Digital Pursuit IV.


Book Description

The exact operation of the internet and our digital devices is a mystery to many, even though we use it every day. We run into technical problems that we often cannot solve on our own. When we become a victim of crime, we feel even more vulnerable in this virtual space. Digital crooks can’t wait to take advantage of the unpreparedness of others. They take the opportunity to obtain our confidential information and assets as soon as they can. The security of our own data and assets, the data we handle in the course of our work and that of our workplace comes under risk every time we connect to the internet. Many of us will sooner or later meet the first digital fraudsters, blackmailers, and bullies. What can we do to prevent our beautiful new digital world becoming a nightmare? This publication seeks to provide an answer to this. As a legal practicioner, the author has encountered several similar crimes, describing from his experience what happens in a real criminal investigation when digital data needs to be found. We examine in detail the tools and methods that members of the investigating authorities also work with on a regular basis. We analyze one by one the solutions that can be used to do this to understand how is it possible, which we considered to be impossible: identifying the unknown, faceless digital crooks based on the digital traces they have left behind. Our publication starts from the basics and helps you learn in a simple, fun way everything that benefits anyone who cares about their own digital security. We also provide knowledge that is a good starting point for future experts who wish to familiarize themselves with the world of cybercriminals more seriously due of their occupation and studies.




Digital Pursuit II.


Book Description

Cyber harassers are chasing us, offenders are breaching into websites or make them inaccessible in cyberspace. Scammers posing as Nigerian princes, deceptive messages from phishers and ransomware are trying to deprive us of our property. Our own and also our workplace’s data and assets are both at risk every single day we use digital devices. What can we do to avoid our beautiful new digital world becoming a nightmare? This publication seeks to provide an answer to this. As a legal professional, the author has encountered several similar crime cases and explains from his experience what dangers are waiting for us, how to defend ourselves. We examine in detail the methods and means of perpetration, with practical examples. We analyze the possibilities of prevention, detection and protection one by one. We explain which prevention measure is effective and why, what signs suggest that we have become a victim, and what we can do if the worst has happened. Our publication starts from the basics and helps you learn in a simple, entertaining way, that benefits anyone who cares about his or her own digital security. We provide such knowledge, which is also a good starting point for future experts, who would get to know the world of cybercriminals more seriously because of their occupation or studies.




Digital Pursuit III.


Book Description

We are constantly using the internet, be it sending messages, making video calls, sharing files, making purchases or just doing office work. Along with our mobile phone, we also carry the World Wide Web in our pockets. However, unlimited freedom also carries dangers. Cybercriminals will eagerly wait the opportunity to obtain and misuse our confidential data. Both our own data and the data we handle in the course of our work are at risk every single day we connect to the internet. What can we do to avoid our beautiful new digital world becoming a nightmare? This publication seeks to provide an answer to this. As a legal practicioner, the author has encountered several similar crimes, showing from his experience what dangers lurk there and how to defend ourselves. We examine in detail the operation of the internet and the methods of digital encryption used to protect our data. We analyze the sources of danger and the possibilities of prevention, detection and response one by one. We explain which method of protection is effective and why, what signs suggest that we have become a victim, and what we can do if something the worst has happened. Our publication starts from the basics and helps you learn in a simple, fun way everything that benefits anyone who cares about their own digital security. We also provide knowledge that is a good starting point for future experts who would get to know the world of cybercriminals more seriously because of their occupation and studies.




Advances in Manufacturing IV


Book Description




Digital Transformation of SME Marketing Strategies


Book Description

SMEs represent more than 95% of businesses operating in global markets. These businesses are the fabric of any economic system both in developed and emerging countries, and are the main constituents of any global supply chain throughout the world. However, research on new 4.0 marketing strategies for this kind of businesses has been largely neglected. Extant literature mostly neglects, or fails to articulate the importance of emerging technology such as Big Data, Artificial Intelligence and VR/AR for SMEs. Building on that, this book reviews existing literature on innovation and new technology in marketing for SMEs, what they could do and should avoid. Then, presenting multiple case study from SMEs operating in diverse industries (fashion and design, food and wine, financial services), it develops a practical strategic framework that could be used by SMEs wishing to effectively innovate their marketing strategies in our contemporary digital era. It will be an essential resource for students and researchers of marketing, innovation and industry 4.0.




Building Information Modelling (BIM) in Design, Construction and Operations IV


Book Description

Containing papers presented at the 4th International Conference on Building Information Modelling (BIM) in Design, Construction and Operations, this volume brings together the research of experts from industry, practice and academia. It describes innovative solutions and predictions for future trends across key BIM-related topics. The modern construction industry and built environment disciplines have been transformed through the development of new and innovative BIM tools and techniques. These have fundamentally altered the manner in which construction teams operate; the processes through which designs are evolved; and the relationships between conceptual, detail, construction and life cycle stages. BIM is essentially value-creating collaboration throughout the entire life-cycle of an asset, underpinned by the data attached to them. BIM has far and reaching consequences on both building procurement and infrastructure. This recent emergence constitutes one of the most exciting developments in the field of the Built Environment. These advances have offered project teams multi-sensory collaborative tools and opportunities for new communication structures. The included papers cover such topics as: BIM in design coordination; BIM in construction operations; BIM in building operation and maintenance; BIM and sustainability; BIM and collaborative working and practices; BIM-Facilities management integration; BIM-GIS integration; BIM and automation in construction; BIM and health and safety; BIM standards; BIM and interoperability; BIM and life cycle project management; BIM and cultural heritage; BIM and robotics; BIM in risk analysis and management; BIM in building cost control; BIM and building representation; Virtual design and construction (VDC); BIM in the execution phase; BIM for infrastructure development; Digital twins.




The Impact of Fintech on Central Bank Governance


Book Description

Fintech presents unique opportunities for central banks. The rapid changes in technology that are transforming the financial system will allow central banks to enhance the execution of various of their core functions, such as currency issuance and payment systems. But some aspects of fintech pose major challenges. Central banks have always been at the cutting edge of financial technology and innovation. In the past, the invention of the banknote, the processing of payments through debits and credits in book-entry accounts, and the successive transitions of interbank payment systems from the telegraph to internet protocols were all transformative innovations. Today, central banks are facing new and unprecedented challenges: distributed ledger technology, new data analytics (artificial intelligence [AI] and machine learning), and cloud computing, along with a wider spread of mobile access and increased internet speed and bandwidth. The purpose of this note is to discuss the authors’ preliminary views on how, from a legal perspective, central banks can best deal with the impact of fintech on their governance. These preliminary views are based on a review of central banks’ reaction thus far to the challenges posed by fintech to the legal foundations of their governance.




The Yearbook of China's Cultural Industries 2011


Book Description

The Yearbook of China's Cultural Industries is a large comprehensive, authoritative and informative annual which accurately records and reflects the annual development of cultural industries in China. It is also a large reference book with abundant information on cultural industries in China and a complex index, which could be kept for a long time and read for many years. A must for libraries. It deals with Radio and TV, the film industry, Press and Publishing Industries, the Entertainment Industry, Online Game Industry, Audio Visual New Media Industry, Advertisement Industry, and the Cultural Tourism Industry. It examines the figures nationally and by region.




Educational Research and Innovation Education in the Digital Age Healthy and Happy Children


Book Description

The COVID-19 pandemic was a forceful reminder that education plays an important role in delivering not just academic learning, but also in supporting physical and emotional well-being. Balancing traditional “book learning” with broader social and personal development means new roles for schools and education more generally.




Cyber Security for Critical Infrastructure


Book Description

Today, cyberspace has emerged as a domain of its own, in many ways like land, sea and air. Even if a nation is small in land area, low in GDP per capita, low in resources, less important in geopolitics, low in strength of armed forces, it can become a military super power if it is capable of launching a cyber-attack on critical infrastructures of any other nation including superpowers and crumble that nation. In fact cyber space redefining our security assumptions and defense strategies. This book explains the current cyber threat landscape and discusses the strategies being used by governments and corporate sectors to protect Critical Infrastructure (CI) against these threats.