![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > General
This book focuses on the legal regulation, mainly from an international law perspective, of autonomous artificial intelligence systems, of their creations, as well as of the interaction of human and artificial intelligence. It examines critical questions regarding both the ontology of autonomous AI systems and the legal implications: what constitutes an autonomous AI system and what are its unique characteristics? How do they interact with humans? What would be the implications of combined artificial and human intelligence? It also explores potentially the most important questions: what are the implications of these developments for collective security -from both a state-centered and a human perspective, as well as for legal systems? Why is international law better positioned to make such determinations and to create a universal framework for this new type of legal personality? How can the matrix of obligations and rights of this new legal personality be construed and what would be the repercussions for the international community? In order to address these questions, the book discusses cognitive aspects embedded in the framework of law, offering insights based on both de lege lata and de lege ferenda perspectives.
Social Media Analytics and Practical Applications: The Change to the Competition Landscape provides a framework that allows you to understand and analyze the impact of social media in various industries. It illustrates how social media analytics can help firms build transformational strategies and cope with the challenges of social media technology. By focusing on the relationship between social media and other technology models, such as wisdom of crowds, healthcare, fintech and blockchain, machine learning methods, and 5G, this book is able to provide applications used to understand and analyze the impact of social media. Various industries are called out and illustrate how social media analytics can help firms build transformational strategies and at the same time cope with the challenges that are part of the landscape. The book discusses how social media is a driving force in shaping consumer behavior and spurring innovations by embracing and directly engaging with consumers on social media platforms. By closely reflecting on emerging practices, the book shows how to take advantage of recent advancements and how business operations are being revolutionized. Social Media Analytics and Practical Applications is written for academicians and professionals involved in social media and social media analytics.
This book provides a set of proposals for the new conceptual network required in order to establish civil law rules for a world permeated by Artificial Intelligence. These proposals are intended by their authors to push the debate on the new civil law forward. In spite of the natural conservatism of jurists, some innovative or even futuristic ideas are called for, also because the future, even this not-so-distant one, is difficult to foresee. Paradoxically, and unlike in the past, this lack of knowledge must not stop us from planning. If it does, humankind may, as some pessimists already claim, lose its chance to win the battle for control of the world. The rise and expansion of Artificial Intelligence and robotics in recent years has highlighted a pressing need to create a suitable legal framework for this new phenomenon. The debate on the subject, although wide-ranging and involving many new legal documents, is still quite general and preliminary in nature, although these preparatory works illustrate the very real need to develop appropriate new civil law arrangements. It is exactly the branch of private law where the necessity of these new rules appears to be the most imperative. Autonomous vehicles, medical robots, and expertise software raise fundamental questions on aspects of civil liability such as culpability; whereas the growth in popularity of automated, intelligent software systems for concluding contracts requires a new approach to many fundamental and deeply rooted elements of contract law, e.g. consciousness, intent, error, deception, interpretation of contracts and good faith. Ruling on these specific matters demands the identification and clarification of certain key points, which shall become the foundation for constructing AI/robot civil law.
The second volume of Ethics for a Digital Age contains a selection of research presented at the fifth and sixth Annual International Symposia on Digital Ethics hosted by the Center for Digital Ethics and Policy at Loyola University Chicago's School of Communication. Thematically organized around the most pressing ethical issues of the digital age from a professional (parts one and two) and a philosophical perspective (part three), the chapters of this volume offer the reader a window into some of the hot-button ethical issues facing a society where digital has become the new normal. Just as was the case in the first volume, this collection attempts to bridge applied and theoretical approaches to digital ethics. The case studies in this work are grounded in theory and the theoretical pieces are linked back to specific cases, reflecting the multi-methodological and multi-disciplinarian approach espoused by Loyola's Center of Digital Ethics and Policy during its eight years of existence. With contributions by experts from a variety of academic disciplines, this work will appeal to philosophers, communication scientists, and moral philosophers alike.
What does men's fashion say about contemporary masculinity? How do these notions operate in an increasingly digitized world? To answer these questions, author Joshua M. Bluteau combines theoretical analysis with vibrant narrative, exploring men's fashion in the online world of social media as well as the offline worlds of retail, production, and the catwalk. Is it time to reassess notions of masculinity? How do we construct ourselves in the online world, and what are the dangers of doing so? From the ateliers of London to the digital landscape of Instagram, Dressing Up re-examines the ways men dress, and the ways men post.
Technology has become the too-easy way to entertain ourselves and our children. For parents who are concerned about screen time during times of self-isolation and home schooling, and kids who wish their grown ups would play with them more, this easy-to-use, imaginative book has everything. From five-minute time fillers to large-scale party games, there's plenty of fun here to keep your family laughing: Sporty games and playground classics Activities for indoors, gardens, parks and beaches Memory and travel games, brain teasers and magic tricks No preparation or lengthy shopping trips needed for these creative ideas, just find your idea and go! This encyclopedia of joy is perfect for families big and small who want to have fun in the real world.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
The newest generation of children is exposed to ubiquitous technology, more than any generation that preceded them. They are photographed with smartphones from the moment they're born, and begin interacting with screens at around four months old. Is this good news or bad news? A wonderful opportunity to connect around the world? Or the first step in creating a generation of addled screen zombies? The truth is, there's no road map for navigating this territory. But while many have been quick to declare this the dawn of a neurological and emotional crisis, solid science on the subject is surprisingly hard to come by. In this book, Anya Kamenetz--an expert on both education and technology, as well as a mother of two young children--takes a refreshingly practical look at the subject. Surveying hundreds of fellow parents on their practices and ideas, and cutting through a thicket of inconclusive studies and overblown claims, she hones a simple message, a riff on Michael Pollan's well-known "food rules": Enjoy Screens. Not too much. Mostly with others. This brief but powerful dictum forms the backbone of a philosophy that will help parents survive the ubiquity of technology in their children's lives, curb their panic, and create room for a happy, healthy family life. Kamenetz's sophisticated yet practical thinking is a necessary cure for an age of anxiety.
The proposed title intends to provide a comprehensive view of emerging paradigms of computer science. The initial chapters will introduce various emerging paradigms and discuss research challenges related to them. Then some of the chapters will focus on the research solutions to address the identified challenges. The last few chapters will provide a discussion on future research directions.
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
This timely book provides an extensive overview and analysis of the law and regulation as it applies to the technology and uses of Artificial Intelligence (AI). It examines the human and ethical concerns associated with the technology, the history of AI and AI in commercial contexts. Written by outstanding lawyers, technologists and other professionals, this book will help readers acquire an understanding of the taxonomy of AI, the legal rules that apply to AI and the way AI has been utilised in various commercial contexts. Key features include: explanation of the technology and practical legal issues relating to the use of AI exploration of AI in the traditional legal categories; including contract and tort law chapters written by procurement, legaltech, algorithm auditing and other professionals use cases from the main industries utilising the technology, such as financial services, real estate and insurance. Artificial Intelligence will help to further readers' engagement with AI and enable them to ask themselves the right questions while doing so. It will prove a crucial reference point for all lawyers, policy makers and academics with an interest in the interaction between law and AI, and to any lawyer with clients that use or consider using AI in their business.
Pathology & Technology is the first comprehensive look at "technopathologies." Since the days of the telegraph, electric communication technologies have been associated with causing or worsening mental and physical illnesses. Today, news reports warn of Pokemon Go deaths and women made vulnerable to sexual assault from wearing headphones. Drawing on an archive of hundreds of cases found across news, entertainment, and other sources over 150 years, this book investigates the intersection of technology and disease through original cultural historiography, focus groups, and discourse analysis, documenting a previously unexplored phenomenon in communication and media. Technopathologies occur with new and old media, the book argues, and are ultimately about people-not machines. They help define users as normal or abnormal, in ways that often align with existing social stereotypes. Courses on technological history, medical humanities, science and technology studies, and medical history will find much here to debate, in a style written to appeal to scholarly as well as popular readers.
This book contains 24 research papers by 30 expert academicians in communication science and new media technologies. Within the scope of their expertise, the contributors determine situations about today's digital society, analyze research methods, and make suggestions and observations about the digital future. Particular attention is given to digital games, artificial intelligence, digital media, digital public relations, social media, the effect of the digital on academic production process, journalism and artificial intelligence, post-pandemic cinema education, marketing and digitality, the effect of women on 3D printer technologies, media literacy and family, digital citizenship, data mining, preschool and primary school children and their relationship with technology, digital footprint, and the relationship of child audiences with semantic digital technology.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful. Contributors to this volume present case studies and theoretical approaches from their experience with applications for digital technology in classrooms, museums, archives, in the field and with the general public. Offering potential answers to the issues of access and control from a variety of perspectives, the volume acknowledges that access is subject to competing interests of a variety of stakeholders. Museums, universities, archives, and some communities all place claims on how data can or cannot be shared through digital initiatives and, given the collaborative nature of most digital humanities projects, those in the field need to be cognizant of the various and often competing interests and rights that shape the nature of access and how it is controlled. Access and Control in Digital Humanities will be of interest to researchers, academics and graduate students working in a variety of fields, including digital humanities, library and information science, history, museum and heritage studies, conservation, English literature, geography and legal studies.
Typically utilized by larger corporations, social media marketing and strategy is lacking in small and medium-sized nonprofit organizations. Although these organizations are beginning to incorporate this form of online communication, there is still a need to understand the best practices and proper tools to enhance an organization's presence on the web. Cases on Strategic Social Media Utilization in the Nonprofit Sector brings together cases and chapters in order to examine both the practical and theoretical components of creating an online social community for nonprofit organizations. The technologies discussed in this publication provide organizations with the necessary cost-effective tools for fundraising, marketing, and civic engagement. This publication is an essential reference source for practitioners, academicians, researchers, and advanced-level students interested in learning how to effectively use social media technologies in the nonprofit sector.
The Internet of Things as an emerging global Internet-based information archit- ture facilitating the exchange of goods and services is gradually developing. While the technology of the Internet of Things is still being discussed and created, the legal framework should be established before the Internet of Things is fully operable, in order to allow for an efective introduction of the new information architecture. If a self-regulatory approach is to be adopted to provide a legal framework for the Internet of Things, and this seems preferable, rulemakers can draw on experiences from the current regime of Internet governance. In the near future, mainly businesses will operate in the Internet of Things. Civil society is only expected to make use of the Internet of Things, as it now does of the Internet, at a later stage (e.g. for healthcare). The Internet of Things will have an impact in various areas. The regulatory fra- work must provide for provisions ensuring the security of the structure as well as the privacy of its users. Furthermore, legal barriers that may stand in the way of the coming into operation of the Internet of Things will have to be considered. However, the Internet of Things will also have positive efects in diferent felds, such as the inclusion of developing countries in global trade, the use of search engines to the beneft of civil society, combating product counterfeiting, tackling environmental concerns, improving health conditions, securing food supply and monitoring compliance with labor standards.
As an educator and researcher, I have tried to create awareness to pupils, teachers and families through seminars and workshops since 2012. I believe that Internet and social media are actually precious and useful. If individuals use digital environments consciously, they can even be counted as educational institutions. Unfortunately, most of the pupils, teachers and parents had great concerns regarding digital environments, which decreased after they obtained information about "digital citizenship". So, I decided to write a book not only for teachers or parents who guided for safety at digital environments, but also for youths to understand digital citizenship. The book is written in the hope that it would be helpful for anyone who hold concerns about digital environments.
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: - full provision of Web-based material on almost every topic covered - provision of additional on-line material, such as videos, source code, and labs - coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs) Key areas covered include: - Fundamentals of Encryption - Public Key Encryption - Symmetric Key Encryption - Hashing Methods - Key Exchange Methods - Digital Certificates and Authentication - Tunneling - Crypto Cracking - Light-weight Cryptography - Blockchain - Zero-knowledge Proofs This book provides extensive support through the associated website of: http://asecuritysite.com/encryption
|
![]() ![]() You may like...
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,792
Discovery Miles 57 920
Research Handbook on the Law of Virtual…
Woodrow Barfield, Marc J. Blitz
Paperback
R1,715
Discovery Miles 17 150
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R6,442
Discovery Miles 64 420
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R691
Discovery Miles 6 910
|