close
1.

電子ブック

EB
Roger Dube, Roger R. Dube
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
The Elements of Computer Security / 1:
Cryptography Approaches and Attacks / 2:
Key Generation and Distribution Approaches and Attacks / 3:
The Qualities of Workable Security Solutions / 4:
Secure Coprocessors / 5:
Secure bootstrap Loading / 6:
Secure Memory Management and Trusted Execution Technology / 7:
The Trusted Platform Module / 8:
Field-Programmable Gate Arrays / 9:
Hardware-Based Authentication / 10:
A Closer Look At Biometrics / 11:
Tokens: Something You Have / 12:
Location Technologies / 13:
Putting It All Together / 14:
Glossary
Index
The Elements of Computer Security / 1:
Cryptography Approaches and Attacks / 2:
Key Generation and Distribution Approaches and Attacks / 3:
2.

電子ブック

EB
Rebecca S. Busch
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2008
所蔵情報: loading…
目次情報: 続きを見る
Preface
About the Author
Acknowledgments
Introduction
Market Background / Chapter 1:
E-Health
How is Electronic Information Created?Information Technology Considerations
How is Health Information Created?Review of Primary HCC Market Players
Patients
Providers
Third Party Vendors
Payers
Review of HCC Secondary Market Players
Major Initiative for E-Health
Audit Implication Overview
Industry Application / Chapter 2:
Public Uses
Private Uses
Information Continuum
Market Standards and Initiatives
Agency for Healthcare Research and Quality
Health Level Seven
Certification Commission for Healthcare Information Technology
Department of Defense Records Management Program
Association of Records Managers and Administrators
Impact of E-Health on Case Management / Chapter 3:
Financial Picture
Hospital-Based FCM Application
Background Information and Provider Perspective
Problem: Getting Paid Correctly for Services Provided
Findings
Additional Findings
Summary
Consumer-Based FCM Application
Market Problems: The Industry as It Operates Today
Consumer FCM Model
Healthcare Portfolio Application
Virtual Case Management
VCM Payer Model
VCM Patient Model
VCM Hospital Model
VCM Physician Model
VCM Allied Health Services
VCM Nontraditional Health Services Model
VCM Other Business Services Model
Data in an E-Health Environment / Chapter 4:
Data Library
Data Intelligence
New Data
More New Data
Processed Data
Data Warehouse
Algorithms / Chapter 5:
Background
Understanding Algorithms
Data Elements
Case Study
Algorithm SelectionAuditor Implication Overview
Data-Driven Health Decisions in an E-Health Environment / Chapter 6:
Knowledge Models
Primary Healthcare Continuum
Secondary Healthcare Continuum
Third-Party Vendor Knowledge Model
Knowledge Models For White-Collar and Organized Crime
Sample Identity Theft Case
Medical Identity Theft
Medical Identity Theft - Definition
How Medical Identity Theft Occurs
Damages To Primary Victims
Medical Identity Theft From A Consumer Perspective
When The Consumer Is Not Aware
When The Consumer Is Involved
When An Individual Wants Products Or Services
Damages To Secondary Victims
Medical Identity Theft From An Entity's Perspective
Auditor Considerations
Sample Fraud Case
Sample Pharmaceutical Fraud Case
Examples Of Worldwide Activity
Analytic Tools and Audit Checklists / Chapter 7:
E-Health And Healthcare Business Processes
Patient Business Process
Financial Case Management Advocacy / Problem #1:
Clinical Case Management Advocacy / Problem #2:
Provider Business Process
Lack Of Electronic Internal Controls
Lack Of Internal Controls With User Identity
Lack Of Internal Controls For Services Provided And Charged / Problem #3:
Payer Business Process
Use And Loss Of Health Information - Handling Subcontracted Vendors
Lack Of Insurance - Processing Fraudulent Claims For Enrolled Beneficiaries
Plan Sponsor Business Process
Employee Working Environments
Employer Increase In Healthcare Expenditures
Third-Party Vendor Business Process
Problem Increase In Pharmaceutic
Preface
About the Author
Acknowledgments
3.

電子ブック

EB
Susan Conway, Mara E. Conway, Susan D. Conway
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
4.

電子ブック

EB
Jon D. Harrop, Jonathan D. Harrop
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Program Structure / 2:
Data Structures / 3:
Numerical Analysis / 4:
Input and Output / 5:
Simple Examples / 6:
Visualization / 7:
Optimization / 8:
Libraries / 9:
Databases / 10:
Interoperability / 11:
Complete Examples / 12:
Bibliography
Introduction / 1:
Program Structure / 2:
Data Structures / 3:
5.

電子ブック

EB
Simon R. Saunders (ed), Stuart Carlaw, Simon R. Saunders
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2009
所蔵情報: loading…
目次情報: 続きを見る
About the Authors
Foreword
Preface
Acknowledgements
List of Abbreviations
List of Figures and Tables
Introduction to Femtocells / Simon Saunders1:
Introduction / 1.1:
Why Femtocells? The Market Context / 1.2:
The Nature of Mobile Broadband Demand / 1.3:
What is a Femtocell? / 1.4:
Applications for Femtocells / 1.5:
What a Femtocell is not / 1.6:
The Importance of Zero-Touch / 1.7:
User Benefits / 1.8:
Operator Motivations and Economic Impact / 1.9:
Operator Responses / 1.10:
Challenges / 1.11:
Chapter Overview / 1.12:
Small Cell Background and Success Factors / 2:
Small Cell Motivations / 2.1:
Other Small-Cell Systems / 2.3:
The Small-Cell Landscape / 2.4:
Emergence of the Femtocell Critical Success Factors / 2.5:
Conclusions / 2.6:
Market Issues for Femtocells / Stuart Carlaw3:
Key Benefits of a Femtocell from Market Perspective / 3.1:
Key Primers / 3.2:
Key Market Challenges / 3.3:
Business Cases for Femtocells / 3.4:
Air Interface Choices / 3.5:
Product Feature Sets / 3.6:
Additional Considerations / 3.7:
Adoption Forecasts and Volumes / 3.8:
Radio Issues for Femtocells / 3.9:
Spectrum Scenarios / 4.1:
Propagation in Femtocell Environments / 4.3:
Coverage / 4.4:
Downlink Interference / 4.5:
Interference Challenges and Mitigations / 4.6:
Femtocell-to-Femtocell Interference / 4.7:
System-Level Performance / 4.8:
RF Specifications in WCDMA / 4.9:
Health and Safety Concerns / 4.10:
Femtocell Networks and Architectures / Andrea Giustina4.11:
Requirements / 5.1:
Femto Architectures and Interfaces / 5.4:
Key Architectural Choices / 5.5:
Other Important Femto Solution Aspects / 5.6:
UMTS Femtos / 5.7:
CDMA / 5.8:
WiMAX / 5.9:
GSM / 5.10:
LTE / 5.11:
Femtocell Management / Ravi Raj Bhat ; V. Srinivasa Rao5.12:
Femtocell FCAPS Requirements / 6.1:
Broadband Forum Auto-Configuration Architecture and Framework / 6.3:
Auto-Configuration Data Organisation / 6.4:
CPE WAN Management Protocol Overview / 6.5:
FAP Service Data Model / 6.6:
DOCSIS OSS Architecture and Framework / 6.7:
Femtocell Security / Rasa Siegberg6.8:
Why is Security Important? / 7.1:
The Threat Model / 7.2:
Countering the Threats / 7.3:
Femtocell Standards and Industry Groups / 7.4:
The Importance of Standards / 8.1:
WCDMA / 8.2:
TD-SCDMA / 8.4:
Mobile WiMAX / 8.5:
The Femto Forum / 8.8:
The Broadband Forum / 8.9:
GSMA / 8.10:
Femtocell Regulation / 8.11:
Regulatory Benefits of Femtocells / 9.1:
Spectrum Efficiency / 9.3:
Economic Efficiency / 9.4:
Enabling Competition / 9.5:
Broadening Access to Services / 9.6:
Enabling Innovation / 9.7:
Environmental Goals / 9.8:
Spectrum Licensing Issues / 9.9:
Location / 9.10:
Authentication / 9.11:
Emergency Calls / 9.12:
Lawful Interception and Local IP Access / 9.13:
Backhaul Challenges / 9.14:
Mobile Termination Rates / 9.15:
Competition Concerns / 9.16:
Equipment Approvals / 9.17:
Examples of Femtocell Regulations / 9.18:
Femtocell Implementation Considerations / 9.19:
Signal Processing / 10.1:
Frequency and Timing Control / 10.3:
Protocol Implementation / 10.5:
RF Implementation / 10.6:
System Design and Cost / 10.7:
Mobile Device Challenges and Opportunities / 10.8:
Business and Service Options for Femtocells / 10.9:
Ways of being a Femtocell Operator / 11.1:
Femtocells for Fixed-Line Operators / 11.3:
Types of Femtocell Service / 11.4:
Service Examples / 11.5:
Service Enablers / 11.6:
Stages of Femtocell Service Introduction / 11.7:
Summary: The Status and Future of Femtocells / 11.8:
Summary / 12.1:
Potential Future Femtocell Landscape / 12.2:
Concluding Remarks / 12.3:
References
Further Reading
Appendix
Abbreviations
List of Figures
List of Tables
The Importance of 'Zero-Touch'
Emergence of the Femtocell - Critical Success Factors
Appendix: A Brief Guide to Units and Spectrum / 6:
Index
About the Authors
Foreword
Preface
6.

電子ブック

EB
Shayne Fletcher, C. Gardner, Christopher Gardner
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2009
所蔵情報: loading…
目次情報: 続きを見る
Welcome to Python / 1:
Why Python? / 1.1:
Python is a general-purpose high-level programming language / 1.1.1:
Python integrates well with data analysis, visualisation and GUI toolkits / 1.1.2:
Python 'plays well with others' / 1.1.3:
Common misconceptions about Python / 1.2:
Roadmap for this book / 1.3:
The PPF Package / 2:
PPF topology / 2.1:
Unit testing / 2.2:
doctest / 2.2.1:
PyUnit / 2.2.2:
Building and installing PPF / 2.3:
Prerequisites and dependencies / 2.3.1:
Building the C++ extension modules / 2.3.2:
Installing the PPF package / 2.3.3:
Testing a PPF installation / 2.3.4:
Extending Python from C++ / 3:
Boost.Date_Time types / 3.1:
Examples / 3.1.1:
Boost.MultiArray and special functions / 3.2:
NumPy arrays / 3.3:
Accessing array data in C++ / 3.3.1:
Basic Mathematical Tools / 3.3.2:
Random number generation / 4.1:
N(.) / 4.2:
Interpolation / 4.3:
Linear interpolation / 4.3.1:
Loglinear interpolation / 4.3.2:
Linear on zero interpolation / 4.3.3:
Cubic spline interpolation / 4.3.4:
Root finding / 4.4:
Bisection method / 4.4.1:
Newton-Raphson method / 4.4.2:
Linear algebra / 4.5:
Matrix multiplication / 4.5.1:
Matrix inversion / 4.5.2:
Matrix pseudo-inverse / 4.5.3:
Solving linear systems / 4.5.4:
Solving tridiagonal systems / 4.5.5:
Solving upper diagonal systems / 4.5.6:
Singular value decomposition / 4.5.7:
Generalised linear least squares / 4.6:
Quadratic and cubic roots / 4.7:
Integration / 4.8:
Piecewise constant polynomial fitting / 4.8.1:
Piecewise polynomial integration / 4.8.2:
Semi-analytic conditional expectations / 4.8.3:
Market: Curves and Surfaces / 5:
Curves / 5.1:
Surfaces / 5.2:
Environment / 5.3:
Data Model / 6:
Observables / 6.1:
LIBOR / 6.1.1:
Swap rate / 6.1.2:
Flows / 6.2:
Adjuvants / 6.3:
Legs / 6.4:
Exercises / 6.5:
Trades / 6.6:
Trade utilities / 6.7:
Timeline: Events and Controller / 7:
Events / 7.1:
Timeline / 7.2:
Controller / 7.3:
The Hull-White Model / 8:
A component-based design / 8.1:
Requestor / 8.1.1:
State / 8.1.2:
Filler / 8.1.3:
Rollback / 8.1.4:
Evolve / 8.1.5:
Exercise / 8.1.6:
The model and model factories / 8.2:
Concluding remarks / 8.3:
Pricing using Numerical Methods / 9:
A lattice pricing framework / 9.1:
A Monte-Carlo pricing framework / 9.2:
Pricing non-callable trades / 9.2.1:
Pricing callable trades / 9.2.2:
Pricing Financial Structures in Hull-White / 9.3:
Pricing a Bermudan / 10.1:
Pricing a TARN / 10.2:
Hybrid Python/C++ Pricing Systems / 10.3:
nth_imm_of_year revisited / 11.1:
Exercising nth_imm_of_year from C++ / 11.2:
Python Excel Integration / 12:
Black-scholes COM server / 12.1:
VBS client / 12.1.1:
VBA client / 12.1.2:
Numerical pricing with PPF in Excel / 12.2:
Common utilities / 12.2.1:
Market server / 12.2.2:
Trade server / 12.2.3:
Pricer server / 12.2.4:
Appendices
Python / A:
Python interpreter modes / A.1:
Interactive mode / A.1.1:
Batch mode / A.1.2:
Basic Python / A.2:
Simple expressions / A.2.1:
Built-in data types / A.2.2:
Control flow statements / A.2.3:
Functions / A.2.4:
Classes / A.2.5:
Modules and packages / A.2.6:
Conclusion / A.3:
Boost.Python / B:
Hello world / B.1:
Classes, constructors and methods / B.2:
Inheritance / B.3:
Python operators / B.4:
Enums / B.5:
Embedding / B.7:
Hull-White Model Mathematics / B.8:
Pickup Value Regression / D:
Bibliography
Index
Welcome to Python / 1:
Why Python? / 1.1:
Python is a general-purpose high-level programming language / 1.1.1:
7.

電子ブック

EB
Jorg; Vogel, Hans-Joerg; Bettstetter, Christian; Vgel, Hans-Joerg ; Ebersp? Cher, J? Rg ; V? Gel, Hans-Joerg Eberspacher, Christian Bettstetter, Jorg Eberspacher, J? Ebersp?�Nacher, J?�Norg Ebersp?�Nacher, J?rg Ebersp?cher, J?org Ebersp?acher, J?org Ebersp?acher, J? Rg Ebersp? Cher, Christian Hartmann, Hans-Joerg V? Gel, Hans-Joerg V?gel
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2009
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
The idea of unbounded communication / 1.1:
The success of GSM / 1.2:
Classification of mobile communication systems / 1.3:
Some history and statistics of GSM / 1.4:
Overview of the book / 1.5:
The mobile radio channel and the cellular principle / 2:
Characteristics of the mobile radio channel / 2.1:
Separation of directions and duplex transmission / 2.2:
Frequency Division Duplex / 2.2.1:
Time Division Duplex / 2.2.2:
Multiple access / 2.3:
Frequency Division Multiple Access / 2.3.1:
Time Division Multiple Access / 2.3.2:
Code Division Multiple Access / 2.3.3:
Space Division Multiple Access / 2.3.4:
Cellular principle / 2.4:
Definitions / 2.4.1:
Carrier-to-interference ratio / 2.4.2:
Formation of clusters / 2.4.3:
Traffic capacity and traffic engineering / 2.4.4:
Sectorization of cells / 2.4.5:
Spatial filtering for interference reduction (SFIR) / 2.4.6:
System architecture and addressing / 3:
System architecture / 3.1:
The SIM concept / 3.2:
Addressing / 3.3:
International mobile station equipment identity / 3.3.1:
International mobile subscriber identity / 3.3.2:
Mobile subscriber ISDN number / 3.3.3:
Mobile station roaming number / 3.3.4:
Location area identity / 3.3.5:
Temporary mobile subscriber identity / 3.3.6:
Other identifiers / 3.3.7:
Registers and subscriber data / 3.4:
Location registers (HLR and VLR) / 3.4.1:
Security-related registers (AUC and EIR) / 3.4.2:
Subscriber data / 3.4.3:
Network interfaces and configurations / 3.5:
Interfaces / 3.5.1:
Configurations / 3.5.2:
Air interface - physical layer / 4:
Logical channels / 4.1:
Traffic channels / 4.1.1:
Signaling channels / 4.1.2:
Example: connection setup for incoming call / 4.1.3:
Bit rates, block lengths and block distances / 4.1.4:
Combinations of logical channels / 4.1.5:
Physical channels / 4.2:
Modulation / 4.2.1:
Multiple access, duplexing and bursts / 4.2.2:
Optional frequency hopping / 4.2.3:
Summary / 4.2.4:
Synchronization / 4.3:
Frequency and clock synchronization / 4.3.1:
Adaptive frame synchronization / 4.3.2:
Mapping of logical onto physical channels / 4.4:
26-frame multiframe / 4.4.1:
51-frame multiframe / 4.4.2:
Radio subsystem link control / 4.5:
Channel measurement / 4.5.1:
Transmission power control / 4.5.2:
Disconnection due to radio channel failure / 4.5.3:
Cell selection and operation in power conservation mode / 4.5.4:
Channel coding, source coding and speech processing / 4.6:
Source coding and speech processing / 4.7:
Channel coding / 4.8:
External error protection: block coding / 4.8.1:
Internal error protection: convolutional coding / 4.8.2:
Interleaving / 4.8.3:
Mapping onto the burst plane / 4.8.4:
Improved codecs for speech services: half-rate codec, enhanced full-rate codec and adaptive multi-rate codec / 4.8.5:
Power-up scenario / 4.9:
Protocols / 5:
Protocol architecture planes / 5.1:
Protocol architecture of the user plane / 5.2:
Speech transmission / 5.2.1:
Transparent data transmission / 5.2.2:
Nontransparent data transmission / 5.2.3:
Protocol architecture of the signaling plane / 5.3:
Overview of the signaling architecture / 5.3.1:
Transport of user data in the signaling plane / 5.3.2:
Signaling at the air interface (Um) / 5.4:
Layer 1 of the MS-BTS interface / 5.4.1:
Layer 2 signaling / 5.4.2:
Radio resource management / 5.4.3:
Mobility management / 5.4.4:
Connection management / 5.4.5:
Structured signaling procedures / 5.4.6:
Signaling procedures for supplementary services / 5.4.7:
Realization of SMS / 5.4.8:
Signaling at the A and Abis interfaces / 5.5:
Security-related network functions: authentication and encryption / 5.6:
Protection of subscriber identity / 5.6.1:
Verification of subscriber identity / 5.6.2:
Generating security data / 5.6.3:
Encryption of signaling and payload data / 5.6.4:
Signaling at the user interface / 5.7:
Roaming and handover / 6:
Mobile application part interfaces / 6.1:
Location registration and location update / 6.2:
Connection establishment and termination / 6.3:
Routing calls to MSs / 6.3.1:
Call establishment and corresponding MAP procedures / 6.3.2:
Call termination / 6.3.3:
MAP procedures and routing for short messages / 6.3.4:
Handover / 6.4:
Overview / 6.4.1:
Intra-MSC handover / 6.4.2:
Decision algorithm for handover timing / 6.4.3:
MAP and inter-MSC handover / 6.4.4:
Services / 7:
Classical GSM services / 7.1:
Teleservices / 7.1.1:
Popular GSM services: SMS and MMS / 7.2:
SMS / 7.2.1:
EMS / 7.2.2:
MMS / 7.2.3:
Overview of GSM services in Phase 2+ / 7.3:
Bearer and teleservices of GSM Phase 2+ / 7.4:
Advanced speech call items / 7.4.1:
New data services and higher data rates: HSCSD, GPRS and EDGE / 7.4.2:
Supplementary services in GSM Phase 2+ / 7.5:
Supplementary services for speech / 7.5.1:
Location service / 7.5.2:
Service platforms / 7.6:
Camel: GSM and INs / 7.6.1:
Service platforms on the terminal side / 7.6.2:
Wireless application protocol / 7.7:
Wireless markup language / 7.7.1:
Protocol architecture / 7.7.2:
Services and applications / 7.7.3:
Improved data services in GSM: GPRS, HSCSD and EDGE / 8:
GPRS / 8.1:
System architecture of GPRS / 8.1.1:
Session management, mobility management and routing / 8.1.2:
Signaling plane / 8.1.4:
Interworking with IP networks / 8.1.6:
Air interface / 8.1.7:
Authentication and ciphering / 8.1.8:
Summary of GPRS / 8.1.9:
HSCSD / 8.2:
Architecture / 8.2.1:
HSCSD resource allocation and capacity issues / 8.2.2:
EDGE / 8.3:
The EDGE concept / 8.3.1:
EDGE physical layer, modulation and coding / 8.3.2:
EDGE: effects on the GSM system architecture / 8.3.3:
ECSD and EGPRS / 8.3.4:
EDGE Classic and EDGE Compact / 8.3.5:
Beyond GSM and UMTS: 4G / 9:
Appendices
Data communication and networking / A:
Reference configuration / A.1:
Overview of data communication / A.2:
Service selection at transitions between networks / A.3:
Bit rate adaptation / A.4:
Asynchronous data services / A.5:
Transparent transmission in the mobile network / A.5.1:
PAD access to public packet-switched data networks / A.5.2:
Synchronous data services / A.6:
Synchronous X.25 packet data network access / A.6.1:
Teleservices: fax / A.7:
Aspects of network operation / B:
Objectives of GSM NM / B.1:
Telecommunication management network / B.2:
TMN realization in GSM networks / B.3:
GSM Addresses / C:
List of Acronyms / D:
References
Index
Preface
Introduction / 1:
The idea of unbounded communication / 1.1:
8.

電子ブック

EB
Zach Shelby, Carsten Bormann, Geoff Mulligan
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2009
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
The Wireless Embedded Internet / 1.1:
The 6LoWPAN Architecture / 1.2:
6LoWPAN Introduction / 1.3:
Network Example / 1.4:
The 6LoWPAN Format / 2:
Functions of an Adaptation Layer / 2.1:
Assumptions About the Link Layer / 2.2:
The Basic 6LoWPAN Format / 2.3:
Addressing / 2.4:
Forwarding and Routing / 2.5:
Header Compression / 2.6:
Fragmentation and Reassembly / 2.7:
Multicast / 2.8:
Bootstrapping and Security / 3:
Commissioning / 3.1:
Neighbor Discovery / 3.2:
Security / 3.3:
Mobility and Routing / 4:
Mobility / 4.1:
Routing / 4.2:
IPv4 Interconnectivity / 4.3:
Application Protocols / 5:
Design Issues / 5.1:
Protocol Paradigms / 5.3:
Common Protocols / 5.4:
Using 6LoWPAN / 6:
Chip Solutions / 6.1:
Protocol Stacks / 6.2:
Application Development / 6.3:
Edge Router Integration / 6.4:
System Examples / 7:
ISA100 Industrial Automation / 7.1:
Wireless RFID Infrastructure / 7.2:
Building Energy Savings and Management / 7.3:
Conclusion / 8:
IPv6 Reference / A:
Notation / A.1:
IPv6 Neighbor Discovery / A.2:
IPv6 Stateless Address Autoconfiguration / A.4:
IEEE 802.15.4 Reference / B:
Overall Packet Format / B.1:
MAC-layer Security / B.3:
Glossary
Bibliography
Preface
Introduction / 1:
The Wireless Embedded Internet / 1.1:
9.

電子ブック

EB
Olsen, Vincent F. Hendricks, Jan-Kyrre Berg Olsen, Stig Andur Pedersen, Jan Kyrre Berg;Pedersen, Stig Andur;Hendricks,Vincent F. Olsen
出版情報: Wiley Online Library - AutoHoldings Books , Wiley-Blackwell, 2009
所蔵情報: loading…
目次情報: 続きを見る
Notes on Contributors
Introduction
History of Technology / Part I:
Definitions of Technology / Thomas J. Misa ; Richard Li-Hua1:
Western Technology / Keld Nielsen3:
Chinese Technology / Francesca Bray4:
Islamic Technology / Thomas F. Glick5:
Japanese Technology / David Wittner6:
Technology and War / Bart Hacker7:
Technology and Science / Part II:
Science and Technology: Positivism and Critique / Don Ihde ; Hans Radder8:
Engineering Science / Louis L. Bucciarelli10:
Technological Knowledge / Anthonie W. M. Meijers ; Marc J. de Vries11:
The Interplay between Science and Technology / Bart Gremmen12:
Instruments in Science and Technology / Mieke Boon13:
Social Construction of Science / Harry Collins14:
Social Construction of Technology / Wiebe E. Bijker15:
Theory Change and Instrumentation / Joseph C. Pitt16:
Biology and Technology / Keekok Lee17:
Nuclear Technologies / William J. Nuttall18:
Engineering Design / Peter Kroes19:
Cybernetics / Andrew Pickering20:
Chemistry and Technology / Helge S. Kragh21:
Technology and Philosophy / Part III:
Introduction: Philosophy and Technology / Val Dusek22:
Semiotics of Technology / Robert E. Innis23:
Critical Theory of Technology / Andrew Feenberg24:
Cyborgs / Evan Selinger25:
Simulation / 26:
Technology as "Applied Science" / Robert C. Scharff27:
Technological Artifacts / Peter-Paul Verbeek ; Pieter E. Vermaas28:
Technical Practice / 29:
Technological Pragmatism / Larry Hickman30:
Hermeneutics and Technologies / 31:
Analytic Philosophy of Technology / Maarten Franssen32:
Technological Rationality / Lorenzo C. Simpson33:
Phenomenology and Technology / Iain Thomson34:
Expertise / 35:
Imaging Technologies / 36:
The Critique of the Precautionary Principle and the Possibility for an "Enlightened Doomsaying" / Jean-Pierre Dupuy37:
Technology and Metaphysics / 38:
Large Technical Systems / Erik van der Vleuten39:
Sociotechnical Systems / 40:
Information Technology / Luciano Floridi41:
Technology and Environment / Part IV:
The Precautionary Principle / Mary Tiles ; Andy Stirling42:
Boundary-work, Pluralism and the Environment / Jozef Keulartz44:
Global Warming / Sir John Houghton45:
The Reinvention of CO2 as Refrigerant for Both Heating and Cooling / Jan Hurlen46:
Environmental Science and Technology / 47:
Agriculture and Technology / John R. Porter ; Jesper Rasmussen48:
The Built Environment / Christian Illies49:
Technology and Politics / Part V:
The Idea of Progress / Daniel Sarewitz50:
Technology and Power / 52:
Technology and Culture / Lucien Scubla53:
Technology Management / 54:
Technology Strategy / 55:
Technology and Globalization / David M. Kaplan56:
Technology Transfer / 57:
Technology and Capitalism / 58:
The Politics of Gender and Technology / Elisabeth K. Kelan59:
European Politics, Economy and Technology / Erik Jones60:
Asian Politics, Economy and Technology / 61:
US Politics, Economy and Technology / David M. Hart62:
Energy, Technology and Geopolitics / John R. Fanchi63:
Technology and Ethics / Part VI:
Technology and Ethics: Overview / Carl Mitcham ; Katinka Waelbers64:
Agriculture Ethics / 65:
Architecture Ethics / Warwick A. Fox66:
Biomedical Engineering Ethics / Philip Brey67:
Bioethics / Paul B. Thomson68:
Biotechnology: Plants and Animals / 69:
Computer Ethics / 70:
Consumerism / Edward J. Woodhouse71:
Development Ethics / Thomas Kesselring72:
Energy Ethics / Kirsten Halsnæs73:
Engineering Ethics / Christelle Didier74:
Environmental Ethics / Thomas Søbirk Petersen75:
Food Ethics / 76:
Future Generations / Jesper Ryberg77:
Genethics / Nils Holtug78:
Technology and the Law / Richard Susskind79:
Media Ethics / Deni Elliott80:
Medical Ethics / Søren Holm81:
Nanoethics / John Weckert82:
Nuclear Ethics / Koos van der Bruggen83:
Religion and Technology / 84:
Technology and Personal Moral Responsibility / 85:
Value-sensitive Design / Jeroen van der Hoven ; Noemi Manders-Huits86:
Technology and the Future / Part VII:
Technology, Prosperity and Risk / Sven Ove Hansson87:
World Risk Society / Ulrich Beck88:
Risk Analysis / 89:
Prosperity and the Future of Technology / William Sims Bainbridge90:
Converging Technologies / 91:
Nanotechnology / Alfred Nordmann92:
Energy Forecast Technologies / 93:
Biotechnology / Jennifer Kuzma94:
Transportation / Jonathan L. Gifford95:
Global Challenges / 96:
Chemicals / Bruce E. Johansen97:
The Future of Humanity / Nick Bostrom98:
Index
Table of Contents
Introduction [to follow]
Technology as "Applied Science" / Thomas Misa ; Francesca Brey ; Louis L. Bucciarelli, MIT ; Marc J. de Vrie ; Bill Nuttall
The critique of the Precautionary Principle and the Possibility for an "Enlightened Doomsaying"
Jean-Pierre Dupuy, École Polytechnique
Boundary-Work, Pluralism and the Environment
Global Warming Sir John Houghton, Hadley Centre for Climate Prediction and Research
The Reinvention of CO2 as Refrigerant for both Heating and Cooling
European Politics, Economy, and Technology / John R. Porter, KVL ; Jesper Rasmussen, KVL ; Elizabeth K. Kelan
Asian Politics, Economy, and Technology
U.S. Politics, Economy, and Technology
Biomedical Engineering / Warwick Fox ; Ethics Philip Brey
Nuclear ethics Koos / Kirsten Halsnaes ; Thomas Søbirk Peterson ; Søren Holm ; van der Bruggen
Value-Sensitive Design Jeroen van der Hoven and Noëmi Manders-Huits both Delft University of Technology
Technology and Future
Technology, Prosperity and Risk Sven / Ove Hansson
Risk Analysis Sven
The critique of the Precautionary Principle and the Possibility for an "Enlightened Doomsaying" / Bruce E. Johnson ; Thomas Misa, University of Minnesota ; Newcastle Business School ; Keld Nielsen, University of Aarhus ; Francesca Brey, University of Edinburgh ; Thomas F. Glick, Boston University ; David Wittner, Utica College ; Bart Hacker, National Museum of American History ; Don Ihde, Stony Brook University ; Hans Radder, University Amsterdam ; Anthonie W. M. Meijers, University of Technology ; Marc J. de Vrie, Eindhoven University of Technology ; Bart Gremmen, Wageningen University ; Mieke Boon, University of Twente ; Harry Collins, Cardiff University ; Wiebe E. Bijker, Maastricht University ; Joseph C. Pitt, Virginia Tech ; Bill Nuttall, Cambridge University ; Peter Kroes, University of Technology ; Andrew Pickering, University of Exeter ; Helge S. Kragh, University of Aarhus ; Val Dusek, University of New Hampshire ; Robert E. Innis, University of Massachusetts Lowell ; Andrew Feenberg, Simon Fraser University ; Evan Selinger, Rochester Institute of Technology ; Robert C. Scharff, University of New Hampshire ; Peter-Paul Verbeek, University of Twente ; Pieter E. Vermaas, Delft University of Technology ; Larry Hickman, Southern Illinois University Carbondale ; Maarten Franssen, Delft University of Technology ; Lorenzo C. Simpson, State University of New York ; Iain Thomson, University of New Mexico ; Evan Selinger , Rochester Institute of Technology ; Jean-Pierre Dupuy, École Polytechnique
Global Warming Sir / Erik van der Vleuten, Eindhoven University of Technology ; Luciano Floridi, University of Oxford ; Mary Tiles, University of Hawaii ; Andy Stirling, University of Sussex ; Jozef Keulartz, Radboud University Nijmegen ; John Houghton
Hadley Centre for Climate Prediction and Research
Environmental / Jan Hurlen, Shecco Technology ; Christian Illies, Technical University, Eindhoven ; Daniel Sarewitz, Arizona State University ; Lucien Scubla, Ecole polytechnique ; David M. Kaplan, University of North Texas ; Elizabeth K. Kelan, London Business School ; Erik Jones, Johns Hopkins University ; Keekok Lee, University of Manchester ; David M. Hart, George Mason University ; John R. Fanchi, Colorado School of Mines ; Warwick Fox, University of Central Lancashire ; Philip Brey, University of Twente ; Paul B. Thomson, University of New Mexico ; Edward J. Woodhouse, Rensselaer Polytechnic Institute ; Thomas Kesselring, Institut Sekundarstufe ; Kirsten Halsnaes, UNEP Risø Centre ; Christelle Didier, Catholic University of Lille ; Ethics Thomas Søbirk Peterson, University of Roskilde
Value-Sensitive Design Jeroen / Jesper Ryberg, University of Roskilde ; Nils Holtug, University of Copenhagen ; Richard Susskind, Gresham College ; Deni Elliott, University of South Florida ; Søren Holm, Cardiff University ; John Weckert, Charles Stuart University ; van der Bruggen, Leiden University ; Carl Mitcham, Colorado School of Mines ; van der Hoven ; Noëmi Manders-Huits both Delft University of Technology
Notes on Contributors
Introduction
History of Technology / Part I:
10.

電子ブック

EB
Patrick Gray
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Incorporated, 2007
所蔵情報: loading…
目次情報: 続きを見る
Preface
Hell Freezes Over: IT Becomes a Key Component of Your Organizational Strategy / 1:
Why Do You Need Breakthrough IT?
The Triple Threat
Hell Freezes Over: IT Enables Strategy
Up Periscope! Ending the Focus on Continuing Operations / 2:
A Brief History of IT
Shifting the Focus: Moving IT from Service Provider to Strategic Asset
Calling Sherlock Holmes: Finding Continuing Operations
Changing the Source: What to Do with Continuing Operations
ET Phone Home: Stop Talking IT and Start Talking Strategy / 3:
Free at Last
Separating Process from Technology
Where the Rubber Meets the Road: Partnering with the CEO
Talking the Talk
C-Suite Conversations: Greg Buoncontri, CIO of Pitney Bowes
Clear the Benches: Take Your IT Shop from Dysfunction to Dynamo / 4:
Hiring (and Firing) the Right People
Continually Improving the Skills of Your People
Meaningfully Evaluating Your People
Milking the Cow: Turn Your IT Project Portfolio into a Cash Cow / 5:
Developing a Project Investment Mix
The PASRBRTKO: Project Analyzing, Selecting, Risk-assessing, Budgeting, Returns Tracking, and Killing Office
What the PMO Is Not
Show Me the Money: Controlling a Project by the Numbers / 6:
The Right Stuff: Determining What to Measure
Managing to the Metrics
Beyond the Numbers: The "Gut Check"
Delivering the Goods
Pushing Water Uphill: Driving Organizational Change from the C-Suite / 7:
What Is "Change Management?"
The Role of the CIO in Change Management
The Role of the CEO in Change Management
Change Management at the Line Level
Influencing Change 101
The End of Business as Usual
C-Suite Conversations: Bridget Reiss and Kathy Allen, CIO and CFO of Millipore Corporation
Cashing in the Chips: When to Cancel a Project / 8:
My Little Runaway
The Project Killers
Setting Failure Criteria
When the Going Gets Tough-Warning Signs
Broaching the Topic of Cancellation
Canceling Well
Closing Time
Be Superman (or Wonder Woman): Coming in Late to a Struggling Shop / 9:
Arriving on the Scene
Tackling the Project Portfolio
Turning the Wheel: Making the Leap to Breakthrough IT
C-Suite Conversations: Phil Stunt, Vice President, IT International, CA
Capitalizing on Success / 10:
Building Momentum
Beyond Breakthrough IT
The Future of the CIO Role
In Closing
Index
Preface
Hell Freezes Over: IT Becomes a Key Component of Your Organizational Strategy / 1:
Why Do You Need Breakthrough IT?
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼