0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (149)
  • R250 - R500 (526)
  • R500+ (1,591)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover)
Ann M. Butera
R1,869 Discovery Miles 18 690 Ships in 12 - 17 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Paperback): Sara Smyth Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Paperback)
Sara Smyth
R1,267 Discovery Miles 12 670 Ships in 12 - 17 working days

The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.

FinTech - Law and Regulation (Hardcover, 2nd edition): Jelena Madir FinTech - Law and Regulation (Hardcover, 2nd edition)
Jelena Madir
R6,098 Discovery Miles 60 980 Ships in 12 - 17 working days

This fully updated and revised second edition provides a practical examination of the opportunities and challenges presented by the rapid development of FinTech in recent years, particularly for regulators, who must decide how to apply current law to ever-changing concepts driven by continually advancing technologies. It addresses new legislative guidance on the treatment of cryptoassets and smart contracts, the European Commission's Digital Finance Strategy and FinTech Action Plan, as well as analysing significant recent case law. Key features of the second edition include: Discussion of the impact of Brexit and the Covid-19 pandemic on the development and adoption of FinTech products Detailed treatment of a broad spectrum of legal and regulatory issues in the FinTech sector, featuring insights from 33 experts from 10 countries Examination of potential blockchain applications in the financial services industry, with a focus on smart contracts and regulatory challenges to widespread adoption Analysis of the key legal, regulatory and compliance issues surrounding FinTech developments in banking, payments and fundraising, from patents and robo-advice to novel solutions for supporting innovation such as regulatory sandboxes. Offering a thorough guide to the sector for practical use, this book will be invaluable for in-house lawyers as well as law firms looking for an overview of the legal and regulatory landscape of FinTech. It will also be an essential text for academics and students looking to understand the key issues in the field, as well as those interested in perspectives across the breadth of the sector.

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,638 Discovery Miles 16 380 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Teach Yourself Making Money in the Second Life World (Paperback): Irie Tsure Teach Yourself Making Money in the Second Life World (Paperback)
Irie Tsure
R155 R89 Discovery Miles 890 Save R66 (43%) Ships in 12 - 17 working days

Written by successful Second Life resort owner Irie Tsure, this comprehensive guide will accompany you on the tricky journey from Newbie to practising expert in the virtual world of Second Life. Teach Yourself Making Money in the Second Life World is intended to cover every skill required to enjoy and prosper within this virtual world but in particular focuses on those entrepreneurial activities, strategies and skills which can help you get ahead in business in Second Life. This book is packed with advice for virtual entrepreneurs looking to develop independent businesses within SL, perfect for individuals or small companies interested in entering SL and succeeding there. Authored by an established, popular business savvy and creative SL character, areas covered include: The Second Life economy Intellectual property rights Creating retail objects Creating fashion items including clothing, hair and footwear Scripting Creating animations including QAvimator and how to upload an animation Putting it all together including the creative process Retail outlets and venues including how,to rent or to buy space,store design and layout, selling your products in-world,opening a resort or nightclub, streaming music into Second Life,including your own music, developing the business,minimising lag, community and staff Land management including: finding, buying and selling land in Second Life, obtaining a private island, making money from virtual land, managing a Shopping Mall, checking and improving a region's performance Real-world brands in Second Life - examining the opportunities etc Marketing in second life including: branding, Second Life groups, promoting your business Appendices: A Irie's summary of success; B My past, our present and the future; C: Useful keyboard shortcuts Most other books are written by techies or tourists, not by an author who has actually made the SL experience work for themselves. This is the real McCoy.

Assessing and Insuring Cybersecurity Risk (Hardcover): Ravi Das Assessing and Insuring Cybersecurity Risk (Hardcover)
Ravi Das
R4,348 Discovery Miles 43 480 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Social Media Analytics for User Behavior Modeling - A Task Heterogeneity Perspective (Paperback): Arun Reddy Nelakurthi,... Social Media Analytics for User Behavior Modeling - A Task Heterogeneity Perspective (Paperback)
Arun Reddy Nelakurthi, Jingrui He
R1,394 Discovery Miles 13 940 Ships in 12 - 17 working days

Winner of the "Outstanding Academic Title" recognition by Choice for the 2020 OAT Awards. The Choice OAT Award represents the highest caliber of scholarly titles that have been reviewed by Choice and conveys the extraordinary recognition of the academic community. In recent years social media has gained significant popularity and has become an essential medium of communication. Such user-generated content provides an excellent scenario for applying the metaphor of mining any information. Transfer learning is a research problem in machine learning that focuses on leveraging the knowledge gained while solving one problem and applying it to a different, but related problem. Features: Offers novel frameworks to study user behavior and for addressing and explaining task heterogeneity Presents a detailed study of existing research Provides convergence and complexity analysis of the frameworks Includes algorithms to implement the proposed research work Covers extensive empirical analysis Social Media Analytics for User Behavior Modeling: A Task Heterogeneity Perspective is a guide to user behavior modeling in heterogeneous settings and is of great use to the machine learning community.

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,069 Discovery Miles 20 690 Ships in 12 - 17 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

Cyber Forensics - Examining Emerging and Hybrid Technologies (Hardcover): Albert J. Marcella Cyber Forensics - Examining Emerging and Hybrid Technologies (Hardcover)
Albert J. Marcella
R3,207 Discovery Miles 32 070 Ships in 12 - 17 working days

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R2,036 Discovery Miles 20 360 Ships in 12 - 17 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

A Simple Guide to Technology and Analytics (Hardcover): Brian J Evans A Simple Guide to Technology and Analytics (Hardcover)
Brian J Evans
R2,081 Discovery Miles 20 810 Ships in 12 - 17 working days

Everyday technology is constantly changing, and it's hard to keep up with it at times. What is all this talk about automation, STEM, analytics and super-computers, and how will it really affect my daily life at work and in the home? This book is a simple guide to everyday technology and analytics written in plain language. It starts with explaining how computer networks are increasing in speed so fast that we can do more in less time than ever before. It explains the analytical jargon in plain English and why robotics in the home will be aided by the new technology of the quantum computer. Richly furnished with over 200 illustrations, photos and with minimal equations, A Simple Guide to Technology and Analytics is a ready reference book for those times when you don't really understand the technology and analytics being talked about. It explains complicated topics such as automated character recognition in a very simple way, and has simple exercises for the reader to fully understand the technology (with answers at the back). It even has explanations on how home appliances work, which are very useful the next time you go shopping for a microwave or TV. Even the Glossary at the back can be used as a quick look-up explanation for those on the go.

National Security in the New World Order - Government and the Technology of Information (Hardcover): Andrea Monti, Raymond Wacks National Security in the New World Order - Government and the Technology of Information (Hardcover)
Andrea Monti, Raymond Wacks
R3,910 Discovery Miles 39 100 Ships in 12 - 17 working days

This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital technology and its business models have shaped public policy and charts its future course. In this vital text for legislators and policymakers, Andrea Monti and Raymond Wacks draw on several case studies to analyse the changing nature of national security and revisit the traditional idea of the sovereignty of the State. They highlight some of the limitations of the conventional understanding of public policy, national security, and the rule of law to reveal the role of digital technology as an enabler as well as discriminator in governance and social disorder. Further, the chapters in the book explore the tenuous balance between individual freedom and national security; the key role of data protection in safeguarding digital data; Big Tech's appropriation of national security policy; the debate relating to datagathering technologies and encryption; and offers an unsettling answer to the question 'what is a leak?' A stimulating read, this key text will be of immense interest to scholars of politics, cyberculture, and national security, as well as to policy analysts, lawyers, and journalists.

Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover): Chinmay Chakraborty, Sree Ranjani... Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover)
Chinmay Chakraborty, Sree Ranjani Rajendran, Muhammad Habibur Rehman
R4,516 Discovery Miles 45 160 Ships in 12 - 17 working days

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover):... Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover)
Bruce Turner
R2,021 Discovery Miles 20 210 Ships in 12 - 17 working days

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Quality of Life - An Interdisciplinary Perspective (Hardcover): Shruti Tripathi, Rashmi Rai, Ingrid Van Rompay-Bartels Quality of Life - An Interdisciplinary Perspective (Hardcover)
Shruti Tripathi, Rashmi Rai, Ingrid Van Rompay-Bartels
R2,724 Discovery Miles 27 240 Ships in 12 - 17 working days

Highlights cultural differences in terms of Quality of Life Provides a guide to the current field of global well-being and to future research Suggests improvements in Quality of Life Recognizes the presence of cultural differences resulting from social status, age, gender, class, race, and ethnicity Offers background information for governments, professionals, and policy makers

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,912 Discovery Miles 19 120 Ships in 9 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Hardcover):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Hardcover)
Te Wu
R4,076 Discovery Miles 40 760 Ships in 12 - 17 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

National Security in the New World Order - Government and the Technology of Information (Paperback): Andrea Monti, Raymond Wacks National Security in the New World Order - Government and the Technology of Information (Paperback)
Andrea Monti, Raymond Wacks
R1,139 Discovery Miles 11 390 Ships in 12 - 17 working days

This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital technology and its business models have shaped public policy and charts its future course. In this vital text for legislators and policymakers, Andrea Monti and Raymond Wacks draw on several case studies to analyse the changing nature of national security and revisit the traditional idea of the sovereignty of the State. They highlight some of the limitations of the conventional understanding of public policy, national security, and the rule of law to reveal the role of digital technology as an enabler as well as discriminator in governance and social disorder. Further, the chapters in the book explore the tenuous balance between individual freedom and national security; the key role of data protection in safeguarding digital data; Big Tech's appropriation of national security policy; the debate relating to datagathering technologies and encryption; and offers an unsettling answer to the question 'what is a leak?' A stimulating read, this key text will be of immense interest to scholars of politics, cyberculture, and national security, as well as to policy analysts, lawyers, and journalists.

Blockchain for Healthcare Systems - Challenges, Privacy, and Securing of Data (Hardcover): Sheikh Mohammad Idrees, Parul... Blockchain for Healthcare Systems - Challenges, Privacy, and Securing of Data (Hardcover)
Sheikh Mohammad Idrees, Parul Agarwal, M. Afshar Alam
R3,331 Discovery Miles 33 310 Ships in 12 - 17 working days

Talks about securing healthcare data using Blockchain and Cryptography Discusses challenges and solutions for Blockchain technology in the healthcare sector Presents digital transformation of the healthcare sector using different technologies Covers the handling of healthcare data/medical records using Blockchain technology Explores managing the medical supply chain using Blockchain technology

Internet Video Culture in China - YouTube, Youku, and the Space in Between (Paperback): Marc L. Moskowitz Internet Video Culture in China - YouTube, Youku, and the Space in Between (Paperback)
Marc L. Moskowitz
R1,226 Discovery Miles 12 260 Ships in 12 - 17 working days

Examining Internet culture in the People's Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally.

Ethics and Security Automata - Policy and Technical Challenges of the Robotic Use of Force (Paperback): Sean Welsh Ethics and Security Automata - Policy and Technical Challenges of the Robotic Use of Force (Paperback)
Sean Welsh
R1,237 Discovery Miles 12 370 Ships in 12 - 17 working days

Can security automata (robots and AIs) make moral decisions to apply force on humans correctly? If they can make such decisions, ought they be used to do so? Will security automata increase or decrease aggregate risk to humans? What regulation is appropriate? Addressing these important issues this book examines the political and technical challenges of the robotic use of force. The book presents accessible practical examples of the 'machine ethics' technology likely to be installed in military and police robots and also in civilian robots with everyday security functions such as childcare. By examining how machines can pass 'reasonable person' tests to demonstrate measurable levels of moral competence and display the ability to determine the 'spirit' as well as the 'letter of the law', the author builds upon existing research to define conditions under which robotic force can and ought to be used to enhance human security. The scope of the book is thus far broader than 'shoot to kill' decisions by autonomous weapons, and should attract readers from the fields of ethics, politics, and legal, military and international affairs. Researchers in artificial intelligence and robotics will also find it useful.

Valuing Data - An Open Framework (Paperback): Dewey Ray Valuing Data - An Open Framework (Paperback)
Dewey Ray
R1,401 Discovery Miles 14 010 Ships in 12 - 17 working days

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.

The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback)
Te Wu
R1,660 Discovery Miles 16 600 Ships in 12 - 17 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

Surveillance - A Key Idea for Business and Society (Paperback): Graham Sewell Surveillance - A Key Idea for Business and Society (Paperback)
Graham Sewell
R1,143 Discovery Miles 11 430 Ships in 12 - 17 working days

Being watched and watching others is a universal feature of all human societies. How does the phenomenon of surveillance affect, interact with, and change the world of business? This concise book unveils a key idea in the history and future of management. For centuries managers have claimed the right to monitor employees, but in the digital era, this management activity has become enhanced beyond recognition. Drawing on extensive research into organizational surveillance, the author distils and analyses existing thinking on the concept with his own empirical work. Drawing together perspectives from philosophy, cutting-edge social theory, and empirical research on workplace surveillance, Surveillance is the definitive introduction to an intriguing topic that will interest readers across the social sciences and beyond.

Surveillance - A Key Idea for Business and Society (Hardcover): Graham Sewell Surveillance - A Key Idea for Business and Society (Hardcover)
Graham Sewell
R3,895 Discovery Miles 38 950 Ships in 12 - 17 working days

Being watched and watching others is a universal feature of all human societies. How does the phenomenon of surveillance affect, interact with, and change the world of business? This concise book unveils a key idea in the history and future of management. For centuries managers have claimed the right to monitor employees, but in the digital era, this management activity has become enhanced beyond recognition. Drawing on extensive research into organizational surveillance, the author distils and analyses existing thinking on the concept with his own empirical work. Drawing together perspectives from philosophy, cutting-edge social theory, and empirical research on workplace surveillance, Surveillance is the definitive introduction to an intriguing topic that will interest readers across the social sciences and beyond.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,357 Discovery Miles 63 570
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Sinclair ZX Spectrum: a visual…
Bitmap Books Hardcover R1,053 Discovery Miles 10 530
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,159 Discovery Miles 11 590
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R337 Discovery Miles 3 370
Regulating Social Network Sites - Data…
Asma Vranaki Hardcover R3,147 Discovery Miles 31 470
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,696 Discovery Miles 56 960
No Filter - The Inside Story of…
Sarah Frier Paperback R489 R403 Discovery Miles 4 030
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,151 Discovery Miles 31 510
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay Hardcover R3,452 Discovery Miles 34 520

 

Partners