Results for 'Cloud Computing, Cloud Infrastructure, Virtualization, Public Cloud, Private Cloud, Hybrid Cloud, Multi-Cloud Strategy, Edge Computing, Serverless Computing, Cloud Security'

974 found
Order:
  1.  16
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  14
    New Technology, Big Data and the Law.Marcelo Corrales Compagnucci, Mark Fenwick & Nikolaus Forgó (eds.) - 2017 - Singapore: Imprint: Springer.
    This edited collection brings together a series of interdisciplinary contributions in the field of Information Technology Law. The topics addressed in this book cover a wide range of theoretical and practical legal issues that have been created by cutting-edge Internet technologies, primarily Big Data, the Internet of Things, and Cloud computing. Consideration is also given to more recent technological breakthroughs that are now used to assist, and - at times - substitute for, human work, such as automation, robots, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  86
    Bringing together urban systems and food systems theory and research is overdue: understanding the relationships between food and nutrition infrastructures along a continuum of contested and hybrid access.Jane Battersby, Mercy Brown-Luthango, Issahaka Fuseini, Herry Gulabani, Gareth Haysom, Ben Jackson, Vrashali Khandelwal, Hayley MacGregor, Sudeshna Mitra, Nicholas Nisbett, Iromi Perera, Dolf te Lintelo, Jodie Thorpe & Percy Toriro - forthcoming - Agriculture and Human Values:1-12.
    Urban dwellers’ food and nutritional wellbeing are both dependent on infrastructure and can be indicative of wider wellbeing in urban contexts and societal health. This paper focuses on the multiple relationships that exist between food and infrastructure to provide a thorough theoretical and empirical grounding to urgent work on urban food security and nutrition in the context of rapid urban and nutrition transitions in the South. We argue that urban systems and food systems thinking have not been well aligned, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  4.  22
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  37
    Protecting critical infrastructure: implementing integration and expanding education: first prize: 2007 Schubmehl-Prein Essay contest.David A. Martinez - 2008 - Acm Sigcas Computers and Society 38 (1):12-17.
    The tenuous network of interconnected data that supports our nation's critical infrastructure has been built up, computer by computer, over only the last few decades. From punch cards to the supercomputers constructed by pioneers in today's fields, computers have been controlling our nation's critical sectors nearly every step of the way. As designers of today's critical systems gravitate slowly towards systems that require less human oversight than ever before, the vulnerability of the networks that control our electricity systems, water supply, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  21
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  16
    Hybrid systems in electrical distribution design with genetic algorithm.Angel Nunez - 2020 - Minerva 1 (1):32-42.
    The incorporation of hybrid systems based on renewable sources for the optimization of electricity distribution systems and planning of power supply strategies using genetic algorithms is studied. A series of characteristics of electrical sub-stations was chosen and through simulations, data were obtained for the optimization of the existing infrastructure, which provides reliability, security, economic supply and quality of service. An algorithm was obtained with the optimal configuration of various components: photovoltaic panels, batteries, AC generator, fuel cell and inverter, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  34
    Intrusion Detection Systems in Cloud Computing Paradigm: Analysis and Overview.Pooja Rana, Isha Batra, Arun Malik, Agbotiname Lucky Imoize, Yongsung Kim, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar & Seungmin Rho - 2022 - Complexity 2022:1-14.
    Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use and it is convenient for developing, deploying, and accessing mobile applications. Currently, security is a requisite concern owning to the open and distributed nature of the cloud. Copious amounts of data are responsible for alluring hackers. Thus, developing efficacious IDS is an imperative task. This article analyzed four intrusion detection systems for the detection of attacks. Two standard benchmark datasets, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Money as Media: Gilson Schwartz on the Semiotics of Digital Currency.Renata Lemos-Morais - 2011 - Continent 1 (1):22-25.
    continent. 1.1 (2011): 22-25. The Author gratefully acknowledges the financial support of CAPES (Coordenação de Aperfeiçoamento do Ensino Superior), Brazil. From the multifarious subdivisions of semiotics, be they naturalistic or culturalistic, the realm of semiotics of value is a ?eld that is getting more and more attention these days. Our entire political and economic systems are based upon structures of symbolic representation that many times seem not only to embody monetary value but also to determine it. The connection between monetary (...)
     
    Export citation  
     
    Bookmark  
  10. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  32
    Multi-stakeholder Engagement for the Sustainable Development Goals: Introduction to the Special Issue.G. Abord-Hugon Nonet, T. Gössling, R. Van Tulder & J. M. Bryson - 2022 - Journal of Business Ethics 180 (4):945-957.
    The world is not on track to achieve Agenda 2030—the approach chosen in 2015 by all UN member states to engage multiple stakeholders for the common goal of sustainable development. The creation of the 17 Sustainable Development Goals (SDGs) arguably offered a new take on sustainable development by adopting hybrid and principle-based governance approaches, where public, private, not for profit and knowledge-institutions were invited to engage around achieving common medium-term targets. Cross-sector partnerships and multi-stakeholder engagement for (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  12. Readymades in the Social Sphere: an Interview with Daniel Peltz.Feliz Lucia Molina - 2013 - Continent 3 (1):17-24.
    Since 2008 I have been closely following the conceptual/performance/video work of Daniel Peltz. Gently rendered through media installation, ethnographic, and performance strategies, Peltz’s work reverently and warmly engages the inner workings of social systems, leaving elegant rips and tears in any given socio/cultural quilt. He engages readymades (of social and media constructions) and uses what are identified as interruptionist/interventionist strategies to disrupt parts of an existing social system, thus allowing for something other to emerge. Like the stereoscope that requires two (...)
     
    Export citation  
     
    Bookmark  
  13.  23
    IoT-enabled edge computing model for smart irrigation system.A. N. Sigappi & S. Premkumar - 2022 - Journal of Intelligent Systems 31 (1):632-650.
    Precision agriculture is a breakthrough in digital farming technology, which facilitates the application of precise and exact amount of input level of water and fertilizer to the crop at the required time for increasing the yield. Since agriculture relies on direct rainfall than irrigation and the prediction of rainfall date is easily available from web source, the integration of rainfall prediction with precision agriculture helps to regulate the water consumption in farms. In this work, an edge computing model is (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  22
    Joint Resource Allocation Optimization of Wireless Sensor Network Based on Edge Computing.Jie Liu & Li Zhu - 2021 - Complexity 2021:1-11.
    Resource allocation has always been a key technology in wireless sensor networks, but most of the traditional resource allocation algorithms are based on single interface networks. The emergence and development of multi-interface and multichannel networks solve many bottleneck problems of single interface and single channel networks, it also brings new opportunities to the development of wireless sensor networks, but the multi-interface and multichannel technology not only improves the performance of wireless sensor networks but also brings great challenges to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  13
    Реалізація спортивної політики у муніципальних адміністраціях і радах: Приклад литви.Domas Kriščiūnas - 2019 - Гуманітарний Вісник Запорізької Державної Інженерної Академії 77:100-109.
    The Resolution of the Seimas of the Republic of Lithuania on the Approval of the State Sports Development Strategy for 2011-2020 states that it is important to create and develop a horizontal structure of public administration of sport, which includes many state administration areas and municipal institutions, which would allow to develop cooperation with non-governmental sports organizations and private sector of sports activities. To create legal and economic conditions for the fast development of active and healthy lifestyle and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  45
    The Epistemological Consequences of Artificial Intelligence, Precision Medicine, and Implantable Brain-Computer Interfaces.Ian Stevens - 2024 - Voices in Bioethics 10.
    ABSTRACT I argue that this examination and appreciation for the shift to abductive reasoning should be extended to the intersection of neuroscience and novel brain-computer interfaces too. This paper highlights the implications of applying abductive reasoning to personalized implantable neurotechnologies. Then, it explores whether abductive reasoning is sufficient to justify insurance coverage for devices absent widespread clinical trials, which are better applied to one-size-fits-all treatments. INTRODUCTION In contrast to the classic model of randomized-control trials, often with a large number of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17. A Study on Fog Computing Environment Mobility and Migration.R. J. Pedro - 2018 - 22nd International Conference Electronics 22.
    Cloud Computing paradigm has reached a high degree of popularity among all kinds of computer users, but it may not be suitable for mobile devices as they need computing power to be as close as possible to data sources in order to reduce delays. This paper focuses on achieving mathematical models for users moving around and proposes an overlay mobility model for Fog Data Centres based on traditional wireless mobility models aimed at better allocating edge computing resources to (...)
     
    Export citation  
     
    Bookmark  
  18.  29
    Public health measures and the rise of incidental surveillance: Considerations about private informational power and accountability.B. A. Kamphorst & A. Henschke - 2023 - Ethics and Information Technology 25 (4):1-14.
    The public health measures implemented in response to the COVID-19 pandemic have resulted in a substantially increased shared reliance on private infrastructure and digital services in areas such as healthcare, education, retail, and the workplace. This development has (i) granted a number of private actors significant (informational) power, and (ii) given rise to a range of digital surveillance practices incidental to the pandemic itself. In this paper, we reflect on these secondary consequences of the pandemic and observe (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  57
    (1 other version)Private Selves, Public Identities: Reconsidering Identity Politics.Susan J. Hekman - 2004 - Pennsylvania State University Press.
    In an age when "we are all multiculturalists now," as Nathan Glazer has said, the politics of identity has come to pose new challenges to our liberal polity and the presuppositions on which it is founded. Just what identity means, and what its role in the public sphere is, are questions that are being hotly debated. In this book Susan Hekman aims to bring greater theoretical clarity to the debate by exposing some basic misconceptions—about the constitution of the self (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  21
    Private Investment, Entrepreneurial Entry, and Partner Collaboration in Emerging Markets Telecommunications.Jonathan P. Doh - 2002 - Business and Society 41 (3):345-352.
    Private participation in infrastructure is a relatively newphenomenon in the developing world (World Bank, 1999). In telecommunications, electric power, water, and other sectors, developing countries are turning to private sector investors to help increase availability, improve access, and move toward market-based pricing of resources and services. The findings of this dissertation demonstrate that the governance, mode of entry, and mix of public and private ownership of infrastructure projects are influenced by country-level economic, institutional, and technological factors, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  15
    Private Lawyers and the Public Interest: The Evolving Role of Pro Bono in the Legal Profession.Robert Granfield & Lynn M. Mather (eds.) - 2009 - Oxford University Press USA.
    This collection of original essays by leading and emerging scholars in the field examines the history, conditions, organization, and strategies of pro bono lawyering. Private Lawyers and the Public Interest: The Evolving Role of Pro Bono in the Legal Profession traces the rise and impact of the American Bar Association's campaign to hold lawyers accountable for a commitment to public service and to encourage public service within law schools. Combining empirical legal research with reflections by practitioners (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  27
    Public private partnerships to build low cost rural access.Daryl Martyris - 2003 - Journal of Information, Communication and Ethics in Society 1 (2):81-86.
    Every year thousands of computers deemed obsolete by companies upgrading to newer models are kept out of landfills by organizations like World Computer Exchange 1 which recycle them to schools in developing countries. It is possible to set up at a very low cost, clusters of recycled PCs, using Linux software to substantially reduce the cost of establishing school‐based community Internet centers. In the case of such an implementation in Goa, India by a WCE partner‐NGO the key to its success (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  23.  99
    Murky conceptual waters: The public and the private[REVIEW]Gary T. Marx - 2001 - Ethics and Information Technology 3 (3):157-169.
    In discussions on the ethics of surveillanceand consequently surveillance policy, thepublic/private distinction is often implicitlyor explicitly invoked as a way to structure thediscussion and the arguments. In thesediscussions, the distinction public and private is often treated as a uni-dimensional,rigidly dichotomous and absolute, fixed anduniversal concept, whose meaning could bedetermined by the objective content of thebehavior. Nevertheless, if we take a closerlook at the distinction in diverse empiricalcontexts we find them to be more subtle,diffused and ambiguous than suggested. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  24.  26
    The Impact of Strategic Human Resource Management on Employee Outcomes in Private and Public Limited Companies in Malaysia.Koon Vui-Yee - 2015 - Journal of Human Values 21 (2):75-86.
    This study investigates the interaction effects of two business strategies (differentiation and low cost) and human resource (HR) management (HRM) practices (recruitment and selection, training and development, compensation, performance management, employment security and work–life balance) on employee outcomes (organizational commitment, turnover intention, employee involvement and job satisfaction). These relationships are further analyzed on the extent of differences between public and private limited companies in Malaysia. Structural equation modelling (SEM) is used to examine the effect of the three (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25. Public Policies on Corporate Social Responsibility: The Role of Governments in Europe.Laura Albareda, Josep M. Lozano & Tamyko Ysa - 2007 - Journal of Business Ethics 74 (4):391-407.
    Over the last decade, Corporate Social Responsibility (CSR) has been defined first as a concept whereby companies decide voluntarily to contribute to a better society and cleaner environment and, second, as a process by which companies manage their relationship␣with stakeholders (European Commission, 2001. Nowadays, CSR has become a priority issue on governments’ agendas. This has changed governments’ capacity to act and impact on social and environmental issues in their relationship with companies, but has also affected the framework in which CSR (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   52 citations  
  26.  77
    Identity management in GRID computing and Service Oriented Architectures: research and practice. [REVIEW]Theodora Varvarigou & Vassiliki Andronikou - 2009 - Identity in the Information Society 2 (2):95-98.
    Today, Service-Oriented Architecture (SOA) and Grid and Cloud computing comprise the key technologies in distributed systems. In systems following the SOA approach, functionalities are delivered and consumed as services. Given the variety of resources (i.e. data, computing capabilities, applications, etc) as well as the variation of user-requested Quality of Service (e.g., high performance, fast access, low cost, high media resolution, etc), there is a need for advanced user management, trust establishment and service management mechanisms which adjust, monitor and evaluate (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  27.  3
    British criminology, undercover policing, and racist attacks: Notes on the ‘law and order’ information infrastructure.Julian Molina - forthcoming - History of the Human Sciences.
    This article examines the entanglement of British criminology and undercover policing (‘Spycops’) in the UK government's response to racism in 1981. The article discusses how criminology took a strategic role within the state's ‘ law and order’ information infrastructure by analysing archival materials related to a Home Office criminological study from that same year. This infrastructure involved an explicit logistical sensibility for gathering and analysing evidence, intelligence, and data about race and racism for a ‘law and order’ agenda focused on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  49
    Commodifying Justice: Discursive Strategies Used in the Legitimation of Infringement Notices for Minor Offences.Elyse Methven - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (2):353-379.
    This article examines discursive strategies used by police and politicians to describe and justify the application of penalty notices to minor criminal offences. Critical discourse analysis is used as an analytical tool to show how neoliberal economic thinking has informed the prism through which infringement notices have been rationalised as a legitimate alternative to traditional criminal prosecution, while also highlighting the contradictions inherent in neoliberalism as an ideology through which to view the embrace of legally hybrid powers in the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. URBAN INFRASTRUCTURE PREFERENCES OF TOWNSFOLK: AN EMPIRICAL SURVEY WITHIN THE FRAMEWORK OF SOCIO-ECOLOGICAL MODEL OF THE CITY.Vitalii Shymko, Daria Vystavkina & Ievgeniia Ivanova - 2020 - Technologies of Intellect Development 4 (2(27)).
    The article presents the results of an interdisciplinary (psychological, behavioral, sociological, urban) survey of residents of elite residential complexes of Odessa regarding theirs urban infrastructure preferences, as well as the degree of satisfaction with their place of residence. It was found that respondents are characterized by a high level of satisfaction with their place of residence. It was also revealed that the security criterion of the district is the main one for choosing a place of residence, which indicates the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Proceedings of the 4th World Conference on Research Integrity: Brazil, Rio de Janeiro. 31 May - 3 June 2015.Lex Bouter, Melissa S. Anderson, Ana Marusic, Sabine Kleinert, Susan Zimmerman, Paulo S. L. Beirão, Laura Beranzoli, Giuseppe Di Capua, Silvia Peppoloni, Maria Betânia de Freitas Marques, Adriana Sousa, Claudia Rech, Torunn Ellefsen, Adele Flakke Johannessen, Jacob Holen, Raymond Tait, Jillon Van der Wall, John Chibnall, James M. DuBois, Farida Lada, Jigisha Patel, Stephanie Harriman, Leila Posenato Garcia, Adriana Nascimento Sousa, Cláudia Maria Correia Borges Rech, Oliveira Patrocínio, Raphaela Dias Fernandes, Laressa Lima Amâncio, Anja Gillis, David Gallacher, David Malwitz, Tom Lavrijssen, Mariusz Lubomirski, Malini Dasgupta, Katie Speanburg, Elizabeth C. Moylan, Maria K. Kowalczuk, Nikolas Offenhauser, Markus Feufel, Niklas Keller, Volker Bähr, Diego Oliveira Guedes, Douglas Leonardo Gomes Filho, Vincent Larivière, Rodrigo Costas, Daniele Fanelli, Mark William Neff, Aline Carolina de Oliveira Machado Prata, Limbanazo Matandika, Sonia Maria Ramos de Vasconcelos & Karina de A. Rocha - 2016 - Research Integrity and Peer Review 1 (Suppl 1).
    Table of contentsI1 Proceedings of the 4th World Conference on Research IntegrityConcurrent Sessions:1. Countries' systems and policies to foster research integrityCS01.1 Second time around: Implementing and embedding a review of responsible conduct of research policy and practice in an Australian research-intensive universitySusan Patricia O'BrienCS01.2 Measures to promote research integrity in a university: the case of an Asian universityDanny Chan, Frederick Leung2. Examples of research integrity education programmes in different countriesCS02.1 Development of a state-run “cyber education program of research ethics” in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  98
    Public sector engagement with online identity management.D. Barnard-Wills & D. Ashenden - 2010 - Identity in the Information Society 3 (3):657-674.
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government (Dean 2010 ) and governmentality (Miller and Rose 2008 ). This approach (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  32.  35
    Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: No malicious intent.Caron Jack, Yashik Singh & Maurice Mars - 2013 - BMC Medical Ethics 14 (S1):S8.
    IntroductionInformation and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  33.  16
    Emergency Scheduling Optimization Simulation of Cloud Computing Platform Network Public Resources.Dingrong Liu, Zhigang Yao & Liukui Chen - 2021 - Complexity 2021:1-11.
    Emergency scheduling of public resources on the cloud computing platform network can effectively improve the network emergency rescue capability of the cloud computing platform. To schedule the network common resources, it is necessary to generate the initial population through the Hamming distance constraint and improve the objective function as the fitness function to complete the emergency scheduling of the network common resources. The traditional method, from the perspective of public resource fairness and priority mapping, uses incremental (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  48
    Private Ownership and Common Goods.Ronald Sandler - 2005 - Philosophy in the Contemporary World 12 (2):1-2.
    Balancing, integrating, or otherwise sorting out private ownership, control, and property rights, on the one hand, with social, common, and shared goods or rights, on the other, is manifest in socio-ethical issues ranging from eminent domain to gay marriage and from endangered species protection to social security. In fact, when one surveys the contemporary socio-ethical landscape with this problem in mind, there appears hardly an issue that it does not touch; and it is frequently the central or underlying (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  55
    Public Versus Private Sector Procurement Ethics and Strategy: What Each Sector can Learn from the Other. [REVIEW]Timothy G. Hawkins, Michael J. Gravier & Edward H. Powley - 2011 - Journal of Business Ethics 103 (4):567-586.
    The government purchasing market constitutes the largest business sector in the world. While marketers would benefit from a deep understanding of both sectors, how the two sectors differ in terms of ethics and strategy largely remains unknown. The purpose of this research, therefore, is to explore differences between the for-profit and not-for-profit sectors on two critical aspects of business-to-business procurement: ethics and strategy. Using survey data from a sample of 328 procurement professionals in the for-profit and not-for-profit sectors, key differences (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36. An Intelligent Tutoring System for Cloud Computing.Hasan Abdulla Abu Hasanein & Samy S. Abu Naser - 2017 - International Journal of Academic Research and Development 2 (1):76-80.
    Intelligent tutoring system (ITS) is a computer system which aims to provide immediate and customized or reactions to learners, usually without the intervention of human teacher's instructions. Secretariats professional to have the common goal of learning a meaningful and effective manner through the use of a variety of computing technologies enabled. There are many examples of professional Secretariats used in both formal education and in professional settings that have proven their capabilities. There is a close relationship between private lessons (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  37. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  38.  28
    Artificial intelligence national strategy in a developing country.Mona Nabil Demaidi - forthcoming - AI and Society:1-13.
    Artificial intelligence (AI) national strategies provide countries with a framework for the development and implementation of AI technologies. Sixty countries worldwide published their AI national strategies. The majority of these countries with more than 70% are developed countries. The approach of AI national strategies differentiates between developed and developing countries in several aspects including scientific research, education, talent development, and ethics. This paper examined AI readiness assessment in a developing country (Palestine) to help develop and identify the main pillars of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  45
    “Who is watching the watchdog?”: ethical perspectives of sharing health-related data for precision medicine in Singapore.Tamra Lysaght, Angela Ballantyne, Vicki Xafis, Serene Ong, Gerald Owen Schaefer, Jeffrey Min Than Ling, Ainsley J. Newson, Ing Wei Khor & E. Shyong Tai - 2020 - BMC Medical Ethics 21 (1):1-11.
    Background We aimed to examine the ethical concerns Singaporeans have about sharing health-data for precision medicine and identify suggestions for governance strategies. Just as Asian genomes are under-represented in PM, the views of Asian populations about the risks and benefits of data sharing are under-represented in prior attitudinal research. Methods We conducted seven focus groups with 62 participants in Singapore from May to July 2019. They were conducted in three languages and analysed with qualitative content and thematic analysis. Results Four (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  40.  46
    Monetary Intelligence: Money Attitudes—Unethical Intentions, Intrinsic and Extrinsic Job Satisfaction, and Coping Strategies Across Public and Private Sectors in Macedonia.Elisaveta Gjorgji Sardžoska & Thomas Li-Ping Tang - 2015 - Journal of Business Ethics 130 (1):93-115.
    Research suggests that attitudes guide individuals’ thinking and actions. In this study, we explore the monetary intelligence construct and investigate the relationships between a formative model of money attitudes involving affective, behavioral, and cognitive components and several sets of outcome variables—unethical intentions, intrinsic and extrinsic job satisfaction, and coping strategies. Based on 515 managers in the Republic of Macedonia, we test our model for the whole sample and also cross sector and gender. Managers’ negative stewardship behavior and positive cognitive meaning (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  41.  9
    The Domestication of Language: Cultural Evolution and the Uniqueness of the Human Animal.Daniel Cloud - 2014 - Cambridge University Press.
    Language did not evolve only in the distant past. Our shared understanding of the meanings of words is ever-changing, and we make conscious, rational decisions about which words to use and what to mean by them every day. Applying Charles Darwin's theory of "unconscious artificial selection" to the evolution of linguistic conventions, Daniel Cloud suggests a new, evolutionary explanation for the rich, complex, and continually reinvented meanings of our words. The choice of which words to use and in which (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. How Propaganda Became Public Relations: Foucault and the Corporate Government of the Public.Cory Wimberly - 2019 - New York, NY, USA: Routledge.
    How Propaganda Became Public Relations pulls back the curtain on propaganda: how it was born, how it works, and how it has masked the bulk of its operations by rebranding itself as public relations. Cory Wimberly uses archival materials and wide variety of sources — Foucault’s work on governmentality, political economy, liberalism, mass psychology, and history — to mount a genealogical challenge to two commonplaces about propaganda. First, modern propaganda did not originate in the state and was never (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  95
    Modeling the Significance of Motivation on Job Satisfaction and Performance Among the Academicians: The Use of Hybrid Structural Equation Modeling-Artificial Neural Network Analysis.Suguna Sinniah, Abdullah Al Mamun, Mohd Fairuz Md Salleh, Zafir Khan Mohamed Makhbul & Naeem Hayat - 2022 - Frontiers in Psychology 13.
    The competition in higher education has increased, while lecturers are involved in multiple assignments that include teaching, research and publication, consultancy, and community services. The demanding nature of academia leads to excessive work load and stress among academicians in higher education. Notably, offering the right motivational mix could lead to job satisfaction and performance. The current study aims to demonstrate the effects of extrinsic and intrinsic motivational factors influencing job satisfaction and job performance among academicians working in Malaysian private (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  18
    Re-integrating scholarly infrastructure: The ambiguous role of data sharing platforms.Paul N. Edwards, Carl Lagoze & Jean-Christophe Plantin - 2018 - Big Data and Society 5 (1).
    Web-based platforms play an increasingly important role in managing and sharing research data of all types and sizes. This article presents a case study of the data storage, sharing, and management platform Figshare. We argue that such platforms are displacing and reconfiguring the infrastructure of norms, technologies, and institutions that underlies traditional scholarly communication. Using a theoretical framework that combines infrastructure studies with platform studies, we show that Figshare leverages the platform logic of core and complementary components to re-integrate a (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  58
    The Role of Cloud Computing in Managing the Deluge of Potentially Private Genetic Data.Dov Greenbaum & Mark Gerstein - 2011 - American Journal of Bioethics 11 (11):39-41.
    The American Journal of Bioethics, Volume 11, Issue 11, Page 39-41, November 2011.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  37
    The roles and dynamics of transition intermediaries in enabling sustainable public food procurement: insights from Spain.Daniel Gaitán-Cremaschi, Diego Valbuena & Laurens Klerkx - 2024 - Agriculture and Human Values 41 (4):1591-1615.
    Sustainable Public Food Procurement (SPFP) is gaining recognition for its potential to improve the sustainability of food systems and promote healthier diets. However, SPFP faces various challenges, including coordination issues, actor dynamics, infrastructure limitations, unsustainable habits, and institutional resistance, among others. Drawing upon insights from the Multi-Level Perspective (MLP) on socio-technical transitions and the X-curve model on transition dynamics, this study investigates the role of transition intermediaries in facilitating SPFP-induced transformations in food systems. Focusing on four case studies (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  8
    Shaping Industry 4.0 Ready Talent: TVET Experts' Strategies in Content Selection - NGT and ISM Approach.Raihan Tahir & Zuraidah Abdullah - forthcoming - Evolutionary Studies in Imaginative Culture:896-914.
    The rapid advancement of digital technologies and the evolving demands of the labour market have triggered transformative changes in the education and training landscape. In the era of cutting-edge technologies and digitalisation, traditional industry processes have been revolutionised, giving rise to new occupational profiles. Consequently, young talents entering the workforce need new competencies to cope with the infusion of rapid changes in technology. To address this, the integration of digital technologies in Technical and Vocational Education and Training (TVET) plays (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  92
    Public language, private language, and subsymbolic theories of mind.Gabe Dupre - 2023 - Mind and Language 38 (2):394-412.
    Language has long been a problem‐case for subsymbolic theories of mind. The reason for this is obvious: Language seems essentially symbolic. However, recent work has developed a potential solution to this problem, arguing that linguistic symbols are public objects which augment a fundamentally subsymbolic mind, rather than components of cognitive symbol‐processing. I shall argue that this strategy cannot work, on the grounds that human language acquisition consists in projecting linguistic structure onto environmental entities, rather than extracting this structure from (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  15
    Modern wars and their impact on national security.Andrey Kovalev - 2023 - Sotsium I Vlast 4 (98):37-50.
    Introduction. War occupies a special place in the mankind development because it is an integral part of its history. Thousands of researchers have been engaged in the problem of war from the standpoint of various sciences. The confrontation of nations and individual social groups as a social and political fact has been seen in philosophical thought since the epoch of the first major civilizations. However, at the present stage of society’s development, the problems of war are closely connected with the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  24
    Intelligent Computation Offloading for IoT Applications in Scalable Edge Computing Using Artificial Bee Colony Optimization.Mohammad Babar, Muhammad Sohail Khan, Ahmad Din, Farman Ali, Usman Habib & Kyung Sup Kwak - 2021 - Complexity 2021:1-12.
    Most of the IoT-based smart systems require low latency and crisp response time for their applications. Achieving the demand of this high Quality of Service becomes quite challenging when computationally intensive tasks are offloaded to the cloud for execution. Edge computing therein plays an important role by introducing low network latency, quick response, and high bandwidth. However, offloading computations at a large scale overwhelms the edge server with many requests and the scalability issue originates. To address the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 974