![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual technologies enabled by social manufacturing for each topic, supported by case studies. The technologies discussed include manufacturing resource minimalization and their socialized reorganizations, blockchain models in cybersecurity, computing and decision-making, social business relationships and organizational networks, open product design, social sensors and extended cyber-physical systems, and social factory and inter-connections. This book helps engineers and managers in industry to practice social manufacturing, as well as offering a systematic reference resource for researchers in manufacturing. Students also benefit from the detailed discussions of the latest research and technologies that will have been put into practice by the time they graduate.
The Internet has transformed the way people research, shop, conduct business, and communicate. But the Internet and technologies that enable online interaction and access to a variety of content can be a perilous place for minors 8 to 18. The dangers are real, and parents and teachers today are confronted with many threats they simply do not understand. This book shares the risks of the Internet by detailing recent, real-world tragedies and revealing some of the secrets of online activities. It provides a pragmatic approach to help parents and teachers protect children against the threats of going online. Parents and teachers are often ill-equipped to deal with the variety of devices and applications such as email, instant messaging, browsing, blogs, cell phones, and personal digital assistant devices (PDAs) that can facilitate the dangers lurking online. How to Protect Your Children on the Internet offers a comprehensive overview of the ways in which youth use such technologies and exposes the risks they represent. At the same time, it provides a roadmap that will enable parents and teachers to become more engaged in children's online activities, arming them with techniques and tips to help protect their children. Smith underscores his arguments through chilling, real-life stories, revealing approaches people are using to deceive and to conceal their activities online. Filled with practical advice and recommendations, his book is indispensable to anyone who uses the Internet and related technologies, and especially to those charged with keeping children safe.
Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.
Teachers of political science, social studies, and economics, as well as school library media specialists, will find this resource invaluable for incorporating the Internet into their classroom lessons. Over 150 primary source Web sites are referenced and paired with questions and activities designed to encourage critical thinking skills. Completing the activities for the lessons in this book will allow students to evaluate the source of information, the content presented, and it usefulness in the context of their assignments. Along with each Web site, a summary of the site's contents identifies important primary source documents such as constitutions, treaties, speeches, court cases, statistics, and other official documents. The questions and activites invite the students to log on to the Web site, read the information presented, interact with the data, and analyze it critically to answer such questions as: Who created this document? Is the source reliable? How is the information useful and how does it relate to present-day circumstances? If I were in this situation, would I have responded the same way as the person in charge? Strengthening these critical thinking skills will help prepare students for both college and career in the 21st century.
The Semantic Web has been around for some years with recent advances in mature technologies and applications. Lately, its development has been demonstrated in its contribution to businesses through the enhancement of e-commerce. Semantic Web for Business: Cases and Applications delivers real-life cases that illustrate the benefits of Semantic Web technologies as applied to e-business and e-commerce scenarios. Covering topics such as business integration, organizational knowledge management, and Semantic Web services, this book provides academic research libraries with a comprehensive reference to the commercial capabilities of Semantic Web technologies, as well as practical applications for the benefit of IT professionals, business executives, consultants, and students.
The Internet has dramatically altered the landscape of crime and national security, creating new threats, such as identity theft, computer viruses, and cyberattacks. Moreover, because cybercrimes are often not limited to a single site or nation, crime scenes themselves have changed. Consequently, law enforcement must confront these new dangers and embrace novel methods of prevention, as well as produce new tools for digital surveillance-which can jeopardize privacy and civil liberties. Cybercrime brings together leading experts in law, criminal justice, and security studies to describe crime prevention and security protection in the electronic age. Ranging from new government requirements that facilitate spying to new methods of digital proof, the book is essential to understand how criminal law-and even crime itself-have been transformed in our networked world. Contributors: Jack M. Balkin, Susan W. Brenner, Daniel E. Geer, Jr., James Grimmelmann, Emily Hancock, Beryl A. Howell, Curtis E.A. Karnow, Eddan Katz, Orin S. Kerr, Nimrod Kozlovski, Helen Nissenbaum, Kim A. Taipale, Lee Tien, Shlomit Wagman, and Tal Zarsky. Jack M. Balkin is Knight Professor of Constitutional Law and the First Amendment at Yale Law School, and the Founder and Director of Yale's Information Society Project (ISP). He is the co-editor of The State of Play: Law, Games, and Virtual Worlds, also from NYU Press. James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman, and Tal Zarsky are Fellows of the ISP. Eddan Katz is the Executive Director of the Information Society Project.
The recent rapid proliferation in hardware, software, and communication technologies has facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any time and for anyone. This ecosystem is referred to as the Internet of Things (IoT). IoT networks collect, store, and exchange a large amount of heterogeneous data. It has already shown promising outcomes in the provisioning of potentially critical services (e.g., safety applications, healthcare, manufacturing), but it raises many challenges related to the security, data analysis, and limited resources of the performed operations and provided services. Accordingly, research on the data analysis and security of IoT is attractive to both industry and academia. Thus, the central theme of this book is to report novel methodologies, theories, technologies, techniques, and solutions for security and data analytics techniques and energy-aware solutions for IoT. This book aims at addressing these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols, and interfaces to specific implementation approaches. Furthermore, additional focus will be given to areas related to the role of artificial intelligence in modeling and deploying secure and trustworthy sensors, actuators, and wireless networks for IoT systems. It aims to present the most start-of-the-art technologies to overcome the challenges related to security, data analytics, and energy-aware solutions in the Internet of Things.
This book provides a thorough overview of the Wisdom Web of Things (W2T), a holistic framework for computing and intelligence in an emerging hyper-world with a social-cyber-physical space. Fast-evolving Web intelligence research and development initiatives are now moving toward understanding the multifaceted nature of intelligence and incorporating it at the Web scale in a ubiquitous environment with data, connection and service explosion. The book focuses on the framework and methodology of W2T, as well as its applications in different problem domains, such as intelligent businesses, urban computing, social computing, brain informatics and healthcare. From the researcher and developer perspectives, the book takes a systematic, structured view of various W2T facets and their overall contribution to the development of W2T as a whole. Written by leading international researchers, this book is an essential reference for researchers, educators, professionals, and tertiary HDR students working on the World Wide Web, ubiquitous computing, knowledge management, and business intelligence.
'We need more warriors like Carrie' TARANA BURKE, founder of the MeToo movement 'In the age of doxxing, revenge porn, and misogynist trolls, this book is required reading' ESQUIRE Nobody's Victim is an unflinching look at a hidden world most people don't know exists-one of stalking, blackmail, and sexual violence, online and off-and the incredible story of how one lawyer, determined to fight back, turned her own hell into a revolution. Nobody's Victim invites readers to join Carrie Goldberg on the front lines of the war against sexual violence and privacy violations as her law firm sues the hell out of tech companies, schools, and sexual predators. Her battleground is the courtroom; her crusade is to transform clients from victims into warriors. In gripping detail, Carrie shares the diabolical ways her clients are attacked and how she, through her unique combination of relentless advocacy, badass risk-taking, and unique client-empowerment, pursues justice for them all. There is the ex-boyfriend who made fake bomb threats in a client's name, causing a national panic; the girl who was sexually assaulted on school grounds and then suspended when she reported the attack; and the guy who used a dating app to send more than 1,200 men to his ex's home and office for sex. Carrie also shares her own shattering story about why she began her work and became the lawyer she needed. Riveting and essential, Nobody's Victim is a bold and timely analysis of victim protection in the era of the Internet. This book is an urgent warning of a coming crisis, a predictor of imminent danger, and a weapon to take back control and protect ourselves-both online and off. 'A rallying cry for privacy justice . . . chilling . . . take-no-prisoners and warmly gregarious' New York Times *Perfect for fans of She Said by Jodi Kantor and Megan Twohey, The Whisper Network by Chandler Baker and The Good Fight*
By joining bodies of research in media theory, cultural studies, and critical pedagogy, "Developing Media Literacy in Cyberspace" offers a vision of learning that values social empowerment over technical skills. An inquiry into the existence and range of models equipped to cultivate critical teaching and learning in the Internet-supported classroom, this new study argues that media literacy offers the best long-term training for today's youth to become experienced practitioners of 21st-century technology. Author Julie Frechette helps educators develop and provide concrete learning strategies that enable students to judge the validity and worth of what they see on the Internet as they strive to become critically autonomous in a technology-laden world. Part of this effort lies in developing a keen awareness of the institutional, political, and economic structure of the Internet as a means of communication that is increasingly marketing products and targeting advertisements toward youth. Values on the Internet are discussed constantly both by the major media and by the private sector, with little regard for the pervasive interests and authority of profitable industries staking out their territory in this new global village. Unlike other studies that provide a broad sociohistorical context for the development of theoretical uses of new technologies in the classroom, "Developing Media Literacy in Cyberspace" lays the groundwork for establishing critical thinking skills that will serve students' interests as they navigate this vast and complicated cyberterritory.
Internet use for business-to-business e-commerce is expected to grow at spectacular rates. Many experts feel that perceived lack of trust in e-commerce transactions on the Internet has contributed to the slow adoption of e-commerce in the recent past. This book provides an avenue for managers and researchers to explore, examine and describe interorganizaitonal trust relationships in e-commerce participation. With the identification of trust behaviours in business relationships this will increase the awareness of e-commerce participants, who can then examine their own and their trading partners' trust behaviours.
E-Government in Asia offers a thorough examination of e-governance in Asia, including the uses of the Internet to mediate interactions between Asian governments and their citizens. The book examines how the Internet is reshaping these interactions in the region and summarizes the nature of e-government, the growth of the Internet in Asia, issues of the digital divide, and how the Internet is affecting the ways in which public services are provided, how Asians acquire information, and other issues.
This book throws new light on the way in which the Internet impacts on democracy. Based on Jurgen Habermas' discourse-theoretical reconstruction of democracy, it examines one of the world's largest, most diverse but also most unequal democracies, Brazil, in terms of the broad social and legal effects the internet has had. Focusing on the Brazilian constitutional evolution, the book examines how the Internet might impact on the legitimacy of a democratic order and if, and how, it might yield opportunities for democratic empowerment. The book also assesses the ways in which law, as an institution and a system, reacts to the changes and challenges brought about by the Internet: the ways in which law may retain its strength as an integrative force, avoiding a 'virtual' legitimacy crisis.
Readers seeking to gain a handle on the internet's global expansion will find this book rich in scholarly foundations combined with cutting-edge discussion of emerging ICTs and services and the complex societal contexts in which they are embedded. To explore possibilities to the fullest extent, a sociotechnical systems approach is employed, focusing on the interplay of technical, social, cultural, political, and economic dynamics to explore alternative futures (ones that are not part of the dominant discourse about the internet). These shared perspectives are not well addressed elsewhere in current discussions. Awareness of these dynamics, and the fluidity of the future, is important, as humankind moves forward into the uncertain future. Due to the sociotechnical complexity of the Internet, policymakers, businesspeople, and academics worldwide have struggled to keep abreast of developments. This volume's approach is intended to stimulate dialogue between academics and practitioners on a topic that will affect most aspects of human life in the near-term future.
As the growing relationship between individuals and technology continue to play a vital role in our society and work place, the progress and execution of information technology communication systems is important in maintaining our current way of life. Knowledge and Technological Development Effects on Organizational and Social Structures provides a wide ranging discussion on the exchanging of research ideas and practices in an effort to bring together the social and technical aspects within organizations and society. This collection focuses on new ideas and studies for research, students, and practitioners.
An essential tool for dispute resolution professionals as well as for anyone considering using dispute resolution in their lives and work, Online Dispute Resolution explains the many diverse and unique applications of doing conflict resolution online. The expert authors examine the tremendous growth of online dispute resolution-including its use by eBay and other e-commerce companies-and reveal the enormous possibilities to come, along with the many employment opportunities for practitioners in the field. They show how the online environment will affect the role of those who are concerned with dispute resolution just as it has brought changes to those who practice law, sell stocks, or run for office. For those who see the value of technology as a critical building block in the future of dispute resolution, Online Dispute Resolution will be an indispensable resource.
|
You may like...
Handbook on Tourism and Social Media
Dogan Gursoy, Rahul P.S. Kaurav
Hardcover
R7,220
Discovery Miles 72 200
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,719
Discovery Miles 137 190
|