Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Online Resource  (9)
  • Image
  • OECD  (6)
  • Project Muse
  • Computer Science  (9)
Datasource
Material
  • Online Resource  (9)
  • Image
Language
  • 1
    Online Resource
    Online Resource
    Urbana : University of Illinois Press
    ISBN: 9780252097416 , 0252097416
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: The geopolitics of information
    Series Statement: UPCC book collections on Project MUSE
    DDC: 303.48/33
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Medien ; Infrastruktur ; Signal processing ; Telecommunication Traffic ; Information networks Social aspects ; Computer networks Social aspects ; Information superhighway ; Mass media Social aspects ; Digital media Social aspects ; Telecommunication systems Social aspects ; BUSINESS & ECONOMICS / Industries / Computer Industry ; TECHNOLOGY & ENGINEERING / Telecommunications ; LANGUAGE ARTS & DISCIPLINES / Communication Studies ; Aufsatzsammlung ; Aufsatzsammlung
    Abstract: "The contributors to Signal Traffic investigate how the material artifacts of media infrastructure--transoceanic cables, mobile telephone towers, Internet data centers, and the like--intersect with everyday life. Essayists confront the multiple and hybrid forms networks take, the different ways networks are imagined and engaged with by publics around the world, their local effects, and what human beings experience when a network fails. Some contributors explore the physical objects and industrial relations that make up an infrastructure. Others venture into the marginalized communities orphaned from the knowledge economies, technological literacies, and epistemological questions linked to infrastructural formation and use. The wide-ranging insights delineate the oft-ignored contrasts between industrialized and developing regions, rich and poor areas, and urban and rural settings, bringing technological differences into focus. Contributors include Charles R. Acland, Paul Dourish, Sarah Harris, Jennifer Holt and Patrick Vonderau, Shannon Mattern, Toby Miller, Lisa Parks, Christian Sandvig, Nicole Starosielski, Jonathan Sterne, and Helga Tawil-Souri"--...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Philadelphia, Pennsylvania : Temple University Press
    ISBN: 9781439910344 , 9781439910351 , 1439910340 , 9781439910368 (Sekundärausgabe) , 1439910367 (Sekundärausgabe)
    Language: English
    Edition: Online-Ausg. Online-Ressource UPCC book collections on Project MUSE ISBN 9781439910368
    Edition: ISBN 1439910367
    Edition: [Online-Ausg.]
    DDC: 302.3
    RVK:
    RVK:
    Abstract: "Robert Gehl's timely critique, Reverse Engineering Social Media, rigorously analyzes the ideas of social media and software engineers, using these ideas to find contradictions and fissures beneath the surfaces of glossy sites such as Facebook, Google, and Twitter. Gehl adeptly uses a mix of software studies, science and technology studies, and political economy to reveal the histories and contexts of these social media sites. Looking backward at divisions of labor and the process of user labor, he provides case studies that illustrate how binary "Like" consumer choices hide surveillance systems that rely on users to build content for site owners who make money selling user data, and that promote a culture of anxiety and immediacy over depth. Reverse Engineering Social Media also presents ways out of this paradox, illustrating how activists, academics, and users change social media for the better by building alternatives to the dominant social media sites. "--...
    Note: Online-Ausg.:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 1421401932 , 9781421401935
    Language: English
    Pages: 1 Online-Ressource (272 p. :)
    Series Statement: UPCC book collections on Project MUSE.
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 303.48/30973
    RVK:
    Keywords: Geschichte ; SOCIAL SCIENCE / General ; Consumer satisfaction ; Human-computer interaction ; Human-machine systems / Social aspects ; Technological innovations ; Gesellschaft ; Consumer satisfaction ; Human-computer interaction ; Human-machine systems Social aspects ; Technological innovations ; Anthropotechnik ; Mensch-Maschine-Kommunikation ; USA ; USA ; USA ; Mensch-Maschine-Kommunikation ; Anthropotechnik ; Geschichte
    Note: OldControl:muse9781421401935. - Multi-User , Made available online by Project Muse , Includes bibliographical references (p. 232-264) and index , Our marvelous and maddening machines -- The advent of technology consumption -- Buying an automobile -- Running a car -- Tools, tinkering, and trouble -- Reading the owner's manual -- Computers and the tyranny of technology consumption -- The technology treadmill -- Acknowledgments , "Joseph J. Corn maps two centuries of consumer frustration and struggle with personal technologies. ... Having extensively researched owner's manuals, computer user-group newsletters, and how-to literature, Corn brings a fresh, consumer-oriented approach to the history of technology."--Dust jacket
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Paris : OECD Publishing
    ISBN: 9789264056510
    Language: English
    Pages: Online-Ressource (246 p.)
    Parallel Title: Druckausg.
    Parallel Title: Erscheint auch als Computer viruses and other malicious software
    DDC: 005.8
    RVK:
    Keywords: Governance ; Science and Technology ; Computervirus
    Abstract: Malware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents new research into the economic incentives driving cyber-security decisions; and makes specific suggestions on how the international community can better work together to address the problem.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Paris : OECD Publishing
    ISBN: 9789264068780
    Language: English
    Pages: Online-Ressource (306 p.)
    Series Statement: TALIS
    Parallel Title: Druckausg.
    Parallel Title: Druckausg. Creating effective teaching and learning environments
    DDC: 371.1/02/072
    RVK:
    RVK:
    Keywords: Education ; Sekundarstufe ; Lehrer ; Lernumwelt
    Abstract: This publication is the first report from the International Teaching and Learning Survey (TALIS). It provides quantitative, policy-relevant information on the teaching and learning environment in schools in 23 countries and has a focus on lower secondary education. School effectiveness research consistently shows that the quality of the learning environment is the most important policy-malleable factor for positive student learning and student outcomes. In recognition of this, TALIS explores key policies and practices that shape the learning environment. The important role that school leadership can play in creating effective schools is well documented. TALIS illustrates the roles and functions that school leaders adopt within schools – often facing quite different circumstances - and examines how these roles support teachers in their work. Retaining and developing effective teachers is a priority in all school systems and TALIS examines how teachers‟ work is recognised, appraised and rewarded and how well the professional development needs of teachers are being addressed. Perhaps the most innovative aspect of TALIS is the insights it provides on the teaching beliefs that teachers bring to the classroom and the pedagogical practices that they adopt. TALIS cannot measure which practices or beliefs are most effective but it does show how these associate with some of the conditions that are pre-requisites for effective schooling.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Paris : OECD Publishing
    ISBN: 9789264056596
    Language: English
    Pages: Online-Ressource (138 p.)
    Parallel Title: Druckausg.
    Parallel Title: Druckausg. Online identity theft
    DDC: 364.16/33
    RVK:
    Keywords: Phishing ; Identity theft ; Internet fraud ; Identity theft Prevention ; Governance ; Science and Technology ; Identitätsdiebstahl ; Phishing
    Abstract: Using widely available Internet tools, internet thieves trick unsuspecting computer users into providing personal data, which they then use for illicit purposes, causing mistrust of online payment and banking services. This book defines identity theft and studies how it is perpetrated, outlines what is being done to combat the major types of ID theft, and recommends specific ways that ID theft can be addressed in an effective, global manner.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9789264025516
    Language: English
    Pages: Online-Ressource (132 p.)
    Series Statement: OECD Reviews of Risk Management Policies
    Parallel Title: Erscheint auch als Norway
    RVK:
    RVK:
    Keywords: Datensicherheit ; Norwegen ; Science and Technology ; Norway ; Norwegen ; Computersicherheit ; Internet ; Datenschutz ; Innere Sicherheit
    Abstract: The development of information and communication technologies and networks, and in particular that of the Internet, has gone hand in hand with the emergence of new types of malevolent actions called cyber-crime: viruses, worms, Trojan horses, and the like. While a number of factors make a strong case for governmental action in the area of information security, there are also important limits to what governments can achieve. This review, the first in a series of risk management policy reviews being conducted by the OECD, identifies areas of good practice in Norway's policies for information security, as well as areas where improvements could be made. For areas that could benefit from improvement, it proposes opportunities for action and, when possible, suggests alternatives.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Paris : OECD Publishing
    ISBN: 9789264196391
    Language: English
    Pages: Online-Ressource (64 p.)
    Parallel Title: Druckausg.
    Parallel Title: Parallelausg. Lignes directrices de l'OCDE sur la protection de la vie privée et les flux transfrontières de données de caractère personnel
    DDC: 343.4170999
    RVK:
    RVK:
    Keywords: Science and Technology ; Electronic books
    Abstract: The OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, adopted on 23 September 1980, continue to represent international consensus on general guidance concerning the collection and management of personal information. By setting out core principles, the Guidelines play a major role in assisting governments, business and consumer representatives in their efforts to protect privacy and personal data, and in obviating unnecessary restrictions to transborder data flows, both on and off line. The reflection of twenty-one years of expertise and experience shared among representatives of OECD governments, business and industry, and civil society, this publication contains the instruments that serve as the foundation for privacy protection at the global level: the 1980 OECD Privacy Guidelines, the 1985 Declaration on Transborder Data Flows and the 1998 Ministerial Declaration on the Protection of Privacy on Global Networks.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9789264162426
    Language: English
    Pages: Online-Ressource (40 p)
    Parallel Title: Druckausg.
    Parallel Title: Parallelausg. La politique de cryptographie ; les lignes directrices et les questions actuelles ; Les lignes directrices régissant la politique de cryptographie de l'OCDE et le rapport sur la politique de cryptographie ; contexte et questions actuelles
    Parallel Title: Druckausg. Organisation for Economic Co-Operation and Development Cryptography policy
    RVK:
    Keywords: Datensicherheit ; OECD-Staaten ; Science and Technology
    Abstract: Cryptography is one of the technological means to provide security for data on information and communications systems. It can be used to protect the confidentiality of data, such as financial or personal data, whether that data is in storage or in transit. Cryptography can also be used to verify the integrity of data by revealing whether data has been altered and identifying the person or device that sent it. These techniques are critical to the development and use of national and global information and communications networks and technologies, as well as the development of electronic commerce. This book includes the Recommendation of the OECD Council concerning Guidelines for Cryptography Policy, the text of the Guidelines itself, and a report which explains the context for the guidelines and the basic issues involved in the cryptography policy debate.
    Note: Franz. Ausg. u.d.T.: La politique de cryptographie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...