|
|
Books > Computing & IT > Social & legal aspects of computing > General
This book is for cybersecurity leaders across all industries and
organizations. It is intended to bridge the gap between the data
center and the board room. This book examines the multitude of
communication challenges that CISOs are faced with every day and
provides practical tools to identify your audience, tailor your
message and master the art of communicating. Poor communication is
one of the top reasons that CISOs fail in their roles. By taking
the step to work on your communication and soft skills (the two go
hand-in-hand), you will hopefully never join their ranks. This is
not a "communication theory" book. It provides just enough
practical skills and techniques for security leaders to get the job
done. Learn fundamental communication skills and how to apply them
to day-to-day challenges like communicating with your peers, your
team, business leaders and the board of directors. Learn how to
produce meaningful metrics and communicate before, during and after
an incident. Regardless of your role in Tech, you will find
something of value somewhere along the way in this book.
This book investigates how various scientific communities - e.g.
legal scientists, political scientists, sociologists,
mathematicians, and computer scientists - study law and public
policies, which are portrayed here as complex systems. Today,
research on law and public policies is rapidly developing at the
international level, relying heavily on modeling that employs
innovative methods for concrete implementation. Among the subject
matter discussed, law as a network of evolving and interactive
norms is now a prominent sphere of study. Similarly, public
policies are now a topic in their own right, as policy can no
longer be examined as a linear process; rather, its study should
reflect the complexity of the networks of actors, norms and
resources involved, as well as the uncertainty or weak
predictability of their direct or indirect impacts. The book is
divided into three maain parts: complexity faced by jurists,
complexity in action and public policies, and complexity and
networks. The main themes examined concern codification,
governance, climate change, normative networks, health, water
management, use-related conflicts, legal regime conflicts, and the
use of indicators.
The existence of financial identity theft in the United States, and
its (gradual) spread to other areas of the world, increases the
need to understand how identity theft occurs and how perpetrators
of the crime manage to take advantage of developments within
contemporary society. This book aims to provide such an
understanding through an in-depth comparative analysis which
illustrates how states, financial service providers, consumers, and
others facilitate the occurrence of financial identity theft in the
United States and the Netherlands.
This book provides an in-depth overview of artificial intelligence
and deep learning approaches with case studies to solve problems
associated with biometric security such as authentication,
indexing, template protection, spoofing attack detection, ROI
detection, gender classification etc. This text highlights a
showcase of cutting-edge research on the use of convolution neural
networks, autoencoders, recurrent convolutional neural networks in
face, hand, iris, gait, fingerprint, vein, and medical biometric
traits. It also provides a step-by-step guide to understanding deep
learning concepts for biometrics authentication approaches and
presents an analysis of biometric images under various
environmental conditions. This book is sure to catch the attention
of scholars, researchers, practitioners, and technology aspirants
who are willing to research in the field of AI and biometric
security.
What do philosophy and computer science have in common? It turns
out, quite a lot! In providing an introduction to computer science
(using Python), Daniel Lim presents in this book key philosophical
issues, ranging from external world skepticism to the existence of
God to the problem of induction. These issues, and others, are
introduced through the use of critical computational concepts,
ranging from image manipulation to recursive programming to
elementary machine learning techniques. In illuminating some of the
overlapping conceptual spaces of computer science and philosophy,
Lim teaches the reader fundamental programming skills and also
allows her to develop the critical thinking skills essential for
examining some of the enduring questions of philosophy. Key
Features Teaches readers actual computer programming, not merely
ideas about computers Includes fun programming projects (like
digital image manipulation and Game of Life simulation), allowing
the reader to develop the ability to write larger computer programs
that require decomposition, abstraction, and algorithmic thinking
Uses computational concepts to introduce, clarify, and develop a
variety of philosophical issues Covers various aspects of machine
learning and relates them to philosophical issues involving science
and induction as well as to ethical issues Provides a framework to
critically analyze arguments in classic and contemporary
philosophical debates
1. It is a practical guide to understanding and implementation 2.
It assumes no prior in depth knowledge 3. It is written in plain
language and may be understood by anyone, whether or not they are
qualified or involved with IT. It is therefore equally suitable for
senior management, IT practitioners, students and interested
individuals.
Disruption is back with a vengeance. If ever there was a time to
learn how to adapt, grab opportunities and bounce back - it's now.
Learn how to keep your business relevant, meet new customer
expectations and leverage technology. Bestselling author and
business influencer Tom Goodwin is back with this entirely revised
new edition of Digital Darwinism. This book guides you through the
unrelenting pace of change and uncertainty facing business leaders
today. Currently in a hybrid world where digital and real-world
experiences collide and are expected to seamlessly blend into one
another, never has the need to be on top of your digital
transformation been felt more strongly. With new expectations from
customers and employees alike, how will your business grow and
survive the future? Learn how to become truly customer-centric,
drive digital transformation through a culture of real innovation
and challenge assumptions of how things have been done before. The
survival of your business depends on it.
The Internet is quickly becoming a commonly used tool for
business-customer interaction. Social media platforms that were
once typically reserved for personal use are now becoming a vital
part of a business's strategy. Maximizing Commerce and Marketing
Strategies through Micro-Blogging examines the various methods and
benefits of using micro-blogs within a business context, bringing
together the best tools and tactics necessary to properly
incorporate this approach. Highlighting current empirical research
and insights from various disciplines, this book is an essential
reference source for academics, graduate students, social media
strategists, and business professionals interested in the positive
use of social media in business environments.
This book will resonate with anyone no matter where you reside on
this journey, whether newbie or old guard. If you want to be part
of this change, you need to understand all about the messy middle
that Leda so expertly describes in this book. If you read this book
and it doesn't resonate, then I suggest you think about stepping
aside. -Curt Queyrouze, President, CCBX, A Division of Coastal
Community Bank The world is going digital, and so is banking-in
fits, starts, and circles. Why is it so hard? Why is the industry
constantly getting in the way of its own technological progress and
what can we do about it all? This book looks at the human and
structural obstacles to innovation-driven transformation and at the
change in habits, mindsets and leadership needed for the next stage
of the digital journey and argues that this change will be brought
about, not by external heroes and saviours, not by a generation yet
to be born, but people just like us. People who understand the
industry and its quirks. Bankers who have the grit, determination
and energy to drive change. Bankers like us. This book celebrates
and chronicles the shared experience of bankers like us. It starts
with a 'this is who we are' piece, including the author's trench
credentials. It then present an overview of corporate culture (this
is what we deal with and a few ideas on how to handle it), as well
as a piece on why transformation is so difficult and so many get it
wrong; a piece on the challenges our lack of diversity brings or
compounds, and a hopeful look-ahead on what a team of principled,
dedicated folks can do despite everything.
Scientific experiments and medical improvements in recent years
have augmented our bodies, made them manipulable; our personal data
have been downloaded, stored, sold, analyzed; and the pandemic has
given new meaning to the idea of 'virtual presence'. Such phenomena
are often thought to belong to the era of the 'posthuman', an era
that both promises and threatens to redefine the notion of the
human: what does it mean to be human? Can technological advances
impact the way we define ourselves as a species? What will the
future of humankind look like? These questions have gained urgency
in recent years, and continue to preoccupy cultural and legal
practitioners alike. How can the law respond and adapt to a world
shaped by technology and AI? How can it ensure that technological
developments remain inclusive, while simultaneously enforcing
ethical limits to its reach? The volume explores how fictional
texts, whether on the page or on screen, negotiate the legal
dilemmas posed by the increasing infiltration of technology into
modern life.
This book uses literature as a wrench to pry open social networks
and to ask different questions than have been asked about social
networks previously. The book emphasizes the story-telling aspect
of social networks, as well as the connection between narrative and
social networks by incorporating narrative, dynamic networks, and
time. Thus, it constructs a bridge between literature, digital
humanities, and social networks. This book is a pioneering work
that attempts to express social and philosophic constructs in
mathematical terms. The material used to test the algorithms is
texts intended for performance, such as plays, film scripts, and
radio plays; mathematical representations of the texts, or
"literature networks", are then used to analyze the social networks
found in the respective texts. By using literature networks and
their accompanying narratives, along with their supporting
analyses, this book allows for a novel approach to social network
analysis.
Putting technology front and centre in our thinking about law, this
book introduces Law 3.0: the future of the legal landscape.
Technology not only disrupts the traditional idea of what it is 'to
think like a lawyer,' as per Law 1.0; it presents major challenges
to regulators who are reasoning in a Law 2.0 mode. As this book
demonstrates, the latest developments in technology offer
regulators the possibility of employing a technical fix rather than
just relying on rules - thus, we are introducing Law 3.0. Law 3.0
represents, so to speak, the state we are in and the conversation
that we now need to have, and this book identifies some of the key
points for discussion in that conversation. Thinking like a lawyer
might continue to be associated with Law 1.0, but from 2020 onward,
Law 3.0 is the conversation that we all need to join. And, as this
book argues, law and the evolution of legal reasoning cannot be
adequately understood unless we grasp the significance of
technology in shaping both legal doctrine and our regulatory
thinking. This is a book for those studying, or about to study, law
- as well as others with interests in the legal, political, and
social impact of technology.
This is an open access title available under the terms of a CC
BY-NC-ND 4.0 International licence. It is free to read at Oxford
Scholarship Online and offered as a free PDF download from OUP and
selected open access locations. Is social media destroying
democracy? Are Russian propaganda or "Fake news" entrepreneurs on
Facebook undermining our sense of a shared reality? A conventional
wisdom has emerged since the election of Donald Trump in 2016 that
new technologies and their manipulation by foreign actors played a
decisive role in his victory and are responsible for the sense of a
"post-truth" moment in which disinformation and propaganda thrives.
Network Propaganda challenges that received wisdom through the most
comprehensive study yet published on media coverage of American
presidential politics from the start of the election cycle in April
2015 to the one year anniversary of the Trump presidency. Analysing
millions of news stories together with Twitter and Facebook shares,
broadcast television and YouTube, the book provides a comprehensive
overview of the architecture of contemporary American political
communications. Through data analysis and detailed qualitative case
studies of coverage of immigration, Clinton scandals, and the Trump
Russia investigation, the book finds that the right-wing media
ecosystem operates fundamentally differently than the rest of the
media environment. The authors argue that longstanding
institutional, political, and cultural patterns in American
politics interacted with technological change since the 1970s to
create a propaganda feedback loop in American conservative media.
This dynamic has marginalized centre-right media and politicians,
radicalized the right wing ecosystem, and rendered it susceptible
to propaganda efforts, foreign and domestic. For readers outside
the United States, the book offers a new perspective and methods
for diagnosing the sources of, and potential solutions for, the
perceived global crisis of democratic politics.
Technology has become the too-easy way to entertain ourselves and
our children. For parents who are concerned about screen time
during times of self-isolation and home schooling, and kids who
wish their grown ups would play with them more, this easy-to-use,
imaginative book has everything. From five-minute time fillers to
large-scale party games, there's plenty of fun here to keep your
family laughing: Sporty games and playground classics Activities
for indoors, gardens, parks and beaches Memory and travel games,
brain teasers and magic tricks No preparation or lengthy shopping
trips needed for these creative ideas, just find your idea and go!
This encyclopedia of joy is perfect for families big and small who
want to have fun in the real world.
What would it take to hack a human? How exploitable are we? In the
cybersecurity industry, professionals know that the weakest
component of any system sits between the chair and the keyboard.
This book looks to speculative fiction, cyberpunk and the digital
humanities to bring a human - and humanistic - perspective to the
issue of cybersecurity. It argues that through these stories we are
able to predict the future political, cultural, and social
realities emerging from technological change. Making the case for a
security-minded humanities education, this book examines pressing
issues of data security, privacy, social engineering and more,
illustrating how the humanities offer the critical, technical, and
ethical insights needed to oppose the normalization of
surveillance, disinformation, and coercion. Within this
counter-cultural approach to technology, this book offers a model
of activism to intervene and meaningfully resist government and
corporate oversight online. In doing so, it argues for a wider
notion of literacy, which includes the ability to write and fight
the computer code that shapes our lives.
|
You may like...
Facebook
Dana Kilroy
Fold-out book or chart
R229
Discovery Miles 2 290
Blockland
Elias Ahonen
Hardcover
R1,561
Discovery Miles 15 610
|