![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age-an age when such liberties have an outsized influence on the citizen-State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies-its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen-State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace.
The Joy of Photoshop is the long-awaited book from the social media sensation James Fridman. Have you ever taken a seemingly perfect picture only to have it ruined by one tiny detail? Photoshop master James Fridman is only too happy to help, even if he sometimes takes requests a little too literally. The Joy of Photoshop contains James's best-loved and funniest image alterations. From the woman who wished to look like a mermaid, to super-fans who want to be edited into their favourite movies, his followers never get quite what they asked for. Including plenty of never-before-seen pictures, this meme-tastic book will have you in stitches!
Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company's information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm's performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book.
This book aims to indicate several problems related to apparent ideology understandings that are accepted in communication studies. To this end, we endeavored to touch on produced meanings and power of ideology within media that has transformed in Turkey as from 2000. Samples from different channels of Turkish media rather than theoretical discussion were chosen to trace ideological structurings within Turkish media. It was also cared for studies in the book to complete each other; by this means, we also wanted to provide convenience for the reader to comprehend the ideological structuring of transformation in Turkish media after 2000.
Owing to the proliferation of screens and networked culture, young fans have moved beyond being simply media consumers. Today they are content interpreters and creators-living in a remix culture, reconstructing transmedia narratives, and interacting with culture industries. Young fans' relationship to technology has transformed their discourses, interpersonal relationships, and the way they participate in communities. This book delves into these issues, looking at social and cultural approaches to human development to study the identities and activities of fan communities among young people. The book explores communities related to Harry Potter, One Direction, Fortnite, Warhammer, TikTok, and television programs. Drawing on an ethnographic approach and big data analysis, Adolescent Fans demonstrates how digital technology has changed not only fan behavior, but also research practices used to understand what it means to be a young fan.
Owing to the proliferation of screens and networked culture, young fans have moved beyond being simply media consumers. Today they are content interpreters and creators-living in a remix culture, reconstructing transmedia narratives, and interacting with culture industries. Young fans' relationship to technology has transformed their discourses, interpersonal relationships, and the way they participate in communities. This book delves into these issues, looking at social and cultural approaches to human development to study the identities and activities of fan communities among young people. The book explores communities related to Harry Potter, One Direction, Fortnite, Warhammer, TikTok, and television programs. Drawing on an ethnographic approach and big data analysis, Adolescent Fans demonstrates how digital technology has changed not only fan behavior, but also research practices used to understand what it means to be a young fan.
In sub-Saharan Africa, mobile technology has developed at a rapid pace and the numbers of mobile users have increased faster than those in the rest of the world. The underlying question of how mobile journalism and social media may support African citizens and contribute to social change forms the basis of this book. A qualitative content analysis provides the methodological framework to interpret the interviews with professional and citizen journalists and media experts. The results suggest that mobile and social media contribute to the plurality of journalism in Zimbabwe, Zambia and South Africa. Mobile and social media reporters are aware of ethical questions and journalistic standards; at the same time, they connect with local communities and adopt an advocative and subjective approach.
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features * Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned * Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies * Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements
The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely undiscussed. In this book, assistant professor of law and digitalisation Riikka Koulu examines the multifaceted phenomenon of dispute resolution technology, focusing specifically on private enforcement, which modern technology enables on an unforeseen scale. The increase in private enforcement confounds legal structures and challenges the nation-state's monopoly on violence. And, in this respect, the author argues that the technology-driven privatisation of enforcement - from direct enforcement of e-commerce platforms to self-executing smart contracts in the blockchain - brings the ethics of law's coercive nature out into the open. This development constitutes a new, and dangerous, grey area of conflict management, which calls for transparency and public debate on the ethical implications of dispute resolution technology.
As digital transformations continue to accelerate in the world, discourses of big data have come to dominate in a number of fields, from politics and economics, to media and education. But how can we really understand the digital world when so much of the writing through which we grapple with it remains deeply problematic? In a compelling new work of feminist critical theory, Bassett, Kember and O'Riordan scrutinise many of the assumptions of a masculinist digital world, highlighting the tendency of digital humanities scholarship to venerate and essentialise technical forms, and to adopt gendered writing and citation practices. Contesting these writings, practices and politics, the authors foreground feminist traditions and contributions to the field, offering alternative modes of knowledge production, and a radically different, poetic writing style. Through this prism, Furious brings into focus themes including the automation of home and domestic work, the Anthropocene, and intersectional feminist technofutures.
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.
The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.
The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.
This book aims to bring to the reader an overview of different applications of brain-computer interfaces (BCIs) based on more than 20 years of experience working on these interfaces. The author provides a review of the human brain and EEG signals, describing the human brain, anatomically and physiologically, with the objective of showing some of the patterns of EEG (electroencephalogram) signals used to control BCIs. It then introduces BCIs and different applications, such as a BCI based on ERD/ERS Patterns in rhythms (used to command a robotic wheelchair with an augmentative and alternative communication (AAC) system onboard it); a BCI based on dependent-SSVEP to command the same robotic wheelchair; a BCI based on SSVEP to command a telepresence robot and its onboard AAC system; a BCI based on SSVEP to command an autonomous car; a BCI based on independent-SSVEP (using Depth-of-Field) to command the same robotic wheelchair; the use of compressive technique in SSVEP-based BCI; a BCI based on motor imagery (using different techniques) to command a robotic monocycle and a robotic exoskeleton; and the first steps to build a neurorehabilitation system based on motor imagery of pedalling together an in immersive virtual environment. This book is intended for researchers, professionals and students working on assistive technology.
Putting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape. Technology not only disrupts the traditional idea of what it is 'to think like a lawyer,' as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules - thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in shaping both legal doctrine and our regulatory thinking. This is a book for those studying, or about to study, law - as well as others with interests in the legal, political, and social impact of technology.
This book investigates how social media are reconfiguring dying, death, and mourning. Taking a narrative approach, it argues that dying, death, and mourning are shared online as small stories of the moment, which are organized around transgressive moments and events with motivational, participatory, or connective scope. Through the different case studies discussed, this book presents an empirical framework for analyzing small stories of dying, death and mourning as practices of sharing which become associated with specific modes of affective positioning, i.e. modulations of different degrees of distance or proximity to the death event and the dead, the networked audience(s), and the affective self. The book calls for the study of affect as integral to narrative activity and opens up broader questions about how stories and emotion are mobilized in digital cultures for accruing audiences, value (social or economic), and visibility. It will be of interest to researchers in narrative analysis, the anthropology and sociology of emotion, digital communication, media and cultural studies, and (digital) death and dying.
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.
Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.
Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.
Calls to improve undergraduate STEM education have resulted in initiatives that seek to bolster student learning outcomes by promoting changes in teaching practices. Written by participants in a series of ground-breaking social network analysis (SNA) workshops, Researching and Enacting Change in Postsecondary Education argues that the academic department is a highly productive focus for the spread of new, network-based teaching ideas. By clarifying methodological issues related to SNA data collection and articulating relevant theoretical approaches to the topic, this book leverages current knowledge about social network theory and SNA techniques for understanding instructional improvement in higher education.
Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.
We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.
Recent years have seen digital advertising grow to the point where it will soon overtake television as the no. 1 advertising medium. In the online environment, consumers interact and share their thoughts on brands and their experiences using them. These electronic word-of-mouth (eWOM) communications have become a very important to the success of products. In today's cluttered environment, it is especially important to study how the practice of eWOM advertising operates, and how marketers can influence eWOM in social media and other online sites. This volume starts with a chapter on the current state of knowledge on eWOM and then turns its attention to current research articles on a variety of eWOM formats. These include the posting of selfies on social media, the influence of review types on consumer perception and purchase intention, the effects of preannouncement messages, and how user-generated content can be used to induce effectiveness of eWOM on social media. The relationship of eWOM to brand building is emphasized in several of the chapters. This book was originally published as a special issue of the International Journal of Advertising. |
You may like...
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,719
Discovery Miles 137 190
Multisensory Experiences - Where the…
Carlos Velasco, Marianna Obrist
Hardcover
R1,169
Discovery Miles 11 690
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|