![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
This book intends to unite studies in different fields related to the development of the relations between logic, law and legal reasoning. Combining historical and philosophical studies on legal reasoning in Civil and Common Law, and on the often neglected Arabic and Talmudic traditions of jurisprudence, this project unites these areas with recent technical developments in computer science. This combination has resulted in renewed interest in deontic logic and logic of norms that stems from the interaction between artificial intelligence and law and their applications to these areas of logic. The book also aims to motivate and launch a more intense interaction between the historical and philosophical work of Arabic, Talmudic and European jurisprudence. The publication discusses new insights in the interaction between logic and law, and more precisely the study of different answers to the question: what role does logic play in legal reasoning? Varying perspectives include that of foundational studies (such as logical principles and frameworks) to applications, and historical perspectives.
The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 - 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.
Cybersecurity is a leading national problem for which the market may fail to produce a solution. The ultimate source of the problem is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations. Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups, or both. Indeed, the cybersecurity problem prefigures a host of twenty-first-century problems created by information technology and the globalization of markets.
The book analyzes the most relevant developments in the relation between contracts and technology, from automatically concluded contracts to today's revolutionary "smart contracts" developed through blockchain, which are beginning to and will increasingly disrupt many economic and social relations. First of all, the author offers a broad analysis of the peculiarities and evolution of the relation between contracts and technology. The main features and elements of electronic contracts are then examined in depth to highlight the specific rules applicable to them in the international comparative legal framework. In turn, the book provides a detailed explanation of the technology, economic and social dynamics, and legal issues concerning blockchain and smart contracts. The analysis focuses on the question of the legal nature of smart contracts, the issues posed by their development and the first legal solutions adopted in some countries. The comparative approach pursued makes it possible to focus attention on the first solutions adopted until now in various systems, with particular regard to the circulation of models and ideas and to the specificities of their local variations, in terms of e.g. applicable law and jurisdiction. In reviewing the characteristics of distributed ledger technologies, and in particular of the blockchain technology on which smart contracts are based, above all the peculiarities of the latter are taken into consideration, especially automatic execution and resistance to tampering, which simultaneously present significant opportunities and complex legal issues. A comprehensive framework is then provided to reconcile smart contracts with comparative contract law, in order to define the scope and specificities of their binding force, legal effectiveness and regulation in various legal systems. Lastly, with specific reference to the elements, pathologies and contractual remedies for smart contracts, the book examines the peculiarities of their application and the main issues that emerge in comparative contract law in order to promote their harmonized use, in keeping with the transnational nature of such a revolutionary tool.
The U.S., and countries around the globe, are facing an ever-evolving series of health issues, including obesity, food deserts, child hunger, poor maternal health outcomes, and the resurgence of communicable diseases. Traditionally, health communicators and marketers have talked about these issues in a vacuum, in which related information is only visible when people are specifically seeking it out. If we are to give global health the attention it deserves, we need to weave it into our everyday conversations and experiences. Ultimately, we need to normalize the conversation around health. The emergence of everyday online opinion leaders has created a whole new market for shifting consumer perceptions and behaviors. In fact, many of these everyday online opinion leaders, called influencers, have built such large-scale social media presences that they now have the voice, the platform, and the following to reach millions of people with personal points of view on any number of topics. There are great opportunities for engaging with online influencers to support health promotion programs. However, navigating this online community is new to many people. Understanding how this online community works, the opportunities for paid and unpaid engagements, and the value that health programs specifically have with this community, is paramount to successfully working with influencers. This book draws from research with over 400 online influencers, the latest industry data, and practical, real-world experiences working with influencers over the past ten years. An easy-to-read guidebook for marketers and health communicators alike, this book leverages storytelling as a means for sharing lessons-learned and providing readers with practical knowledge about the online marketing industry and influencer community, as they relate to health.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Are you looking to get the best out your new Mac, either as a complete novice or as a convert from a Windows PC? Or are you looking to learn about Microsoft Office 2008 or the latest updates of Apple's latest iWork suite and its iLife applications? Make sure you're getting the most out of your machine and understand its full potential. Get Started on your Mac offers a wider, more beginner-friendly scope - an all-in-one reference for those who want to understand the basic concepts rather than the in-depth technicalities. Focusing on the iLife applications which are bundled with Macs including email, iPhoto, iCal, iMovie, iTunes and others, it will help you to enjoy the full Mac experience, and see its appeal as a user-friendly computer that's ready to be used straight away. Learn to live life to the full with your music, your photos, DVDs and email. With straightforward writing from expert authors, the Teach Yourself computing series cuts through the 'technobabble', giving you easy and enjoyable access to all of the computer skills you want to acquire. NOT GOT MUCH TIME? One, five and ten-minute introductions to key principles to get you started. AUTHOR INSIGHTS Lots of instant help with common problems and quick tips for success, based on the author's many years of experience. TEST YOURSELF Tests in the book and online to keep track of your progress. EXTEND YOUR KNOWLEDGE Extra online articles at www.teachyourself.com to give you a richer understanding of your Mac. FIVE THINGS TO REMEMBER Quick refreshers to help you remember the key facts. TRY THIS Innovative exercises illustrate what you've learnt and how to use it.
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives.
Digital technology is fundamentally altering the world we live in, but can only be truly understood in relation to the physical world we all inhabit. The most successful future products and policies will be those that take this rich digital/physical ecology seriously. The physical world is increasingly filled with digital products to the extent that the boundaries of digital and physical reality become blurred. From mundane devices such as mobile phones and washing machines, to esoteric research including tangible computation and body implants, we continually bridge two worlds literally touching buttons and dials and simultaneously interacting with the digital systems that lie behind them. The connection between pure thought and abstract information is through solid keyboard and mouse; but likewise the material world of buildings, cars and running shoes is suffused with computation through sensors, displays and flashing LEDs. How do people understand this world and how can designers create usable hybrid physical-digital products? TouchIT brings together insights from human-computer interaction and industrial design, exploring these themes under four main headings: human body and mind; objects and things; space; and information and computation. In considering each, the authors look into the underlying physical processes, our human understanding of them, and then the way these inform and are informed by digital design. The end draws together the theoretical and practical implications of this for design, including practical advice, potential tools, and philosophical underpinnings.
This book uses literature as a wrench to pry open social networks and to ask different questions than have been asked about social networks previously. The book emphasizes the story-telling aspect of social networks, as well as the connection between narrative and social networks by incorporating narrative, dynamic networks, and time. Thus, it constructs a bridge between literature, digital humanities, and social networks. This book is a pioneering work that attempts to express social and philosophic constructs in mathematical terms. The material used to test the algorithms is texts intended for performance, such as plays, film scripts, and radio plays; mathematical representations of the texts, or "literature networks", are then used to analyze the social networks found in the respective texts. By using literature networks and their accompanying narratives, along with their supporting analyses, this book allows for a novel approach to social network analysis.
This book focuses on the legal regulation, mainly from an international law perspective, of autonomous artificial intelligence systems, of their creations, as well as of the interaction of human and artificial intelligence. It examines critical questions regarding both the ontology of autonomous AI systems and the legal implications: what constitutes an autonomous AI system and what are its unique characteristics? How do they interact with humans? What would be the implications of combined artificial and human intelligence? It also explores potentially the most important questions: what are the implications of these developments for collective security -from both a state-centered and a human perspective, as well as for legal systems? Why is international law better positioned to make such determinations and to create a universal framework for this new type of legal personality? How can the matrix of obligations and rights of this new legal personality be construed and what would be the repercussions for the international community? In order to address these questions, the book discusses cognitive aspects embedded in the framework of law, offering insights based on both de lege lata and de lege ferenda perspectives.
The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully. Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable results. To achieve this and reduce the exposure to unnecessary business disruptions and litigation, every workplace investigation must by driven by process. Investigations in the Workplace, Second Edition provides both novice and experienced investigators with the most insightful and useful information available on the methods and processes for the proper and safe investigation of workplace crime and misconduct. Gleaned from Eugene Ferraro s nearly three decades of experience, the book is designed for easy reading and use dispelling common myths and presenting new approaches, methods, and strategies. Revised and updated with more methods, techniques, and case studies, this powerful book also includes new diagrams, checklists, and visuals to help readers put the material in context and make their investigations soar. Each chapter begins with Key Learning Points and is supplemented with boxed Tips, Traps, and Common Mistakes. An exhaustive appendix includes a glossary of common investigative terms, sample surveillance and investigative reports, advice on digital evidence, and more. Investigations in the Workplace, Second Edition is a must-read for corporate investigators and security professionals, human resources and law enforcement personnel, attorneys, and anyone else tasked with conducting or supervising workplace investigations. Immediate Benefits:
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.
With the ongoing evolution of the digital society challenging the boundaries of the law, new questions are arising - and new answers being given - even now, almost three decades on from the digital revolution. Written by a panel of legal specialists and edited by experts on EU Internet law, this book provides an overview of the most recent developments affecting the European Internet legal framework, specifically focusing on four current debates. Firstly, it discusses the changes in online copyright law, especially after the enactment of the new directive on the single digital market. Secondly, it analyzes the increasing significance of artificial intelligence in our daily life. The book then addresses emerging issues in EU digital law, exploring out of the box approaches in Internet law. It also presents the last cyber-criminality law trends (offenses, international instrument, behaviors), and discusses the evolution of personal data protection. Lastly, it evaluates the degree of consumer and corporate protection in the digital environment, demonstrating that now, more than ever, EU Internet law is based on a combination of copyright, civil, administrative, criminal, commercial and banking laws.
An illuminating insight into the Metaverse - what it is, how it works,
and and why it will soon be playing a major role in business,
technology and society.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
Social networks have created a plethora of problems regarding privacy and the protection of personal data. The use of social networks has become a key concern of legal scholars, policy-makers and the operators as well as users of those social networks. This pathbreaking book highlights the importance of privacy in the context of today's new electronic communication technologies as it presents conflicting claims to protect national and international security, the freedom of the Internet and economic considerations. Using the New Haven School of Jurisprudence's intellectual framework, the author presents the applicable law on privacy and social media in international and comparative perspective, focusing on the United States, the European Union and its General Data Protection Regulation of 2018 as well as Germany, the United Kingdom and Latin America. The book appraises the law in place, discusses alternatives and presents recommendations in pursuit of a public order of human dignity.
Cybersecurity is a leading national problem for which the market may fail to produce a solution. The ultimate source of the problem is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations. Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups, or both. Indeed, the cybersecurity problem prefigures a host of twenty-first-century problems created by information technology and the globalization of markets.
"Amateur hour has arrived, and the audience is running the
show
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
This volume focuses on predicting users' attendance at a future event at specific time and location based on their common interests. Event attendance prediction has attracted considerable attention because of its wide range of potential applications. By predicting event attendance, events that better fit users' interests can be recommended, and personalized location-based or topic-based services related to the events can be provided to users. Moreover, it can help event organizers estimating the event scale, identifying conflicts, and help manage resources. This book first surveys existing techniques on event attendance prediction and other related topics in event-based social networks. It then introduces a context-aware data mining approach to predict the event attendance by learning how users are likely to attend future events. Specifically, three sets of context-aware attributes are identified by analyzing users' past activities, including semantic, temporal, and spatial attributes. This book illustrates how these attributes can be applied for event attendance prediction by incorporating them into supervised learning models, and demonstrates their effectiveness through a real-world dataset collected from event-based social networks.
In Blockchain Democracy, William Magnuson provides a breathtaking tour of the world of blockchain and bitcoin, from their origins in the online scribblings of a shadowy figure named Satoshi Nakamoto, to their furious rise and dramatic crash in the 2010s, to their ignominious connections to the dark web and online crime. Magnuson argues that blockchain's popularity stands as a testament both to the depth of distrust of government today, and also to the fervent and undying belief that technology and the world of cyberspace can provide an answer. He demonstrates how blockchain's failings provide broader lessons about what happens when technology runs up against the stubborn realities of law, markets, and human nature. This book should be read by anyone interested in understanding how technology is changing our democracy, and how democracy is changing our technology.
This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.
This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries - namely, Brazil, Russia, India, China, and South Africa. The project has three main objectives: 1) to map existing regulations; 2) to identify best practices; and 3) to develop policy recommendations in the various areas that compose cybersecurity governance, with a particular focus on the strategies adopted by the BRICS countries to date. Each study covers five essential dimensions of cybersecurity: data protection, consumer protection, cybercrime, the preservation of public order, and cyberdefense. The BRICS countries were selected not only for their size and growing economic and geopolitical relevance but also because, over the next decade, projected Internet growth is expected to occur predominantly in these countries. Consequently, the technology, policy and governance arrangements defined by the BRICS countries are likely to impact not only the 3.2 billion people living in them, but also the individuals and businesses that choose to utilize increasingly popular applications and services developed in BRICS countries according to BRICS standards. Researchers, regulators, start-up innovators and other Internet stakeholders will find this book a valuable guide to the inner workings of key cyber policies in this rapidly growing region. |
You may like...
Sustainable Design and Manufacturing…
Dzung Dao, Robert J. Howlett, …
Hardcover
R5,179
Discovery Miles 51 790
Another Secret Place - Fantasy Cross…
Kathleen George, Cross Stitch Collectibles
Paperback
R408
Discovery Miles 4 080
Robotic Sailing 2014 - Proceedings of…
Fearghal Morgan, Dermot Tynan
Hardcover
R3,990
Discovery Miles 39 900
The Bride - Gustav Klimt cross stitch…
Kathleen George, Cross Stitch Collectibles
Paperback
R442
Discovery Miles 4 420
|