Chesalov Alexander - The fourth industrial revolution glossarium: over 1500 of the hottest terms you will use to create the future. Textbook стр 19.

Шрифт
Фон

Customer Journey Tracking (analysis of user behavior)  the term designates the data-based analysis of buying decision processes. If the customer buys online, it is possible to reconstruct the decision-making path of the client using special tracking tools. For example, when using the tool it is possible to find out how many advertising contacts were necessary to activate the purchase of a specific product302.


Customer relationship management (CRM) is the combination of practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle. The goal is to improve customer service relationships and assist in customer retention and drive sales growth. CRM systems compile customer data across different channels, or points of contact, between the customer and the company, which could include the companys website, telephone, live chat, direct mail, marketing materials and social networks. CRM systems can also give customer-facing staff members detailed information on customers personal information, purchase history, buying preferences and concerns303.


Cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, society, or organizations, and it may originate from an anonymous source304.


Cybercrime also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government305.


Cyber-Physical Production Systems (CPPS) it is when physical and digital items are connected, monitored and managed with computer programming and algorithms306.


Cyber-physical systems are intelligent networked systems with built-in sensors, processors and drives that are designed to interact with the physical environment and support the operation of computer information systems in real time; cloud computing is an information technology model for providing ubiquitous and convenient access using the information and telecommunications network «Internet» to a common set of configurable computing resources («cloud»), data storage devices, applications and services that can be promptly provided and relieved from the load with minimal operating costs or almost without the participation of the provider.


Cyber-resilience this is a «new» term, and only used in specific contexts of modern business challenges. Check it out the World Economic Forum definition: At its simplest, being cyber-resilient means taking measures to prevent and protect against the criminal or unauthorized use of electronic data. As digital transformation gathers pace, Cyber-resilience will move up the worlds agenda. The number of data breaches is increasing, as is the severity of the attacks. Based on the Gemalto Breach Level Index, the first half of 2018 saw 945 data breaches affecting 4.5 billion records, a 133% increase over the same period last year. More than 90% of events involved unencrypted data and 65% identity theft. A significant number of breaches involved government records. The Forum recently published the 2018 Global Risk report, showing the increasing risks to cybersecurity over the past decade. More pointedly a respondent pool of 12,500 companies covering the three largest regions of North America, Europe and EAPAC named digital Cyber-resilience as the biggest global risk. Business, government and citizens all stand to lose if we cannot create a safe digital environment to capture the potential gains from the Fourth Industrial Revolution307.


Cybersecurity are the processes employed to safeguard and secure assets used to carry information of an organisation from being stolen or attacked. It requires extensive knowledge of the possible threats. Identity management, risk management and incident management form the crux of cyber security strategies of an organization. Also, Cybersecurity is protection against unauthorized entry or use of electronic data or systems using technologies, processes and controls, networks, programs, devices, data, and other IoT solutions. The goal is to reduce the risk of cyberattacks308,309.


Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspaces core feature is an interactive and virtual environment for a broad range of participants. In the common IT lexicon, any system that has a significant user base or even a well-designed interface can be thought to be «cyberspace»310.


Cybersquatting refers to the unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names. Cybersquatting registrants obtain and use the domain name with the bad faith intent to profit from the goodwill of the actual trademark owner311.


Cyberthreat is the spread of malicious information and spam on the Web that threatens the personal information security of a person, company, state.


Сloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centred on the benefits of converged infrastructure and shared services for robotics. When connected to the cloud, robots can benefit from the powerful computation, storage, and communication resources of modern data center in the cloud, which can process and share information from various robots or agent (other machines, smart objects, humans, etc.). Humans can also delegate tasks to robots remotely through networks. Cloud computing technologies enable robot systems to be endowed with powerful capability whilst reducing costs through cloud technologies. Thus, it is possible to build lightweight, low cost, smarter robots have intelligent brain in the cloud. The brain consists of data center, knowledge base, task planners, deep learning, information processing, environment models, communication support, etc.312.


Сonstructed language (Also conlang) is a language whose phonology, grammar, and vocabulary are consciously devised, instead of having developed naturally. Constructed languages may also be referred to as artificial, planned, or invented languages.


Сonvolutional neural network  in deep learning, a convolutional neural network (CNN, or ConvNet) is a class of deep neural networks, most commonly applied to analyzing visual imagery. CNNs use a variation of multilayer perceptrons designed to require minimal preprocessing. They are also known as shift invariant or space invariant artificial neural networks (SIANN), based on their shared-weights architecture and translation invariance characteristics. Сonvolutional neural network is a class of artificial neural network most commonly used to analyze visual images. They are also known as Invariant or Spatial Invariant Artificial Neural Networks (SIANN) based on an architecture with a common weight of convolution kernels or filters that slide over input features and provide equivalent translation responses known as feature maps.

Ваша оценка очень важна

0
Шрифт
Фон

Помогите Вашим друзьям узнать о библиотеке

Скачать книгу

Если нет возможности читать онлайн, скачайте книгу файлом для электронной книжки и читайте офлайн.

fb2.zip txt txt.zip rtf.zip a4.pdf a6.pdf mobi.prc epub ios.epub fb3