You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
With a unique focus on the relationship between assessment and engagement this book explores what works in terms of keeping students on course to succeed. Against a backdrop of massification and the associated increase in student diversity there is an escalating requirement for personalized, technology driven learning in higher education. In addition, the advent of student fees has promoted a consumer culture resulting in students having an increasingly powerful voice in shaping curricula to their own requirements. How does one engage and retain a group of students of such diverse culture, ethnicity, ambition and experience? Using examples from a variety of institutions worldwide this edited...
Struggling to support her family in mid-19th-century New York, writer Frances Osgood makes an unexpected connection with literary master Edgar Allan Poe and finds her survival complicated by her intense attraction to the writer and the scheming manipulations of his wife.
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value. Recent reviews of extant literature highlights the need for multi-disciplinary research. This research should explore and further develops the conceptualization of value in cloud computing research. In addition, there is a need for research which investigates how IT value manifests itself across the chain of service provision and in inter-organizational scenarios. This open access book will review the state of the art from an IS, Computer Science and Accounting perspective, will introduce and discuss the main techniques for measuring business value for cloud computing in a variety of scenarios, and illustrate these with mini-case studies.
The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support th...
Increasingly, the virtual became reality by a hybridization of the world as we knew it: the process that went on in recent years is one of a technically assisted hybridization of both space and self, the »old« world is becoming virtualized and functionalized to a degree never experienced before. For the first time in human history, we have reached a threshold where we have not only to re-assert but to redefine ourselves, as regards our fundamental terms of understanding what world means for us, our base of existence and now an assemblage of mixed realities; and connected, what being human means. With a Preface by Gerd Stern.
After spending twenty years hunting and bringing to justice devious, and deliberate murderers with the Criminal Investigation Division of the Army, Major Lynne Fhaolain had decided to retire to the high, quiet mountains in Colorado. Early retirement and the unexpected death of her partner leaves Lynne trying to hang on and build a new life by moving to Leadville, Colorado. She wants to stay busy and focused on the opening of a small bookshop and getting her secondary career as a travel book writer off to a running start. As she makes her way to her new home in the old mining town, a killer emerges from the community to prey on unsuspecting tourists and locals alike. Befriended by two old town cronies, Lynne finds herself privy to more information about the murders than she wanted to know. Against her better judgment, Lynne finds herself teased and taunted by the mystery posed as the force of old habits return. Unfortunately, Lynne's habits of curiousity are noticed by the murderer. This fast, well-paced mystery goes into high gear as hunter and hunted circle in for the kill.
Many Cloud data auditing algorithms have been proposed to maintain the integrity and privacy of data held in the Cloud. In this book, we present a survey of the state of the art and research of Cloud data auditing techniques with a brief introduction of the basic cloud computing concepts, its architecture and security issues. This book presents an overview of the various methods presently used to perform Cloud data auditing, mostly focusing on integrity and privacy.
Lost in the Long White Cloud is both creation story and vision quest of a healer. Prolific author, David H. Rosen, was the child of creative parents. Free to explore, the sometimes unattended toddler turned into a smart "good boy" with a "bad boy's" energy for funny, sad and scary escapades. The future author of The Tao of Elvis so successfully impersonated Elvis in junior high, that his gyrations led to "girls, girls, girls" -- and even a marriage proposal from one enamored adolescent's parents! Rosen's story takes us all over the map. In Greece, David lays awake under the stars with lovely Lolly and decides to become a fisherman. He pays a Parisian prostitute just to listen to her story, w...
Almost everything that matters to humans is derived from and through communication. Just because people communicate every day, however, does not mean that they are communicating competently. In fact, evidence indicates that there is a substantial need for better interpersonal skills among a significant proportion of the populace. Furthermore, "dark side" experiences in everyday life abound, and features of modern society pose new challenges that make the concept of communication competence increasingly complex. The Handbook of Communication Competence brings together scholars from across the globe to examine these various facets of communication competence, including its history, its essential components, and its applications in interpersonal, group, institutional, and societal contexts. The book provides a state-of-the-art review for scholars and graduate students, as well as practitioners in counseling, developmental, health care, educational, intercultural, and human resource management contexts, illustrating that communication competence is vital to health, relationships, and all collective human endeavors.
The use of cloud applications is becoming increasingly popular due to their scalability and cost advantages. However, companies need help in adopting cloud applications due to their internal policies and compliance requirements. Trust and security are crucial factors that influence the adoption of cloud applications. This book proposes a cloud architecture that addresses this challenge by shifting the trust for compliance-driven configurations of cloud applications from the cloud application provider to the blockchain. The architecture was developed using design science research and evaluated using mixed-method semi-structured guided interviews. The results show that the proposed architecture can significantly reduce adoption risk due to compliance-driven cloud application configurations, shifting trust from the cloud provider to the blockchain. This book presents an innovative approach to address the challenge of adopting cloud applications, and enhancing trust and security for businesses.