![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The ever-increasing use of technology is challenging the current status of the law, bringing about new problems and questions. The book addresses this trend from the perspective of International law and European Union law and is divided into three main thematic sections. The first section focuses on the legal implications of the use of technology either for law enforcement purposes or in the context of military activities, and examines how this use adds a new dimension to perennial issues, such as the uneasy balance between security concerns and the protection of individual rights, and defining the exact scope of certain State obligations. In so doing, it takes into account a range of current and potential scenarios at the international, regional and domestic level, including the use of killer robots, databases, drones and technology in general to patrol borders, exchange information on criminal suspects, maintain public order, target suspected terrorists and conduct military activities. In turn, the second section examines the role of institutional and non-institutional actors in establishing substantive normative standards for the use of high-tech applications. In this respect, it focuses both on the role that European courts have played so far, and on how other actors' initiatives can contribute to the construction of a new legal framework for technology-related activities. Lastly, the third section has a two-fold focus: the first part investigates how the increasing reliance on technology is affecting traditional rules on international responsibility, and is challenging, in particular, the attribution of wrongful conduct to States and international organizations. The second part addresses issues of jurisdiction and justiciability. Given the scope of its coverage, this timely book addresses an important lacuna in the current legal scholarship, exploring some of the most recent applications of technology and the legal issues arising as a result. Readers will gain novel insights into the challenges posed to International law and European law by the growing reliance on technology, taking into account both its uses and misuses.
This book brings a rich and nuanced analysis of selfie culture. It shows how selfies gain their meanings, illustrates different selfie practices, explores how selfies make us feel and why they have the power to make us feel anything, and unpacks how selfie practices and selfie related norms have changed or might change in the future. As humans, we have a long history of being drawn to images, of communicating visually, and being enchanted with (our own) faces. Every day we share hundreds of millions of photos on Facebook, Instagram and Snapchat. Selfies are continually and passionately talked about. People take vast amounts of selfies, and generate more attention than most other social media content. But selfies are persistently attacked as being unworthy of all of this attention: they lack artistic merit; indicate a pathological fascination with one's self; or attribute to dangerously stupid behaviour. This book explores the social, cultural and technological context surrounding selfies and their subsequent meaning.
As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
There are multiple aspects of electronically-mediated communication that influence and have strong implications for legal practice. This volume focuses on three major aspects of mediated communication through social media. Part I examines social media and the legal community. It explores how this has influenced professional legal discourse and practice, contributing to the popularity of internet-based legal research, counselling and assistance through online services offering explanations of law, preparing documents, providing evidence, and even encouraging electronically mediated alternative dispute resolution. Part II looks at the use of social media for client empowerment. It examines how it has taken legal practice from a formal and distinct business to one that is publicly informative and accessible. Part III discusses the way forward, exploring the opportunities and challenges. Based on cases from legal practice in diverse jurisdictions, the book highlights key issues as well as implications for legal practitioners on the one hand, and clients on the other. The book will be a valuable reference for international scholars in law and other socio-legal studies, discourse analysis, and practitioners in legal and alternative dispute resolution contexts.
Computer software and its structures, devices and processes are woven into our everyday life. Their significance is not just technical: the algorithms, programming languages, abstractions and metadata that millions of people rely on every day have far-reaching implications for the way we understand the underlying dynamics of contemporary societies. In this innovative new book, software studies theorist Matthew Fuller examines how the introduction and expansion of computational systems into areas ranging from urban planning and state surveillance to games and voting systems are transforming our understanding of politics, culture and aesthetics in the twenty-first century. Combining historical insight and a deep understanding of the technology powering modern software systems with a powerful critical perspective, this book opens up new ways of understanding the fundamental infrastructures of contemporary life, economies, entertainment and warfare. In so doing Fuller shows that everyone must learn how to be a geek , as the seemingly opaque processes and structures of modern computer and software technology have a significance that no-one can afford to ignore. This powerful and engaging book will be of interest to everyone interested in a critical understanding of the political and cultural ramifications of digital media and computing in the modern world.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
Crypto-Finance, Law and Regulation investigates whether crypto-finance will cause a paradigm shift in regulation from a centralised model to a model based on distributed consensus. This book explores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform the financial markets. It examines three components of the financial market - technology, finance, and the law - and shows how their interrelationship dictates the structure of a crypto-market. It focuses on regulators' enforcement policies and their jurisdiction over crypto-finance operators and participants. The book also discusses the latest developments in crypto-finance, and the advantages and disadvantages of crypto-currency as an alternative payment product. It also investigates how such a decentralised crypto-finance system can provide access to finance, promote a shared economy, and allow access to justice. By exploring the law, regulation and governance of crypto-finance from a national, regional and global viewpoint, the book provides a fascinating and comprehensive overview of this important topic and will appeal to students, scholars and practitioners interested in regulation, finance and the law.
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market is disrupting consolidated legal acquisitions, such as classical internal market categories, as well as the applicability of consumer protection, data protection, and labour and competition law. It argues that the collaborative economy will, sooner or later, require some sort of regulatory intervention from the European Union. This regulatory intervention, far from stifling innovation, will benefit online platforms, service providers and users by providing them with a clearer and more predictable environment in which to conduct their business. Although primarily intended for academics, this book also appeals to a wider readership, including, but not limited to, national and international regulators, private firms and lobbies as well as online platforms, consumer associations and trade unions.
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.
Everyday technology is constantly changing, and it's hard to keep up with it at times. What is all this talk about automation, STEM, analytics and super-computers, and how will it really affect my daily life at work and in the home? This book is a simple guide to everyday technology and analytics written in plain language. It starts with explaining how computer networks are increasing in speed so fast that we can do more in less time than ever before. It explains the analytical jargon in plain English and why robotics in the home will be aided by the new technology of the quantum computer. Richly furnished with over 200 illustrations, photos and with minimal equations, A Simple Guide to Technology and Analytics is a ready reference book for those times when you don't really understand the technology and analytics being talked about. It explains complicated topics such as automated character recognition in a very simple way, and has simple exercises for the reader to fully understand the technology (with answers at the back). It even has explanations on how home appliances work, which are very useful the next time you go shopping for a microwave or TV. Even the Glossary at the back can be used as a quick look-up explanation for those on the go.
Exploring startup journalism and digital media platform trends in China, Taiwan and Southeast Asia, this book offers a practical insight into how to launch and run successful news operations as digitisation spreads through the region. Drawing from a range of case studies of news and journalism startups, including Malaysiakini, Hong Kong Free Press, The News Lens of Taiwan, Thailand's The Standard, Ciwei Gongshe of China, Indonesia's IDN Media, Sabay of Cambodia and Frontier Myanmar, this book provides tips on how to launch a news media startup, how to find funding and how to sustain and scale the enterprise. Blending a theoretical approach with core business and newsgathering expertise, the author offers an engaging overview of contemporary entrepreneurial concepts and their vital relationship in finding new markets for journalism today. Entrepreneurial journalism in greater China and Southeast Asia is an invaluable resource for both students and professionals interested in new media, startups and the Asian media market.
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know - how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security, all kind of network attacks, intention of an attacker, identification of attack, detection, its analysis, incident response, ethical issues, botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security, tools, Digital forensics. Differentiation among network security, computer forensics, network forensics and botnet forensics. Discussion on various cybercrimes, attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication, Computer Science and Computer Engineering.
Are people with autism giving us a glimpse into our future human condition? Could we be driving our own evolution with our technology and, in fact, be witnessing the beginning of the next stage of human evolution? The thesis at the center of this book is that since we have delegated the ability to read context to contextual technologies such as social media, location, and sensors, we have become context blind. Since context blindness-or caetextia in Latin-is one of the most dominant symptoms of autistic behavior at the highest levels of the spectrum, people with autism may indeed be giving us a peek into our human condition soon. We could be witnessing the beginning of the next stage of human evolution-Homo caetextus. With increasingly frequent floods and fires and unbearably hot summers, the human footprint on our planet should be evident to all, but it is not because we are context blind. We can now see and feel global warming. We are witnessing evolution in real-time and birthing our successor species. Our great-grandchildren may be a species very distinct from us. This book is a must for all communication and media studies courses dealing with digital technology, media, culture, and society. And a general reading public concerned with the polarized public sphere, difficulties in sustaining democratic governance, rampant conspiracies, and phenomena such as cancel culture and the need for trigger warnings and safe spaces, will find it enlightening.
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, "Social Engineering Penetration Testing" gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of "Social Engineering Penetration Testing "show you
hands-on techniques they have used at RandomStorm to provide
clients with valuable results that make a real difference to the
security of their businesses. You will learn about the differences
between social engineering pen tests lasting anywhere from a few
days to several months. The book shows you how to use widely
available open-source tools to conduct your pen tests, then walks
you through the practical steps to improve defense measures in
response to test results.
This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital technology and its business models have shaped public policy and charts its future course. In this vital text for legislators and policymakers, Andrea Monti and Raymond Wacks draw on several case studies to analyse the changing nature of national security and revisit the traditional idea of the sovereignty of the State. They highlight some of the limitations of the conventional understanding of public policy, national security, and the rule of law to reveal the role of digital technology as an enabler as well as discriminator in governance and social disorder. Further, the chapters in the book explore the tenuous balance between individual freedom and national security; the key role of data protection in safeguarding digital data; Big Tech's appropriation of national security policy; the debate relating to datagathering technologies and encryption; and offers an unsettling answer to the question 'what is a leak?' A stimulating read, this key text will be of immense interest to scholars of politics, cyberculture, and national security, as well as to policy analysts, lawyers, and journalists.
Can security automata (robots and AIs) make moral decisions to apply force on humans correctly? If they can make such decisions, ought they be used to do so? Will security automata increase or decrease aggregate risk to humans? What regulation is appropriate? Addressing these important issues this book examines the political and technical challenges of the robotic use of force. The book presents accessible practical examples of the 'machine ethics' technology likely to be installed in military and police robots and also in civilian robots with everyday security functions such as childcare. By examining how machines can pass 'reasonable person' tests to demonstrate measurable levels of moral competence and display the ability to determine the 'spirit' as well as the 'letter of the law', the author builds upon existing research to define conditions under which robotic force can and ought to be used to enhance human security. The scope of the book is thus far broader than 'shoot to kill' decisions by autonomous weapons, and should attract readers from the fields of ethics, politics, and legal, military and international affairs. Researchers in artificial intelligence and robotics will also find it useful.
This book offers a comprehensive scholarly overview of Reddit, one of the most popular and least studied social platforms of the early 21st century. The book inspires new ways of thinking about Reddit, considering it from multiple perspectives: through a historical lens, as a site where identity is forged, as a democracy, as a community, and as a news aggregator and distributor. By bringing theories from computer-mediated communication, communication studies, and sociology to bear on original, large-scale observational analyses of Reddit's communities, this book provides a uniquely comprehensive overview of the platform's first 15 years. Understanding Reddit will help us make sense of how rapidly growing communities function in an era of mass online anonymity. Serving both as a primer on how social behavior on Reddit plays out, and as a way of locating it within multiple theoretical traditions, the book will offer important insights to scholars and students in the disciplines of communication, media studies, information science, internet and emerging media studies, and sociology.
Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.
This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.
Highlights cultural differences in terms of Quality of Life Provides a guide to the current field of global well-being and to future research Suggests improvements in Quality of Life Recognizes the presence of cultural differences resulting from social status, age, gender, class, race, and ethnicity Offers background information for governments, professionals, and policy makers |
You may like...
The Genres of Late Antique Christian…
Fotini Hadjittofi, Anna Lefteratou
Hardcover
R3,867
Discovery Miles 38 670
Human Factors in Software Development…
Saqib Saeed, Imran Sarwar Bajwa, …
Hardcover
R4,951
Discovery Miles 49 510
The Geological Interpretation of Well…
M.H. Rider, Martin Kennedy
Paperback
R1,573
Discovery Miles 15 730
|