![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.
At home, work, and out in our ever-changing world, we're all just doing our best. In this modern parody, Frog and Toad are here to commiserate and lend some laughter. Full of wry humor and deep compassion for our modern vulnerabilities, the stories in Frog and Toad Are Doing Their Best perfectly capture the heartwarming authenticity of Lobel's famous amphibian friends while revealing razor-sharp truths about the world we live in today. Through Frog and Toad, we see the anxieties that are woven throughout our everyday existence, from our well-meaning but often-failed attempts at practicing self-care to our struggle to balance the gifts and burdens of technology. Toad ponders a variety of questionable schemes to pay off his credit cards, while Frog spends too much time scrolling through the newsfeed on his phone. But despite their daily frustrations and existential concerns, they know that having a friend to share life's burdens makes even the darkest days brighter. "I love children's literature, so of course I love Frog and Toad and I laughed out loud reading this spoof about the pair's new adventures." -GRETCHEN RUBIN, five time New York Times bestselling author
The volume is devoted to the relevant problems in the legal sphere, created and generated by recent advances in science and technology. In particular, it investigates a series of cutting-edge contemporary and controversial case-studies where scientific and technological issues intersect with individual legal rights. The book addresses challenging topics at the intersection of communication technologies and biotech innovations such as freedom of expression, right to health, knowledge production, Internet content regulation, accessibility and freedom of scientific research.
As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level. Topics Discussed: The Key Concepts of Cyber The Motivation and Utility for Covert Action Digital Power Anonymity and Attribution in Cyberspace Cyber and Conventional Operations: The Dynamics of Conflict Defining the Role of Intelligence in Cyberspace How actors decide to use cyber-a rational choice approach Cognitive Processes and Decision-Making in Cyberspace Finding meaning in the expected utility of international cyber conflict
This book attempts to link some of the recent advances in crowdsourcing with advances in innovation and management. It contributes to the literature in several ways. First, it provides a global definition, insights and examples of this managerial perspective resulting in a theoretical framework. Second, it explores the relationship between crowdsourcing and technological innovation, the development of social networks and new behaviors of Internet users. Third, it explores different crowdsourcing applications in various sectors such as medicine, tourism, information and communication technology (ICT), and marketing. Fourth, it observes the ways in which crowdsourcing can improve production, finance, management and overall managerial performance. Crowdsourcing, also known as "massive outsourcing" or "voluntary outsourcing," is the act of taking a job or a specific task usually performed by an employee of a company or contractors, and outsourcing it to a large group of people or a community (crowd or mass) via the Internet, through an open call. The term was coined by Jeff Howe in a 2006 issue of Wired magazine. It is being developed in different sciences (i.e., medicine, engineering, ICT, management) and is used in the most successful companies of the modern era (i.e., Apple, Facebook, Inditex, Starbucks). The developments in crowdsourcing has theoretical and practical implications, which will be explored in this book. Including contributions from international academics, scholars and professionals within the field, this book provides a global, multidimensional perspective on crowdsourcing.
You know your dog is the cutest but does everyone else know it too? In this book, Loni Edwards, the human behind the world's most influential pets, breaks down the path to fame. Discover insights into the success of social media's top pups and follow the essential steps on the road to fame - from crafting your brand to advocating for your pup on set. With expert guidance on how to be a good dog parent and make sure your pup is happy and healthy every step of the way, this is your one-stop guide to helping your dog win over hearts, one adorable post at a time. Featuring the stories of more than 40 of the most successful pet influencers: 157 of Gemma, Amazing Graciedoodle, Barkley Sir Charles, Bertie Bert the Pom, Bronson the Bully, Brussels Sprout, Bully Baloo, Charlie the Black Shepherd, Chloe the Mini Frenchie (& Emma Bear), Coco the Maltese Dog (Coco & Cici), Cookie Malibu, Crusoe the Celebrity Dachshund, Daily Dougie, Dog named Stella, Ducky the Yorkie, Frame the Weim, Gone to the Snow Dogs, Harlow and Sage, Hi Wiley, Kelly Bove, Lilybug, Lizzie Bear, Louboutina the Hugging Dog, Maya Polar Bear, Mervin the Chihuahua, Milo and Noah, MJ the Beagle, Mr. Biggie, Popeye the Foodie, Puggy Smalls, Reagandoodle, Remix the Dog, Rocco Roni, Super Corgi Jojo, Super Scooty, Tatum, That Goldendoodle, The Bike Dog, Tika the Iggy, Tuna Melts my Heart, Tupey the Borzoi, Verpinscht, Winnie the Cocker, Wolfgang 2242
This book offers guidance for US-based IT businesses on both sides of the Atlantic when dealing with big data and government data, since transatlantic data flows are key to the success of these enterprises. It offers practical insights into many of the data-protection challenges US companies in various industries face when seeking to comply with US and EU data-protection laws, and analyses the potential conflicts in the light of their risks and the way in which US-based cloud providers react to the uncertainties of the applicable data-protection rules. The book particularly focuses on the insights derived from a qualitative study conducted in 2016 with various cloud-based IT businesses in the Silicon Valley area, which shows the diversity of views on data protection and the many approaches companies take to this topic. Further, it discusses key data-protection issues in the field of big data and government data.
Today, we live in a post-truth era. Creating alternative realities, and making people believe fake realities become easier. Digital platforms tend to promote dramatic, sensational and emotional content that harms democracy. This book examines different aspects of the matter: rise of populist politics, impact of digital social platforms, engagement-oriented algorithms, spread of disinformation and counter-measures like fact-checking mechanism and developing digital media literacy skills. "Journalists, academics and civil society groups are increasingly working together to help people confront the confusion caused by the post-truth realities of digital communications, which is no longer the stuff of propaganda from the state, but comes from all sides of the internet. In this information space every fact is challenged by an alternative fact, and all of these different versions of the truth look the same online." - Aidan White
Peer to Peer Accommodation networks presents a new conceptual framework which offers an initial explanation for the continuing and rapid success of 'disruptive innovators' and their effects on the international hospitality industry, with a specific focus on Airbnb, in the international context. Using her first-hand experience as a host on both traditional holiday accommodation webpages and a peer-to-peer accommodation network, respected tourism academic Sara Dolnicar examines possible reasons for the explosive success of peer to peer accommodation networks, investigates related topics which are less frequently discussed - such as charitable activities and social activism - and offers a future research agenda. Using first hand empirical results, this text provides much needed insight into this 'disruptive innovator' for those studying and working within the tourism and hospitality industries. This book discusses a wealth of issues including: * The disruptive innovation model - the criteria for identifying and understanding new disruptive innovators, and how peer-to-peer accommodation networks comply with these; * The factors postulated to drive the success of these networks and the celebration of variation; * Who are genuine networks members, tourist motivators and the chance of the 'perfect match'; * Pricing, discrimination and stimulation of the creation of new businesses.
New material treats such contemporary subjects as automatic speech recognition and speaker verification for banking by computer and privileged (medical, military, diplomatic) information and control access. The book also focuses on speech and audio compression for mobile communication and the Internet. The importance of subjective quality criteria is stressed. The book also contains introductions to human monaural and binaural hearing, and the basic concepts of signal analysis. Beyond speech processing, this revised and extended new edition of Computer Speech gives an overview of natural language technology and presents the nuts and bolts of state-of-the-art speech dialogue systems.
Advancing technologies are rapidly modifying the current state of business and society causing an expansion of possible career opportunities. In order to stay competitive, institutions of education must provide an emphasis on the wide-range of skills and experiences needed to contribute to a 21st century workforce. As new technologies emerge and even disrupt, there will be a demand for new forms of education and deeper learning. Disruptive and Emerging Technology Trends Across Education and the Workplace is a collection of innovative research on the latest instructive methods being utilized in classrooms and organizations as well as the benefits and challenges of adopting these technologies. While highlighting topics including mobile learning, augmented reality, and cryptocurrencies, this book is ideally designed for developers, professionals, educators, managers, researchers, scientists, stakeholders, strategists, practitioners, and students seeking current research on new forms of educational techniques in relation to the continued application of new technologies in the workplace.
With the prevalence of social media, businesses and other organizations have a growing need to utilize various online media platforms and sites to engage and interact with their potential consumer base. Virtual communities and social networking can provide an effective escape route from the limits imposed by traditional media. Using optimal strategies can lead to more successful outcomes when using these platforms. Modern Perspectives on Virtual Communications and Social Networking provides innovative insights into connection and conversation through internet media that foster trust, commitment, and transparency in business. The content within this publication represents the potential to create virtual bonds with consumers through the observation of buying behavior, social media best practices, and digital marketing strategies. It is designed for business professionals, academicians, consultants, managers, marketers, and researchers and covers topics centered on the use of online media as a method of reaching a wider population.
It's easy and reflexive to view our online presence as fake, to see the internet as a space we enter when we aren't living our real, offline lives. And yet, so much of who we are and what we do now happens online. Social media is becoming less somewhere we go and more a place in which we are simply always present. All of it makes it hard to know which parts of our lives are real. IRL, Chris Stedman's personal and searing exploration of authenticity in the digital age, shines a light on how age-old notions of realness can be freshly understood in our new online lives. Stedman argues for a different way of seeing the supposed split between our online and offline selves: far from being unnatural, the internet is simply one more tool for understanding and expressing ourselves, and the way we use it can reveal new insights into far older human behaviors and desires. IRL invites readers to consider the ways they edit or curate themselves for digital audiences, and in the end makes a bold case for authenticity, even when it feels risky.
In today's market, emerging technologies are continually assisting in common workplace practices as companies and organizations search for innovative ways to solve modern issues that arise. Prevalent applications including internet of things, big data, and cloud computing all have noteworthy benefits, but issues remain when separately integrating them into the professional practices. Significant research is needed on converging these systems and leveraging each of their advantages in order to find solutions to real-time problems that still exist. Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing is a pivotal reference source that provides vital research on the relation between these technologies and the impact they collectively have in solving real-world challenges. While highlighting topics such as cloud-based analytics, intelligent algorithms, and information security, this publication explores current issues that remain when attempting to implement these systems as well as the specific applications IoT, big data, and cloud computing have in various professional sectors. This book is ideally designed for academicians, researchers, developers, computer scientists, IT professionals, practitioners, scholars, students, and engineers seeking research on the integration of emerging technologies to solve modern societal issues.
|
You may like...
Nonparametric Statistics - 3rd ISNPS…
Patrice Bertail, Delphine Blanke, …
Hardcover
R4,068
Discovery Miles 40 680
Goodnight Golda - A Handbook For Brave…
Batya Bricker, Ilana Stein
Paperback
A Course on Small Area Estimation and…
Domingo Morales, Maria Dolores Esteban, …
Hardcover
R3,707
Discovery Miles 37 070
The Character of David in Judaism…
Marzena Zawanowska, Mateusz Wilk
Hardcover
R6,586
Discovery Miles 65 860
Rethinking Pluralism - Ritual…
Adam B. Seligman, Robert P. Weller
Hardcover
R1,914
Discovery Miles 19 140
Let's Make Things Better - A Holocaust…
Gidon Lev, Julie Gray
Paperback
|