley M. Wilson, JD

        Ever get the feeling you're being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more.   This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet.   The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalize their own services and to sell to other advertisers for behavioral marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasn't enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users's valuable personal and financial information.   More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.

      • Computing & IT
        January 2014

        Non-Invasive Data Governance

        The Path of Least Resistance and Greatest Success

        by Robert S. Seiner

        Data-governance programs focus on authority and accountability for the management of data as a valued organizational asset. Data Governance should not be about command-and-control, yet at times could become invasive or threatening to the work, people and culture of an organization. Non-Invasive Data Governance™ focuses on formalizing existing accountability for the management of data and improving formal communications, protection, and quality efforts through effective stewarding of data resources. Non-Invasive Data Governance will provide you with a complete set of tools to help you deliver a successful data governance program.   Learn how: Steward responsibilities can be identified and recognized, formalized, and engaged according to their existing responsibility rather than being assigned or handed to people as more work. Governance of information can be applied to existing policies, standard operating procedures, practices, and methodologies, rather than being introduced or emphasized as new processes or methods. Governance of information can support all data integration, risk management, business intelligence and master data management activities rather than imposing inconsistent rigor to these initiatives. A practical and non-threatening approach can be applied to governing information and promoting stewardship of data as a cross-organization asset. Best practices and key concepts of this non-threatening approach can be communicated effectively to leverage strengths and address opportunities to improve.

      • Ethical & social aspects of computing

        SLOW COMPUTING

        Why We Need Balanced Digital Lives

        by Rob Kitchin, Alistair Fraser

        Digital technologies should be making life easier. And to a large degree they are, transforming everyday tasks of work, consumption, communication, travel and play. But they are also accelerating and fragmenting our lives affecting our well-being and exposing us to extensive data extraction and profiling that helps determine our life chances. Initially, the COVID-19 pandemic lockdown seemed to create new opportunities for people to practice ‘slow computing’, but it quickly became clear that it was as difficult, if not more so, than during normal times. Is it then possible to experience the joy and benefits of computing, but to do so in a way that asserts individual and collective autonomy over our time and data? Drawing on the ideas of the ‘slow movement’, Slow Computing sets out numerous practical and political means to take back control and counter the more pernicious effects of living digital lives.

      • Computing & IT
        January 2014

        Data Resource Data

        A Comprehensive Data Resource Understanding

        by Michael Brackett

        "Are you struggling to gain a thorough understanding of your organization's data resource? Are you finding that your data resource has become quite disparate through lack of understanding? Are you having difficulty developing meaningful meta-data about your data resource, or understanding the meta-data that have been developed? Do you agonize over finding a way to document your data resource that is thorough, understandable, and readily available? If the answer to any of these questions is Yes, then you need to read Data Resource Data to help you understand your organization's data resource.   Most public and private sector organizations do not have a formal process for thoroughly documenting the entire data resource at their disposal, in any meaningful manner, that is readily available to everyone in the organization. Most do not even have a formal design for that documentation. The much abused, misused, misspelled, undefined, and incomplete meta-data are not providing a denotative understanding of the organization's data resource, without which a high quality data resource cannot be developed.   Data Resource Data provides the complete detailed data resource model for understanding and managing data as a critical resource of the organization. The model presents formal data resource data as a replacement for the relatively ineffective meta-data. It provides an excellent example of a formal data resource model, compared to a traditional data model, that can be easily implemented by any organization. The use of data resource data ensures a thorough understanding of an organization's data resource and the development of a high quality comparate data resource.   Like Data Resource Simplexity, Data Resource Integration, and Data Resource Design, Michael Brackett draws on five decades of data management experience, in a wide variety of different public and private sector organizations, to understand and document an organization's data resource. He leverages theories, concepts, principles, and techniques from many different and varied disciplines, such as human dynamics, mathematics, physics, chemistry, philosophy, and biology, and applies them to the process of formally documenting an organization's data resource.

      • Computing & IT
        August 2014

        Data Resource Data

        A Comprehensive Data Resource Understanding

        by Michael Brackett

        Are you struggling to gain a thorough understanding of your organization's data resource? Are you finding that your data resource has become quite disparate through lack of understanding? Are you having difficulty developing meaningful meta-data about your data resource, or understanding the meta-data that have been developed? Do you agonize over finding a way to document your data resource that is thorough, understandable, and readily available? If the answer to any of these questions is Yes, then you need to read Data Resource Data to help you understand your organization's data resource.Most public and private sector organizations do not have a formal process for thoroughly documenting the entire data resource at their disposal, in any meaningful manner, that is readily available to everyone in the organization. Most do not even have a formal design for that documentation. The much abused, misused, misspelled, undefined, and incomplete meta-data are not providing a denotative understanding of the organization's data resource, without which a high quality data resource cannot be developed.Data Resource Data provides the complete detailed data resource model for understanding and managing data as a critical resource of the organization. The model presents formal data resource data as a replacement for the relatively ineffective meta-data. It provides an excellent example of a formal data resource model, compared to a traditional data model, that can be easily implemented by any organization. The use of data resource data ensures a thorough understanding of an organization's data resource and the development of a high quality comparate data resource.Like Data Resource Simplexity, Data Resource Integration, and Data Resource Design, Michael Brackett draws on five decades of data management experience, in a wide variety of different public and private sector organizations, to understand and document an organization's data resource. He leverages theories, concepts, principles, and techniques from many different and varied disciplines, such as human dynamics, mathematics, physics, chemistry, philosophy, and biology, and applies them to the process of formally documenting an organization's data resource.

      • Computing & IT
        September 2014

        Non-Invasive Data Governance

        The Path of Least Resistance and Greatest Success

        by Robert S. Seiner

        Data-governance programs focus on authority and accountability for the management of data as a valued organizational asset. Data Governance should not be about command-and-control, yet at times could become invasive or threatening to the work, people and culture of an organization. Non-Invasive Data Governance™ focuses on formalizing existing accountability for the management of data and improving formal communications, protection, and quality efforts through effective stewarding of data resources.Non-Invasive Data Governance will provide you with a complete set of tools to help you deliver a successful data governance program. Learn how:Steward responsibilities can be identified and recognized, formalized, and engaged according to their existing responsibility rather than being assigned or handed to people as more work.Governance of information can be applied to existing policies, standard operating procedures, practices, and methodologies, rather than being introduced or emphasized as new processes or methods.Governance of information can support all data integration, risk management, business intelligence and master data management activities rather than imposing inconsistent rigor to these initiatives.A practical and non-threatening approach can be applied to governing information and promoting stewardship of data as a cross-organization asset.Best practices and key concepts of this non-threatening approach can be communicated effectively to leverage strengths and address opportunities to improve.

      • Computing & IT
        March 2021

        How Programs Work, Third Edition

        The Fundamentals of Programming You Need to Know

        by Hisao Yazawa

        This book explains how a program works in a computer in a way that anyone can understand. The program is loaded into memory, interpreted and executed by the CPU. The structure of the program is explained in an orderly fashion using numerous diagrams. The third edition has been reviewed in its entirety, with new products and development tools, and significant additions have been made to the text and notes so that even those new to programming will not be confused. The hardware explanations and sample programs in C programming language, which were well received in the second edition, have also been updated. The supplementary chapter at the end of the book, "Let's Try C programming language! has also been revised to conform to the latest specifications. Newly written Chapter 12 covers machine learning with Python. Readers experiencing machine learning for the first time will become familiar with artificial intelligence (AI) as a way to utilize computers and programs. In addition, an explanation of Python, "Let's Try Python!" has been added to the supplementary chapter at the end of the book.

      • Computing: general
        January 1985

        Information Technologies and Social Transformation

        by National Academy of Engineering; Bruce R. Guile, editor

        This collection of papers by scholars of technology and society, based on a National Academy of Engineering symposium, explores the process of mutual adjustment between information technologies and social institutions. The topics addressed include recent developments and likely futures in information technology, comparison of information technology to historical developments in other technologies, and the interaction of information technology with businesses, homes, property rights in information, and various hierarchies of social organization.

      • Computing: general
        January 1985

        Methods for Designing Software to Fit Human Needs and Capabilities

        Proceedings of the Workshop on Software Human Factors

        by Committee on Human Factors, National Research Council

      • Computing: general
        January 1989

        Improving Risk Communication

        by Committee on Risk Perception and Communication, National Research Council

        Technological risk and the process of explaining risks to the public have become major public issues. The mention of Bhopal or Love Canal can provoke emotional arguments--not only about the hazards themselves but also about how they were explained to the public. As new laws, the threat of AIDS, and other factors make risk communication more crucial, officials in government and industry are seeking guidelines on how to communicate effectively and responsibly. This volume offers an approach to better quality in risk communication. The combined insight of experts from government, business, and universities, Improving Risk Communication draws on the most current academic and practical information and analysis. Issues addressed include why risk communication has become more difficult in recent decades, what the major problems are, and how common misconceptions often hamper communication campaigns. Aimed especially at top decisionmakers in government and industry, the book emphasizes that solving the problems of risk communication is as much about improving procedures as improving the content of risk messages. Specific recommendations for change include a Risk Message Checklist and a call for developing a consumer's guide to risk. Appendixes provide additional details.

      • Computing: general
        August 1997

        Bits of Power

        Issues in Global Access to Scientific Data

        by Committee on Issues in the Transborder Flow of Scientific Data, National Research Council

        Since Galileo corresponded with Kepler, the community of scientists has become increasingly international. A DNA sequence is as significant to a researcher in Novosibirsk as it is to one in Pasadena. And with the advent of electronic communications technology, these experts can share information within minutes. What are the consequences when more bits of scientific data cross more national borders and do it more swiftly than ever before? Bits of Power assesses the state of international exchange of data in the natural sciences, identifying strengths, weaknesses, and challenges. The committee makes recommendations about access to scientific data derived from public funding. The volume examines: Trends in the electronic transfer and management of scientific data. Pressure toward commercialization of scientific data, including the economic aspects of government dissemination of the data. The implications of proposed changes to intellectual property laws and the role of scientists in shaping legislative and legal solutions. Improving access to scientific data by and from the developing world. Bits of Power explores how these issues have been addressed in the European Community and includes examples of successful data transfer activities in the natural sciences. The book will be of interest to scientists and scientific data managers, as well as intellectual property rights attorneys, legislators, government agencies, and international organizations concerned about the electronic flow of scientific data.

      • Computing: general
        October 1996

        Cryptography's Role in Securing the Information Society

        by Kenneth W. Dam and Herbert S. Lin, Editors, Committee to Study National Cryptography Policy, National Research Council

        For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptography--the representation of messages in code--and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examples -- some alarming and all instructive -- from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.

      Subscribe to our

      newsletter