Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
This book brings together the state of the art and current debates in the field of formative research, and examines many of the innovative methods largely overlooked in the available literature. This book will help social marketing to move beyond surveys and focus groups. The book addresses the needs of social marketing academics and practitioners alike by providing a robust and critical academic discussion of cutting-edge research methods, while demonstrating at the same time how each respective method can help us arrive at a deeper understanding of the issues that social marketing interventions are seeking to remedy. Each chapter includes a scholarly discussion of key formative research methods, a list of relevant internet resources, and three key readings for those interested in extending their understanding of the method. Most chapters also feature a short case study demonstrating how the methods are used.
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
What do philosophy and computer science have in common? It turns out, quite a lot! In providing an introduction to computer science (using Python), Daniel Lim presents in this book key philosophical issues, ranging from external world skepticism to the existence of God to the problem of induction. These issues, and others, are introduced through the use of critical computational concepts, ranging from image manipulation to recursive programming to elementary machine learning techniques. In illuminating some of the overlapping conceptual spaces of computer science and philosophy, Lim teaches the reader fundamental programming skills and also allows her to develop the critical thinking skills essential for examining some of the enduring questions of philosophy. Key Features Teaches readers actual computer programming, not merely ideas about computers Includes fun programming projects (like digital image manipulation and Game of Life simulation), allowing the reader to develop the ability to write larger computer programs that require decomposition, abstraction, and algorithmic thinking Uses computational concepts to introduce, clarify, and develop a variety of philosophical issues Covers various aspects of machine learning and relates them to philosophical issues involving science and induction as well as to ethical issues Provides a framework to critically analyze arguments in classic and contemporary philosophical debates
This book will resonate with anyone no matter where you reside on this journey, whether newbie or old guard. If you want to be part of this change, you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn't resonate, then I suggest you think about stepping aside. -Curt Queyrouze, President, CCBX, A Division of Coastal Community Bank The world is going digital, and so is banking-in fits, starts, and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits, mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about, not by external heroes and saviours, not by a generation yet to be born, but people just like us. People who understand the industry and its quirks. Bankers who have the grit, determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a 'this is who we are' piece, including the author's trench credentials. It then present an overview of corporate culture (this is what we deal with and a few ideas on how to handle it), as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds, and a hopeful look-ahead on what a team of principled, dedicated folks can do despite everything.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
Modern technological development has been both rapid and fundamentally transformative of the means and methods of warfare, and of the broader environment in which warfare is conducted. In many cases, technological development has been stimulated by, and dedicated to, addressing military requirements. On other occasions, technological developments outside the military sphere affect or inform the conduct of warfare and military expectations. The introduction of new technologies such as information technology, space technologies, nanotechnology and robotic technologies into our civil life, and into warfare, is expected to influence the application and interpretation of the existing rules of the law of armed conflict. In this book, scholars and practitioners working in the fields critically examine the potential legal challenges arising from the use of new technologies and future directions of legal development in light of the specific characteristics and challenges each technology presents with regard to foreseeable humanitarian impacts upon the battlespace.
Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.
* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats
This book introduces new trends of theory and practice of information technologies in tourism. The book does not handle only the fundamental contribution, but also discusses innovative and emerging technologies to promote and develop new generation tourism informatics theory and their applications. Some chapters are concerned with data analysis, web technologies, social media and their case studies. Travel information on the web provided by travelers is very useful for other travelers make their travel plan. A chapter in this book proposes a method for interactive retrieval of information on accommodation facilities to support travelling customers in their travel preparations. Also an adaptive user interface for personalized transportation guidance system is proposed. Another chapter in this book shows a novel support system for the collaborative tourism planning by using the case reports that are collected via Internet. Also, a system for recommending hotels for the users is proposed and evaluated. Other chapters are concerned with recommendation, personalization and other emerging technologies.
The bestselling PC reference on the planet now available in its 13th edition Completely updated to cover the latest technology and software, the 13th edition of PCs For Dummies tackles using a computer in friendly, human terms. Focusing on the needs of the beginning computer user, while also targeting those who are familiar with PCs, but need to get up to speed on the latest version of Windows. This hands-on guide takes the dread out of working with a personal computer. Leaving painful jargon and confusing terminology behind, it covers Windows 10 OS, connecting to and using services and data in the cloud, and so much more. Written by Dan Gookin, the original For Dummies author, it tells you how to make a PC purchase, what to look for in a new PC, how to work with the latest operating system, ways to protect your files, what you can do online, media management tips, and even basic topics you're probably too shy to ask a friend about. * Determine what you need in a PC and how to set it up * Configure your PC, hook up a printer, and connect to the Internet * Find your way around Windows 10 OS with ease and confidence * Play movies and music, view photos, and explore social media If you're a first-time PC user at home or at work or just need to brush up on the latest technological advancements, the new edition of this bestselling guide gets you up and running fast.
This book deals with the theoretical, methodological, and empirical implications of bounded rationality in the operation of institutions. It focuses on decisions made under uncertainty, and presents a reliable strategy of knowledge acquisition for the design and implementation of decision-support systems. Based on the distinction between the inner and outer environment of decisions, the book explores both the cognitive mechanisms at work when actors decide, and the institutional mechanisms existing among and within organizations that make decisions fairly predictable. While a great deal of work has been done on how organizations act as patterns of events for (boundedly) rational decisions, less effort has been devoted to study under which circumstances organizations cease to act as such reliable mechanisms. Through an empirical strategy on open-ended response data from a survey among junior judges, the work pursues two main goals. The first one is to explore the limits of "institutional rationality" of the Spanish lower courts on-call service, an optimal scenario to observe decision-making under uncertainty. The second aim is to achieve a better understanding of the kind of uncertainty under which inexperienced decision-makers work. This entails exploring the demands imposed by problems and the knowledge needed to deal with them, making this book also a study on expertise achievement in institutional environments. This book combines standard multivariate statistical methods with machine learning techniques such as multidimensional scaling and topic models, treating text as data. Doing so, the book contributes to the collaboration between empirical social scientific approaches and the community of scientists that provide the set of tools and methods to make sense of the fastest growing resource of our time: data.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
In the past decade, artificial intelligence (AI) has become a disruptive force around the world, offering enormous potential for innovation but also creating hazards and risks for individuals and the societies in which they live. This volume addresses the most pressing philosophical, ethical, legal, and societal challenges posed by AI. Contributors from different disciplines and sectors explore the foundational and normative aspects of responsible AI and provide a basis for a transdisciplinary approach to responsible AI. This work, which is designed to foster future discussions to develop proportional approaches to AI governance, will enable scholars, scientists, and other actors to identify normative frameworks for AI to allow societies, states, and the international community to unlock the potential for responsible innovation in this critical field. This book is also available as Open Access on Cambridge Core.
This book is timely and discusses the effects from the pandemic. Written for longevity, and may be useful to compare this pandemic and the response to future events. The book is written for academia: social sciences, public health, information science, emergency management, and policy fields, and is easier informational reading for the layperson.
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. This text highlights a showcase of cutting-edge research on the use of convolution neural networks, autoencoders, recurrent convolutional neural networks in face, hand, iris, gait, fingerprint, vein, and medical biometric traits. It also provides a step-by-step guide to understanding deep learning concepts for biometrics authentication approaches and presents an analysis of biometric images under various environmental conditions. This book is sure to catch the attention of scholars, researchers, practitioners, and technology aspirants who are willing to research in the field of AI and biometric security.
Putting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape. Technology not only disrupts the traditional idea of what it is 'to think like a lawyer,' as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules - thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in shaping both legal doctrine and our regulatory thinking. This is a book for those studying, or about to study, law - as well as others with interests in the legal, political, and social impact of technology.
This book highlights the challenges and potential of educational learning or industry-based training using serious games and social media platforms. In particular, the book addresses applications used in businesses and education-related organizations in Asia, where the framework and experience of serious games have been used to address specific problems in the real world. The topics that will be present in this book includes future of serious games and immersive technologies and their impact on society; online and mobile games; achievement systems in serious games; persuasive technology and games for saving and money management; malware analytics for social networking; serious games for mental health interventions; educational implications of social network games; learning and acquiring subject knowledge using serious games in classrooms. The target audience for this book includes scientists, engineers and practitioners involved in the field of Serious Games. The major part of this book comprises of papers that have been presented at the Serious Games and Social Connect 2012 conference held in Singapore (October 4, 2012). All the contributions have been peer reviewed and by scientific committee members with report about quality, content and originality. |
You may like...
Research Anthology on Applying Social…
Information R Management Association
Hardcover
R9,436
Discovery Miles 94 360
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Competition and Regulation in the Data…
Gintare Surblyte-Namaviciene
Hardcover
R3,019
Discovery Miles 30 190
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,447
Discovery Miles 54 470
Legal Challenges of Big Data
Joe Cannataci, Valeria Falce, …
Hardcover
R3,496
Discovery Miles 34 960
|