Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives Date: 28 April 2011, 03:40
|
Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives (Premier Reference Source) By Varuna Godara * Publisher: Information Science Reference * Number Of Pages: 412 * Publication Date: 2008-10-30 * ISBN-10 / ASIN: 1605662208 * ISBN-13 / EAN: 9781605662206 Product Description: The e-businesses of today are adopting pervasive computing with fervor but at the same time becoming increasingly aware of the many risks involved in it. Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives examines the implications of pervasive computing from varying crucial perspectives so that current and future e-business managers can make responsible decisions about where, when, and how to use this technology. Containing 19 chapters from an international pool of leading experts and field practitioners, this unmatched resource will enhance the awareness of emerging and global issues in e-business risk management. Table of Contents: SECTION I: FOUNDATION, TECHNOLOGY AND INFRASTRUCTURE OF PERVASIVE COMPUTING Chapter I: Pervasive Computing: A Conceptual Framework Varuna Godara, Department of Business Systems, School of Management, College of Business, University of Western Sydney, Australia This chapter provides foundation of pervasive computing, pervasive business and smart environments by covering theoretical perspectives. It introduces the associated technologies like Ambient intelligence and Grid computing which are being used with pervasive computing to provide convenient services at any time and at any place. It also gives a comprehensive discussion of the characteristics of pervasive commerce and different views of pervasive business. It explains pervasive technology enabled smart environments and gives detailed examples of that. Chapter II: Pervasive Business Infrastructure: The Network Technologies, Routing and Security Issues Varuna Godara, Department of Business Systems, School of Management, College of Business, University of Western Sydney, Australia This chapter introduces the readers to the fundamental infrastructure of p-business. It includes discussion on various private and public wireless networks, wired networks, wireless sensor networks (WSN), global wireless media communication standards and local wireless media communication standards. This chapter details important short distance standards, cellular carrier specific standards, protocols, and security tools and techniques that are a part of pervasive business technologies. It also discusses in detail pervasive computing relevant cryptographic solutions to security problems, various routing methods and key distribution issues which are relevant to pervasive business infrastructure. Chapter III: Computational Mobile Grid: A Computing Infrastructure on Mobile Devices Deo Prakash Vidyarthi, School of Computer and Systems Sciences, Jawaharlal Nehru University, India This chapter proposes a framework of the computational mobile grid in which the mobile computational devices themselves will form a grid to provide general and specific computational services to the applications and the users of the mobile devices. It introduces the readers to the concepts of dynamic grid formation, mobile and cellular IP. It also explains the issues of resource management and scheduling in context of computational mobile grids and discusses different constraints such as security and battery constraints. SECTION II: APPLICATIONS AND SERVICES Chapter IV: Mobile and Pervasive Technology in Education and Training: Potential and Possibilities, Problems and Pitfalls Mark J. W. Lee, School of Education, Charles Sturt University, Australia This chapter explores the uses, types, and desirable attributes of mobile learning and potential of pervasive mobile learning. After identifying the problems and issues facing the development and implementation of pervasive m-learning, it discusses the implications and challenges for educators, practitioners and researchers. It also explains the possible applications for pervasive m-learning and gives detailed examples on On-the-Job Performance and Knowledge Support; Mobile Collaborative Learning and Learner Content Production; m-Mentoring and m-Assessment; Mobile, Smart, and Ad Hoc Classrooms; Learning From Objects and the Environment; Personal Learning Environments and e-Portfolios, etc. Chapter V: Ubiquitous Computing for Microbial Forensics and Bioterrorism Gaya Prasad, Department of Animal Biotechnology, College of Veterinary Sciences, CCS Haryana Agricultural University, India Minakshi, Department of Animal Biotechnology, College of Veterinary Sciences, CCS Haryana Agricultural University, India This chapter discusses the importance and abilities of microorganisms as attractive agents for use in biosensors. It introduces the discipline of microbial forensics and issues related to biological microelectromechanical systems and surveillance systems. It also identifies the potential of Ubiquitous computing technology in developing integrated small devices, which could detect bioterrorism agents, monitor the microbial pollution in water, milk and other edible commodities, etc. Chapter VI: Falling Behind: A Case in Uncritical Assessment Jonathan Gordon MacLeod Pratt, School of Management, University of Technology, Sydney, Australia This chapter gives a comprehensive discussion of Learning Management Systems as Pervasive Technologies and presents the major findings of case study research investigating uncritical assessment of an institution-wide learning management system in an Australian university. It illustrates the ways in which a range of social and institutional influences, operating internally and externally to an organization, can affect managerial decision-making. SECTION III: BUSINESS MODELS, STRUCTURES, AND STRATEGIES Chapter VII: Strategizing in the Digital World: Aligning Business Model, Brand and Technology Yvonne Lee, Digital Media, Network Ten, Australia Martin Kornberger, Faculty of Business,University of Technology, Sydney, Australia This chapter discusses change in business models with the evolution of the new digital media. It explains thoroughly the emerging business strategies, opportunities, community thinking, emerging markets and change in business models with the web. It also discusses and compares different business models that appeared in different developmental phases of the web. Chapter VIII: Business Models and Organizational Processes Changes Helena Halas, SETCCE, Slovenia Tomaz Klobuear, Jozef Stefan Institute and SETCCE, Slovenia This chapter gives expanded information on pervasive computing business models, possibilities of foreseen future and future scenarios that are expected to be full of surprises. It builds its foundation by discussing the basic concepts of business processes and then explains e-business models that are currently being used. It also discusses the business models which can be expected in future and compares them with the current existing ones. Chapter IX: The Critical Success Factors and Integrated Model for Implementing e-business in Taiwan’s SMEs Te Fu Chen, Department of International business, Ching Yun University, Taiwan This chapter reviews the existing studies on critical success factors (CSFs), e-business models and identifies their limitations. It proposes and justifies a set of critical success factors for implementing e-business technologies in small and medium size enterprises. It also discusses a case in which this set was assessed for its success. This chapter provides an integrative perspective of CSFs and integrated model for implementing e-business in the SME sect
|
DISCLAIMER:
This site does not store Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives on its server. We only index and link to Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives provided by other sites. Please contact the content providers to delete Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives if any and email us, we'll remove relevant links or contents immediately.
|
|
|