32 books
To date, "Web Security" has been associated with debates over cryptographic technology, protocols and public policy, obscuring the wider challenges of building trusted Web applications. Since the Web aims at being an information space that reflects not just human knowledge but also human relationships, it will soon realize the full complexity of trust relationships among people, computers and organizations. This has led to a new breed of systems – ...
In this digital era, Information Technology (IT) has become a core element for businesses to make their operations more efficient, improve product quality, comply with statutory requirements, manage risk and security- in short, generate overall business value. As the dependence of organizations on IT had grown, the IT budgets have increased significantly. Thus, the management were required to optimize IT investment and extract maximum value out of every dollar ...
Regardless of industry, size and location, today’s agile and highly productive organizations require something, which is fundamentally different and that makes their operations streamlined, eliminates wastes and enables them to exceed their targets. Presently, business houses look at Knowledge Integration as the solution. Knowledge Integration is essentially a process of exchange, creation and morally appropriate application of knowledge within a complex system ...
A new field, cyber forensics, is in the process of extracting information and data from computer storage media accurately and reliably. However, this is not enough, because here the challenge lies in not just finding and collecting data, but preserving and presenting it in a manner that a judicial prospect will accept it. These are ways of combating cyber crime, which make it important for advances in the law enforcement, legal and forensic computing technical ...
IT is indispensable in smooth functioning of any organization today, irrespective of the industry it functions in. The quantum and quality of IT investment differ as to how the systems are used, the degree to which they align with the strategic goals of the organization and ultimately how much business value they deliver vis-Ã -vis the resources invested. Further, all IT systems employed are not of equal strategic importance. IT systems are categorized into ...
After blogs and RSS feeds, Wikis have opened new avenues of collaborative working both in the knowledge industry and in individual intellectual pursuits. A Wiki is a way of creating interlinked web or HTML pages by using simple mark-up language with a web browser. After the success of 'Wikipedia', an online public encyclopedia, Wikis have become very popular and are used in commercial organizations, research agencies and universities. This book brings to light ...
In the ever evolving field of information technology, every element of the software’s operational environment is in a state of constant flux: frequent changes in the hardware, operating system, cooperating software and client’s expectations are motivated by performance improvements, bug-fixes, security breaches and attempts to assemble synergistically ever more sophisticated software systems. With increasing applications of software, the complexity of the ...
Electronic negotiation is an interdisciplinary research area that combines the best of economics, information systems, computer science, communication theory, sociology and psychology. Today, negotiations are conducted via electronic media powered by sophisticated software applications. These support systems can support collaboration between decision-makers who are separated geographically and is an important part of an e-business today.
Today, the Internet has evolved into a dynamic information warehouse, housing variety of data in diverse data formats. Each data element on the web has a meaning and context attached to it that defines its semantics. The users on Internet need the searched data to be compiled at a faster pace also taking into consideration the relevance of the data. Today, the most advanced search engines facilitate retrieving data from the web on the basis of matching and ...
A new field, cyber forensics, is in the process of extracting information and data from computer storage media accurately and reliably. However, this is not enough, because here the challenge lies in not just finding and collecting data, but preserving and presenting it in a manner that a judicial prospect will accept it. These are ways of combating cyber crime, which make it important for advances in the law enforcement, legal and forensic computing technical ...
For years, computer virus has affected the productive use of computers, often challenging the user and the anti-virus software vendor from preventing or recovering from viral-attacks. Virus attack, hacking, stealing password, browser hijack, spam, and malware are very common major impediments for activities on the Internet. Growing technical sophistication and ingenuity of the masquerader have given birth to another computer malady that has become quite ...
Today, IT complements global businesses to so that it redefines business approaches, economic models and functional frameworks. Consequently, businesses are embracing IT as a strategic tool for competitive advantage. This requires building IT infrastructure by carefully addressing a company’s business goal and complementing its entire organizational strategy. This book outlines the strategic importance of IT, highlights the changing role of CIOs and IT managers ...
The growing ubiquity and pervasiveness of the web in day-to-day life of humans is having a profound impact on the way people socialize, network, communicate and collaborate on the web. Accelerated by the increasing activities on the Internet, coupled with path breaking innovation in web technologies, the web is transforming itself from being a sedate online publishing medium to a dynamic platform for collaboration. The emergence and wide acceptance of the new ...
Growing business complexities and information needs have prompted extensive use of complex software applications in almost every organizational function. These complex applications, from payroll to supply chain integration and customer relationship management, and running on heterogeneous technology infrastructure have exhausted the limits of traditional software architecture. Further, a shift in business orientation, i.e., from product to service calls for a ...
In this digital era, telecommunications and networking technologies are instrumental in enabling people and businesses across the globe to interconnect and transact, shrinking the physical world into a global digital village. However, even after a decade of active proliferation, this connectivity is still eluding the geographically remote and economically backward areas depriving the people there from participating in the digital revolution. Such disconnections ...
Software programs have become the most crucial building blocks of today’s ICT infrastructure. Starting from Operating System to Database Management, Data Communication and myriad software tools run an information system. Software can be developed as proprietary business by an organization or an individual and distributed at cost, or Free/Openly, by the Open Source community of voluntary contributors.
The Internet has shrunk the world into a global village. It has not only evolved as a preferred medium for communication and information sharing, but also as a medium for entertainment and economic activities, building communities and transacting at professional and personal levels, contributing to the global and local economic development. With nearly one fifth of the world’s population being connected to the Internet conducting millions of transactions every ...
How to manage storage of information in business without its affecting operational efficiency, how to extract value from information without increasing the storage cost, and how to strike a balance between storage cost and information value from the time the data is generated till it is retired are the three basic challenges that gave birth to data storage management or Information Lifecycle Management (ILM).
Information Technology (IT) has transformed the way the banks do business. Banks are leveraging on technology not only to cut cost but also to reduce the transaction time and improve overall efficiency. No bank, – no matter, the location or scale – can ignore technology. It has become inevitable for survival of any bank. Apparently, the application of IT in banks has transformed the traditional banking industry, from being a highly protected governmental ...
Over the last few decades, Credit scoring has emerged as an effective tool, which facilitates lenders in assessing the creditworthiness of customers and determining the future risk of sanctioning credit based on their past record. Banks and financial institutions have been using credit scores in their credit-deciding process. Of late, the scope of credit scoring has expanded widely and is now increasingly used by telecom companies, utility service providers, ...
Economics has evolved over a long period of time. It has seen the emergence of various schools of thought enriched with the ideas of great philosophers. In recent times, a new branch of economic theory called Evolutionary Economics has emerged drawing new dimensions into the explanation of economic phenomena. It is based on the principles of evolution and biology. What makes Evolutionary Economics distinct from the mainstream economics is its opposition to the ...
A search engine or search service is a program designed to extract/find web pages or information stored on the WWW. Search engines facilitate easy access to the desired information on the Internet or a corporate database or a personal computer. The strength and usefulness of a search engine depends on the relevance of the result it produces for a given query and the way such results are presented. There are several search engines available on the Internet, but ...
1. Central Banking Governance - Insights, 2. Central Bank Independence and Governance: Definitions and Modelling, 3. Central Bank Independence and Policy Results: Theory and Evidence, 4. Communicating a Policy Path: The Next Frontier in Central Bank Transparency? 5. Governance Structures and Decision-Making Roles in Inflation Targeting Central Banks, 6. Central Bank Governance: Maintaining Arms ...
Information Technology (IT) has a profound impact on several aspects of our day-to-day life. Over the past decade, the rapid advancements in computing technologies have increased the potential for developing a viable IT system that manages the complex spatial data. The software technology in this context is Geographic Information System (GIS). GIS uses geographically referenced data as well as non-spatial data and includes operations, which support spatial ...