Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  
Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives
Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives
Date: 28 April 2011, 03:40
Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives (Premier Reference Source)
By Varuna Godara
* Publisher: Information Science Reference
* Number Of Pages: 412
* Publication Date: 2008-10-30
* ISBN-10 / ASIN: 1605662208
* ISBN-13 / EAN: 9781605662206
Product Description:
The e-businesses of today are adopting pervasive computing with fervor but at the same time becoming increasingly aware of the many risks involved in it.
Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives examines the implications of pervasive computing from varying crucial perspectives so that current and future e-business managers can make responsible decisions about where, when, and how to use this technology. Containing 19 chapters from an international pool of leading experts and field practitioners, this unmatched resource will enhance the awareness of emerging and global issues in e-business risk management.
Table of Contents:
SECTION I: FOUNDATION, TECHNOLOGY AND INFRASTRUCTURE OF PERVASIVE COMPUTING
Chapter I: Pervasive Computing: A Conceptual Framework
Varuna Godara, Department of Business Systems, School of Management, College of Business, University of Western Sydney, Australia
This chapter provides foundation of pervasive computing, pervasive business and smart environments by covering theoretical perspectives. It introduces the associated technologies like Ambient intelligence and Grid computing which are being used with pervasive computing to provide convenient services at any time and at any place. It also gives a comprehensive discussion of the characteristics of pervasive commerce and different views of pervasive business. It explains pervasive technology enabled smart environments and gives detailed examples of that.
Chapter II: Pervasive Business Infrastructure: The Network Technologies, Routing and Security Issues
Varuna Godara, Department of Business Systems, School of Management, College of Business, University of Western Sydney, Australia
This chapter introduces the readers to the fundamental infrastructure of p-business. It includes discussion on various private and public wireless networks, wired networks, wireless sensor networks (WSN), global wireless media communication standards and local wireless media communication standards. This chapter details important short distance standards, cellular carrier specific standards, protocols, and security tools and techniques that are a part of pervasive business technologies. It also discusses in detail pervasive computing relevant cryptographic solutions to security problems, various routing methods and key distribution issues which are relevant to pervasive business infrastructure.
Chapter III: Computational Mobile Grid: A Computing Infrastructure on Mobile Devices
Deo Prakash Vidyarthi, School of Computer and Systems Sciences, Jawaharlal Nehru University, India
This chapter proposes a framework of the computational mobile grid in which the mobile computational devices themselves will form a grid to provide general and specific computational services to the applications and the users of the mobile devices. It introduces the readers to the concepts of dynamic grid formation, mobile and cellular IP. It also explains the issues of resource management and scheduling in context of computational mobile grids and discusses different constraints such as security and battery constraints.
SECTION II: APPLICATIONS AND SERVICES
Chapter IV: Mobile and Pervasive Technology in Education and Training: Potential and Possibilities, Problems and Pitfalls
Mark J. W. Lee, School of Education, Charles Sturt University, Australia
This chapter explores the uses, types, and desirable attributes of mobile learning and potential of pervasive mobile learning. After identifying the problems and issues facing the development and implementation of pervasive m-learning, it discusses the implications and challenges for educators, practitioners and researchers. It also explains the possible applications for pervasive m-learning and gives detailed examples on On-the-Job Performance and Knowledge Support; Mobile Collaborative Learning and Learner Content Production; m-Mentoring and m-Assessment; Mobile, Smart, and Ad Hoc Classrooms; Learning From Objects and the Environment; Personal Learning Environments and e-Portfolios, etc.
Chapter V: Ubiquitous Computing for Microbial Forensics and Bioterrorism
Gaya Prasad, Department of Animal Biotechnology, College of Veterinary Sciences, CCS Haryana Agricultural University, India
Minakshi, Department of Animal Biotechnology, College of Veterinary Sciences, CCS Haryana Agricultural University, India
This chapter discusses the importance and abilities of microorganisms as attractive agents for use in biosensors. It introduces the discipline of microbial forensics and issues related to biological microelectromechanical systems and surveillance systems. It also identifies the potential of Ubiquitous computing technology in developing integrated small devices, which could detect bioterrorism agents, monitor the microbial pollution in water, milk and other edible commodities, etc.
Chapter VI: Falling Behind: A Case in Uncritical Assessment
Jonathan Gordon MacLeod Pratt, School of Management, University of Technology, Sydney, Australia
This chapter gives a comprehensive discussion of Learning Management Systems as Pervasive Technologies and presents the major findings of case study research investigating uncritical assessment of an institution-wide learning management system in an Australian university. It illustrates the ways in which a range of social and institutional influences, operating internally and externally to an organization, can affect managerial decision-making.
SECTION III: BUSINESS MODELS, STRUCTURES, AND STRATEGIES
Chapter VII: Strategizing in the Digital World: Aligning Business Model, Brand and Technology
Yvonne Lee, Digital Media, Network Ten, Australia
Martin Kornberger, Faculty of Business,University of Technology, Sydney, Australia
This chapter discusses change in business models with the evolution of the new digital media. It explains thoroughly the emerging business strategies, opportunities, community thinking, emerging markets and change in business models with the web. It also discusses and compares different business models that appeared in different developmental phases of the web.
Chapter VIII: Business Models and Organizational Processes Changes
Helena Halas, SETCCE, Slovenia Tomaz Klobuear, Jozef Stefan Institute and SETCCE, Slovenia
This chapter gives expanded information on pervasive computing business models, possibilities of foreseen future and future scenarios that are expected to be full of surprises. It builds its foundation by discussing the basic concepts of business processes and then explains e-business models that are currently being used. It also discusses the business models which can be expected in future and compares them with the current existing ones.
Chapter IX: The Critical Success Factors and Integrated Model for Implementing e-business in Taiwan’s SMEs
Te Fu Chen, Department of International business, Ching Yun University, Taiwan
This chapter reviews the existing studies on critical success factors (CSFs), e-business models and identifies their limitations. It proposes and justifies a set of critical success factors for implementing e-business technologies in small and medium size enterprises. It also discusses a case in which this set was assessed for its success. This chapter provides an integrative perspective of CSFs and integrated model for implementing e-business in the SME sect

DISCLAIMER:

This site does not store Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives on its server. We only index and link to Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives provided by other sites. Please contact the content providers to delete Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches