- Books, book chapters or essays from books
- Journal articles
This book is intended for the technical reader who works with large volumes of data. Written by experts in information systems management, the book includes chapters on software development, cloud implementation, networking, and handling large datasets, among other topics. Blockchain and artificial intelligence (AI) are the foundations of automated systems and the authors provide their viewpoints on information management by using these fundamental domains of information technology.
This open access book discusses the most modern approach to auditing complex digital systems and technologies. It combines proven auditing approaches, advanced programming techniques and complex application areas, and covers the latest findings on theory and practice in this rapidly developing field. Especially for those who want to learn more about novel approaches to testing complex information systems and related technologies, such as blockchain and self-learning systems, the book will be a valuable resource. It is aimed at students and practitioners who are interested in contemporary technology and managerial implications.
This reprint presents a comprehensive exploration of cutting-edge research in various domains, ranging from blockchain integration in agriculture to innovative tools for employees’ performance measurement. The topics cover machine learning applications, healthcare information systems and the adoption of digital business solutions. An emphasis is placed on emerging technologies, like IoT, VR and AR, offering insights into the future of information systems and technologies. The interdisciplinary nature of the papers reflects a wide spectrum of applications, including smart home systems, energy microgrids and novel approaches to classification using online reviews.
This book deals with intelligent information processing systems related to natural language processing, text mining, web information processing, and nursing and caring robot technologies. It introduces the latest trends and past research results of researchers in a wide range of fields related to knowledge information processing, which is one of the ultimate goals of information processing technology and is necessary for making artificial brains useful in our society. ©2021
This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative, qualitative, and mixed methods research enquiries. The content offers important perspectives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives.
This book sets out to provide postgraduate researchers with guidance on selecting and applying sociotechnical theories to the study of information systems, including how they can be combined to complement each other. Until now it has been difficult to source advice on the application of these theories, and there has been no single book that combines multiple theories as this does.
Examining the impacts of technological developments and seeking to understand how humans interact with computers and systems is a dynamic field but can often confuse researchers with the overwhelming number of social theories that are utilised to derive insights. Instead, the author in this book breaks down some of the most popular theories used to underpin information system research, such as activity theory (AT), actor-network theory (ANT), contingency theory (CT), diffusion of innovation (DOI) theory, structuration theory (ST), and the technology acceptance model (TAM). By doing so, this book serves to enable a simpler, faster selection of appropriate theories, and a more effective and productive application that leads to richer, more rigorous research outcomes.
Generative AI is creating revolutionary change at a head-spinning pace that will touch nearly every aspect of our lives. It has already triggered a tidal wave of technological innovation that holds the potential to disrupt industries and organizations while creating new unforeseen opportunities for everyone.
Are you intrigued by the power of AI and want to explore its creative possibilities? Or are you new to this world and feeling a bit overwhelmed by this technology and how it could impact you? Either way, this book will tell you everything you need to know in simple, easy-to-understand language with lots of examples of actual content produced by Generative AI.
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades. The book shows how to use privacy-preserving computing in real-world problems in data analytics and AI, and includes applications in statistics, database queries, and machine learning. The book begins by introducing cryptographic techniques such as secret sharing, homomorphic encryption, and oblivious transfer, and then broadens its focus to more widely applicable techniques such as differential privacy, trusted execution environment, and federated learning. The book ends with privacy-preserving computing in practice in areas like finance, online advertising, and healthcare, and finally offers a vision for the future of the field.
Undergraduates: 6 books for 7 days
Postgraduate: 12 books for 30 days
UCT Staff: 30 books for 90 days
Click here to read more.
Send an email to the librarian Nuroo Davids email nuroo.davids@uct.ac.za to suggest a book for the Libraries collection.
The Interlibrary Loans (ILL) Department is your link between the University of Cape Town Libraries and other libraries in Southern Africa and abroad. A required book or article not available at UCT may be requested.
PLEASE use the Libraries' Interlibrary Loans Services if you come across a journal article, book chapter, a whole book or a thesis, that is not available at UCT. The request can be done online. You will then be notified by e-mail when the article arrives in the library.
What can I request from interlibrary loans?