![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > General
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.
Emerging technologies create challenges for traditional regulatory approaches. The contributors to this book - leading scholars in law, innovation, and technology - address the need for new governance methods and models. The unique characteristics of emerging technologies - their diverse applications, the myriad concerns raised by new technologies, the need for public engagement, and the issue of effective coordination between governance players - create the need for new governance approaches. The authors identify innovative new methods of governance, taking into account an environment where changes in technologies can out-pace the corresponding regulatory frameworks. Scholars of technology, science and innovation will find this book to be an enlightening read, as will lawyers, policymakers and think-tanks working within the emerging technologies arena. Contributors: J.W. Abbott, K.W. Abbott, B. Allenby, M. Baram, D.M. Bowman, J. Kuzma, P.H. Lindoe, R.A. Lindor, T.F. Malloy, G.N. Mandel, G.E. Marchant, M. Masterton, L. Paddock, J. Paterson, M.A. Saner, W. Wallach
This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, falls victim to cybercrime. With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
In the future, how many identities will you have? How many do you want? Digital technology is causing us to think differently about who we are and who we could become, but with the right knowledge we can turn this incredible capacity to our advantage. 'Who am I?' is one of the most fundamental questions of all. But it is becoming increasingly difficult to answer as technology enables us to negotiate and create many different versions of ourselves. In our digital, data-driven world, Facebook gets a say in verifying who we are, science can alter our biology, and advances in AI are revolutionizing not only how we interact online but with the physical world around us. Understanding and defining ourselves is becoming confusing but, as this fascinating book argues, it is possible to embrace this new era of transformation while preserving our autonomy. In The Future of You, Professional futurist Tracey Follows shows how our personal freedoms and potential will be transformed over the coming decades. From health passports, bio-hacking and relationships with machines to mind clones, digital voting and virtual legacies beyond the grave, we need to understand these vital issues today so that we might design the future of our identity tomorrow. 'This fascinating book explores the way that emerging technologies such as AI might affect the nature of personal identity and personhood. It paints an intriguing, thought-provoking, and occasionally disturbing picture.' Michael Wooldridge, author of The Road to Conscious
'All new technology is accompanied with great expectations on the one hand and great fear on the other. Thierry Geerts reduces the digital revolution to its true proportions and shows that we control the impact of technology ourselves: technology becomes what we make of it. Few are better placed than the author to clearly define the potential, the tasks, and the responsibility that awaits each and every one of us.' - Caroline Pauwels, rector of the VUB 'After Digitalis drew up the contours of the new digital world, Homo digitalis now describes how we can appropriate it so that digitalisation will benefit humanity. But instead of trying to convince at all costs, Thierry Geerts puts things in perspective. With great expertise, he guides us through numerous groundbreaking initiatives that start-ups and companies in Europe have often developed.'- Alain Gerlache, journalist 'This book couldn't have come out at a better time. Change can be scary for many, but above all, it brings many opportunities. Thierry Geerts fantastically explains how Digitalis can be an inclusive place where social mobility and equality are self-evident. Now it's up to our entrepreneurs, policymakers, and each of us as individuals to gear up and resolutely opt for the digital future.' - Yasmien Naciri, entrepreneur and marketer 'Think about the reasons for technology. That is the challenge that Thierry Geerts takes on with gusto and enthusiasm in this fascinating book.' - Laurent Hublet, co-founder and CEO of BeCentral, the largest digitalis campus in Europe In Homo digitalis, Thierry Geerts, CEO of Google Belgium and Luxembourg, looks at the dangers and opportunities of the digital revolution. Without taboos and with an eye to the future, he offers thoughtful examples of how digitalisation affects us as people and as a society. His conclusion is clear: technology is neutral, and it's up to people to use it consciously and confidently. If we do that, digitalisation will make us happier, with more time for creativity, personal development, healthcare, and the things that really matter. Then we'll become more human and we homo sapiens will turn into homo digitalis.
As technology continues to rapidly advance, individuals and society are profoundly changed. So too are the tools used to measure this universe and, therefore, our understanding of reality improves. Boundaries of Self and Reality Online examines the idea that technological advances associated with the Internet are moving us in multiple domains toward various "edges." These edges range from self, to society, to relationships, and even to the very nature of reality. Boundaries are dissolving and we are redefining the elements of identity. The book begins with explorations of the digitally constructed self and the relationship between the individual and technological reality. Then, the focus shifts to society at large and includes a contribution from Chinese researchers about the isolated Chinese Internet. The later chapters of the book explore digital reality at large, including discussions on virtual reality, Web consciousness, and digital physics.
An illuminating insight into the Metaverse - what it is, how it works,
and and why it will soon be playing a major role in business,
technology and society.
accessible for readers unfamiliar with both SDGs and ESG concepts; it will enable leaders and businesses to assess deployment and development of AI more easily
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.
With 101 tips explaining the dos and don'ts of virtual meetings, delivered with abundant humour, You're On Mute will help you master video calls in "the new normal." If life on Zoom is getting you down and you're dreading the next inevitable invite to a Teams meeting, don't panic, help is at hand. Whether you need to stop doing that weird wave at the end of meetings or want to break the habit of being transfixed by your own face in the corner of the screen, the fun advice inside this book has got you covered. Advice includes: Mastering online etiquette - from the right way to say hello to the right time to hang up How to make multi-generational family video calls workable for both grandparents and children ("You're still on mute, grandma!") Ensuring your next video quiz is an entertaining test of knowledge rather than a painful test of endurance Best practices for work-related video calls, from being sensitive to camera-shy coworkers to the ideal backdrop for a job interview Successfully navigating an online romance, covering first dates to long-term relationships Avoiding the "must not dos" of video calls, whether it's the serious matter of security or the shame of surprise screen sharing In no time you'll be living your best life online, bringing your A game to any virtual work meeting, catch-up with family, quiz with friends, online date and more.
Winner of the 2017 N. Katherine Hayles Award for Criticism of Electronic Literature A CHOICE Outstanding Academic Title 2018 The digital age has had a profound impact on literary culture, with new technologies opening up opportunities for new forms of literary art from hyperfiction to multi-media poetry and narrative-driven games. Bringing together leading scholars and artists from across the world, The Bloomsbury Handbook of Electronic Literature is the first authoritative reference handbook to the field. Crossing disciplinary boundaries, this book explores the foundational theories of the field, contemporary artistic practices, debates and controversies surrounding such key concepts as canonicity, world systems, narrative and the digital humanities, and historical developments and new media contexts of contemporary electronic literature. Including guides to major publications in the field, The Bloomsbury Handbook of Electronic Literature is an essential resource for scholars of contemporary culture in the digital era.
Give your LinkedIn profile the makeover it deserves--and get the attention you deserve Look at your profile: you know it could be a little better. Too many LinkedIn users are just posting a basic resume and hoping for the offers to come flooding in, missing out on the incredible opportunity the platform offers to properly showcase their talents, products, and services to 610 million professionals in over 200 countries. LinkedIn is way more than a resume tool--to display your professional past and present--it's also your career future and personal brand. Used to its fullest extent, it helps you demonstrate the unique value and culture you provide, the skills and aspirations that make you different, to get the outcomes you truly want. But how's it done? Profile branding expert Donna Serdula pioneered the concept of LinkedIn Profile Optimization and through her Website, LinkedIn-Makever.com, has helped over 5000 professionals use LinkedIn to achieve increased success. In this guide she applies that experience to help you use all of LinkedIn's capabilities to meet your goals, whether they be job search, reputation management, or sales--including how to: Create a memorable, successful profile Optimize personal keywords Showcase your experience, accomplishments, and unique value Use LinkedIn features to grow your network and more You never get a second chance to make a first impression--and people are Googling you right now: Get a fresh online look and get results!
Are people with autism giving us a glimpse into our future human condition? Could we be driving our own evolution with our technology and, in fact, be witnessing the beginning of the next stage of human evolution? The thesis at the center of this book is that since we have delegated the ability to read context to contextual technologies such as social media, location, and sensors, we have become context blind. Since context blindness-or caetextia in Latin-is one of the most dominant symptoms of autistic behavior at the highest levels of the spectrum, people with autism may indeed be giving us a peek into our human condition soon. We could be witnessing the beginning of the next stage of human evolution-Homo caetextus. With increasingly frequent floods and fires and unbearably hot summers, the human footprint on our planet should be evident to all, but it is not because we are context blind. We can now see and feel global warming. We are witnessing evolution in real-time and birthing our successor species. Our great-grandchildren may be a species very distinct from us. This book is a must for all communication and media studies courses dealing with digital technology, media, culture, and society. And a general reading public concerned with the polarized public sphere, difficulties in sustaining democratic governance, rampant conspiracies, and phenomena such as cancel culture and the need for trigger warnings and safe spaces, will find it enlightening.
The U.S., and countries around the globe, are facing an ever-evolving series of health issues, including obesity, food deserts, child hunger, poor maternal health outcomes, and the resurgence of communicable diseases. Traditionally, health communicators and marketers have talked about these issues in a vacuum, in which related information is only visible when people are specifically seeking it out. If we are to give global health the attention it deserves, we need to weave it into our everyday conversations and experiences. Ultimately, we need to normalize the conversation around health. The emergence of everyday online opinion leaders has created a whole new market for shifting consumer perceptions and behaviors. In fact, many of these everyday online opinion leaders, called influencers, have built such large-scale social media presences that they now have the voice, the platform, and the following to reach millions of people with personal points of view on any number of topics. There are great opportunities for engaging with online influencers to support health promotion programs. However, navigating this online community is new to many people. Understanding how this online community works, the opportunities for paid and unpaid engagements, and the value that health programs specifically have with this community, is paramount to successfully working with influencers. This book draws from research with over 400 online influencers, the latest industry data, and practical, real-world experiences working with influencers over the past ten years. An easy-to-read guidebook for marketers and health communicators alike, this book leverages storytelling as a means for sharing lessons-learned and providing readers with practical knowledge about the online marketing industry and influencer community, as they relate to health.
The information society is a key issue in everyday life and a phenomenon enc- passing social, cultural, economic, and legal facettes. Currently, an information society's legal framework is gradually crystallizing under the newly introduced term of "Internet governance." During the last few years, intensive discussions about the contents of Internet governance have addressed manifold aspects of a possible regulatory regime. In light of the general comprehension that an international treaty structure is mi- ing and that self-regulation as a normative model does not sufce in all respects, new architectural and constitutional theories have been developed; furthermore, the international body of the Internet Governance Forum (IGF) came to life. N- withstanding the available literature on IGF, however, a thorough and systematic study sheding light on the main topics of Internet governance (such as legitimacy, transparency, accountability, and participation) and on the key regulatory issues (for example critical Internet resources, access, protection of civil liberties/- man rights, realization of security, safety and privacy standards, as well as the overcoming of the digital divide) from a legal perspective is not yet at hand. The present publication aims at discussing these legal challenges. This book has benefted from many inputs and encouragements from colleagues that I am deeply grateful for. In particular, I am indebted to the very meaningful discussions and valuable support in the preparation of the publication by my - search assistants lic. iur Mirin . a Grosz and lic. iurR . omana Weber, to lic. iur.
Communication defines political representation. At the core of the representational relationship lies the interaction between principal and agent; the quality of this relationship is predicated upon the accessibility of effective channels of communication between the constituent and representative. Over the past decade, congressional websites have become the primary way constituents communicate with their members and a prominent place for members to communicate with constituents. Yet, as we move toward the third decade of the 21st century, little work has systematically analyzed this forum as a distinct representational space. In this book, Jocelyn Evans and Jessica Hayden offer a fresh, timely, and mixed-methods approach for understanding how the emergence of virtual offices has changed the representational relationship between constituents and members of Congress. Utilizing strong theoretical foundations, a broad historical perspective, elite interviews, and rich original datasets, Evans and Hayden present evidence that virtual offices operate as a distinct representational space, and they demonstrate that their use has resulted in unprecedented and ill-understood changes in representational behavior. Congressional Communication in the Digital Age contributes to the scholarship on representation theory and its application to the contemporary Congress. It is valuable reading for students and researchers interested in American politics, political communication, and legislative politics.
Prominent media scholars have argued that the dissemination of propaganda is an important function of the news media. Yet, despite public controversies about 'fake news' and 'misinformation', there has been very little discussion on techniques of propaganda. Building on critical theory, most notably Herman and Chomsky's Propaganda Model, Florian Zollmann's pioneering study brings propaganda back to the forefront of the debate. On the basis of a forensic examination of 1,911 newspaper articles, Zollmann investigates US, UK and German media reporting of the military operations in Kosovo, Iraq, Libya, Syria and Egypt. The book demonstrates how 'humanitarian intervention' and 'R2P' are only evoked in the news media if so called 'enemy' countries of Western states are the perpetrators of human rights violations. Zollmann's work evidences that the news media plays a crucial propaganda role in facilitating a selective process of shaming during the build-up towards military interventions. This process has led to an erosion of internationally agreed norms of non-intervention, as enshrined in the UN Charter.
The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.
This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression. According to its traditional understanding, this right gives individuals the possibility to preclude the media from revealing personal facts that are no longer newsworthy, at least where no other interest prevails. Cases sanctioning this understanding still abound in a number of countries. In today's world, however, the right to be forgotten has evolved, and it appears in a more multi-faceted way. It can involve for instance also the right to access, control and even erase personal data. Of course, these prerogatives depend on various factors and competing interests, of both private and public nature, which again require careful balancing. Due to ongoing technological evolution, it is likely that the right to be forgotten in some of its new manifestations will become increasingly relevant in our societies.
This edited collection brings together academics and practitioners to explore the uses of Digital Storytelling, which places the greatest possible emphasis on the voice of the storyteller. Case studies are used as a platform to investigate questions of concept, theory and practice, and to shine an interrogative light on this emergent form of participatory media. The collection examines the creative and academic roots of Digital Storytelling before drawing on a range of international examples to consider the way in which the practice has established itself and evolved in different settings across the world.
Recent years have seen digital advertising grow to the point where it will soon overtake television as the no. 1 advertising medium. In the online environment, consumers interact and share their thoughts on brands and their experiences using them. These electronic word-of-mouth (eWOM) communications have become a very important to the success of products. In today's cluttered environment, it is especially important to study how the practice of eWOM advertising operates, and how marketers can influence eWOM in social media and other online sites. This volume starts with a chapter on the current state of knowledge on eWOM and then turns its attention to current research articles on a variety of eWOM formats. These include the posting of selfies on social media, the influence of review types on consumer perception and purchase intention, the effects of preannouncement messages, and how user-generated content can be used to induce effectiveness of eWOM on social media. The relationship of eWOM to brand building is emphasized in several of the chapters. This book was originally published as a special issue of the International Journal of Advertising.
Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment. |
![]() ![]() You may like...
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
|