![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 - 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.
This book intends to unite studies in different fields related to the development of the relations between logic, law and legal reasoning. Combining historical and philosophical studies on legal reasoning in Civil and Common Law, and on the often neglected Arabic and Talmudic traditions of jurisprudence, this project unites these areas with recent technical developments in computer science. This combination has resulted in renewed interest in deontic logic and logic of norms that stems from the interaction between artificial intelligence and law and their applications to these areas of logic. The book also aims to motivate and launch a more intense interaction between the historical and philosophical work of Arabic, Talmudic and European jurisprudence. The publication discusses new insights in the interaction between logic and law, and more precisely the study of different answers to the question: what role does logic play in legal reasoning? Varying perspectives include that of foundational studies (such as logical principles and frameworks) to applications, and historical perspectives.
Cybersecurity is a leading national problem for which the market may fail to produce a solution. The ultimate source of the problem is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations. Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups, or both. Indeed, the cybersecurity problem prefigures a host of twenty-first-century problems created by information technology and the globalization of markets.
Our society is highly effected by the digital revolution. This book describes with examples and new concepts the discrimination created by the Digital World at different layers of the society. The author analyzes the new technological ecosystem with components like the Digital Ghetto and describes the measures which need to be taken in the future. He evaluates this new digital world focusing on several aspects of social relations and lifestyles. The book also analyzes the mistakes made while entering the Information Age. Furthermore, the author answers the question if human society is ready for the amenities of services like Social Media, e-learning, energy and self-driving cars or if they actually make our lives more difficult and complicated.
The book analyzes the most relevant developments in the relation between contracts and technology, from automatically concluded contracts to today's revolutionary "smart contracts" developed through blockchain, which are beginning to and will increasingly disrupt many economic and social relations. First of all, the author offers a broad analysis of the peculiarities and evolution of the relation between contracts and technology. The main features and elements of electronic contracts are then examined in depth to highlight the specific rules applicable to them in the international comparative legal framework. In turn, the book provides a detailed explanation of the technology, economic and social dynamics, and legal issues concerning blockchain and smart contracts. The analysis focuses on the question of the legal nature of smart contracts, the issues posed by their development and the first legal solutions adopted in some countries. The comparative approach pursued makes it possible to focus attention on the first solutions adopted until now in various systems, with particular regard to the circulation of models and ideas and to the specificities of their local variations, in terms of e.g. applicable law and jurisdiction. In reviewing the characteristics of distributed ledger technologies, and in particular of the blockchain technology on which smart contracts are based, above all the peculiarities of the latter are taken into consideration, especially automatic execution and resistance to tampering, which simultaneously present significant opportunities and complex legal issues. A comprehensive framework is then provided to reconcile smart contracts with comparative contract law, in order to define the scope and specificities of their binding force, legal effectiveness and regulation in various legal systems. Lastly, with specific reference to the elements, pathologies and contractual remedies for smart contracts, the book examines the peculiarities of their application and the main issues that emerge in comparative contract law in order to promote their harmonized use, in keeping with the transnational nature of such a revolutionary tool.
The U.S., and countries around the globe, are facing an ever-evolving series of health issues, including obesity, food deserts, child hunger, poor maternal health outcomes, and the resurgence of communicable diseases. Traditionally, health communicators and marketers have talked about these issues in a vacuum, in which related information is only visible when people are specifically seeking it out. If we are to give global health the attention it deserves, we need to weave it into our everyday conversations and experiences. Ultimately, we need to normalize the conversation around health. The emergence of everyday online opinion leaders has created a whole new market for shifting consumer perceptions and behaviors. In fact, many of these everyday online opinion leaders, called influencers, have built such large-scale social media presences that they now have the voice, the platform, and the following to reach millions of people with personal points of view on any number of topics. There are great opportunities for engaging with online influencers to support health promotion programs. However, navigating this online community is new to many people. Understanding how this online community works, the opportunities for paid and unpaid engagements, and the value that health programs specifically have with this community, is paramount to successfully working with influencers. This book draws from research with over 400 online influencers, the latest industry data, and practical, real-world experiences working with influencers over the past ten years. An easy-to-read guidebook for marketers and health communicators alike, this book leverages storytelling as a means for sharing lessons-learned and providing readers with practical knowledge about the online marketing industry and influencer community, as they relate to health.
Become a LinkedIn power user and harness the potential of social selling With the impact of COVID, remote working has become big, and so has the use of digital/virtual sales tools. More sales teams want and need to understand how to use social media platforms like LinkedIn to sell, and most do not use it properly. The Ultimate LinkedIn Sales Guide is the go-to book and guide for utilizing LinkedIn to sell. It covers all aspects of social and digital selling, including building the ultimate LinkedIn profile, using the searching functions to find customers, sending effective LinkedIn messages (written, audio & video), creating great content that generates sales, and all the latest tips and tricks, strategies and tools. With the right LinkedIn knowledge, you can attract customers and generate leads, improving your sales numbers from the comfort and safety of your computer. No matter what you are selling, LinkedIn can connect you to buyers. If you're savvy, you can stay in touch with clients and generate more repeat sales, build trust, and create engaging content that will spread by word-of-mouth--the most powerful sales strategy around. This book will teach you how to do all that and more. In The Ultimate LinkedIn Sales Guide you will learn how to: Use the proven 4 Pillars of Social Selling Success to improve your existing LinkedIn activities or get started on a firm footing Create the Ultimate LinkedIn Profile, complete with a strong personal brand that could catapult you to industry leader status Generate leads using LinkedIn, then build and manage relationships with connected accounts to turn those leads into customers Utilize little-known LinkedIn "power tools" to grow your network, send effective messages, and write successful LinkedIn articles And so much more! The Ultimate LinkedIn Sales Guide is a must read for anyone wishing to utilise LinkedIn to improve sales.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Are you looking to get the best out your new Mac, either as a complete novice or as a convert from a Windows PC? Or are you looking to learn about Microsoft Office 2008 or the latest updates of Apple's latest iWork suite and its iLife applications? Make sure you're getting the most out of your machine and understand its full potential. Get Started on your Mac offers a wider, more beginner-friendly scope - an all-in-one reference for those who want to understand the basic concepts rather than the in-depth technicalities. Focusing on the iLife applications which are bundled with Macs including email, iPhoto, iCal, iMovie, iTunes and others, it will help you to enjoy the full Mac experience, and see its appeal as a user-friendly computer that's ready to be used straight away. Learn to live life to the full with your music, your photos, DVDs and email. With straightforward writing from expert authors, the Teach Yourself computing series cuts through the 'technobabble', giving you easy and enjoyable access to all of the computer skills you want to acquire. NOT GOT MUCH TIME? One, five and ten-minute introductions to key principles to get you started. AUTHOR INSIGHTS Lots of instant help with common problems and quick tips for success, based on the author's many years of experience. TEST YOURSELF Tests in the book and online to keep track of your progress. EXTEND YOUR KNOWLEDGE Extra online articles at www.teachyourself.com to give you a richer understanding of your Mac. FIVE THINGS TO REMEMBER Quick refreshers to help you remember the key facts. TRY THIS Innovative exercises illustrate what you've learnt and how to use it.
This book focuses on the legal regulation, mainly from an international law perspective, of autonomous artificial intelligence systems, of their creations, as well as of the interaction of human and artificial intelligence. It examines critical questions regarding both the ontology of autonomous AI systems and the legal implications: what constitutes an autonomous AI system and what are its unique characteristics? How do they interact with humans? What would be the implications of combined artificial and human intelligence? It also explores potentially the most important questions: what are the implications of these developments for collective security -from both a state-centered and a human perspective, as well as for legal systems? Why is international law better positioned to make such determinations and to create a universal framework for this new type of legal personality? How can the matrix of obligations and rights of this new legal personality be construed and what would be the repercussions for the international community? In order to address these questions, the book discusses cognitive aspects embedded in the framework of law, offering insights based on both de lege lata and de lege ferenda perspectives.
What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives.
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.
This book uses literature as a wrench to pry open social networks and to ask different questions than have been asked about social networks previously. The book emphasizes the story-telling aspect of social networks, as well as the connection between narrative and social networks by incorporating narrative, dynamic networks, and time. Thus, it constructs a bridge between literature, digital humanities, and social networks. This book is a pioneering work that attempts to express social and philosophic constructs in mathematical terms. The material used to test the algorithms is texts intended for performance, such as plays, film scripts, and radio plays; mathematical representations of the texts, or "literature networks", are then used to analyze the social networks found in the respective texts. By using literature networks and their accompanying narratives, along with their supporting analyses, this book allows for a novel approach to social network analysis.
The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully. Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable results. To achieve this and reduce the exposure to unnecessary business disruptions and litigation, every workplace investigation must by driven by process. Investigations in the Workplace, Second Edition provides both novice and experienced investigators with the most insightful and useful information available on the methods and processes for the proper and safe investigation of workplace crime and misconduct. Gleaned from Eugene Ferraro s nearly three decades of experience, the book is designed for easy reading and use dispelling common myths and presenting new approaches, methods, and strategies. Revised and updated with more methods, techniques, and case studies, this powerful book also includes new diagrams, checklists, and visuals to help readers put the material in context and make their investigations soar. Each chapter begins with Key Learning Points and is supplemented with boxed Tips, Traps, and Common Mistakes. An exhaustive appendix includes a glossary of common investigative terms, sample surveillance and investigative reports, advice on digital evidence, and more. Investigations in the Workplace, Second Edition is a must-read for corporate investigators and security professionals, human resources and law enforcement personnel, attorneys, and anyone else tasked with conducting or supervising workplace investigations. Immediate Benefits:
With the ongoing evolution of the digital society challenging the boundaries of the law, new questions are arising - and new answers being given - even now, almost three decades on from the digital revolution. Written by a panel of legal specialists and edited by experts on EU Internet law, this book provides an overview of the most recent developments affecting the European Internet legal framework, specifically focusing on four current debates. Firstly, it discusses the changes in online copyright law, especially after the enactment of the new directive on the single digital market. Secondly, it analyzes the increasing significance of artificial intelligence in our daily life. The book then addresses emerging issues in EU digital law, exploring out of the box approaches in Internet law. It also presents the last cyber-criminality law trends (offenses, international instrument, behaviors), and discusses the evolution of personal data protection. Lastly, it evaluates the degree of consumer and corporate protection in the digital environment, demonstrating that now, more than ever, EU Internet law is based on a combination of copyright, civil, administrative, criminal, commercial and banking laws.
A landmark history that traces the creation, management, and sharing of information through six centuries Thanks to modern technological advances, we now enjoy seemingly unlimited access to information. Yet how did information become so central to our everyday lives, and how did its processing and storage make our data-driven era possible? This volume is the first to consider these questions in comprehensive detail, tracing the global emergence of information practices, technologies, and more, from the premodern era to the present. With entries spanning archivists to algorithms and scribes to surveilling, this is the ultimate reference on how information has shaped and been shaped by societies. Written by an international team of experts, the book's inspired and original long- and short-form contributions reconstruct the rise of human approaches to creating, managing, and sharing facts and knowledge. Thirteen full-length chapters discuss the role of information in pivotal epochs and regions, with chief emphasis on Europe and North America, but also substantive treatment of other parts of the world as well as current global interconnections. More than 100 alphabetical entries follow, focusing on specific tools, methods, and concepts-from ancient coins to the office memo, and censorship to plagiarism. The result is a wide-ranging, deeply immersive collection that will appeal to anyone drawn to the story behind our modern mania for an informed existence. Tells the story of information's rise from 1450 through to today Covers a range of eras and regions, including the medieval Islamic world, late imperial East Asia, early modern and modern Europe, and modern North America Includes 100 concise articles on wide-ranging topics: Concepts: data, intellectual property, privacy Formats and genres: books, databases, maps, newspapers, scrolls and rolls, social media People: archivists, diplomats and spies, readers, secretaries, teachers Practices: censorship, forecasting, learning, political reporting, translating Processes: digitization, quantification, storage and search Systems: bureaucracy, platforms, telecommunications Technologies: cameras, computers, lithography Provides an informative glossary, suggested further reading (a short bibliography accompanies each entry), and a detailed index Written by an international team of notable contributors, including Jeremy Adelman, Lorraine Daston, Devin Fitzgerald, John-Paul Ghobrial, Lisa Gitelman, Earle Havens, Randolph C. Head, Niv Horesh, Sarah Igo, Richard R. John, Lauren Kassell, Pamela Long, Erin McGuirl, David McKitterick, Elias Muhanna, Thomas S. Mullaney, Carla Nappi, Craig Robertson, Daniel Rosenberg, Neil Safier, Haun Saussy, Will Slauter, Jacob Soll, Heidi Tworek, Siva Vaidhyanathan, Alexandra Walsham, and many more.
Digital technology is fundamentally altering the world we live in, but can only be truly understood in relation to the physical world we all inhabit. The most successful future products and policies will be those that take this rich digital/physical ecology seriously. The physical world is increasingly filled with digital products to the extent that the boundaries of digital and physical reality become blurred. From mundane devices such as mobile phones and washing machines, to esoteric research including tangible computation and body implants, we continually bridge two worlds literally touching buttons and dials and simultaneously interacting with the digital systems that lie behind them. The connection between pure thought and abstract information is through solid keyboard and mouse; but likewise the material world of buildings, cars and running shoes is suffused with computation through sensors, displays and flashing LEDs. How do people understand this world and how can designers create usable hybrid physical-digital products? TouchIT brings together insights from human-computer interaction and industrial design, exploring these themes under four main headings: human body and mind; objects and things; space; and information and computation. In considering each, the authors look into the underlying physical processes, our human understanding of them, and then the way these inform and are informed by digital design. The end draws together the theoretical and practical implications of this for design, including practical advice, potential tools, and philosophical underpinnings.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
Cybersecurity is a leading national problem for which the market may fail to produce a solution. The ultimate source of the problem is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations. Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups, or both. Indeed, the cybersecurity problem prefigures a host of twenty-first-century problems created by information technology and the globalization of markets.
Social networks have created a plethora of problems regarding privacy and the protection of personal data. The use of social networks has become a key concern of legal scholars, policy-makers and the operators as well as users of those social networks. This pathbreaking book highlights the importance of privacy in the context of today's new electronic communication technologies as it presents conflicting claims to protect national and international security, the freedom of the Internet and economic considerations. Using the New Haven School of Jurisprudence's intellectual framework, the author presents the applicable law on privacy and social media in international and comparative perspective, focusing on the United States, the European Union and its General Data Protection Regulation of 2018 as well as Germany, the United Kingdom and Latin America. The book appraises the law in place, discusses alternatives and presents recommendations in pursuit of a public order of human dignity.
An illuminating insight into the Metaverse - what it is, how it works,
and and why it will soon be playing a major role in business,
technology and society.
"Amateur hour has arrived, and the audience is running the
show
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Friendship is regarded as crucial to living a good life. But how does friendship make our lives better? Do all friendships make our lives better? What sorts of interactions are necessary for maintaining valuable friendships? This book answers these questions via a philosophical exploration of friendship and the ways that it contributes value to our lives. Diane Jeske uses this philosophical analysis to assess the impact of our ever-growing use of social media: Do interactions via social media interfere with our ability to maintain genuine friendships? Do such interactions undermine the contribution of friendship to the value of our lives? In addressing these topics, Jeske examines the contemporary notion of a 'frenemy,' the ways in which we deliberately craft our social media personas, the role of the physical body in friendship, and the ways in which social media's exacerbation of our fear of being left out and of comparison-based envy can impact our relationships. Written in a clear and engaging style, Friendship and Social Media brings philosophical rigor and clarity to the task of determining how we can responsibly use social media in our own lives. It is essential reading for anyone interested in the ethics of interpersonal relationships and the social impact of technology.
This volume focuses on predicting users' attendance at a future event at specific time and location based on their common interests. Event attendance prediction has attracted considerable attention because of its wide range of potential applications. By predicting event attendance, events that better fit users' interests can be recommended, and personalized location-based or topic-based services related to the events can be provided to users. Moreover, it can help event organizers estimating the event scale, identifying conflicts, and help manage resources. This book first surveys existing techniques on event attendance prediction and other related topics in event-based social networks. It then introduces a context-aware data mining approach to predict the event attendance by learning how users are likely to attend future events. Specifically, three sets of context-aware attributes are identified by analyzing users' past activities, including semantic, temporal, and spatial attributes. This book illustrates how these attributes can be applied for event attendance prediction by incorporating them into supervised learning models, and demonstrates their effectiveness through a real-world dataset collected from event-based social networks. |
You may like...
Multilingualism and Ageing - An Overview
Kees De Bot, Charlotta Plejert, …
Paperback
R2,125
Discovery Miles 21 250
Pragmatic Markers in Contrast
Karin Aijmer, Anne-Marie Simon-Vandenbergen
Hardcover
R2,368
Discovery Miles 23 680
Legal-Lay Communication - Textual…
Chris Heffer, Frances Rock, …
Hardcover
R3,851
Discovery Miles 38 510
|