0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (148)
  • R250 - R500 (531)
  • R500+ (1,587)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Law, Technology and Dispute Resolution - The Privatisation of Coercion (Hardcover): Riikka Koulu Law, Technology and Dispute Resolution - The Privatisation of Coercion (Hardcover)
Riikka Koulu
R4,056 Discovery Miles 40 560 Ships in 12 - 17 working days

The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely undiscussed. In this book, assistant professor of law and digitalisation Riikka Koulu examines the multifaceted phenomenon of dispute resolution technology, focusing specifically on private enforcement, which modern technology enables on an unforeseen scale. The increase in private enforcement confounds legal structures and challenges the nation-state's monopoly on violence. And, in this respect, the author argues that the technology-driven privatisation of enforcement - from direct enforcement of e-commerce platforms to self-executing smart contracts in the blockchain - brings the ethics of law's coercive nature out into the open. This development constitutes a new, and dangerous, grey area of conflict management, which calls for transparency and public debate on the ethical implications of dispute resolution technology.

Researching and Enacting Change in Postsecondary Education - Leveraging Instructors' Social Networks (Hardcover): Charles... Researching and Enacting Change in Postsecondary Education - Leveraging Instructors' Social Networks (Hardcover)
Charles Henderson, Chris Rasmussen, Naneh Apkarian, Alexis Knaub, Alan James Daly, …
R3,904 Discovery Miles 39 040 Ships in 12 - 17 working days

Calls to improve undergraduate STEM education have resulted in initiatives that seek to bolster student learning outcomes by promoting changes in teaching practices. Written by participants in a series of ground-breaking social network analysis (SNA) workshops, Researching and Enacting Change in Postsecondary Education argues that the academic department is a highly productive focus for the spread of new, network-based teaching ideas. By clarifying methodological issues related to SNA data collection and articulating relevant theoretical approaches to the topic, this book leverages current knowledge about social network theory and SNA techniques for understanding instructional improvement in higher education.

PCs For Dummies, 13e (Paperback, 13th Edition): D. Gookin PCs For Dummies, 13e (Paperback, 13th Edition)
D. Gookin 1
R679 R486 Discovery Miles 4 860 Save R193 (28%) Ships in 9 - 15 working days

The bestselling PC reference on the planet now available in its 13th edition Completely updated to cover the latest technology and software, the 13th edition of PCs For Dummies tackles using a computer in friendly, human terms. Focusing on the needs of the beginning computer user, while also targeting those who are familiar with PCs, but need to get up to speed on the latest version of Windows. This hands-on guide takes the dread out of working with a personal computer. Leaving painful jargon and confusing terminology behind, it covers Windows 10 OS, connecting to and using services and data in the cloud, and so much more. Written by Dan Gookin, the original For Dummies author, it tells you how to make a PC purchase, what to look for in a new PC, how to work with the latest operating system, ways to protect your files, what you can do online, media management tips, and even basic topics you're probably too shy to ask a friend about. * Determine what you need in a PC and how to set it up * Configure your PC, hook up a printer, and connect to the Internet * Find your way around Windows 10 OS with ease and confidence * Play movies and music, view photos, and explore social media If you're a first-time PC user at home or at work or just need to brush up on the latest technological advancements, the new edition of this bestselling guide gets you up and running fast.

Valuing Data - An Open Framework (Hardcover): Dewey Ray Valuing Data - An Open Framework (Hardcover)
Dewey Ray
R2,382 Discovery Miles 23 820 Ships in 12 - 17 working days

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.

Digital Sports Journalism (Paperback): Charles Lambert Digital Sports Journalism (Paperback)
Charles Lambert
R1,148 Discovery Miles 11 480 Ships in 12 - 17 working days

Digital Sports Journalism gives detailed guidance on a range of digital practices for producing content for smartphones and websites. Each chapter discusses a skill that has become essential for sports journalists today, with student-friendly features throughout to support learning. These include case studies, examples of sports journalism from leading global publications, as well as top tips and practical exercises. The book also presents interviews with leading sport and club journalists with wide-ranging experience at the BBC, Copa90, Wimbledon Tennis, the Guardian and BT Sport, who discuss working with new technologies to cover sports stories and events. Chapters cover: live blogging; making and disseminating short videos; working for a sports club or governing body; finding and transmitting stories on social media; podcasting; longform online journalism. The job of a sports journalist has altered dramatically over the first two decades of the 21st century, with scope to write content across a new variety of digital platforms and mediums. Digital Sports Journalism will help students of journalism and professionals unlock the potential of these new media technologies.

Viglets - Ode to Dumbness (Paperback): Viggo P. Hansen Viglets - Ode to Dumbness (Paperback)
Viggo P. Hansen
R212 R177 Discovery Miles 1 770 Save R35 (17%) Ships in 10 - 15 working days
Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover)
Mark Tarallo
R1,864 Discovery Miles 18 640 Ships in 12 - 17 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Hardcover): Michael Anthony C. Dizon A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Hardcover)
Michael Anthony C. Dizon
R4,210 Discovery Miles 42 100 Ships in 12 - 17 working days

The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.

7 Steps to Sharing Your School's Story on Social Media (Paperback): Jason Kotch, Edward Cosentino 7 Steps to Sharing Your School's Story on Social Media (Paperback)
Jason Kotch, Edward Cosentino
R930 Discovery Miles 9 300 Ships in 12 - 17 working days

7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.

Ethical Hacking and Penetration Testing Guide (Hardcover): Rafay Baloch Ethical Hacking and Penetration Testing Guide (Hardcover)
Rafay Baloch
R5,100 Discovery Miles 51 000 Ships in 12 - 17 working days

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R975 Discovery Miles 9 750 Ships in 12 - 17 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Cryptography (Hardcover): William Buchanan Cryptography (Hardcover)
William Buchanan
R1,877 Discovery Miles 18 770 Ships in 10 - 15 working days

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: - full provision of Web-based material on almost every topic covered - provision of additional on-line material, such as videos, source code, and labs - coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs) Key areas covered include: - Fundamentals of Encryption - Public Key Encryption - Symmetric Key Encryption - Hashing Methods - Key Exchange Methods - Digital Certificates and Authentication - Tunneling - Crypto Cracking - Light-weight Cryptography - Blockchain - Zero-knowledge Proofs This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

Complex Worlds - Digital Culture, Rhetoric and Professional Communication (Paperback): Andrienne Lamberti Complex Worlds - Digital Culture, Rhetoric and Professional Communication (Paperback)
Andrienne Lamberti; Series edited by Charles Sides; Edited by Anne Richards
R1,415 Discovery Miles 14 150 Ships in 12 - 17 working days

'Complex Worlds: Digital Culture, Rhetoric, and Professional Communication' is a collection of thought-provoking scholarly essays by teachers and industry practitioners in professional communication and technology-oriented fields. Scrupulously edited for a range of readers, the collection aims to help familiarize advanced students, teachers, and researchers in professional communication, computers and writing, literacy, and sister disciplines with key issues in digital theory and practice. An emphasis on the situations of and audiences for digital communication identifies 'Complex Worlds' as a rhetorical approach. In an era when globalizing markets and digital technologies are transforming culture around the world, readers should find the collection both engaging and timely. The collections' twelve essays constitute a diverse and thematically coherent set of inquiries. Included are explorations of topics such as cyber activism, digital 'dispositio', citizen and open-source journalism, broadband affordances, XML, digital resumes, avant garde performance art, best pedagogical practices, and intercultural communication between East and West, North and South. The text is especially well suited for advanced courses in professional and applied writing, contemporary rhetorics, and digital culture. The complexity highlighted in the collection's title is brought into relief by authors who address how the digital is daily unmaking our assumptions about the boundaries between work and school, the global and the local, the private and the public. 'Complex Worlds' offers readers an opportunity to build on their rhetorical awareness by expanding their understanding of the means, aims, and strategies of effective communication--today and in the future.

Multimedia Security - Watermarking, Steganography, and Forensics (Paperback): Frank Y. Shih Multimedia Security - Watermarking, Steganography, and Forensics (Paperback)
Frank Y. Shih
R2,408 Discovery Miles 24 080 Ships in 12 - 17 working days

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.

The Useful Book of Gadgets - Solving Life's Little Problems, One Gadget at a TIme (Paperback, 2nd New edition): Martin... The Useful Book of Gadgets - Solving Life's Little Problems, One Gadget at a TIme (Paperback, 2nd New edition)
Martin Bailey
R383 Discovery Miles 3 830 Ships in 12 - 17 working days

Does it sometimes seem that everyone else is doing 'smarter' things on their smartphones than you? Do you feel you're not taking full advantage of some of the amazing technology available today, or perhaps just don't know that it even exists? Martin Bailey's latest book aims to solve life's little problems, one gadget at a time. Including hardware tech, PC/Mac software and mobile apps, it's laid out in an easy-to-read, concise format with each item covering two pages. It's written in plain English too, with illustrations and links to where you can find out more information. Covering over 100 gadgets, whether you're looking to improve your golf game, fix your PC and fill it with free software, measure a room using your phone or even alter your state of mind without drink or drugs, The Useful Book of Gadgets, Gizmos & Apps has something for everyone.

Building in Security at Agile Speed (Hardcover): James Ransome, Brook Schoenfield Building in Security at Agile Speed (Hardcover)
James Ransome, Brook Schoenfield
R1,882 Discovery Miles 18 820 Ships in 12 - 17 working days

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. -Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. -Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. -George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today's technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.

Security without Obscurity - Frequently Asked Questions (FAQ) (Hardcover): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Hardcover)
Jeff Stapleton
R2,535 Discovery Miles 25 350 Ships in 12 - 17 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

CyRM - Mastering the Management of Cybersecurity (Hardcover): David X. Martin CyRM - Mastering the Management of Cybersecurity (Hardcover)
David X. Martin
R1,847 Discovery Miles 18 470 Ships in 12 - 17 working days

Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.

The Leisure Commons - A Spatial History of Web 2.0 (Paperback): Payal Arora The Leisure Commons - A Spatial History of Web 2.0 (Paperback)
Payal Arora
R955 R829 Discovery Miles 8 290 Save R126 (13%) Ships in 12 - 17 working days

There is much excitement about Web 2.0 as an unprecedented, novel, community-building space for experiencing, producing, and consuming leisure, particularly through social network sites. What is needed is a perspective that is invested in neither a utopian or dystopian posture but sees historical continuity to this cyberleisure geography. This book investigates the digital public sphere by drawing parallels to another leisure space that shares its rhetoric of being open, democratic, and free for all: the urban park. It makes the case that the history and politics of public parks as an urban commons provides fresh insight into contemporary debates on corporatization, democratization and privatization of the digital commons. This book takes the reader on a metaphorical journey through multiple forms of public parks such as Protest Parks, Walled Gardens, Corporate Parks, Fantasy Parks, and Global Parks, addressing issues such as virtual activism, online privacy/surveillance, digital labor, branding, and globalization of digital networks. Ranging from the 19th century British factory garden to Tokyo Disneyland, this book offers numerous spatial metaphors to bring to life aspects of new media spaces. Readers looking for an interdisciplinary, historical and spatial approach to staid Web 2.0 discourses will undoubtedly benefit from this text.

Geographies of Digital Exclusion - Data and Inequality (Paperback): Mark Graham, Martin Dittus Geographies of Digital Exclusion - Data and Inequality (Paperback)
Mark Graham, Martin Dittus
R526 Discovery Miles 5 260 Ships in 12 - 17 working days

Today's urban environments are layered with data and algorithms that fundamentally shape how we perceive and move through space. But are our digitally dense environments continuing to amplify inequalities rather than alleviate them? This book looks at the key contours of information inequality, and who, what and where gets left out. Platforms like Google Maps and Wikipedia have become important gateways to understanding the world, and yet they are characterised by significant gaps and biases, often driven by processes of exclusion. As a result, their digital augmentations tend to be refractions rather than reflections: they highlight only some facets of the world at the expense of others. This doesn't mean that more equitable futures aren't possible. By outlining the mechanisms through which our digital and material worlds intersect, the authors conclude with a roadmap for what alternative digital geographies might look like.

The Lonely Century - A Call to Reconnect (Paperback): Noreena Hertz The Lonely Century - A Call to Reconnect (Paperback)
Noreena Hertz
R340 R278 Discovery Miles 2 780 Save R62 (18%) Ships in 9 - 15 working days

*** THE INTERNATIONAL BESTSELLER *** 'Destined to be a classic' Nouriel Roubini 'Brilliant, powerful and hopeful' Philippa Perry 'Explosive, timely and urgent' Daily Telegraph Even before a global pandemic introduced us to terms like social distancing, loneliness was already becoming the defining condition of the twenty-first century. But it's also one we have the power to reverse. Combining a decade of research with first-hand reporting, Noreena Hertz takes us from a 'how to communicate in real life' class for smartphone-addicted university students to bouncy castles at Belgian far-right gatherings, from paying for cuddles in the U.S. to nursing home residents knitting bonnets for their robot caregivers in Japan. The Lonely Century explores how our increasing dependence on technology, radical changes to the workplace and decades of policies that have placed self-interest above the collective good are damaging our communities and making us more isolated than ever before. With bold solutions for us as individuals as well as for businesses and governments, Noreena Hertz offers a hopeful and empowering vision for ow to heal our fractured world and come together again. 'If we could issue a reading list to 10 Downing Street, I'd put this book near the top.' Guardian 'Causing a deserved stir' Financial Times 'Revealing, empathetic and timely' Jonathan Freedland 'Read it, then pass it onto a friend.' Charlie Brooker

Research Handbook on the Law of Virtual and Augmented Reality (Hardcover): Woodrow Barfield, Marc J. Blitz Research Handbook on the Law of Virtual and Augmented Reality (Hardcover)
Woodrow Barfield, Marc J. Blitz
R7,909 Discovery Miles 79 090 Ships in 12 - 17 working days

The proliferation of virtual and augmented reality technologies into society raise significant questions for judges, legal institutions, and policy makers. For example, when should activities that occur in virtual worlds, or virtual images that are projected into real space (that is, augmented reality), count as protected First Amendment 'speech'? When should they instead count as a nuisance or trespass? Under what circumstances would the copying of virtual images infringe intellectual property laws, or the output of intelligent virtual avatars be patentable inventions or works of authorship eligible for copyright? And when should a person (or computer) face legal consequences for allegedly harmful virtual acts? The Research Handbook on the Law of Virtual and Augmented Reality addresses these questions and others, drawing upon free speech doctrine, criminal law, the law of data protection and privacy, and of jurisdiction, as well as upon potential legal rights for increasingly intelligent virtual avatars in VR worlds. The Handbook offers a comprehensive look at challenges to various legal doctrines raised by the emergence - and increasing use of - virtual and augmented reality worlds, and at how existing law in the USA, Europe, and other jurisdictions might apply to these emerging technologies, or evolve to address them. It also considers what legal questions about virtual and augmented reality are likely to be important, not just for judges and legal scholars, but also for the established businesses and start-ups that wish to make use of, and help shape, these important new technologies. This comprehensive Research Handbook will be an invaluable reference to those looking to keep pace with the dynamic field of virtual and augmented reality, including students and researchers studying intellectual property law as well as legal practitioners, computer scientists, engineers, game designers, and business owners. Contributors include: W. Barfield, P.S. Berman, M.J. Blitz, S.J. Blodgett-Ford, J. Danaher, W. Erlank, J.A.T. Fairfield, J. Garon, G. Hallevy, B. Lewis, H.Y.F. Lim, C. Nwaneri, S.R. Peppet, M. Risch, A.L. Rossow, J. Russo, M. Supponen, A.M. Underhill, B.D. Wassom, A. Williams, G. Yadin

Networks of Power in Digital Copyright Law and Policy - Political Salience, Expertise and the Legislative Process (Paperback):... Networks of Power in Digital Copyright Law and Policy - Political Salience, Expertise and the Legislative Process (Paperback)
Benjamin Farrand
R1,067 R972 Discovery Miles 9 720 Save R95 (9%) Ships in 12 - 17 working days

In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.

The Governance of Online Expression in a Networked World (Hardcover): Helena Carrapico, Benjamin Farrand The Governance of Online Expression in a Networked World (Hardcover)
Helena Carrapico, Benjamin Farrand
R1,737 Discovery Miles 17 370 Ships in 10 - 15 working days

In recent years, we have witnessed the mushrooming of pro- democracy and protest movements not only in the Arab world, but also within Europe and the Americas. Such movements have ranged from popular upheavals, like in Tunisia and Egypt, to the organization of large-scale demonstrations against unpopular policies, as in Spain, Greece and Poland. What connects these different events are not only their democratic aspirations, but also their innovative forms of communication and organization through online means, which are sometimes considered to be outside of the State's control. At the same time, however, it has become more and more apparent that countries are attempting to increase their understanding of, and control over, their citizens' actions in the digital sphere. This involves striving to develop surveillance instruments, control mechanisms and processes engineered to dominate the digital public sphere, which necessitates the assistance and support of private actors such as Internet intermediaries. Examples include the growing use of Internet surveillance technology with which online data traffic is analysed, and the extensive monitoring of social networks. Despite increased media attention, academic debate on the ambivalence of these technologies, mechanisms and techniques remains relatively limited, as is discussion of the involvement of corporate actors. The purpose of this edited volume is to reflect on how Internet-related technologies, mechanisms and techniques may be used as a means to enable expression, but also to restrict speech, manipulate public debate and govern global populaces. This book was published as a special issue of the Journal of Information Technology and Politics.

Technology and Human Development (Hardcover): Ilse Oosterlaken Technology and Human Development (Hardcover)
Ilse Oosterlaken
R3,897 Discovery Miles 38 970 Ships in 12 - 17 working days

This book introduces the capability approach - in which wellbeing, agency and justice are the core values - as a powerful normative lens to examine technology and its role in development. This approach attaches central moral importance to individual human capabilities, understood as effective opportunities people have to lead the kind of lives they have reason to value. The book examines the strengths, limitations and versatility of the capability approach when applied to technology, and shows the need to supplement it with other approaches in order to deal with the challenges that technology raises. The first chapter places the capability approach within the context of broader debates about technology and human development - discussing amongst others the appropriate technology movement. The middle part then draws on philosophy and ethics of technology in order to deepen our understanding of the relation between technical artefacts and human capabilities, arguing that we must simultaneously 'zoom in' on the details of technological design and 'zoom out' to see the broader socio-technical embedding of a technology. The book examines whether technology is merely a neutral instrument that expands what people can do and be in life, or whether technology transfers may also impose certain views of what it means to lead a good life. The final chapter examines the capability approach in relation to contemporary debates about 'ICT for Development' (ICT4D), as the technology domain where the approach has been most extensively applied so far. This book is an invaluable read for students in Development Studies and STS, as well as policy makers, practitioners and engineers looking for an accessible overview of technology and development from the perspective of the capability approach.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,151 Discovery Miles 31 510
Tomorrow, and Tomorrow, and Tomorrow…
Gabrielle Zevin Paperback  (1)
R465 R391 Discovery Miles 3 910
Privacy and Legal Issues in Cloud…
Anne S.Y. Cheung, Rolf H. Weber Paperback R1,357 Discovery Miles 13 570
Digital Platforms and Global Law
Fabio Bassan Hardcover R2,487 Discovery Miles 24 870
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,696 Discovery Miles 56 960
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Regulating Social Network Sites - Data…
Asma Vranaki Hardcover R3,147 Discovery Miles 31 470
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R337 Discovery Miles 3 370
The KING OF FIGHTERS: The Ultimate…
Bitmap Books Hardcover R1,332 Discovery Miles 13 320

 

Partners