![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Cyberspace is a difficult area for lawyers and lawmakers. With no physical constraining borders, the question of who is the legitimate lawmaker for cyberspace is complex. Rethinking the Jurisprudence of Cyberspace examines how laws can gain legitimacy in cyberspace and identifies the limits of the law?s authority in this space. Two key questions are central to the book: Who has authority to make laws within cyberspace and how do laws in cyberspace achieve legitimacy? Chris Reed and Andrew Murray answer these questions by examining the jurisprudential principles that explain law in the physical world and rethinking them for the cyberworld. In doing so they establish that cyberlaw is more similar to traditional law than previously thought, but that establishing legitimate authority is quite different. This book provides the first thorough examination of the jurisprudence of cyberspace law, asking why any law should be obeyed and how the rule of law is to be maintained there. Academics and researchers who are interested in the regulation of cyberspace will find this to be a compelling study. More broadly, it will appeal to those researching in the fields of transnational legal studies, jurisprudence and legal thought.
The proposed title intends to provide a comprehensive view of emerging paradigms of computer science. The initial chapters will introduce various emerging paradigms and discuss research challenges related to them. Then some of the chapters will focus on the research solutions to address the identified challenges. The last few chapters will provide a discussion on future research directions.
Computers, now the writer's tool of choice, are still blamed by
skeptics for a variety of ills, from speeding writing up to the
point of recklessness, to complicating or trivializing the writing
process, to destroying the English language itself.
Digital technologies are deeply embedded in everyday life with opportunities for information access and perpetual social contact now mediating most of our activities and relationships. This book expands the lens of Cyberpsychology to consider how digital experiences play out across the various stages of people's lives. Most psychological research has focused on whether human-technology interactions are a 'good' or a 'bad' thing for humanity. This book offers a distinctive approach to the emergent area of Cyberpsychology, moving beyond these binary dilemmas and considering how popular technologies have come to frame human experience and relationships. In particular the authors explore the role of significant life stages in defining the evolving purpose of digital technologies. They discuss how people's symbiotic relationship with digital technologies has started to redefine our childhoods, how we experience ourselves, how we make friends, our experience of being alone, how we have sex and form romantic relationships, our capacity for being antisocial as well as the experience of growing older and dying. This interdisciplinary book will be of great interest to scholars and practitioners across psychology, digital technology and media studies as well as anyone interested in how technology influences our behaviour.
An ever-increasing thirst for information in recent years among consumers, researchers, and the general population has necessitated continuous growth of internet architecture and accessibility, an issue which, if not addressed properly, may inhibit the growth of the internet as a whole. Solutions for Sustaining Scalability in Internet Growth investigates current issues impeding the growth of information architecture and explores methods for developing a wider-reaching and ever-evolving internet. The book presents viable solutions to some of the current threats to robust and pervasive information systems, enabling internet actors such as network providers, service providers, vendors, and regulatory bodies to ensure the creation of a more accessible and balanced internet.
This book discusses issues relating to the application of AI and computational modelling in criminal proceedings from a European perspective. Part one provides a definition of the topics. Rather than focusing on policing or prevention of crime - largely tackled by recent literature - it explores ways in which AI can affect the investigation and adjudication of crime. There are two main areas of application: the first is evidence gathering, which is addressed in Part two. This section examines how traditional evidentiary law is affected by both new ways of investigation - based on automated processes (often using machine learning) - and new kinds of evidence, automatically generated by AI instruments. Drawing on the comprehensive case law of the European Court of Human Rights, it also presents reflections on the reliability and, ultimately, the admissibility of such evidence. Part three investigates the second application area: judicial decision-making, providing an unbiased review of the meaning, benefits, and possible long-term effects of 'predictive justice' in the criminal field. It highlights the prediction of both violent behaviour, or recidivism, and future court decisions, based on precedents. Touching on the foundations of common law and civil law traditions, the book offers insights into the usefulness of 'prediction' in criminal proceedings.
This open access collection examines how higher education responds to the demands of the automation economy and the fourth industrial revolution. Considering significant trends in how people are learning, coupled with the ways in which different higher education institutions and education stakeholders are implementing adaptations, it looks at new programs and technological advances that are changing how and why we teach and learn. The book addresses trends in liberal arts integration of STEM innovations, the changing role of libraries in the digital age, global trends in youth mobility, and the development of lifelong learning programs. This is coupled with case study assessments of the various ways China, Singapore, South Africa and Costa Rica are preparing their populations for significant shifts in labour market demands - shifts that are already underway. Offering examples of new frameworks in which collaboration between government, industry, and higher education institutions can prevent lagging behind in this fast changing environment, this book is a key read for anyone wanting to understand how the world should respond to the radical technological shifts underway on the frontline of higher education.
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found in various key fields of law directly linked to the Internet such as information technology, consumer protection, personal data, e-commerce and copyright law. In addition, it aims to shed light on the content and importance of various pending legislative proposals in these fields, and of the Court of Justice of the European Union's recent case law in connection with solving the different problems encountered. The book focuses on challenging legal questions that have not been sufficiently analyzed, while also presenting original thinking in connection with the regulation of emerging legal questions. As such, it offers an excellent reference tool for researchers, policymakers, judges, practitioners and law students with a special interest in EU Internet law and regulation.
These days, regardless of whether a book is self-published or traditionally published, there will be an expectation on the author to take an active role in marketing their book. Based on a series of interviews with successful authors from both sides of the publishing divide and both sides of the pond, Lynn lays out in detail the marketing strategies that have worked for them, alongside an explanation of how book marketing works based on her own long-standing career as a senior marketing exec. From developing social media tactics and arranging promotional events to handling press and trying to start viral campaigns, Lynn offers practical advice designed to help an author find a book marketing strategy that best works for them, based on their personal strengths and budget.
Africa 2.0 provides an important history of how two technologies - mobile calling and internet - were made available to millions of sub-Saharan Africans, and the impact they have had on their lives. The book deals with the political challenges of liberalisation and privatisation that needed to be in place in order for these technologies to be built. It analyses how the mobile phone fundamentally changed communications in sub-Saharan Africa and the ways Africans have made these technologies part of their lives, opening up a very different future. The book offers a critical examination of the impact these technologies have had on development practices, and the key role development actors played in accelerating regulatory reform, fibre roll-out and mobile money. Southwood shows how corruption in the industry is a prism through which patronage relationships in government can be understood, and argues that the arrival of a start-up ecosystem in the region has the potential to change this. A vital overview of the changes of the last three decades, Africa 2.0 examines the transformative effects of mobile and internet technologies, and the very different future they have opened out for sub-Saharan Africa. -- .
'A major analysis of our world's political crisis' - Joel Wainwright The collapse of neoliberal hegemony in the western world following the financial crash of 2007-8 and subsequent rise of right-wing authoritarian personalities has been described as a crisis of 'the political' in western societies. But the crisis must be seen as global, rather than focusing on the west alone. Pakistan is experiencing rapid financialisation and rapacious capture of natural resources, overseen by the country's military establishment and state bureaucracy. Under their watch, trading and manufacturing interests, property developers and a plethora of mafias have monopolised the provision of basic needs like housing, water and food, whilst also feeding conspicuous consumption by a captive middle-class. Aasim Sajjad-Akhtar explores neoliberal Pakistan, looking at digital technology in enhancing mass surveillance, commodification and atomisation, as well as resistance to the state and capital. Presenting a new interpretation of our global political-economic moment, he argues for an emancipatory political horizon embodied by the 'classless' subject.
Packed with projects and inspirational ideas you can do any time, any place, become an accomplished photographer while feeding your creativity with this guide that reveals what just what your smartphone camera is capable of. A camera phone is something we always have on us and creativity is something we all have in us but often we struggle to use them properly, feeling like we don't have the time, space or inclination to dedicate to it. Here, photography expert and bestselling author Jo Bradford supplies a collection of practical exercises that allow you to master the features on your smartphone camera to take incredible images and also help you to easily reconnect with your creative side. By encouraging you to try something different with your camera and seek out creative opportunities - from light painting to collage, image stacking to time-lapse landscapes - soon you will once again feel the satisfaction of thinking and acting creatively, with the added benefit of taking you from a snapper to an accomplished photographer with visual literacy. Smartphone photography is addictive with a tangible feel-good factor; it's time to embrace it and capture the moments that matter to you in all their glory.
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment. Focusing on Facebook pages dedicated to hosting footage of street fights, brawls, and other forms of bareknuckle violence, Wood demonstrates that to properly grapple with antisocial media, we must address not only their content, but also their software. In doing so, this study goes a long way to addressing the fundamental question: how have social media changed the way we consume crime? Synthesizing criminology, media theory, software studies, and digital sociology, Antisocial Media is media criminology for the Facebook age. It is essential reading for students and scholars interested in social media, cultural criminology, and the crime-media interface.
Social networks have created a plethora of problems regarding privacy and the protection of personal data. The use of social networks has become a key concern of legal scholars, policy-makers and the operators as well as users of those social networks. This pathbreaking book highlights the importance of privacy in the context of today's new electronic communication technologies as it presents conflicting claims to protect national and international security, the freedom of the Internet and economic considerations. Using the New Haven School of Jurisprudence's intellectual framework, the author presents the applicable law on privacy and social media in international and comparative perspective, focusing on the United States, the European Union and its General Data Protection Regulation of 2018 as well as Germany, the United Kingdom and Latin America. The book appraises the law in place, discusses alternatives and presents recommendations in pursuit of a public order of human dignity.
Social Media: The Academic Library Perspective provides a step-by-step guide on social media as written by somebody who has already done the work. Made up of case studies written by authors at various institutions who provide different perspectives on their institution's use of social media, the book highlights successes and failures, while also focusing on tips for social media management in the academic library that anybody in the community can interpret and adapt. Social media platforms are dealt with systematically, making this an essential guide for librarians who want to use social media to the benefit of their library.
What does men's fashion say about contemporary masculinity? How do these notions operate in an increasingly digitized world? To answer these questions, author Joshua M. Bluteau combines theoretical analysis with vibrant narrative, exploring men's fashion in the online world of social media as well as the offline worlds of retail, production, and the catwalk. Is it time to reassess notions of masculinity? How do we construct ourselves in the online world, and what are the dangers of doing so? From the ateliers of London to the digital landscape of Instagram, Dressing Up re-examines the ways men dress, and the ways men post.
This book examines the role of the EU in ensuring privacy and data protection on the internet. It describes and demonstrates the importance of privacy and data protection for our democracies and how the enjoyment of these rights is challenged by, particularly, big data and mass surveillance. The book takes the perspective of the EU mandate under Article 16 TFEU. It analyses the contributions of the specific actors and roles within the EU framework: the judiciary, the EU legislator, the independent supervisory authorities, the cooperation mechanisms of these authorities, as well as the EU as actor in the external domain. Article 16 TFEU enables the Court of the Justice of the EU to play its role as constitutional court and to set high standards for fundamental rights protection. It obliges the European Parliament and the Council to lay down legislation that encompasses all processing of personal data. It confirms control by independent supervisory authorities as an essential element of data protection and it gives the EU a strong mandate to act in the global arena. The analysis shows that EU powers can be successfully used in a legitimate and effective manner and that this subject could be a success story for the EU, in times of widespread euroskepsis. It demonstrates that the Member States remain important players in ensuring privacy and data protection. In order to be a success story, the key stakeholders should be prepared to go the extra mile, so it is argued in the book. The book is based on academic research for which the author received a double doctorate at the University of Amsterdam and the Vrije Universiteit Brussels. It builds on a long inside experience within the European institutions, as well as within the community of data protection and data protection authorities. It is a must read in a time where the setting of EU privacy and data protection is changing dramatically, not only as a result of the rapidly evolving information society, but also because of important legal developments such as the entry into force of the General Data Protection Regulation. This book will appeal to all those who are in some way involved in making this regulation work. It will also appeal to people interested in the institutional framework of the European Union and in the role of the Union of promoting fundamental rights, also in the wider world.
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.
In surrealist artist Paul Klee's The Twittering Machine, the bird-song of a diabolical machine acts as bait to lure humankind into a pit of damnation. Leading political writer and broadcaster Richard Seymour argues that this is a chilling metaphor for our relationship with social media. Former social media executives tell us that the system is an addiction-machine. We are users, waiting for our next hit as we like, comment and share. We write to the machine as individuals, but it responds by aggregating our fantasies, desires and frailties into data, and returning them to us as a commodity experience. Through journalism, psychoanalytic reflection and insights from users, developers, security experts and others, Seymour probes the human side of the machine, asking what we're getting out of it, and what we're getting into.
Music videos play a critical role in our age of ubiquitous streaming digital media. They project the personas and visions of musical artists; they stand at the cutting edge of developments in popular culture; and they fuse and revise multiple frames of reference, from dance to high fashion to cult movies and television shows to Internet memes. Above all, music videos are laboratories for experimenting with new forms of audiovisual expression. The Rhythm Image explores all these dimensions. The book analyzes, in depth, recent music videos for artists ranging from pop superstar The Weeknd to independent women artists like FKA twigs and Dawn Richard. The music videos discussed in this book all treat the traditional themes of popular music: sex and romance, money and fame, and the lived experiences of race and gender. But they twist these themes in strange and unexpected ways, in order to reflect our entanglement with a digital world of social media, data gathering, and 24/7 demands upon our attention.
Just as the AutoCAD software continues to be improved and perfected, so does the Beginning AutoCAD (R) Exercise Workbook. This work is truly the ideal package from which to learn AutoCAD, whether you're a complete beginner, or simply learning about the latest features. The new AutoCAD 2022 software includes features such as Installer, which reduces the number of steps needed for the initial install, Share Current Drawing, allowing other users to view or edit a drawing in the online AutoCAD Web application, and Trace, encouraging collaboration on drawing changes using the AutoCAD Web and Mobile apps. Readers can download the provided templates used for drawings in the book from the Industrial Press website. Expert author duo Shrock and Heather share their knowledge with students and instructors, including plenty of inside tips and dozens of exercises to help users get comfortable and see real progress. NEW AND/OR IMPROVED FEATURES IN BEGINNING AUTOCAD 2022: Redesigned Start Tab-There are three main sections that provide access to recent work, enabling users to carry on where they left off, and offering them access to online saved drawing files. (Included in Lesson 1) Count-The new Count feature allows users to count the instances of objects and Blocks that are placed in their drawing. (Included in Lesson 29) Floating Drawing Tabs-Users can now drag a drawing file Tab from the main AutoCAD application window to make it a separate drawing file window. This is extremely useful for those with two or more monitors. (Included in Lesson 2)
This book is timely and discusses the effects from the pandemic. Written for longevity, and may be useful to compare this pandemic and the response to future events. The book is written for academia: social sciences, public health, information science, emergency management, and policy fields, and is easier informational reading for the layperson. |
You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|