|
Books > Computing & IT
The proliferation of virtual and augmented reality technologies
into society raise significant questions for judges, legal
institutions, and policy makers. For example, when should
activities that occur in virtual worlds, or virtual images that are
projected into real space (that is, augmented reality), count as
protected First Amendment 'speech'? When should they instead count
as a nuisance or trespass? Under what circumstances would the
copying of virtual images infringe intellectual property laws, or
the output of intelligent virtual avatars be patentable inventions
or works of authorship eligible for copyright? And when should a
person (or computer) face legal consequences for allegedly harmful
virtual acts? The Research Handbook on the Law of Virtual and
Augmented Reality addresses these questions and others, drawing
upon free speech doctrine, criminal law, the law of data protection
and privacy, and of jurisdiction, as well as upon potential legal
rights for increasingly intelligent virtual avatars in VR worlds.
The Handbook offers a comprehensive look at challenges to various
legal doctrines raised by the emergence - and increasing use of -
virtual and augmented reality worlds, and at how existing law in
the USA, Europe, and other jurisdictions might apply to these
emerging technologies, or evolve to address them. It also considers
what legal questions about virtual and augmented reality are likely
to be important, not just for judges and legal scholars, but also
for the established businesses and start-ups that wish to make use
of, and help shape, these important new technologies. This
comprehensive Research Handbook will be an invaluable reference to
those looking to keep pace with the dynamic field of virtual and
augmented reality, including students and researchers studying
intellectual property law as well as legal practitioners, computer
scientists, engineers, game designers, and business owners.
Contributors include: W. Barfield, P.S. Berman, M.J. Blitz, S.J.
Blodgett-Ford, J. Danaher, W. Erlank, J.A.T. Fairfield, J. Garon,
G. Hallevy, B. Lewis, H.Y.F. Lim, C. Nwaneri, S.R. Peppet, M.
Risch, A.L. Rossow, J. Russo, M. Supponen, A.M. Underhill, B.D.
Wassom, A. Williams, G. Yadin
The damaging effects of cyberattacks to an industry like the
Cooperative Connected and Automated Mobility (CCAM) can be
tremendous. From the least important to the worst ones, one can
mention for example the damage in the reputation of vehicle
manufacturers, the increased denial of customers to adopt CCAM, the
loss of working hours (having direct impact on the European GDP),
material damages, increased environmental pollution due e.g., to
traffic jams or malicious modifications in sensors' firmware, and
ultimately, the great danger for human lives, either they are
drivers, passengers or pedestrians. Connected vehicles will soon
become a reality on our roads, bringing along new services and
capabilities, but also technical challenges and security threats.
To overcome these risks, the CARAMEL project has developed several
anti-hacking solutions for the new generation of vehicles. CARAMEL
(Artificial Intelligence-based Cybersecurity for Connected and
Automated Vehicles), a research project co-funded by the European
Union under the Horizon 2020 framework programme, is a project
consortium with 15 organizations from 8 European countries together
with 3 Korean partners. The project applies a proactive approach
based on Artificial Intelligence and Machine Learning techniques to
detect and prevent potential cybersecurity threats to autonomous
and connected vehicles. This approach has been addressed based on
four fundamental pillars, namely: Autonomous Mobility, Connected
Mobility, Electromobility, and Remote Control Vehicle. This book
presents theory and results from each of these technical
directions.
ISO/IEC 27001:2005 is an international standard for information
security management systems (ISMSs). Closely allied to ISO/IEC
27002:2005 (which used to be known as ISO17799), this standard
(sometimes called the ISMS standard) can help organisations meet
all their information-related regulatory compliance objectives and
can help them prepare and position themselves for new and emerging
regulations. Information is the lifeblood of today s organis-ation
and, therefore, ensuring that information is simultaneously
protected and available to those who need it is essential to modern
business operations. Information systems are not usually designed
from the outset to be secure. Technical security measures and
checklists are limited in their ability to protect a complete
information system. Management systems and procedural controls are
essential components of any really secure information system and,
to be effective, need careful planning and attention to detail.
ISO/IEC 27001 provides the specification for an information
security management system and, in the related Code of Practice,
ISO/IEC 27002, it draws on the knowledge of a group of experienced
information security practitioners in a wide range of significant
organisations across more than 40 countries to set out best
practice in information security. An ISO27001-compliant system will
provide a systematic approach to ensuring the availability,
confidentiality and integrity of corporate information. The
controls of ISO27001 are based on identifying and combating the
entire range of potential risks to the organisation s information
assets. This helpful, handy ISO27001/ISO27002 pocket guide gives a
useful overview of these two important information security
standards. Key features include: The ISO/IEC 27000 Family of
Information Security Standards Background to the Standards
Specification vs Code of Practice Certification process The ISMS
and ISO27001 Overview of ISO/IEC 27001:2005 Documentation &
Records Management Responsibility Policy & Scope Risk
Assessment Implementation
Artificial intelligence is smarter than humans. It can process information at lightning speed and remain focused on specific tasks without distraction. AI can see into the future, predict outcomes and even use sensors to see around physical and virtual corners. So why does AI frequently get it so wrong and cause harm?
The answer is us: the human beings who write the code and teach AI to mimic our behaviour. Scary Smart explains how to fix the current trajectory now, to make sure that the AI of the future can preserve our species. This book offers a blueprint, pointing the way to what we can do to safeguard ourselves, those we love and the planet itself.
 |
The White Paper
(Paperback)
Satoshi Nakamoto; Introduction by James Bridle; Edited by Jaya Klara Brekke, Ben Vickers
1
|
R416
R375
Discovery Miles 3 750
Save R41 (10%)
|
Ships in 9 - 17 working days
|
|
Innovations in Artificial Intelligence and Human Computer
Interaction in the Digital Era investigates the interaction and
growing interdependency of the HCI and AI fields, which are not
usually addressed in traditional approaches. Chapters explore how
well AI can interact with users based on linguistics and
user-centered design processes, especially with the advances of AI
and the hype around many applications. Other sections investigate
how HCI and AI can mutually benefit from a closer association and
the how the AI community can improve their usage of HCI methods
like “Wizard of Oz” prototyping and “Thinking aloud” protocols.
Moreover, HCI can further augment human capabilities using new
technologies. This book demonstrates how an interdisciplinary team
of HCI and AI researchers can develop extraordinary applications,
such as improved education systems, smart homes, smart healthcare
and map Human Computer Interaction (HCI) for a multidisciplinary
field that focuses on the design of computer technology and the
interaction between users and computers in different domains.
Microservices become immensely popular because it promised to help
organizations build loosely-coupled systems that allow for fast,
easy change. But microservices systems haven’t always kept that
promise. This book identifies the deeper problem -- how software
architects and designers approach coupling – and introduces an
important new approach for creating more successful designs whether
you use microservices or not. Instead of blindly avoiding coupling,
leading software architecture expert Vladik (Vlad) Khononov
proposes a novel method that transforms it into a powerful design
tool: “balanced multi-dimensional coupling.” Khononov begins by
surveying existing methods of evaluating coupling, and illuminating
their strengths and limitations in the context of modern
distributed systems. Next, he introduces a new multi-dimensional
coupling model, and demonstrates how to harness it to build modular
software. Instead of focusing solely on a single approach,
Balancing Coupling in Software Design illuminates underlying design
principles that are ubiquitous in SOA, microservices, DDD, design
patterns, and other paradigms, revealing how each of them can fail
if thoughtful design principles for coupling are neglected -- and
how balanced coupling can make all of them work more effectively.
|
|