×
Receive a 20% Discount on All Purchases Directly Through IGI Global's Online Bookstore.
Additionally, libraries can receive an extra 5% discount.
Learn More
Shopping Cart
Login
Register
Language:
English
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
Subscribe to the latest research through IGI Global's new InfoSci-OnDemand Plus
InfoSci®-OnDemand Plus, a subscription-based service, provides researchers the ability to access full-text content from over 93,000+ peer-reviewed book chapters and 24,000+ scholarly journal articles covering 11 core subjects. Users can select articles or chapters that meet their interests and gain access to the full content permanently in their
personal online InfoSci-OnDemand Plus library
.
Subscribe
Purchase the Encyclopedia of Information Science and Technology, Fourth Edition
and Receive Complimentary E-Books of Previous Editions
When ordering directly through IGI Global's Online Bookstore, receive the complimentary e-books for the first, second, and third editions with the purchase of the Encyclopedia of Information Science and Technology, Fourth Edition e-book.
Purchase
Create a Free IGI Global Library Account to Receive a 25% Discount on All Purchases
Exclusive benefits include one-click shopping, flexible payment options, free COUNTER 4 and MARC records, and a 25% discount on all titles as well as the award-winning InfoSci
®
-Databases.
Sign Up Now!
InfoSci
®
-Journals Annual Subscription Price for New Customers: As Low As US$ 4,080*
This collection of over 185 e-journals offers unlimited access to highly-cited, forward-thinking content in full-text PDF and HTML with no DRM. There are no platform or maintenance fees and a guarantee of no more than 5% increase annually.
Learn More
Discounted Titles Only Available through IGI Global’s Online Bookstore
Take 20% off all publications purchased directly through the IGI Global Online Bookstore.
Shop Now
Books
Journals
InfoSci
®
-Databases
Articles/Chapters
Publish
with Us
Resources
Librarians
InfoSci
®
-Databases
Book Title List
Journal Title List
Video Title List
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Library Account Program
Instructors
Course Adoption
Teaching Cases
Researchers
Browse Books
Browse Journals
Streaming Videos
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
Fair Use Policy
Copy Editing Service
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Catalogs
About Us
Newsroom
Bookstore Search
Reset
Total results: 131
Sort by:
Relevancy
Title (asc)
Title (desc)
Copyright Year (asc)
Copyright Year (desc)
Sample PDF
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications
Information Resources Management Association. © 2019. 2174 pages.
The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital...
Reference Book
Sample PDF
Post-Narratology Through Computational and Cognitive Approaches
Takashi Ogata, Taisuke Akimoto. © 2019. 521 pages.
Studying narratives is an ideal method to gain a good understanding of how various aspects of human information are organized and integrated. The concept and methods of a narrative, which have been explored in narratology and literary theories, are likely to be connected with contemporary information...
Reference Book
Sample PDF
Biotechnology: Concepts, Methodologies, Tools, and Applications
Information Resources Management Association. © 2019. 2250 pages.
Biotechnology can be defined as the manipulation of biological process, systems, and organisms in the production of various products. With applications in a number of fields such as biomedical, chemical, mechanical, and civil engineering, research on the development of biologically inspired materials...
Reference Book
Sample PDF
International Journal of Translation, Interpretation, and Applied Linguistics (IJTIAL)
Wei Zhao, Ying Cui. © 2019.
The International Journal of Translation, Interpretation, and Applied Linguistics (IJTIAL) is a biannual innovative forum for researchers and practitioners from any part of the world to disseminate the latest trends, techniques, and practical solutions in the growing fields of translation...
Journal
Sample PDF
Risks, Security, and Privacy for HIV/AIDS Data: Big Data Perspective
Md Tarique Jamal Ansari, Dhirendra Pandey. © 2019. 17 pages.
Big data has the potential to transform healthcare systems for the prevention and treatment of HIV/AIDS by providing analytic tools that are capable of handling huge and different types of data at very fast speeds. Big data's transformative potential is also introverted by privacy and security...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Real World Applications: A Literature Survey
Massimo Tistarelli, Stan Z. Li. © 2019. 16 pages.
The analysis of face images has been extensively applied for the recognition of individuals in several application domains. Most notably, faces not only convey information about the identity of the subject, but also a number of ancillary information, which may be equally useful to anonymously determine...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
A Framework for Protecting Users' Privacy in Cloud
Adesina S. Sodiya, Adegbuyi B. © 2019. 12 pages.
Data and document privacy concerns are increasingly important in the online world. In Cloud Computing, the story is the same, as the secure processing of personal data represents a huge challenge. The main focus is to preserve and protect personally identifiable information (PII) of individuals...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Notifiable Disease Databases for Client Management and Surveillance
Ann M. Jolly, James J. Logan. © 2019. 31 pages.
The spread of certain infectious diseases, many of which are preventable, is widely acknowledged to have a detrimental effect on society. Reporting cases of these infections has been embodied in public health laws since the 1800s. Documenting client management and monitoring numbers of cases are the...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Persuasion and Propaganda in War and Terrorism
Thomas Steinfatt, Dana Janbek. © 2019. 24 pages.
This chapter focuses on the use of propaganda during times of war, prejudice, and political unrest. Part one distinguishes between persuasion and one of its forms, propaganda. The meaning-in-use of the term ‘propaganda' is essential to understanding its use over time. Part two presents relevant...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Airplane Health Surveillance System: For Connected World
N. B. Rachana, K. G. Srinivasa, S. Seema. © 2019. 14 pages.
The Airplane Health Surveillance System is an information system which is designed to guide the pilot to make decision under uncertainty. The system is expected to detect the defect along with cause for the delay and airplane crashes which has high impact on society. The system is capable of detecting...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Architecture of Combined E-Learning Environment and Investigation of Secure Access and Privacy Protection
Radi Petrov Romansky, Irina Stancheva Noninska. © 2019. 19 pages.
The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Sealing One's Online Wall Off From Outsiders: Determinants of the Use of Facebook's Privacy Settings Among Young Dutch Users
Ardion Beldad. © 2019. 16 pages.
Pieces of personal information (e.g. contact details, photos, thoughts and opinions on issues and things) on online social network sites are susceptible to third-party surveillance. While users are provided with the possibility to prevent unwarranted access using available privacy settings, such...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Western Female Migrants to ISIS: Propaganda, Radicalisation, and Recruitment
Erin Marie Saltman. © 2019. 23 pages.
Women have long been a blind spot for security, academic and think tank sectors in relation to the growing threat of global extremism. The recent spike in female recruitment to the terrorist organisation, Islamic State in Iraq and Syria (ISIS), is a strong indicator of this dangerous trend. While often...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Dimensions of Privacy Concerns Amongst Online Buyers in India
Tinu Jain, Prashant Mishra. © 2019. 16 pages.
Internet is quickly becoming the public electronic marketplace. Though the internet has revolutionized retail and direct marketing, the full scale incorporation and acceptance of the internet marketplace with the modern business is limited. One major inhibition shown by the internet buyers is in the...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
A Comparative View of Censored and Uncensored Political Discussion: The Case of Chinese Social Media Users
Qihao Ji. © 2019. 15 pages.
Through a content analysis on Chinese online dissidents' social media discourses, this study examines the impact of Internet censorship on Chinese dissidents' political discourse in two social media platforms: Weibo and Twitter. Data was collected during a time period when China's Internet...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
A Usability Evaluation of Facebook's Privacy Features Based on the Perspectives of Experts and Users
Márcio J. Mantau, Marcos H. Kimura, Isabela Gasparini, Carla D. M. Berkenbrock, Avanilde Kemczinski. © 2019. 25 pages.
The issue of privacy in social networks is a hot topic today, because of the growing amount of information shared among users, who are connected to social media every moment and by different devices and displays. This chapter presents a usability evaluation of the privacy features of Facebook's...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Privacy in the Internet of Things
Jayashree Kanniappan, Babu Rajendiran. © 2019. 16 pages.
Internet of Things technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in personal life by means of smart devices at home. The Internet of Things (IoT) spawn new businesses and make buildings, cities and transport smarter. The IoT allows for ubiquitous...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Should We Publish That?: Managing Conflicting Stakeholder Expectations in the Publishing Industry
Loren Falkenberg, Oleksiy Osiyevskyy. © 2019. 28 pages.
As the responsibilities of modern business expand to multiple stakeholders, there is an increased need to understand how to manage conflicting normative expectations of different stakeholders. Corporate responsibilities to stakeholders are based on the need to minimize or correct harm from operations...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Stealing Consciousness: Using Cybernetics for Controlling Populations
Geoffrey R. Skoll. © 2019. 10 pages.
In light of the recent revelations about the electronic surveillance by the US National Security Agency, this essay analyzes such surveillance as part of state strategies to control populations. It also examines the use of terror scares—that is, fear mongering—by states as the rationale for their...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
In Putin's Russia, Information Has You: Media Control and Internet Censorship in the Russian Federation
Katherine Ognyanova. © 2019. 18 pages.
This chapter outlines the practices of state control over Internet content in Russia and highlights their grounding in the information culture and media environment of the country. Building on existing data on freedom of the press and online censorship, the text explores the socio-cultural context of...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
The Role of Religiosity in Technology Acceptance: The Case of Privacy in Saudi Arabia
Rami Mohammed Baazeem. © 2019. 22 pages.
Religion plays a major role in shaping individual behaviour, especially in the religious countries. This chapter sheds light on the effect of religiosity on the intention to use technology and privacy and will use Saudi Arabia as an example. Using the unified theory of acceptance and use of technology...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
Privacy Aware Access Control: A Literature Survey and Novel Framework
Rekha Bhatia, Manpreet Singh Gujral. © 2019. 16 pages.
Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and the...
Source:
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and...
Sample PDF
A Computational, Cognitive, and Narratological Approach to Narrative Generation
Takashi Ogata. © 2019. 84 pages.
This chapter surveys and discusses interdisciplinary approaches to primarily artificial intelligence (AI)-based computational narrative or story generation systems by way of introducing cognitive science, and narratology and related literary theories. The first part of this chapter provides a general...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
Consideration of Fundamental Methods and Principles for Human-Computer Co-Creation of Narratives
Taisuke Akimoto, Takashi Ogata. © 2019. 28 pages.
The authors propose the conceptual design of a co-creative narrative generation system that co-creates a collection of diverse narratives from a narrative generation program and people. The long-term goal of this study is to vitalize humans' narrative creation by developing generative narrative...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
Taking Perspectives in Digital Storytelling on Business Planning
Yoko Takeda. © 2019. 23 pages.
Digital storytelling for business planning has the narrative mode and the logical scientific mode. This chapter explores how the structure of the digital storytelling work affects its effectiveness and how the storyteller's reflection influences the improvement of the work. It is critical to...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Page
/
6