![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
With the help of artificial intelligence, machine learning, and big data analytics, the internet of things (IoT) is creating partnerships within industry where machines, processes, and humans communicate with one another. As this radically changes traditional industrial operations, this results in the rapid design, cheap manufacture, and effective customization of products. Answering the growing demand of customers and their preferences has become a challenge for such partnerships. Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital is a collection of innovative research that discusses development, implementation, and business impacts of IoT technologies on sustainable societal development and improved life quality. Highlighting a wide range of topics such as green technologies, wireless networks, and IoT policy, this book is ideally designed for technology developers, entrepreneurs, industrialists, programmers, engineers, technicians, researchers, academicians, and students.
Soziale Netzwerke haben eine Fulle von Problemen in Bezug auf die Privatsphare und den Schutz personenbezogener Daten aufgeworfen. Die Nutzung sozialer Netzwerke ist zu einem zentralen Anliegen von Rechtswissenschaftlern, politischen Entscheidungstragern und den Betreibern sowie den Nutzern dieser sozialen Netzwerke geworden. Dieses bahnbrechende Buch beleuchtet die Bedeutung des Datenschutzes im Zusammenhang mit den neuen elektronischen Kommunikationstechnologien von heute, da es widerspruchliche Anspruche zum Schutz der nationalen und internationalen Sicherheit, der Freiheit des Internets und wirtschaftlicher UEberlegungen aufzeigt. Auf der Grundlage des intellektuellen Rahmens der New Haven School of Jurisprudence stellt der Autor das geltende Recht zum Schutz der Privatsphare und zu sozialen Medien in internationaler und vergleichender Perspektive dar und konzentriert sich dabei auf die Vereinigten Staaten, die Europaische Union und ihre Allgemeine Datenschutzverordnung von 2018 sowie auf Deutschland, das Vereinigte Koenigreich und Lateinamerika. Das Buch bewertet das geltende Recht, eroertert Alternativen und gibt Empfehlungen fur eine oeffentliche Ordnung der Menschenwurde. UEbersetzt mit www.DeepL.com/Translator (kostenlose Version)
'A tale of Machiavellian plots and coups d'etat, it's just all so gripping' Chris Evans, BBC Radio 2 THE ULTIMATE 21ST CENTURY BUSINESS STORY Since 2006, Twitter has grown from the accidental side project of a failing internet start-up, to a global icon that by 2013 had become an $11.5bn business. But the full story of Twitter's hatching has never been told before. In his revelatory new book, New York Times journalist Nick Bilton takes readers behind the scenes of Twitter as it grew at exponential speeds, and inside the heads of the four hackers who created it: ambitious millionaire Evan Williams; tattooed mastermind Jack Dorsey; joker and diplomat Biz Stone; and Noah Glass, the shy but energetic geek who invested his whole life in Twitter, only to be kicked out and expunged from the company's official history. Combining unprecedented access with exhaustive investigative reporting, and drawing on hundreds of sources, documents and internal emails, New York Times' bestseller HATCHING TWITTER is a blistering drama of betrayed friendships and high-stakes power struggles. A business story like no other, it will shock, expose and inspire.
Using Twitter to Build Communities looks at ways for libraries, archives, and museums to go far beyond Twitter as a "broadcasting" tool, and highlights innovative methods to use the service to spark communication and create ties within your institution's greater community. Appropriate for the social media beginner as well as the experienced user, it covers topics like: *Creating a Social Media Strategy/Policy *Choosing the Right Software *Gaining Followers *How to curate content *How and when to automate your feed *How and when to embed your feed *How to use cross-platform strategies *Using Analytics This book condenses years of research and expertise on using Twitter in an institutional setting into one handy reference for launching or reviving your organization's Twitter presence into an impactful medium in your community.
Born since the mid-1990s, Generation Z is the first generation never to know the world without the internet, and it is the most diverse generation yet. As Gen Z starts to emerge into adulthood and enter the workforce, what do we really know about them? And what can we learn from them? Gen Z, Explained is the authoritative portrait of this significant generation. It draws on extensive interviews that display this generation's candor, surveys that explore their views and attitudes, and a vast database of their astonishingly inventive lexicon to build a comprehensive picture of their values, daily lives, and outlook. Gen Z emerges here as an extraordinarily thoughtful, promising, and perceptive generation-one that is sounding a warning to their elders about the world around them of a complexity and depth the "OK, Boomer" phenomenon could only suggest. Much of the existing literature about Gen Z has been highly judgmental. In contrast, this book provides a deep and nuanced understanding of a generation facing a future of enormous challenges, from climate change to civil unrest. What's more, they are facing this future head-on, relying on themselves and their peers to work collaboratively to solve these problems. As Gen Z, Explained shows, this group of young people is as compassionate and imaginative as any that has come before, and understanding the way they tackle issues may enable us to envision new kinds of solutions. This portrait of Gen Z is ultimately an optimistic one, suggesting they have something to teach all of us about how to live and thrive in this digital world.
Never before have the civil rights of people with disabilities aligned so well with developments in information and communication technology. The center of the technology revolution is the Internet, which fosters unprecedented opportunities for engagement in democratic society. The Americans with Disabilities Act likewise is helping to ensure equal participation in society by people with disabilities. Globally, the Convention on the Rights of Persons with Disabilities further affirms that persons with disabilities are entitled to the full and equal enjoyment of fundamental personal freedoms. This book is about the lived struggle for disability rights, with a focus on Web equality for people with cognitive disabilities, such as intellectual disabilities, autism, and print-related disabilities. The principles derived from the right to the Web - freedom of speech and individual dignity - are bound to lead toward full and meaningful involvement in society for persons with cognitive and other disabilities.
Individuals all over the world can use Airbnb to rent an apartment in a foreign city, check Coursera to find a course on statistics, join PatientsLikeMe to exchange information about one's disease, hail a cab using Uber, or read the news through Facebook's Instant Articles. The promise of connective platforms is that they offer personalized services and contribute to innovation and economic growth, while bypassing cumbersome institutional or industrial overhead. In The Platform Society, Van Dijck, Poell and De Waal offer a comprehensive analysis of a connective world where platforms have penetrated the heart of societies-disrupting markets and labor relations, circumventing institutions, transforming social and civic practices and affecting democratic processes. This book questions what role online platforms play in the organization of Western societies. First, how do platform mechanisms work and to what effect are they deployed? Second, how can platforms incorporate public values and benefit the public good? The Platform Society analyzes intense struggles between competing ideological systems and contesting societal actors - market, government and civil society - raising the issue of who is or should be responsible for anchoring public values and the common good in a platform society. Public values include of course privacy, accuracy, safety, and security, but they also pertain to broader societal effects, such as fairness, accessibility, democratic control, and accountability. Such values are the very stakes in the struggle over the platformization of societies around the globe. The Platform Society highlights how this struggle plays out in four private and public sectors: news, urban transport, health, and education. Each struggle highlights local dimensions, for instance fights over regulation between individual platforms and city governments, but also addresses the level of the platform ecosystem as well as the geopolitical level where power clashes between global markets and (supra-)national governments take place.
What is social media? Have you got a facebook page but are unsure how it can benefit your company? Or do you want to monitor your social media activity to see its effectiveness? Learn how to understand and utilize social media for business. From the basics to the most complex issues The Business of Being Social breaks down every aspect of social media and explains step-by-step how you can create a strategy for success. Social media exploded onto our screens but most businesses use traditional marketing methods and are confused how to harness the benefits. Make sure you're using social media to its full potential. Whether you're a business owner or need social media for marketing to set up new social media channels such as Pinterest or YouTube, build your community or find out how to use keywords and SEO, The Business of Being Social covers all these aspects and more. From helping you to build your brand and promote communication between yourself and your customers, to driving customers to your website and learning from companies who have made their social media campaigns a success, The Business of Being Social is your one-stop guide to the ins and outs of social media. Learn how to: Create a viable social media strategy Build and use channels such as Twitter, Facebook and LinkedIn Create customised apps, communities and use keywords Monitor any activity such as paid-for advertising Understand your audience and what content they want Integrate your social media activity into your marketing strategies Discover the secrets to social media for your business. "As a business owner, how can you ensure that your company's voice and message is heard loud and clear. Thankfully, online visibility experts, Michelle Carvill and David Taylor, have put their heads together and published The Business of Being Social." The Good Web Guide "Up-to-date, thorough, very interesting and informative, well-written, engaging, and highly practical. Michelle and David clearly know their stuff and they've done a great job of combining and presenting their expert knowledge in this book." Birds on the Blog
Winner of the "Outstanding Academic Title" recognition by Choice for the 2020 OAT Awards. The Choice OAT Award represents the highest caliber of scholarly titles that have been reviewed by Choice and conveys the extraordinary recognition of the academic community. In recent years social media has gained significant popularity and has become an essential medium of communication. Such user-generated content provides an excellent scenario for applying the metaphor of mining any information. Transfer learning is a research problem in machine learning that focuses on leveraging the knowledge gained while solving one problem and applying it to a different, but related problem. Features: Offers novel frameworks to study user behavior and for addressing and explaining task heterogeneity Presents a detailed study of existing research Provides convergence and complexity analysis of the frameworks Includes algorithms to implement the proposed research work Covers extensive empirical analysis Social Media Analytics for User Behavior Modeling: A Task Heterogeneity Perspective is a guide to user behavior modeling in heterogeneous settings and is of great use to the machine learning community.
Become a LinkedIn power user and harness the potential of social selling With the impact of COVID, remote working has become big, and so has the use of digital/virtual sales tools. More sales teams want and need to understand how to use social media platforms like LinkedIn to sell, and most do not use it properly. The Ultimate LinkedIn Sales Guide is the go-to book and guide for utilizing LinkedIn to sell. It covers all aspects of social and digital selling, including building the ultimate LinkedIn profile, using the searching functions to find customers, sending effective LinkedIn messages (written, audio & video), creating great content that generates sales, and all the latest tips and tricks, strategies and tools. With the right LinkedIn knowledge, you can attract customers and generate leads, improving your sales numbers from the comfort and safety of your computer. No matter what you are selling, LinkedIn can connect you to buyers. If you're savvy, you can stay in touch with clients and generate more repeat sales, build trust, and create engaging content that will spread by word-of-mouth--the most powerful sales strategy around. This book will teach you how to do all that and more. In The Ultimate LinkedIn Sales Guide you will learn how to: Use the proven 4 Pillars of Social Selling Success to improve your existing LinkedIn activities or get started on a firm footing Create the Ultimate LinkedIn Profile, complete with a strong personal brand that could catapult you to industry leader status Generate leads using LinkedIn, then build and manage relationships with connected accounts to turn those leads into customers Utilize little-known LinkedIn "power tools" to grow your network, send effective messages, and write successful LinkedIn articles And so much more! The Ultimate LinkedIn Sales Guide is a must read for anyone wishing to utilise LinkedIn to improve sales.
Never before have the civil rights of people with disabilities aligned so well with developments in information and communication technology. The center of the technology revolution is the Internet, which fosters unprecedented opportunities for engagement in democratic society. The Americans with Disabilities Act likewise is helping to ensure equal participation in society by people with disabilities. Globally, the Convention on the Rights of Persons with Disabilities further affirms that persons with disabilities are entitled to the full and equal enjoyment of fundamental personal freedoms. This book is about the lived struggle for disability rights, with a focus on Web equality for people with cognitive disabilities, such as intellectual disabilities, autism, and print-related disabilities. The principles derived from the right to the Web - freedom of speech and individual dignity - are bound to lead toward full and meaningful involvement in society for persons with cognitive and other disabilities.
Available Open Access under CC-BY-NC licence. Exploring how justice is delivered at a time of rapid technological transformation, Justice in the Digital State exposes urgent issues surrounding the modernisation of courts and tribunals whilst examining the effects of technology on established systems. Case studies investigate the rise of crowdfunded judicial reviews, the digitalisation of tribunals and the rise of 'agile' methodologies in building administrative justice systems. Joe Tomlinson's cutting-edge research offers an authoritative and much-needed guide for navigating through the challenges of digital disruption.
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features * Covers patching and configuration vulnerabilities of a cloud server * Evaluates methods for data encryption and long-term storage in a cloud server * Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
The whole world knows the face of the young man with the bright black eyes. He is in the process of becoming an icon, a symbol, similar to the famous photo of Che Guevara. The face is that of Raif Badawi, who was nominated for the 2015 Nobel Peace Prize. Arrested in Saudi Arabia, he was sentenced to ten years' imprisonment and 1000 lashes - a de facto death sentence. The woman who succeeded in getting such people as Barack Obama and Prince Charles to appeal personally to the Saudi King for Badawi's release is his wife, Ensaf Haidar, who began the campaign to free her husband with a self-painted poster in front of a small church in Sherbrooke, Canada. When Raif Badawi and Ensaf Haidar fell in love with each other as adolescents, they did so in violation of every moral precept in the strictly Islamic Kingdom of Saudi Arabia. During their clandestine love affair, the young couple had no idea that, more than a decade later, Ensaf's love for Raif would attract the attention of politicians from around the world as the blogger's wife now mobilises global public opinion in an effort to save her husband from murder at the hands of the Saudi judiciary. With a courage born of desperation, she is fighting from exile in Canada to secure the release of the father of her three children, and is bringing great pressure to bear on the murderous regime in her native country. Ensaf Haidar tells Raif's and her own story: the story of their shared liberal ideas and her fight for her husband's release.
This book is open access. This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics-fingerprint recognition, facial recognition and DNA identification- as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, and proposes a raft of principles to guide the regulation of biometrics in liberal democracies. Biometric identification technology is developing rapidly and being implemented more widely, along with other forms of information technology. As products, services and communication moves online, digital identity and security is becoming more important. Biometric identification facilitates this transition. Citizens now use biometrics to access a smartphone or obtain a passport; law enforcement agencies use biometrics in association with CCTV to identify a terrorist in a crowd, or identify a suspect via their fingerprints or DNA; and companies use biometrics to identify their customers and employees. In some cases the use of biometrics is governed by law, in others the technology has developed and been implemented so quickly that, perhaps because it has been viewed as a valuable security enhancement, laws regulating its use have often not been updated to reflect new applications. However, the technology associated with biometrics raises significant ethical problems, including in relation to individual privacy, ownership of biometric data, dual use and, more generally, as is illustrated by the increasing use of biometrics in authoritarian states such as China, the potential for unregulated biometrics to undermine fundamental principles of liberal democracy. Resolving these ethical problems is a vital step towards more effective regulation.
Making Our World: The Hacker and Maker Movements in Context describes and situates the political, historical, national, and organizational elements of hacking and making. Hackers and makers are often mythologized, leading to people misunderstanding them as folk heroes for the modern age. In response, this book describes and critiques these movements from a variety of interdisciplinary perspectives to help readers appreciate their worldwide scope and highly localized interpretations. Making Our World is essential reading for students and scholars of technology and society, particularly those interested in social movements and DIY cultures.
More and more parts of our lives are being digitally enriched. The field of education is no exception. The learning and working worlds are changing, and therefore also the requirements for education, continuing education and further education. At the same time, the period in which knowledge is up-to-date is ever shorter. Thus the ability to do Lifelong Learning is not only decisive for the success of the individual, but also for the sustainable existence of companies, economic sectors and whole regions/destinations. On the basis of psychological, pedagogical and economical concepts the author deals with the How and Why of learning. Based on this he investigates the significance of Online-Further Education in Tourism by means of qualitative expert interviews.
Pathology & Technology is the first comprehensive look at "technopathologies." Since the days of the telegraph, electric communication technologies have been associated with causing or worsening mental and physical illnesses. Today, news reports warn of Pokemon Go deaths and women made vulnerable to sexual assault from wearing headphones. Drawing on an archive of hundreds of cases found across news, entertainment, and other sources over 150 years, this book investigates the intersection of technology and disease through original cultural historiography, focus groups, and discourse analysis, documenting a previously unexplored phenomenon in communication and media. Technopathologies occur with new and old media, the book argues, and are ultimately about people-not machines. They help define users as normal or abnormal, in ways that often align with existing social stereotypes. Courses on technological history, medical humanities, science and technology studies, and medical history will find much here to debate, in a style written to appeal to scholarly as well as popular readers.
Our society is highly effected by the digital revolution. This book describes with examples and new concepts the discrimination created by the Digital World at different layers of the society. The author analyzes the new technological ecosystem with components like the Digital Ghetto and describes the measures which need to be taken in the future. He evaluates this new digital world focusing on several aspects of social relations and lifestyles. The book also analyzes the mistakes made while entering the Information Age. Furthermore, the author answers the question if human society is ready for the amenities of services like Social Media, e-learning, energy and self-driving cars or if they actually make our lives more difficult and complicated.
This book presents a model-driven approach for creating a national application profile of the international legislative document standard Akoma Ntoso (AKN). AKN is an XML-based document standard that serves as the basis for modern machine-readable and fully digital legislative and judicial processes. The described model-driven development approach ensures consistent and error-proof application of AKN concepts and types, even when using different software tools. It allows for easy maintenance, is self-documenting, and facilitates stakeholder validation with nontechnical legal experts. The resulting application profile remains fully compliant to and compatible with AKN. For the sake of illustration, the approach is paradigmatically applied to the German federal legislative process, as a corresponding approach was used in the creation of the German AKN application profile, LegalDocML.de. We discuss how the methodology yields a model, schema definition and specification that correspond to the artefacts created by LegalDocML.de, using examples from Germany. The book is of interest to both legal and technical project teams on the cusp of introducing AKN in a legislative domain and intended as a practical guideline for teams preparing to create a custom application profile for their own domain. Furthermore, it can serve as both a resource and an inspiration for similar and yet to be developed methodologies in the public sector, the health sector or in defense, where international standardization and interoperability efforts are to be applied to a local level.
What does the phrase "ubiquitous media" actually mean? Individual definitions are just as varied and ubiquitous as the media to which they refer. As a result, there is to date no large-scale theoretical framework through which we can understand the term. The goal of this volume is to provide a diverse set of critical, theoretical, and international approaches useful to those looking for a more diverse and nuanced understanding of what ubiquitous media means analytically. In contrast to other existing texts on mobile media, these contributions on mobile media are contextualised within a larger discussion on the nature and history of ubiquitous media. Other sections of this edited volume are dedicated to historical perspectives on ubiquitous media, ubiquitous media and visual culture, the role of ubiquitous media in surveillance, the political economy of ubiquitous media, and the way a ubiquitous media environment affects communities, spaces, and places throughout the world.
What does the phrase "ubiquitous media" actually mean? Individual definitions are just as varied and ubiquitous as the media to which they refer. As a result, there is to date no large-scale theoretical framework through which we can understand the term. The goal of this volume is to provide a diverse set of critical, theoretical, and international approaches useful to those looking for a more diverse and nuanced understanding of what ubiquitous media means analytically. In contrast to other existing texts on mobile media, these contributions on mobile media are contextualised within a larger discussion on the nature and history of ubiquitous media. Other sections of this edited volume are dedicated to historical perspectives on ubiquitous media, ubiquitous media and visual culture, the role of ubiquitous media in surveillance, the political economy of ubiquitous media, and the way a ubiquitous media environment affects communities, spaces, and places throughout the world.
This book intends to unite studies in different fields related to the development of the relations between logic, law and legal reasoning. Combining historical and philosophical studies on legal reasoning in Civil and Common Law, and on the often neglected Arabic and Talmudic traditions of jurisprudence, this project unites these areas with recent technical developments in computer science. This combination has resulted in renewed interest in deontic logic and logic of norms that stems from the interaction between artificial intelligence and law and their applications to these areas of logic. The book also aims to motivate and launch a more intense interaction between the historical and philosophical work of Arabic, Talmudic and European jurisprudence. The publication discusses new insights in the interaction between logic and law, and more precisely the study of different answers to the question: what role does logic play in legal reasoning? Varying perspectives include that of foundational studies (such as logical principles and frameworks) to applications, and historical perspectives.
The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 - 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies. |
You may like...
Pearson REVISE Edexcel GCSE Computer…
Ann Weidmann, Cynthia Selby
Paperback
R269
Discovery Miles 2 690
|