With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.
Technology infrastructure supports the design, deployment and use of both individual technology-based components and the systems of such components that form the knowledge-based economy. As such, it plays a central role in the innovation process and in the promotion of the diffusion of technologies. Thus, it is an important element contributing to the operation of innovation systems and innovation performance in any modern economy. Technology infrastructure, either in the narrow or broad sense, is not well understood as an element of a sector’s technology platform or of a national innovation system. Similarly misunderstood are the processes by which such infrastructure is embodied in standards or diffused through various institutional frameworks. In fact, because of the public and quasi-public good nature of technology infrastructure, firms as well as public-sector agencies under invest in it, thus inhibiting long-term technological advancement and economic growth. This volume of essays brings together a collection of papers from eminent scholars on all of the various dimensions of technology infrastructure mentioned above. To our knowledge, it is the first such collection of papers and we expect this scholarship to become the foundation for future research in this area. This book was published as a special issue of Economics of Innovation and New Technology.
This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topic that it approaches from natural science, technical and computer science perspectives. Following an initial review of the fundamental roles of IT in connection with peace, conflict and security, the contributing authors address the rise of cyber conflicts via information warfare, cyber espionage, cyber defence and Darknets. The book subsequently explores recent examples of cyber warfare, including: • The Stuxnet attack on Iran’s uranium refining capability • The hacking of the German Federal Parliament’s internal communication system • The Wannacry malware campaign, which used software stolen from a US security agency to launch ransomware attacks worldwide The book then introduces readers to the concept of cyber peace, including a discussion of confidence and security-building measures. A section on Cyber Arms Control draws comparisons to global efforts to control chemical warfare, to reduce the risk of nuclear war, and to prevent the militarization of space. Additional topics include the security of critical information infrastructures, and cultural violence and peace in social media. The book concludes with an outlook on the future role of IT in peace and security. Information Technology for Peace and Security breaks new ground in a largely unexplored field of study, and offers a valuable asset for a broad readership including students, educators and working professionals in computer science, IT security, peace and conflict studies, and political science.
The global web and its digital ecosystem can be seen as tools of emancipation, communication, and spreading knowledge or as means of control, fueled by capitalism, surveillance, and geopolitics. The Digital Frontier interrogates the world wide web and the digital ecosystem it has spawned to reveal how their conventions, protocols, standards, and algorithmic regulations represent a novel form of global power. Sangeet Kumar shows the operation of this power through the web's "infrastructures of control" visible at sites where the universalizing imperatives of the web run up against local values, norms, and cultures. These include how the idea of the "global common good" is used as a ruse by digital oligopolies to expand their private enclosures, how seemingly collaborative spaces can simultaneously be exclusionary as they regulate legitimate knowledge, how selfhood is being redefined online along Eurocentric ideals, and how the web's political challenge is felt differentially by sovereign nation states. In analyzing this new modality of cultural power in the global digital ecosystem, The Digital Frontier is an important read for scholars, activists, academics and students inspired by the utopian dream of a truly representative global digital network.
Digital media everyday inscribe new patterns of time, promising instant communication, synchronous collaboration, intricate time management, and profound new advantages in speed. The essays in this volume reconsider these outward interfaces of convenience by calling attention to their supporting infrastructures, the networks of digital time that exert pressures of conformity and standardization on the temporalities of lived experience and have important ramifications for social relations, stratifications of power, practices of cooperation, and ways of life. Interdisciplinary in method and international in scope, the volume draws together insights from media and communication studies, cultural studies, and science and technology studies while staging an important encounter between two distinct approaches to the temporal patterning of media infrastructures, a North American strain emphasizing the social and cultural experiences of lived time and a European tradition, prominent especially in Germany, focusing on technological time and time-critical processes.
Technology segregation is an ongoing practice within early childhood programs in the United States. This research, which includes two qualitative studies in the Northeast, reveals that school segregation and technology segregation are one in the same. Utilizing critical race theory, as the theoretical framework, this research finds that young Black children are denied technological access directly affecting their learning trajectories. PTO fundraising and other monetary donations to public schools vary by district and neighborhood and are based on segregation. Therefore, structural racism flourishes within these early childhood programs as black students are excluded from another important content area and practice. This book defines the problem of technology segregation in terms of policy, racial hierarchies, funding, residential segregation, and the digital divide. It challenges the racist framework and reveals disruptions (strategies) to counter this deficit discourse based on white supremacy.
One of the most important investments in an organization is its information technology (IT) infrastructure. Yet many managers are ill-prepared to make sound IT investment decisions. Drawing upon rigorous research with over 100 businesses in 75 firms in nine countries, the authors here present a wide range of IT possibilities, enabling managers to take control of decisions that many have relegated to technical staff or vendors.
This is an open access book. As a leading role in the global megatrend of scientific innovation, China has been creating a more and more open environment for scientific innovation, increasing the depth and breadth of academic cooperation, and building a community of innovation that benefits all. Such endeavors are making new contributions to the globalization and creating a community of shared future. The 3rd International Conference on Big Data and Social Sciences (ICBDSS 2022) was held on August 19 – 21, 2022, in Hulunbuir, China. With the support of experts and professors, the ICBDSS 2022 conference successfully held its first conference last year. In order to allow more scholars to have the opportunity to participate in the conference to share and exchange experience. This conference mainly focused on "big data", "social science" and other research fields to discuss. At present, my country has entered the era of "big data cloud migration", that is, the era of big data, the Internet of things, cloud computing and mobile Internet. The market demand for big data talents is also increasing day by day. The purpose of the conference is to provide a way for experts, scholars, engineering technicians, and technical R&D personnel engaged in big data and social science research to share scientific research results and cutting-edge technologies, understand academic development trends, broaden research ideas, strengthen academic research and discussion, and promote the academic achievement industry Platform for chemical cooperation. The conference sincerely invites experts, scholars from domestic and foreign universities, scientific research institutions, business people and other relevant personnel to participate in the conference.