Buy optout.eu ?

Products related to Technology:


  • Marketing 5.0 : Technology for Humanity
    Marketing 5.0 : Technology for Humanity

    Rediscover the fundamentals of marketing from the best in the business In Marketing 5.0, the celebrated promoter of the “Four P’s of Marketing,” Philip Kotler, explains how marketers can use technology to address customers’ needs and make a difference in the world. In a new age when marketers are struggling with the digital transformation of business and the changing behavior of customers, this book provides marketers with a way to integrate technological and business model evolution with the dramatic shifts in consumer behavior that have happened in the last decade. Following the pattern presented in his bestselling Marketing X.0 series, Philip Kotler covers the crucial topics necessary to understand modern marketing, including: · Artificial Intelligence for marketing automation · Agile marketing · “Segments of one” marketing · Contextual technology · Facial recognition and voice tech for marketing · The future of Customer Experience (CX) · Transmedia storytelling · The “Whatever-Whenever-Wherever” service delivery · “Everything-As-A-Service” business model · Internet of Things and blockchain for marketing · Virtual and augmented reality marketing · Corporate activism Perfect for traditional and digital marketers, as well as students and teachers of marketing and business, Marketing 5.0 reinvigorates the field of marketing with actionable recommendations and unique insights.

    Price: 24.00 £ | Shipping*: 3.99 £
  • Social Commerce : Marketing, Technology and Management
    Social Commerce : Marketing, Technology and Management

    This is a multidisciplinary textbook on social commerce by leading authors of e-commerce and e-marketing textbooks, with contributions by several industry experts.It is effectively the first true textbook on this topic and can be used in one of the following ways:Textbook for a standalone elective course at the undergraduate or graduate levels (including MBA and executive MBA programs)Supplementary text in marketing, management or Information Systems disciplines Training courses in industrySupport resources for researchers and practitioners in the fields of marketing, management and information managementThe book examines the latest trends in e-commerce, including social businesses, social networking, social collaboration, innovations and mobility.Individual chapters cover tools and platforms for social commerce; supporting theories and concepts; marketing communications; customer engagement and metrics; social shopping; social customer service and CRM contents; the social enterprise; innovative applications; strategy and performance management; and implementing social commerce systems.Each chapter also includes a real-world example as an opening case; application cases and examples; exhibits; a chapter summary; review questions and end-of-chapter exercises.The book also includes a glossary and key terms, as well as supplementary materials that include PowerPoint lecture notes, an Instructor’s Manual, a test bank and five online tutorials.

    Price: 59.99 £ | Shipping*: 0.00 £
  • Cybersecurity, Privacy and Data Protection in EU Law : A Law, Policy and Technology Analysis
    Cybersecurity, Privacy and Data Protection in EU Law : A Law, Policy and Technology Analysis

    Is it possible to achieve cybersecurity while safeguarding the fundamental rights to privacy and data protection?Addressing this question is crucial for contemporary societies, where network and information technologies have taken centre stage in all areas of communal life.This timely book answers the question with a comprehensive approach that combines legal, policy and technological perspectives to capture the essence of the relationship between cybersecurity, privacy and data protection in EU law.The book explores the values, interconnections and tensions inherent to cybersecurity, privacy and data protection within the EU constitutional architecture and its digital agendas.The work’s novel analysis looks at the interplay between digital policies, instruments including the GDPR, NIS Directive, cybercrime legislation, e-evidence and cyber-diplomacy measures, and technology as a regulatory object and implementing tool.This original approach, which factors in the connections between engineering principles and the layered configuration of fundamental rights, outlines all possible combinations of the relationship between cybersecurity, privacy and data protection in EU law, from clash to complete reconciliation. An essential read for scholars, legal practitioners and policymakers alike, the book demonstrates that reconciliation between cybersecurity, privacy and data protection relies on explicit and brave political choices that require an active engagement with technology, so as to preserve human flourishing, autonomy and democracy.

    Price: 90.00 £ | Shipping*: 0.00 £
  • On Privacy and Technology
    On Privacy and Technology

    Succinct and eloquent, On Privacy and Technology is an essential primer on how to face the threats to privacy in today's age of digital technologies and AI. With the rapid rise of new digital technologies and artificial intelligence, is privacy dead?Can anything be done to save us from a dystopian world without privacy?In this short and accessible book, internationally renowned privacy expert Daniel J.Solove draws from a range of fields, from law to philosophy to the humanities, to illustrate the profound changes technology is wreaking upon our privacy, why they matter, and what can be done about them.Solove provides incisive examinations of key concepts in the digital sphere, including control, manipulation, harm, automation, reputation, consent, prediction, inference, and many others.Compelling and passionate, On Privacy and Technology teems with powerful insights that will transform the way you think about privacy and technology.

    Price: 16.99 £ | Shipping*: 3.99 £
  • What is data protection and security?

    Data protection and security refer to the measures and practices put in place to safeguard data from unauthorized access, use, or disclosure. This includes protecting data from cyber threats such as hacking, malware, and phishing attacks, as well as ensuring compliance with privacy regulations and laws. Data protection and security also involve implementing encryption, access controls, and regular data backups to prevent data loss and maintain the integrity of sensitive information. Overall, data protection and security are essential for maintaining the confidentiality, integrity, and availability of data.

  • What is more important, data protection or privacy?

    Both data protection and privacy are important, but they serve different purposes. Data protection focuses on safeguarding the information collected and stored by organizations, ensuring it is secure from unauthorized access or breaches. Privacy, on the other hand, is about giving individuals control over their personal information and how it is used. Both are essential for maintaining trust and security in the digital age, and organizations should prioritize both data protection and privacy to ensure the safety and rights of their users.

  • On which security technology has your own company specialized?

    My company has specialized in developing and implementing advanced encryption technologies for data security. We focus on creating robust encryption algorithms and secure communication protocols to protect sensitive information from unauthorized access and cyber threats. Our solutions are designed to provide end-to-end encryption for data at rest and in transit, ensuring that our clients' data remains secure and private.

  • Which reseller hosting services offer privacy and data protection?

    Many reseller hosting services offer privacy and data protection as part of their packages. Some popular options include SiteGround, Bluehost, and A2 Hosting. These providers offer features such as SSL certificates, regular backups, and secure data centers to ensure the privacy and protection of customer data. It's important to carefully review the privacy and security features offered by each reseller hosting service to ensure they meet your specific needs.

Similar search terms for Technology:


  • Whisky and Other Spirits : Technology, Production and Marketing
    Whisky and Other Spirits : Technology, Production and Marketing

    Whisky and Other Spirits: Technology, Production and Marketing, Third Edition continues to provide details from raw materials to the finished product, including production, packaging and marketing.It focuses on the science and technology of the process as well as the environment in which it is produced.Today, environmental concerns and sustainability of products has taken on a new level of importance.Traditional ways of packaging and marketing have also changed dramatically in recent years as the technology of packaging has moved from a staid bottle industry to spirit products that cross traditional beverage categories and packaging. This new edition provides the latest changes in industry and the beverages market.All chapters are updated, with new chapters added to help improve research and development, and to increase production of not only whiskey but other spirits such as gin and rum and white spirits.This new edition also discusses trendy reduced alcohol and no alcohol products.

    Price: 95.95 £ | Shipping*: 0.00 £
  • Marketing 5.0 : The Role of Human-Mimicking Technology
    Marketing 5.0 : The Role of Human-Mimicking Technology

    Marketing 5.0: The Role of Human-Mimicking Technology focuses on ‘human-mimicking technology’ in the age of marketing, wherein consumers and technology are blended as one.It reimagines technology creating a human touch, which not only enhances the customer experience but also builds an ecosystem of personalised sense-and-respond experiences, leading towards greater sustainability.It is this age of Augmented and Agile marketing, which delivers tech-empowered human interaction at pace and scale, achieving the perils and promises of digitalization.Marketing is witnessing a shift from Marketing 4.0 to Marketing 5.0.In this change, there is a continuous struggle for gaining digital business presence. Marketing 5.0 introduces academics and marketers to the concept of human-mimicking technologies to create, communicate, deliver, and enhance value across the customer journey.The objective is to learn and understand the blended approach, where consumers and technology integrate as one. Marketing 5.0 explores the importance of technology to marketing 5.0 and will be of benefit to practitioners, academics, and industry researchers, and students at master’s and doctoral levels.

    Price: 80.00 £ | Shipping*: 0.00 £
  • The Politics of Technology in Latin America (Volume 1) : Data Protection, Homeland Security and the Labor Market
    The Politics of Technology in Latin America (Volume 1) : Data Protection, Homeland Security and the Labor Market

    This book analyses the arrival of emerging and traditional information and technology for public and economic use in Latin America.It focuses on the governmental, economic and security issues and the study of the complex relationship between citizens and government. The book is divided into three parts:• ‘Digital data and privacy, prospects and barriers’ centers on the debates among the right of privacy and the loss of intimacy in the Internet,• ‘Homeland security and human rights’ focuses on how novel technologies such as drones and autonomous weapons systems reconfigure the strategies of police authorities and organized crime,• ‘Labor Markets, digital media and emerging technologies’ emphasize the legal, economic and social perils and challenges caused by the increased presence of social media, blockchain-based applications, artificial intelligence and automation technologies in the Latin American economy.This first volume in a two volume set will be important reading for scholars and students of governance in Latin American, the protection of human rights and the use of technology to combat crime and the new advances of digital economy in the region.

    Price: 41.99 £ | Shipping*: 0.00 £
  • Data Dating : Love, Technology, Desire
    Data Dating : Love, Technology, Desire

    What does it mean to love with technology? Does data improve our emotional interactions? The collection approaches the query with critical essays and works of new media art to look into the construction of love and its practices in the time of digitally mediated relationships.With expertise coming from recognized researchers, critics and artists in the field of media and cultural studies, it analyses relationship trends and affect cultures that have emerged from technological acceleration. Data Dating: Love, Technology and Desire is a comprehensive study of love and intimacy under digitalism that reflects on the structure of feeling(s) and libido environments in the high-tech and media-bound landscapes of contemporary technocracies. Organized around ten chapters and ten works of new media art, the collection offers an extensive critical analysis of technologized romance (and other emotional relations), as well as provides an insight into the codification, execution, deployment, and evolution of the patterns of togetherness in the so-called Tamagotchi era. The chapters engage in the problems of new material planes that have emerged from the abstraction of networked communication and dispersion of traditional notions of physicality.They close-read the templates of contemporary fantasy, fetish and eroticism, as shaped by platform capitalism, datafication, and new commodity cultures, in which self-promotion for bonding relies on the new possibilities that are coming in with new media self-mediation formats.Central to the analysis is the carbon-silicon dynamics of love’s contemporary DNA and libidinal techne – practiced in the environment where screens, interfaces, algorithms, data protocols and non-organic objects of affection and affect delineate, organize and program the trajectories of encounter, limerence and erotic pleasure.All the chapters are authored by recognized researchers in the field of love, emotion, media, technology and cultural studies, and they critically explore various aspects of love/intimacy under technocracy, approaching them with expertise the goes beyond the typical high-modernist and post-structural reading of the media-ridden life practices and environments. More importantly, the collection includes landmark works of new media art coming from prominent new media artist gathered around 'Data Dating' – new media art exhibition, curated by Valentina Peri (co-editor of the collection) and presented in Paris, Tel Aviv and London.As such, the collection proffers a unique and original critical approach – one that combines artistic practice and cultural criticism – to comment upon the transformation of human relationships and emotional standards under technological development with reference to the social change and cultural condition. The collection of essays, each accompanied by a work of media art, that provides a comprehensive insight into the construction of love and its practices in the time of digitally mediated relationships. Primary readership will be among educators, researcher and students in disciplines including cultural studies, media and communications, philosophy, sociology, psychology and gender, LGBTQ+ and sexual studies.It will be an extremely valuable resource for those in these fields. It will be of interest to other groups including art curators, online platform designers, social media content managers and designers and data specialists.

    Price: 34.95 £ | Shipping*: 0.00 £
  • Should public places be monitored by cameras and security technology?

    Public places should be monitored by cameras and security technology to ensure the safety and security of the people using those spaces. These measures can help deter criminal activity, provide evidence in the event of a crime, and help law enforcement respond more effectively to incidents. However, it is important to balance the use of surveillance technology with privacy concerns and ensure that it is used responsibly and ethically. Additionally, there should be transparency and oversight in the use of surveillance technology to prevent abuse and protect civil liberties.

  • What is the question about data protection and data security?

    The question about data protection and data security revolves around how organizations can safeguard sensitive information from unauthorized access, breaches, and cyber threats. It also involves ensuring compliance with data protection regulations, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Additionally, the question may address best practices for data encryption, access controls, regular security audits, and incident response plans to mitigate risks and protect data integrity.

  • What is the difference between data protection and data security?

    Data protection refers to the policies and procedures put in place to ensure that personal data is handled in compliance with privacy laws and regulations. This includes obtaining consent for data collection, limiting access to personal information, and ensuring data is accurate and up to date. On the other hand, data security focuses on protecting data from unauthorized access, use, or destruction. This includes measures such as encryption, firewalls, and access controls to prevent data breaches and cyber attacks. In summary, data protection is about the legal and ethical handling of personal data, while data security is about the technical measures used to protect that data from unauthorized access or misuse.

  • How does the security barrier in the store with alarm and security technology work?

    The security barrier in a store with alarm and security technology typically consists of sensors placed at entry and exit points. These sensors detect when an item with a security tag passes through them without being deactivated at the checkout. When this happens, the sensors trigger an alarm to alert store staff of a potential theft. Additionally, the security tags on items are usually deactivated at the checkout counter using a special device, allowing customers to leave the store without setting off the alarm.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.