0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (149)
  • R250 - R500 (526)
  • R500+ (1,592)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback)
Gulizar Haciyakupoglu, Yasmine Wong
R1,123 Discovery Miles 11 230 Ships in 9 - 15 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Innovative Governance Models for Emerging Technologies (Hardcover): Gary E Marchant, Kenneth W. Abbott, Braden Allenby Innovative Governance Models for Emerging Technologies (Hardcover)
Gary E Marchant, Kenneth W. Abbott, Braden Allenby
R3,292 Discovery Miles 32 920 Ships in 12 - 17 working days

Emerging technologies create challenges for traditional regulatory approaches. The contributors to this book - leading scholars in law, innovation, and technology - address the need for new governance methods and models. The unique characteristics of emerging technologies - their diverse applications, the myriad concerns raised by new technologies, the need for public engagement, and the issue of effective coordination between governance players - create the need for new governance approaches. The authors identify innovative new methods of governance, taking into account an environment where changes in technologies can out-pace the corresponding regulatory frameworks. Scholars of technology, science and innovation will find this book to be an enlightening read, as will lawyers, policymakers and think-tanks working within the emerging technologies arena. Contributors: J.W. Abbott, K.W. Abbott, B. Allenby, M. Baram, D.M. Bowman, J. Kuzma, P.H. Lindoe, R.A. Lindor, T.F. Malloy, G.N. Mandel, G.E. Marchant, M. Masterton, L. Paddock, J. Paterson, M.A. Saner, W. Wallach

Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R2,978 Discovery Miles 29 780 Ships in 9 - 15 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,678 Discovery Miles 26 780 Ships in 9 - 15 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

Raising Humans In A Digital World - Helping Kids Build A Healthy Relationship With Technology (Paperback): Diana Graber Raising Humans In A Digital World - Helping Kids Build A Healthy Relationship With Technology (Paperback)
Diana Graber; Foreword by Michele Borba
R520 R431 Discovery Miles 4 310 Save R89 (17%) Ships in 10 - 15 working days

Sexting, cyberbullying, revenge porn, online predators… all of these potential threats can tempt parents to snatch the smartphone or tablet right out of their children’s hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology’s many benefits and opportunities.

Raising Humans in a Digital World shows how digital kids must learn to navigate this environment, through

- developing social-emotional skills

- balancing virtual and real life

- building safe and healthy relationships

- avoiding cyberbullies and online predators

- protecting personal information

- identifying and avoiding fake news and questionable content

- becoming positive role models and leaders.

This book is packed with at-home discussion topics and enjoyable activities that any busy family can slip into their daily routine. Full of practical tips grounded in academic research and hands-on experience, today’s parents finally have what they’ve been waiting for—a guide to raising digital kids who will become the positive and successful leaders our world desperately needs.

Data - New Trajectories in Law (Paperback): Robert Herian Data - New Trajectories in Law (Paperback)
Robert Herian
R670 Discovery Miles 6 700 Ships in 9 - 15 working days

This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,378 Discovery Miles 13 780 Ships in 9 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Gadgets Away - 100 Games To Play With The Family (Paperback): Fiona Jennison Gadgets Away - 100 Games To Play With The Family (Paperback)
Fiona Jennison 1
R307 R118 Discovery Miles 1 180 Save R189 (62%) Ships in 12 - 17 working days

Technology has become the too-easy way to entertain ourselves and our children. For parents who are concerned about screen time during times of self-isolation and home schooling, and kids who wish their grown ups would play with them more, this easy-to-use, imaginative book has everything. From five-minute time fillers to large-scale party games, there's plenty of fun here to keep your family laughing: Sporty games and playground classics Activities for indoors, gardens, parks and beaches Memory and travel games, brain teasers and magic tricks No preparation or lengthy shopping trips needed for these creative ideas, just find your idea and go! This encyclopedia of joy is perfect for families big and small who want to have fun in the real world.

Africa 2.0 - Inside a Continent's Communications Revolution (Paperback): Russell Southwood Africa 2.0 - Inside a Continent's Communications Revolution (Paperback)
Russell Southwood
R719 Discovery Miles 7 190 Ships in 12 - 17 working days

Africa 2.0 provides an important history of how two technologies - mobile calling and internet - were made available to millions of sub-Saharan Africans, and the impact they have had on their lives. The book deals with the political challenges of liberalisation and privatisation that needed to be in place in order for these technologies to be built. It analyses how the mobile phone fundamentally changed communications in sub-Saharan Africa and the ways Africans have made these technologies part of their lives, opening up a very different future. The book offers a critical examination of the impact these technologies have had on development practices, and the key role development actors played in accelerating regulatory reform, fibre roll-out and mobile money. Southwood shows how corruption in the industry is a prism through which patronage relationships in government can be understood, and argues that the arrival of a start-up ecosystem in the region has the potential to change this. A vital overview of the changes of the last three decades, Africa 2.0 examines the transformative effects of mobile and internet technologies, and the very different future they have opened out for sub-Saharan Africa. -- .

Security Risk Models for Cyber Insurance (Paperback): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Paperback)
Caroline Baylon, Jose Vila, David Rios Insua
R1,378 Discovery Miles 13 780 Ships in 9 - 15 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover): Balwinder Raj, Brij B. Gupta, Shingo... AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover)
Balwinder Raj, Brij B. Gupta, Shingo Yamaguchi, Sandeep Singh Gill
R3,324 Discovery Miles 33 240 Ships in 12 - 17 working days

i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications

The EU Artificial Intelligence Act - Regulating Subliminal AI Systems (Hardcover): Rostam J. Neuwirth The EU Artificial Intelligence Act - Regulating Subliminal AI Systems (Hardcover)
Rostam J. Neuwirth
R1,531 Discovery Miles 15 310 Ships in 9 - 15 working days

AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.

Innovating Government - Normative, Policy and Technological Dimensions of Modern Government (Paperback, 2011 ed.): Simone van... Innovating Government - Normative, Policy and Technological Dimensions of Modern Government (Paperback, 2011 ed.)
Simone van der Hof, Marga M. Groothuis
R3,914 Discovery Miles 39 140 Ships in 10 - 15 working days

Governments radically change under the influence of technology. As a result, our lives in interaction with public sector bodies are easier. But the creation of an electronic government also makes us more vulnerable and dependent. Dependent not just on technology itself, but also on the organizations within government that apply technology, collect and use citizen-related information and often demand the citizens submit themselves to technological applications. This book analyzes the legal, ethical, policy and technological dimensions of innovating government. Authors from diverse backgrounds confront the reader with a variety of disciplinary perspectives on persistent themes, like privacy, biometrics, surveillance, e-democracy, electronic government, and identity management. Clearly, the use of technology by governments demands that choices are made. In the search for guiding principles therein, an in-depth understanding of the developments related to electronic government is necessary. This book contributes to this understanding. This book is valuable to academics and practitioners in a wide variety of fields such as public administration and ICT, sociology, political science, communications science, ethics and philosophy. It is also a useful tool for policymakers at the national and international level. Simone van der Hof is Associate Professor at TILT (Tilburg Institute for Law, Technology, and Society), Tilburg University, The Netherlands. Marga Groothuis is Assistant Professor at the Faculty of Law of Leiden University in the Netherlands. Specific to this book: Offers the reader a clear structure Enables the reader to see across disciplinary borders Offers an in-depth insight into new modes of government in various policy domains This is Volume 20 in the Information Technology and Law (IT&Law) Series

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback)
Mark Tarallo
R1,155 Discovery Miles 11 550 Ships in 9 - 15 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

Cryptology - Classical and Modern (Paperback, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Paperback, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R1,396 Discovery Miles 13 960 Ships in 9 - 15 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

Cybertax - Managing the Risks and Results (Hardcover): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Hardcover)
George K. Tsantes, James Ransome
R3,008 Discovery Miles 30 080 Ships in 12 - 17 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,451 Discovery Miles 24 510 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated edition)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R2,888 Discovery Miles 28 880 Ships in 12 - 17 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.

The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Deep Fakes - Algorithms and Society (Hardcover): Michael Filimowicz Deep Fakes - Algorithms and Society (Hardcover)
Michael Filimowicz
R1,494 Discovery Miles 14 940 Ships in 9 - 15 working days

Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media. For over a century, the indexical relationship of the photographic image, and its related media of film and video, to the scene of capture has served as a basis for truth claims. Historically, the iconicity of these images has featured a causal traceback to actual light rays in a particular time and space, which were fixed by chemical reactions or digital sensors to the resultant image. Today, photorealistic audiovisual media can be generated from deep learning networks that sever any connection to an actual event. Should society instantiate new regimes to manage this new challenge to our sense of reality and the traditional evidential capacities of the 'mechanical image'? How do these images generate information disorder while also providing the basis for legitimate tools used in entertainment and creative industries? Scholars and students from many backgrounds, as well as policymakers, journalists and the general reading public, will find a multidisciplinary approach to questions posed by deep fake research from Communication, International Studies, Writing and Rhetoric.

The Legal Technology Guidebook (Hardcover, 1st ed. 2017): Kimberly Williams, John M. Facciola, Peter McCann, Vincent M.... The Legal Technology Guidebook (Hardcover, 1st ed. 2017)
Kimberly Williams, John M. Facciola, Peter McCann, Vincent M. Catanzaro
R2,810 Discovery Miles 28 100 Ships in 12 - 17 working days

This book explores the transformational impact of new technological developments on legal practice. More specifically, it addresses knowledge management, communication, and e-discovery related technologies, and helps readers develop the project management and data analysis skills needed to effectively navigate the current, and future, landscapes. It studies the impact of current trends on business practices, as well as the ethical, procedural, and evidentiary concerns involved. Introducing novel interactive technologies as well as traditional content, the book reflects expertise from across the legal industry, including practitioners, the bench, academia, and legal technology consultants. All of the contributing authors currently teach aspiring lawyers and/or paralegals and have identified a gap in the available instructional material. Rapid technology advances have radically changed the way we all live and work, and the legal profession is by no means exempt from the impact of these changes. In order to better assist their clients, and to better compete on the legal market, it is imperative for lawyers to understand the ethical, functional, and business consequences of new technologies on their respective practices. This book provides the necessary content by including legal technology texts, information about novel pedagogical technologies, helpful tools for managing legal technologies and IT staff, statistical methods, tips and checklists.

Real World AI Ethics for Data Scientists - Practical Case Studies (Hardcover): Nachshon (Sean) Goltz, Tracey Dowdeswell Real World AI Ethics for Data Scientists - Practical Case Studies (Hardcover)
Nachshon (Sean) Goltz, Tracey Dowdeswell
R4,491 Discovery Miles 44 910 Ships in 12 - 17 working days

Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI.

Augmentation Technologies and Artificial Intelligence in Technical Communication - Designing Ethical Futures (Hardcover): Ann... Augmentation Technologies and Artificial Intelligence in Technical Communication - Designing Ethical Futures (Hardcover)
Ann Hill Duin, Isabel Pedersen
R4,050 Discovery Miles 40 500 Ships in 12 - 17 working days

Innovative examination of augmentation technologies in terms of technical, social, and ethical considerations Usable as a supplemental text for a variety of courses, and also of interest to researchers and professionals in fields including: technical communication, digital communication, UX design, information technology, informatics, human factors, artificial intelligence, ethics, philosophy of technology, and sociology of technology First major work to combine technological, ethical, social, and rhetorical perspectives on human augmentation Additional cases and research material available at the authors' Fabric of Digital Life research database at https://fabricofdigitallife.com/

Secure Data Management for Online Learning Applications (Hardcover): L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo... Secure Data Management for Online Learning Applications (Hardcover)
L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo Pelusi
R3,030 Discovery Miles 30 300 Ships in 12 - 17 working days

Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book

Social Media Analytics and Practical Applications - The Change to the Competition Landscape (Hardcover): Subodha Kumar,... Social Media Analytics and Practical Applications - The Change to the Competition Landscape (Hardcover)
Subodha Kumar, Liangfei Qiu
R1,485 Discovery Miles 14 850 Ships in 9 - 15 working days

Social Media Analytics and Practical Applications: The Change to the Competition Landscape provides a framework that allows you to understand and analyze the impact of social media in various industries. It illustrates how social media analytics can help firms build transformational strategies and cope with the challenges of social media technology. By focusing on the relationship between social media and other technology models, such as wisdom of crowds, healthcare, fintech and blockchain, machine learning methods, and 5G, this book is able to provide applications used to understand and analyze the impact of social media. Various industries are called out and illustrate how social media analytics can help firms build transformational strategies and at the same time cope with the challenges that are part of the landscape. The book discusses how social media is a driving force in shaping consumer behavior and spurring innovations by embracing and directly engaging with consumers on social media platforms. By closely reflecting on emerging practices, the book shows how to take advantage of recent advancements and how business operations are being revolutionized. Social Media Analytics and Practical Applications is written for academicians and professionals involved in social media and social media analytics.

Democracy - A User's Guide (Hardcover, Hard Cover ed.): Joss Sheldon Democracy - A User's Guide (Hardcover, Hard Cover ed.)
Joss Sheldon
R747 Discovery Miles 7 470 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Tomorrow, and Tomorrow, and Tomorrow…
Gabrielle Zevin Paperback  (1)
R465 R389 Discovery Miles 3 890
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R337 Discovery Miles 3 370
Artificial Intelligence and the Media…
Taina Pihlajarinne, Anette Alen-Savikko Hardcover R3,304 Discovery Miles 33 040
The Secret History of Mac Gaming…
Bitmap Books Hardcover R934 Discovery Miles 9 340
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
These Things Really Do Happen To Me
Khaya Dlanga Paperback  (1)
R210 R164 Discovery Miles 1 640
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
Regulating Social Network Sites - Data…
Asma Vranaki Hardcover R3,147 Discovery Miles 31 470
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,696 Discovery Miles 56 960

 

Partners