Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives
IGI Global Snippet, Jan 1, 2009 - Computers - 389 pages
The e-businesses of today are adopting pervasive computing with fervor but at the same time becoming increasingly aware of the many risks involved in it. Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives examines the implications of pervasive computing from varying crucial perspectives so that current and future e-business managers can make responsible decisions about where, when, and how to use this technology. Containing 19 chapters from an international pool of leading experts and field practitioners, this unmatched resource will enhance the awareness of emerging and global issues in e-business risk management.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Section I Foundation Technology and Infrastructure of Pervasive Computing
26 other sections not shown
activities ambient intelligence applications Australian authentication automation aviation behaviour biometrical identification Biosensors bioterrorism Bluetooth business models business processes challenges chapter communication computing technologies Conference context culture customers decision e-business e-commerce e-Government electronic embedded Enterprise Architecture ethical evaluation example factors framework future global Government Grid computing human IEEE impact implementation infrastructure innovation integrated interaction interface International Internet issues Journal knowledge sharing learners learning management systems m-learning ment mobile devices mobile grid monitoring nodes operations organisation password pervasive computing pervasive computing environment pervasive devices pervasive m-learning pervasive technologies potential protection protocols Retrieved RFID risk sensor networks smart smart environments SMEs social society strategies Suburban University supply chain tion ubiquitous computing value chain video games virtual WebCT Wi-Fi wireless networks wireless sensor networks women