Listing 1 - 10 of 108 | << page >> |
Sort by
|
Choose an application
Das Buch behandelt die Entwicklung von modernen zu digitalen Städten. Es skizziert neue Geschäftsmodelle durch Cloud Computing und Apps-Öko-Systeme im Umfeld von Smart-City-Projekten. Es geht auf die tiefgreifenden Veränderungen für Smart-City-Infrastruktur-Anbieter durch neuartige Daten-Management-basierte Geschäftsmodelle ein. Die Rolle der Bürger und das veränderte Selbstverständnis der Stadtverwaltungen ist ein weiterer Schwerpunkt. Die Autoren geben Handlungsempfehlungen für alle Akteure einer Smart City, um komplexe Lösungen im engen Verbund mit den Bürgern und Verwaltungen zu realisieren. Die erforderlichen Geschäftsmodelle werden praxistauglich in Anwendungsbeispielen dargestellt. Inhalt Einführung - Smart Cities: Herausforderungen und Chancen moderner Großstädte - Smart Cities: IT-Basistechnologien wie Cloud Computing und Apps-Öko-Systeme - Smart Cities: innovative Apps-basierte Geschäftsmodellansätze und Partner-Netzwerke - Smart Cities: Konsequenzen aus Sicht der Stadtverwaltungen - Mega Datendrehschreiben - Anwendungsbeispiele - Ausblick Zielgruppen CEOs, CFOs, CIOs von städtischen Infrastrukturanbietern, IT-Lösungs- und Mobilitätsanbieter Strategische Stadtentwickler und politisch Verantwortliche in den Kommunen Verbände, Hochschulen und Institute Autoren Michael Jaekel verfügt über langjährige Berufserfahrung in der internationalen Strategieberatung sowie in Zentralabteilungen namhafter Großunternehmen im In- und Ausland. Weiterhin ist er gefragter Redner und Autor zu Themen wie der Transformation von Geschäftsmodellen im Zusammenhang mit „Smart Cities“, Cloud Computing und dem sog. „Internet of Services“. Karsten Bronnert verfügt über langjährige Berufserfahrung in global agierenden IT-Großunternehmen in den Bereichen Business Development, Produktplanung, Strategieentwicklung und Projektmanagement. Als Experte für Innovationsmanagement ist er Autor zu innovativen IT-Themen und deren Einsatz bei der Weiterentwicklung moderner Städte hin zu digitalen „Smart Cities“.
Choose an application
Der Band führt anschaulich in das Programm „NetDraw“ Schritt für Schritt ein und ermöglicht den LeserInnen die Nutzung des Programms innerhalb weniger Stunden. Der Inhalt Einführung in NetDraw • Erhebung von Netzwerkdaten • Netzwerkbegriff, Darstellung und Systematik von Graphen, Analyseebenen • Eingabe von Daten und erste Schritte mit Netdraw • Definition, Import und Anwendung von Attribut-Dateien • Praxisbeispiel: Beziehungen in einer Schulklasse Die Zielgruppen SoziologInnen • Sozial-, Medien- und KommunikationswissenschaftlerInnen Die Autoren Dr. Christian Stegbauer ist Professor für Soziologie an der Universität Frankfurt a.M. Alexander Rausch ist Netzwerkforscher und tätig im Hochschulrechenzentrum der Universität Frankfurt a.M.
Social sciences. --- Communication. --- Sociology. --- Computers and civilization. --- Methodology of the Social Sciences. --- Media Research. --- Computers and Society.
Choose an application
Die zunehmende Verbreitung und steigende Abhängigkeit von Informationstechnologien und darauf aufsetzender Dienste führen zu bisher unberücksichtigten ökologischen und sozialen Herausforderungen. Das IT-Management sieht sich aufgrund dieser Entwicklung mit neuen Anforderungen seitens der Geschäftsbereiche, der Kunden und der Mitarbeiter konfrontiert. Wachsender Energieverbrauch beim Betrieb und der Nutzung von IT-Infrastrukturen bei kontinuierlich steigenden Rechenleistungen sowie die immer kürzer werdenden Lebenszyklen von IT-Produkten erfordern neue strategische Konzepte für das IT-Management. Vor diesem Hintergrund werden in diesem Buch Best Practices im Bereich Green IT vorgestellt. Anhand von Fallstudien, die gemeinsam mit Autoren aus der Praxis verfasst wurden, sollen die Bedeutung und der Umsetzungsstand einer Nachhaltigkeitsorientierung im IT-Management aufgezeigt werden. In diesem Zusammenhang dokumentieren die Fallstudien aktuelle Bemühungen der Organisationen im Rahmen einer Green IT. Ziel des Buches ist es, IT-Organisationen anwendungsorientierte Konzepte und Modelle für die praktische Umsetzung zur Verfügung zu stellen. Der Inhalt Bedeutung der Nachhaltigkeit für das IT-Management und die Grundlagen einer Nachhaltigkeitsorientierung durch Bereitstellung von konkreten Managementwerkzeugen und Rahmenkonzepten Dokumentierte Praxisbeispiele anhand von Unternehmensfallstudien für eine konsequente Umsetzung von Green IT in der Praxis Handlungsempfehlungen und Ausblick auf zukünftige Entwicklungen Die Zielgruppen Führungskräfte in IT-Organisationen (z. B. CIO, IT-Manager, Rechenzentrumsleiter) IT-Consultants und Nachhaltigkeits- oder Umweltbeauftragte im Unternehmen Die Autoren Prof. Dr. Rüdiger Zarnekow ist Inhaber des Lehrstuhls für Informations- und Kommunikationsmanagement an der Technischen Universität Berlin. Seine Forschungsschwerpunkte liegen im Bereich des Informationsmanagements, Cloud Computing, IT-Service-Managements und der Geschäftsmodelle für die ICT Industrie. Prof. Dr. Lutz M. Kolbe ist Inhaber des Lehrstuhls für Informationsmanagement am Department für Betriebswirtschaftslehre der Georg-August-Universität Göttingen. Seine Forschungsschwerpunkte liegen im Bereich des Sustainable IT Managements, des IT-Innovationsmanagements, des IT-Service-Managements und der Informationssicherheit.
Management. --- Industrial management. --- Business ethics. --- Computers and civilization. --- Innovation/Technology Management. --- Business Ethics. --- Computers and Society. --- Computer science. --- Economics.
Choose an application
Mit seinen digitalen Marktplätzen, Suchmaschinen, sozialen Netzwerken und vielen anderen Diensten kann das Internet zur Verwirklichung grundlegender europäischer Werte beitragen: freie Selbstbestimmung, politische Partizipation und wirtschaftliches Wohlergehen der Menschen. Allerdings bezahlen Nutzerinnen und Nutzer Internet-Dienste häufig mit Daten statt mit Geld, wodurch ihre Privatheit infrage gestellt wird. Angesichts dieser Spannung zeigt acatech, wie eine Internet-Kultur entwickelt werden kann, die es erlaubt, die Chancen des Internets wahrzunehmen und dabei die Privatheit der Menschen schützt. Diese achatech Position enthält konkrete Handlungsempfehlungen, wie Bildung, Wirtschaft, Recht und Technik zu einer solchen Kultur beitragen können.
Electrical engineering. --- Computers and civilization. --- Social sciences. --- Information technology. --- Business—Data processing. --- Mass media. --- Law. --- Communications Engineering, Networks. --- Computers and Society. --- Social Sciences, general. --- IT in Business. --- IT Law, Media Law, Intellectual Property.
Choose an application
This book constitutes the refereed conference proceedings of the 12th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2013, held in Athens, Greece, in April 2013. The 25 revised papers presented together with a keynote speech were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: trust and privacy; security, access control and legal requirements in cloud systems; protocols, regulation and social networking; adoption issues in e/m-services; new services adoption and ecological behavior; knowledge management and business processes; and management, policies and technologies in e/m-services.
Computer science. --- Computer Science. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Engineering & Applied Sciences --- Computer Science --- Informatics --- Computers and civilization. --- Computer networks --- Science --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- I3E --- E-business
Choose an application
The rapid pace of change in computing demands a continuous review of our defensive strategies, and a strong ethical framework in our computer science education. This fully revised and enhanced fifth edition of Ethical and Social Issues in the Information Age examines the ethical, social, and policy challenges stemming from the convergence of computing and telecommunication, and the proliferation of mobile information-enabling devices. This accessible and engaging text surveys thought-provoking questions about the impact of these new technologies. Topics and features: Establishes a philosophical framework and analytical tools for discussing moral theories and problems in ethical relativism Offers pertinent discussions on privacy, surveillance, employee monitoring, biometrics, civil liberties, harassment, the digital divide, and discrimination Examines the new ethical, cultural and economic realities of computer social network ecosystems (NEW) Reviews issues of property rights, responsibility and accountability relating to information technology and software Discusses how virtualization technology informs our ethical behavior (NEW) Introduces the new frontiers of ethics: virtual reality, artificial intelligence, and the Internet Surveys the social, moral and ethical value systems in mobile telecommunications (NEW) Explores the evolution of electronic crime, network security, and computer forensics Provides exercises, objectives, and issues for discussion with every chapter This comprehensive textbook incorporates the latest requirements for computer science curricula. Both students and practitioners will find the book an invaluable source of insight into computer ethics and law, network security, and computer crime investigation.
Computers and civilization. --- Application software. --- Cryptography. --- Data encryption (Computer science). --- User interfaces (Computer systems). --- Human-computer interaction. --- Social sciences. --- Technology --- Computers and Society. --- Computer and Information Systems Applications. --- Cryptology. --- User Interfaces and Human Computer Interaction. --- Society. --- Philosophy of Technology. --- Philosophy. --- Data encryption (Computer science) --- User interfaces (Computer systems)
Choose an application
The five-volume set LNCS 8004--8008 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. This volume contains papers in the thematic area of human-computer interaction, addressing the following major topics: speech, natural language and auditory interfaces; gesture and eye-gaze based Interaction; touch-based interaction; haptic interaction; graphical user interfaces and visualisation.
Computer science. --- Multimedia systems. --- Computer Science. --- User Interfaces and Human Computer Interaction. --- Computers and Society. --- Multimedia Information Systems. --- Engineering & Applied Sciences --- Computer Science --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Informatics --- Multimedia information systems. --- User interfaces (Computer systems). --- Computers and civilization. --- Human-computer interaction --- Information storage and retrieval systems --- Science --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems
Choose an application
This book constitutes the refereed proceedings of the Second Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2013, held in Prague, Czech Republic, in August 2013, in conjunction with DEXA 2013. The 19 revised full papers presented were carefully reviewed and selected for inclusion in this volume. They focus on the currently most sensitive areas in the field, such as identity management as a core component in any e-government or participation system, open data, mobile government applications as well as intelligent and learning systems.The papers are organized in the following topical sections: identity management in e-government; intelligent systems in e-government; e-government cases; mobile government; open government data; and e-participation.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Information systems. --- Informatics --- Science --- Information Systems. --- Application software. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Communication systems
Choose an application
This volume deals with the so-called new Information and Communication Technologies (ICT) and their interrelationship with Muslims and the interpretation of Islam. This volume taps into what has been labelled Media Studies 2.0, which has been characterized by an intensified focus on everyday meanings and ‘lay’ users – in contrast to earlier emphases on experts or self-acclaimed experts. This lay adoption of ICT and the subsequent digital ‘literacy’ is not least noticeable among Muslim communities. According to some global estimates, one in ten internet users is a Muslim. This volume offers an ethnography of ICT in Muslim communities. The contributors to this volume also demonstrate a new kind of moderation with regard to more sweeping and avant-gardistic claims, which have characterized the study of ICT previously. This moderation has been combined with a keen attention to the empirical material but also deliberations on new quantitative and qualitative approaches to ICT, Muslims and Islam, for instance the digital challenges and changes wrought on the Qur’an, Islam’s sacred scripture. As such this volume will also be relevant for people interested in the study of ICT and the blooming field of digital humanities. Scholars of Islam and the Islamic world have always be engaged and entangled in their object of study. The developments within ICT have also affected how scholars take part in and influence public Islamic and academic discussions. This complicated issue provides basis for a number of meta-reflexive studies in this volume. It will be essential for students and scholars within Islamic studies but will also be of interest for anthropologists, sociologists and others with a humanistic interest in ICT, religion and Islam.
Health -- Religious aspects -- Islam. --- Islam in mass media. --- Mass media -- Religious aspects -- Islam. --- Religion --- Philosophy & Religion --- Islam --- Mass media --- Religious aspects --- Islam. --- Religion. --- Computers and civilization. --- Anthropology. --- Religious Studies. --- Religious Studies, general. --- Computers and Society. --- Computer science. --- Informatics --- Science --- Human beings --- Religion, Primitive --- Atheism --- God --- Irreligion --- Religions --- Theology --- Civilization and computers --- Civilization --- Primitive societies --- Mass media - Religious aspects - Islam --- Islam in mass media --- Social sciences
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Computers and Society. --- Computer Communication Networks. --- Computer security --- Computer networks --- Data encryption (Computer science) --- Security measures --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Civilization and computers --- Civilization --- Distributed processing --- Computer networks.
Listing 1 - 10 of 108 | << page >> |
Sort by
|