|
|
Books > Computing & IT > Social & legal aspects of computing > General
This book starts with an exercise, proposing a theoretical
reflection on the technological path that, over time, has
transformed the ways we produce, consume and manage intellectual
content subject to copyright protection. This lays the groundwork
for a further analysis of the main legal aspects of the new
European Directive, its improvements, its tendencies and its points
of controversy, with special and more concrete attention to how it
proposes to address the issues of competition, transparency and
multi-territorial licensing. Digital technologies, networks and
communication have boosted the production and distribution of
intellectual content. These activities are based on a renewable and
infinite resource - creativity - which turns this content into
strategic artistic, cultural, social, economic and informational
assets. Managing the rights and obligations that emerge in this
system has never been an easy task; managing them collectively,
which is more often than not the case, adds even more complexity.
The European Directive on collective management of copyright and
related rights and multi-territorial licensing of rights in musical
works for online use in the internal market is a policy initiative
that seeks to establish an adequate legal framework for the
collective management of authors' rights in a digital environment,
recognizing this goal as crucial to achieving a fully integrated
Single Market. Part of the Digital Agenda for Europe, it is an
effort to promote simplification and to enhance the efficiency of
collective rights management by tackling three of the main issues
that are currently undermining the business model of collecting
societies: competition, transparency and multi-territorial
licensing. The book is intended to support students, academics and
practitioners by enhancing their general and legal grasp of these
phenomena, while also encouraging their collaboration with
policymakers and other interested parties in the ongoing task of
transposing the Directive into concrete national legislation.
Much debate has been given as to whether computer security is
improved through the full disclosure of security vulnerabilities
versus keeping the problems private and unspoken. Although there is
still tension between those who feel strongly about the subject, a
middle ground of responsible disclosure seems to have emerged.
Unfortunately, just as we've moved into an era with more
responsible disclosure, it would seem that a market has emerged for
security vulnerabilities and zero day exploits. Disclosure of
Security Vulnerabilities: Legal and Ethical Issues considers both
the ethical and legal issues involved with the disclosure of
vulnerabilities and explores the ways in which law might respond to
these challenges.
Social Media: Enduring Principles offers a comprehensive overview
of topics in social media, from interpersonal communication to the
role of social media in culture and society. It covers not only
cultural issues like online identity and community, but also
tackles more analytical topics like social media measurement,
network analysis, and social media economics at an introductory
level. Each chapter is based on a set of core social science
theories and concepts rather than platform-specific frameworks and
findings. Rather than providing the final word or predictions, it
aims to open a well-structured, well-grounded conversation about
media transition and its effects. Filling the need for a standard
academic text in the field, Social Media: Enduring Principles
summarizes both foundational and state-of-the-art research and also
presents a coherent framework for future research. It draws from
longstanding theories in communication, journalism, sociology, and
marketing, but also includes a number of contemporary case
examples, making it a foundational text in the area.
Leverage the full potential of IoT with the combination of
Raspberry Pi 3 and Python and architect a complete IoT system that
is the best fit for your organization Key Features Build complex
Python-based applications with IoT Explore different concepts,
technologies, and tradeoffs in the IoT architectural stack Delve
deep into each element of the IoT design-from sensors to the cloud
Book DescriptionThe Internet of Things (IoT) is the fastest growing
technology market. Industries are embracing IoT technologies to
improve operational expenses, product life, and people's
well-being. We'll begin our journey with an introduction to
Raspberry Pi and quickly jump right into Python programming. We'll
learn all concepts through multiple projects, and then reinforce
our learnings by creating an IoT robot car. We'll examine modern
sensor systems and focus on what their power and functionality can
bring to our system. We'll also gain insight into cloud and fog
architectures, including the OpenFog standards. The Learning Path
will conclude by discussing three forms of prevalent attacks and
ways to improve the security of our IoT infrastructure. By the end
of this Learning Path, we will have traversed the entire spectrum
of technologies needed to build a successful IoT system, and will
have the confidence to build, secure, and monitor our IoT
infrastructure. This Learning Path includes content from the
following Packt products: Internet of Things Programming Projects
by Colin Dow Internet of Things for Architects by Perry Lea What
you will learn Build a home security dashboard using an infrared
motion detector Receive data and display it with an actuator
connected to the Raspberry Pi Build an IoT robot car that is
controlled via the Internet Use IP-based communication to easily
and quickly scale your system Explore cloud protocols, such as
Message Queue Telemetry Transport (MQTT) and CoAP Secure
communication with encryption forms, such as symmetric key Who this
book is forThis Learning Path is designed for developers,
architects, and system designers who are interested in building
exciting projects with Python by understanding the IoT ecosphere,
various technologies, and tradeoffs. Technologists and technology
managers who want to develop a broad view of IoT architecture, will
also find this Learning Path useful. Prior programming knowledge of
Python is a must.
This volume offers unique insights into the mutually constitutive
nature of social media practices and religious change. Part 1
examines how social media operate in conjunction with mass media in
the construction of discourses of religion and spirituality. It
includes: a longitudinal study of British news media coverage of
Christianity, secularism and religious diversity (Knott et al.); an
analysis of responses to two documentaries 'The Monastery' and 'The
Convent' (Thomas); an evaluation of theories of the sacred in
studies of religion and media within the 'strong program' in
cultural sociology in the US (Lynch); and a study of the
consequences of mass and social media synergies for public
perceptions of Islam in the Netherlands (Herbert). Part 2 examines
the role of social media in the construction of contemporary
martyrs and media celebrities (e.g., Michael Jackson) using mixed
and mobile methods to analyse fan sites (Bennett & Campbell)
and jihadi websites and YouTube (Nauta). Part 3 examines how
certain bounded religious communities negotiate the challenges of
social media: Judaism in Second Life (Abrams & Baker); Bah'ai
regulation of web use among members (Campbell & Fulton);
YouTube evangelists (Pihlaja); and public expressions of
bereavement (Greenhill & Fletcher). The book provides
theoretically informed empirical case studies and presents an
intriguing, complex picture of the aesthetic and ethical,
demographic and discursive aspects of new spaces of communication
and their implications for religious institutions, beliefs and
practices.
This book presents a study of the COVID-19 pandemic using
computational social scientific analysis that draws from, and
employs, statistics and simulations. Combining approaches in crisis
management, risk assessment and mathematical modelling, the work
also draws from the philosophy of sacrifice and futurology. It
makes an original contribution to the important issue of the
stability of society by highlighting two significant factors: the
COVID-19 crisis as a catalyst for change and the rise of AI and Big
Data in managing society. It also emphasizes the nature and
importance of sacrifices and the role of politics in the
distribution of sacrifices. The book considers the treatment of AI
and Big Data and their use to both "good" and "bad" ends, exposing
the inevitability of these tools being used. Relevant to both
policymakers and social scientists interested in the influence of
AI and Big Data on the structure of society, the book re-evaluates
the ways we think of lifestyles, economic systems and the balance
of power in tandem with digital transformation.
Computers, now the writer's tool of choice, are still blamed by
skeptics for a variety of ills, from speeding writing up to the
point of recklessness, to complicating or trivializing the writing
process, to destroying the English language itself. A Better Pencil
puts our complex, still-evolving hate-love relationship with
computers and the internet into perspective, describing how the
digital revolution influences our reading and writing practices,
and how the latest technologies differ from what came before. The
book explores our use of computers as writing tools in light of the
history of communication technology, a history of how we love,
fear, and actually use our writing technologies-not just computers,
but also typewriters, pencils, and clay tablets. Dennis Baron shows
that virtually all writing implements-and even writing itself-were
greeted at first with anxiety and outrage: the printing press
disrupted the "almost spiritual connection" between the writer and
the page; the typewriter was "impersonal and noisy" and would
"destroy the art of handwriting." Both pencils and computers were
created for tasks that had nothing to do with writing. Pencils,
crafted by woodworkers for marking up their boards, were quickly
repurposed by writers and artists. The computer crunched numbers,
not words, until writers saw it as the next writing machine. Baron
also explores the new genres that the computer has launched: email,
the instant message, the web page, the blog, social-networking
pages like MySpace and Facebook, and communally-generated texts
like Wikipedia and the Urban Dictionary, not to mention YouTube.
Here then is a fascinating history of our tangled dealings with a
wide range of writing instruments, from ancient papyrus to the
modern laptop. With dozens of illustrations and many colorful
anecdotes, the book will enthrall anyone interested in language,
literacy, or writing.
Are you new to the Macintosh experience and iLife? Or are you
someone who wants to know the ins and outs of Apple's powerful
media creation tools? Either way, you have come to right place
iLife '11 Made Simple will guide you through the iLife apps and
help you become a power user in no time. iLife '11 Made Simple lets
you be creative with iPhoto, iDVD, iMovie, iWeb, and GarageBandfrom
the initial welcome screen to the last menu item. Even though
iTunes is not part of the retail package, it is an important part
of the creation or sharing process and is coveredin this bookas
well. You'll also learn how iLife apps work on iOS devices as well
as how they work with iCloud. So, if you just want to learn how to
create a basic movie, song or website, iLife '11 Made Simple is
perfect for you. Want to become a media mogul in any of the covered
applications? After reading this manual, you'll be swept into the
creative process and be well on your way to creating or enhancing
your next iLife masterpiece You already own the most powerful and
easy-to-use computer in the known universe. With this guide in
hand, you'll see how Apple appliesits magic to incredible software
packages as well. What you'll learn Edit and share photos with
iPhoto In-depth features of iDVD Simplify the arcane magic behind
video editing with iMovie Easy web publishing with iWeb Make music
or even get started learning an instrument with GarageBand Make the
most of all the featuresof iTunes Who this book is for
Mac and iDevice users, whether new or experienced, who want to
get the most out of their iLife '11 applications. Table of Contents
Getting Around Your Digital Darkroom Setting Your Sights on
iPhoto's Menus Getting Your Memories intothe Digital Darkroom
Creating and Sharing Personalized Photo Keepsakes Faces and Places
And Now...A slideshow Beginner DVD creation via iDVD iDVD
workspace: The Widescreen Edition Burning Questions About iDVD
Menus Welcome to Web Creation the iWeb Way When in Doubt in iWeb,
Go to the Inspector Bookmark This Chapter on iWeb Menus
Lights...Camera...Themes...iMovie Workspaces iMovie Advanced
Features: The Inspector, Ken Burns Effect, andMore Calling the
Shots on the iMovie Menus Rockin' Around the GarageBand Sidebar
Fiddlin' with the Functions Around theGarageBand Workspace Help
Composing YourSongs with Notes on GarageBand Menus Navigating
iTunes viaIts Sidebar andWorkspace Views Getting media into and out
ofiTunes iTunesEverything about the Workspace Except the Kitchen
"Sync" How to Become an Efficient Media Mogul by Using the iTunes
Menus iLife on the iPad A Glimpse into iCloud
Inside the Dark Web provides a broad overview of emerging digital
threats and computer crimes, with an emphasis on cyberstalking,
hacktivism, fraud and identity theft, and attacks on critical
infrastructure. The book also analyzes the online underground
economy and digital currencies and cybercrime on the dark web. The
book further explores how dark web crimes are conducted on the
surface web in new mediums, such as the Internet of Things (IoT)
and peer-to-peer file sharing systems as well as dark web forensics
and mitigating techniques. This book starts with the fundamentals
of the dark web along with explaining its threat landscape. The
book then introduces the Tor browser, which is used to access the
dark web ecosystem. The book continues to take a deep dive into
cybersecurity criminal activities in the dark net and analyzes the
malpractices used to secure your system. Furthermore, the book digs
deeper into the forensics of dark web, web content analysis, threat
intelligence, IoT, crypto market, and cryptocurrencies. This book
is a comprehensive guide for those who want to understand the dark
web quickly. After reading Inside the Dark Web, you'll understand
The core concepts of the dark web. The different theoretical and
cross-disciplinary approaches of the dark web and its evolution in
the context of emerging crime threats. The forms of cybercriminal
activity through the dark web and the technological and "social
engineering" methods used to undertake such crimes. The behavior
and role of offenders and victims in the dark web and analyze and
assess the impact of cybercrime and the effectiveness of their
mitigating techniques on the various domains. How to mitigate
cyberattacks happening through the dark web. The dark web ecosystem
with cutting edge areas like IoT, forensics, and threat
intelligence and so on. The dark web-related research and
applications and up-to-date on the latest technologies and research
findings in this area. For all present and aspiring cybersecurity
professionals who want to upgrade their skills by understanding the
concepts of the dark web, Inside the Dark Web is their one-stop
guide to understanding the dark web and building a cybersecurity
plan.
The area of Virtual Organizations as a main component of the new
discipline of Collaborative Networks has been the focus of research
globally. The fast evolution of the information and communication
technologies and in particular the so-called Internet technologies,
also represents an important motivator for the emergence of new
forms of collaboration. However, the research in many of these
cases is highly fragmented, considering that each project is
focused on solving specific problems. As such, there is no
effective consolidation/harmonization among them in order to have
an effective impact and facilitate the interaction among the
involved experts.
This book represents a contribution to the consolidation of the
already vast amount of empirical knowledge and practical
experience. A synthesis of results collected from the analysis of
numerous projects and industry case studies is presented, with
focus on: Principles and models, ICT infrastructures and tools,
Implementation issues, and Case studies.
|
|