04316nam 22005535 450 991055426560332120210621102733.03-95553-549-510.11129/9783955535490(CKB)5470000000571087(DE-B1597)583021(DE-B1597)9783955535490(OCoLC)1257324880(MiAaPQ)EBC32408805(Au-PeEL)EBL32408805(EXLCZ)99547000000057108720210621h20212021 fg gerur|||||||||||txtrdacontentcrdamediacrrdacarrierCORPORATE TIMBER. SCHRAUBENWERK MIT HOLZ Die Grenzen von Laubholz ausloten / Pushing the Limits of Hardwood /hrsg. von Marko Sauer1st ed.München : DETAIL, [2021]©20211 online resource (192 p.) zahlreiche Zeichnungen und Fotos3-95553-548-7 Frontmatter -- Contents -- Ein Quantensprung für den Holzbau A Quantum Leap for Timber Construction -- Ansetzen / Positioning -- DIE EINHEIT VON PRODUKT UND HÜLLE / THE UNITY OF PRODUCT AND CASE -- HOLZ IM GEWERBEBAU / WOOD IN COMMERCIAL CONSTRUCTION -- EINE ARCHITEKTUR DER ARBEIT / AN ARCHITECTURE OF INDUSTRY -- Eindrehen / Driving in -- HAUSEIGENES EXPONAT / ON-SITE EXHIBITION -- AN DEN GRENZEN DES MATERIALS HOLZ / PUSHING THE LIMITS OF WOOD AS A BUILDING MATERIAL -- LEBENSZYKLUSANALYSE / LIFE CYCLE ASSESSMENT -- Verbinden / Connecting -- ÜBER DAS AUSLOTEN VON GRENZEN / TESTING THE LIMITS -- FÜR DEN MENSCHEN GEBAUT / BUILT FOR THE PEOPLE -- Autorinnen, Autoren AuthorsDie neue Produktionshalle des SWG Schraubenwerks Gaisbach ist ein Pioniergebäude der Holzkonstruktion. Ihre Architektur setzt neue Maßstäbe für den Einsatz von Laubholz und lotet die Grenzen des zukunftsweisenden nachwachsenden Baumaterials neu aus. Schlanke Fachwerke verleihen dem Werksgebäude eine filigrane Anmutung, die mächtigen Hauptstützen leiten enorme Kräfte ab. In allen Details steckt handwerkliche sowie ingenieurtechnische Innovation. Im Zusammenspiel dieser Faktoren ist ein wegweisendes Gebäude entstanden, das effiziente Grundrisse, eine angenehme Atmosphäre und eine nachhaltige Bauweise im Sinne der Corporate Identity vereint. Das Schraubenwerk zeigt das Zukunftspotenzial für die Verwendung von Holz im Industriebau auf. In diesem Buch ist das Projekt umfassend dokumentiert.The new SWG Schraubenwerk Gaisbach production hall blazes new trails in timber construction. Its architecture sets new standards in hardwood use and probes the limits of this forward-looking renewable building material in a novel way. Slender trusses give the factory building a delicate look as powerful supports absorb immense loads. Every detail of the building is a testament to innovation in craftsmanship and engineering. The interplay of these factors culminates in a ground-breaking building that harmonises efficient floor plans, a pleasant atmosphere, and sustainable construction in line with corporate identity. The fastener production hall demonstrates the potential of wood in industrial construction. This book features comprehensive documentation of the project.ARCHITECTURE / Methods & MaterialsbisacshARCHITECTURE / Methods & Materials.694ZI 7400rvkHegner-Van Rooden Clementine, ctbhttps://id.loc.gov/vocabulary/relators/ctbIsopp Anne, ctbhttps://id.loc.gov/vocabulary/relators/ctbJacob-Freitag Susanne, ctbhttps://id.loc.gov/vocabulary/relators/ctbKönig Holger, ctbhttps://id.loc.gov/vocabulary/relators/ctbMott Tina, ctbhttps://id.loc.gov/vocabulary/relators/ctbRota Aldo, ctbhttps://id.loc.gov/vocabulary/relators/ctbSauer Marko, ctbhttps://id.loc.gov/vocabulary/relators/ctbSauer Marko, edthttp://id.loc.gov/vocabulary/relators/edtDE-B1597DE-B1597BOOK9910554265603321CORPORATE TIMBER. SCHRAUBENWERK MIT HOLZ2820075UNINA11757nam 22004933 450 991100843030332120251125033317.01-80441-549-99781804415498(MiAaPQ)EBC31338105(CKB)31995243500041(Au-PeEL)EBL31338105(OCoLC)1434176826(EXLCZ)993199524350004120251121d2024 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierEthical Computing From Meta Ethics to Data Ethics1st ed.Bradford :Ethics International Press Limited,2024.©2024.1 online resource (509 pages)1-80441-548-0 Praise for Ethical Computing: From Meta Ethics to Data Ethics -- Preface -- Acknowledgements -- Chapter 1 Introduction -- The Context -- The Changes -- Finance and Banking Operations -- Digital Divide -- Work-life and Employment -- Democratic Values over the Internet -- The Problem -- Responsibility -- Accountability/ Liability -- Contractual Relationship -- Negligence -- Categorical Imperative and the buying/selling relationship -- Summary -- The Demand -- The Role of the Computer Professional -- Need for Ethical Standards -- Need for New Anti-Risk Mechanisms -- Conclusion -- References -- Chapter 2 The Computer-Ethics Connection - Computer Ethics &amp -- Ethical Computing Defined -- Introduction -- The Computer-Law-Ethics Connection -- Why Computer Ethics? -- The Argument Against 'Uniqueness' -- Premise 1 -- Premise 2 -- Conclusion -- The Argument For 'Uniqueness' -- Premise 1 -- Premise 2 -- Premise 3 -- Premise 4 -- Conclusion -- The Genus-species Approach (Lee, 2006-12, 2014-21): -- Philosophical views -- Practical views -- An Alternative Definition of Computer Ethics -- The Traditional View -- Classic definition -- Classic cases -- Dual Role of Ethics (Lee, 2015, p. 2994): -- The ethics &amp -- professionalism competencies (Lee, 2006-12, 2014-21): -- An Alternative View - a New Definition of Computer Ethics -- A different type of risk -- A different kind of anti-risk mechanism -- An academic discipline -- An applicable paradigm (Ethical Computing) -- Ethical Computing Defined -- Conclusion -- References -- Chapter 3 The Computer-Philosophy Connection: The Underpinning Ethical Principles -- Introduction -- Ethical Theories -- Why Ethical Theories -- Categories of Ethical Theories -- Meta-Ethics -- Metaphysical Issues -- Objectivism -- Voluntarism -- Skepticism -- Relativism -- Psychological Issues -- Egoism (Psychological).Hedonism (Psychological) -- Altruism (Psychological) -- Emotionalism -- Prescriptivism -- Rationalism -- Gender morality -- Normative Ethics -- Golden/Silver Rule -- Duty &amp -- Rights based Theories -- Deontology -- Kantianism/Categorical Imperative -- Consequentialist Normative Theories -- Consequentialism -- Ethical Egoism -- Ethical Altruism -- Utilitarianism -- Social Contract Theory -- Rawls' Theory of Justice -- Virtue Ethics -- Applied Ethics -- Characteristics of applied ethical issues -- Normative principles of applied ethics -- Summary of Common Ethical Principles -- Relativistic Ethics -- Duty and Rights Based Ethics -- Results-based Ethics -- Ethics of reciprocity -- Conclusion -- References -- Chapter 4 The Computer-Law Connection: Computer Laws Evolved -- Introduction -- Computer Security -- Computer Risks -- Inherent risks -- Application-oriented risks -- Development-oriented risks -- Software-oriented risks -- Hidden risks -- Computer Viruses -- How it works -- How it spreads? -- Who and why? -- Computer Crimes -- Category 1 crimes -- Category 2 crimes -- The roles of a computer in computer crimes -- The rise of computer crimes -- Generic examples of computer crimes -- Some Hong Kong cases -- Counter-measures -- Operations security -- Personnel security -- Computer-related Laws -- Computer-related Laws in Hong Kong -- Computer Crime Ordinance (Cap 23) -- Personal Data (Privacy) Ordinance (Cap 486) (Office of the Privacy Commissioner for Data Privacy, Hong Kong, n.d.) -- Other Laws (amended existing laws) -- Other laws also amended -- Classical Cases in Hong Kong -- Computer-related Laws in Other Countries (a select sample, Table 2) -- Conclusion -- References -- Chapter 5 Current Major Issues: Data Privacy -- Introduction -- Privacy -- Definition of Privacy -- Concept of privacy -- Notion of access -- Notion of situation.Notion of condition -- Definition 1 (Access) -- Definition 2 (Right, Condition) -- Concluding remarks -- Benefits of Privacy -- Harms of Privacy -- Rights to Privacy -- Value/Importance of Privacy -- Universal value -- Intrinsic value -- Core value -- Social value -- A Common Misuse of the Term Privacy -- Data Privacy -- What Data Privacy Is and Is Not -- Why Personal Privacy is Special in Cyberspace -- Category of Privacy -- The concept of privacy category -- Generally held categories of privacy -- Clarke's categorization of privacy -- Solove's taxonomy of privacy problems -- The seven types of privacy by Finn et al -- Protection of Data Privacy -- The problem of data privacy protection -- Data privacy protection and changes in demand and status -- Methods of protection -- Advice about personal data protection -- Cost of privacy protection -- Precautionary tips -- A pragmatic step forward -- Conclusion -- References -- Chapter 6 Current Major Issues: Intellectual Property -- Introduction -- Protection of Intellectual Property -- Concept of Intellectual Property -- Notion of Property Rights -- Privacy Rights and Property Rights -- Methods of Intellectual Property Protection -- Copyright -- Patent -- Trade secret -- Trademarks &amp -- service marks -- A Cocktail Approach -- Trade secrets vs Patent -- IP Rights -- Under the Social Contract Theory perspective -- Under the Kantian categorical imperative perspective -- Under the utilitarian perspective -- Under the consequentialist perspective -- Benefits &amp -- Limits of IP Protection -- Benefits of IP protection -- Limits to IP protection -- Software as an Intellectual Property -- Software Copyright -- Software Ownership -- Morality Of Copying Proprietary Software -- Is it wrong to copy proprietary software? -- Is copying software harmful? -- Is copying software immoral because it is illegal?.Conclusion -- References -- Chapter 7 Current Major Issues: Others -- Introduction -- Digital Divide -- Global Divide -- Social Divide -- Issues of Current Interest -- A Real-life Case -- Anonymity -- Anonymity and security -- Trap of pseudo-anonymity -- No secret over the Internet -- The shielding - the misconstrued belief (eSafety Commission, 2021) -- Hiding email address -- Professionalism -- Profession -- Characteristics of a profession -- Is Computing a Profession? -- A comparison of ICT with Medicine/Law -- Professional -- Professional relationships -- Strongly differentiated and non-differentiated professional -- Ethics &amp -- Professionalism -- The functional areas and respective conveners -- The eighteen generic competencies -- Netiquette -- Amalgamation of Views -- Rules of Netiquette -- The ten core rules of netiquette (Cyberdefender.hk, n.d.) -- The ten netiquette rules (Einorytė, 2023) -- The 20 Internet etiquette rules (Kaspersky, 2023) -- The 10 basic netiquette rules (Hartney, 2023) -- The 10 netiquette guidelines every online student needs to know (Brook, 2019) -- My List of Dos &amp -- Don'ts -- Cyberbullying -- Conclusion -- References -- Chapter 8 Tools &amp -- Methods: Logical Analysis -- Introduction -- Critical Thinking -- What Is Critical Thinking? -- Meaning and definition -- What critical thinking is not -- Why Is It Difficult? -- How To Do It? -- How Do We Know We Are Doing It? -- Critical Thinkers and Non-critical thinkers -- Critical thinkers -- Non-critical thinkers -- How to become a critical thinker? -- Outcome of Critical Thinking -- Three Practical Tips -- Logical Argument Analysis -- Structure of Logical Argument -- Logical Fallacy -- Type 1: False cause fallacy -- Type 2: Ad hominem argument -- Type 3: Fallacy of ambiguity -- Type 4: Slippery slope argument -- Type 5: The many/any fallacy.Type 6: Fallacy of composition/fallacy of division -- Type 7: Fallacy of appeal to authority -- Type 8: Begging the question -- Type 9: Appeal to the people -- Type 10: The "virtuality" fallacy -- Types of Argument -- Valid and invalid arguments -- Sound &amp -- unsound arguments -- Inductive &amp -- fallacious arguments -- Summary of argument types -- Constructing an Argument -- Test of Validity -- Conclusion -- References -- Chapter 9 Tools &amp -- Methods: Ethical Decision Making -- Introduction -- Ethical Decision-Making and Analysis Guidelines -- The Four Principles of Ethical Decision Making -- Harm minimization -- Deontological principle -- Consequentialist principle -- Principle of consistency and respect (Kantian categorical imperative) -- Illustration -- The Practical Approaches To Decision-Making -- Legal approach -- Formal guidelines -- Informal guidelines -- Menu-Driven Linear Checklists -- The 4-step analysis -- The 5-step of principled reasoning -- The 7-step path for making ethical decisions -- Privacy Impact Assessment -- Data processing cycle analysis -- Privacy Risk Analysis -- PIA Reporting -- Illustration -- The story of Case N - The CIO's Dilemma -- The Analysis -- Step 1 - Analyze the situation -- Step 2 - Make a defensible ethical decision -- Step 3 - describe solution steps -- Step 4 - Prepare policies and strategies to prevent recurrence -- Conclusion -- References -- Chapter 10 Tools &amp -- Methods: Ethical Analytics -- Introduction -- Ethical Matrix -- Origin of the Matrix -- Elements of the Matrix -- Column -- Row -- Cell -- The Practical Value of the Matrix -- Expected outcomes and precondition -- Efficacy -- Adaptability -- Development of the Ethical Matrix Algorithm (µemx Algorithm) -- Quantification for Ethical Evaluation -- The variables -- The procedure (called µhmc Algorithm) -- Illustration of the procedure.Hexa-Dimension Metric.Ethical Computing is a means to an end as well as an end to itself; a problem, and a solution to a problem. It is the application of computer ethics in striving for doing-the-right-thing effectively in cyberspace or an information-intensive and technology-driven environment. The book addresses the realities of using computers while measuring up to the hexa-dimension metric (technically effective, financially viable, legally valid, ethically and socially acceptable and ecologically sustainable) manifested in applications from problem to ethical solution. This book collects work and research in practise and teaching across decades, covering a multitude of fields including information technology and engineering, computer audit & data governance, law practice and enforcement, and public and business administration. This is useful reference for researchers, teachers and students in all fields of information technology. It will also be useful for Chief Information Officers and Chief Technology Officers (CIOs and CTOs) and information systems auditors, and specialist IT law practitioners.Electronic data processingMoral and ethical aspectsElectronic data processingMoral and ethical aspects.174.90904Lee Wanbil1827271MiAaPQMiAaPQMiAaPQBOOK9911008430303321Ethical computing4395375UNINA03372nam 2200697Ia 450 991095678770332120200520144314.097866106293509781280629358128062935597800804613590080461352(CKB)1000000000350096(EBL)269775(OCoLC)659561253(SSID)ssj0000308922(PQKBManifestationID)11227395(PQKBTitleCode)TC0000308922(PQKBWorkID)10260389(PQKB)11150436(Au-PeEL)EBL269775(CaPaEBR)ebr10138663(CaONFJC)MIL62935(OCoLC)701880305(PPN)170245772(FR-PaCSA)88809513(MiAaPQ)EBC269775(FRCYB88809513)88809513(EXLCZ)99100000000035009620050525d2005 fy 0engur|n|---|||||txtccrScaling of structural strength /Zdenek P. Bazant2nd ed.Oxford ;Burlington, MA Elsevier/Butterworth-Heinemann20051 online resource (342 p.)Previous ed.: London: Hermes Penton Science, 2001.9780750668491 0750668490 Includes bibliographical references (p. [269]-312) and indexes.Cover; table of contents; Foreword; Author's Preface; About the Author; 1 Introduction; 2 Asymptotic Analysis of Size Effect; 3 Randomness and Disorder; 4 Energetic Scaling for Sea Ice and Concrete Structures; 5 Energetic Scaling of Compression Fracture and Further Applications to Concrete, Rock and Composites; 6 Scaling via J-integral, With Application to Kink Bands in Fiber Composites; 7 Time Dependance, Repeated Loads and Energy Absorption Capacity; 8 Computational Approaches to Quasibrittle Fracture and Its Scaling9 New Asymptotic Scaling Analysis of Cohesive Crack Model and Smeared-Tip Method10 Size Effect at Continuum Limit on Approach to Atomic Lattice Scale; 11 Future Perspectives; Addendum; Bibliography; index; Subject Index; Reference Citation IndexThis book is concerned with a leading-edge topic of great interest and importance, exemplifying the relationship between experimental research, material modeling, structural analysis and design. It focuses on the effect of structure size on structural strength and failure behaviour. Bazant's theory has found wide application to all quasibrittle materials, including rocks, ice, modern fiber composites and tough ceramics. The topic of energetic scaling, considered controversial until recently, is finally getting the attention it deserves, mainly as a result of Bazant's pioneering work. IStructural analysis (Engineering)Strength of materialsScaling laws (Statistical physics)Structural analysis (Engineering)Strength of materials.Scaling laws (Statistical physics)624.171Bažant Z. P32043MiAaPQMiAaPQMiAaPQBOOK9910956787703321Scaling of structural strength1212922UNINA