![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
This book intends to unite studies in different fields related to the development of the relations between logic, law and legal reasoning. Combining historical and philosophical studies on legal reasoning in Civil and Common Law, and on the often neglected Arabic and Talmudic traditions of jurisprudence, this project unites these areas with recent technical developments in computer science. This combination has resulted in renewed interest in deontic logic and logic of norms that stems from the interaction between artificial intelligence and law and their applications to these areas of logic. The book also aims to motivate and launch a more intense interaction between the historical and philosophical work of Arabic, Talmudic and European jurisprudence. The publication discusses new insights in the interaction between logic and law, and more precisely the study of different answers to the question: what role does logic play in legal reasoning? Varying perspectives include that of foundational studies (such as logical principles and frameworks) to applications, and historical perspectives.
AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.
This book focuses on the legal regulation, mainly from an international law perspective, of autonomous artificial intelligence systems, of their creations, as well as of the interaction of human and artificial intelligence. It examines critical questions regarding both the ontology of autonomous AI systems and the legal implications: what constitutes an autonomous AI system and what are its unique characteristics? How do they interact with humans? What would be the implications of combined artificial and human intelligence? It also explores potentially the most important questions: what are the implications of these developments for collective security -from both a state-centered and a human perspective, as well as for legal systems? Why is international law better positioned to make such determinations and to create a universal framework for this new type of legal personality? How can the matrix of obligations and rights of this new legal personality be construed and what would be the repercussions for the international community? In order to address these questions, the book discusses cognitive aspects embedded in the framework of law, offering insights based on both de lege lata and de lege ferenda perspectives.
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.
With the ongoing evolution of the digital society challenging the boundaries of the law, new questions are arising - and new answers being given - even now, almost three decades on from the digital revolution. Written by a panel of legal specialists and edited by experts on EU Internet law, this book provides an overview of the most recent developments affecting the European Internet legal framework, specifically focusing on four current debates. Firstly, it discusses the changes in online copyright law, especially after the enactment of the new directive on the single digital market. Secondly, it analyzes the increasing significance of artificial intelligence in our daily life. The book then addresses emerging issues in EU digital law, exploring out of the box approaches in Internet law. It also presents the last cyber-criminality law trends (offenses, international instrument, behaviors), and discusses the evolution of personal data protection. Lastly, it evaluates the degree of consumer and corporate protection in the digital environment, demonstrating that now, more than ever, EU Internet law is based on a combination of copyright, civil, administrative, criminal, commercial and banking laws.
This handbook is a comprehensive overview of the burgeoning podcast industry. It covers the history of podcasting from its roots in radio; the variety of genres, topics and styles of today's podcasts (both individual and corporate); and the steps required to build your own podcast. The handbook covers all the elements needed to create a successful podcast including platform options, programming, advertising and sponsorships. Supplemental essays from professionals in various industries provide information and tips to enhance the podcasting experience. The structure of the book is easily adapted into lesson plans, and the exercises included for readers make it a book well suited for classes on podcasting.
The newest generation of children is exposed to ubiquitous technology, more than any generation that preceded them. They are photographed with smartphones from the moment they're born, and begin interacting with screens at around four months old. Is this good news or bad news? A wonderful opportunity to connect around the world? Or the first step in creating a generation of addled screen zombies? The truth is, there's no road map for navigating this territory. But while many have been quick to declare this the dawn of a neurological and emotional crisis, solid science on the subject is surprisingly hard to come by. In this book, Anya Kamenetz--an expert on both education and technology, as well as a mother of two young children--takes a refreshingly practical look at the subject. Surveying hundreds of fellow parents on their practices and ideas, and cutting through a thicket of inconclusive studies and overblown claims, she hones a simple message, a riff on Michael Pollan's well-known "food rules": Enjoy Screens. Not too much. Mostly with others. This brief but powerful dictum forms the backbone of a philosophy that will help parents survive the ubiquity of technology in their children's lives, curb their panic, and create room for a happy, healthy family life. Kamenetz's sophisticated yet practical thinking is a necessary cure for an age of anxiety.
Pathology & Technology is the first comprehensive look at "technopathologies." Since the days of the telegraph, electric communication technologies have been associated with causing or worsening mental and physical illnesses. Today, news reports warn of Pokemon Go deaths and women made vulnerable to sexual assault from wearing headphones. Drawing on an archive of hundreds of cases found across news, entertainment, and other sources over 150 years, this book investigates the intersection of technology and disease through original cultural historiography, focus groups, and discourse analysis, documenting a previously unexplored phenomenon in communication and media. Technopathologies occur with new and old media, the book argues, and are ultimately about people-not machines. They help define users as normal or abnormal, in ways that often align with existing social stereotypes. Courses on technological history, medical humanities, science and technology studies, and medical history will find much here to debate, in a style written to appeal to scholarly as well as popular readers.
Social media has come to deeply penetrate our lives: Facebook, YouTube, Twitter and many other platforms define many of our daily habits of communication and creative production. The Culture of Connectivity studies the rise of social media in the first decade of the twenty-first century up until 2012, providing both a historical and a critical analysis of the emergence of major platforms in the context of a rapidly changing ecosystem of connective media. Such history is needed to understand how these media have come to profoundly affect our experience of online sociality. The first stage of their development shows a fundamental shift. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Author and media scholar Jose van Dijck offers an analytical prism to examine techno-cultural as well as socio-economic aspects of this transformation. She dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecology of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, and filtering content rely on shared ideological principles. At the level of management and organization, we can also observe striking similarities between these platforms' shifting ownership status, governance strategies, and business models. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. "Sharing," "friending," "liking," "following," "trending," and "favoriting" have come to denote online practices imbued with specific technological and economic meanings. This process of normalization, the author argues, is part of a larger political and ideological battle over information control in an online world where everything is bound to become social. Crossing lines of technological, historical, sociological, and cultural inquiry, The Culture of Connectivity will reshape the way we think about interpersonal connection in the digital age.
This book provides a set of proposals for the new conceptual network required in order to establish civil law rules for a world permeated by Artificial Intelligence. These proposals are intended by their authors to push the debate on the new civil law forward. In spite of the natural conservatism of jurists, some innovative or even futuristic ideas are called for, also because the future, even this not-so-distant one, is difficult to foresee. Paradoxically, and unlike in the past, this lack of knowledge must not stop us from planning. If it does, humankind may, as some pessimists already claim, lose its chance to win the battle for control of the world. The rise and expansion of Artificial Intelligence and robotics in recent years has highlighted a pressing need to create a suitable legal framework for this new phenomenon. The debate on the subject, although wide-ranging and involving many new legal documents, is still quite general and preliminary in nature, although these preparatory works illustrate the very real need to develop appropriate new civil law arrangements. It is exactly the branch of private law where the necessity of these new rules appears to be the most imperative. Autonomous vehicles, medical robots, and expertise software raise fundamental questions on aspects of civil liability such as culpability; whereas the growth in popularity of automated, intelligent software systems for concluding contracts requires a new approach to many fundamental and deeply rooted elements of contract law, e.g. consciousness, intent, error, deception, interpretation of contracts and good faith. Ruling on these specific matters demands the identification and clarification of certain key points, which shall become the foundation for constructing AI/robot civil law.
This book addresses challenges that new technologies and the big data revolution pose to existing regulatory and legal frameworks. The volume discusses issues such as blockchain and its implications for property transactions and taxes, three (or four) dimensional title registration, land use and urban planning in the age of big data, and the future of property rights in light of these changes. The book brings together an interdisciplinary collection of chapters that revolve around the potential influence of disruptive technologies on existing legal norms and the future development of real estate markets. The book is divided into five parts. Part I presents a survey of the current available research on blockchain and real estate. Part II provides a background on property law for the volume, grounding it in fundamental theory. Part III discusses the changing landscapes of property rights while Part IV debates the potential effects of blockchain on land registration. Finally the book concludes with Part V, which is devoted to new technological applications relevant to real estate. Providing an interdisciplinary perspective on emerging technologies that have the potential to disrupt the real estate industry and the regulation of it, this book will appeal to a broad audience, consisting of scholars, policy-makers, practitioners, and students, interested in real estate, law, economics, blockchain, and technology policy.
Jackie Phamotse digs deep into the climate of law and policy in the social media landscape. After a David and Goliath social media legal battle that saw many take note tweeting about her, the result is a brace, thought-provoking and remarkably detailed social media guide and personal narrative. A first-hand approach on beating public humiliation and cyber victimization, Phamotse combines personal anecdotes, hard data and compelling research to cut through an unjust system governed by the rich and famous. The author directly addresses the question of power and obsession related to social media influencers. Written with equal doses of humor, compassion and wisdom, I Tweet What I Like is an inspiring call to action, celebrating diversity and human potential. I Tweet What I Like will inspire you!
Have you ever wondered what specific strategies the world's highest-paid Internet entrepreneurs are using to get rich? Are you tired of working forty hours per week at a job you dislike and not getting paid what you're worth? Would you like to learn how to package the knowledge already in your head and put it into high-earning digital products (ebooks, online courses, coaching programs, software, etc.)? Wouldn't it be great to make a bigger impact in the world by helping others and doing what you love? If you answered yes to any of these questions, read Matthew Loop's Social Media Made Me Rich. This tactical blueprint shares the common denominators of the wealthiest movers and shakers online. You'll learn: - How to profit big from Facebook, Instagram, YouTube, Twitter, Pinterest, Amazon, and Google. - The biggest (and dumbest) mistakes to avoid when using high-leverage social platforms. - A million-dollar plan so you can start from scratch and monetize who you are along with what you know. - The most sought after scripts that grow your brand, influence, and bottom line fast. - How to become the celebrity expert in your industry. - The secret to attracting greater numbers of clients and sales without spending money. Social Media Made Me Rich is a comprehensive resource that helps you achieve prosperity and abundance on your terms, even if you're starting from zero.
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.
The proposed title intends to provide a comprehensive view of emerging paradigms of computer science. The initial chapters will introduce various emerging paradigms and discuss research challenges related to them. Then some of the chapters will focus on the research solutions to address the identified challenges. The last few chapters will provide a discussion on future research directions.
Computers, now the writer's tool of choice, are still blamed by
skeptics for a variety of ills, from speeding writing up to the
point of recklessness, to complicating or trivializing the writing
process, to destroying the English language itself.
This book discusses issues relating to the application of AI and computational modelling in criminal proceedings from a European perspective. Part one provides a definition of the topics. Rather than focusing on policing or prevention of crime - largely tackled by recent literature - it explores ways in which AI can affect the investigation and adjudication of crime. There are two main areas of application: the first is evidence gathering, which is addressed in Part two. This section examines how traditional evidentiary law is affected by both new ways of investigation - based on automated processes (often using machine learning) - and new kinds of evidence, automatically generated by AI instruments. Drawing on the comprehensive case law of the European Court of Human Rights, it also presents reflections on the reliability and, ultimately, the admissibility of such evidence. Part three investigates the second application area: judicial decision-making, providing an unbiased review of the meaning, benefits, and possible long-term effects of 'predictive justice' in the criminal field. It highlights the prediction of both violent behaviour, or recidivism, and future court decisions, based on precedents. Touching on the foundations of common law and civil law traditions, the book offers insights into the usefulness of 'prediction' in criminal proceedings. |
You may like...
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|