Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.
Emerging technologies create challenges for traditional regulatory approaches. The contributors to this book - leading scholars in law, innovation, and technology - address the need for new governance methods and models. The unique characteristics of emerging technologies - their diverse applications, the myriad concerns raised by new technologies, the need for public engagement, and the issue of effective coordination between governance players - create the need for new governance approaches. The authors identify innovative new methods of governance, taking into account an environment where changes in technologies can out-pace the corresponding regulatory frameworks. Scholars of technology, science and innovation will find this book to be an enlightening read, as will lawyers, policymakers and think-tanks working within the emerging technologies arena. Contributors: J.W. Abbott, K.W. Abbott, B. Allenby, M. Baram, D.M. Bowman, J. Kuzma, P.H. Lindoe, R.A. Lindor, T.F. Malloy, G.N. Mandel, G.E. Marchant, M. Masterton, L. Paddock, J. Paterson, M.A. Saner, W. Wallach
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems
Sexting, cyberbullying, revenge porn, online predators… all of these potential threats can tempt parents to snatch the smartphone or tablet right out of their children’s hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology’s many benefits and opportunities. Raising Humans in a Digital World shows how digital kids must learn to navigate this environment, through - developing social-emotional skills - balancing virtual and real life - building safe and healthy relationships - avoiding cyberbullies and online predators - protecting personal information - identifying and avoiding fake news and questionable content - becoming positive role models and leaders. This book is packed with at-home discussion topics and enjoyable activities that any busy family can slip into their daily routine. Full of practical tips grounded in academic research and hands-on experience, today’s parents finally have what they’ve been waiting for—a guide to raising digital kids who will become the positive and successful leaders our world desperately needs.
This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.
Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.
Technology has become the too-easy way to entertain ourselves and our children. For parents who are concerned about screen time during times of self-isolation and home schooling, and kids who wish their grown ups would play with them more, this easy-to-use, imaginative book has everything. From five-minute time fillers to large-scale party games, there's plenty of fun here to keep your family laughing: Sporty games and playground classics Activities for indoors, gardens, parks and beaches Memory and travel games, brain teasers and magic tricks No preparation or lengthy shopping trips needed for these creative ideas, just find your idea and go! This encyclopedia of joy is perfect for families big and small who want to have fun in the real world.
Africa 2.0 provides an important history of how two technologies - mobile calling and internet - were made available to millions of sub-Saharan Africans, and the impact they have had on their lives. The book deals with the political challenges of liberalisation and privatisation that needed to be in place in order for these technologies to be built. It analyses how the mobile phone fundamentally changed communications in sub-Saharan Africa and the ways Africans have made these technologies part of their lives, opening up a very different future. The book offers a critical examination of the impact these technologies have had on development practices, and the key role development actors played in accelerating regulatory reform, fibre roll-out and mobile money. Southwood shows how corruption in the industry is a prism through which patronage relationships in government can be understood, and argues that the arrival of a start-up ecosystem in the region has the potential to change this. A vital overview of the changes of the last three decades, Africa 2.0 examines the transformative effects of mobile and internet technologies, and the very different future they have opened out for sub-Saharan Africa. -- .
Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).
i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications
AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.
Governments radically change under the influence of technology. As a result, our lives in interaction with public sector bodies are easier. But the creation of an electronic government also makes us more vulnerable and dependent. Dependent not just on technology itself, but also on the organizations within government that apply technology, collect and use citizen-related information and often demand the citizens submit themselves to technological applications. This book analyzes the legal, ethical, policy and technological dimensions of innovating government. Authors from diverse backgrounds confront the reader with a variety of disciplinary perspectives on persistent themes, like privacy, biometrics, surveillance, e-democracy, electronic government, and identity management. Clearly, the use of technology by governments demands that choices are made. In the search for guiding principles therein, an in-depth understanding of the developments related to electronic government is necessary. This book contributes to this understanding. This book is valuable to academics and practitioners in a wide variety of fields such as public administration and ICT, sociology, political science, communications science, ethics and philosophy. It is also a useful tool for policymakers at the national and international level. Simone van der Hof is Associate Professor at TILT (Tilburg Institute for Law, Technology, and Society), Tilburg University, The Netherlands. Marga Groothuis is Assistant Professor at the Faculty of Law of Leiden University in the Netherlands. Specific to this book: Offers the reader a clear structure Enables the reader to see across disciplinary borders Offers an in-depth insight into new modes of government in various policy domains This is Volume 20 in the Information Technology and Law (IT&Law) Series
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media. For over a century, the indexical relationship of the photographic image, and its related media of film and video, to the scene of capture has served as a basis for truth claims. Historically, the iconicity of these images has featured a causal traceback to actual light rays in a particular time and space, which were fixed by chemical reactions or digital sensors to the resultant image. Today, photorealistic audiovisual media can be generated from deep learning networks that sever any connection to an actual event. Should society instantiate new regimes to manage this new challenge to our sense of reality and the traditional evidential capacities of the 'mechanical image'? How do these images generate information disorder while also providing the basis for legitimate tools used in entertainment and creative industries? Scholars and students from many backgrounds, as well as policymakers, journalists and the general reading public, will find a multidisciplinary approach to questions posed by deep fake research from Communication, International Studies, Writing and Rhetoric.
This book explores the transformational impact of new technological developments on legal practice. More specifically, it addresses knowledge management, communication, and e-discovery related technologies, and helps readers develop the project management and data analysis skills needed to effectively navigate the current, and future, landscapes. It studies the impact of current trends on business practices, as well as the ethical, procedural, and evidentiary concerns involved. Introducing novel interactive technologies as well as traditional content, the book reflects expertise from across the legal industry, including practitioners, the bench, academia, and legal technology consultants. All of the contributing authors currently teach aspiring lawyers and/or paralegals and have identified a gap in the available instructional material. Rapid technology advances have radically changed the way we all live and work, and the legal profession is by no means exempt from the impact of these changes. In order to better assist their clients, and to better compete on the legal market, it is imperative for lawyers to understand the ethical, functional, and business consequences of new technologies on their respective practices. This book provides the necessary content by including legal technology texts, information about novel pedagogical technologies, helpful tools for managing legal technologies and IT staff, statistical methods, tips and checklists.
Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI.
Innovative examination of augmentation technologies in terms of technical, social, and ethical considerations Usable as a supplemental text for a variety of courses, and also of interest to researchers and professionals in fields including: technical communication, digital communication, UX design, information technology, informatics, human factors, artificial intelligence, ethics, philosophy of technology, and sociology of technology First major work to combine technological, ethical, social, and rhetorical perspectives on human augmentation Additional cases and research material available at the authors' Fabric of Digital Life research database at https://fabricofdigitallife.com/
Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book
Social Media Analytics and Practical Applications: The Change to the Competition Landscape provides a framework that allows you to understand and analyze the impact of social media in various industries. It illustrates how social media analytics can help firms build transformational strategies and cope with the challenges of social media technology. By focusing on the relationship between social media and other technology models, such as wisdom of crowds, healthcare, fintech and blockchain, machine learning methods, and 5G, this book is able to provide applications used to understand and analyze the impact of social media. Various industries are called out and illustrate how social media analytics can help firms build transformational strategies and at the same time cope with the challenges that are part of the landscape. The book discusses how social media is a driving force in shaping consumer behavior and spurring innovations by embracing and directly engaging with consumers on social media platforms. By closely reflecting on emerging practices, the book shows how to take advantage of recent advancements and how business operations are being revolutionized. Social Media Analytics and Practical Applications is written for academicians and professionals involved in social media and social media analytics.
|
You may like...
Artificial Intelligence and the Media…
Taina Pihlajarinne, Anette Alen-Savikko
Hardcover
R3,304
Discovery Miles 33 040
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,696
Discovery Miles 56 960
|