You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." –V. Reding, Commissioner, Responsible for Information Society and Media (EU)
Phase transitions in disordered systems and related dynamical phenomena are a topic of intrinsically high interest in theoretical and experimental physics. This book presents a unified view, adopting concepts from each of the disjoint fields of disordered systems and nonlinear dynamics. Special attention is paid to the glass transition, from both experimental and theoretical viewpoints, to modern concepts of pattern formation, and to the application of the concepts of dynamical systems for understanding equilibrium and nonequilibrium properties of fluids and solids. The content is accessible to graduate students, but will also be of benefit to specialists, since the presentation extends as far as the topics of ongoing research work.
"Roughening dynamics of various interface problems has been an attractive topic recently. The subject is related to many interdisciplinary branches in nonequilibrium statistical physics such as crystal growth, vortex dynamics, fractals and chaos, and self-organized critical phenomena. This volume includes pedagogical reviews of the scaling concepts in fluctuating surfaces, current theories on expitaxial growth phenomena and interface dynamics in disordered media, and many other related topics. Thus it serves as a valuable reference for both graduate students and researchers in statistical physics and materials science."--Publisher's website.
This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity management and online social networks. For that, we investigate which pieces of PII can how often be gathered, correlated, or even be inferred by third parties that are not intended to get access to the specific pieces of PII. Furthermore, we introduce technical measures and concepts to avoid unintended flows of PII.
Max Reger (1873-1916) is perhaps best-known for his organ music. This quickly assumed a prominent place in the repertory of German organists due in large measure to the efforts of Reger?s contemporary Karl Straube (1873-1950). The personal and collegial relationship between the composer and performer began in 1898 and developed until Reger?s death. By that time, Straube had established himself as an important artist and teacher in Leipzig and the central authority for the interpretation of Reger?s organ music. The Reger-Straube relationship functioned on a number of levels with decisive consequences both for the composition of the music and its interpretation over a period fraught with uphea...
This handbook provides a comprehensive overview of the pragmatics of social media, i.e. of digitally mediated and Internet-based platforms which are interactively used to share and edit self- and other-generated textual and audio-visual messages. Its five parts offer state-of-the-art reviews and critical evaluations in the light of on-going developments: Part I The Nature of Social Media sets up the conceptual groundwork as it explores key concept such as social media, participation, privacy/publicness. Part II Social Media Platforms focuses on the pragmatics of single platforms such as YouTube, Facebook. Part III Social Media and Discourse covers the micro-and macro-level organization of social media discourse, while Part IV Social Media and Identity reveals the multifarious ways in which users collectively (re-)construct aspects of their identities. Part V Social Media and Functions/Speech Acts surveys pragmatic studies on speech act functions such as disagreeing, complimenting, requesting. Each contribution provides a state-of-the-art review together with a critical evaluation of the existing research.
This international Handbook provides a comprehensive overview of key topics, debates and issues within the now well-established field of Knowledge Management (KM). With contributions from a range of highly-skilled authors, diverse and multi-disciplinary approaches towards KM are explored in this fantastic new reference work. Topics covered include performance, ethics, sustainability and cross-cultural management, making this an equally important read to academics and practitioners working in areas such as technology, education and engineering. By analysing how the field of KM has developed over the years, as well as presenting new methods to be implemented in the workplace, this Handbook outlines a research agenda for the future of organisational learning and innovation.
This book presents the most interesting talks given at ISSE 2010 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Identity and Security Management - Technical and Economical Aspects of Cloud Security - Security Services and Large Scale Public Applications - Smart Grid Security and Emerging Security Solutions - Privacy and Data Protection Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2010.