03382nam 2200397 450 991077470220332120230326183938.010.4102/aosis.2022.BK272(CKB)5680000000080942(NjHacI)995680000000080942(EXLCZ)99568000000008094220230326d2022 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierChristian hermeneutics in South Africa /Hendrik Goede, Nicolaas VorsterCape Town, South Africa :AOSIS,2022.1 online resource (xix, 240 pages)Reformed theology in Africa series1-77634-221-6 Abbreviations and table appearing in the text and notes xiii -- List of abbreviations xiii -- Table list xiii -- Notes on contributors xv -- Introduction 1 Nico Vorster & Hendrik Goede -- Chapter 1: Reformed hermeneutics in South Africa: Its presuppositions, -- principles, nuances and value 13 Albert J. Coetsee & Hendrik Goede -- Chapter 2: Pentecostal hermeneutics for Africa: Definition -- and application 39 Marius Nel -- Chapter 3: The hermeneutics of suspicion 65Jaco Kruger -- Chapter 4: The hermeneutics of liberation theology: -- Appreciation and critique 93J.M. Vorster -- Chapter 5: Postcolonial hermeneutics 115Philip La Grange du Toit -- Chapter 6: Can the indigenes outwit the colonial settlers and regain land? Rereading the Joshua narrative: Land grab through decolonial lens in the South African context 131 Hulisani Ramantswana -- Chapter 7: Ecofeminist hermeneutics 155 Susara J. Nortjé-Meyer -- Chapter 8: Towards embodied biblical hermeneutics - A conversation with ubuntu and Gabriel Marcel's philosophy 181 -- Zorodzai Dube -- Conclusion 188 -- References 191 -- Index 213.Hermeneutics remains a divisive and polarizing topic within scholarly and ecclesiastical communities in South Africa. These tensions are not limited to theoretical differences but often crystallize on a grassroots level when local churches and church assemblies have to make important decisions on controversial ethical topics such as ordaining women in church offices, assessing the ethics of gay marriages, and taking a stance on the land debate in South Africa. This book makes a unique contribution in two ways: firstly, it focuses on the uniquely South African hermeneutical landscape; secondly, it relates theories to practical ethical application. The unique scholarly contribution of this consists in it relating hermeneutics to ethics within the South African landscape. A diverse group of scholars have been invited to partake in the project and the views expressed are often quite diverse. This allows readers to develop an understanding and sensitivity of the various angles employed and the interests at stake in addressing difficult societal problems.Reformed theology in Africa series.HermeneuticsReligious aspectsChristianityHermeneuticsReligious aspectsChristianity.220.601Goede Hendrik1461280Vorster NicolaasNjHacINjHaclBOOK9910774702203321Christian hermeneutics in South Africa3665441UNINA03738nam 22005175 450 991055271450332120220309194843.09783030816483(electronic bk.)978303081647610.1007/978-3-030-81648-3(MiAaPQ)EBC6916336(Au-PeEL)EBL6916336(CKB)21391651000041(DE-He213)978-3-030-81648-3(EXLCZ)992139165100004120220309d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierParticipatory Governance and Cultural Development An Empirical Analysis of European Capitals of Culture /by Desirée Campagna1st ed. 2022.Cham :Springer International Publishing :Imprint: Palgrave Macmillan,2022.1 online resource (269 pages)Print version: Campagna, Desirée Participatory Governance and Cultural Development Cham : Springer International Publishing AG,c2022 9783030816476 Includes bibliographical references and index.1. Introduction -- 2. The Impacts of Participatory Governance through the Perspective of the Democratic Theory -- 3. Participatory Governance and Cultural Development: A Framework of Causal Mechanisms -- 4. Participatory Governance in Marseille-Provence and Košice 2013 -- 5. Participation in the presence of fully-fledged trust: Explaining Cultural Development in the Project PARCeque and in the Exchanger Obrody -- 6. Participation in the absence of fully-fledged trust: Contestation in the Project Jardins Possibles and Lack of Social Cohesion in the Exchanger Važecká -- 7. Conclusion.This book analyses the impact of participatory governance on cultural development, explaining why cultural participatory practices can lead either to positive sustainable effects or to unexpected and controversial ones. It focuses on four projects realized in the two European Capitals of Culture of 2013 - Marseille-Provence (France) and Košice (Slovakia) - within the Programme 'Quartiers Créatifs' and the SPOTs Programme. By combining different strands of the Democratic Theory and applying the process tracing methodology, the book argues that participation produces cultural developmental processes only when a certain intensity of trust is reached among the various stakeholders. In the presence of fully-fledged trust, participation activates a reinforcing chain of capacity-building and social capital that nurture long-term cultural networks. On the contrary, in the absence of fully-fledged trust, participation can generate contestation movements or isolated cultural production. Uniquely, the book challenges the 'optimistic aura' of participatory governance of culture, showing its conflicting but always productive nature. Desirée Campagna is a researcher in policy analysis and evaluation, focusing on the cultural and social sectors. She specializes in cultural rights, intercultural and educational policies, participatory governance, and impact evaluation methodologies.Political sciencePolitical planningGovernance and GovernmentPolicy EvaluationPolitical science.Political planning.Governance and Government.Policy Evaluation.306.0944912306.2Campagna Desirée1214064MiAaPQMiAaPQMiAaPQ9910552714503321Participatory Governance and Cultural Development2803795UNINA13400nam 22005893 450 991101945510332120231121080239.0978139421394813942139489781394213924139421392110.1002/9781394213948(MiAaPQ)EBC30954412(Au-PeEL)EBL30954412(OCoLC)1410591885(OCoLC-P)1410591885(CaSebORM)9781394213597(CKB)28887501600041(Perlego)4293217(EXLCZ)992888750160004120231121d2024 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAutomated Secure Computing for Next-Generation Systems1st ed.Newark :John Wiley & Sons, Incorporated,2024.©2024.1 online resource (468 pages)Description based upon print version of record.Chapter 4 Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications for Next-Generation SocietyPrint version: Tyagi, Amit Kumar Automated Secure Computing for Next-Generation Systems Newark : John Wiley & Sons, Incorporated,c2024 9781394213597 Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgements -- Part 1: Fundamentals -- Chapter 1 Digital Twin Technology: Necessity of the Future in Education and Beyond -- 1.1 Introduction -- 1.2 Digital Twins in Education -- 1.2.1 Virtual Reality for Immersive Learning -- 1.2.2 Delivery of Remote Education -- 1.2.3 Replication of Real-World Scenarios -- 1.2.4 Promote Intelligences and Personalization -- 1.3 Examples and Case Studies -- 1.3.1 Examples of DTT in Education -- 1.3.2 Digital Twin-Based Educational Systems -- 1.4 Discussion -- 1.5 Challenges and Limitations -- 1.5.1 Technical Challenges -- 1.5.2 Pedagogical Challenges -- 1.5.3 Ethical and Privacy Concerns -- 1.5.4 Future Research Directions -- 1.6 Conclusion -- References -- Chapter 2 An Intersection Between Machine Learning, Security, and Privacy -- 2.1 Introduction -- 2.2 Machine Learning -- 2.2.1 Overview of Machine Learning -- 2.2.2 Machine Learning Stages: Training and Inference -- 2.3 Threat Model -- 2.3.1 Attack Model of Machine Learning -- 2.3.2 Trust Model -- 2.3.3 Machine Learning Capabilities in a Differential Environment -- 2.3.4 Opposite Views of Machine Learning in Security -- 2.4 Training in a Differential Environment -- 2.4.1 Achieving Integrity -- 2.5 Inferring in Adversarial Attack -- 2.5.1 Combatants in the White Box Model -- 2.5.2 Insurgencies in the Black Box Model -- 2.6 Machine Learning Methods That Are Sustainable, Private, and Accountable -- 2.6.1 Robustness of Models to Distribution Drifts -- 2.6.2 Learning and Inferring With Privacy -- 2.6.3 Fairness and Accountability in Machine Learning -- 2.7 Conclusion -- References -- Chapter 3 Decentralized, Distributed Computing for Internet of Things-Based Cloud Applications -- 3.1 Introduction to Volunteer Edge Cloud for Internet of Things Utilising Blockchain.3.2 Significance of Volunteer Edge Cloud Concept -- 3.3 Proposed System -- 3.3.1 Smart Contract -- 3.3.2 Order Task Method -- 3.3.3 KubeEdge -- 3.4 Implementation of Volunteer Edge Control -- 3.4.1 Formation of a Cloud Environment -- 3.5 Result Analysis of Volunteer Edge Cloud -- 3.6 Introducing Blockchain-Enabled Internet of Things Systems Using the Serverless Cloud Platform -- 3.7 Introducing Serverless Cloud Platforms -- 3.7.1 IoT Systems -- 3.7.2 JointCloud -- 3.7.3 Computing Without Servers -- 3.7.4 Oracle and Blockchain Technology -- 3.8 Serverless Cloud Platform System Design -- 3.8.1 Aim and Constraints -- 3.8.2 Goals and Challenges -- 3.8.3 HCloud Connections -- 3.8.4 Data Sharing Platform -- 3.8.5 Cloud Manager -- 3.8.6 The Agent -- 3.8.7 Client Library -- 3.8.8 Witness Blockchain -- 3.9 Evaluation of HCloud -- 3.9.1 CPU Utilization -- 3.9.2 Cost Analysis -- 3.10 HCloud-Related Works -- 3.10.1 Serverless -- 3.10.2 Efficiency -- 3.11 Conclusion -- References -- Chapter 4 Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications for Next-Generation Society -- 4.1 Introduction -- 4.2 Background Work -- 4.3 Motivation -- 4.4 Existing Innovations in the Current Society -- 4.5 Expected Innovations in the Next-Generation Society -- 4.6 An Environment with Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.7 Open Issues in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.8 Research Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.9 Legal Challenges in Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications -- 4.10 Future Research Opportunities Towards Artificial Intelligence-Blockchain-Enabled-Internet of Things-Based Cloud Applications.4.11 An Open Discussion -- 4.12 Conclusion -- References -- Chapter 5 Artificial Intelligence for Cyber Security: Current Trends and Future Challenges -- 5.1 Introduction: Security and Its Types -- 5.1.1 Human Aspects of Information Security -- 5.2 Network and Information Security for Industry 4.0 and Society 5.0 -- 5.2.1 Industry 4.0 vs Society 5.0 -- 5.2.2 Industry 4.0 to Society 5.0 -- 5.3 Internet Monitoring, Espionage, and Surveillance -- 5.4 Cyber Forensics with Artificial Intelligence and without Artificial Intelligence -- 5.5 Intrusion Detection and Prevention Systems Using Artificial Intelligence -- 5.6 Homomorphic Encryption and Cryptographic Obfuscation -- 5.7 Artificial Intelligence Security as Adversarial Machine Learning -- 5.8 Post-Quantum Cryptography -- 5.9 Security and Privacy in Online Social Networks and Other Sectors -- 5.10 Security and Privacy Using Artificial Intelligence in Future Applications/Smart Applications -- 5.11 Security Management and Security Operations Using Artificial Intelligence for Society 5.0 and Industry 4.0 -- 5.11.1 Implementation on the Internet of Things and Protecting Data in IoT Connected Devices -- 5.12 Digital Trust and Reputation Using Artificial Intelligence -- 5.13 Human-Centric Cyber Security Solutions -- 5.14 Artificial Intelligence-Based Cyber Security Technologies and Solutions -- 5.15 Open Issues, Challenges, and New Horizons Towards Artificial Intelligence and Cyber Security -- 5.15.1 An Overview of Cyber-Security -- 5.15.2 The Role of Artificial Intelligence in Cyber Security -- 5.15.3 AI Is Continually Made Smarter -- 5.15.4 AI Never Misses a Day of Work -- 5.15.5 AI Swiftly Spots the Threats -- 5.15.6 Impact of AI on Cyber Security -- 5.15.7 AI in Cyber Security Case Study -- 5.16 Future Research with Artificial Intelligence and Cyber Security -- 5.17 Conclusion -- References.Part 2: Methods and Techniques -- Chapter 6 An Automatic Artificial Intelligence System for Malware Detection -- 6.1 Introduction -- 6.2 Malware Types -- 6.3 Structure Format of Binary Executable Files -- 6.4 Malware Analysis and Detection -- 6.5 Malware Techniques to Evade Analysis and Detection -- 6.6 Malware Detection With Applying AI -- 6.7 Open Issues and Challenges -- 6.8 Discussion and Conclusion -- References -- Chapter 7 Early Detection of Darknet Traffic in Internet of Things Applications -- 7.1 Introduction -- 7.2 Literature Survey -- 7.3 Proposed Work -- 7.3.1 Drawback -- 7.4 Analysis of the Work -- 7.5 Future Work -- 7.6 Conclusion -- References -- Chapter 8 A Novel and Efficient Approach to Detect Vehicle Insurance Claim Fraud Using Machine Learning Techniques -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Implementation and Analysis -- 8.3.1 Dataset Description -- 8.3.2 Methodology -- 8.3.3 Checking for Missing Values -- 8.3.4 Exploratory Data Analysis -- 8.4 Conclusion -- 8.4.1 Future Work -- 8.4.2 Limitations -- References -- Chapter 9 Automated Secure Computing for Fraud Detection in Financial Transactions -- 9.1 Introduction -- 9.2 Historical Perspective -- 9.3 Previous Models for Fraud Detection in Financial Transactions -- 9.3.1 CatBoost -- 9.3.2 XGBoost -- 9.3.3 LightGBM -- 9.4 Proposed Model Based on Automated Secure Computing -- 9.5 Discussion -- 9.6 Conclusion -- References -- Additional Readings -- Chapter 10 Data Anonymization on Biometric Security Using Iris Recognition Technology -- 10.1 Introduction -- 10.2 Problems Faced in Facial Recognition -- 10.3 Face Recognition -- 10.4 The Important Aspects of Facial Recognition -- 10.5 Proposed Methodology -- 10.6 Results and Discussion -- 10.7 Conclusion -- References -- Chapter 11 Analysis of Data Anonymization Techniques in Biometric Authentication System.11.1 Introduction -- 11.2 Literature Survey -- 11.3 Existing Survey -- 11.3.1 Biometrics Technology -- 11.3.2 Palm Vein Authentication -- 11.3.3 Methods of Palm Vein Authentication -- 11.3.4 Limitations of the Existing System -- 11.4 Proposed System -- 11.4.1 Biometric System -- 11.4.2 Data Processing Technique -- 11.4.3 Data-Preserving Approach -- 11.4.3.1 Generalization -- 11.4.3.2 Suppression -- 11.4.3.3 Swapping -- 11.4.3.4 Masking -- 11.5 Implementation of AI -- 11.6 Limitations and Future Works -- 11.7 Conclusion -- References -- Part 3: Applications -- Chapter 12 Detection of Bank Fraud Using Machine Learning Techniques -- 12.1 Introduction -- 12.2 Literature Review -- 12.3 Problem Description -- 12.4 Implementation and Analysis -- 12.4.1 Workflow -- 12.4.2 Dataset -- 12.4.3 Methodology -- 12.5 Results -- 12.6 Conclusion -- 12.7 Future Works -- References -- Chapter 13 An Internet of Things-Integrated Home Automation with Smart Security System -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 Methodology and Working Procedure with Diagrams -- 13.4 Research Analysis -- 13.5 Establishment of the Prototype -- 13.6 Results and Discussions -- 13.7 Conclusions -- Acknowledgment -- References -- Chapter 14 An Automated Home Security System Using Secure Message Queue Telemetry Transport Protocol -- 14.1 Introduction -- 14.2 Related Works -- 14.2.1 PIR Home Security Solutions -- 14.2.2 Solutions for MQTT Security -- 14.2.3 Solutions for Home Automation -- 14.3 Proposed Solution -- 14.3.1 Technological Decisions -- 14.3.2 Hardware Decision -- 14.3.3 Module Overview -- 14.4 Implementation -- 14.5 Results -- 14.6 Conclusion and Future Work -- References -- Chapter 15 Machine Learning-Based Solutions for Internet of Things-Based Applications -- 15.1 Introduction -- 15.2 IoT Ecosystem -- 15.2.1 IoT Devices -- 15.2.2 IoT Gateways -- 15.2.3 IoT Platforms.15.2.4 IoT Applications.AUTOMATED SECURE COMPUTING FOR NEXT-GENERATION SYSTEMS This book provides cutting-edge chapters on machine-empowered solutions for next-generation systems for today's society. Security is always a primary concern for each application and sector. In the last decade, many techniques and frameworks have been suggested to improve security (data, information, and network). Due to rapid improvements in industry automation, however, systems need to be secured more quickly and efficiently. It is important to explore the best ways to incorporate the suggested solutions to improve their accuracy while reducing their learning cost. During implementation, the most difficult challenge is determining how to exploit AI and ML algorithms for improved safe service computation while maintaining the user's privacy. The robustness of AI and deep learning, as well as the reliability and privacy of data, is an important part of modern computing. It is essential to determine the security issues of using AI to protect systems or ML-based automated intelligent systems. To enforce them in reality, privacy would have to be maintained throughout the implementation process. This book presents groundbreaking applications related to artificial intelligence and machine learning for more stable and privacy-focused computing. By reflecting on the role of machine learning in information, cyber, and data security, Automated Secure Computing for Next-Generation Systems outlines recent developments in the security domain with artificial intelligence, machine learning, and privacy-preserving methods and strategies. To make computation more secure and confidential, the book provides ways to experiment, conceptualize, and theorize about issues that include AI and machine learning for improved security and preserve privacy in next-generation-based automated and intelligent systems. Hence, this book provides a detailed description of the role of AI, ML, etc., in automated and intelligent systems used for solving critical issues in various sectors of modern society. Audience Researchers in information technology, robotics, security, privacy preservation, and data mining. The book is also suitable for postgraduate and upper-level undergraduate students.Computer securityComputer security.005.8Tyagi Amit Kumar1348158MiAaPQMiAaPQMiAaPQBOOK9911019455103321Automated Secure Computing for Next-Generation Systems4419674UNINA