Includes bibliographical references (pages 352-377) and index.
CONTENTS NOTE
Text of Note
""Table of Contents""; ""Detailed Table of Contents""; ""Foreword""; ""Preface""; ""Section I Foundation, Technology, and Infrastructure of Pervasive Computing""; ""Chapter I Pervasive Computing: A Conceptual Framework""; ""Chapter II Pervasive Business Infrastructure: The Network Technologies, Routing and Security Issues""; ""Chapter III Computational Mobile Grid: A Computing Infrastructure on Mobile Devices""; ""Section II Applications and Services""; ""Chapter IV Mobile and Pervasive Technology in Education and Training: Potential and Possibilities, Problems and Pitfalls""
Text of Note
""Chapter V Ubiquitous Computing for Microbial Forensics and Bioterrorism""""Chapter VI Falling Behind: A Case Study in Uncritical Assessment""; ""Section III Business Models, Structures, and Strategies""; ""Chapter VII Strategizing in the Digital World: Aligning Business Model, Brand and Technology""; ""Chapter VIII Business Models and Organizational Processes Changes""; ""Chapter IX The Critical Success Factors and Integrated Model for Implementing E-Business in Taiwan�s SMEs""; ""Section IV Risk Assessment and Management""; ""Chapter X Security Issues in Pervasive Computing""
Text of Note
""Chapter XI Deciphering Pervasive Computing: A Study of Jurisdiction, E- Fraud and Privacy in Pervasive Computing Environment""""Chapter XII Biometrical Biometrical Biometrical Biometrical Challenge for Legislation: The Finnish Case""; ""Chapter XIII Pervasive Computers in Aviation Passenger Risk Risk""; ""Section V Cultural and Social Implications""; ""Chapter XIV Ethical Issues and Pervasive Computing""; ""Chapter XV Knowledge Sharing and Pervasive Computing: The Need for Trust and a Sense of History""
Text of Note
""Chapter XVI Advancing Women in the Digital Economy: eLearning Opportunities for Meta-Competency Skilling""""Chapter XVII Cultural Dimension in the Future of Pervasive Computing""; ""Chapter XVIII Outline of the Human Factor Elements Evident with Pervasive Computers""; ""Chapter XIX Impact of Computer and Video Games on the Development of Children""; ""Compilation of References""; ""About the Contributors""; ""Index""
0
8
8
8
SUMMARY OR ABSTRACT
Text of Note
"This book provides extensive information about pervasive computing, its implications from operational, legal and ethical perspective so that current and future pervasive service providers can make responsible decisions about where, when and how to use this technology"--Provided by publisher.
SYSTEM REQUIREMENTS NOTE (ELECTRONIC RESOURCES)
Text of Note
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Safari Books Online
Stock Number
CL0500000085
OTHER EDITION IN ANOTHER MEDIUM
Title
Risk assessment and management in pervasive computing.
International Standard Book Number
1605662208
TOPICAL NAME USED AS SUBJECT
Mobile computing, Handbooks, manuals, etc.
Ubiquitous computing, Handbooks, manuals, etc.
COMPUTERS-- Hardware-- Personal Computers-- Macintosh.