![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > General
This book investigates how various scientific communities - e.g. legal scientists, political scientists, sociologists, mathematicians, and computer scientists - study law and public policies, which are portrayed here as complex systems. Today, research on law and public policies is rapidly developing at the international level, relying heavily on modeling that employs innovative methods for concrete implementation. Among the subject matter discussed, law as a network of evolving and interactive norms is now a prominent sphere of study. Similarly, public policies are now a topic in their own right, as policy can no longer be examined as a linear process; rather, its study should reflect the complexity of the networks of actors, norms and resources involved, as well as the uncertainty or weak predictability of their direct or indirect impacts. The book is divided into three maain parts: complexity faced by jurists, complexity in action and public policies, and complexity and networks. The main themes examined concern codification, governance, climate change, normative networks, health, water management, use-related conflicts, legal regime conflicts, and the use of indicators.
The Internet is quickly becoming a commonly used tool for business-customer interaction. Social media platforms that were once typically reserved for personal use are now becoming a vital part of a business's strategy. Maximizing Commerce and Marketing Strategies through Micro-Blogging examines the various methods and benefits of using micro-blogs within a business context, bringing together the best tools and tactics necessary to properly incorporate this approach. Highlighting current empirical research and insights from various disciplines, this book is an essential reference source for academics, graduate students, social media strategists, and business professionals interested in the positive use of social media in business environments.
The existence of financial identity theft in the United States, and its (gradual) spread to other areas of the world, increases the need to understand how identity theft occurs and how perpetrators of the crime manage to take advantage of developments within contemporary society. This book aims to provide such an understanding through an in-depth comparative analysis which illustrates how states, financial service providers, consumers, and others facilitate the occurrence of financial identity theft in the United States and the Netherlands.
What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.
AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.
This book intends to unite studies in different fields related to the development of the relations between logic, law and legal reasoning. Combining historical and philosophical studies on legal reasoning in Civil and Common Law, and on the often neglected Arabic and Talmudic traditions of jurisprudence, this project unites these areas with recent technical developments in computer science. This combination has resulted in renewed interest in deontic logic and logic of norms that stems from the interaction between artificial intelligence and law and their applications to these areas of logic. The book also aims to motivate and launch a more intense interaction between the historical and philosophical work of Arabic, Talmudic and European jurisprudence. The publication discusses new insights in the interaction between logic and law, and more precisely the study of different answers to the question: what role does logic play in legal reasoning? Varying perspectives include that of foundational studies (such as logical principles and frameworks) to applications, and historical perspectives.
Packed with projects and inspirational ideas you can do any time, any place, become an accomplished photographer while feeding your creativity with this guide that reveals what just what your smartphone camera is capable of. A camera phone is something we always have on us and creativity is something we all have in us but often we struggle to use them properly, feeling like we don't have the time, space or inclination to dedicate to it. Here, photography expert and bestselling author Jo Bradford supplies a collection of practical exercises that allow you to master the features on your smartphone camera to take incredible images and also help you to easily reconnect with your creative side. By encouraging you to try something different with your camera and seek out creative opportunities - from light painting to collage, image stacking to time-lapse landscapes - soon you will once again feel the satisfaction of thinking and acting creatively, with the added benefit of taking you from a snapper to an accomplished photographer with visual literacy. Smartphone photography is addictive with a tangible feel-good factor; it's time to embrace it and capture the moments that matter to you in all their glory.
The A to Z Facebook guide for users, marketers, and developers alike Facebook has more than a billion users worldwide. Whether you enjoy spending time on Facebook every day, use it to advertise and market your product, or develop Facebook apps, this go-to guide has something you need. Its six minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps. It's fully updated to cover the latest Facebook changes, including Graph Search, mobile apps, Timeline enhancements, and news feed redesign. * Facebook has more than one billion active users who share more than 30 billion pieces of content each month * More than 37 million brands have Pages on Facebook * This complete guide has been fully updated to cover Facebook's latest changes, including Graph Search, mobile apps for both users and Page managers, a redesigned news feed, and enhancements to the Timeline * Minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps Facebook All-in-One For Dummies, 2nd Edition is packed with helpful information, great ideas, and ways to help you get even more out of Facebook.
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.
The second volume of Ethics for a Digital Age contains a selection of research presented at the fifth and sixth Annual International Symposia on Digital Ethics hosted by the Center for Digital Ethics and Policy at Loyola University Chicago's School of Communication. Thematically organized around the most pressing ethical issues of the digital age from a professional (parts one and two) and a philosophical perspective (part three), the chapters of this volume offer the reader a window into some of the hot-button ethical issues facing a society where digital has become the new normal. Just as was the case in the first volume, this collection attempts to bridge applied and theoretical approaches to digital ethics. The case studies in this work are grounded in theory and the theoretical pieces are linked back to specific cases, reflecting the multi-methodological and multi-disciplinarian approach espoused by Loyola's Center of Digital Ethics and Policy during its eight years of existence. With contributions by experts from a variety of academic disciplines, this work will appeal to philosophers, communication scientists, and moral philosophers alike.
This book focuses on the legal regulation, mainly from an international law perspective, of autonomous artificial intelligence systems, of their creations, as well as of the interaction of human and artificial intelligence. It examines critical questions regarding both the ontology of autonomous AI systems and the legal implications: what constitutes an autonomous AI system and what are its unique characteristics? How do they interact with humans? What would be the implications of combined artificial and human intelligence? It also explores potentially the most important questions: what are the implications of these developments for collective security -from both a state-centered and a human perspective, as well as for legal systems? Why is international law better positioned to make such determinations and to create a universal framework for this new type of legal personality? How can the matrix of obligations and rights of this new legal personality be construed and what would be the repercussions for the international community? In order to address these questions, the book discusses cognitive aspects embedded in the framework of law, offering insights based on both de lege lata and de lege ferenda perspectives.
What does men's fashion say about contemporary masculinity? How do these notions operate in an increasingly digitized world? To answer these questions, author Joshua M. Bluteau combines theoretical analysis with vibrant narrative, exploring men's fashion in the online world of social media as well as the offline worlds of retail, production, and the catwalk. Is it time to reassess notions of masculinity? How do we construct ourselves in the online world, and what are the dangers of doing so? From the ateliers of London to the digital landscape of Instagram, Dressing Up re-examines the ways men dress, and the ways men post.
Technology has become the too-easy way to entertain ourselves and our children. For parents who are concerned about screen time during times of self-isolation and home schooling, and kids who wish their grown ups would play with them more, this easy-to-use, imaginative book has everything. From five-minute time fillers to large-scale party games, there's plenty of fun here to keep your family laughing: Sporty games and playground classics Activities for indoors, gardens, parks and beaches Memory and travel games, brain teasers and magic tricks No preparation or lengthy shopping trips needed for these creative ideas, just find your idea and go! This encyclopedia of joy is perfect for families big and small who want to have fun in the real world.
Do conceptions of the Rule of Law reflect timeless truths, or are they in fact contingent on a particular information and communications infrastructure - one that we are fast leaving behind? Hildebrandt has engineered a provocative encounter between law and networked digital technologies that cuts to the heart of the dilemma confronting legal institutions in a networked world.' - Julie E. Cohen, Georgetown University, US'Many contemporary authors are wrestling with two technological developments which will change our society beyond recognition: big data analytics and smart technologies. Few though understand, or can explain, these developments in the way Mireille Hildebrandt does. In ambitiously bringing together legal theory, psychology, social ethnology and of course smart agency and ambient intelligence, Hildebrandt gives the most complete study of these vitally important developments. Books are often described as 'must read' though few actually are; this one genuinely is.' - Andrew Murray, London School of Economics, UK This timely book tells the story of the smart technologies that reconstruct our world, by provoking their most salient functionality: the prediction and preemption of our day-to-day activities, preferences, health and credit risks, criminal intent and spending capacity. Mireille Hildebrandt claims that we are in transit between an information society and a data-driven society, which has far reaching consequences for the world we depend on. She highlights how the pervasive employment of machine-learning technologies that inform so-called 'data-driven agency' threaten privacy, identity, autonomy, non-discrimination, due process and the presumption of innocence. The author argues how smart technologies undermine, reconfigure and overrule the ends of the law in a constitutional democracy, jeopardizing law as an instrument of justice, legal certainty and the public good. Nevertheless, the book calls on lawyers, computer scientists and civil society not to reject smart technologies, explaining how further engaging these technologies may help to reinvent the effective protection of the Rule of Law. Academics and researchers interested in the philosophy of law and technology will find this book both discerning and relevant. Practitioners and policy makers in the areas of law, computer science and engineering will benefit from the insight into smart technologies and their impact today.
'The most important book of 2022.' Dr. Robert Malone Desmet's work on mass formation theory was brought to the world's attention on The Joe Rogan Experience and in major alternative news outlets around the globe. Read this book to get beyond the sound bites! In The Psychology of Totalitarianism, world-renowned Professor of Clinical Psychology Mattias Desmet deconstructs the societal conditions that allow collective hypnosis to take hold. By analysing the global pandemic, he identifies the phenomenon of 'mass formation' and illustrates how humanity is being forcibly, unconsciously led into a reality of technocratic totalitarianism, which aggressively excludes alternative views and relies on destructive groupthink, vilifying non-conformist thought as 'dissident.' Building on Hannah Arendt's essential work on totalitarianism, The Origins of Totalitarianism, Desmet offers a sharp critique of the cultural 'groupthink' that existed pre-pandemic but has steadily and inexorably advanced during the Covid crisis. He cautions against the dangers of our current societal landscape, media consumption, and reliance on manipulative technologies, offering simple solutions - both individual and collective - to prevent the willing sacrifice of our ability to think critically. The Psychology of Totalitarianism serves as an indispensable and fundamental guide to understanding this key moment in history. 'Mattias Desmet's [theory of mass formation hypnosis] is great. . . . Once I kind of started to look for it, I saw it everywhere.' Eric Clapton
This book provides a set of proposals for the new conceptual network required in order to establish civil law rules for a world permeated by Artificial Intelligence. These proposals are intended by their authors to push the debate on the new civil law forward. In spite of the natural conservatism of jurists, some innovative or even futuristic ideas are called for, also because the future, even this not-so-distant one, is difficult to foresee. Paradoxically, and unlike in the past, this lack of knowledge must not stop us from planning. If it does, humankind may, as some pessimists already claim, lose its chance to win the battle for control of the world. The rise and expansion of Artificial Intelligence and robotics in recent years has highlighted a pressing need to create a suitable legal framework for this new phenomenon. The debate on the subject, although wide-ranging and involving many new legal documents, is still quite general and preliminary in nature, although these preparatory works illustrate the very real need to develop appropriate new civil law arrangements. It is exactly the branch of private law where the necessity of these new rules appears to be the most imperative. Autonomous vehicles, medical robots, and expertise software raise fundamental questions on aspects of civil liability such as culpability; whereas the growth in popularity of automated, intelligent software systems for concluding contracts requires a new approach to many fundamental and deeply rooted elements of contract law, e.g. consciousness, intent, error, deception, interpretation of contracts and good faith. Ruling on these specific matters demands the identification and clarification of certain key points, which shall become the foundation for constructing AI/robot civil law.
It's not too late to get on the TikTok train! You may know TikTok as the home of the latest dance crazes and cute puppy videos. But do you know how to go about harnessing the power of its massive audience for more than showing off your own dance moves? And are you too late to the TikTok game to make an impact? In TikTok For Dummies, expert digital strategist and author Jesse Stay delivers an easy-to-read and robust discussion of how you can engage with TikTok's millions of users in a fun and productive way. He'll walk you through the steps of creating and securing an account, finding the best content to engage with, and creating your own videos that reflect you or your business in the best possible light. You'll discover how to: Install the app and create a profile that attracts followers and views Learn about the latest security issues and keep yourself safe on the platform Find the best content that's most relevant to you so you can engage with the community Create your own videos that resonate with the TikTok audience and have viral potential Perfect for anyone ready to dive into the world of TikTok, either for fun or for professional reasons, TikTok For Dummies is the easiest and most reliable way to go beyond the dances and learn the ins and outs of the popular app.
The newest generation of children is exposed to ubiquitous technology, more than any generation that preceded them. They are photographed with smartphones from the moment they're born, and begin interacting with screens at around four months old. Is this good news or bad news? A wonderful opportunity to connect around the world? Or the first step in creating a generation of addled screen zombies? The truth is, there's no road map for navigating this territory. But while many have been quick to declare this the dawn of a neurological and emotional crisis, solid science on the subject is surprisingly hard to come by. In this book, Anya Kamenetz--an expert on both education and technology, as well as a mother of two young children--takes a refreshingly practical look at the subject. Surveying hundreds of fellow parents on their practices and ideas, and cutting through a thicket of inconclusive studies and overblown claims, she hones a simple message, a riff on Michael Pollan's well-known "food rules": Enjoy Screens. Not too much. Mostly with others. This brief but powerful dictum forms the backbone of a philosophy that will help parents survive the ubiquity of technology in their children's lives, curb their panic, and create room for a happy, healthy family life. Kamenetz's sophisticated yet practical thinking is a necessary cure for an age of anxiety.
The proposed title intends to provide a comprehensive view of emerging paradigms of computer science. The initial chapters will introduce various emerging paradigms and discuss research challenges related to them. Then some of the chapters will focus on the research solutions to address the identified challenges. The last few chapters will provide a discussion on future research directions. |
![]() ![]() You may like...
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,319
Discovery Miles 43 190
Boundary Layer Flows - Theory…
Vallampati Ramachandra Prasad
Hardcover
R3,355
Discovery Miles 33 550
Real Perspective of Fourier Transforms…
Juan Manuel Velazquez Arcos
Hardcover
R3,324
Discovery Miles 33 240
The Nonlinear Schroedinger Equation
Nalan Antar, Ilkay Bakirtas
Hardcover
R3,347
Discovery Miles 33 470
|