![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Explains smart city ecosystem and AI-centric solutions Presents the application of design principles and computer vision models for operating smart cities and security systems Discusses how to integrate the AI-based controls systems to make the IoT devices smarter Explains data engineering and visualization patterns for monitoring smart city systems Discusses self-driving car models and transportation infrastructures
In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.
This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain. It explains Blockchain concepts related to Industry 4.0, Smart Healthcare, and the Internet of Things (IoT) and explores Smart Contracts and Consensus algorithms. This book will serve as an ideal reference text for graduate students and academic researchers in electrical engineering, electronics and communication engineering, computer engineering, and information technology. This book * Discusses applications of blockchain technology in diverse sectors such as industry 4.0, education, finance, and supply chain. * Provides theoretical concepts, applications, and research advancements in the field of blockchain. * Covers industry 4.0 digitization platform and blockchain for data management in industry 4.0 in a comprehensive manner. * Emphasizes analysis and design of consensus algorithms, fault tolerance, and strategy to choose the correct consensus algorithm. * Introduces security issues in the industrial internet of things, internet of things, blockchain integration, and blockchain-based applications. The text presents in-depth coverage of theoretical concepts, applications and advances in the field of blockchain technology. This book will be an ideal reference for graduate students and academic researchers in diverse engineering fields such as electrical, electronics and communication, computer, and information technology.
In recent years, we have witnessed the mushrooming of pro- democracy and protest movements not only in the Arab world, but also within Europe and the Americas. Such movements have ranged from popular upheavals, like in Tunisia and Egypt, to the organization of large-scale demonstrations against unpopular policies, as in Spain, Greece and Poland. What connects these different events are not only their democratic aspirations, but also their innovative forms of communication and organization through online means, which are sometimes considered to be outside of the State's control. At the same time, however, it has become more and more apparent that countries are attempting to increase their understanding of, and control over, their citizens' actions in the digital sphere. This involves striving to develop surveillance instruments, control mechanisms and processes engineered to dominate the digital public sphere, which necessitates the assistance and support of private actors such as Internet intermediaries. Examples include the growing use of Internet surveillance technology with which online data traffic is analysed, and the extensive monitoring of social networks. Despite increased media attention, academic debate on the ambivalence of these technologies, mechanisms and techniques remains relatively limited, as is discussion of the involvement of corporate actors. The purpose of this edited volume is to reflect on how Internet-related technologies, mechanisms and techniques may be used as a means to enable expression, but also to restrict speech, manipulate public debate and govern global populaces. This book was published as a special issue of the Journal of Information Technology and Politics.
Using a lens of mindfulness, this book explores how digital dependencies can displace attention and undermine attentional control, leading to experiences of stress and mindless involvement with digital technology. Using qualitative interviews with teachers and students of mindfulness programmes, the book explores the challenges and opportunities for reconciling digital interactions with mindful practice. A phenomenological analysis of participants' digital experiences shows three different imperatives (relating to digital capabilities, hyper-reality and algorithms), that can drive unconscious forms of interaction and encourage a delegation of attentional control that draws users away from the present moment. The book concludes by exploring the implications of these (extra-conscious) imperatives for understanding digital addiction. It also provides a set of guidelines for a digital approach to mindfulness practice that can encourage beneficial relationships with digital technology into the future.
This book introduces the capability approach - in which wellbeing, agency and justice are the core values - as a powerful normative lens to examine technology and its role in development. This approach attaches central moral importance to individual human capabilities, understood as effective opportunities people have to lead the kind of lives they have reason to value. The book examines the strengths, limitations and versatility of the capability approach when applied to technology, and shows the need to supplement it with other approaches in order to deal with the challenges that technology raises. The first chapter places the capability approach within the context of broader debates about technology and human development - discussing amongst others the appropriate technology movement. The middle part then draws on philosophy and ethics of technology in order to deepen our understanding of the relation between technical artefacts and human capabilities, arguing that we must simultaneously 'zoom in' on the details of technological design and 'zoom out' to see the broader socio-technical embedding of a technology. The book examines whether technology is merely a neutral instrument that expands what people can do and be in life, or whether technology transfers may also impose certain views of what it means to lead a good life. The final chapter examines the capability approach in relation to contemporary debates about 'ICT for Development' (ICT4D), as the technology domain where the approach has been most extensively applied so far. This book is an invaluable read for students in Development Studies and STS, as well as policy makers, practitioners and engineers looking for an accessible overview of technology and development from the perspective of the capability approach.
Courting Publicity: Twitter and Television Cameras in Court is a new title dealing with an incredibly topical subject matter that is only likely to increase in interest in the future and lead to new legislation and case law. It examines the impact on the legal process and those involved, of ever- increasing levels of scrutiny and public attention via new technologies. Contents includes: Courting Publicity Courts and Twitter Cases Media Rights v Privacy Rights The Internet Twitter in Court: Issues and UK Consultation Television Cameras in Court Supreme Court Other courts Effects of Television Cameras in Court Effects of Twitter in Court Effects of Twitter (and Internet) Outside of Court The Future
Key Selling Points The first book to showcase physical representations of data, and the first to discuss the creative process behind them. Approaches the topic from a multidisciplinary perspective, showcasing a range of creative approaches from computer science, data science, graphic design, art, craft, and architecture. The book is heavily visual and illustrates each project and the process of creating it via rich photos and sketches, which are accessible and inspiring for both enthusiasts and experts.
What impact does our relentless fixation on gadgets have on the struggle for new kinds of solidarity, political articulation and intelligence? In this groundbreaking study, Joss Hands explores the new political and social forces that are emerging in the age of social media. Gadget Consciousness examines the transformation of our consciousness as a historical political force in two senses: as individual consciousness - in terms of sentience and will - and also as class consciousness. Exploring a range of manifestations in the digital commons, he investigates what forms digital solidarity can take, and asks whether we can learn from the communisms of the past and how might solidarity be manifested in the future? Today, the ubiquity of networked gadgets offers exciting new opportunities for social and political change, but also significant dangers of alienation and stupefaction.
What is the role of social media on fundamental change in Arab countries in the Middle East and North Africa? Online Arab Spring responds to this question, considering five countries: Egypt, Libya, Jordan, Yemen, and Tunisia, along with additional examples. The book asks why the penetration rate for social media differs in different countries: are psychological and social factors at play? Each chapter considers national identity, the legitimacy crisis, social capital, information and media literacy, and socialization. Religious attitudes are introduced as a key factor in social media, with Arabic countries in the Middle East and North Africa being characterized by Islamic trends. The insight gained will be helpful for analysing online social media effects internationally, and predicting future movements in a social context.
Digitalization and computerization are now pervasive in science. This has deep consequences for our understanding of scientific knowledge and of the scientific process, and challenges longstanding assumptions and traditional frameworks of thinking of scientific knowledge. Digital media and computational processes challenge our conception of the way in which perception and cognition work in science, of the objectivity of science, and the nature of scientific objects. They bring about new relationships between science, art and other visual media, and new ways of practicing science and organizing scientific work, especially as new visual media are being adopted by science studies scholars in their own practice. This volume reflects on how scientists use images in the computerization age, and how digital technologies are affecting the study of science.
Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanisms, and techniques with the capacity to autonomously manage their functioning and evolution. Currently, most books about mobile networks focus mainly on the technical point of view. Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective not only addresses the theoretical aspects of MSN and computing, but also introduces and categorizes existing applications. It supplies a multidisciplinary perspective that considers the technology, economics, social sciences, and psychology behind MSNs. In addition to fundamental theory, the book investigates the practical issues in MSN, including characteristics, inner structural relationship, incentive mechanisms, resource allocating, information diffusion, search, ranking, privacy, trust, and reputation. Introducing recently developed technologies, modes, and models, the book provides two distinct (but related) viewpoints about MSN applications: socially inspired networking technology and networking technology that uses recent advancements to enhance quality of life. The text illustrates the interaction between the macrolevel structure and the local rational behaviors (microlevel) in MSN. It summarizes currently available MSN development platforms, including Android and iOS, and introduces and categorizes existing applications related to MSN and computing. Both location-based service (LBS) and mobile social networks in proximity (MSNPs) are presented in a comprehensive manner. Highlighting key research opportunities, this much-needed reference outlines incentive mechanisms inspired by classical economics, behavioral economics, and social psychology, and, perhaps for the first time, it presents a summary of the economic and business models of MSNs.
There is much excitement about Web 2.0 as an unprecedented, novel, community-building space for experiencing, producing, and consuming leisure, particularly through social network sites. What is needed is a perspective that is invested in neither a utopian or dystopian posture but sees historical continuity to this cyberleisure geography. This book investigates the digital public sphere by drawing parallels to another leisure space that shares its rhetoric of being open, democratic, and free for all: the urban park. It makes the case that the history and politics of public parks as an urban commons provides fresh insight into contemporary debates on corporatization, democratization and privatization of the digital commons. This book takes the reader on a metaphorical journey through multiple forms of public parks such as Protest Parks, Walled Gardens, Corporate Parks, Fantasy Parks, and Global Parks, addressing issues such as virtual activism, online privacy/surveillance, digital labor, branding, and globalization of digital networks. Ranging from the 19th century British factory garden to Tokyo Disneyland, this book offers numerous spatial metaphors to bring to life aspects of new media spaces. Readers looking for an interdisciplinary, historical and spatial approach to staid Web 2.0 discourses will undoubtedly benefit from this text.
In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.
Learn how to switch off and find calm - from the New York Times bestselling author of A World Without Email 'Digital Minimalism is the Marie Kondo of technology' Evening Standard 'An eloquent, powerful and enjoyably practical guide to cutting back on screen time' The Times 'An urgent call to action for anyone serious about being in command of their own life' Ryan Holiday 'What a timely and useful book' Naomi Alderman, author of The Power Do you find yourself endlessly scrolling through social media or the news while your anxiety rises? Are you feeling frazzled after a long day of endless video calls? In this timely book, professor Cal Newport shows us how to pair back digital distractions and live a more meaningful life with less technology. By following a 'digital declutter' process, you'll learn to: * Rethink your relationship with social media * Prioritize 'high bandwidth' conversations over low quality text chains * Rediscover the pleasures of the offline world Take back control from your devices and find calm amongst the chaos with Digital Minimalism.
This book highlights the challenges and potential of educational learning or industry-based training using serious games and social media platforms. In particular, the book addresses applications used in businesses and education-related organizations in Asia, where the framework and experience of serious games have been used to address specific problems in the real world. The topics that will be present in this book includes future of serious games and immersive technologies and their impact on society; online and mobile games; achievement systems in serious games; persuasive technology and games for saving and money management; malware analytics for social networking; serious games for mental health interventions; educational implications of social network games; learning and acquiring subject knowledge using serious games in classrooms. The target audience for this book includes scientists, engineers and practitioners involved in the field of Serious Games. The major part of this book comprises of papers that have been presented at the Serious Games and Social Connect 2012 conference held in Singapore (October 4, 2012). All the contributions have been peer reviewed and by scientific committee members with report about quality, content and originality.
Convergence, participatory culture, multimedia technologies, and social media platforms are creating new communicative opportunities that fundamentally influence citizenship and journalism. Social media present a staggering breadth of legal and ethical matters to consider. The limits and laws of free expression in this new media landscape are beginning to emerge both domestically and internationally, causing us to ask the following questions: How do we conceive of privacy? Should the law protect citizen journalists? How do social media affect ethical obligations of journalists and public relations professionals? These are just a few of the issues raised by the new social media landscape. Myriad standards of professional ethics command compliance in order for various media industries to function. Scholarly researchers of social media have not yet focused on the rights of expression and ethical obligations of the new media environment. This volume will address the scope and nature of this developing environment of expression with chapter topics ranging from privacy, cyber-bullying, and harassment to defamation, intellectual property rights, and online safety.
It all feels pretty overwhelming right now. People are feeling uncertain and disillusioned. How do business leaders create resilient organizations that can reassure people, deliver and truly connect with a values-driven audience, often through digital-first channels? Explore how your customers and your people demand more than business as usual. This book reveals the psychology behind how we feel about businesses, their communications and their leaders in a digital world. From understanding the new dynamics shaping online behaviour, to the evolving expectations driving employees and consumers, Business Unusual will teach you how to build a resilient business - one that is built on trust, an engaged and fulfilled workforce, and the brand values that can empower you to craft resonant communications and relationships. Join the trailblazers that are transforming how we think of, and conduct, business. With insights from cutting-edge research and real-world case studies, learn how to apply psychological frameworks and practices that can help you develop a futureproof brand that people believe in, both inside and outside the organization.
The A to Z Facebook guide for users, marketers, and developers alike Facebook has more than a billion users worldwide. Whether you enjoy spending time on Facebook every day, use it to advertise and market your product, or develop Facebook apps, this go-to guide has something you need. Its six minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps. It's fully updated to cover the latest Facebook changes, including Graph Search, mobile apps, Timeline enhancements, and news feed redesign. * Facebook has more than one billion active users who share more than 30 billion pieces of content each month * More than 37 million brands have Pages on Facebook * This complete guide has been fully updated to cover Facebook's latest changes, including Graph Search, mobile apps for both users and Page managers, a redesigned news feed, and enhancements to the Timeline * Minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps Facebook All-in-One For Dummies, 2nd Edition is packed with helpful information, great ideas, and ways to help you get even more out of Facebook.
'Child Soldiers and the Lubanga Case' and 'The Tallinn Manual on the International Law Applicable to Cyber Warfare' are the two central themes of this volume. Each of these timely topics is addressed from three different angles, providing a truly comprehensive analysis of the subject. The book also features an article on the duty to investigate civilian casualties during armed conflict and its implementation in practice and an elaborate year in review, discussing developments that occurred in 2012. The Yearbook of International Humanitarian Law is the world's only annual publication devoted to the study of the laws governing armed conflict. It provides a truly international forum for high-quality, peer-reviewed academic articles focusing on this crucial branch of international law. Distinguished by contemporary relevance, the Yearbook of International Humanitarian Law bridges the gap between theory and practice and serves as a useful reference tool for scholars, practitioners, military personnel, civil servants, diplomats, human rights workers and students.
This title helps the over 50 reader come to terms with the benefits of social networking.
accessible for readers unfamiliar with both SDGs and ESG concepts; it will enable leaders and businesses to assess deployment and development of AI more easily
Today's urban environments are layered with data and algorithms that fundamentally shape how we perceive and move through space. But are our digitally dense environments continuing to amplify inequalities rather than alleviate them? This book looks at the key contours of information inequality, and who, what and where gets left out. Platforms like Google Maps and Wikipedia have become important gateways to understanding the world, and yet they are characterised by significant gaps and biases, often driven by processes of exclusion. As a result, their digital augmentations tend to be refractions rather than reflections: they highlight only some facets of the world at the expense of others. This doesn't mean that more equitable futures aren't possible. By outlining the mechanisms through which our digital and material worlds intersect, the authors conclude with a roadmap for what alternative digital geographies might look like.
This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws. In addition, it covers all sub-regional and regional data privacy policies in Africa. Apart from analysing data protection law, the book focuses on the socio-economic contexts, political settings and legal culture in which such laws developed and operate. It bases its analyses on the African legal culture and comparative international data privacy law. In Africa protection of personal data, the central preoccupation of data privacy laws, is on the policy agenda. The recently adopted African Union Cyber Security and Data Protection Convention 2014, which is the first and currently the only single treaty across the globe to address data protection outside Europe, serves as an illustration of such interest. In addition, there are data protection frameworks at sub-regional levels for West Africa, East Africa and Southern Africa. Similarly, laws on protection of personal data are increasingly being adopted at national plane. Yet despite these data privacy law reforms there is very little literature about data privacy law in Africa and its recent developments. This book fills that gap.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:
Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization. Praise for: The first edition was outstanding. The new second edition is
even better ... the definitive and indispensable guide for
information security and privacy awareness and training
professionals, worth every cent. As with the first edition, we
recommend it unreservedly.. |
You may like...
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|