|
Books > Computing & IT
This provocative book investigates the relationship between law and
artificial intelligence (AI) governance, and the need for new and
innovative approaches to regulating AI and big data in ways that go
beyond market concerns alone and look to sustainability and social
good. Taking a multidisciplinary approach, the contributors
demonstrate the interplay between various research methods, and
policy motivations, to show that law-based regulation and
governance of AI is vital to efforts at ensuring justice, trust in
administrative and contractual processes, and inclusive social
cohesion in our increasingly technologically-driven societies. The
book provides valuable insights on the new challenges posed by a
rapid reliance on AI and big data, from data protection regimes
around sensitive personal data, to blockchain and smart contracts,
platform data reuse, IP rights and limitations, and many other
crucial concerns for law's interventions. The book also engages
with concerns about the 'surveillance society', for example
regarding contact tracing technology used during the Covid-19
pandemic. The analytical approach provided will make this an
excellent resource for scholars and educators, legal practitioners
(from constitutional law to contract law) and policy makers within
regulation and governance. The empirical case studies will also be
of great interest to scholars of technology law and public policy.
The regulatory community will find this collection offers an
influential case for law's relevance in giving institutional
enforceability to ethics and principled design.
Creativity has been integral to the development of the modern
State, and yet it is becoming increasingly sidelined, especially as
a result of the development of new machinic technologies including
3D printing. Arguing that inner creativity has been endangered by
the rise of administrative regulation, James Griffin explores a
number of reforms to ensure that upcoming regulations do take
creativity into account. The State of Creativity examines how the
State has become distanced from individual processes of creativity.
This book investigates how the failure to incorporate creativity
into administrative regulation is, in fact, adversely impacting the
regulation of new technologies such as 3D and 4D printing and
augmented reality, by focusing on issues concerning copyright and
patents. This is an important read for intellectual property law
scholars, as well as those studying computer science who wish to
gain a more in-depth understanding of the current laws surrounding
digital technologies such as 3D printing in our modern world. Legal
practitioners wanting to remain abreast of developments surrounding
3D printing will also benefit from this book.
Digital libraries have been established worldwide to make
information more readily available, and this innovation has changed
the way information seekers interact with the data they are
collecting. Faced with decentralized, heterogeneous sources, these
users must be familiarized with high-level search activities in
order to sift through large amounts of data. Information Seeking
Behavior and Challenges in Digital Libraries addresses the problems
of usability and search optimization in digital libraries. With
topics addressing all aspects of information seeking activity, the
research found in this book provides insight into library user
experiences and human-computer interaction when searching online
databases of all types. This book addresses the challenges faced by
professionals in information management, librarians, developers,
students of library science, and policy makers.
Though humans have been communicating through virtual mediators
since the invention of the telephone, new technologies make the use
of virtual communications even more immediate and pervasive than
ever before. By understanding the theories and models behind
virtual communication, one can understand the way society has been
changed and how it will continue to do so. Analyzing Digital
Discourse and Human Behavior in Modern Virtual Environments
examines the implications of virtual communication and online
interaction and the theories and trends associated with them. It
will discuss and address the differences and challenges that
develop when communicating virtually and explore the various
influences virtual communication plays in work, education, and
quotidian life. This title provides a foundation of emerging trends
from which new theories and models of communication can grow. This
book will become a cherished resource for academics, researchers,
technology developers, students, and government or institutional
leaders.
As computers continue to remain essential tools for the pursuit of
physics, medicine, economics, social sciences, and more,
supercomputers are proving that they can further extend and greatly
enhance as-of-yet undiscovered knowledge and solve the world's most
complex problems. As these instruments continue to lead to
groundbreaking discoveries and breakthroughs, it is imperative that
research remains up to date with the latest findings and uses. The
Handbook of Research on Methodologies and Applications of
Supercomputing is a comprehensive and critical reference book that
provides research on the latest advances of control flow and
dataflow supercomputing and highlights selected emerging big data
applications needing high acceleration and/or low power.
Consequently, this book advocates the need for hybrid computing,
where the control flow part represents the host architecture and
dataflow part represents the acceleration architecture. These
issues cover the initial eight chapters. The remaining eight
chapters cover selected modern applications that are best
implemented on a hybrid computer, in which the transactional parts
(serial code) are implemented on the control flow part and the
loops (parallel code) on the dataflow part. These final eight
chapters cover two major application domains: scientific computing
and computing for digital economy. This book offers applications in
marketing, medicine, energy systems, and library science, among
others, and is an essential source for scientists, programmers,
engineers, practitioners, researchers, academicians, and students
interested in the latest findings and advancements in
supercomputing.
Resources designed to support learners of the new next generation
BTEC First in Information Technology specification*. Covers all
three mandatory units and a wide selection of optional units. Each
unit of the Student Book is presented in topics to ensure the
content is accessible and engaging for learners. Covers of all the
underpinning knowledge and understanding needed at level 2 to
ensure that learners are fully prepared for this course. Activities
in each unit provide support and clear direction for learners and
can be used in the classroom or for independent work. New
Assessment Zone guides learners through both internal and external
assessment. Practice assignments and assessment guidance help
learners to achieve their potential in internally assessed units. *
From 2012, Pearson's BTEC First qualifications have been under
re-development, so schools and colleges could be teaching the
existing 2010 specification or the new next generation 2012-2013
specification. There are different Student Books to support each
specification. If learners are unsure, they should check with their
teacher or tutor.
Today more than ever, the line between national security and cyber
security is becoming increasingly erased. As recent attacks on US
infrastructure show (for example, the oil pipeline hack of 2021),
nontraditional threats ranging from hacking for the purposes of
extracting ransom to terrorist communications online are emerging
as central to national threat assessment. In an innovative fashion
that allows for the comparison of approaches to this nexus in the
developed and developing countries his volume brings together
European and African experts offering an in-depth analysis of the
relationship between national and cyber security. The individual
chapters theorize the current and future implications of global
digitalization; a cogent discussion of the threats French military
and security forces face in terms of cyber security failures from
within; and an exploration of the relationship between cyber
security and national security in the volatile Nigerian context.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
Ongoing advancements in modern technology have led to significant
developments with smart technologies. With the numerous
applications available, it becomes imperative to conduct research
and make further progress in this field. Smart Technologies:
Breakthroughs in Research and Practice provides comprehensive and
interdisciplinary research on the most emerging areas of
information science and technology. Including innovative studies on
image and speech recognition, human-computer interface, and
wireless technologies, this multi-volume book is an ideal source
for researchers, academicians, practitioners, and students
interested in advanced technological applications and developments.
Each Student Book and ActiveBook have has clearly laid out pages
with a range of supportive features to aid learning and teaching:
Getting to know your unit sections ensure learners understand the
grading criteria and unit requirements. Getting ready for
Assessment sections focus on preparation for external assessment
with guidance for learners on what to expect. Hints and tips will
help them prepare for assessment and sample answers are provided
for a range of question types including, short and long answer
questions, all with a supporting commentary. Learners can also
prepare for internal assessment using this feature. A case study of
a learner completing the internal assessment for that unit covering
'How I got started', 'How I brought it all together' and 'What I
got from the experience'. Pause Point feature provide opportunities
for learners to self-evaluate their learning at regular intervals.
Each Pause Point point feature gives learners a Hint or Extend
option to either revisit and reinforce the topic or to encourage
independent research or study skills. Case Study and Theory into
Practice features enable development of problem-solving skills and
place the theory into real life situations learners could
encounter. Assessment Activity/Practice provide scaffolded
assessment practice activities that help prepare learners for
assessment. Within each assessment practice activity, a Plan, Do
and Review section supports learners' formative assessment by
making sure they fully understand what they are being asked to do,
what their goals are and how to evaluate the task and consider how
they could improve. Dedicated Think Future pages provide case
studies from the industry, with a focus on aspects of skills
development that can be put into practice in a real work
environment and further study.
As human activities moved to the digital domain, so did all the
well-known malicious behaviors including fraud, theft, and other
trickery. There is no silver bullet, and each security threat calls
for a specific answer. One specific threat is that applications
accept malformed inputs, and in many cases it is possible to craft
inputs that let an intruder take full control over the target
computer system. The nature of systems programming languages lies
at the heart of the problem. Rather than rewriting decades of
well-tested functionality, this book examines ways to live with the
(programming) sins of the past while shoring up security in the
most efficient manner possible. We explore a range of different
options, each making significant progress towards securing legacy
programs from malicious inputs. The solutions explored include
enforcement-type defenses, which excludes certain program
executions because they never arise during normal operation.
Another strand explores the idea of presenting adversaries with a
moving target that unpredictably changes its attack surface thanks
to randomization. We also cover tandem execution ideas where the
compromise of one executing clone causes it to diverge from another
thus revealing adversarial activities. The main purpose of this
book is to provide readers with some of the most influential works
on run-time exploits and defenses. We hope that the material in
this book will inspire readers and generate new ideas and
paradigms.
Knowledge is a valuable resource that must be managed well for any
organization to thrive. Proper knowledge management can improve
business processes by creating value, yet the available tools meant
to aid in the creation, collection, and storage of information have
drastically changed since the emergence of social media. By using
this collaborative online application for engaging with
information, organizations are able to precisely decimate knowledge
to the correct audience. Harnessing Social Media as a Knowledge
Management Tool addresses the challenges and rewards of the proper
use of social media, as well as the key enablers and barriers of
its application. This publication endeavors to provide thorough
insight into the role of social media in knowledge management from
both an organizational and individual perspective. This book
elucidates emerging strategies perfect for policy makers, managers,
advertisers, academics, students, and organizations who wish to
optimize performance.
This book is for novices If you have never done any programming
before - if you are a complete novice - this book is for you. This
book assumes no prior knowledge of programming. It starts from
scratch. It is written in a simple, direct style for maximum
clarity. It is aimed at first level students at universities and
colleges, but it is also suitable for novices studying alone. The
approach of this book We explain how to use objects early in this
book. Our approach is to start with the ideas of variables,
assignment and methods, then introduce the use of objects created
from library classes. Next we explain how to use control structures
for selection and looping. Then comes the treatment of how to write
your own classes. We wanted to make sure that the fun element of
programming was paramount, so we use graphics right from the start.
We think graphics is fun, interesting and clearly demonstrates all
the important principles of programming. But we haven't ignored
programs that input and output text - they are also included. The
programs we present use many of the features of a graphical user
interfaces (GUIs), such as buttons, scroll bars and text boxes. But
we also explain how to write console programs in Java. We introduce
new ideas carefully one-at-a-time, rather than all at once. So, for
example, there is a single chapter on writing methods. We introduce
simple ideas early and more sophisticated ideas later on.
Human factors are the scientific discipline concerned with the
understanding of interactions among humans and other elements of a
system, and the profession that applies theory, principles, data,
and other methods to design to optimize human well-being and
overall system performance. Human factor issues and the impact of
technology on society is a topic that is only growing, and it is
essential that it is considered as technology becomes more present
in our daily lives. This not only impacts society now but is
something to be considered for the future. It is also incredibly
important for those in the human factors profession to consider the
impact of technology for their work and for the users they are
helping design for. Therefore, this topic has immense impact and is
important to study from a research perspective to advance the
understanding of how technology works, how we work, and how we as
humans work within the context of the technology we use. Human
Factors Issues and the Impact of Technology on Society examines the
role of technology on society with a specific focus on human
factors issues and how they are associated with and related to
technology use in society. A few highlighted topics within this
book are digital health technologies, learning technologies, ethics
in social technology, ICT use in businesses, and sustainability.
These topics are only a few of examples of how this book analyzes
technology in all different facets of society, making it ideal for
a wide audience including human factors practitioners,
technologists, sociologists, policy makers, teachers, technology
developers and designers, business professionals, ethicists,
researchers, academicians, students, and anyone else seeking more
information on how technology is impacting society through the
viewpoint of human factors.
|
You may like...
Stink Bug
August Hoeft
Hardcover
R693
Discovery Miles 6 930
|