Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful. Contributors to this volume present case studies and theoretical approaches from their experience with applications for digital technology in classrooms, museums, archives, in the field and with the general public. Offering potential answers to the issues of access and control from a variety of perspectives, the volume acknowledges that access is subject to competing interests of a variety of stakeholders. Museums, universities, archives, and some communities all place claims on how data can or cannot be shared through digital initiatives and, given the collaborative nature of most digital humanities projects, those in the field need to be cognizant of the various and often competing interests and rights that shape the nature of access and how it is controlled. Access and Control in Digital Humanities will be of interest to researchers, academics and graduate students working in a variety of fields, including digital humanities, library and information science, history, museum and heritage studies, conservation, English literature, geography and legal studies.
Pathology & Technology is the first comprehensive look at "technopathologies." Since the days of the telegraph, electric communication technologies have been associated with causing or worsening mental and physical illnesses. Today, news reports warn of Pokemon Go deaths and women made vulnerable to sexual assault from wearing headphones. Drawing on an archive of hundreds of cases found across news, entertainment, and other sources over 150 years, this book investigates the intersection of technology and disease through original cultural historiography, focus groups, and discourse analysis, documenting a previously unexplored phenomenon in communication and media. Technopathologies occur with new and old media, the book argues, and are ultimately about people-not machines. They help define users as normal or abnormal, in ways that often align with existing social stereotypes. Courses on technological history, medical humanities, science and technology studies, and medical history will find much here to debate, in a style written to appeal to scholarly as well as popular readers.
This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.
Africa 2.0 provides an important history of how two technologies - mobile calling and internet - were made available to millions of sub-Saharan Africans, and the impact they have had on their lives. The book deals with the political challenges of liberalisation and privatisation that needed to be in place in order for these technologies to be built. It analyses how the mobile phone fundamentally changed communications in sub-Saharan Africa and the ways Africans have made these technologies part of their lives, opening up a very different future. The book offers a critical examination of the impact these technologies have had on development practices, and the key role development actors played in accelerating regulatory reform, fibre roll-out and mobile money. Southwood shows how corruption in the industry is a prism through which patronage relationships in government can be understood, and argues that the arrival of a start-up ecosystem in the region has the potential to change this. A vital overview of the changes of the last three decades, Africa 2.0 examines the transformative effects of mobile and internet technologies, and the very different future they have opened out for sub-Saharan Africa. -- .
Typically utilized by larger corporations, social media marketing and strategy is lacking in small and medium-sized nonprofit organizations. Although these organizations are beginning to incorporate this form of online communication, there is still a need to understand the best practices and proper tools to enhance an organization's presence on the web. Cases on Strategic Social Media Utilization in the Nonprofit Sector brings together cases and chapters in order to examine both the practical and theoretical components of creating an online social community for nonprofit organizations. The technologies discussed in this publication provide organizations with the necessary cost-effective tools for fundraising, marketing, and civic engagement. This publication is an essential reference source for practitioners, academicians, researchers, and advanced-level students interested in learning how to effectively use social media technologies in the nonprofit sector.
Innovative examination of augmentation technologies in terms of technical, social, and ethical considerations Usable as a supplemental text for a variety of courses, and also of interest to researchers and professionals in fields including: technical communication, digital communication, UX design, information technology, informatics, human factors, artificial intelligence, ethics, philosophy of technology, and sociology of technology First major work to combine technological, ethical, social, and rhetorical perspectives on human augmentation Additional cases and research material available at the authors' Fabric of Digital Life research database at https://fabricofdigitallife.com/
i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications
Music videos play a critical role in our age of ubiquitous streaming digital media. They project the personas and visions of musical artists; they stand at the cutting edge of developments in popular culture; and they fuse and revise multiple frames of reference, from dance to high fashion to cult movies and television shows to Internet memes. Above all, music videos are laboratories for experimenting with new forms of audiovisual expression. The Rhythm Image explores all these dimensions. The book analyzes, in depth, recent music videos for artists ranging from pop superstar The Weeknd to independent women artists like FKA twigs and Dawn Richard. The music videos discussed in this book all treat the traditional themes of popular music: sex and romance, money and fame, and the lived experiences of race and gender. But they twist these themes in strange and unexpected ways, in order to reflect our entanglement with a digital world of social media, data gathering, and 24/7 demands upon our attention.
This book presents a study of the COVID-19 pandemic using computational social scientific analysis that draws from, and employs, statistics and simulations. Combining approaches in crisis management, risk assessment and mathematical modelling, the work also draws from the philosophy of sacrifice and futurology. It makes an original contribution to the important issue of the stability of society by highlighting two significant factors: the COVID-19 crisis as a catalyst for change and the rise of AI and Big Data in managing society. It also emphasizes the nature and importance of sacrifices and the role of politics in the distribution of sacrifices. The book considers the treatment of AI and Big Data and their use to both "good" and "bad" ends, exposing the inevitability of these tools being used. Relevant to both policymakers and social scientists interested in the influence of AI and Big Data on the structure of society, the book re-evaluates the ways we think of lifestyles, economic systems and the balance of power in tandem with digital transformation.
Forensic Document Examination in the 21st Century covers the latest technology and techniques providing a complete resource on contemporary issues and methods in forensic document examination. Forensic document examiners provide their findings as expert testimony in court. Due to rapid changes in technology, including digital documents, printing and photocopying capabilities, and more, there is a great need for this up-to-date reference. The examination of documents can include comparison of handwriting or hand-printing; detection of alterations or photocopier and computer manipulation; restoration or decipherment of erased and obliterated writing; visualization of latent impressions; the identification of printing processes; and differentiation of inks. Computer-generated documents are prevalent, and electronically-captured signatures are becoming more widespread, meaning the knowledge of advances in technology and adoption of new validated techniques and methods of document examination are crucial to the reliability of forensic opinions. Forensic Document Examination in the 21st Century includes the latest research on the subject and with contributions from leading experts on their various areas of expertise. The book will be a welcome addition to the literature and support the foundational basis for methods and procedures for use it expert testimony in court, serving as a resource for forensic document examiners, trainees, and those in the criminal and legal communities who use the services of expert document examiners and witnesses
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
The Internet of Things as an emerging global Internet-based information archit- ture facilitating the exchange of goods and services is gradually developing. While the technology of the Internet of Things is still being discussed and created, the legal framework should be established before the Internet of Things is fully operable, in order to allow for an efective introduction of the new information architecture. If a self-regulatory approach is to be adopted to provide a legal framework for the Internet of Things, and this seems preferable, rulemakers can draw on experiences from the current regime of Internet governance. In the near future, mainly businesses will operate in the Internet of Things. Civil society is only expected to make use of the Internet of Things, as it now does of the Internet, at a later stage (e.g. for healthcare). The Internet of Things will have an impact in various areas. The regulatory fra- work must provide for provisions ensuring the security of the structure as well as the privacy of its users. Furthermore, legal barriers that may stand in the way of the coming into operation of the Internet of Things will have to be considered. However, the Internet of Things will also have positive efects in diferent felds, such as the inclusion of developing countries in global trade, the use of search engines to the beneft of civil society, combating product counterfeiting, tackling environmental concerns, improving health conditions, securing food supply and monitoring compliance with labor standards.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
There are multiple aspects of electronically-mediated communication that influence and have strong implications for legal practice. This volume focuses on three major aspects of mediated communication through social media. Part I examines social media and the legal community. It explores how this has influenced professional legal discourse and practice, contributing to the popularity of internet-based legal research, counselling and assistance through online services offering explanations of law, preparing documents, providing evidence, and even encouraging electronically mediated alternative dispute resolution. Part II looks at the use of social media for client empowerment. It examines how it has taken legal practice from a formal and distinct business to one that is publicly informative and accessible. Part III discusses the way forward, exploring the opportunities and challenges. Based on cases from legal practice in diverse jurisdictions, the book highlights key issues as well as implications for legal practitioners on the one hand, and clients on the other. The book will be a valuable reference for international scholars in law and other socio-legal studies, discourse analysis, and practitioners in legal and alternative dispute resolution contexts.
Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI.
Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book
We are so used to living in a media-saturated world that we do not notice just how much damage is being done to us daily by the images we see and the articles and posts we read. If you are often anxious or find it hard to sleep, or you regularly want to give up on your fellow human beings, the reason may come down to the relentless influence of the modern media. How Modern Media Destroys Our Minds is a guide for navigating the media today. The book encourages the reader to consider the many peculiarities of the modern media: its excessive focus on scandal, its emphasis on novelty, its capacity to breed envy and self-hatred, its high-minded defence of itself, its ever shorter attention span and its obsession with fame. The book teaches us how to liberate ourselves from the media, in order to achieve calm and a more generous, original and imaginative state of mind. We are shown how to redress the balance and emerge with a stronger, more positive outlook on life.
What do philosophy and computer science have in common? It turns out, quite a lot! In providing an introduction to computer science (using Python), Daniel Lim presents in this book key philosophical issues, ranging from external world skepticism to the existence of God to the problem of induction. These issues, and others, are introduced through the use of critical computational concepts, ranging from image manipulation to recursive programming to elementary machine learning techniques. In illuminating some of the overlapping conceptual spaces of computer science and philosophy, Lim teaches the reader fundamental programming skills and also allows her to develop the critical thinking skills essential for examining some of the enduring questions of philosophy. Key Features Teaches readers actual computer programming, not merely ideas about computers Includes fun programming projects (like digital image manipulation and Game of Life simulation), allowing the reader to develop the ability to write larger computer programs that require decomposition, abstraction, and algorithmic thinking Uses computational concepts to introduce, clarify, and develop a variety of philosophical issues Covers various aspects of machine learning and relates them to philosophical issues involving science and induction as well as to ethical issues Provides a framework to critically analyze arguments in classic and contemporary philosophical debates
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally. |
You may like...
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,015
Discovery Miles 30 150
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
Legal Challenges of Big Data
Joe Cannataci, Valeria Falce, …
Hardcover
R3,496
Discovery Miles 34 960
|