You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Cybersecurity Management looks at the current state of cybercrime and explores how organizations can develop resources and capabilities to prepare themselves for the changing cybersecurity environment.
Blockchain and Supply Chain Management combines discussions of blockchain and supply chains, linking technologies such as artificial intelligence, Internet of Things, satellite imagery, and machine vision. The book examines blockchain's basic concepts, relevant theories, and its roles in meeting key supply chain objectives. The book addresses problems related to inefficiency, opacity, and fraud, helping the digitization process, simplifying the value creation process, and facilitating collaboration. The book is balanced between blockchain and supply chain application and theory, covering the latest technological, organizational and regulatory developments in blockchain from a supply chain pe...
The Internet’s rapid diffusion and digitization of economic activities have led to the emergence of a new breed of criminals. Economic, political, and social impacts impacts of these cyber-criminals’ activities have received considerable attention in recent years. Individuals, businesses, and governments rightfully worry about the security of their systems, networks, and IT infrastructures. Looking at the patterns of cybercrimes, it is apparent that many underlying assumptions about crimes are ?awed, unrealistic, and implausible to explain this new form of criminality. The empirical records regarding crime patterns and stra- gies to avoid and ?ght crimes run counter to the functioning of...
This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on specific countries’ engagement in cyberattacks and the development of cyber-warfare capabilities. Further, the book demonstrates how a nation’s technological advancement may not necessarily lead to cyber-superiority. It covers cybersecurity issues with regard to conflicts that shape relationships betwee...
A number of indicators point to rapid and extraordinary shifts in the Chinese high technology landscape. This book examines how the Chinese way of transition to a market economy has superimposed in a complex interaction with Chinese institutions, industry and market to shape the country's technology trajectory. It analyzes how formal and informal institutions; and associated feedback mechanisms have influenced the Chinese high technology industry and market. A further goal of the book is to deeply investigate the nature, sources and quality of key ingredients related to the Chinese high technology industry. Finally, the book provides an insight into the status and focus of the Chinese high technology industry.
Electronic commerce technologies and applications have changed the way information technology is used in business and society, allowing organizations worldwide to expand their market reach and their customer service. Cases on Electronic Commerce Technologies and Applications presents a wide range of real-life cases that describe the successful and unsuccessful adoption of e-commerce, e-business, e-government, mobile commerce, and Web services technologies. This collection provides significant insight on the successful implementation of these areas.
Integrating theories from a wide range of disciplines, Nir Kshetri compares the patterns, characteristics and processes of cybercrime activities in major regions and economies in the Global South such as China, India, the former Second World economies, Latin America and the Caribbean, Sub-Saharan Africa and Middle East and North Africa.
While difficult to define conclusively, cyberterrorism involves using computer systems to create chaos and fear in order to harm individuals or larger groups such as organizations or nation states. Acts of cyberterrorism can be a major threat to infrastructure and security. But how realistic a threat are they? Some experts claim that despite their dramatic scope, cyberterrorist acts are mostly exaggerated by the media. Others counter that such threats should be taken very seriously. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it.
A concise introduction to a complex field, bringing together recent work in cognitive science and cognitive robotics to offer a solid grounding on key issues. This book offers a concise and accessible introduction to the emerging field of artificial cognitive systems. Cognition, both natural and artificial, is about anticipating the need for action and developing the capacity to predict the outcome of those actions. Drawing on artificial intelligence, developmental psychology, and cognitive neuroscience, the field of artificial cognitive systems has as its ultimate goal the creation of computer-based systems that can interact with humans and serve society in a variety of ways. This primer br...
This book investigates how the Blockchain Technology (BCT) for Supply Chain Finance (SCF) programs allows businesses to come together in partnerships and accelerate cash flows throughout the supply chain. BCT promises to change the way individuals and corporations exchange value and information over the Internet, and is perfectly positioned to enable new levels of collaboration among the supply chain actors. The book reveals new opportunities stemming from the application of BCT to SCF financing solutions, particularly reverse factoring – or approved payables financing. To do so, it first identifies the principal barriers and pain points in delivering financing solutions. Then, a possible ...