Digital India Thomas, Pradip Ninan
2012, 2018-12-24, 2012-07-11, 20120101
eBook
Digital India is a case study-based, critical introduction to the theory and practice of the digital in social change. The volume--with its chapters on telecommunications, software, mobile telephony, ...e-governance, ICT4D, software patenting, public sector software and cultural piracy--offers an entry point into an understanding of the contested nature of the digital in India via an analysis of theory and practice.
In this book, Nye returns to the business of critically appraising America's role in the present and future. While many contemporary 'realist' scholars view China as America's most likely competitor, ...or envisage a Russia-China-India coalition, Nye feels that the real challenges to America's power come in the form of the very things that have made the last ten years so prosperous: the information revolution and globalization. In Nye's view, while these phenomena at first helped to increase America's 'soft power' (its ability to influence the world through cultural, political, and other non-military means), they will soon threaten to dilute it. As technology spreads the Internet will become less US-centric, transnational corporations and non-governmental actors will gain power, and 'multiple modernities' will mean that 'being number 1 ain't gonna be what it used to be'. Nye includes chapters on American power, the information revolution, globalization, American culture and politics, and 'defining the national interest', along the way considering what the lessons of history have to tell us about what we should do with out unprecedented power - while we still have it. This book will include a sharp analysis of the terrorist attacks on the US in 2000, and will argue that the US cannot fight terrorism by itself.
This book is open access. This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ...ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, and proposes a raft of principles to guide the regulation of biometrics in liberal democracies. Biometric identification technology is developing rapidly and being implemented more widely, along with other forms of information technology. As products, services and communication moves online, digital identity and security is becoming more important. Biometric identification facilitates this transition. Citizens now use biometrics to access a smartphone or obtain a passport; law enforcement agencies use biometrics in association with CCTV to identify a terrorist in a crowd, or identify a suspect via their fingerprints or DNA; and companies use biometrics to identify their customers and employees. In some cases the use of biometrics is governed by law, in others the technology has developed and been implemented so quickly that, perhaps because it has been viewed as a valuable security enhancement, laws regulating its use have often not been updated to reflect new applications. However, the technology associated with biometrics raises significant ethical problems, including in relation to individual privacy, ownership of biometric data, dual use and, more generally, as is illustrated by the increasing use of biometrics in authoritarian states such as China, the potential for unregulated biometrics to undermine fundamental principles of liberal democracy. Resolving these ethical problems is a vital step towards more effective regulation.
Over the past three decades, China has experienced rapid economic growth and a fascinating transformation of its industry. However, much of this success is the result of industrial imitation and ...China's continuing success now relies heavily on its ability to strengthen its indigenous innovation capability. In this book, Xiaolan Fu investigates how China can develop a strategy of compressed development to emerge as a leading innovative nation. The book draws on quantitative and qualitative research that includes cross-country, cross-province and cross-firm analysis. Large multi-level panel datasets, unique survey databases, and in-depth industry case studies are explored. Different theoretical approaches are also used to examine the motivations, obstacles and consequences of China's innovation with a wider discussion around what other countries can learn from China's experience. This book will appeal to scholars and policy-makers working in fields such as innovation policy, technology management, development and international economics and China studies.
Digital state at the leading edge Borins, Sandford F
Digital state at the leading edge,
c2007, 20070120, 2007, 2007-01-01, 2007-01-20, 20070101
eBook
Digital State at the Leading Edgeis the first attempt to take a comprehensive view of the impact of IT upon the whole of government, including politics and campaigning, public consultation, service ...delivery, knowledge management, and procurement.
This book places Indonesia at the forefront of the global debate about the impact of disruptive digital technologies. Digital technology is fast becoming the core of life, work, culture and identity. ...Yet, while the number of Indonesians using the Internet has followed the upward global trend, some groups — the poor, the elderly, women, the less well-educated, people living in remote communities — are disadvantaged. This interdisciplinary collection of essays by leading researchers and scholars, as well as e-governance and e-commerce insiders, examines the impact of digitalisation on the media industry, governance, commerce, informal sector employment, education, cybercrime, terrorism, religion, artistic and cultural expression, and much more. It presents groundbreaking analysis of the impact of digitalisation in one of the world's most diverse, geographically vast nations. In weighing arguments about the opportunities and challenges presented by digitalisation, it puts the very idea of a technological revolution into critical perspective.
Information and communication technologies (ICTs)--especially the Internet and the mobile phone--have changed the lives of people all over the world. These changes affect not just the affluent ...populations of income-rich countries but also disadvantaged people in both global North and South, who may use free Internet access in telecenters and public libraries, chat in cybercafes with distant family members, and receive information by text message or email on their mobile phones. Drawing on Amartya Sen's capabilities approach to development--which shifts the focus from economic growth to a more holistic, freedom-based idea of human development--Dorothea Kleine in Technologies of Choice? examines the relationship between ICTs, choice, and development. Kleine proposes a conceptual framework, the Choice Framework, that can be used to analyze the role of technologies in development processes. She applies the Choice Framework to a case study of microentrepreneurs in a rural community in Chile. Kleine combines ethnographic research at the local level with interviews with national policy makers, to contrast the high ambitions of Chile's pioneering ICT policies with the country's complex social and economic realities. She examines three key policies of Chile's groundbreaking Agenda Digital: public access, digital literacy, and an online procurement system. The policy lesson we can learn from Chile's experience, Kleine concludes, is the necessity of measuring ICT policies against a people-centered understanding of development that has individual and collective choice at its heart.
This open access book constitutes revised selected papers from the International Workshops held at the 4th International Conference on Process Mining, ICPM 2022, which took place in Bozen-Bolzano, ...Italy, during October 23–28, 2022. The conference focuses on the area of process mining research and practice, including theory, algorithmic challenges, and applications. The co-located workshops provided a forum for novel research ideas. The 42 papers included in this volume were carefully reviewed and selected from 89 submissions. They stem from the following workshops: – 3rd International Workshop on Event Data and Behavioral Analytics (EDBA) – 3rd International Workshop on Leveraging Machine Learning in Process Mining (ML4PM) – 3rd International Workshop on Responsible Process Mining (RPM) (previously known as Trust, Privacy and Security Aspects in Process Analytics) – 5th International Workshop on Process-Oriented Data Science for Healthcare (PODS4H) – 3rd International Workshop on Streaming Analytics for Process Mining (SA4PM) – 7th International Workshop on Process Querying, Manipulation, and Intelligence (PQMI) – 1st International Workshop on Education meets Process Mining (EduPM) – 1st International Workshop on Data Quality and Transformation in Process Mining (DQT-PM)
In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. ...Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards.This book will enable you to: Optimize your resources by making the most of the potential benefits, and being aware of the potential risks, of your IT provision, Improve your stakeholder relationships by enhancing your service management and delivery through the application of appropriate standards.Apply security and control methods that are suitable for your business. Maximize the opportunities that are presented by compliance legislation and regulations. Manage your data storage, data recovery and data migration, particularly in the context of the Cloud, Ensure business continuity in the face of an incident, and implement strategies to cover the risk of business interruption when using the Cloud.