0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (125)
  • R250 - R500 (455)
  • R500+ (1,356)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Chinese Social Media - Face, Sociality, and Civility (Hardcover): Shuhan Chen, Peter Lunt Chinese Social Media - Face, Sociality, and Civility (Hardcover)
Shuhan Chen, Peter Lunt
R2,535 Discovery Miles 25 350 Ships in 18 - 22 working days

What role does social media play in the lives of Chinese youths as they adapt to the rapid economic and social changes in modern China? This book examines the social media experiences and practices of young middle class Chinese who moved to Beijing to study and with the hope of work and participation in the possibilities of social and professional life. Through an analysis of their use of WeChat we explore their enthusiasm for self-expression online, their mediated social relations (guanxi) with family, friends, classmates and colleagues and their engagement with questions of online civility. The authors argue that sustaining personal and social relationships in the context of China's modernity, including its soft regulation of internet and social media, demands new norms of positivity and online civility. This is framed by several tensions: between emerging opportunities for freedom of expression and long-standing traditions of social identity and reputation such as face (lian and mianzi); between traditional obligations to parents (xiaoshun) and the desire for personal autonomy; and the pressure to constitute and govern the internet as a space of positive energy and civility in support of national Chinese sovereignty. The social media practices and deliberations of the participants reveal a fascinating amalgam of traditional Chinese culture and philosophy and reflections on tradition and collectivism combined with an embrace of Western-influenced ideas of positive psychology, self-expression, social networks and pragmatic social relations.

Dating, Mating, Relating - Personal Advertising and Modern Romance (Paperback): Pamela Anne Quiroz Dating, Mating, Relating - Personal Advertising and Modern Romance (Paperback)
Pamela Anne Quiroz
R864 Discovery Miles 8 640 Ships in 10 - 15 working days

To fit a changing society, the conventional ways we date and mate have given way to brand new methods. People nowadays marry later in life, choose not to marry at all, seek partners after divorce, outlive spouses, relocate to new areas and even endure pandemics. This signifies that we are moving toward larger dating pools, something made possible through public personal advertising. This text details personal advertising in print and digital media, as well as online dating services, speed dating, the use of mobile dating apps and other topics. Interviews reveal the appeal and limitations of personal advertising for meeting people. This book offers a window into the development of trust and relationships, as well as the increasing role technology plays in shaping how people meet and mate in the modern world.

Cybercrime - Protecting your business, your family and yourself (Paperback): Todd Wade Cybercrime - Protecting your business, your family and yourself (Paperback)
Todd Wade
R888 Discovery Miles 8 880 Ships in 18 - 22 working days

This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, falls victim to cybercrime. With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.

Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R3,085 Discovery Miles 30 850 Ships in 10 - 15 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Streaming and Copyright Law - An end-user perspective (Hardcover): Lasantha Ariyarathna Streaming and Copyright Law - An end-user perspective (Hardcover)
Lasantha Ariyarathna
R4,503 Discovery Miles 45 030 Ships in 10 - 15 working days

This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,790 Discovery Miles 27 900 Ships in 10 - 15 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

Use and Misuse of New Technologies - Contemporary Challenges in International and European Law (Hardcover, 1st ed. 2019): Elena... Use and Misuse of New Technologies - Contemporary Challenges in International and European Law (Hardcover, 1st ed. 2019)
Elena Carpanelli, Nicole Lazzerini
R4,742 Discovery Miles 47 420 Ships in 18 - 22 working days

The ever-increasing use of technology is challenging the current status of the law, bringing about new problems and questions. The book addresses this trend from the perspective of International law and European Union law and is divided into three main thematic sections. The first section focuses on the legal implications of the use of technology either for law enforcement purposes or in the context of military activities, and examines how this use adds a new dimension to perennial issues, such as the uneasy balance between security concerns and the protection of individual rights, and defining the exact scope of certain State obligations. In so doing, it takes into account a range of current and potential scenarios at the international, regional and domestic level, including the use of killer robots, databases, drones and technology in general to patrol borders, exchange information on criminal suspects, maintain public order, target suspected terrorists and conduct military activities. In turn, the second section examines the role of institutional and non-institutional actors in establishing substantive normative standards for the use of high-tech applications. In this respect, it focuses both on the role that European courts have played so far, and on how other actors' initiatives can contribute to the construction of a new legal framework for technology-related activities. Lastly, the third section has a two-fold focus: the first part investigates how the increasing reliance on technology is affecting traditional rules on international responsibility, and is challenging, in particular, the attribution of wrongful conduct to States and international organizations. The second part addresses issues of jurisdiction and justiciability. Given the scope of its coverage, this timely book addresses an important lacuna in the current legal scholarship, exploring some of the most recent applications of technology and the legal issues arising as a result. Readers will gain novel insights into the challenges posed to International law and European law by the growing reliance on technology, taking into account both its uses and misuses.

Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover): Ishaani Priyadarshini, Chase Cotton Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover)
Ishaani Priyadarshini, Chase Cotton
R3,634 Discovery Miles 36 340 Ships in 10 - 15 working days

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well-its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover): Edward M. Rafalski, Ross M. Mullner Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover)
Edward M. Rafalski, Ross M. Mullner
R3,515 Discovery Miles 35 150 Ships in 10 - 15 working days

The first COVID-19 case in the US was reported on January 20, 2020. As the first cases were being reported in the US, Washington State became a reliable source not just for hospital bed demand based on incidence and community spread but also for modeling the impact of skilled nursing facilities and assisted living facilities on hospital bed demand. Various hospital bed demand modeling efforts began in earnest across the United States in university settings, private consulting and health systems. Nationally, the University of Washington Institute of Health Metrics and Evaluation seemed to gain a footing and was adopted as a source for many states for its ability to predict the epidemiological curve by state, including the peak. This book therefore addresses a compelling need for documenting what has been learned by the academic and professional healthcare communities in healthcare analytics and disaster preparedness to this point in the pandemic. What is clear, at least from the US perspective, is that the healthcare system was unprepared and uncoordinated from an analytics perspective. Learning from this experience will only better prepare all healthcare systems and leaders for future crisis. Both prospectively, from a modeling perspective and retrospectively from a root cause analysis perspective, analytics provide clarity and help explain causation and data relationships. A more structured approach to teaching healthcare analytics to students, using the pandemic and the rich dataset that has been developed, provides a ready-made case study from which to learn and inform disaster planning and preparedness. The pandemic has strained the healthcare and public health systems. Researchers and practitioners must learn from this crisis to better prepare our processes for future pandemics, at minimum. Finally, government officials and policy makers can use this data to decide how best to assist the healthcare and public health systems in crisis.

Security Risk Models for Cyber Insurance (Paperback): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Paperback)
Caroline Baylon, Jose Vila, David Rios Insua
R1,542 Discovery Miles 15 420 Ships in 10 - 15 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Data Publics - Public Plurality in an Era of Data Determinacy (Paperback): Peter Moertenboeck, Helge Mooshammer Data Publics - Public Plurality in an Era of Data Determinacy (Paperback)
Peter Moertenboeck, Helge Mooshammer
R1,387 Discovery Miles 13 870 Ships in 10 - 15 working days

Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,784 Discovery Miles 37 840 Ships in 10 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,357 Discovery Miles 43 570 Ships in 10 - 15 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,461 Discovery Miles 24 610 Ships in 10 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,776 Discovery Miles 57 760 Ships in 10 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover): Tan Yigitcanlar, Nayomi Kankanamge Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover)
Tan Yigitcanlar, Nayomi Kankanamge
R3,100 Discovery Miles 31 000 Ships in 10 - 15 working days

The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,814 Discovery Miles 18 140 Ships in 10 - 15 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

Ransomware and Cybercrime (Paperback): Andrew Jenkinson Ransomware and Cybercrime (Paperback)
Andrew Jenkinson
R1,062 Discovery Miles 10 620 Ships in 10 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

The Philosophy of Online Manipulation (Hardcover): Fleur Jongepier, Michael Klenk The Philosophy of Online Manipulation (Hardcover)
Fleur Jongepier, Michael Klenk
R4,524 Discovery Miles 45 240 Ships in 10 - 15 working days

Are we being manipulated online? If so, is being manipulated by online technologies and algorithmic systems notably different from human forms of manipulation? And what is under threat exactly when people are manipulated online? This volume provides philosophical and conceptual depth to debates in digital ethics about online manipulation. The contributions explore the ramifications of our increasingly consequential interactions with online technologies such as online recommender systems, social media, user friendly design, microtargeting, default settings, gamification, and real time profiling. The authors in this volume address four broad and interconnected themes: What is the conceptual nature of online manipulation? And how, methodologically, should the concept be defined? Does online manipulation threaten autonomy, freedom, and meaning in life and if so, how? What are the epistemic, affective, and political harms and risks associated with online manipulation? What are legal and regulatory perspectives on online manipulation? This volume brings these various considerations together to offer philosophically robust answers to critical questions concerning our online interactions with one another and with autonomous systems. The Philosophy of Online Manipulation will be of interest to researchers and advanced students working in moral philosophy, digital ethics, philosophy of technology, and the ethics of manipulation.

Security Analytics - A Data Centric Approach to Information Security (Hardcover): Mehak Khurana, Shilpa Mahajan Security Analytics - A Data Centric Approach to Information Security (Hardcover)
Mehak Khurana, Shilpa Mahajan
R4,498 Discovery Miles 44 980 Ships in 10 - 15 working days

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

Context Blindness - Digital Technology and the Next Stage of Human Evolution (Paperback, New edition): Eva Berger Context Blindness - Digital Technology and the Next Stage of Human Evolution (Paperback, New edition)
Eva Berger
R891 Discovery Miles 8 910 Ships in 10 - 15 working days

Are people with autism giving us a glimpse into our future human condition? Could we be driving our own evolution with our technology and, in fact, be witnessing the beginning of the next stage of human evolution? The thesis at the center of this book is that since we have delegated the ability to read context to contextual technologies such as social media, location, and sensors, we have become context blind. Since context blindness-or caetextia in Latin-is one of the most dominant symptoms of autistic behavior at the highest levels of the spectrum, people with autism may indeed be giving us a peek into our human condition soon. We could be witnessing the beginning of the next stage of human evolution-Homo caetextus. With increasingly frequent floods and fires and unbearably hot summers, the human footprint on our planet should be evident to all, but it is not because we are context blind. We can now see and feel global warming. We are witnessing evolution in real-time and birthing our successor species. Our great-grandchildren may be a species very distinct from us. This book is a must for all communication and media studies courses dealing with digital technology, media, culture, and society. And a general reading public concerned with the polarized public sphere, difficulties in sustaining democratic governance, rampant conspiracies, and phenomena such as cancel culture and the need for trigger warnings and safe spaces, will find it enlightening.

Digital Activism and the Global Middle Class - Generation Hashtag (Hardcover): Lukas Schlogl Digital Activism and the Global Middle Class - Generation Hashtag (Hardcover)
Lukas Schlogl
R4,497 Discovery Miles 44 970 Ships in 10 - 15 working days

This book examines the causes of a growing wave of digital activism across developing countries, arguing that it is driven by social change, rather than technological advancement alone Beginning with an investigation into the modernisation of 'middle-income countries' and its ramifications for political culture, the book examines large-scale social media protest during political controversies in Indonesia It departs from a narrow 'digital divide' framing whereby Internet access produces Internet activism and introduces the concepts of 'digital self-expression' and of 'middle-class struggles' to capture the value-stratified nature of political engagement in the online sphere Drawing on a blend of 'big-data' text analyses, representative opinion research and socioeconomic household analyses, a rich picture of the determinants of digital activism emerges This truly cross-disciplinary book will appeal particularly to students and scholars in Political Science, Sociology, International Development, and Communication, but also to anyone eager to learn about political activism, social transformation, and new media from a global perspective

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,499 Discovery Miles 34 990 Ships in 10 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Development and Planning - Essays in…
Jagdish Bhagwati, Richard Eckhaus Hardcover R4,654 Discovery Miles 46 540
The Humanitarian Machine - Reflections…
Diego Fernandez Otegui, Daryl Yoder-Bontrager Paperback R1,154 Discovery Miles 11 540
Routledge Library Editions: Development…
Various Hardcover R29,859 Discovery Miles 298 590
Climate Change Governance in Asia
Kuei-Tien Chou, Koichi Hasegawa, … Hardcover R4,498 Discovery Miles 44 980
Disasters, Gender and Access to…
Nahid Rezwana Hardcover R4,488 Discovery Miles 44 880
Routledge Library Editions: Development…
Various Hardcover R58,682 Discovery Miles 586 820
Land In South Africa - Contested…
Khwezi Mabasa, Bulelwa Mabasa Paperback R1,838 Discovery Miles 18 380
Routledge Handbook of Latin America and…
Beatriz Bustos, Gustavo Garcia-Lopez, … Hardcover R6,634 Discovery Miles 66 340
Routledge Library Editions: Development…
Various Hardcover R18,007 Discovery Miles 180 070
Reframing the Urban Challenge in Africa…
Ntombini Marrengane, Sylvia Croese Paperback R1,359 Discovery Miles 13 590

 

Partners