Products related to Monitoring:
-
Innovation in Information Technology
Price: 110.00 £ | Shipping*: 0.00 £ -
Workplace Monitoring and Technology
Workplace Monitoring and Technology aims to showcase results of research and explanatory theories that influence employees' acceptance of the fact that work is monitored using ICT-based monitoring tools.Work monitoring, understood as obtaining, storing and reporting the results of collected observations, has always been a managerial task.Traditionally it was carried out by supervisors who, while overseeing the work of employees, would draw conclusions from their observations and implement corrective actions.The use of information and communication technologies (ICT) to monitor the working employee and their performance has changed the methods of monitoring, and the popularization of remote work has increased interest in searching for new monitoring systems using the full potential of new ICT solutions.The new developments in ICT have caused smart monitoring systems and new solutions to evolve in electronic work monitoring based on the Internet of Things and Artificial Intelligence, which enables nearly cost-free monitoring.However, scientific knowledge about them is limited, and above all, so is managerial knowledge about the reception of these tools by employees, while their misuse can cause considerable damage.Presenting a broad overview of the current state of different areas of scientific knowledge regarding smart and electronic monitoring systems of work performance, this book will be of relevance for academics within the fields of human resource management and performance management, and for similar groups of researchers in psychology and sociology.
Price: 135.00 £ | Shipping*: 0.00 £ -
Workplace Monitoring and Technology
Workplace Monitoring and Technology aims to showcase results of research and explanatory theories that influence employees' acceptance of the fact that work is monitored using ICT-based monitoring tools.Work monitoring, understood as obtaining, storing and reporting the results of collected observations, has always been a managerial task.Traditionally it was carried out by supervisors who, while overseeing the work of employees, would draw conclusions from their observations and implement corrective actions.The use of information and communication technologies (ICT) to monitor the working employee and their performance has changed the methods of monitoring, and the popularization of remote work has increased interest in searching for new monitoring systems using the full potential of new ICT solutions.The new developments in ICT have caused smart monitoring systems and new solutions to evolve in electronic work monitoring based on the Internet of Things and Artificial Intelligence, which enables nearly cost-free monitoring.However, scientific knowledge about them is limited, and above all, so is managerial knowledge about the reception of these tools by employees, while their misuse can cause considerable damage.Presenting a broad overview of the current state of different areas of scientific knowledge regarding smart and electronic monitoring systems of work performance, this book will be of relevance for academics within the fields of human resource management and performance management, and for similar groups of researchers in psychology and sociology.
Price: 39.99 £ | Shipping*: 0.00 £ -
The Practice Of Network Security Monitoring
Network security is not simply about building impenetrable walls determined attackers will eventually overcome traditional defenses.The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks no prior experience required.To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to: Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There s no foolproof way to keep attackers out of your network.But when they get in, you ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them.Attacks are inevitable, but losing sensitive data shouldn't be.
Price: 53.99 £ | Shipping*: 0.00 £
-
Is digital traffic monitoring for parking violations legal?
Digital traffic monitoring for parking violations is legal in many jurisdictions, as long as it complies with local laws and regulations. However, it is important to ensure that the monitoring is conducted in accordance with privacy laws and that any data collected is handled and stored in a secure and compliant manner. Additionally, it is essential to clearly communicate to the public that digital monitoring is being used for parking enforcement purposes. Overall, digital traffic monitoring for parking violations can be legal and effective when implemented responsibly and in accordance with the law.
-
How does an online exam with webcam monitoring work?
An online exam with webcam monitoring works by using the webcam to monitor the test taker during the exam. The software uses facial recognition and eye-tracking technology to ensure that the test taker is not cheating or getting help from others. The webcam captures the test taker's movements and behavior, and the software flags any suspicious activity for further review by the exam proctor. This method helps to maintain the integrity of the exam and ensure that the test taker is completing the exam honestly.
-
Who is monitoring the toilets?
The toilets are typically monitored by building maintenance staff or custodial workers. They are responsible for ensuring that the toilets are clean, well-stocked with supplies, and in proper working condition. In some cases, there may also be automated monitoring systems in place to track usage and alert staff when maintenance is needed. Overall, the goal is to provide a clean and functional restroom environment for users.
-
Are child monitoring apps illegal?
Child monitoring apps are not inherently illegal, but their use can raise privacy concerns and legal issues depending on how they are used. It is important to consider the laws and regulations in your jurisdiction regarding the monitoring of children, as well as the terms of service of the specific app being used. It is recommended to have open communication with your child about the use of monitoring apps and to use them responsibly and ethically.
Similar search terms for Monitoring:
-
Critical ICT4D (Information and Communication Technologies for Development)
The edited volume Critical ICT4D highlights the need for a paradigm change in theorising, designing and researching Information and Communication Technologies for Development (ICT4D).Engaging authors from the Global South, entering a process of restoring epistemic justice in knowledge production and ownership the text:· Reflects on the histories and narratives around development programmes, their deep-rooted socio-political background, and the power relations integrated into or induced by such measures;· Problematises the current scholarship and practices through decolonial and pluralistic approaches built with an explicit perspective of resisting epistemic violence; and· Constructs justice-enacting engagements of technologies with society. Offering thematic discussions in many development sectors with up-to-date case studies informed by recent research in the field, it sheds light on constructive contributions of critical ICT4D research.Written in an accessible language, the book will appeal to postgraduate students, fellow researchers, policymakers in the fields of sociology, development studies, STS, critical data studies, surveillance studies, international relations, public administration, and information systems.
Price: 36.99 £ | Shipping*: 0.00 £ -
Critical ICT4D (Information and Communication Technologies for Development)
The edited volume Critical ICT4D highlights the need for a paradigm change in theorising, designing and researching Information and Communication Technologies for Development (ICT4D).Engaging authors from the Global South, entering a process of restoring epistemic justice in knowledge production and ownership the text:· Reflects on the histories and narratives around development programmes, their deep-rooted socio-political background, and the power relations integrated into or induced by such measures;· Problematises the current scholarship and practices through decolonial and pluralistic approaches built with an explicit perspective of resisting epistemic violence; and· Constructs justice-enacting engagements of technologies with society. Offering thematic discussions in many development sectors with up-to-date case studies informed by recent research in the field, it sheds light on constructive contributions of critical ICT4D research.Written in an accessible language, the book will appeal to postgraduate students, fellow researchers, policymakers in the fields of sociology, development studies, STS, critical data studies, surveillance studies, international relations, public administration, and information systems.
Price: 135.00 £ | Shipping*: 0.00 £ -
Spatial Information Technology for Sustainable Development Goals
This textbook aims to develop a scientific knowledge base on spatial information technology to communicate the United Nations' Sustainable Development Goals (SDGs) among students, researchers, professionals and laymen.The book improves understanding of the spatial database and explains how to extract information from this for planning purposes.To enhance the knowledge of geoscientists and environmentalists, the book describes the basic fundamental concepts to advance techniques for spatial data management and analysis and discusses the methodology.The Geographic Information System (GIS), remote sensing and Global Positioning System (GPS) are presented in an integrated manner for the planning of resources and infrastructure.The management of these systems is discussed in a very lucid way to develop the reader's skills.The proper procedure for map making and spatial analysis are included along with case studies to the reader.Where thefirst part of the book discusses the conceptual background, the second part deals with case studies using these applications in different disciplines.The presented case studies include land use, agriculture, flood, watershed characterization and infrastructure assessment for the Sustainable Development Goals.
Price: 69.99 £ | Shipping*: 0.00 £ -
Communication and Information Technology in (Intercultural) Language Teaching
The topic of this book is in congruence with the current trends in foreign language education worldwide.On the one hand, it tackles the concept and implementation of intercultural language teaching; on the other, it analyses the circumstances in which information and communication technology may be utilised in the contemporary EFL classroom.Both intercultural teaching and Computer Assisted Language Learning (CALL) have been promoted by national/international educational documents in Europe, the USA and Asia, and endorsed by international organisations, including the Council of Europe and UNESCO.This book constitutes a pioneering attempt at establishing the role of ICT in English language and culture teaching within the Polish education system.However, the research instruments used within both research modules are applicable to other education systems worldwide, while the results obtained have implications for intercultural and computer-assisted language education in international contexts.The research results presented in the book highlight to the broad EFL profession a wide range of issues relating to the use of ICT in the foreign language classroom.They also offer materials writers, software designers and EFL teachers criteria with which to evaluate the intercultural component of CALL software.
Price: 49.99 £ | Shipping*: 0.00 £
-
How does iCloud monitoring work?
iCloud monitoring works by continuously tracking and analyzing the activity on a user's iCloud account. This includes monitoring for any unauthorized access, unusual login locations, or suspicious activity. If any concerning activity is detected, the monitoring system will alert the user or administrator so they can take action to secure their account. Additionally, iCloud monitoring can also track data usage, storage capacity, and device synchronization to ensure everything is functioning properly.
-
How does WLAN monitoring work?
WLAN monitoring works by continuously monitoring the wireless network to gather data on the performance, usage, and security of the network. This is done using specialized software and hardware that can capture and analyze the traffic on the network. The monitoring tools can track the number of connected devices, signal strength, data transfer rates, and any potential security threats. This data is then used to optimize the network performance, troubleshoot issues, and ensure the security of the WLAN.
-
"Is my father monitoring me?"
It's important to have an open and honest conversation with your father about your concerns. Express your feelings and ask him directly if he is monitoring you. It's possible that he may have reasons for wanting to keep an eye on you, but it's important to establish trust and boundaries in your relationship. If you feel uncomfortable with the idea of being monitored, it's important to communicate that to your father and work towards finding a solution that works for both of you.
-
What monitoring options does the landlord have for the WLAN guest access?
The landlord can monitor the WLAN guest access by using network monitoring tools to track the usage and activity of the guest network. They can also set up logging and reporting features to keep track of the devices connected to the network, the amount of data being used, and the websites being accessed. Additionally, the landlord can implement security measures such as firewalls and content filtering to ensure that the guest network is being used appropriately.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.