Have you ever seen a place transformed beyond recognition? Maybe a local lake dried up, or a treasured tree blew down, leaving an empty space where there was once a landmark. Places change. Landscapes transform because of human intervention and events like extreme weather. Not every change needs to be a loss. But some changes are devastating. Why do we grieve for some losses, and not others? Why does it upset us when a stately local tree is cut down near, but not affect us when an area the size of Cyprus is deforested every year in the Amazon?
MULTIFILE
Informatie- en communicatietechnologie (ICT) is doorgedrongen tot alle niveaus van de economie en samenleving. Bestaande grenzen tussen markten, bedrijven en consumenten worden opengebroken en nieuwe producten en diensten zijn steeds sneller, slimmer en goedkoper beschikbaar voor grote groepen consumenten. Door het toepassen van ICT kunnen transacties efficiënter en effectiever tot stand komen, als we tenminste met de nieuwe technologie leren omgaan. In E-business your business beschrijft de auteur het multidisciplinaire karakter van e-business. Het boek gaat over de invloed van ICT op de organisatie, de strategie en de marketing. Belangrijke ontwikkelingen zoals e-marketing, weblogs, RFID, internettelefonie, co-creatie, offshore outsourcing en mass customization worden op een heldere manier beschreven. Daarnaast geeft de auteur vijftig concrete tips om de omzet via internet te verhogen. Met dit boek raken studenten en managers vertrouwd met de wereld van e-commerce, e-business en internet.
MULTIFILE
Presentation by Rutger Leukfeldt on Financially motivated cybercriminal networks, during workshop on Cybercrime Offenders. Cybercrime perpetrators are as diverse and complex as the cybercrime that they commit. For example, they come from different backgrounds and have different (egotistical, technical, monetary, ideological, political, professional, vengeful, sexual or other) motivations. They may or may not be professional criminals, and individuals or part of organised groups or networks (example of Advanced Persistent Threats). Some may commit crime on their own account or make their services available to others, and some may be supported by or be state actors. A better understanding of the types of perpetrators and their motivations and techniques can be instrumental for the prevention of cybercrime and for a more effective criminal justice response. The aim of this workshop is to contribute to such a better understanding and to initiate steps towards a typology of offenders.