×
Receive a 20% Discount on All Purchases Directly Through IGI Global's Online Bookstore.
Additionally, libraries can receive an extra 5% discount.
Learn More
Shopping Cart
Login
Register
Language:
English
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
Subscribe to the latest research through IGI Global's new InfoSci-OnDemand Plus
InfoSci®-OnDemand Plus, a subscription-based service, provides researchers the ability to access full-text content from over 93,000+ peer-reviewed book chapters and 24,000+ scholarly journal articles covering 11 core subjects. Users can select articles or chapters that meet their interests and gain access to the full content permanently in their
personal online InfoSci-OnDemand Plus library
.
Subscribe
Purchase the Encyclopedia of Information Science and Technology, Fourth Edition
and Receive Complimentary E-Books of Previous Editions
When ordering directly through IGI Global's Online Bookstore, receive the complimentary e-books for the first, second, and third editions with the purchase of the Encyclopedia of Information Science and Technology, Fourth Edition e-book.
Purchase
Create a Free IGI Global Library Account to Receive a 25% Discount on All Purchases
Exclusive benefits include one-click shopping, flexible payment options, free COUNTER 4 and MARC records, and a 25% discount on all titles as well as the award-winning InfoSci
®
-Databases.
Sign Up Now!
InfoSci
®
-Journals Annual Subscription Price for New Customers: As Low As US$ 4,080*
This collection of over 185 e-journals offers unlimited access to highly-cited, forward-thinking content in full-text PDF and HTML with no DRM. There are no platform or maintenance fees and a guarantee of no more than 5% increase annually.
Learn More
Discounted Titles Only Available through IGI Global’s Online Bookstore
Take 20% off all publications purchased directly through the IGI Global Online Bookstore.
Shop Now
Books
Journals
InfoSci
®
-Databases
Articles/Chapters
Publish
with Us
Resources
Librarians
InfoSci
®
-Databases
Book Title List
Journal Title List
Video Title List
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Library Account Program
Instructors
Course Adoption
Teaching Cases
Researchers
Browse Books
Browse Journals
Streaming Videos
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
Fair Use Policy
Copy Editing Service
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Catalogs
About Us
Newsroom
Bookstore Search
Reset
Total results: 150
Sort by:
Relevancy
Title (asc)
Title (desc)
Copyright Year (asc)
Copyright Year (desc)
Sample PDF
Emergency and Disaster Management: Concepts, Methodologies, Tools, and Applications
Information Resources Management Association. © 2019. 1723 pages.
In a world of earthquakes, tsunamis, and terrorist attacks, emergency response plans are crucial to solving problems, overcoming challenges, and restoring and improving communities that have been affected by these catastrophic events. Although the necessity for quick and efficient aid is understood...
Reference Book
Sample PDF
National Security: Breakthroughs in Research and Practice
Information Resources Management Association. © 2019. 915 pages.
The tactical organization and protection of resources is a vital component for any governmental entity. Effectively managing national security through various networks ensures the highest level of protection and defense for citizens and classified information. National Security: Breakthroughs in...
Reference Book
Sample PDF
Post-Narratology Through Computational and Cognitive Approaches
Takashi Ogata, Taisuke Akimoto. © 2019. 521 pages.
Studying narratives is an ideal method to gain a good understanding of how various aspects of human information are organized and integrated. The concept and methods of a narrative, which have been explored in narratology and literary theories, are likely to be connected with contemporary information...
Reference Book
Sample PDF
Biotechnology: Concepts, Methodologies, Tools, and Applications
Information Resources Management Association. © 2019. 2250 pages.
Biotechnology can be defined as the manipulation of biological process, systems, and organisms in the production of various products. With applications in a number of fields such as biomedical, chemical, mechanical, and civil engineering, research on the development of biologically inspired materials...
Reference Book
Sample PDF
International Journal of Translation, Interpretation, and Applied Linguistics (IJTIAL)
Wei Zhao, Ying Cui. © 2019.
The International Journal of Translation, Interpretation, and Applied Linguistics (IJTIAL) is a biannual innovative forum for researchers and practitioners from any part of the world to disseminate the latest trends, techniques, and practical solutions in the growing fields of translation...
Journal
Sample PDF
Use of Social Media for Disaster Management: A Prescriptive Framework
Louis Ngamassi, Thiagarajan Ramakrishnan, Shahedur Rahman. © 2019. 21 pages.
Social media is emerging as an important information-based communication tool for disaster management. Yet there are many relief organizations that are not able to develop strategies and allocate resources to effectively use social media for disaster management. The reason behind this inability may be...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
The Risk Management Profession in Australia: Business Continuity Plan Practices
Adela McMurray, Jean Cross, Carlo Caponecchia. © 2019. 14 pages.
This study aimed to identify to what extent Australian organizations have any plans to manage business continuity threats, and the nature and content of these plans. Sixty-four respondents who were risk management professionals were surveyed to explore the Business Continuity Practices within their...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Application of Conventional Data Mining Techniques and Web Mining to Aid Disaster Management
Akshay Kumar, Alok Bhushan Mukherjee, Akhouri Pramod Krishna. © 2019. 30 pages.
Data mining techniques have potential to unveil the complexity of an event and yields knowledge that can create a difference. They can be employed to investigate natural phenomena; since these events are complex in nature and are difficult to characterize as there are elements of uncertainty involved...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Using Long Endurance Remotely Piloted Aircraft Systems to Support Humanitarian Logistic Operations: A Case Study of Cyclone Winston
Peter Tatham, Catherine M. Ball, Yong Wu, Pete Diplas. © 2019. 15 pages.
Whilst there has been some limited use of Remotely Piloted Aircraft Systems (RPAS) as part of the response to natural disasters, to date these have typically employed short range mini or micro systems. Using a case study of Cyclone Winston that struck Fiji in February 2016, this chapter demonstrates...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Processing Big Data for Emergency Management
Rajendra Akerkar. © 2019. 21 pages.
Emergencies are typically complex problems with serious consequences that must be solved in a limited amount of time to reduce any possible damage. Big data analysis leads to more assured decision making and better decisions can mean greater operational efficiencies, cost reductions and reduced risk....
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Assessing Risk and Safeguarding Rare Library Materials During Exhibition Loans
Patti Gibbons. © 2019. 12 pages.
Rare book and archival materials on loan to libraries and other cultural heritage institutions are very often historically significant, highly valuable, and frequently irreplaceable. Lenders minimize risks present during exhibitions loans of these valuable materials by identifying and addressing...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Emergency Ethics, Law, Policy and IT Innovation in Crises
Xaroula Kerasidou, Monika Buscher, Michael Liegl, Rachel Oliphant. © 2019. 27 pages.
Ethics, law, and policy are cornerstones for effective IT innovation in crisis response and management. While many researchers and practitioners recognise this, it can be hard to find good resources for circumspect innovation approaches. This paper reviews The Library of Essays on Emergency Ethics, Law...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Sharing Radiation Measurements Through Social Media: A Methodological User-Oriented Proposal Set of Guidelines
Antonin Segault, Federico Tajariol, Yang Ishigaki, Ioan Roxin. © 2019. 16 pages.
Radiation measurements are key information for risk communication in post-nuclear accident situations. Among the different social media platforms, Twitter offers automated accounts which have been used to share the readings, but often in an incomplete way from the perspective of data sharing and risk...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Cyberterrorism: Using the Internet as a Weapon of Destruction
Leevia Dillon. © 2019. 25 pages.
The cyber threat landscape has continued to evolve with time and enhanced technology. With the advent of new breeds of terrorists and cybercriminals, the cyberterrorism debate has again wielded global attention. In this chapter, the author will attempt to delve deeper into the concept of...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare
Albert Olagbemiro. © 2019. 15 pages.
The overall implication of depicting cyberspace as a complex, adaptive ecosystem rather than its current representation as a bi-dimensional domain provides an avenue for further insight into the complexities associated with operating in cyberspace. This renewed perspective brings to the forefront the...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Cyber-Attacks, Retaliation and Risk: Legal and Technical Implications for Nation-States and Private Entities
Cameron S. D. Brown. © 2019. 37 pages.
This chapter examines legal and technical issues that arise when considering strategic retaliatory countermeasures to cyber-attacks. Implications connected with endorsing techniques of active defense for nation-states are viewed alongside challenges faced by private entities. Proactive avenues for...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Comparing the Socio-Political Ethics of Fighting Terrorism With Extreme Self-Defense in USA: An Exploratory Insight
Maximiliano E. Korstanje, Kenneth David Strang. © 2019. 21 pages.
In this study the authors adopted a post-positivist research design philosophy to explore the likelihood that Americans would support extreme self-defense policies like torture, reducing human rights or banning Muslims to fight against global terrorism, especially after 9/11 and in light of the Trump...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Russian Cyberwarfare Taxonomy and Cybersecurity Contradictions Between Russia and EU: An Analysis of Management, Strategies, Standards, and Legal Aspects
Kimberly Lukin. © 2019. 18 pages.
This article analyzes the similarities and differences between the EU's and Russia's cyber preparedness, management structures, governmental security controls and cyber strategies. In comparing the cyber capabilities of the EU and Russia, we use military tactics and criteria as a basis for...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Intelligence Studies, Theory, and Intergroup Conflict and Resolution: Theory and Beyond
Elena Mastors, Joseph H. Campos. © 2019. 12 pages.
The study of intelligence traditionally relies on descriptive and case study approaches. However, the study of intelligence should shift from this reliance on case study approaches to one grounded in multidisciplinary theory. In particular, social psychological approaches should be fully integrated...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Quantitative Approaches to Representing the Value of Information Within the Intelligence Cycle
Christopher M. Smith, William T. Scherer, Andrew Todd, Daniel T. Maxwell. © 2019. 20 pages.
The authors propose that valuation of information metrics developed near the end of the intelligence cycle are appropriate supplemental metrics for national security intelligence. Existing information and decision theoretic frameworks are often either inapplicable in the context of national security...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Social Media Analytics for Intelligence and Countering Violent Extremism
Jennifer Yang Hui. © 2019. 21 pages.
Social media analytics are increasingly incorporated into security practices due to the rise in online criminal and extremist activities. Social media research, however, has not become established in either intelligence practice or academic-based approach. This chapter aims to fill the gap by...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Energy Infrastructure Security in the Digital Age
Tianxing Cai. © 2019. 12 pages.
In this article, the current application of information technology in the energy infrastructure security will be introduced. The digital system can help us to identify the framework of energy infrastructure security, characterize the energy network, generate the strategy of self-recovery and handle the...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Critical Raw Materials and UK Defence Acquisition: The Case of Rare Earth Elements
Julieanna Powell-Turner, Peter D. Antill. © 2019. 21 pages.
This chapter examines the factors which could affect future critical raw material availability for UK defence, focusing on the availability of rare earth elements (REE). These include tighter regulatory policy and its enforcement, export policies, promoting greater efficiency in resource use, efforts...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Military Expenditure, Economic Growth, and Foreign Policy Implications: The Case of Ghana and Nigeria Within the ECOWAS, 1986-2016
Bertha Z. Osie-Hwedie, Napoleon Kurantin. © 2019. 22 pages.
The chapter discusses the nature of the relationship between military expenditure, economic growth, and foreign policy commitments, and the consequences on economic growth of apportioning an increased part of the gross domestic product to the military in developing countries of Ghana and Nigeria within...
Source:
National Security: Breakthroughs in Research and Practice
Sample PDF
Taking Perspectives in Digital Storytelling on Business Planning
Yoko Takeda. © 2019. 23 pages.
Digital storytelling for business planning has the narrative mode and the logical scientific mode. This chapter explores how the structure of the digital storytelling work affects its effectiveness and how the storyteller's reflection influences the improvement of the work. It is critical to...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Page
/
6