![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The book provides copyright protection approaches for videos using watermarking. The various watermarking techniques using various transforms such as discrete cosine transform (DCT), discrete wavelet transform (DWT) and singular value decomposition (SVD) for videos are presented. The book also provides video watermarking approach using compressive sensing (CS) theory. The presented watermarking techniques are designed and implemented using color digital videos. The performance of the presented techniques is evaluated using Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC).
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
This book constitutes the refereed proceedings of the 14th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2018, held in Athens, Greece, in June 2018. The 14 revised full papers and 2 short papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of free/libre open source software (FLOSS) and are organized in the following thematic sections: organizational aspects of OSS projects, OSS projects validity, mining OSS data, OSS in public administration, OSS governance, and OSS reusability.
In the age of digitalization, even the way we govern is adapting. Recently, with the successful implementation of e-governments, the way our systems are organized has changed. Here, Israel Patino Galvan suggests a specialized design structure as an alternative to the new, digital governments that are becoming increasingly more common. Through a thorough exploration of the history of these structures, and through field research in Mexico, serious deficiencies have been identified in the ways in which these e-governments have been implemented. Instead, Galvan offers a tri-phase solution to designing local governments, placing the direction and division of Information Technologies at the core to support the modernization and optimization process. For researchers and practitioners in public administration, information technologies, or information systems, this is a vital text providing a detailed case study as support for a new organizational system.
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis. It specifically focuses on the application of these techniques in Africa, and how they can be of benefit in the investigation of crime in Nigeria in particular.
The culture we consume is increasingly delivered to us via various digital on-demand platforms. The last decade has seen platforms like Facebook, Amazon, Netflix, Spotify, Google and the like become massive players in shaping cultural consumption. But how can we understand culture once it moves on to big tech platforms? How can we make sense of the changes this brings to our lives? These platforms have the power to shape our cultural landscape and to use data, algorithms and other technological means to shape our experiences, from what we remember through to what we know and even the speed and accessibility of culture. This book asks how can we understand the chaos and messiness of on-demand culture? Beer suggests that we focus on the quirks and use these as openings to see inside patterns and dynamics of these new cultural formations. By exploring the strange quirks that typify our new on-demand culture, this book seeks to answer these questions. The Quirks of Digital Culture is a guide to understanding the complex and unsettling cultural present, whilst also casting an eye on how our consumption and cultural experiences may unfold in what seems like an unpredictable future.
This volume focuses on the responsibilities of online service providers (OSPs) in contemporary societies. It examines the complexity and global dimensions of the rapidly evolving and serious challenges posed by the exponential development of Internet services and resources. It looks at the major actors - such as Facebook, Google, Twitter, and Yahoo! - and their significant influence on the informational environment and users' interactions within it, as well as the responsibilities and liabilities such influence entails. It discusses the position of OSPs as information gatekeepers and how they have gone from offering connecting and information-sharing services to paying members to providing open, free infrastructure and applications that facilitate digital expression and the communication of information. The book seeks consensus on the principles that should shape OSPs' responsibilities and practices, taking into account business ethics and policies. Finally, it discusses the rights of users and international regulations that are in place or currently lacking.
This book presents a comparative study on access to public information in the context of the main legal orders worldwide(inter alia China,France,Germany,Japan,Russia,Sweden,United States).The international team of authors analyzes the Transparency- and Freedom-to-Information legislation with regard to the scope of the right to access, limitations of this right inherent in the respective national laws, the procedure, the relationship with domestic legislation on administrative procedure, as well as judicial protection. It particularly focuses on the Brazilian law establishing the right of access to information, which is interpreted as a benchmark for regulations in other Latin-American states.
What takes place when we examine texts close-up? The art of close reading, once the closely guarded province of professional literary critics, now underpins the everyday processes of forensic scrutiny conducted by those brigades of citizen commentators who patrol the realms of social media. This study examines at close quarters a series of key English texts from the last hundred years: the novels of Virginia Woolf and James Joyce, the plays of Samuel Beckett, the poetry of Sylvia Plath and Philip Larkin, the films of Alfred Hitchcock and the tweets of Donald Trump. It digs beneath their surface meanings to discover microcosmic ambiguities, allusions, ironies and contradictions which reveal tensions and conflicts at the heart of the paradox of patriarchal history. It suggests that acts of close reading may offer radical perspectives upon the bigger picture, as well as the means by which to deconstruct it. In doing so, it suggests an alternative to a classical vision of cultural progress characterised by irreconcilable conflicts between genders, genres and generations.
This book examines the ability of citizens across ten European countries to exercise their democratic rights to access their personal data. It presents a socio-legal research project, with the researchers acting as citizens, or data subjects, and using ethnographic data collection methods. The research presented here evidences a myriad of strategies and discourses employed by a range of public and private sector organizations as they obstruct and restrict citizens' attempts to exercise their informational rights. The book also provides an up-to-date legal analysis of legal frameworks across Europe concerning access rights and makes several policy recommendations in the area of informational rights. It provides a unique and unparalleled study of the law in action which uncovered the obstacles that citizens encounter if they try to find out what personal data public and private sector organisations collect and store about them, how they process it, and with whom they share it. These are simple questions to ask, and the right to do so is enshrined in law, but getting answers to these questions was met by a raft of strategies which effectively denied citizens their rights. The book documents in rich ethnographic detail the manner in which these discourses of denial played out in the ten countries involved, and explores in depth the implications for policy and regulatory reform.
This book examines the role of the EU in ensuring privacy and data protection on the internet. It describes and demonstrates the importance of privacy and data protection for our democracies and how the enjoyment of these rights is challenged by, particularly, big data and mass surveillance. The book takes the perspective of the EU mandate under Article 16 TFEU. It analyses the contributions of the specific actors and roles within the EU framework: the judiciary, the EU legislator, the independent supervisory authorities, the cooperation mechanisms of these authorities, as well as the EU as actor in the external domain. Article 16 TFEU enables the Court of the Justice of the EU to play its role as constitutional court and to set high standards for fundamental rights protection. It obliges the European Parliament and the Council to lay down legislation that encompasses all processing of personal data. It confirms control by independent supervisory authorities as an essential element of data protection and it gives the EU a strong mandate to act in the global arena. The analysis shows that EU powers can be successfully used in a legitimate and effective manner and that this subject could be a success story for the EU, in times of widespread euroskepsis. It demonstrates that the Member States remain important players in ensuring privacy and data protection. In order to be a success story, the key stakeholders should be prepared to go the extra mile, so it is argued in the book. The book is based on academic research for which the author received a double doctorate at the University of Amsterdam and the Vrije Universiteit Brussels. It builds on a long inside experience within the European institutions, as well as within the community of data protection and data protection authorities. It is a must read in a time where the setting of EU privacy and data protection is changing dramatically, not only as a result of the rapidly evolving information society, but also because of important legal developments such as the entry into force of the General Data Protection Regulation. This book will appeal to all those who are in some way involved in making this regulation work. It will also appeal to people interested in the institutional framework of the European Union and in the role of the Union of promoting fundamental rights, also in the wider world.
This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws. In addition, it covers all sub-regional and regional data privacy policies in Africa. Apart from analysing data protection law, the book focuses on the socio-economic contexts, political settings and legal culture in which such laws developed and operate. It bases its analyses on the African legal culture and comparative international data privacy law. In Africa protection of personal data, the central preoccupation of data privacy laws, is on the policy agenda. The recently adopted African Union Cyber Security and Data Protection Convention 2014, which is the first and currently the only single treaty across the globe to address data protection outside Europe, serves as an illustration of such interest. In addition, there are data protection frameworks at sub-regional levels for West Africa, East Africa and Southern Africa. Similarly, laws on protection of personal data are increasingly being adopted at national plane. Yet despite these data privacy law reforms there is very little literature about data privacy law in Africa and its recent developments. This book fills that gap.
This book offers guidance for US-based IT businesses on both sides of the Atlantic when dealing with big data and government data, since transatlantic data flows are key to the success of these enterprises. It offers practical insights into many of the data-protection challenges US companies in various industries face when seeking to comply with US and EU data-protection laws, and analyses the potential conflicts in the light of their risks and the way in which US-based cloud providers react to the uncertainties of the applicable data-protection rules. The book particularly focuses on the insights derived from a qualitative study conducted in 2016 with various cloud-based IT businesses in the Silicon Valley area, which shows the diversity of views on data protection and the many approaches companies take to this topic. Further, it discusses key data-protection issues in the field of big data and government data.
From virtual assistants to social robots, people are increasingly interacting with intelligent and highly communicative technologies throughout their daily lives. This shift from communicating with people to communicating with people and machines challenges how scholars have theorized and studied communication. Human-Machine Communication: Rethinking Communication, Technology, and Ourselves addresses this transition in how people communicate and who, or what, they communicate with and the implications of this evolution for communication research. Geared toward scholars interested in people's interactions with technology, this book serves as an introduction to human-machine communication (HMC) as a specific area of study within communication (encompassing human-computer interaction, human-robot interaction, and human-agent interaction) and to the research possibilities of HMC. This collection includes papers presented as part of a scholarly conference on HMC, along with invited works from noted researchers. Topics include defining HMC, theoretical approaches to HMC, applications of HMC, and the larger implications of HMC for self and society. The research presented here focuses on people's interactions with multiple technologies (artificial intelligence, algorithms, and robots) used within different contexts (home, workplace, education, journalism, and healthcare) from a variety of epistemological and methodological approaches (empirical, rhetorical, and critical/cultural). Overall, Human-Machine Communication provides readers with an understanding of HMC in a way that supports and promotes further scholarly inquiry in a growing area of communication research.
This book constitutes the refereed proceedings of the 5th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2016, held in Porto, Portugal, in September 2016, in conjunction with DEXA 2015. The 22 revised full papers presented together with three invited talk were carefully reviewed and selected from 27 submissions. The papers are organized in the following topical sections: e-government cases - legal issues; e-government cases - technical issues; open data and transparency; knowledge representation and modeling in e-government; intelligent systems in e-government; e-government research and intelligent systems; e-government data and knowledge management; identity management in e-government.
Avatar, Assembled is a curated volume that unpacks videogame and virtual world avatars-not as a monolithic phenomenon (as they are usually framed) but as sociotechnical assemblages, pieced together from social (human-like) features like voice and gesture to technical (machine-like) features like graphics and glitches. Each chapter accounts for the empirical, theoretical, technical, and popular understandings of these avatar "components"-60 in total-altogether offering a nuanced explication of avatars-as-assemblages as they matter in contemporary society and in individual experience. The volume is a "crossover" piece in that, while it delves into complex ideas, it is written in a way that will be accessible and interesting to students, researchers, designers, and practitioners alike.
This book constitutes the refereed proceedings of the 15th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2016, held in Guimaraes, Portugal, in September 2016, in conjunction with the 8th International Conference on eParticipation, ePart 2016. The 24 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers are clustered under the following topical sections: foundations; benchmarking and evaluation; information integration and governance; services; evaluation and public values; EGOV success and failure; governance; social media; engagement; processes; policy-making; trust, transparency and accountability; open government and big/open data; smart government/governance/cities.
Here is the Instagram guide to (re)discovering New York in style, including addresses for eating, drinking, shopping, sightseeing and (street) art. Documenting the daily life and preferred secret spots of an expat in the city, it is a lifestyle guide, a photo album, and a mood board all in one. The Lazy Frenchie is a must-have for millennials and Instagram addicts who love New York. It is a colourful, photo-centric guidebook that uses popular hashtags as captions: #AvocadoToast, #CoffeeBreak, #VintageMarket, #DateNight, #StreetArtIsEverywhere, #IHaveThisThingWithFloors, etc. It will cater to tourists and locals alike.
The volume explores the consequences of recent events in global Internet policy and possible ways forward following the 2012 World Conference on International Telecommunications (WCIT-12). It offers expert views on transformations in governance, the future of multistakeholderism and the salience of cybersecurity. Based on the varied backgrounds of the contributors, the book provides an interdisciplinary perspective drawing on international relations, international law and communication studies. It addresses not only researchers interested in the evolution of new forms of transnational networked governance, but also practitioners who wish to get a scholarly reflection on current regulatory developments. It notably provides firsthand accounts on the role of the WCIT-12 in the future of Internet governance.
The fastest, easiest, most comprehensive way to learn Adobe Animate Classroom in a Book (R), the best-selling series of hands-on software training workbooks, offers what no other book or training program does -- an official training series from Adobe, developed with the support of Adobe product experts. Adobe Animate Classroom in a Book (2021 release) contains lessons that cover the basics and beyond, providing countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. Purchase of this book includes valuable online features. Follow the instructions in the book's "Getting Started" section to unlock access to: Downloadable lesson files you need to work through the projects in the book Web Edition containing the complete text of the book, interactive quizzes, and videos that walk you through the lessons step by step What you need to use this book: Adobe Animate (2021 release) software, for either Windows or macOS. (Software not included.) Note: Classroom in a Book does not replace the documentation, support, updates, or any other benefits of being a registered owner of Adobe Animate software.
This work is an assessment of how to manage risk in property transactions in the context of the move from paper-based to electronic conveyancing (eConveyancing). In particular the focus is on risks that impact on title registration, and the security, protection or lack thereof that this registration offers to land owners, third parties and property claimants. The impact is the extent to which a change in the transactional process may unintentionally affect risk (being the consequence of change and the likelihood of that consequence having a negative effect). The risks are identified, analysed and evaluated against the backdrop of title registration and the development of eConveyancing through a comparative analysis of the systems in Ireland and Ontario, while also referencing other developing electronic systems around the globe.
This book discusses all critical privacy and data protection aspects of biometric systems from a legal perspective. It contains a systematic and complete analysis of the many issues raised by these systems based on examples worldwide and provides several recommendations for a transnational regulatory framework. An appropriate legal framework is in most countries not yet in place. Biometric systems use facial images, fingerprints, iris and/or voice in an automated way to identify or to verify (identity) claims of persons. The treatise which has an interdisciplinary approach starts with explaining the functioning of biometric systems in general terms for non-specialists. It continues with a description of the legal nature of biometric data and makes a comparison with DNA and biological material and the regulation thereof. After describing the risks, the work further reviews the opinions of data protection authorities in relation to biometric systems and current and future (EU) law. A detailed legal comparative analysis is made of the situation in Belgium, France and the Netherlands. The author concludes with an evaluation of the proportionality principle and the application of data protection law to biometric data processing operations, mainly in the private sector. Pleading for more safeguards in legislation, the author makes several suggestions for a regulatory framework aiming at reducing the risks of biometric systems. They include limitations to the collection and storage of biometric data as well as technical measures, which could influence the proportionality of the processing. The text is supported by several figures and tables providing a summary of particular points of the discussion. The book also uses the 2012 biometric vocabulary adopted by ISO and contains an extensive bibliography and literature sources.
|
You may like...
Stochastic Geometric Mechanics - CIB…
Sergio Albeverio, Ana Bela Cruzeiro, …
Hardcover
Variational Methods for Discontinuous…
Raul Serapioni, Franco Tomarelli
Hardcover
R2,759
Discovery Miles 27 590
Renegades - Born In The USA
Barack Obama, Bruce Springsteen
Hardcover
(1)
|