This book takes a taxpayer's perspective to the relations taxation creates between people and their state. Larsen proposes that in order to understand tax compliance and cheating, we have to look beyond law, psychological experiments and surveys to include tax collectors and taxpayers' practices. The text explores the view of taxes seen a...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
This book examines the evolution of the relationship between taxpayers and their states in Sweden, Italy, the United Kingdom, the United States, and Romania, and asks why tax compliance is so much higher in some countries than others. The book shows that successful states have built strong administrative capacities, tax citizens fairly and equitabl...
This open access Pivot demonstrates how a variety of technologies act as innovation catalysts within the banking and financial services sector. Traditional banks and financial services are under increasing competition from global IT companies such as Google, Apple, Amazon and PayPal whilst facing pressure from investors to reduce costs, increase ag...
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migrati...
Moral dilemmas are a pervasive feature of working life. Moral Reasoning at Work offers a fresh perspective on how to live with them using ethics and moral psychology research. It argues that decision-makers must go beyond compliance and traditional approaches to ethics to prepare for moral dilemmas.
The 2nd edition has been updated with a range of...
Moral dilemmas are a pervasive feature of working life. Moral Reasoning at Work offers a fresh perspective on how to live with them using ethics and moral psychology research. It argues that decision-makers must go beyond compliance and traditional approaches to ethics to prepare for moral dilemmas....
The book presents the results of an in-depth comparative study assessing the implementation of the EU Pharmacovigilance Directive in six EU Member States. By going beyond legal transposition and instead focusing on practical implementation, this study aims to close a gap in EU compliance research. Based on qualitative interviews with relevant actor...
This open book mainly focuses on the safe control of robot manipulators. The control schemes are mainly developed based on dynamic neural network, which is an important theoretical branch of deep reinforcement learning. In order to enhance the safety performance of robot systems, the control strategies include adaptive tracking control for robots w...
Why do enterprises feel daunted when undertaking a large-scale cloud transformation? A move to the cloud usually offers substantial rewards. Once companies make this transition, they unlock new business opportunities that fundamentally change the way they work. With this report, members of the Google team will show you how to navigate the cultural ...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
The main objective of this book is to develop a strategy and policy measures to enhance the formalization of the shadow economy in order to improve the competitiveness of the economy and contribute to economic growth; it explores these issues with special reference to Serbia. The size and development of the shadow economy in Serbia and other Centra...
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy.
The authors, a uniquely skilled team of...
This book shows the factors linking information flow, social intelligence, rights management and modelling with epistemic democracy, offering licensed linked data along with information about the rights involved. This model of democracy for the web of data brings new challenges for the social organisation of knowledge, collective innovation, and th...
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
This book presents the concept of value as the central component to success and longevity of the global ICT industry player, Huawei. It provides examples of how Huawei focuses on customers to pursue sustainable and profitable growth rather than focusing on capital market valuation, which is a familiar scenario among Western companies. It is the bus...
This book provides a comprehensive examination of the European Landing Obligation policy from many relevant perspectives. It includes evaluations of its impacts at economical, socio-cultural, ecological and institutional levels. It also discusses the feasibility and benefits of several potential mitigation strategies. The book was timely published,...
Horrified by the Holocaust, social psychologist Stanley Milgram wondered if he could recreate the Holocaust in the laboratory setting. Unabated for more than half a century, his (in)famous results have continued to intrigue scholars. Based on unpublished archival data from Milgram's personal collection, volume one of this two-volume set introd...
The objective of this book is to help at-risk organizations to decipher the "safety cloud", and to position themselves in terms of operational decisions and improvement strategies in safety, considering the path already travelled, their context, objectives and constraints. What link can be established between safety culture and safety mod...
To realize the full benefits of SRE, organizations need well-thoughtout reliability targets known as service level objectives (SLOs) that are measured by service level indicators (SLIs), a quantitative measure of an aspect of the service. As detailed in the following section, the measurable goals set forth in an organization's SLOs eliminate t...
Microsoft SharePoint hybrid deployments are rapidly becoming popular with Microsoft's investments on increased SharePoint productivity, not only in your own environment (on-premises) but also collaborating in new ways through the largest and most advanced cloud service platform in the world - Microsoft Office 365 and Microsoft Azure. SharePoin...
Enterprise Cloud Strategy - Guidance for enterprises looking for proven methods to take their application portfolio to the cloud.
What if you were able to achieve both efficiency and innovation in all business domains and applications across your entire portfolio? What if you could take advantage of the cloud and all of its resources and feature...
The Doing Business 2020 study shows that developing economies are catching up with developed economies in ease of doing business.
Still, the gap remains wide. An entrepreneur in a low-income economy typically spends around 50 percent of the country's per-capita income to launch a company, compared with just 4.2 percent for an entrepreneur i...
How are users influenced by social media platforms when they generate content, and does this influence affect users' compliance with copyright laws?
These are pressing questions in today's internet age, and Regulating Content on Social Media answers them by analysing how the behaviours of social media users are regulated from a copyrig...
This book has been specifically created to make it easier for professors to offer a law school course on global corruption. It is issued under a creative commons license and can be used for free in whole or in part for non-commercial purposes. The first chapter sets out the general context of global corruption: its nature and extent, and some views...
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and...
In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture.
He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, vie...
This open book provides an in-depth look into the background of rule of law problems and the open defiance of EU law in East Central European countries. Current illiberal trends and anti-EU politics have the potential to undermine mutual trust between member states and fundamentally change the EU. It is therefore crucial to understand their domesti...
This unique open book features a selection of Living Cases on Corporate Governance, which were developed and compiled by chairpersons, members of the board of directors, and CEOs in various countries, working in close collaboration with prominent researchers. Each Living Case addresses a current issue that a given company or institution needs to re...
This open book focuses on the issue of sustainability standards from the perspective of both global governance frameworks and emerging economies. It stems from the recognition that the accelerated pace of economic globalization has generated production and consumption patterns that are generating sustainability concerns. Sustainability standards (a...
Digital accessibility skills are in high demand, as the world becomes more aware of barriers in digital content that prevent some people from participating in a digital society. These are essential skills for web developers, and essential knowledge for organizations that want to ensure their web content is reaching the broadest audience possible.
...
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.
In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to se...