![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
YouTube has afforded new ways of documenting, performing and circulating musical creativity. This first sustained exploration of YouTube and music shows how record companies, musicians and amateur users have embraced YouTube's potential to promote artists, stage performances, build artistic (cyber)identity, initiate interactive composition, refresh music pedagogy, perform fandom, influence musical tourism and soundtrack our everyday lives. Speaking from a variety of perspectives, musicologists, film scholars, philosophers, new media theorists, cultural geographers and psychologists use case studies to situate YouTube as a vital component of contemporary musical culture. This book works together with its companion text Remediating Sound: Repeatable Culture, YouTube and Music.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
This publication contributes to the serious games field by investigating original contributions and methods that use serious games in various domains. This comprehensive and timely publication works as an essential reference source, building on the available literature in the field of Serious Games for the economic and social development of countries while providing for further research opportunities in this dynamic and growing field. Thus, the book provides the opportunity for a reflection on this important issue, increasing the understanding of the importance of Serious Games in the context of organizations' improvements, providing relevant academic work, empirical research findings, and an overview of this relevant field of study. This text provides the resources necessary for policy makers, technology developers and managers to adopt and implement solutions for a more digital era.
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
As the disciplines of art, technology, and information science collide, computer graphics and multimedia are presenting a myriad of applications and problems to professionals and scholars in Computer Science, Information Science, Digital Art, Multimedia, Educational Technology, and Media Arts. Today's digital scholar can use Computer Graphics and Multimedia: Applications, Problems and Solutions as a tool to explore the vast parameters of the applications, problems, and solutions related to digital disciplines. Contributing authors include computer scientists, multimedia researchers, computer artists, graphic designers, and digital media specialists. The book has an extensive range of topics for the digital scholar who wants to discover and research other areas within the computer graphics and multimedia disciplines beyond their own.
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
Alarm or alert detection remains an issue in various areas from nature, i.e. flooding, animals or earthquake, to software systems. Liveness, dynamicity, reactivity of alarm systems: how to ensure the warning information reach the right destination at the right moment and in the right location, still being relevant for the recipient, in spite of the various and successive filters of confidentiality, privacy, firewall policies, etc.? Also relevant in this context are to technical contingency issues: material failure, defect of connection, break of channels, independence of information routes and sources? Alarms with crowd media, (mis)information vs. rumours: how to make the distinction? The prediction of natural disasters (floods, avalanches, etc.), health surveillance (affectionate fevers of cattle, pollution by pesticides, etc.), air, sea and land transport, or space surveillance to prevent Risks of collisions between orbital objects involve more and more actors within Information Systems, one of whose purposes is the dissemination of alerts. By expanding the capabilities and functionality of such national or international systems, social networks are playing a growing role in dissemination and sharing, eg. with the support of systems like the Google Alert (https://www.google.fr/alerts) which concerns the publication of contents online. Recently, the Twitter microblogging platform announced a broadcast service, designed to help government organizations with alerts to the public. The proper functioning of such systems depends on fundamental properties such as resilience, liveliness and responsiveness: any alert must absolutely reach the right recipient at the right time and in the right place, while remaining relevant to him, despite the various constraints. on the one hand to external events, such as hardware failures, connection faults, breaks in communication channels, on the other hand to confidentiality, such as the collection and use of personal data (with or without the consent of the user), or the disparity of access policies (generation according to industrial, technological, security constraints, management of internal / external policies, etc.) between actors. This book opens the discussion on the "procrastination", the dynamics and the reactivity of the alert systems, but also the problems of confidentiality, filtering of information, and the means of distinguishing information and rumor.
Social media and new social facilities have made it necessary to develop new media design processes with different communication strategies in order to promote sustainable communication. Visual communication emphasizes messages that are transmitted through visual materials in order to effectively communicate emotions, thoughts, and concepts using symbols instead of words. Social networks present an ideal environment for utilizing this communication technique. New Media and Visual Communication in Social Networks is a pivotal scholarly publication that examines communication strategies in the context of social media and new digital media platforms and explores the effects of visual communication on social networks, visual identity, television, magazines, newspapers, and more. Highlighting a range of topics such as consumer behavior, visual identity, and digital pollution, this book is essential for researchers, practitioners, entrepreneurs, policymakers, and educators.
This volume presents the most recent studies of work and labor in the digital age as it unfolds in both Europe and the United States. One of the critical questions facing modernity concerns the reconfiguration of paid employment, which has been subject to wholesale changes that have widespread consequences for workers, their families, and the institutional structure that characterizes capitalist societies. A key driver of these changes has been the digital revolution and the rapid proliferation of the gig economy. Together with social network sites for hiring, the spread of robotics, and the rise of artificial intelligence and machine learning, they leave virtually no occupation untouched.
This book addresses the question of how competition authorities assess mergers in the Information Communication Technology (ICT) sector so as to promote competition in innovation. A closer look at the question reveals that it is far more complex and difficult to answer for the ICT, telecommunications and multi-sided platform (MSP) economy than for more traditional sectors of the economy. This has led many scholars to re-think and question whether the current merger control framework is suitable for the ICT sector, which is often also referred to as the new economy. The book pursues an interdisciplinary approach combining insights from law, economics and corporate strategy. Further, it has a comparative dimension, as it discusses the practices of the US, the EU and, wherever relevant, of other competition authorities from around the globe. Considering that the research was conducted in the EU, the practices of the European Commission remain a key aspect of the content.Considering its normative dimension, the book concentrates on the substantive aspects of merger control. To facilitate a better understanding of the most important points, the book also offers a brief overview of the procedural aspects of merger control in the EU, the US and the UK, and discusses recent amendments to Austrian and German law regarding the notification threshold. Given its scope, the book offers an invaluable guide for competition law scholars, practitioners in the field, and competition authorities worldwide.
In today's society, the utilization of social media platforms has become an abundant forum for individuals to post, share, tag, and, in some cases, overshare information about their daily lives. As significant amounts of data flood these venues, it has become necessary to find ways to collect and evaluate this information. Social Media Data Extraction and Content Analysis explores various social networking platforms and the technologies being utilized to gather and analyze information being posted to these venues. Highlighting emergent research, analytical techniques, and best practices in data extraction in global electronic culture, this publication is an essential reference source for researchers, academics, and professionals.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
The COVID-19 pandemic has accelerated the implementation of digital transformation strategies, and there has been an exponential increase in the demand for intelligent and reliable communications solutions. The pandemic brings huge challenges for all economic agents, as resilience and the capacity to adapt to new risks and hindrances are now fundamental elements in our societies. In this context, it is essential that digitalization brings opportunities to transition to a smarter economy based on innovation, sustainability, and well-being. The Handbook of Research on Digitalization as a Driver for Smart Economy in the Post-COVID-19 Era discusses digitalization, information and communication technologies, marketing, entrepreneurship, and innovation in an organizational context to optimize the practices established in the most diverse domains of knowledge, specifically attending to the relation between digitalization and sustainability in a post-pandemic era. It is ideal for academicians, instructors, researchers, industry professionals, business managers, private institutions, and students as it covers a range of key topics such as sustainability and smart economy.
In this expert-led guide, Dr Harry Barry draws on his decades of experience as a doctor to show readers how we can improve our emotional connections and transform our mental wellbeing. The Power of Connection will empower you with the fascinating science behind our existing behaviours and all the need-to-know tips and techniques for improving our skills of emotional connection. From the neuroscience behind communication to the role of verbal language, the importance of setting to the power of humour, this book gives you all the tools you need to thrive in any networking or social situation. This book will help you to:
Including case studies and practical exercises, The Power of Connection offers a step-by-step roadmap to improved social confidence, better workplace communication and more fulfilling emotional connections, with ourselves and others.
To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Web 2.0 provides a useful tool in developing the relationships between business and consumer. The Handbook of Research on Integrating Social Media into Strategic Marketing explores the use of social networking and other online media in marketing communications, including both best practices and common pitfalls to provide comprehensive coverage of the topic. This book is intended for marketing professionals, business managers, and anyone interested in how social media fits into today's marketing environments.
This important text/reference presents the first dedicated review of techniques for contactless 3D fingerprint identification, including novel and previously unpublished research. The text provides a systematic introduction to 3D fingerprint identification, covering the latest advancements in contactless 2D and 3D sensing technologies, and detailed discussions on each key aspect in the development of an effective 3D fingerprint identification system. Topics and features: introduces the key concepts and trends in the acquisition and identification of fingerprint images, and a range of 3D fingerprint imaging techniques; proposes a low-cost method for online 3D fingerprint image acquisition, and an efficient 3D fingerprint imaging approach using coloured photometric stereo; describes pre-processing operations on point cloud 3D fingerprint data, and explains the specialized operations for reconstructing 3D fingerprints from live finger scans; examines the representation of minutiae in 3D space, providing details on recovering these features from point cloud data, and on matching such 3D minutiae templates; reviews various 3D fingerprint matching methods, including binary surface code-based approaches and a tetrahedron-based matching approach; discusses the uniqueness of 3D fingerprints, evaluating the benefits of employing 3D fingerprint identification over conventional 2D fingerprint techniques. This unique work is a must-read for all researchers seeking to make further advances in this area, towards the exciting opportunities afforded by contactless 3D fingerprint identification for improving the hygiene, user convenience, and matching accuracy of fingerprint biometric technologies.
Since the dawn of the digital era, the transfer of knowledge has shifted from analog to digital, local to global, and individual to social. Complex networked communities are a fundamental part of these new information-based societies. Emerging Pedagogies in the Networked Knowledge Society: Practices Integrating Social Media and Globalization examines the production, dissemination, and consumption of knowledge within networked communities in the wider global context of pervasive Web 2.0 and social media services. This book will offer insight for business stakeholders, researchers, scholars, and administrators by highlighting the important concepts and ideas of information- and knowledge-based economies.
This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual technologies enabled by social manufacturing for each topic, supported by case studies. The technologies discussed include manufacturing resource minimalization and their socialized reorganizations, blockchain models in cybersecurity, computing and decision-making, social business relationships and organizational networks, open product design, social sensors and extended cyber-physical systems, and social factory and inter-connections. This book helps engineers and managers in industry to practice social manufacturing, as well as offering a systematic reference resource for researchers in manufacturing. Students also benefit from the detailed discussions of the latest research and technologies that will have been put into practice by the time they graduate.
|
You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
|