![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Examining Internet culture in the People's Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally.
As an educator and researcher, I have tried to create awareness to pupils, teachers and families through seminars and workshops since 2012. I believe that Internet and social media are actually precious and useful. If individuals use digital environments consciously, they can even be counted as educational institutions. Unfortunately, most of the pupils, teachers and parents had great concerns regarding digital environments, which decreased after they obtained information about "digital citizenship". So, I decided to write a book not only for teachers or parents who guided for safety at digital environments, but also for youths to understand digital citizenship. The book is written in the hope that it would be helpful for anyone who hold concerns about digital environments.
Can security automata (robots and AIs) make moral decisions to apply force on humans correctly? If they can make such decisions, ought they be used to do so? Will security automata increase or decrease aggregate risk to humans? What regulation is appropriate? Addressing these important issues this book examines the political and technical challenges of the robotic use of force. The book presents accessible practical examples of the 'machine ethics' technology likely to be installed in military and police robots and also in civilian robots with everyday security functions such as childcare. By examining how machines can pass 'reasonable person' tests to demonstrate measurable levels of moral competence and display the ability to determine the 'spirit' as well as the 'letter of the law', the author builds upon existing research to define conditions under which robotic force can and ought to be used to enhance human security. The scope of the book is thus far broader than 'shoot to kill' decisions by autonomous weapons, and should attract readers from the fields of ethics, politics, and legal, military and international affairs. Researchers in artificial intelligence and robotics will also find it useful.
The aim of the monograph is to present the application and practical development of the concept of remediation. Two decades after its original proposal by J.D Bolter and R. Grusin, remediation remains one of the major tools of understanding new media. The authors of this book examine the subject from the perspective of Central and Eastern Europe. Examples are drawn from artistic and literary practices in Croatia, Czech Republic, Poland, Russia, Slovakia and Slovenia. Theoretical frameworks solidify and extend the concept of remediation to new phenomena and areas of critical discourse, from biomedia and genetic transcoding to the remediation of textual media in Catholic Liturgy. As a result, the notion of medium, the nature of mediation and the essence of storytelling are redefined.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful. Contributors to this volume present case studies and theoretical approaches from their experience with applications for digital technology in classrooms, museums, archives, in the field and with the general public. Offering potential answers to the issues of access and control from a variety of perspectives, the volume acknowledges that access is subject to competing interests of a variety of stakeholders. Museums, universities, archives, and some communities all place claims on how data can or cannot be shared through digital initiatives and, given the collaborative nature of most digital humanities projects, those in the field need to be cognizant of the various and often competing interests and rights that shape the nature of access and how it is controlled. Access and Control in Digital Humanities will be of interest to researchers, academics and graduate students working in a variety of fields, including digital humanities, library and information science, history, museum and heritage studies, conservation, English literature, geography and legal studies.
Being watched and watching others is a universal feature of all human societies. How does the phenomenon of surveillance affect, interact with, and change the world of business? This concise book unveils a key idea in the history and future of management. For centuries managers have claimed the right to monitor employees, but in the digital era, this management activity has become enhanced beyond recognition. Drawing on extensive research into organizational surveillance, the author distils and analyses existing thinking on the concept with his own empirical work. Drawing together perspectives from philosophy, cutting-edge social theory, and empirical research on workplace surveillance, Surveillance is the definitive introduction to an intriguing topic that will interest readers across the social sciences and beyond.
Data is fundamentally changing the nature of businesses and organisations and the mechanisms for delivering products and services. This book is a practical guide to developing strategy and policy for data governance, in line with the developing ISO 38505 governance of data standards. It will assist an organisation wanting to become more of a data driven business by explaining how to assess the value, risks and constraints associated with collecting, using and distributing data.
Placing contemporary technological developments in their historical context, this book argues for the importance of law in their regulation. Technological developments are focused upon overcoming physical and human constraints. There are no normative constraints inherent in the quest for ongoing and future technological development. In contrast, law proffers an essential normative constraint. Just because we can do something, does not mean that we should. Through the application of critical legal theory and jurisprudence to pro-actively engage with technology, this book demonstrates why legal thinking should be prioritised in emerging technological futures. This book articulates classic skills and values such as ethics and justice to ensure that future and ongoing legal engagements with socio-technological developments are tempered by legal normative constraints. Encouraging them to foreground questions of justice and critique when thinking about law and technology, the book addresses law students and teachers, lawyers and critical thinkers concerned with the proliferation of technology in our lives.
In today's global and digitalized world, the investigation of relational trust as part of social connections has remained a popular and interdisciplinary academic topic. This book explores the idea of trust as a basic type of information processing that might be as old as human existence but has gained new attention with the emergence of online communication channels. The result is a strategic reconsideration of the brain's role in the formation of social relationships and a new look at how information might shape our confidence in others.
Social media users fracture into tribes, but social media ecosystems are globally interconnected technically, socially, culturally, and economically. At the crossroads, Huatong Sun, author of Cross-Cultural Technology Design, presents theory, method, and case studies to uncover the global interconnectedness of social media design and reorient universal design standards. Centering on the dynamics between structure and agency, Sun draws on practice theories and transnational fieldwork and articulates a critical design approach. The "CLUE2 (CLUE squared)" framework extends from situated activity to social practice, and connects macro institutions with micro interactions to redress asymmetrical relations in everyday life. Why were Japanese users not crazed about Facebook? Would Twitter have had been more successful than its copycat Weibo in China if not banned? How did mobilities and value propositions play out in the competition of WhatsApp, WeChat, LINE, and KakaoTalk for global growth? Illustrating the cultural entanglement with a relational view of design, Sun provides three provocative accounts of cross-cultural social media design and use. Concepts such as affordance, genre, and uptake are demonstrated as design tools to bind the material with the discursive and leap from the critical to the generative for culturally sustaining design. Sun calls to reshape the crossroads into a design square where differences are nourished as design resources, where diverse discourses interact for innovation, and where alternative design epistemes thrive from the local. This timely book will appeal to researchers, students, and practitioners who design across disciplines, paradigms, and boundaries to bridge differences in this increasingly globalized world.
This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes. Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning. Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks. Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 - 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.
Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.
This book contributes to the discourse about science communication strategies from different perspectives. It provides models, projects and case studies of international academicians and practitioners from different fields. The book is divided into two parts. The first part sets the focus on case studies and best practises of science communication and storytelling. The second part presents 40 different popular science texts about different topics written by students within the scope of the course "Science Writing and Journalism" in the Department of Communication and Design at Bilkent University in Ankara. The students wrote popular science texts based on academic papers and sources and present them with a big variety of popularization strategies.
The Healthcare industry is one of the largest and rapidly developing industries. Over the last few years, healthcare management is changing from disease centered to patient centered. While on one side the analysis of healthcare data plays an important role in healthcare management, but on the other side the privacy of a patient's record must be of equal concern. This book uses a research-oriented approach and focuses on privacy-based healthcare tools and technologies. It offers details on privacy laws with real-life case studies and examples, and addresses privacy issues in newer technologies such as Cloud, Big Data, and IoT. It discusses the e-health system and preserving its privacy, and the use of wearable technologies for patient monitoring, data streaming and sharing, and use of data analysis to provide various health services. This book is written for research scholars, academicians working in healthcare and data privacy domains, as well as researchers involved with healthcare law, and those working at facilities in security and privacy domains. Students and industry professionals, as well as medical practitioners might also find this book of interest.
If business functions such as management, human resources, logistics and finance cannot manage digital transformation well, there may be a danger of extinction for companies. In the future, business life will continue to be affected by digital transformation. In this long journey, it is necessary to consider digital transformation as a moving target, a strategy that is constantly evolving, changing and needs to be updated. For this reason, businesses that have not yet implemented their digital transformation strategies or are still doing so need to know the challenges they will face in digital transformation. The book aims to address the dark points that businesses should pay attention to rather than the benefits of digital transformation.
The book provides copyright protection approaches for videos using watermarking. The various watermarking techniques using various transforms such as discrete cosine transform (DCT), discrete wavelet transform (DWT) and singular value decomposition (SVD) for videos are presented. The book also provides video watermarking approach using compressive sensing (CS) theory. The presented watermarking techniques are designed and implemented using color digital videos. The performance of the presented techniques is evaluated using Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC).
Surfing the Anthropocene shows how the "big tension" between the speed and scale of digital media characterizes affective life on the public screen today. An innovative look launched in the wake of the 2016 US presidential election, Eric S. Jenkins illustrates how the big tension is reflected in how we feel and talk about digital media. Exploring a variety of modes from following news on Twitter to discussion on Facebook, activism to witnessing police shooting videos, the book demonstrates how responses to the big tension make political activity more like videogames, with an "immeditative" temporality and "attentional" spatiality contrasted with meditative and tending modes such as gardening. As a near-monoculture of immeditative, attentional modes emerge, consumerism and affect privilege become reinforced in ways that make addressing the problems of the Anthropocene especially draining and difficult. Original concepts throughout the book, including the big tension but also the affected subject, translucency, and homo modus, are sure to influence thinking about digital media. If you wonder why life today feels particularly urgent, heated, and intense, Surfing the Anthropocene offers a compelling answer-the big tension-as well as a way to reimagine digital experience with an eye towards surviving, rather than just surfing, the Anthropocene.
Surfing the Anthropocene shows how the "big tension" between the speed and scale of digital media characterizes affective life on the public screen today. An innovative look launched in the wake of the 2016 US presidential election, Eric S. Jenkins illustrates how the big tension is reflected in how we feel and talk about digital media. Exploring a variety of modes from following news on Twitter to discussion on Facebook, activism to witnessing police shooting videos, the book demonstrates how responses to the big tension make political activity more like videogames, with an "immeditative" temporality and "attentional" spatiality contrasted with meditative and tending modes such as gardening. As a near-monoculture of immeditative, attentional modes emerge, consumerism and affect privilege become reinforced in ways that make addressing the problems of the Anthropocene especially draining and difficult. Original concepts throughout the book, including the big tension but also the affected subject, translucency, and homo modus, are sure to influence thinking about digital media. If you wonder why life today feels particularly urgent, heated, and intense, Surfing the Anthropocene offers a compelling answer-the big tension-as well as a way to reimagine digital experience with an eye towards surviving, rather than just surfing, the Anthropocene.
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age-an age when such liberties have an outsized influence on the citizen-State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies-its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen-State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace.
The Joy of Photoshop is the long-awaited book from the social media sensation James Fridman. Have you ever taken a seemingly perfect picture only to have it ruined by one tiny detail? Photoshop master James Fridman is only too happy to help, even if he sometimes takes requests a little too literally. The Joy of Photoshop contains James's best-loved and funniest image alterations. From the woman who wished to look like a mermaid, to super-fans who want to be edited into their favourite movies, his followers never get quite what they asked for. Including plenty of never-before-seen pictures, this meme-tastic book will have you in stitches!
Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company's information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm's performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book. |
You may like...
|