DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Community detection from a computational social science perspective
Data & Analytics Community detection from a computational social science perspective

This is the talk I gave at the Lipari Summer School on Computational Social Science, 2014. Which are the sociological strategies to detect communities in social media? How…

security
Documents security

Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas Management Information Systems, 9th ed. Boston, MA: McGraw-Hill, Inc., 2009 ISBN: 13…

Social Media Monitoring & Measurement for Marketing Intelligence
Education Social Media Monitoring & Measurement for Marketing Intelligence

Social media: why monitor? Why measure? How do I monitor & measure? This talk at the pseweb.ca conference in Toronto on July 29, 2014 talks about the hows and the whys,…

MOOCs, Automation, Artificial Intelligence and Pedagogical Agents
Education MOOCs, Automation, Artificial Intelligence and Pedagogical Agents

Open courses are a sociocultural phenomenon. This phenomenon represents symptoms, responses, and failures facing Higher Education. In this talk, I examined open courses and…

The Networked Academic
Education The Networked Academic

Condensed version of the "Networked Academic" slideshow to be presented at the 2013 National Communication Association's annual convention in Washington, D.C.

AITD 2014
Education AITD 2014

Keynote: Work is Learning & Learning is the Work. Presented to the Australian Institute of Training & Development, Sydney, NSW, May 2014

IT
Documents IT

Internet Technologies BSCIT SEM VI www.bscit.org INTERNET TECHNOLOGIES (IT) Page 1 Internet Technologies BSCIT SEM VI www.bscit.org Chapter 1 1.1 a b c d e f 2 2.1 2.2 a…

Km masterclass part1 knowledge&km ha20140530sls
Leadership & Management Km masterclass part1 knowledge&km ha20140530sls

The Masterclass Knowledge Management (KM) is a set of six presentations describing and explaining KM via definitions, concepts, instruments and many practical examples, insights,…

IMchap13
Documents IMchap13

13 Security and Ethical Challenges I. CHAPTER OVERVIEW This chapter discusses the threats against, and defenses needed for the performance and security of business information…