![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > General
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level. Topics Discussed: The Key Concepts of Cyber The Motivation and Utility for Covert Action Digital Power Anonymity and Attribution in Cyberspace Cyber and Conventional Operations: The Dynamics of Conflict Defining the Role of Intelligence in Cyberspace How actors decide to use cyber-a rational choice approach Cognitive Processes and Decision-Making in Cyberspace Finding meaning in the expected utility of international cyber conflict
The volume is devoted to the relevant problems in the legal sphere, created and generated by recent advances in science and technology. In particular, it investigates a series of cutting-edge contemporary and controversial case-studies where scientific and technological issues intersect with individual legal rights. The book addresses challenging topics at the intersection of communication technologies and biotech innovations such as freedom of expression, right to health, knowledge production, Internet content regulation, accessibility and freedom of scientific research.
This volume offers unique insights into the mutually constitutive nature of social media practices and religious change. Part 1 examines how social media operate in conjunction with mass media in the construction of discourses of religion and spirituality. It includes: a longitudinal study of British news media coverage of Christianity, secularism and religious diversity (Knott et al.); an analysis of responses to two documentaries 'The Monastery' and 'The Convent' (Thomas); an evaluation of theories of the sacred in studies of religion and media within the 'strong program' in cultural sociology in the US (Lynch); and a study of the consequences of mass and social media synergies for public perceptions of Islam in the Netherlands (Herbert). Part 2 examines the role of social media in the construction of contemporary martyrs and media celebrities (e.g., Michael Jackson) using mixed and mobile methods to analyse fan sites (Bennett & Campbell) and jihadi websites and YouTube (Nauta). Part 3 examines how certain bounded religious communities negotiate the challenges of social media: Judaism in Second Life (Abrams & Baker); Bah'ai regulation of web use among members (Campbell & Fulton); YouTube evangelists (Pihlaja); and public expressions of bereavement (Greenhill & Fletcher). The book provides theoretically informed empirical case studies and presents an intriguing, complex picture of the aesthetic and ethical, demographic and discursive aspects of new spaces of communication and their implications for religious institutions, beliefs and practices.
This collected volume gathers a broad spectrum of social science and information science articles about Facebook. It looks into facets of users, such as age, sex, and culture, and into facets of use, e.g. privacy behavior after the Snowden affair, unfriending on Facebook, or Facebook addiction, as well as into quality perceptions. Written by leading scholars investigating the impact of Web 2.0., this volume is highly relevant for social media researchers, information scientists, and social scientists, and, not least, for everyone interested in Facebook-related topics.
This book attempts to link some of the recent advances in crowdsourcing with advances in innovation and management. It contributes to the literature in several ways. First, it provides a global definition, insights and examples of this managerial perspective resulting in a theoretical framework. Second, it explores the relationship between crowdsourcing and technological innovation, the development of social networks and new behaviors of Internet users. Third, it explores different crowdsourcing applications in various sectors such as medicine, tourism, information and communication technology (ICT), and marketing. Fourth, it observes the ways in which crowdsourcing can improve production, finance, management and overall managerial performance. Crowdsourcing, also known as "massive outsourcing" or "voluntary outsourcing," is the act of taking a job or a specific task usually performed by an employee of a company or contractors, and outsourcing it to a large group of people or a community (crowd or mass) via the Internet, through an open call. The term was coined by Jeff Howe in a 2006 issue of Wired magazine. It is being developed in different sciences (i.e., medicine, engineering, ICT, management) and is used in the most successful companies of the modern era (i.e., Apple, Facebook, Inditex, Starbucks). The developments in crowdsourcing has theoretical and practical implications, which will be explored in this book. Including contributions from international academics, scholars and professionals within the field, this book provides a global, multidimensional perspective on crowdsourcing.
This book offers guidance for US-based IT businesses on both sides of the Atlantic when dealing with big data and government data, since transatlantic data flows are key to the success of these enterprises. It offers practical insights into many of the data-protection challenges US companies in various industries face when seeking to comply with US and EU data-protection laws, and analyses the potential conflicts in the light of their risks and the way in which US-based cloud providers react to the uncertainties of the applicable data-protection rules. The book particularly focuses on the insights derived from a qualitative study conducted in 2016 with various cloud-based IT businesses in the Silicon Valley area, which shows the diversity of views on data protection and the many approaches companies take to this topic. Further, it discusses key data-protection issues in the field of big data and government data.
New material treats such contemporary subjects as automatic speech recognition and speaker verification for banking by computer and privileged (medical, military, diplomatic) information and control access. The book also focuses on speech and audio compression for mobile communication and the Internet. The importance of subjective quality criteria is stressed. The book also contains introductions to human monaural and binaural hearing, and the basic concepts of signal analysis. Beyond speech processing, this revised and extended new edition of Computer Speech gives an overview of natural language technology and presents the nuts and bolts of state-of-the-art speech dialogue systems.
Advancing technologies are rapidly modifying the current state of business and society causing an expansion of possible career opportunities. In order to stay competitive, institutions of education must provide an emphasis on the wide-range of skills and experiences needed to contribute to a 21st century workforce. As new technologies emerge and even disrupt, there will be a demand for new forms of education and deeper learning. Disruptive and Emerging Technology Trends Across Education and the Workplace is a collection of innovative research on the latest instructive methods being utilized in classrooms and organizations as well as the benefits and challenges of adopting these technologies. While highlighting topics including mobile learning, augmented reality, and cryptocurrencies, this book is ideally designed for developers, professionals, educators, managers, researchers, scientists, stakeholders, strategists, practitioners, and students seeking current research on new forms of educational techniques in relation to the continued application of new technologies in the workplace.
In today's market, emerging technologies are continually assisting in common workplace practices as companies and organizations search for innovative ways to solve modern issues that arise. Prevalent applications including internet of things, big data, and cloud computing all have noteworthy benefits, but issues remain when separately integrating them into the professional practices. Significant research is needed on converging these systems and leveraging each of their advantages in order to find solutions to real-time problems that still exist. Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing is a pivotal reference source that provides vital research on the relation between these technologies and the impact they collectively have in solving real-world challenges. While highlighting topics such as cloud-based analytics, intelligent algorithms, and information security, this publication explores current issues that remain when attempting to implement these systems as well as the specific applications IoT, big data, and cloud computing have in various professional sectors. This book is ideally designed for academicians, researchers, developers, computer scientists, IT professionals, practitioners, scholars, students, and engineers seeking research on the integration of emerging technologies to solve modern societal issues.
With the prevalence of social media, businesses and other organizations have a growing need to utilize various online media platforms and sites to engage and interact with their potential consumer base. Virtual communities and social networking can provide an effective escape route from the limits imposed by traditional media. Using optimal strategies can lead to more successful outcomes when using these platforms. Modern Perspectives on Virtual Communications and Social Networking provides innovative insights into connection and conversation through internet media that foster trust, commitment, and transparency in business. The content within this publication represents the potential to create virtual bonds with consumers through the observation of buying behavior, social media best practices, and digital marketing strategies. It is designed for business professionals, academicians, consultants, managers, marketers, and researchers and covers topics centered on the use of online media as a method of reaching a wider population.
This book brings together the state of the art and current debates in the field of formative research, and examines many of the innovative methods largely overlooked in the available literature. This book will help social marketing to move beyond surveys and focus groups. The book addresses the needs of social marketing academics and practitioners alike by providing a robust and critical academic discussion of cutting-edge research methods, while demonstrating at the same time how each respective method can help us arrive at a deeper understanding of the issues that social marketing interventions are seeking to remedy. Each chapter includes a scholarly discussion of key formative research methods, a list of relevant internet resources, and three key readings for those interested in extending their understanding of the method. Most chapters also feature a short case study demonstrating how the methods are used.
How Journalists Use Twitter: The Changing Landscape of U.S. Newsrooms shows how leading reporters and editors at four major metropolitan newspapers are embracing Twitter as a key tool in their daily routines and how the social media platform influences coverage. This book builds on social media research by analyzing newsroom work through the lens of four different communications theories-diffusion of innovation, boundary, social capital and agenda-setting theories. This book will be of interest to scholars of communication, journalism, and new media.
Mind your online P's and Q's with this expert digital manners guide Conducting yourself online can be challenging. It sometimes seems like the web and social media is tailor-made to cause upset and anger. But, with the right guide, anyone can learn how to be a beacon of civility and politeness online. In Digital Etiquette For Dummies, a team of online communication experts share their combined insights into improving your presence on social media, writing emails that exude positivity and clarity, behaving correctly in virtual meetings, and much more. You'll become a paragon of politeness as you learn to apply the timeless rules of etiquette to the unique environment of the web, social media, email, Zoom, and smartphones. In this book, you'll also: Learn near-universal etiquette rules for email, social media, cellphones, and more Discover ways to make sure that your polite attitude isn't being lost in the text-only context of a business email Avoid common social media pitfalls and digital faux pas that can trip up even the most careful communicators A great handbook for anyone who uses digital communication in business or in their personal life (so, pretty much everyone), Digital Etiquette For Dummies also belongs on the reading lists of those trying to improve their online interactions on social media.
Modern technological development has been both rapid and fundamentally transformative of the means and methods of warfare, and of the broader environment in which warfare is conducted. In many cases, technological development has been stimulated by, and dedicated to, addressing military requirements. On other occasions, technological developments outside the military sphere affect or inform the conduct of warfare and military expectations. The introduction of new technologies such as information technology, space technologies, nanotechnology and robotic technologies into our civil life, and into warfare, is expected to influence the application and interpretation of the existing rules of the law of armed conflict. In this book, scholars and practitioners working in the fields critically examine the potential legal challenges arising from the use of new technologies and future directions of legal development in light of the specific characteristics and challenges each technology presents with regard to foreseeable humanitarian impacts upon the battlespace.
What do philosophy and computer science have in common? It turns out, quite a lot! In providing an introduction to computer science (using Python), Daniel Lim presents in this book key philosophical issues, ranging from external world skepticism to the existence of God to the problem of induction. These issues, and others, are introduced through the use of critical computational concepts, ranging from image manipulation to recursive programming to elementary machine learning techniques. In illuminating some of the overlapping conceptual spaces of computer science and philosophy, Lim teaches the reader fundamental programming skills and also allows her to develop the critical thinking skills essential for examining some of the enduring questions of philosophy. Key Features Teaches readers actual computer programming, not merely ideas about computers Includes fun programming projects (like digital image manipulation and Game of Life simulation), allowing the reader to develop the ability to write larger computer programs that require decomposition, abstraction, and algorithmic thinking Uses computational concepts to introduce, clarify, and develop a variety of philosophical issues Covers various aspects of machine learning and relates them to philosophical issues involving science and induction as well as to ethical issues Provides a framework to critically analyze arguments in classic and contemporary philosophical debates
This book introduces new trends of theory and practice of information technologies in tourism. The book does not handle only the fundamental contribution, but also discusses innovative and emerging technologies to promote and develop new generation tourism informatics theory and their applications. Some chapters are concerned with data analysis, web technologies, social media and their case studies. Travel information on the web provided by travelers is very useful for other travelers make their travel plan. A chapter in this book proposes a method for interactive retrieval of information on accommodation facilities to support travelling customers in their travel preparations. Also an adaptive user interface for personalized transportation guidance system is proposed. Another chapter in this book shows a novel support system for the collaborative tourism planning by using the case reports that are collected via Internet. Also, a system for recommending hotels for the users is proposed and evaluated. Other chapters are concerned with recommendation, personalization and other emerging technologies.
|
![]() ![]() You may like...
Encyclopedia of Child and Adolescent…
Bonnie Halpern-Felsher
Hardcover
R64,290
Discovery Miles 642 900
Culture, Brain, and Analgesia…
Mario Incayawar, Knox H. Todd
Hardcover
R3,125
Discovery Miles 31 250
Correspondance Generale de la Beaumelle…
Hubert Bost, Claude Lauriol, …
Hardcover
R4,944
Discovery Miles 49 440
|