0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (148)
  • R250 - R500 (529)
  • R500+ (1,579)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Selfies - Why We Love (and Hate) Them (Paperback): Katrin Tiidenberg Selfies - Why We Love (and Hate) Them (Paperback)
Katrin Tiidenberg
R542 Discovery Miles 5 420 Ships in 9 - 15 working days

This book brings a rich and nuanced analysis of selfie culture. It shows how selfies gain their meanings, illustrates different selfie practices, explores how selfies make us feel and why they have the power to make us feel anything, and unpacks how selfie practices and selfie related norms have changed or might change in the future. As humans, we have a long history of being drawn to images, of communicating visually, and being enchanted with (our own) faces. Every day we share hundreds of millions of photos on Facebook, Instagram and Snapchat. Selfies are continually and passionately talked about. People take vast amounts of selfies, and generate more attention than most other social media content. But selfies are persistently attacked as being unworthy of all of this attention: they lack artistic merit; indicate a pathological fascination with one's self; or attribute to dangerously stupid behaviour. This book explores the social, cultural and technological context surrounding selfies and their subsequent meaning.

Digital Detox - The Politics of Disconnecting (Paperback): Trine Syvertsen Digital Detox - The Politics of Disconnecting (Paperback)
Trine Syvertsen
R515 Discovery Miles 5 150 Ships in 9 - 15 working days

Social media and smartphones are criticised for being addictive, destroying personal relationships, undermining productivity, and invading privacy. In this book, Trine Syvertsen explores the phenomenon of digital detox: users taking a break from digital media or adopting measures to limit smartphone and social media use. Based on studies, documents, media texts and interviews with media users, Syvertsen discusses how media industries intensify the quest for attention, how companies and governments team up to get everybody online, and how the main responsibility for managing online risks and problems are placed on the users' shoulders. She provides a rich account of how users reduce their online engagement through time-limitations, restrictions on smartphone use, productivity apps, and use of analogue media. Syvertsen shows how digital detoxing has much in common with other forms of self-help such as mindfulness, decluttering and simple living and places digital detox within a culture of self-optimisation. But digital detox is also about sustaining face-to-face conversations, better work-life-balance, a deeper connection with nature and more meaningful interpersonal relationships. With a wealth of examples, analyses and stories, Digital Detox is a valuable guide to why digital detox and disconnection has become a topic, how it is practised, what it says about the state of media industries and how people express resistance in the 21st century.

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Hardcover)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R3,509 Discovery Miles 35 090 Ships in 12 - 17 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

Get TikTok Famous Fast (Paperback): Will Eagle Get TikTok Famous Fast (Paperback)
Will Eagle
R399 R326 Discovery Miles 3 260 Save R73 (18%) Ships in 9 - 15 working days

Grab your phone and your friends and start making fame-worthy content today! Get TikTok Famous Fast is a bite-sized guide to building your own empire on TikTok and using it as a launchpad for your personal brand and media career. Top TikTok stars and industry insiders provide their tips on how be a hit, how to make your content the best possible, how to tap into the latest memes and trends, how to edit and - most importantly - how to grow your following.

The Twittering Machine - How Capitalism Stole Our Social Life (Paperback): Richard Seymour The Twittering Machine - How Capitalism Stole Our Social Life (Paperback)
Richard Seymour 1
R285 R223 Discovery Miles 2 230 Save R62 (22%) Ships in 5 - 10 working days

In surrealist artist Paul Klee's The Twittering Machine, the bird-song of a diabolical machine acts as bait to lure humankind into a pit of damnation. Leading political writer and broadcaster Richard Seymour argues that this is a chilling metaphor for our relationship with social media. Former social media executives tell us that the system is an addiction-machine. We are users, waiting for our next hit as we like, comment and share. We write to the machine as individuals, but it responds by aggregating our fantasies, desires and frailties into data, and returning them to us as a commodity experience. Through journalism, psychoanalytic reflection and insights from users, developers, security experts and others, Seymour probes the human side of the machine, asking what we're getting out of it, and what we're getting into.

Facebook, Twitter, & Instagram For Seniors For Dummies, 3rd Edition (Paperback, 3rd Edition): M. Collier Facebook, Twitter, & Instagram For Seniors For Dummies, 3rd Edition (Paperback, 3rd Edition)
M. Collier
R684 R491 Discovery Miles 4 910 Save R193 (28%) Ships in 9 - 15 working days

Enjoy the top social media sites with ease and security Done correctly, social media is a way to connect friends, family, and the world while still maintaining security and privacy. Facebook, Twitter, & Instagram For Seniors For Dummies, 3rd Edition offers advice on how to enjoy the three most popular social media options while avoiding worry about who sees what you share. Written by social media expert Marsha Collier, this book walks you through establishing accounts, making connections, and sharing content including photos and video. You learn the settings to adjust on each platform to maintain privacy and filter out the content you don't want. This book also explains the subtle art of avoiding or blocking people on social platforms without jeopardizing your real-world relationships! Take control of what you share Connect with others Take and share your best pictures Use social media as a news source Social media sites are great fun once you learn how to cut through the clutter--and this book shows you how!

LinkedIn Profile Optimization For Dummies, 2nd Edition (Paperback, 2nd Edition): DW Serdula LinkedIn Profile Optimization For Dummies, 2nd Edition (Paperback, 2nd Edition)
DW Serdula
R631 R456 Discovery Miles 4 560 Save R175 (28%) Ships in 9 - 15 working days

Give your LinkedIn profile the makeover it deserves--and get the attention you deserve Look at your profile: you know it could be a little better. Too many LinkedIn users are just posting a basic resume and hoping for the offers to come flooding in, missing out on the incredible opportunity the platform offers to properly showcase their talents, products, and services to 610 million professionals in over 200 countries. LinkedIn is way more than a resume tool--to display your professional past and present--it's also your career future and personal brand. Used to its fullest extent, it helps you demonstrate the unique value and culture you provide, the skills and aspirations that make you different, to get the outcomes you truly want. But how's it done? Profile branding expert Donna Serdula pioneered the concept of LinkedIn Profile Optimization and through her Website, LinkedIn-Makever.com, has helped over 5000 professionals use LinkedIn to achieve increased success. In this guide she applies that experience to help you use all of LinkedIn's capabilities to meet your goals, whether they be job search, reputation management, or sales--including how to: Create a memorable, successful profile Optimize personal keywords Showcase your experience, accomplishments, and unique value Use LinkedIn features to grow your network and more You never get a second chance to make a first impression--and people are Googling you right now: Get a fresh online look and get results!

Digital Learning: The Key Concepts (Hardcover, 2nd edition): Frank Rennie, Keith Smyth Digital Learning: The Key Concepts (Hardcover, 2nd edition)
Frank Rennie, Keith Smyth
R3,603 Discovery Miles 36 030 Ships in 12 - 17 working days

The new edition of Digital Learning: The Key Concepts is the perfect reference for anyone seeking to navigate the myriad of named concepts, approaches, issues and technologies associated with digital learning. Key terms are explained succinctly, making this book ideal to dip into for a quick answer, or to read from cover-to-cover, in order to gain a mastery of how digital concepts fit within the world of education. Fully updated to include important developments in digital practice and technology in education over the last ten years, this book takes the reader from A to Z through a range of relevant topics including: * Course design * Digital scholarship * Learning design * Open education * Personal learning environments * Social media and social networking. Ideal as an introductory guide, or as a reference book for ongoing referral, this quick-to-use and comprehensive guide is fully crossreferenced and complete with suggestions for further reading and exploration, making it an essential resource for anyone looking to extend their understanding of digital practices, techniques and pedagogic concepts.

Fraud Auditing Using CAATT - A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud (Paperback): Shaun... Fraud Auditing Using CAATT - A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud (Paperback)
Shaun Aghili
R1,347 Discovery Miles 13 470 Ships in 12 - 17 working days

This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also includes information about audit test red flags to watch out for, a list of recommended controls to help prevent future fraud related incidents, as well as step-by-step demonstrations of a number of common audit tests using IDEA (R) as a CAATT tool.

Confronting Cyberespionage Under International Law (Hardcover): Oguz  Kaan Pehlivan Confronting Cyberespionage Under International Law (Hardcover)
Oguz Kaan Pehlivan
R3,459 Discovery Miles 34 590 Ships in 12 - 17 working days

We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.

Security Management - A Critical Thinking Approach (Paperback): Michael Land, Truett Ricks, Bobby Ricks Security Management - A Critical Thinking Approach (Paperback)
Michael Land, Truett Ricks, Bobby Ricks
R1,908 Discovery Miles 19 080 Ships in 12 - 17 working days

Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.

The Struggle for Hegemony in Pakistan - Fear, Desire and Revolutionary Horizons (Paperback): Aasim Sajjad Akhtar The Struggle for Hegemony in Pakistan - Fear, Desire and Revolutionary Horizons (Paperback)
Aasim Sajjad Akhtar
R524 Discovery Miles 5 240 Ships in 12 - 17 working days

'A major analysis of our world's political crisis' - Joel Wainwright The collapse of neoliberal hegemony in the western world following the financial crash of 2007-8 and subsequent rise of right-wing authoritarian personalities has been described as a crisis of 'the political' in western societies. But the crisis must be seen as global, rather than focusing on the west alone. Pakistan is experiencing rapid financialisation and rapacious capture of natural resources, overseen by the country's military establishment and state bureaucracy. Under their watch, trading and manufacturing interests, property developers and a plethora of mafias have monopolised the provision of basic needs like housing, water and food, whilst also feeding conspicuous consumption by a captive middle-class. Aasim Sajjad-Akhtar explores neoliberal Pakistan, looking at digital technology in enhancing mass surveillance, commodification and atomisation, as well as resistance to the state and capital. Presenting a new interpretation of our global political-economic moment, he argues for an emancipatory political horizon embodied by the 'classless' subject.

How to Market Your Book - A book marketing manual for both self-published and traditionally published authors (Paperback): Lynn... How to Market Your Book - A book marketing manual for both self-published and traditionally published authors (Paperback)
Lynn Morrison
R198 Discovery Miles 1 980 Ships in 12 - 17 working days

These days, regardless of whether a book is self-published or traditionally published, there will be an expectation on the author to take an active role in marketing their book. Based on a series of interviews with successful authors from both sides of the publishing divide and both sides of the pond, Lynn lays out in detail the marketing strategies that have worked for them, alongside an explanation of how book marketing works based on her own long-standing career as a senior marketing exec. From developing social media tactics and arranging promotional events to handling press and trying to start viral campaigns, Lynn offers practical advice designed to help an author find a book marketing strategy that best works for them, based on their personal strengths and budget.

The Practical Guide to HIPAA Privacy and Security Compliance (Hardcover, 2nd edition): Rebecca Herold, Kevin Beaver The Practical Guide to HIPAA Privacy and Security Compliance (Hardcover, 2nd edition)
Rebecca Herold, Kevin Beaver
R3,670 Discovery Miles 36 700 Ships in 12 - 17 working days

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.

Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Hardcover): Sara Smyth Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Hardcover)
Sara Smyth
R4,054 Discovery Miles 40 540 Ships in 12 - 17 working days

The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.

Security Software Development - Assessing and Managing Security Risks (Paperback): Cissp Douglas A. Ashbaugh Security Software Development - Assessing and Managing Security Risks (Paperback)
Cissp Douglas A. Ashbaugh
R1,779 Discovery Miles 17 790 Ships in 12 - 17 working days

Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. The latest line of defense is to build security features into software as it is being developed. Drawing from the author's extensive experience as a developer, Secure Software Development: Assessing and Managing Security Risks illustrates how software application security can be best, and most cost-effectively, achieved when developers monitor and regulate risks early on, integrating assessment and management into the development life cycle. This book identifies the two primary reasons for inadequate security safeguards: Development teams are not sufficiently trained to identify risks; and developers falsely believe that pre-existing perimeter security controls are adequate to protect newer software. Examining current trends, as well as problems that have plagued software security for more than a decade, this useful guide: Outlines and compares various techniques to assess, identify, and manage security risks and vulnerabilities, with step-by-step instruction on how to execute each approach Explains the fundamental terms related to the security process Elaborates on the pros and cons of each method, phase by phase, to help readers select the one that best suits their needs Despite decades of extraordinary growth in software development, many open-source, government, regulatory, and industry organizations have been slow to adopt new application safety controls, hesitant to take on the added expense. This book improves understanding of the security environment and the need for safety measures. It shows readers how to analyze relevant threats to their applications and then implement time- and money-saving techniques

Managing Your Professional Identity Online - A Guide for Faculty, Staff, and Administrators (Hardcover): Kathryn E. Linder Managing Your Professional Identity Online - A Guide for Faculty, Staff, and Administrators (Hardcover)
Kathryn E. Linder; Foreword by Laura Pasquini
R3,913 Discovery Miles 39 130 Ships in 12 - 17 working days

In higher education, professional online identities have become increasingly important. A rightly worded tweet can cause an academic blog post to go viral. A wrongly worded tweet can get a professor fired. Regular news items in The Chronicle of Higher Education and Inside Higher Ed provide evidence that reputations are both built and crushed via online platforms. Ironically, given the importance of digital identities to job searches, the promotion and distribution of scholarly work, pedagogical innovation, and many other components of an academic life, higher education professionals receive little to no training about how to best represent themselves in a digital space. Managing Your Professional Identity Online: A Guide for Higher Education fills this gap by offering higher education professionals the information and guidance they need to: craft strong online biographical statements for a range of platforms; prioritize where and how they want to represent themselves online in a professional capacity; intentionally and purposefully create an effective brand for their professional identity online; develop online profiles that are consistent, professional, accurate, organized, of good quality, and representative of their academic lives; regularly update and maintain an online presence; post appropriately in a range of online platforms and environments; and< successfully promote their professional accomplishments. Managing Your Professional Identity Online is practical and action-oriented. In addition to offering a range of case studies demonstrating concrete examples of effective practices, the book is built around activities, templates, worksheets, rubrics, and bonus materials that walk readers through a step-by-step guide of how to design, build, and maintain professional online identities.

Likewar the Weaponization of Social Media (Paperback): P.W. Singer, Emerson Brooking Likewar the Weaponization of Social Media (Paperback)
P.W. Singer, Emerson Brooking 1
R463 R358 Discovery Miles 3 580 Save R105 (23%) Ships in 10 - 15 working days

Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer and Emerson Brooking tackle the mind-bending questions that arise when war goes online and the online world goes to war. They explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts? Delving into the web's darkest corners, we meet the unexpected warriors of social media, such as the rapper turned jihadist PR czar and the Russian hipsters who wage unceasing infowars against the West. Finally, looking to the crucial years ahead, LikeWar outlines a radical new paradigm for understanding and defending against the unprecedented threats of our networked world.

Twitter For Dummies 3e (Paperback, 3rd Edition): L Fitton Twitter For Dummies 3e (Paperback, 3rd Edition)
L Fitton
R552 R394 Discovery Miles 3 940 Save R158 (29%) Ships in 9 - 15 working days

A fully updated new edition of the fun and easy guide to getting up and running on Twitter With more than half a billion registered users, Twitter continues to grow by leaps and bounds. This handy guide, from one of the first marketers to discover the power of Twitter, covers all the new features. It explains all the nuts and bolts, how to make good connections, and why and how Twitter can benefit you and your business. * Fully updated to cover all the latest features and changes to Twitter * Written by a Twitter pioneer who was one of the first marketers to fully tap into Twitter's business applications * Ideal for beginners, whether they want to use Twitter to stay in touch with friends or to market their products and services * Explains how to incorporate Twitter into other social media and how to use third-party tools to improve and simplify Twitter

Purposeful Communication in a Digital Age - Speaking for Success (Hardcover, 2nd edition): Arthur Koch, Jason Schmitt Purposeful Communication in a Digital Age - Speaking for Success (Hardcover, 2nd edition)
Arthur Koch, Jason Schmitt
R4,294 Discovery Miles 42 940 Ships in 9 - 15 working days

In recent years, the process and outlet for public speaking has grown with digital progressions such as TED talks and Facebook Live. Purposeful Communication in a Digital Age, 2nd Edition, provides a practical, step-by-step approach to developing and delivering effective speeches. Offering supplementary articles, case studies, and interviews with key leaders within the text and online, this is an all-in-one resource for the traditional, online, or hybrid classroom. The new edition devotes focus to presenting in the digital world, addressing both traditional and contemporary forms of presentation, and specifically directs students on seeking out credible sources when conducting research. Its eResource features video speech examples, classroom exercises, an instructor manual, and a quiz bank.

The Patentability of Software - Software as Mathematics (Hardcover): Anton Hughes The Patentability of Software - Software as Mathematics (Hardcover)
Anton Hughes
R3,614 Discovery Miles 36 140 Ships in 12 - 17 working days

This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.

Learning to Save the Future - Rethinking Education and Work in an Era of Digital Capitalism (Paperback): Alexander Means Learning to Save the Future - Rethinking Education and Work in an Era of Digital Capitalism (Paperback)
Alexander Means
R1,142 Discovery Miles 11 420 Ships in 12 - 17 working days

Mainstream economists and Silicon Valley entrepreneurs claim that unfettered capitalism and digital technology can unlock a future of unbounded prosperity, create endless high paying jobs, and solve the world's vast social and ecological problems. Realizing this future of abundance purportedly rests in the transformation of human potential into innovative human capital through new 21st century forms of education. In this new book Alex Means challenges this view. Stagnating economic growth and runaway inequality have emerged as the 'normal' condition of advanced capitalism. Simultaneously, there has been a worldwide educational expansion and a growing surplus of college-educated workers relative to their demand in the world economy. This surplus is complicated by an emerging digital revolution driven by artificial intelligence and machine learning that generates worker displacing innovations and immaterial forms of labor and valorization. Learning to Save the Future argues that rather than fostering mass intellectuality, educational development is being constrained by a value structure subordinated to 21st century capitalism and technology. Human capabilities from creativity, design, engineering, to communication are conceived narrowly as human capital, valued in terms of economic productivity and growth. Similarly, global problems such as the erosion of employment and climate change are conceived as educational problems to be addressed through business solutions and the digitalization of education. This thought-provoking account provides a cognitive map of this condition, offering alternatives through critical analyses of education and political economy, technology and labor, creativity and value, power and ecology.

University Libraries and Space in the Digital World (Paperback): Graham Walton University Libraries and Space in the Digital World (Paperback)
Graham Walton; Edited by Graham Matthews
R1,152 Discovery Miles 11 520 Ships in 12 - 17 working days

This timely book addresses physical space in university libraries in the digital age. It considers the history of the use of space, integrates case studies from around the world with theoretical perspectives, explores recent developments including new build and refurbishment. With users at the forefront, chapters cover different aspects of learning and research support provision, shared services, and evaluation of space initiatives. Library staff requirements and green issues are outlined. The book also looks to the future, identifying the key strategic issues and trends that will influence and shape future library spaces. The authors are international, senior university library managers and academics who provide a range of views and approaches and experience of individual projects and initiatives.

Humanities Data Analysis - Case Studies with Python (Hardcover): Folgert Karsdorp, Mike Kestemont, Allen Riddell Humanities Data Analysis - Case Studies with Python (Hardcover)
Folgert Karsdorp, Mike Kestemont, Allen Riddell
R1,040 Discovery Miles 10 400 Ships in 12 - 17 working days

A practical guide to data-intensive humanities research using the Python programming language The use of quantitative methods in the humanities and related social sciences has increased considerably in recent years, allowing researchers to discover patterns in a vast range of source materials. Despite this growth, there are few resources addressed to students and scholars who wish to take advantage of these powerful tools. Humanities Data Analysis offers the first intermediate-level guide to quantitative data analysis for humanities students and scholars using the Python programming language. This practical textbook, which assumes a basic knowledge of Python, teaches readers the necessary skills for conducting humanities research in the rapidly developing digital environment. The book begins with an overview of the place of data science in the humanities, and proceeds to cover data carpentry: the essential techniques for gathering, cleaning, representing, and transforming textual and tabular data. Then, drawing from real-world, publicly available data sets that cover a variety of scholarly domains, the book delves into detailed case studies. Focusing on textual data analysis, the authors explore such diverse topics as network analysis, genre theory, onomastics, literacy, author attribution, mapping, stylometry, topic modeling, and time series analysis. Exercises and resources for further reading are provided at the end of each chapter. An ideal resource for humanities students and scholars aiming to take their Python skills to the next level, Humanities Data Analysis illustrates the benefits that quantitative methods can bring to complex research questions. Appropriate for advanced undergraduates, graduate students, and scholars with a basic knowledge of Python Applicable to many humanities disciplines, including history, literature, and sociology Offers real-world case studies using publicly available data sets Provides exercises at the end of each chapter for students to test acquired skills Emphasizes visual storytelling via data visualizations

Ethics and Security Automata - Policy and Technical Challenges of the Robotic Use of Force (Hardcover): Sean Welsh Ethics and Security Automata - Policy and Technical Challenges of the Robotic Use of Force (Hardcover)
Sean Welsh
R4,201 Discovery Miles 42 010 Ships in 12 - 17 working days

Can security automata (robots and AIs) make moral decisions to apply force on humans correctly? If they can make such decisions, ought they be used to do so? Will security automata increase or decrease aggregate risk to humans? What regulation is appropriate? Addressing these important issues this book examines the political and technical challenges of the robotic use of force. The book presents accessible practical examples of the 'machine ethics' technology likely to be installed in military and police robots and also in civilian robots with everyday security functions such as childcare. By examining how machines can pass 'reasonable person' tests to demonstrate measurable levels of moral competence and display the ability to determine the 'spirit' as well as the 'letter of the law', the author builds upon existing research to define conditions under which robotic force can and ought to be used to enhance human security. The scope of the book is thus far broader than 'shoot to kill' decisions by autonomous weapons, and should attract readers from the fields of ethics, politics, and legal, military and international affairs. Researchers in artificial intelligence and robotics will also find it useful.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,357 Discovery Miles 63 570
Tomorrow, and Tomorrow, and Tomorrow…
Gabrielle Zevin Paperback  (1)
R465 R391 Discovery Miles 3 910
My Brain Has Too Many Tabs Open - How to…
Tanya Goodin Hardcover R359 R325 Discovery Miles 3 250
Metal Slug: The Ultimate History
Bitmap Books Hardcover  (1)
R1,300 Discovery Miles 13 000
Artificial Intelligence and the Media…
Taina Pihlajarinne, Anette Alen-Savikko Hardcover R3,304 Discovery Miles 33 040
Financial Regulation and Technology - A…
Iain Sheridan Paperback R2,676 Discovery Miles 26 760
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R337 Discovery Miles 3 370
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110

 

Partners