|
|
Books > Computing & IT > Social & legal aspects of computing > General
Ethical values in computing are essential for understanding and
maintaining the relationship between computing professionals and
researchers and the users of their applications and programs. While
concerns about cyber ethics and cyber law are constantly changing
as technology changes, the intersections of cyber ethics and cyber
law are still underexplored. Investigating Cyber Law and Cyber
Ethics: Issues, Impacts and Practices discusses the impact of cyber
ethics and cyber law on information technologies and society.
Featuring current research, theoretical frameworks, and case
studies, the book will highlight the ethical and legal practices
used in computing technologies, increase the effectiveness of
computing students and professionals in applying ethical values and
legal statues, and provide insight on ethical and legal discussions
of real-world applications.
The volume is devoted to the relevant problems in the legal sphere,
created and generated by recent advances in science and technology.
In particular, it investigates a series of cutting-edge
contemporary and controversial case-studies where scientific and
technological issues intersect with individual legal rights. The
book addresses challenging topics at the intersection of
communication technologies and biotech innovations such as freedom
of expression, right to health, knowledge production, Internet
content regulation, accessibility and freedom of scientific
research.
As the IoT market is booming, several issues are delaying the full
realization of the technology. IoT devices, in cybersecurity terms,
greatly increase security risk. This means that any scientific work
that offers cybersecurity strategies will excite security experts
who will be glad to expand their knowledge base on IoT
cybersecurity. As a result of the booming of the IoT market,
business competitors are jockeying for a piece of the market. This
means that solutions from researchers that address compatibility
issues will be greatly welcomed by IoT technology developers.
Connectivity providers are likely to embrace solutions to
challenges of bandwidth since a growing IoT market must be followed
up by bandwidth-intensive IoT applications which tend to jostle for
space on the current client-server model. Overpromising followed by
underdelivering, has been the current approach by many innovators
and the mismatch results in losses in production, orphaned
technologies accompanied by frequent system failures. Solutions
that address IoT performance issues are likely to excite many
start-ups. Solutions to challenges of fragmentation presented by
thousands of devices from different manufacturers operating on
proprietary ecosystems are likely to be warmly embraced by many IoT
brands developers. As such, a publication that specifically
addresses the challenges faced in the rolling out of IoT
technologies is sorely needed.
The debate over cyber technology has resulted in new considerations
for national security operations. States find themselves in an
increasingly interconnected world with a diverse threat spectrum
and little understanding of how decisions are made within this
amorphous domain. With The Decision to Attack, Aaron Franklin
Brantly investigates how states decide to employ cyber in military
and intelligence operations against other states and how rational
those decisions are. In his examination, Brantly contextualizes
broader cyber decision-making processes into a systematic expected
utility-rational choice approach to provide a mathematical
understanding of the use of cyber weapons at the state level.
Topics Discussed: The Key Concepts of Cyber The Motivation and
Utility for Covert Action Digital Power Anonymity and Attribution
in Cyberspace Cyber and Conventional Operations: The Dynamics of
Conflict Defining the Role of Intelligence in Cyberspace How actors
decide to use cyber-a rational choice approach Cognitive Processes
and Decision-Making in Cyberspace Finding meaning in the expected
utility of international cyber conflict
This book attempts to link some of the recent advances in
crowdsourcing with advances in innovation and management. It
contributes to the literature in several ways. First, it provides a
global definition, insights and examples of this managerial
perspective resulting in a theoretical framework. Second, it
explores the relationship between crowdsourcing and technological
innovation, the development of social networks and new behaviors of
Internet users. Third, it explores different crowdsourcing
applications in various sectors such as medicine, tourism,
information and communication technology (ICT), and marketing.
Fourth, it observes the ways in which crowdsourcing can improve
production, finance, management and overall managerial performance.
Crowdsourcing, also known as "massive outsourcing" or "voluntary
outsourcing," is the act of taking a job or a specific task usually
performed by an employee of a company or contractors, and
outsourcing it to a large group of people or a community (crowd or
mass) via the Internet, through an open call. The term was coined
by Jeff Howe in a 2006 issue of Wired magazine. It is being
developed in different sciences (i.e., medicine, engineering, ICT,
management) and is used in the most successful companies of the
modern era (i.e., Apple, Facebook, Inditex, Starbucks). The
developments in crowdsourcing has theoretical and practical
implications, which will be explored in this book. Including
contributions from international academics, scholars and
professionals within the field, this book provides a global,
multidimensional perspective on crowdsourcing.
You know your dog is the cutest but does everyone else know it too?
In this book, Loni Edwards, the human behind the world's most
influential pets, breaks down the path to fame. Discover insights
into the success of social media's top pups and follow the
essential steps on the road to fame - from crafting your brand to
advocating for your pup on set. With expert guidance on how to be a
good dog parent and make sure your pup is happy and healthy every
step of the way, this is your one-stop guide to helping your dog
win over hearts, one adorable post at a time. Featuring the stories
of more than 40 of the most successful pet influencers: 157 of
Gemma, Amazing Graciedoodle, Barkley Sir Charles, Bertie Bert the
Pom, Bronson the Bully, Brussels Sprout, Bully Baloo, Charlie the
Black Shepherd, Chloe the Mini Frenchie (& Emma Bear), Coco the
Maltese Dog (Coco & Cici), Cookie Malibu, Crusoe the Celebrity
Dachshund, Daily Dougie, Dog named Stella, Ducky the Yorkie, Frame
the Weim, Gone to the Snow Dogs, Harlow and Sage, Hi Wiley, Kelly
Bove, Lilybug, Lizzie Bear, Louboutina the Hugging Dog, Maya Polar
Bear, Mervin the Chihuahua, Milo and Noah, MJ the Beagle, Mr.
Biggie, Popeye the Foodie, Puggy Smalls, Reagandoodle, Remix the
Dog, Rocco Roni, Super Corgi Jojo, Super Scooty, Tatum, That
Goldendoodle, The Bike Dog, Tika the Iggy, Tuna Melts my Heart,
Tupey the Borzoi, Verpinscht, Winnie the Cocker, Wolfgang 2242
This book offers guidance for US-based IT businesses on both sides
of the Atlantic when dealing with big data and government data,
since transatlantic data flows are key to the success of these
enterprises. It offers practical insights into many of the
data-protection challenges US companies in various industries face
when seeking to comply with US and EU data-protection laws, and
analyses the potential conflicts in the light of their risks and
the way in which US-based cloud providers react to the
uncertainties of the applicable data-protection rules. The book
particularly focuses on the insights derived from a qualitative
study conducted in 2016 with various cloud-based IT businesses in
the Silicon Valley area, which shows the diversity of views on data
protection and the many approaches companies take to this topic.
Further, it discusses key data-protection issues in the field of
big data and government data.
Peer to Peer Accommodation networks presents a new conceptual
framework which offers an initial explanation for the continuing
and rapid success of 'disruptive innovators' and their effects on
the international hospitality industry, with a specific focus on
Airbnb, in the international context. Using her first-hand
experience as a host on both traditional holiday accommodation
webpages and a peer-to-peer accommodation network, respected
tourism academic Sara Dolnicar examines possible reasons for the
explosive success of peer to peer accommodation networks,
investigates related topics which are less frequently discussed -
such as charitable activities and social activism - and offers a
future research agenda. Using first hand empirical results, this
text provides much needed insight into this 'disruptive innovator'
for those studying and working within the tourism and hospitality
industries. This book discusses a wealth of issues including: * The
disruptive innovation model - the criteria for identifying and
understanding new disruptive innovators, and how peer-to-peer
accommodation networks comply with these; * The factors postulated
to drive the success of these networks and the celebration of
variation; * Who are genuine networks members, tourist motivators
and the chance of the 'perfect match'; * Pricing, discrimination
and stimulation of the creation of new businesses.
New material treats such contemporary subjects as automatic
speech recognition and speaker verification for banking by computer
and privileged (medical, military, diplomatic) information and
control access.
The book also focuses on speech and audio compression for mobile
communication and the Internet. The importance of subjective
quality criteria is stressed.
The book also contains introductions to human monaural and
binaural hearing, and the basic concepts of signal analysis.
Beyond speech processing, this revised and extended new edition
of Computer Speech gives an overview of natural language technology
and presents the nuts and bolts of state-of-the-art speech dialogue
systems.
Advancing technologies are rapidly modifying the current state of
business and society causing an expansion of possible career
opportunities. In order to stay competitive, institutions of
education must provide an emphasis on the wide-range of skills and
experiences needed to contribute to a 21st century workforce. As
new technologies emerge and even disrupt, there will be a demand
for new forms of education and deeper learning. Disruptive and
Emerging Technology Trends Across Education and the Workplace is a
collection of innovative research on the latest instructive methods
being utilized in classrooms and organizations as well as the
benefits and challenges of adopting these technologies. While
highlighting topics including mobile learning, augmented reality,
and cryptocurrencies, this book is ideally designed for developers,
professionals, educators, managers, researchers, scientists,
stakeholders, strategists, practitioners, and students seeking
current research on new forms of educational techniques in relation
to the continued application of new technologies in the workplace.
With the prevalence of social media, businesses and other
organizations have a growing need to utilize various online media
platforms and sites to engage and interact with their potential
consumer base. Virtual communities and social networking can
provide an effective escape route from the limits imposed by
traditional media. Using optimal strategies can lead to more
successful outcomes when using these platforms. Modern Perspectives
on Virtual Communications and Social Networking provides innovative
insights into connection and conversation through internet media
that foster trust, commitment, and transparency in business. The
content within this publication represents the potential to create
virtual bonds with consumers through the observation of buying
behavior, social media best practices, and digital marketing
strategies. It is designed for business professionals,
academicians, consultants, managers, marketers, and researchers and
covers topics centered on the use of online media as a method of
reaching a wider population.
It's easy and reflexive to view our online presence as fake, to see
the internet as a space we enter when we aren't living our real,
offline lives. And yet, so much of who we are and what we do now
happens online. Social media is becoming less somewhere we go and
more a place in which we are simply always present. All of it makes
it hard to know which parts of our lives are real. IRL, Chris
Stedman's personal and searing exploration of authenticity in the
digital age, shines a light on how age-old notions of realness can
be freshly understood in our new online lives. Stedman argues for a
different way of seeing the supposed split between our online and
offline selves: far from being unnatural, the internet is simply
one more tool for understanding and expressing ourselves, and the
way we use it can reveal new insights into far older human
behaviors and desires. IRL invites readers to consider the ways
they edit or curate themselves for digital audiences, and in the
end makes a bold case for authenticity, even when it feels risky.
In today's market, emerging technologies are continually assisting
in common workplace practices as companies and organizations search
for innovative ways to solve modern issues that arise. Prevalent
applications including internet of things, big data, and cloud
computing all have noteworthy benefits, but issues remain when
separately integrating them into the professional practices.
Significant research is needed on converging these systems and
leveraging each of their advantages in order to find solutions to
real-time problems that still exist. Challenges and Opportunities
for the Convergence of IoT, Big Data, and Cloud Computing is a
pivotal reference source that provides vital research on the
relation between these technologies and the impact they
collectively have in solving real-world challenges. While
highlighting topics such as cloud-based analytics, intelligent
algorithms, and information security, this publication explores
current issues that remain when attempting to implement these
systems as well as the specific applications IoT, big data, and
cloud computing have in various professional sectors. This book is
ideally designed for academicians, researchers, developers,
computer scientists, IT professionals, practitioners, scholars,
students, and engineers seeking research on the integration of
emerging technologies to solve modern societal issues.
Africa 2.0 provides an important history of how two technologies -
mobile calling and internet - were made available to millions of
sub-Saharan Africans, and the impact they have had on their lives.
The book deals with the political challenges of liberalisation and
privatisation that needed to be in place in order for these
technologies to be built. It analyses how the mobile phone
fundamentally changed communications in sub-Saharan Africa and the
ways Africans have made these technologies part of their lives,
opening up a very different future. The book offers a critical
examination of the impact these technologies have had on
development practices, and the key role development actors played
in accelerating regulatory reform, fibre roll-out and mobile money.
Southwood shows how corruption in the industry is a prism through
which patronage relationships in government can be understood, and
argues that the arrival of a start-up ecosystem in the region has
the potential to change this. A vital overview of the changes of
the last three decades, Africa 2.0 examines the transformative
effects of mobile and internet technologies, and the very different
future they have opened out for sub-Saharan Africa. -- .
|
You may like...
Facebook
Dana Kilroy
Fold-out book or chart
R229
Discovery Miles 2 290
|