![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The face of internet celebrity is rapidly diversifying and evolving. Online and mainstream celebrity culture are now weaving together, such that breakout stars from one-hit viral videos are able to turn their transient fame into a full-time career. This book presents a framework for thinking about the different forms of internet celebrity that have emerged over the last decade, taking examples from the Global North and South, to consolidate key ideas about cultures of online fame. It discusses the overall landscape, developments and trends in the internet celebrity economy, and cross-cultural lessons.
Our society is highly effected by the digital revolution. This book describes with examples and new concepts the discrimination created by the Digital World at different layers of the society. The author analyzes the new technological ecosystem with components like the Digital Ghetto and describes the measures which need to be taken in the future. He evaluates this new digital world focusing on several aspects of social relations and lifestyles. The book also analyzes the mistakes made while entering the Information Age. Furthermore, the author answers the question if human society is ready for the amenities of services like Social Media, e-learning, energy and self-driving cars or if they actually make our lives more difficult and complicated.
The U.S., and countries around the globe, are facing an ever-evolving series of health issues, including obesity, food deserts, child hunger, poor maternal health outcomes, and the resurgence of communicable diseases. Traditionally, health communicators and marketers have talked about these issues in a vacuum, in which related information is only visible when people are specifically seeking it out. If we are to give global health the attention it deserves, we need to weave it into our everyday conversations and experiences. Ultimately, we need to normalize the conversation around health. The emergence of everyday online opinion leaders has created a whole new market for shifting consumer perceptions and behaviors. In fact, many of these everyday online opinion leaders, called influencers, have built such large-scale social media presences that they now have the voice, the platform, and the following to reach millions of people with personal points of view on any number of topics. There are great opportunities for engaging with online influencers to support health promotion programs. However, navigating this online community is new to many people. Understanding how this online community works, the opportunities for paid and unpaid engagements, and the value that health programs specifically have with this community, is paramount to successfully working with influencers. This book draws from research with over 400 online influencers, the latest industry data, and practical, real-world experiences working with influencers over the past ten years. An easy-to-read guidebook for marketers and health communicators alike, this book leverages storytelling as a means for sharing lessons-learned and providing readers with practical knowledge about the online marketing industry and influencer community, as they relate to health.
This book presents a model-driven approach for creating a national application profile of the international legislative document standard Akoma Ntoso (AKN). AKN is an XML-based document standard that serves as the basis for modern machine-readable and fully digital legislative and judicial processes. The described model-driven development approach ensures consistent and error-proof application of AKN concepts and types, even when using different software tools. It allows for easy maintenance, is self-documenting, and facilitates stakeholder validation with nontechnical legal experts. The resulting application profile remains fully compliant to and compatible with AKN. For the sake of illustration, the approach is paradigmatically applied to the German federal legislative process, as a corresponding approach was used in the creation of the German AKN application profile, LegalDocML.de. We discuss how the methodology yields a model, schema definition and specification that correspond to the artefacts created by LegalDocML.de, using examples from Germany. The book is of interest to both legal and technical project teams on the cusp of introducing AKN in a legislative domain and intended as a practical guideline for teams preparing to create a custom application profile for their own domain. Furthermore, it can serve as both a resource and an inspiration for similar and yet to be developed methodologies in the public sector, the health sector or in defense, where international standardization and interoperability efforts are to be applied to a local level.
What does the phrase "ubiquitous media" actually mean? Individual definitions are just as varied and ubiquitous as the media to which they refer. As a result, there is to date no large-scale theoretical framework through which we can understand the term. The goal of this volume is to provide a diverse set of critical, theoretical, and international approaches useful to those looking for a more diverse and nuanced understanding of what ubiquitous media means analytically. In contrast to other existing texts on mobile media, these contributions on mobile media are contextualised within a larger discussion on the nature and history of ubiquitous media. Other sections of this edited volume are dedicated to historical perspectives on ubiquitous media, ubiquitous media and visual culture, the role of ubiquitous media in surveillance, the political economy of ubiquitous media, and the way a ubiquitous media environment affects communities, spaces, and places throughout the world.
What does the phrase "ubiquitous media" actually mean? Individual definitions are just as varied and ubiquitous as the media to which they refer. As a result, there is to date no large-scale theoretical framework through which we can understand the term. The goal of this volume is to provide a diverse set of critical, theoretical, and international approaches useful to those looking for a more diverse and nuanced understanding of what ubiquitous media means analytically. In contrast to other existing texts on mobile media, these contributions on mobile media are contextualised within a larger discussion on the nature and history of ubiquitous media. Other sections of this edited volume are dedicated to historical perspectives on ubiquitous media, ubiquitous media and visual culture, the role of ubiquitous media in surveillance, the political economy of ubiquitous media, and the way a ubiquitous media environment affects communities, spaces, and places throughout the world.
The revolution in digital communications has altered the relationship between citizens and political elites, with important implications for democracy. As new information ecosystems have evolved, as unforeseen examples of their positive and negative consequences have emerged, and as theorizing, data, and research methods have expanded and improved, the central question has shifted from if the digital information environment is good or bad for democratic politics to how and in what contexts particular attributes of this environment are having an influence. It is only through the careful analysis of specific cases that we can begin to build a more comprehensive and nuanced understanding of the role of digital media in democratic theory and practice. The essays in Digital Media and Democratic Futures focus on a variety of information and communication technologies, politically relevant actors, substantive issues, and digital political practices, doing so from distinct theoretical perspectives and methodological approaches. Individually, each of these case studies provides deep insights into the complex and context-dependent relationship between media and democracy. Collectively, they show that there is no single outcome for democracy in the digital age, only a range of possible futures. Contributors: Rena Bivens, Michael X. Delli Carpini, Jennifer Earl, Thomas Elliott, Deen Freelon, Kelly Gates, Philip N. Howard, Daniel Kreiss, Ting Luo, Helen Nissenbaum, Beth Simone Noveck, Jennifer Pan, Lisa Poggiali, Daniela Stockmann.
The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 - 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.
This book intends to unite studies in different fields related to the development of the relations between logic, law and legal reasoning. Combining historical and philosophical studies on legal reasoning in Civil and Common Law, and on the often neglected Arabic and Talmudic traditions of jurisprudence, this project unites these areas with recent technical developments in computer science. This combination has resulted in renewed interest in deontic logic and logic of norms that stems from the interaction between artificial intelligence and law and their applications to these areas of logic. The book also aims to motivate and launch a more intense interaction between the historical and philosophical work of Arabic, Talmudic and European jurisprudence. The publication discusses new insights in the interaction between logic and law, and more precisely the study of different answers to the question: what role does logic play in legal reasoning? Varying perspectives include that of foundational studies (such as logical principles and frameworks) to applications, and historical perspectives.
The book analyzes the most relevant developments in the relation between contracts and technology, from automatically concluded contracts to today's revolutionary "smart contracts" developed through blockchain, which are beginning to and will increasingly disrupt many economic and social relations. First of all, the author offers a broad analysis of the peculiarities and evolution of the relation between contracts and technology. The main features and elements of electronic contracts are then examined in depth to highlight the specific rules applicable to them in the international comparative legal framework. In turn, the book provides a detailed explanation of the technology, economic and social dynamics, and legal issues concerning blockchain and smart contracts. The analysis focuses on the question of the legal nature of smart contracts, the issues posed by their development and the first legal solutions adopted in some countries. The comparative approach pursued makes it possible to focus attention on the first solutions adopted until now in various systems, with particular regard to the circulation of models and ideas and to the specificities of their local variations, in terms of e.g. applicable law and jurisdiction. In reviewing the characteristics of distributed ledger technologies, and in particular of the blockchain technology on which smart contracts are based, above all the peculiarities of the latter are taken into consideration, especially automatic execution and resistance to tampering, which simultaneously present significant opportunities and complex legal issues. A comprehensive framework is then provided to reconcile smart contracts with comparative contract law, in order to define the scope and specificities of their binding force, legal effectiveness and regulation in various legal systems. Lastly, with specific reference to the elements, pathologies and contractual remedies for smart contracts, the book examines the peculiarities of their application and the main issues that emerge in comparative contract law in order to promote their harmonized use, in keeping with the transnational nature of such a revolutionary tool.
In Digital Data Collection and Information Privacy Law, Mark Burdon argues for the reformulation of information privacy law to regulate new power consequences of ubiquitous data collection. Examining developing business models, based on collections of sensor data - with a focus on the 'smart home' - Burdon demonstrates the challenges that are arising for information privacy's control-model and its application of principled protections of personal information exchange. By reformulating information privacy's primary role of individual control as an interrupter of modulated power, Burdon provides a foundation for future law reform and calls for stronger information privacy law protections. This book should be read by anyone interested in the role of privacy in a world of ubiquitous and pervasive data collection.
'Everything you love about romantic comedy - hilarious, sharply observed, smart, and sexy as hell. I adored this book!' RACHEL HAWKINS 'Smart, sexy, and feminist, I Love You, I Hate You is a delightful love letter to internet friends and Nora Ephron. Elizabeth Davis just became an auto-buy author for me' ANNETTE CHRISTIE 'Complete You've Got Mail magic! Davis's humor made this steamy, feisty rom-com a delight to read . . . a must read for fans of Nora Ephron rom-coms!' DENISE WILLIAMS All's fair in love and law . . . You've Got Mail meets Dating You/Hating You by Christina Lauren and The Hating Game by Sally Thorne in this sizzling rom-com - readers love it! 'A five-star read . . . the best read of the year, if you like your rom coms witty and sweet then you need this story in your life' reader review 'Elizabeth Davis's way of writing romance is perfect . . . Amazing characters and writing, 5/5 stars!' reader review 'Everything I wanted and more! Their chemistry was perfect . . . If only I could go back in time and read this book for the first time again' reader review .......................................... Victoria and Owen are bitter rivals. Nora and Luke are friends online. Who would believe these two couples have anything in common? Of all the decisions brilliant lawyer Victoria Clemenceaux has made in her life, an unforgettable one-night stand with her opposing counsel Owen Pohl is either the worst...or the best. One thing is certain: these long-standing rivals aren't going to let their searing attraction stop them from winning the biggest case of their careers. Thankfully Victoria and Owen have someone to vent to about their nemeses. But they have no idea that their online 'friends', Nora and Luke, are the very people they hate in real life. As Nora and Luke grow closer online, and Victoria and Owen find their undeniable attraction harder to resist, the lines between love and hate blur. When the truth comes out, will their online chemistry work in the real world, or will their constant rivalry sever their connection? .......................................... Raves for I Love You, I Hate You! 'This book made my heart sing . . . There's such tenderness and passion and LIFE . . . Go buy this book immediately' 'So good that I devoured the whole book in one sitting' 'You know when you find a book you love so much you accidentally stay up until well after 2am to finish it in one sitting? . . . That's this book! . . . A fun, fast-paced debut romance that I could read again and again' Two can play at this game . . . Look out for The Player Next Door, the smart and sexy new fake-dating rom-com from Elizabeth Davis, available to preorder now!
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Are you looking to get the best out your new Mac, either as a complete novice or as a convert from a Windows PC? Or are you looking to learn about Microsoft Office 2008 or the latest updates of Apple's latest iWork suite and its iLife applications? Make sure you're getting the most out of your machine and understand its full potential. Get Started on your Mac offers a wider, more beginner-friendly scope - an all-in-one reference for those who want to understand the basic concepts rather than the in-depth technicalities. Focusing on the iLife applications which are bundled with Macs including email, iPhoto, iCal, iMovie, iTunes and others, it will help you to enjoy the full Mac experience, and see its appeal as a user-friendly computer that's ready to be used straight away. Learn to live life to the full with your music, your photos, DVDs and email. With straightforward writing from expert authors, the Teach Yourself computing series cuts through the 'technobabble', giving you easy and enjoyable access to all of the computer skills you want to acquire. NOT GOT MUCH TIME? One, five and ten-minute introductions to key principles to get you started. AUTHOR INSIGHTS Lots of instant help with common problems and quick tips for success, based on the author's many years of experience. TEST YOURSELF Tests in the book and online to keep track of your progress. EXTEND YOUR KNOWLEDGE Extra online articles at www.teachyourself.com to give you a richer understanding of your Mac. FIVE THINGS TO REMEMBER Quick refreshers to help you remember the key facts. TRY THIS Innovative exercises illustrate what you've learnt and how to use it.
What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives.
This book provides a resource for readers interested in the issues surrounding mobile phone use by children. Mobile phones are ubiquitous in young people's lives around the world. Most teenagers and many pre-teenage children have their own mobile phone and carry it around everywhere they go. While the mobile phone remains an important communication device for making and receiving voice calls, technological advances have evolved the typical device far beyond simple functionality. Recent models are multi-functional mini-computers with ever-increasing power that enable users to communicate through a range of channels and to engage in multiple other activities. For many young people, life without their mobile phone is unimaginable, but mobile phones can be a source of risk and threat. Understanding how they are used and highlighting potential dangers is an essential activity to enable the creation of sensible and acceptable strategies to ensure that benefits are maximised and risks are minimised. Stakeholders such as parents, industry, regulators, government and children themselves all have vested interests in how children use mobile phones and bear some responsibility for young mobile users.
Digital technology is fundamentally altering the world we live in, but can only be truly understood in relation to the physical world we all inhabit. The most successful future products and policies will be those that take this rich digital/physical ecology seriously. The physical world is increasingly filled with digital products to the extent that the boundaries of digital and physical reality become blurred. From mundane devices such as mobile phones and washing machines, to esoteric research including tangible computation and body implants, we continually bridge two worlds literally touching buttons and dials and simultaneously interacting with the digital systems that lie behind them. The connection between pure thought and abstract information is through solid keyboard and mouse; but likewise the material world of buildings, cars and running shoes is suffused with computation through sensors, displays and flashing LEDs. How do people understand this world and how can designers create usable hybrid physical-digital products? TouchIT brings together insights from human-computer interaction and industrial design, exploring these themes under four main headings: human body and mind; objects and things; space; and information and computation. In considering each, the authors look into the underlying physical processes, our human understanding of them, and then the way these inform and are informed by digital design. The end draws together the theoretical and practical implications of this for design, including practical advice, potential tools, and philosophical underpinnings.
This book focuses on the legal regulation, mainly from an international law perspective, of autonomous artificial intelligence systems, of their creations, as well as of the interaction of human and artificial intelligence. It examines critical questions regarding both the ontology of autonomous AI systems and the legal implications: what constitutes an autonomous AI system and what are its unique characteristics? How do they interact with humans? What would be the implications of combined artificial and human intelligence? It also explores potentially the most important questions: what are the implications of these developments for collective security -from both a state-centered and a human perspective, as well as for legal systems? Why is international law better positioned to make such determinations and to create a universal framework for this new type of legal personality? How can the matrix of obligations and rights of this new legal personality be construed and what would be the repercussions for the international community? In order to address these questions, the book discusses cognitive aspects embedded in the framework of law, offering insights based on both de lege lata and de lege ferenda perspectives.
As digital transformations continue to accelerate in the world, discourses of big data have come to dominate in a number of fields, from politics and economics, to media and education. But how can we really understand the digital world when so much of the writing through which we grapple with it remains deeply problematic? In a compelling new work of feminist critical theory, Bassett, Kember and O'Riordan scrutinise many of the assumptions of a masculinist digital world, highlighting the tendency of digital humanities scholarship to venerate and essentialise technical forms, and to adopt gendered writing and citation practices. Contesting these writings, practices and politics, the authors foreground feminist traditions and contributions to the field, offering alternative modes of knowledge production, and a radically different, poetic writing style. Through this prism, Furious brings into focus themes including the automation of home and domestic work, the Anthropocene, and intersectional feminist technofutures.
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.
The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully. Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable results. To achieve this and reduce the exposure to unnecessary business disruptions and litigation, every workplace investigation must by driven by process. Investigations in the Workplace, Second Edition provides both novice and experienced investigators with the most insightful and useful information available on the methods and processes for the proper and safe investigation of workplace crime and misconduct. Gleaned from Eugene Ferraro s nearly three decades of experience, the book is designed for easy reading and use dispelling common myths and presenting new approaches, methods, and strategies. Revised and updated with more methods, techniques, and case studies, this powerful book also includes new diagrams, checklists, and visuals to help readers put the material in context and make their investigations soar. Each chapter begins with Key Learning Points and is supplemented with boxed Tips, Traps, and Common Mistakes. An exhaustive appendix includes a glossary of common investigative terms, sample surveillance and investigative reports, advice on digital evidence, and more. Investigations in the Workplace, Second Edition is a must-read for corporate investigators and security professionals, human resources and law enforcement personnel, attorneys, and anyone else tasked with conducting or supervising workplace investigations. Immediate Benefits:
This book uses literature as a wrench to pry open social networks and to ask different questions than have been asked about social networks previously. The book emphasizes the story-telling aspect of social networks, as well as the connection between narrative and social networks by incorporating narrative, dynamic networks, and time. Thus, it constructs a bridge between literature, digital humanities, and social networks. This book is a pioneering work that attempts to express social and philosophic constructs in mathematical terms. The material used to test the algorithms is texts intended for performance, such as plays, film scripts, and radio plays; mathematical representations of the texts, or "literature networks", are then used to analyze the social networks found in the respective texts. By using literature networks and their accompanying narratives, along with their supporting analyses, this book allows for a novel approach to social network analysis.
An illuminating insight into the Metaverse - what it is, how it works,
and and why it will soon be playing a major role in business,
technology and society.
With the ongoing evolution of the digital society challenging the boundaries of the law, new questions are arising - and new answers being given - even now, almost three decades on from the digital revolution. Written by a panel of legal specialists and edited by experts on EU Internet law, this book provides an overview of the most recent developments affecting the European Internet legal framework, specifically focusing on four current debates. Firstly, it discusses the changes in online copyright law, especially after the enactment of the new directive on the single digital market. Secondly, it analyzes the increasing significance of artificial intelligence in our daily life. The book then addresses emerging issues in EU digital law, exploring out of the box approaches in Internet law. It also presents the last cyber-criminality law trends (offenses, international instrument, behaviors), and discusses the evolution of personal data protection. Lastly, it evaluates the degree of consumer and corporate protection in the digital environment, demonstrating that now, more than ever, EU Internet law is based on a combination of copyright, civil, administrative, criminal, commercial and banking laws.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. |
You may like...
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R6,463
Discovery Miles 64 630
Legal Challenges of Big Data
Joe Cannataci, Valeria Falce, …
Hardcover
R4,157
Discovery Miles 41 570
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,539
Discovery Miles 15 390
|