![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.
This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression. According to its traditional understanding, this right gives individuals the possibility to preclude the media from revealing personal facts that are no longer newsworthy, at least where no other interest prevails. Cases sanctioning this understanding still abound in a number of countries. In today's world, however, the right to be forgotten has evolved, and it appears in a more multi-faceted way. It can involve for instance also the right to access, control and even erase personal data. Of course, these prerogatives depend on various factors and competing interests, of both private and public nature, which again require careful balancing. Due to ongoing technological evolution, it is likely that the right to be forgotten in some of its new manifestations will become increasingly relevant in our societies.
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market is disrupting consolidated legal acquisitions, such as classical internal market categories, as well as the applicability of consumer protection, data protection, and labour and competition law. It argues that the collaborative economy will, sooner or later, require some sort of regulatory intervention from the European Union. This regulatory intervention, far from stifling innovation, will benefit online platforms, service providers and users by providing them with a clearer and more predictable environment in which to conduct their business. Although primarily intended for academics, this book also appeals to a wider readership, including, but not limited to, national and international regulators, private firms and lobbies as well as online platforms, consumer associations and trade unions.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.
This is one of the first books solely dedicated to Flash 8 Video development and goes a lot deeper into the subject than other books. It is suitable for those with no previous Flash experience who want to discover the best way to create video applications for the Web. It starts with the very basics, and by the end of the book the reader will be creating advanced interactive video applications, using video alpha channels, masking, blends and filters, the Camera object, and much more.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.
This book identifies and explains the different national approaches to data protection - the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals - and determines the extent to which they could be harmonised in the foreseeable future. In recent years, data protection has become a major concern in many countries, as well as at supranational and international levels. In fact, the emergence of computing technologies that allow lower-cost processing of increasing amounts of information, associated with the advent and exponential use of the Internet and other communication networks and the widespread liberalization of the trans-border flow of information have enabled the large-scale collection and processing of personal data, not only for scientific or commercial uses, but also for political uses. A growing number of governmental and private organizations now possess and use data processing in order to determine, predict and influence individual behavior in all fields of human activity. This inevitably entails new risks, from the perspective of individual privacy, but also other fundamental rights, such as the right not to be discriminated against, fair competition between commercial enterprises and the proper functioning of democratic institutions. These phenomena have not been ignored from a legal point of view: at the national, supranational and international levels, an increasing number of regulatory instruments - including the European Union's General Data Protection Regulation applicable as of 25 May 2018 - have been adopted with the purpose of preventing personal data misuse. Nevertheless, distinct national approaches still prevail in this domain, notably those that separate the comprehensive and detailed protective rules adopted in Europe since the 1995 Directive on the processing of personal data from the more fragmented and liberal attitude of American courts and legislators in this respect. In a globalized world, in which personal data can instantly circulate and be used simultaneously in communications networks that are ubiquitous by nature, these different national and regional approaches are a major source of legal conflict.
Billions of you have watched their videos and millions of you have followed them on social media. So here we go; it's time to back up because YouTube superstars, The Sidemen, are finally here in book form and they're dishing the dirt on each other as well as the YouTube universe. There's nowhere to hide as KSI, Miniminter, Behzinga, Zerkaa,Vikkstar123, Wroetoshaw and Tobjizzle go in hard on their living habits, their football ability, and their dodgy clobber, while also talking Fifa, Vegas and superheroes. They'll also give you their grand house tour, letting you in on a few secrets, before showing you their hall of fame, as well as revealing some of their greatest shames. Along the way you'll learn how seven of the world's biggest YouTube stars started off with nothing more than a computer console, a PC and a bad haircut before joining forces to crush the internet. And they'll tell you just how they did it (because they're nice like that) with their ultimate guide to YouTube while also sharing their memories of recording their favourite videos as well as a typical day in the life of The Sidemen. You'll feel like you're with them every step of the way, smelling the 'sweet' aroma of the boys' favourite dishes in the kitchen, stamping your passport as you follow them on their trips around the world and kicking every ball as the boys gear up for the biggest football match of their lives. It's going to get personal. It's going to get intense, and JJ is going to have lots of tantrums, so take a moment to prepare yourself, because this is The Sidemen book you've been waiting for!
Sensing a future beyond work lurking in an age of crisis, the 'post-capitalist' utopias of today spread the idea of a permanent escape from work aided by the automation of production, a universal basic income and the reduction of working hours to zero. By skilfully unpicking the political economy of contemporary work and its futures, this book mounts a forceful critique of the post-work society vision. Dinerstein and Pitts reveal that transitional measures towards a world beyond work do not do enough to break away from the key features of capitalist society, and instead potentially stifle the capacity for transformative social change. Proposing an innovative alternative, the authors envision the construction of 'concrete utopias' that shape and anticipate non-capitalist futures.
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found in various key fields of law directly linked to the Internet such as information technology, consumer protection, personal data, e-commerce and copyright law. In addition, it aims to shed light on the content and importance of various pending legislative proposals in these fields, and of the Court of Justice of the European Union's recent case law in connection with solving the different problems encountered. The book focuses on challenging legal questions that have not been sufficiently analyzed, while also presenting original thinking in connection with the regulation of emerging legal questions. As such, it offers an excellent reference tool for researchers, policymakers, judges, practitioners and law students with a special interest in EU Internet law and regulation.
This book addresses the question of how competition authorities assess mergers in the Information Communication Technology (ICT) sector so as to promote competition in innovation. A closer look at the question reveals that it is far more complex and difficult to answer for the ICT, telecommunications and multi-sided platform (MSP) economy than for more traditional sectors of the economy. This has led many scholars to re-think and question whether the current merger control framework is suitable for the ICT sector, which is often also referred to as the new economy. The book pursues an interdisciplinary approach combining insights from law, economics and corporate strategy. Further, it has a comparative dimension, as it discusses the practices of the US, the EU and, wherever relevant, of other competition authorities from around the globe. Considering that the research was conducted in the EU, the practices of the European Commission remain a key aspect of the content.Considering its normative dimension, the book concentrates on the substantive aspects of merger control. To facilitate a better understanding of the most important points, the book also offers a brief overview of the procedural aspects of merger control in the EU, the US and the UK, and discusses recent amendments to Austrian and German law regarding the notification threshold. Given its scope, the book offers an invaluable guide for competition law scholars, practitioners in the field, and competition authorities worldwide.
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.
In Film und Literatur gibt es durch kanonisierte UEberwachungserzahlungen eine Vielzahl von Narrativen der UEberwachung, die in das Alltagswissen ubergegangen sind und die kulturellen Verhandlungen und Vorstellungen von Privatheit und Autonomie pragen. Doch auch in einer Vielzahl von anderen Medien und Diskursen lassen sich Narrative der UEberwachung finden, wie etwa im Computerspiel, in der Werbung, in Dokumentationen oder der Aktionskunst, und nicht zuletzt in der Wissenschaft selbst. Der Band widmet sich Modellierungen von UEberwachung und geht Entwicklungen von Erzahlungen und Diskursen anhand von verschiedenen Beispielen nach. Die interdisziplinaren Perspektiven nehmen dabei auch das Verhaltnis der UEberwachungsnarrative zu Sicherheits-, Privatheits- und Digitalisierungsthemen in den Blick.
Durante los ultimos anos se han hecho multiples investigaciones sobre estado de flujo (flow), todas ellas de muy diversa naturaleza, dada la versatilidad del concepto para ser aplicado a distintos contextos. Lo que se pretende con el presente trabajo es contribuir y ampliar la literatura sobre estado de flujo en la esfera online, mas concretamente, en el ambito de las redes sociales; buscando asi que las marcas contemplen este constructo en sus estrategias de marketing digital. Para ello, en primer lugar, se establece un marco teorico en el que definimos y describimos los aspectos mas importantes del estado de flujo. Posteriormente, ahondamos en las caracteristicas de dicho fenomeno pero, esta vez, aplicado al entorno virtual, y lo relacionamos con terminos propios de la disciplina comercial. Por ultimo, y a modo de estudio empirico del que extraer conclusiones practicas, se realiza un analisis estadistico para conocer la percepcion de los individuos acerca de las experiencias optimas que ofrecen las distintas redes sociales.
Politiker*innen haben in digitalen Mediengesellschaften eine starke, zumeist visuelle und multimodale mediatisierte Prasenz. Nicht nur klassische Massenmedien und strategische PR-Teams lassen Politiker*innen als Figuren in den unterschiedlichsten Online- und Offline-Formaten, semiotischen Kodierungen, sozialen Typisierungen und diskursiven Frames auftreten. In der digital strukturierten OEffentlichkeit greifen auch Online-Aktivisten und Social-Media-User in die medialen Diskurswelten politischer Kommunikation ein. Auf der Basis einer metapragmatisch ausgerichteten Diskurslinguistik entwickelt dieses Buch einen transdisziplinaren Konzept- und Kategorienrahmen fur die systematische Analyse dieses komplexen Phanomenbereichs spatmoderner Politik.
A vivid look at China's shifting place in the global political economy of technology production How did China's mass manufacturing and "copycat" production become transformed, in the global tech imagination, from something holding the nation back to one of its key assets? Prototype Nation offers a rich transnational analysis of how the promise of democratized innovation and entrepreneurial life has shaped China's governance and global image. With historical precision and ethnographic detail, Silvia Lindtner reveals how a growing distrust in Western models of progress and development, including Silicon Valley and the tech industry after the financial crisis of 2007-8, shaped the rise of the global maker movement and the vision of China as a "new frontier" of innovation. Lindtner's investigations draw on more than a decade of research in experimental work spaces-makerspaces, coworking spaces, innovation hubs, hackathons, and startup weekends-in China, the United States, Africa, Europe, Taiwan, and Singapore, as well as in key sites of technology investment and industrial production-tech incubators, corporate offices, and factories. She examines how the ideals of the maker movement, to intervene in social and economic structures, served the technopolitical project of prototyping a "new" optimistic, assertive, and global China. In doing so, Lindtner demonstrates that entrepreneurial living influences governance, education, policy, investment, and urban redesign in ways that normalize the persistence of sexism, racism, colonialism, and labor exploitation. Prototype Nation shows that by attending to the bodies and sites that nurture entrepreneurial life, technology can be extricated from the seemingly endless cycle of promise and violence. Cover image: Courtesy of Cao Fei, Vitamin Creative Space and Spru th Magers
This SpringerBrief brings order to the wealth of research studies that contribute to shape our understanding of on-line social networks (OSNs) lurking phenomena. This brief also drives the development of computational approaches that can be effectively applied to answer questions related to lurking behaviors, as well as to the engagement of lurkers in OSNs. All large-scale online social networks (OSNs) are characterized by a participation inequality principle, i.e., the crowd of an OSN does not actively contribute, rather it takes on a silent role. Silent users are also referred to as lurkers, since they gain benefit from others' information without significantly giving back to the community. Nevertheless, lurkers acquire knowledge from the OSN, therefore a major goal is to encourage them to more actively participate. Lurking behavior analysis has been long studied in social science and human-computer interaction fields, but it has also matured over the last few years in social network analysis and mining. While the main target audience corresponds to computer, network, and web data scientists, this brief might also help increase the visibility of the topic by bridging different closely related research fields. Practitioners, researchers and students interested in social networks, web search, data mining, computational social science and human-computer interaction will also find this brief useful research material .
Social media is supposed to bring us together - but it is tearing us apart. 'A blisteringly good, urgent, essential read' Zadie Smith The evidence suggests that social media is making us sadder, angrier, less empathetic, more fearful, more isolated and more tribal. Jaron Lanier is the world-famous Silicon Valley scientist-pioneer who first alerted us to the dangers of social media. In this witty and urgent manifesto he explains why its toxic effects are at the heart of its design, and, in ten simple arguments, why liberating yourself from its hold will transform your life and the world for the better. WITH A NEW AFTERWORD BY THE AUTHOR ‘Informed, heartfelt and often entertaining ... a timely reminder that even if we can’t bring ourselves to leave social media altogether, we should always think critically about how it works’ Sunday Times ‘Indispensable. Everyone who wants to understand the digital world, its pitfalls and possibilities should read this book – now’ Matthew d’Ancona, author of Post-Truth
This book constitutes the refereed proceedings of the 6th International Conference on Multidisciplinary Social Networks Research, MISNC 2019, held in Wenzhou, China, in August 2019. The 15 full papers presented were carefully reviewed and selected from 37 submissions. The papers deal with the following topics: social network, social network analysis, data engineering, data mining, user behavior.
We live in a "metric culture" where data, algorithms, and numbers play an unmistakably powerful role in defining, shaping and ruling the world we inhabit. Increasingly, governments across the globe are turning towards metric technologies to find solutions for managing various social domains such as healthcare and education. While private corporations are becoming more and more interested in the collection and analysis of data and metrics for profit generation and service optimisation. What is striking about this metric culture is that not only are governments and private companies the only actors interested in using metrics and data to control and manage individuals and populations, but individuals themselves are now choosing to voluntarily quantify themselves and their lives more than ever before, happily sharing the resulting data with others and actively turning themselves into projects of (self-) governance and surveillance. Metric Culture is also not only about data and numbers alone but links to issues of power and control, to questions of value and agency, and to expressions of self and identity. This book provides a critical investigation into these issues examining what is driving the agenda of metric culture and how it is manifested in the different spheres of everyday life through self-tracking practices. Authors engage with a broad range of topics, examples, geographical contexts, and sites of analysis in order to account for the diversity and hybridity of metric culture and explore its various social, political and ethical implications.
This book critically reviews existing digital divide research and challenges its core thesis, which posits unequal Internet access as a newly formed source of social disadvantage. The author begins by introducing the building blocks of the information society theory. The book goes on to present a systematic overview of digital divide research - its development, arguments attesting to the social gravity of the digital divide, and current findings on the uneven diffusion and use of the Internet. It evaluates the validity of the theories and concepts associated with digital divide research. The author offers an overview and re-examination of six presumptions and biases found in the prevailing approach to the digital divide. Given that Internet use has, in certain contexts, become an absolute necessity, an alternative approach is proposed, recognizing the indispensability of Internet use as context dependent. The book concludes with a consideration of the implications that this new perspective has for the information society theory and policies as well as for the role of social science in the informatization process.
This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.
This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019.The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.
This two-volume set (CCIS 1075 and CCIS 1076) constitutes the refereed proceedings of the Third International Conference on Advanced Informatics for Computing Research, ICAICR 2019, held in Shimla, India, in June 2019. The 78 revised full papers presented were carefully reviewed and selected from 382 submissions. The papers are organized in topical sections on computing methodologies; hardware; information systems; networks; software and its engineering. |
You may like...
|