![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > General
This book presents groundbreaking discussions on e-residency, cryptocurrencies, scams, smart contracts, 3D printing, software agents, digital evidence and e-governance at the intersection of law, legal policies and modern technologies. The reader benefits from cutting-edge analyses that offer ideas and solutions to some of the most pressing issues caused by e-technologies. This collection is a useful tool for law and IT practitioners and an inspiring source for interdisciplinary research. Besides serving as a practical guideline, this book also reflects theoretical dimensions of future perspectives, as new technologies are not meant to change common values but to accommodate them.
This book presents different perspectives of online business education - how it is designed, delivered and how it supports advances in management disciplines. The authors describe online platforms in their provision of timely, excellent and relevant business education. The book starts by examining the emergence of online business education. It offers insights for use to business educators in design and implementation of online learning. It presents and discusses technologies for class facilitation and collaboration including tools used to bring content and issues to life. Disruptive approaches and new directions in online business education are examined. The book is ideal for business educators, administrators, as well as business practitioners that have an interest in delivering high quality business education using online platforms and tools. On the Line: Business Education in the Digital Age is divided into three sections. Section 1 presents papers on "why" business education is viable and sustainable in today's context. Treating education as a service, this section describes new techniques for creating a better online business education experience. It also looks at the role advanced data analytics can play in enhancing the quality of online business education. Section 2 delves into "how" online business education works. It presents conceptual models for teaching in specific disciplines, learning design that describes what business educators do and how programs work. This section also addresses performance assessments and quality assurance measures that help to demonstrate the efficacy of online pedagogy. Practical applied papers are used in this section to highlight the use of learning platforms, tools and their application specific to businesses that build knowledge and skills and make students 'work ready'. Finally Section 3 of the book addresses the "so what?" or the outcomes and impacts of online business education. This section targets where business education needs to take learning next, for example to support sustainable business, ethical decision making and inclusive and collaborative leadership. Chapters deal with topics such as how distributed online environments may work better to support knowledge and soft skill building directly relevant for organizations today. Other learning outcomes showing the value of online business education are discussed. Academics, alumni and consultants from over fifteen institutions and organizations around the world contributed to this book.
What impact does our relentless fixation on gadgets have on the struggle for new kinds of solidarity, political articulation and intelligence? In this groundbreaking study, Joss Hands explores the new political and social forces that are emerging in the age of social media. Gadget Consciousness examines the transformation of our consciousness as a historical political force in two senses: as individual consciousness - in terms of sentience and will - and also as class consciousness. Exploring a range of manifestations in the digital commons, he investigates what forms digital solidarity can take, and asks whether we can learn from the communisms of the past and how might solidarity be manifested in the future? Today, the ubiquity of networked gadgets offers exciting new opportunities for social and political change, but also significant dangers of alienation and stupefaction.
As the growing relationship between individuals and technology continue to play a vital role in our society and work place, the progress and execution of information technology communication systems is important in maintaining our current way of life. Knowledge and Technological Development Effects on Organizational and Social Structures provides a wide ranging discussion on the exchanging of research ideas and practices in an effort to bring together the social and technical aspects within organizations and society. This collection focuses on new ideas and studies for research, students, and practitioners.
This book develops a common understanding between the client and the provider in each of the four stages of strategic outsourcing. These stages range from discovery, where the parties envision their future collaboration; planning, where they lay the ground work for the contract and the project; building, where they effectively carry out the work; and lastly to running, where they orchestrate the relationship on a daily basis to ensure that the new, enlarged company achieves the results sought. In a simple yet direct style, it highlights the dos and don'ts the parties should bear in mind at each stage of the process and combines both the client's and the provider's perspectives by comparing their respective involvement at each stage of the process and considering, equally, their obligations in establishing a balanced relationship. The book is primarily intended for those in the private sector with experience of dealing with complex outsourcing situations and who are looking for the small or bigger differentiators that will support their decisions and actions. The target audiences include, on the client side: CCOs, CIOs, lawyers, procurement managers, outsourcing consultants and IT Service managers and, on the provider side: account managers, bid managers, outsourcing project managers, operation managers and service managers. However, it is also useful for anybody involved in outsourcing who is seeking to develop a global understanding of the main processes and roles upstream and downstream in the chain.
The volume explores the consequences of recent events in global Internet policy and possible ways forward following the 2012 World Conference on International Telecommunications (WCIT-12). It offers expert views on transformations in governance, the future of multistakeholderism and the salience of cybersecurity. Based on the varied backgrounds of the contributors, the book provides an interdisciplinary perspective drawing on international relations, international law and communication studies. It addresses not only researchers interested in the evolution of new forms of transnational networked governance, but also practitioners who wish to get a scholarly reflection on current regulatory developments. It notably provides firsthand accounts on the role of the WCIT-12 in the future of Internet governance.
The lockdowns and shutdowns due to COVID-19 encouraged accelerated experimental with new organization practices. The impacts of the pandemic were very strong, both in times of containment, the loosening of restrictions, and recovery periods. Whether in collective and individual commitment, health, and the rapid adoption of new working methods, companies were challenged to adjust very quickly to cope with the emergency. With the interconnection of health, economic, social, and environmental crises, the situation changed the market and economy, and the lasting impacts of this unprecedented and intense experience must be examined. This book explores the digital ecosystem through a historical, sociological, political, and economic approach. It discusses new organizational practices such as remote work, digital culture, and the implementation of transformation strategy using appropriate technological tools. This book deciphers the new paradigm proposed by the digital era and provides theoretical and empirical frameworks in the field of economics and technology.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Jackie Phamotse digs deep into the climate of law and policy in the social media landscape. After a David and Goliath social media legal battle that saw many take note tweeting about her, the result is a brace, thought-provoking and remarkably detailed social media guide and personal narrative. A first-hand approach on beating public humiliation and cyber victimization, Phamotse combines personal anecdotes, hard data and compelling research to cut through an unjust system governed by the rich and famous. The author directly addresses the question of power and obsession related to social media influencers. Written with equal doses of humor, compassion and wisdom, I Tweet What I Like is an inspiring call to action, celebrating diversity and human potential. I Tweet What I Like will inspire you!
Global cybercrime is arguably the biggest underworld industry of our times. Global forces and technologies such as mobile phones, social media and cloud computing are shaping the structure of the global cybercrime industry estimated at US$1 trillion. Nir Kshetri documents and compares the patterns, characteristics and processes of cybercrime activities in major regions and economies in the Global South such as China, India, the former Second World economies, Latin America and the Caribbean, Sub-Saharan Africa and Middle East and North Africa. Integrating theories from a wide range of disciplines, he explains initiatives at the global, supranational, national, sub-national and local levels.
This book diagnoses the social, mental and political consequences of working and economic organizations that generate value from communication. It calls for the role of communication technologies to be reimagined in order to create a healthier, fairer society.
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.
In Intersectional Tech: Black Users in Digital Gaming, Kishonna L. Gray interrogates blackness in gaming at the intersections of race, gender, sexuality, and (dis)ability. Situating her argument within the context of the concurrent, seemingly unrelated events of Gamergate and the Black Lives Matter movement, Gray highlights the inescapable chains that bind marginalized populations to stereotypical frames and limited narratives in video games. Intersectional Tech explores the ways that the multiple identities of black gamers some obvious within the context of games, some more easily concealed affect their experiences of gaming. The normalization of whiteness and masculinity in digital culture inevitably leads to isolation, exclusion, and punishment of marginalized people. Yet, Gray argues, we must also examine the individual struggles of prejudice, discrimination, and microaggressions within larger institutional practices that sustain the oppression. These ""new"" racisms and a complementary colorblind ideology are a kind of digital Jim Crow, a new mode of the same strategies of oppression that have targeted black communities throughout American history. Drawing on extensive interviews that engage critically with identity development and justice issues in gaming, Gray explores the capacity for gaming culture to foster critical consciousness, aid in participatory democracy, and effect social change. Intersectional Tech is rooted in concrete situations of marginalized members within gaming culture. It reveals that despite the truths articulated by those who expose the sexism, racism, misogyny, and homophobia that are commonplace within gaming communities, hegemonic narratives continue to be privileged. This text, in contrast, centers the perspectives that are often ignored and provides a critical corrective to notions of gaming as a predominantly white and male space.
Blockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community of computer scientists and cryptologists, to mainstream phenomena that are now considered powerful game changers for many industries. This book explores and assesses real-world use cases and case studies on blockchain and related technologies. The studies describe the respective applications and address how these technologies have been deployed, the rationale behind their application, and finally, their outcomes. The book shares a wealth of experiences and lessons learned regarding financial markets, energy, SCM, healthcare, law and compliance. Given its scope, it is chiefly intended for academics and practitioners who want to learn more about blockchain applications.
In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial and insurance services. Further, it identifies the differences in the data protection systems of EU member states and examines the development of common standards and principles of data protection that could help build a data protection model for Mercosur. Divided into four parts, the book starts out with a discussion of the evolution of the right to privacy, focusing on the last few decades, and taking into account the development of new technologies. The second part discusses the interaction between data protection and specific industries that serve as case studies: insurance, banking and credit reporting. The focus of this part is on generalization and discrimination, adverse selection and the processing of sensitive and genetic data. The third part of the book presents an analysis of the legislation of three EU Member States (France, Italy and UK). Specific elements of analysis that are compared are the concepts of personal and anonymous data, data protection principles, the role of the data protection authorities, the role of the data protection officer, data subjects' rights, the processing of sensitive data, the processing of genetic data and the experience of the case studies in processing data. The book concludes with the proposal of a model for data protection that could be adopted by Mercosur, taking into account the different levels of data protection that exist in its member states."
New digital technologies have fostered much debate about the nature of social relationships, institutions and structures in a new information age. An amorphous and interdisciplinary field of research has emerged, concerning itself with the complexities and contradictions involved in the fundamental shifts and radical transformations which information and communication technologies (ICTs) are purportedly bringing about across cultural, political and economic practices. From cyberselves to cyber communities, from media wars to the digital divide, sociology confronts a new digital landscape. This text takes stock of how the discipline has addressed the challenge of the digital providing a uniquely sociological framework with which to critically re-evaluate fundamental social concerns: from digital intimacies and online relationships to new forms of mediated inequality and network structures, from digitally mediated media practices to education and health 2.0, this text provides a comprehensive introduction to the transformations wrought by digital technologies to contemporary societies and a critical reflection on how the digital is reconfiguring the tools, concepts and precepts of the discipline.
Explaining new and innovative methods of promoting music and products for entertainment, distance teaching, valorizing archives, and commercial and non-commercial purposes, this reference profiles new services for those connected via personal computers, mobile, and other devices, for both sighted and print-impaired customers.
|
![]() ![]() You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,249
Discovery Miles 32 490
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R6,555
Discovery Miles 65 550
|