To see the other types of publications on this topic, follow the link: SECURING INDUSTRIAL IOT.

Books on the topic 'SECURING INDUSTRIAL IOT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'SECURING INDUSTRIAL IOT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Karimipour, Hadis, and Farnaz Derakhshan, eds. AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76613-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Electronics, Maplin, ed. Home security projects: [a collection of useful design ideas for security devices around the home]. Oxford: Butterworth-Heinemann, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lobanov, Aleksey. Biomedical foundations of security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1007643.

Full text
Abstract:
The textbook discusses the threats and risks to life and health of people in post-industrial society. The role and place of medical and biological technologies in the system of ensuring the safety of the population of the Russian Federation are shown from the standpoint of an interdisciplinary approach. Briefly, but quite informative, the structure of the human body and the principles of its functioning are described. The specificity and mechanism of toxic effects on humans of harmful substances, energy effects and combined action of the main damaging factors of sources of emergency situations of peace and war are shown. The medical and biological aspects of ensuring the safety of human life in adverse environmental conditions, including in regions with hot and cold climates (Arctic) are considered. Means and methods of first aid to victims are shown. The questions of organization and carrying out of measures of medical support of the population in zones of emergency situations and the centers of defeat are covered. Designed for students, students and cadets of educational institutions of higher education, studying under the bachelor's program. It can also be useful for teachers, researchers and a wide range of professionals engaged in practical work on the planning and organization of biomedical protection of the population.
APA, Harvard, Vancouver, ISO, and other styles
4

Plaskova, Nataliya, and Natal'ya Prodanova. Economic analysis. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1069047.

Full text
Abstract:
The textbook reveals the theoretical foundations of economic analysis, modern methods and techniques of financial and managerial analysis of the activities of economic entities. The development of materials by students is necessary in their further practical activities, will contribute to improving the quality of analytical work in organizations of various industries and organizational and legal forms, and serve as a justification for the optimal strategy and tactics of doing business. It contains theoretical, methodological and practical questions of the basic academic discipline "Economic Analysis". Meets the requirements of the federal state educational standards of higher education of the latest generation. For bachelors studying in the fields of "Economics", "Management", "State and Municipal Management", "Economic Security".
APA, Harvard, Vancouver, ISO, and other styles
5

Gadzhiev, Nazirhan, Sergey Konovalenko, and Mihail Trofimov. Theoretical aspects of the formation and development of the ecological economy in Russia. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1836240.

Full text
Abstract:
The monograph is devoted to the place and role of ecology and environmental safety in ensuring sustainable socio-economic development of society. In the conditions of the forced transition of the economies of the leading countries of the world from an industrial type to a new formation of a green economy aimed at ensuring the preservation of ecological systems and the maximum reduction of damage to the biodiversity of ecological systems, the Russian Federation faces the task of forming a new course of socio-economic development of society focused on the preservation of natural potential and ecology at a level normal for the maintenance of the vital activity of society, flora and fauna in the foreseeable future and in the long term. The role and importance of environmental safety in the system of ensuring the economic security of the state are outlined, the concept of the ideology of "Global Commons" in ensuring sustainable socio-economic development of society is considered, the problems and prospects of the implementation of the program "Green Course of Russia" are analyzed, special aspects of environmental audit, accounting and control, damage assessment in the field of ecology are investigated. Special attention is paid to the forecast of the dynamics of key environmental indicators for the medium term. The main directions of increasing the effectiveness of the mechanism for ensuring environmental safety in a market economy are proposed. For a wide range of readers interested in environmental economics. It will be useful for students, postgraduates and teachers of economic universities.
APA, Harvard, Vancouver, ISO, and other styles
6

Butun, Ismail. Industrial IoT: Challenges, Design Principles, Applications, and Security. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Butun, Ismail. Industrial IoT: Challenges, Design Principles, Applications, and Security. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Le, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Le, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Le, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Le, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Le, Dac-Nhuong, Kanta Prasad Sharma, and Nitish Pathak. Emerging Artificial IoT Technologies: Security and Communication in Industrial Applications. Wiley & Sons, Incorporated, John, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Karimipour, Hadis, and Farnaz Derakhshan. AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Le, Dac-Nhuong, Kanta Prasad Sharma, and Nitish Pathak. Emerging Artificial IoT Technologies: Security and Communication in Industrial Applications. Wiley & Sons, Limited, John, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Karimipour, Hadis, and Farnaz Derakhshan. AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Le, Dac-Nhuong, Kanta Prasad Sharma, and Nitish Pathak. Emerging Artificial IoT Technologies: Security and Communication in Industrial Applications. Wiley & Sons, Incorporated, John, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Le, Dac-Nhuong, Kanta Prasad Sharma, and Nitish Pathak. Emerging Artificial IoT Technologies: Security and Communication in Industrial Applications. Wiley & Sons, Incorporated, John, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Iot. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Fulong, and Yonglong Luo. Industrial IoT Technologies and Applications: Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedings ... and Telecommunications Engineering). Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Abo shama, Abaas. Industrial safety and security. Naif University Press, 2021. http://dx.doi.org/10.26735/978-603-8235-83-6.

Full text
Abstract:
This study aimed to define the contemporary and renewable concept of industrial safety and security and areas of application, and to identify the general rules for industrial safety and industrial security in general, and the industrial hazards and work injuries in addition to the required protection and prevention in particular. Methodology: The study used the analytical method for the industrial security system. Findings: Industrial security should be viewed from a different angle than industrial safety, as to be viewed in a contemporary concept, whereas its rules differ from industrial safety rules. This is due to the fact that industrial security rules require that it should be viewed in its comprehensive sense in order to accommodate all the regulations and instructions pertinent to the four traditional fields which are: safety, firefighting, preserving environmental safety, and security. Recommendations: • To conduct training courses in competent institutions which modern industries can create in human life, and this should be related to the nature of each individual industry as the specific dangers are more related to the nature of industries. • The owners of industrial facilities, along with state control, should allocate more technical and material attention to protect workers in industrial facilities from the dangers of multiple industrial professions and to undertake full medical assistance to face these dangers. • Authorities in the areas of nuclear installations should provide adequate safeguards to secure the reactors from the causes of nuclear leak. This action should be performed under international control. • Multi-site industries should be grouped together in an industrial city away from residential areas, especially the nuclear industries. • Reliance should be on safe and environmentally friendly energy source technologies. • The industrial safety and security course should be incorporated in the curriculum at the appropriate educational stage and also in specialized technical studies.
APA, Harvard, Vancouver, ISO, and other styles
22

Securing IoT in Industry 4. 0 Applications with Blockchain. Auerbach Publishers, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Thirupathi, Devi, and P. Kaliraj. Securing IoT in Industry 4. 0 Applications with Blockchain. Auerbach Publishers, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Thirupathi, Devi, and P. Kaliraj. Securing IoT in Industry 4. 0 Applications with Blockchain. Auerbach Publishers, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kaliraj, P., and T. Devi. Securing Iot in Industry 4. 0 Applications with Blockchain. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications. CRC Press, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Saini, Hemraj, Om Prakash Singh, and Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Saini, Hemraj, Om Prakash Singh, and Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Saini, Hemraj, Om Prakash Singh, and Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Automation 2017. VDI Verlag, 2017. http://dx.doi.org/10.51202/9783181022931.

Full text
Abstract:
Kurzfassung Die vorausschauende Instandhaltung (engl. Predictive Maintenance) gewinnt für die produzierende Industrie weltweit an Bedeutung, da Produktionsmodernisierungen im Rahmen der Industrie 4.0 sowie die zunehmende Verwendung von heterogenen Sensoreinheiten die Instandhaltungsplanung immer komplexer gestalten. Darüber hinaus ist das ServiceKontingent, welches ein Maschinenbauer seinen Kunden im Bereich der Instandhaltung anbieten kann, durch die Ressource Mensch stark limitiert und nur ortsgebunden einsetzbar. Durch herkömmliche Instandhaltungsprozesse entstehen somit oft hohe Kosten, sowohl für den Maschinenbauer als auch für den Anwender. Die Themenbereiche, zu denen es jeweils reichlich Beiträge gibt: Assistenzsysteme Kommunikationsmodelle Systemtechnische Methoden AutomationML Simulation im Lebenszyklus Roboter Engineering Methoden zur Digitalisierung Virtuelle Inbetriebnahme Kommunikations- und Infrastruktur Safety & Security Digital Plant Process Industries
APA, Harvard, Vancouver, ISO, and other styles
31

Ganguly, Sumit. India’s National Security. Edited by David M. Malone, C. Raja Mohan, and Srinath Raghavan. Oxford University Press, 2010. http://dx.doi.org/10.1093/oxfordhb/9780198743538.013.11.

Full text
Abstract:
Foreign and defence policy overlap in most countries, and India is no exception. This chapter traces the origins of India’s national security policies and discusses key turning points. It argues that the first major shift in the country’s defence policies took place in the immediate aftermath of the 1962 Sino-Indian border war. In the wake of this conflict the country embarked upon a substantial program of military modernization. It also focuses on a series of extant threats that the country confronts, the policies and strategies that have been adopted to address them, and their limitations and prospects. The chapter also addresses the question of India’s military industrial base and its shortcomings. The final section focuses on the key challenges that confront the country and are likely to shape the course of its national security policies.
APA, Harvard, Vancouver, ISO, and other styles
32

Maplin and Staff Maplin. Home Security Projects (Maplin Series). Butterworth-Heinemann, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ussishkin, Daniel. The Techno-Politics of Consensus. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190469078.003.0006.

Full text
Abstract:
Chapter 5 explores the perceived relations between industrial morale and postwar social reconstruction, and the myriad efforts by the state and by civil organizations to promote new forms of morale management at the workplace. It begins by exploring these trajectories as they formed in the aftermath of the First World War and traces the ways in which in the aftermath of the Second World War, perceived legacies of the war were now mobilized toward securing the politics of reconstruction. Morale was now recognized as the goal of proper industrial management, and it linked a disciplinary technology on the shop-floor to the manufacture of social forms of citizenship outside the factory.
APA, Harvard, Vancouver, ISO, and other styles
34

Chasdi, Richard J. Corporate Security Crossroads. ABC-CLIO, LLC, 2017. http://dx.doi.org/10.5040/9798400632341.

Full text
Abstract:
Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance. Multinational corporations are on the front lines of terrorism and cyberattacks―two of the world’s biggest threats to global security. How can corporate leaders mitigate their organizations’ risks and develop an infrastructure that detects and deters a security menace before it happens? This timely reference lays out essential political context and historical background to help executives identify contemporary threats and understand the interconnections between threat dynamics in an increasingly dangerous international environment. This compelling work is organized into seven chapters. The beginning chapters profile the specific risks for multinational companies and detail which global―and regional―factors might propagate violence targeted at American-based businesses. Next, two historical case studies on terrorist assaults at Tigantourine and Mombasa illustrate how counterterrorism can successfully thwart potential attacks against business targets. The final part describes industrial espionage and criminal activity and then outlines a corporate counterterror blueprint to combat the prospect of terrorism, providing specific recommendations for preventative measures.
APA, Harvard, Vancouver, ISO, and other styles
35

Uttley, Matthew. Arms Procurement. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0040.

Full text
Abstract:
Since 1990, the European states have confronted tensions in balancing security of supply imperatives and equipment affordability constraints in procuring advanced weapons systems. Security of supply is equated with the retention of a national defence technological and industrial base (DTIB). Correspondingly, intergenerational cost increases in weapons production have progressively eroded the affordability of maintaining autonomous DTIBs, leading to the internationalization of what were formerly considered ‘national’ defence firms. This chapter challenges the argument of some analysts that these structural factors will lead inevitably to loss of control by national governments over weapons production and the inexorable rise of a globalized defence industry. It demonstrates instead that the European states do exercise significant agency in national defence procurement and industrial policy such that national DTIB protection still prevails, which explains why EU attempts to integrate and foster a strategically autonomous European defence technological and industrial base (EDTIB) have hitherto failed.
APA, Harvard, Vancouver, ISO, and other styles
36

Swepston, Lee. The International Labor Organization. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190672676.003.0010.

Full text
Abstract:
Occupational safety and health (OSH) is a vital part of the right to health. While the International Labor Organization (ILO) historically treated OSH as an entirely technical matter, it has increasingly been influenced by a human rights agenda. The ILO has responded by adopting and promoting a large number of international standards—in the form of conventions, recommendations, and codes of practice that result in protection against dangers at work. These standards combat specific risks, guide the establishment of health protection across industries, provide guidance for dealing with HIV and AIDS in the workplace, help to set up systems of health protection, provide for how disabled workers can function, and design social security regimes. The ILO also provides practical help to prevent accidents and diseases at the workplace and to stop industrial accidents that kill and injure large numbers of workers—and that have a damaging influence on public health.
APA, Harvard, Vancouver, ISO, and other styles
37

Caravelli, Jack, and Nigel Jones. Cyber Security. ABC-CLIO, LLC, 2019. http://dx.doi.org/10.5040/9798400636448.

Full text
Abstract:
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications. This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. The book’s first section describes existing threats and their consequences. The second section identifies newer cyber challenges across an even broader spectrum, including the internet of things. The concluding section looks at policies and practices in the United States, United Kingdom, and elsewhere that offer ways to mitigate threats to cyber security. Written in a nontechnical, accessible manner, the book will appeal to a diverse audience of policymakers, business leaders, cyber security experts, and interested general readers.
APA, Harvard, Vancouver, ISO, and other styles
38

Pannier, Alice. UK–French Defence and Security Cooperation. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0025.

Full text
Abstract:
The expansion and deepening of the UK–French defence partnership that came with the signing of the Lancaster House Treaties of November 2010 is of particular importance for European armed forces. The UK–French agreement concerns Europe’s two main defence players and covers both nuclear and conventional matters. This chapter first analyses the incentives that led to the cooperation treaties being signed in November 2010. It argues that it has four drivers: converging defence policies, economic necessity, the waning of traditional bilateral partnerships, and frustration with regional defence cooperation. Then the chapter assesses the progress made in the different areas of defence: training and interoperability, procurement and industrial integration, cooperation in international crises and participation in military interventions, and nuclear cooperation. The chapter concludes with a study of the challenges faced by the two countries, while also underlining the positive effects of institutionalization on their security partnership.
APA, Harvard, Vancouver, ISO, and other styles
39

Hayward, Keith. Space Capabilities. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0046.

Full text
Abstract:
This chapter assesses the current state of European military space capabilities as of 2017. Cooperative programmes have become more prominent, but national concerns are still predominant. While European institutions have acquired some military space interests, intergovernmental policymaking is still critical. Europe has a wide range of technological capabilities, but there are gaps in some security critical areas. The European space industrial base is partially integrated but with some tensions stemming from residual national industrial interests. The chapter examines the leading European national military space capabilities as well as a representative sample of other medium and lesser European powers. Europe is compared with other mid-range space powers such as India and Japan, as well as benchmarking against the United States, Russia, and China. While European military space has made significant progress, it is still impeded by political divisions that reflect wider weaknesses in European security policy.
APA, Harvard, Vancouver, ISO, and other styles
40

Tallman, Mark A. Ghost Guns. Bloomsbury Publishing Plc, 2020. http://dx.doi.org/10.5040/9798400657016.

Full text
Abstract:
With thorough analysis and balanced reporting, Ghost Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution is an essential resource for readers seeking to understand the rise of homemade firearms and future options for managing them. For more than a century, strict gun control was possible because firearms were produced in centralized industrial factories. Today, the Fourth Industrial Revolution, combining old and new technologies, threatens to upend this arrangement. An increasing number of hobbyists, "makers," technology provocateurs, and sophisticated criminals are proving that you don't need a factory to make guns anymore. The security challenges of this transformation are increasingly apparent, but the technologies behind it hold tremendous potential, and while ignoring the security implications would entail risks, the costs of new policies also must be evaluated. "Do-it-yourself," or DIY, weapons will bring significant ramifications for First and Second Amendment law, international and homeland security, crime control, technology, privacy, innovation, and the character of open source culture itself. How can a liberal society adjust to technologies that make it easier to produce weapons and contraband? Informative and thought-provoking, Ghost Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution carefully analyzes the technical, legal, social, political, and criminological trends behind this challenging new area of illicit weapons activity.
APA, Harvard, Vancouver, ISO, and other styles
41

Cornish, Paul, ed. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.

Full text
Abstract:
As societies, governments, corporations, and individuals become more dependent on the digital environment, so they also become increasingly vulnerable to misuse of that environment. A considerable industry has developed to provide the means with which to make cyberspace more secure, stable, and predictable. Cybersecurity is concerned with the identification, avoidance, management, and mitigation of risk in, or from, cyberspace—the risk of harm and damage that might occur as the result of everything from individual carelessness to organized criminality, to industrial and national security espionage, and, at the extreme end of the scale, to disabling attacks against a country’s critical national infrastructure. But this represents a rather narrow understanding of security and there is much more to cyberspace than vulnerability, risk, and threat. As well as security from financial loss, physical damage, etc., cybersecurity must also be for the maximization of benefit. The Oxford Handbook of Cybersecurity takes a comprehensive and rounded approach to the still evolving topic of cybersecurity: the security of cyberspace is as much technological as it is commercial and strategic; as much international as regional, national, and personal; and as much a matter of hazard and vulnerability as an opportunity for social, economic, and cultural growth.
APA, Harvard, Vancouver, ISO, and other styles
42

Boulanin, Vincent. Cyber Capabilities. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0045.

Full text
Abstract:
This chapter investigates the development of industrial and technological capabilities for cyber defence in Europe up to 2016. It assesses (a) the relevant policies, as well as (b) the institutional and (c) the industrial and technologies resources of Western Europe’s major powers (France, Germany, and the United Kingdom), and then of a selection of representative examples of medium and lesser powers (Italy, Spain, and Sweden).’ It establishes that since the mid-2000s developing cyber-security and cyber-defence capabilities emerged as a top priority for all the European powers examined. The most important efforts were from Europe’s largest military powers, France and the UK, which both showcase a firm intention to belong to the circle of leading powers in cyberspace. The efficacy of these efforts is hard to judge, given the absence of greater transparency and the nature of the cyber risks and threats.
APA, Harvard, Vancouver, ISO, and other styles
43

Mehta-Bhatt, Purvi, and Pier Paolo Ficarelli. Livestock in the Food Debate. Edited by Ronald J. Herring. Oxford University Press, 2014. http://dx.doi.org/10.1093/oxfordhb/9780195397772.013.024.

Full text
Abstract:
Livestock is an integral part of agriculture and a prominent source of food. It contributes 40% of the global value of agricultural output and supports the livelihoods and food security of almost a billion people, especially in developing countries. There is nothing new in amalgamation of farm animals in agriculture system, but the debate questioning its existence and relevance is a rather new drift. The politics, the climate debate, the nutrition debate around livestock sector, especially levitating from industrial countries, needs to be sympathetic toward the millions of people, especially in developing countries, that continue to remain dependent on livestock as an important, or often the only, source of livelihood. This chapter looks at the diverse livestock agriculture systems in industrial and less developed countries and it’s policy implications. It re-examines the prevailing debates such as, the heat and meat debate, the zoonotic disease discussions, the debate on ethics around animal-source food and the debate of over- and undernutrition. The authors take a balanced view on the pros and cons of livestock sector, considering the global debates, but at the same time, looking at livestock sector’s socioeconomic and nutrition value for the poor. Take a global view, debate, campaign but don’t forget to also look at the sector from livelihood and food-security angle. The underline message of the chapter is to call for a bounteous outlook, evidence-based debate and equable policies.
APA, Harvard, Vancouver, ISO, and other styles
44

Reinert, Kenneth A. Water. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190499440.003.0005.

Full text
Abstract:
This chapter considers water as a basic good that satisfies critical basic human needs for drinking, hygiene, and food preparation. It considers the widespread nature of water deprivation and the challenges of addressing this deprivation, including climate change, water shortages, and increased population growth. The chapter examines the subsistence right to water and the role of this right within the United Nations system of human rights. It also examines the relationship of water to food security and the industrial ecology of water. It takes up the issues of nanotechnology and desalination in helping to provide water as well as the critical issue of water storage. It concludes with a consideration of demand-side issues and water provisioning processes.
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Di. Strangers Are Not All Danger. Edited by Douglas Cumming, Geoffrey Wood, Igor Filatotchev, and Juliane Reinecke. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198754800.013.10.

Full text
Abstract:
Sovereign wealth fund (SWF) investment in strategic industries has raiseumerous concerns. While state ownership may motivate SWFs to pursue strategic interests on behalf of the home government, other governments can have different strategic objectives. It suggests that SWFs may behave differently even when investing in strategic industries. This chapter illustrates the heterogeneity of SWF investment in the energy industry and argues that SWFs from energy-poor countries are more likely to invest in the energy industry compared to other types of investors in pursuit of energy security for the home country. Foreign investment in the energy industry is likely to face greater resistance by the host country than investment in other industries. This would increase with the deterioration of bilateral relations, especially for SWFs from energy-poor countries. Empirical analysis of 6,382 foreign acquisitions between 1992 and 2012 support these claims. These results are robust against alternative model specifications and variable measurements.
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Sigen, Otto Zhou, and Sha Chang. Carbon-nanotube field emission electron and X-ray technology for medical research and clinical applications. Edited by A. V. Narlikar and Y. Y. Fu. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199533060.013.19.

Full text
Abstract:
This article describes carbon-nanotube based X-ray technologies for medical research and clinical applications, including an X-ray source, microfocus X-ray tube, microcomputed tomography scanner, stationary digital breast tomosynthesis, microradiotherapy system, and single-cell irradiation system. It first examines electron field emission from carbon nanotubes before discussing carbon-nanotube field emission electron and X-ray technologies in greater detail. It highlights the enormous promise of these systems in commercial and research application for the future in diagnostic medical imaging; in-vivo imaging of small-animal modelsfor pre-clinical cancer studies; security screening; industrial inspection; cancer radiotherapy of small-animal models for pre-clinical cancer studies; and basic cancer research using single-cell irradiation.
APA, Harvard, Vancouver, ISO, and other styles
47

Ussishkin, Daniel. Morale. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190469078.001.0001.

Full text
Abstract:
The book charts the institutional, cultural, and political history of morale in modern imperial Britain. First emerging in the nineteenth century as a residual problem in military disciplinary discussions, morale gradually emerged as a central problem in the management of groups, and, during the twentieth century, was diffused to other, civilian spheres of life. By the era of the Second World War, morale had become a ubiquitous and truly British concept. Its management was seen as vital for securing victory in war and, later on, as central to the goals of industrial management in a democratic age. In its name, Britons have generated a host of institutional practices to promote and observe morale, and it served as an important organizing principle for a host of social-psychological and managerial knowledge. Throughout the book, morale is examined both as a disciplinary technology to maximize productivity or collective capacity, and as encompassing a broader political vision for the management of society. Military theorists who feared the prospect of imperial decline, industrial psychologists who lamented the prevalence of social alienation, promoters of the British welfare state who insisted on the relationship between morale, sacrifice, and postwar reconstruction, all articulated their endeavor as a quest for a social emollient, seemingly lost in a disintegrated modern civil society. Morale ends with the transformations in the understanding of morale and the political visions to which it has been linked, against the backdrop of the crumbling of the social-democratic state and the ascendancy of the New Right.
APA, Harvard, Vancouver, ISO, and other styles
48

Abdul Rahim, Radziah, ed. Issues in international affairs. UUM Press, 2001. http://dx.doi.org/10.32890/9839559923.

Full text
Abstract:
The book is a spin-off from an academic seminar held by the School of Social Development, Universiti Utara Malaysia (UUM) from September 17-19, 1998. It is concerted effort, in particular, by those who are involved in teaching of the International Affairs Management (IAM) programme to enrich reading materials on global affairs. Key features of the book are as follows: Can there be a Science of International Relations?, International Negotiation: The Skills and Qualities Required of a Diplomat, Isu Populasi dan Kesannya Terhadap Persekitaran, Relocation of Hazardous Industries in Developing Countries: A General Scenario, Security in the NewWorld Order: Changes in Southeast Asias Security Pattern, Pengecualian Asia Tenggara: Latar belakang Sejarah, and ASEAN Economic Cooperation: The Political Reality of an Economic Integration
APA, Harvard, Vancouver, ISO, and other styles
49

Mondal, Paritosh, Saurav Paul, Abhijit Shyam, Anuradha Roy Choudhury, Kuheli Deb, Amit Kumar Pradhan, and Sudip Choudhury. Chemisensors and Biosensors. Edited by Sunayana Goswami. Glasstree, 2020. http://dx.doi.org/10.20850/9781716626982.

Full text
Abstract:
The world of sensor is an important and fast growing industry. Backed by active groups of researchers and technologists round the globe, sensor technology has become indispensible for its applications in the different field especially in the segment of environmental monitoring, gas composition analysis, industrial development monitoring, national defence security and medicine etc. Naturally, it plays a crucial role in the environment monitoring sector as well. This book documents an overview of different chemi- and bio-sensors, their design aspects, prospect of computational molecular studies in sensor design, and some important applications including the recent SARS-CoV-2. We hope this book will be of benefit for the active as well as prospective researchers planning to work in the field of sensor technology.
APA, Harvard, Vancouver, ISO, and other styles
50

Mpedi, Letlhokwa George, ed. Santa Claus: Law, Fourth Industrial Revolution, Decolonisation and Covid-19. African Sun Media, 2020. http://dx.doi.org/10.18820/9781928314837.

Full text
Abstract:
The origins of Santa Claus, or so I am told, is that the young Bishop Nicholas secretly delivered three bags of gold as dowries for three young girls to their indebted father to save them from a life of prostitution. Armed with immortality, a factory of elves and a fleet of reindeer, his has been a lasting legacy, inextricably linked to Christmas. Of course, this Christmas looks a little different. Amidst a global pandemic, shimmying down the chimneys of strangers certainly does not adhere to social distancing guidelines. Some borders remain closed, and in some instances, the quarantine period is far too long. After all, he only has 24 hours to spread cheer across the world. As with the rest of us, Santa Claus is likely to get the remote working treatment. The reindeers this year are likely to be self-driving, reminiscent of an Amazon swarm of technology, and the naughty and nice lists are likely to be based on algorithms derived from social media accounts. In the age of the fourth industrial revolution, it is difficult to imagine that letters suffice anymore. How many posts were verified as real before shared? Enough to get you a drone. Fake news? Here is a lump of coal. Will we see elves in personal protective equipment (PPE) and will Santa Claus, high risk because of age and his likely comorbidities from the copious amount of cookies, have to self-isolate in the North Pole? In fact, will there be any toys at all this year? Surely production has been stalled with the restrictions on imports and exports into the North Pole. Perhaps, there is a view to outsourcing, or perhaps, there is a shift towards local production and supply chains. More importantly, as we have done in many instances in this period, maybe we should pause to reflect on the current structures in place. The sanctification of a figure so clearly dismissive of the Global South and to be critical, quite classist must be called into question. From some of the keenest minds, the contributions in this book make a strong case against this holly jolly man. We traverse important topics such as, is the constitution too lenient with a clear intruder who has conveniently branded himself a Good Samaritan? Allegations of child labour under the guise of elves, blatant animal cruelty, constant surveillance in stark contrast to many democratic ideals and his possible threat to national security come to the fore. Nevertheless, as the song goes, he is aware when you are asleep, and he knows when you are awake. Is feminism a farce to this beloved man – what role does Mrs Claus play and why are there inherent gender norms in his toys? Then is the worry of closed borders and just how accurate his COVID-19 tests are. Of course, this brings his ethics into question. While there is an agreement that transparency, justice and fairness, nonmaleficence, responsibility, and privacy are the core ethical principles, the meaning of these principles differs, particularly across countries and cultures. Why are we subject to Santa Claus’ notions of good and evil when he is so far removed from our context? As Richard Thaler and Cass Sunstein would tell you, this is fundamentally a nudge from Santa Claus for children to fit into his ideals. A nudge, coined by Thaler, is a choice that predictably changes people’s behaviour without forbidding any options or substantially changing their economic incentives. Even with pinched cheeks and an air of holiday cheer, Santa Claus has to come under scrutiny. In the process of decolonising knowledge and looking at various epistemologies, does Santa still make the cut?
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography