![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market is disrupting consolidated legal acquisitions, such as classical internal market categories, as well as the applicability of consumer protection, data protection, and labour and competition law. It argues that the collaborative economy will, sooner or later, require some sort of regulatory intervention from the European Union. This regulatory intervention, far from stifling innovation, will benefit online platforms, service providers and users by providing them with a clearer and more predictable environment in which to conduct their business. Although primarily intended for academics, this book also appeals to a wider readership, including, but not limited to, national and international regulators, private firms and lobbies as well as online platforms, consumer associations and trade unions.
There are multiple aspects of electronically-mediated communication that influence and have strong implications for legal practice. This volume focuses on three major aspects of mediated communication through social media. Part I examines social media and the legal community. It explores how this has influenced professional legal discourse and practice, contributing to the popularity of internet-based legal research, counselling and assistance through online services offering explanations of law, preparing documents, providing evidence, and even encouraging electronically mediated alternative dispute resolution. Part II looks at the use of social media for client empowerment. It examines how it has taken legal practice from a formal and distinct business to one that is publicly informative and accessible. Part III discusses the way forward, exploring the opportunities and challenges. Based on cases from legal practice in diverse jurisdictions, the book highlights key issues as well as implications for legal practitioners on the one hand, and clients on the other. The book will be a valuable reference for international scholars in law and other socio-legal studies, discourse analysis, and practitioners in legal and alternative dispute resolution contexts.
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations
Blockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community of computer scientists and cryptologists, to mainstream phenomena that are now considered powerful game changers for many industries. This book explores and assesses real-world use cases and case studies on blockchain and related technologies. The studies describe the respective applications and address how these technologies have been deployed, the rationale behind their application, and finally, their outcomes. The book shares a wealth of experiences and lessons learned regarding financial markets, energy, SCM, healthcare, law and compliance. Given its scope, it is chiefly intended for academics and practitioners who want to learn more about blockchain applications.
Feeling guilty about not networking enough? Stop! You can learn how to network effectively without attending networking events, collecting business cards, or getting a lot of LinkedIn followers. How? By learning how to Connect the Dots. Written by Inga Carboni, Ph.D., Connect the Dots is a fun, fast-paced, and fact-based book for working professionals seeking to take the next step in their careers. The truth is that networking is not about managing impressions or projecting your personal brand. Effective networkers build, nurture, and leverage relationships, real relationships built on genuine connection. When done correctly, networking isn't sleazy or manipulative. Instead, it's empowering - for you, for all the people you know, and for all the people they know. Connect the Dots: How to Build, Nurture, and Leverage Your Network to Achieve Your Personal and Professional Goals offers a combination of personal stories, business anecdotes, self-assessments, exercises, and concrete guidelines grounded in the latest scientific research. Connect the Dots focuses on developing your personal power and leadership skills by creating effective networks and networking effectively. This book is designed to benefit everyone, from young professionals to senior managers to human resource professionals to C-suite executives. Unleash the power of your network by learning how to connect the dots to make your network work for you.
This book examines how identities associated with cycling are evoked, narrated and negotiated in a media context dominated by digital environments. Arguing that the nature of identity is being impacted by the changing nature of the material and semiotic resources available for making meaning, the author introduces an approach to exploring such identity positioning through the interrelated frameworks of Systemic Functional Linguistics and Multimodal Analysis, and illustrates how this happens in practice. The book is divided into three parts, each of which focuses on a different aspect of identity and media environment. Part I considers celebrity identities in the conventional media of print and television. Part II investigates community and leisure / sporting identity through an online cycling forum, while Part III examines corporate identity realised through corporate websites, consumer reviews and Youtube channels. This unique volume will appeal to students and scholars of discourse analysis, applied linguistics and the world of cycling.
This book contains 24 research papers by 30 expert academicians in communication science and new media technologies. Within the scope of their expertise, the contributors determine situations about today's digital society, analyze research methods, and make suggestions and observations about the digital future. Particular attention is given to digital games, artificial intelligence, digital media, digital public relations, social media, the effect of the digital on academic production process, journalism and artificial intelligence, post-pandemic cinema education, marketing and digitality, the effect of women on 3D printer technologies, media literacy and family, digital citizenship, data mining, preschool and primary school children and their relationship with technology, digital footprint, and the relationship of child audiences with semantic digital technology.
Social Media Analytics and Practical Applications: The Change to the Competition Landscape provides a framework that allows you to understand and analyze the impact of social media in various industries. It illustrates how social media analytics can help firms build transformational strategies and cope with the challenges of social media technology. By focusing on the relationship between social media and other technology models, such as wisdom of crowds, healthcare, fintech and blockchain, machine learning methods, and 5G, this book is able to provide applications used to understand and analyze the impact of social media. Various industries are called out and illustrate how social media analytics can help firms build transformational strategies and at the same time cope with the challenges that are part of the landscape. The book discusses how social media is a driving force in shaping consumer behavior and spurring innovations by embracing and directly engaging with consumers on social media platforms. By closely reflecting on emerging practices, the book shows how to take advantage of recent advancements and how business operations are being revolutionized. Social Media Analytics and Practical Applications is written for academicians and professionals involved in social media and social media analytics.
Exploring startup journalism and digital media platform trends in China, Taiwan and Southeast Asia, this book offers a practical insight into how to launch and run successful news operations as digitisation spreads through the region. Drawing from a range of case studies of news and journalism startups, including Malaysiakini, Hong Kong Free Press, The News Lens of Taiwan, Thailand's The Standard, Ciwei Gongshe of China, Indonesia's IDN Media, Sabay of Cambodia and Frontier Myanmar, this book provides tips on how to launch a news media startup, how to find funding and how to sustain and scale the enterprise. Blending a theoretical approach with core business and newsgathering expertise, the author offers an engaging overview of contemporary entrepreneurial concepts and their vital relationship in finding new markets for journalism today. Entrepreneurial journalism in greater China and Southeast Asia is an invaluable resource for both students and professionals interested in new media, startups and the Asian media market.
Exploring startup journalism and digital media platform trends in China, Taiwan and Southeast Asia, this book offers a practical insight into how to launch and run successful news operations as digitisation spreads through the region. Drawing from a range of case studies of news and journalism startups, including Malaysiakini, Hong Kong Free Press, The News Lens of Taiwan, Thailand's The Standard, Ciwei Gongshe of China, Indonesia's IDN Media, Sabay of Cambodia and Frontier Myanmar, this book provides tips on how to launch a news media startup, how to find funding and how to sustain and scale the enterprise. Blending a theoretical approach with core business and newsgathering expertise, the author offers an engaging overview of contemporary entrepreneurial concepts and their vital relationship in finding new markets for journalism today. Entrepreneurial journalism in greater China and Southeast Asia is an invaluable resource for both students and professionals interested in new media, startups and the Asian media market.
This book offers a comprehensive scholarly overview of Reddit, one of the most popular and least studied social platforms of the early 21st century. The book inspires new ways of thinking about Reddit, considering it from multiple perspectives: through a historical lens, as a site where identity is forged, as a democracy, as a community, and as a news aggregator and distributor. By bringing theories from computer-mediated communication, communication studies, and sociology to bear on original, large-scale observational analyses of Reddit's communities, this book provides a uniquely comprehensive overview of the platform's first 15 years. Understanding Reddit will help us make sense of how rapidly growing communities function in an era of mass online anonymity. Serving both as a primer on how social behavior on Reddit plays out, and as a way of locating it within multiple theoretical traditions, the book will offer important insights to scholars and students in the disciplines of communication, media studies, information science, internet and emerging media studies, and sociology.
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the compliances. It sets a unique mechanism for monitoring controls and a dashboard to maintain the level of compliances. It aims at integration and automation to reduce the fatigue of frequent compliance audits and build a standard baseline of controls to comply with the applicable standards and regulations to which the organization is subject. It is a perfect reference book for professionals in the field of IT governance, risk management, and compliance. The book also illustrates the concepts with charts, checklists, and flow diagrams to enable management to map controls with compliances.
This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.
New Communication in the Post-Pandemic Era: Media, Education, and Information is a collection of contemporary post-positivist research and cultural/interpretative studies that explores new areas, redefines old concepts, and proposes rare discourses over communication theories, and portrays a new scene upon the edge of the global crisis by COVID-19 pandemic, which might lead to an ultimate paradigm shift pushing the post-industrial societies to a new complex of multi-layered structural regressions. Covering a broad range of multidisciplinary topics, -including consumer behavior, advertising strategies, public relations, blockchain technologies, new education channels, labor economics, disaster politics, health engagement, corporate communication, information systems, streaming services, music reception, reality television, animation, filmmaking, new personality models, and brand-new aesthetic styles- this manuscript of selected essays and articles is optimally designed for academics, researchers, educators, media professionals, entrepreneurs, executives, organizers, scientists, artists, public relations specialists, and students who intend to enhance their understanding of how the structures of 'New Communication' resist, accept, or repurpose the new historical conditions of the global crisis through media, education, and information.
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.
Learn how to switch off and find calm - from the New York Times bestselling author of A World Without Email 'Digital Minimalism is the Marie Kondo of technology' Evening Standard 'An eloquent, powerful and enjoyably practical guide to cutting back on screen time' The Times 'An urgent call to action for anyone serious about being in command of their own life' Ryan Holiday 'What a timely and useful book' Naomi Alderman, author of The Power Do you find yourself endlessly scrolling through social media or the news while your anxiety rises? Are you feeling frazzled after a long day of endless video calls? In this timely book, professor Cal Newport shows us how to pair back digital distractions and live a more meaningful life with less technology. By following a 'digital declutter' process, you'll learn to: * Rethink your relationship with social media * Prioritize 'high bandwidth' conversations over low quality text chains * Rediscover the pleasures of the offline world Take back control from your devices and find calm amongst the chaos with Digital Minimalism.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
This book enables students to grasp the holistic enterprise of social media as it pertains to social, legal, marketing, and management issues. The book also helps students better understand the research process in social media scholarship and make connections with academic research and applied practice in sport studies.
As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.
In today's society where the development of digital technologies is emerging, it is important to take into consideration the development of individual wellbeing when it comes to engagement with the digital environment. This book represents one of the first scientific attempts to understand how the rapid deployment of digital technologies and their uptake by society have modified our relationships with ourselves, each other, and our environment. As a result, our individual and social wellbeing are now intimately connected with the state of our information environment and the digital technologies that mediate our interaction with it, which poses pressing ethical questions concerning the impact of digital technologies on our wellbeing that need to be addressed.
Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture. |
You may like...
Policies, Practices, and Protocols for…
Abir El Shaban, Reima Abobaker
Hardcover
R5,333
Discovery Miles 53 330
Artificial Intelligence and Inclusive…
Jeremy Knox, Yu-Chen Wang, …
Hardcover
R3,987
Discovery Miles 39 870
|