![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.
This book explores the gamer's dilemma, which lies at the heart of theorising about the morality of certain video game content. The dilemma is as follows: given that gaming content involves virtual characters within a virtual environment, the moral permission of virtual murder would also appear to morally permit virtual paedophilia. Yet most gamers and members of wider society would not want to play, endorse, or find in any way morally acceptable the enactment of virtual paedophilia within a video game. Yet by accepting the moral permissibility of virtual murder they leave themselves vulnerable to having to accept the moral permissibility of virtual paedophilia. This book provides an incredibly thorough and systematic analysis and evaluation of the gamer's dilemma, by considering the origins of the intuitions around the dilemma, and exploring whether they find support from traditional or contemporary moral theory and psychological research. The book will be great interest to academics and students of philosophy and psychology, as well as members of the wider public interested in video game violence and taboo enactments more generally.
Blockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community of computer scientists and cryptologists, to mainstream phenomena that are now considered powerful game changers for many industries. This book explores and assesses real-world use cases and case studies on blockchain and related technologies. The studies describe the respective applications and address how these technologies have been deployed, the rationale behind their application, and finally, their outcomes. The book shares a wealth of experiences and lessons learned regarding financial markets, energy, SCM, healthcare, law and compliance. Given its scope, it is chiefly intended for academics and practitioners who want to learn more about blockchain applications.
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
Foundations of Digital Art and Design, Second Edition Fuses design fundamentals and software training into one cohesive approach! All students of digital design and production-whether learning in a classroom or on their own-need to understand the basic principles of design. These principles are often excluded from books that teach software. Foundations of Digital Art and Design reinvigorates software training by integrating design exercises into tutorials that fuse design fundamentals and core Adobe Creative Cloud skills. The result is a comprehensive design learning experience organized into five sections that focus on vector art, photography, image manipulation, typography, and effective work habits for digital artists. Design topics and principles include: Bits, Dots, Lines, Shapes, Unity, Rule of Thirds, Zone System, Color Models, Collage, Appropriation, Gestalt, The Bauhaus Basic Course Approach, Continuity, Automation, and Revision. This book: Teaches art and design principles with references to contemporary digital art alongside digital tools and processes in Adobe Creative Cloud Addresses the growing trend of compressing design fundamentals and design software into the same course in universities and design colleges Times each lesson to be used in 50 to 90-minute class sessions with additional practice materials available online Includes free video screencasts that demonstrate key concepts in every chapter Download work files and bonus chapters, view screencasts, connect with the author online and more; see the Introduction to the book for details. "This ambitious book teaches visual thinking and software skills together. The text leads readers step-by-step through the process of creating dynamic images using a range of powerful applications. The engaging, experimental exercises take this project well beyond the typical software guide." ELLEN LUPTON, co-author of Graphic Design: The New Basics
We are so used to living in a media-saturated world that we do not notice just how much damage is being done to us daily by the images we see and the articles and posts we read. If you are often anxious or find it hard to sleep, or you regularly want to give up on your fellow human beings, the reason may come down to the relentless influence of the modern media. How Modern Media Destroys Our Minds is a guide for navigating the media today. The book encourages the reader to consider the many peculiarities of the modern media: its excessive focus on scandal, its emphasis on novelty, its capacity to breed envy and self-hatred, its high-minded defence of itself, its ever shorter attention span and its obsession with fame. The book teaches us how to liberate ourselves from the media, in order to achieve calm and a more generous, original and imaginative state of mind. We are shown how to redress the balance and emerge with a stronger, more positive outlook on life.
The internet has changed us all, creating a new layer of perfectionist pressure in every aspect of our lives, but equally enabling us to share resources, opinions, help and information more quickly than ever before. Are we supposed to love it, or leave it? Is it ever possible to do both? Like all of their generation, Naomi Shimada and Sarah Raphael have grown up on the internet, and now work closely with it every day. Sarah's work as a journalist brings her into contact with the outer reaches of the internet as well as its inner workings; graph upon graph revealing to her what people most want to read today (hint: its usually a story about a relationship car crash). In her work as a model and positivity advocate, Naomi talks to people all over the world through her sunny, colourful Instagram account; people who rely on her cheerfulness to help them. In Mixed Feelings, they explore what the internet might be doing to our minds, bodies and hearts, through wide-ranging essays and discussions featuring a range of perspectives and voices. A bible for those who refuse to fit into any box, this is a celebration of difference and a challenge to the status quo – a bulwark against the onslaught of images of perfectionism and aspiration we are bombarded with on a daily basis.
This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful. Contributors to this volume present case studies and theoretical approaches from their experience with applications for digital technology in classrooms, museums, archives, in the field and with the general public. Offering potential answers to the issues of access and control from a variety of perspectives, the volume acknowledges that access is subject to competing interests of a variety of stakeholders. Museums, universities, archives, and some communities all place claims on how data can or cannot be shared through digital initiatives and, given the collaborative nature of most digital humanities projects, those in the field need to be cognizant of the various and often competing interests and rights that shape the nature of access and how it is controlled. Access and Control in Digital Humanities will be of interest to researchers, academics and graduate students working in a variety of fields, including digital humanities, library and information science, history, museum and heritage studies, conservation, English literature, geography and legal studies.
As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts, this book examines: The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websites Forms of criminal behavior that can be performed utilizing social networking websites Criminality via texting, identity theft, and hacking Adolescents as offenders and victims in cyberbullying and digital piracy Online sexual victimization, including child pornography and sexual solicitation of youth The book concludes by discussing law enforcement's response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders. Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system.
AN FT BUSINESS BOOK OF THE MONTH 'An essential read' Diane Coyle, University of Cambridge 'We are currently living in a moment of extreme pessimism about data. This book will change your mind.' It's impossible to escape digital technology. And with that comes fear. But whatever the news has told you about data and technology, think again. Data expert and tech insider turned Cambridge researcher Sam Gilbert shows that, actually, this data revolution could be the best thing that ever happened to us. Good Data examines the incredible new ways this information explosion is already helping us - whether that's combating inequality, creating jobs, advancing the frontiers of knowledge or protecting us from coronavirus. We are standing on the edge of greatness, we just need to know how to get there. 'A great read and really thought-provoking ... Challenges the surveillance capitalism narrative' Rory Cellan-Jones, BBC 'Good Data weaves some thorny issues into a story that is positive, interesting, easy to read and provides valuable insight' Peter Turner, Chief Commercial Officer, Avast
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
Sensing a future beyond work lurking in an age of crisis, the 'post-capitalist' utopias of today spread the idea of a permanent escape from work aided by the automation of production, a universal basic income and the reduction of working hours to zero. By skilfully unpicking the political economy of contemporary work and its futures, this book mounts a forceful critique of the post-work society vision. Dinerstein and Pitts reveal that transitional measures towards a world beyond work do not do enough to break away from the key features of capitalist society, and instead potentially stifle the capacity for transformative social change. Proposing an innovative alternative, the authors envision the construction of 'concrete utopias' that shape and anticipate non-capitalist futures.
This comprehensive guide for management professionals discusses the IT-related legal issues faced by businesses on a daily basis. Legal concepts and terminology are notoriously difficult for non-specialists, but this book explains in plain English the relevant legal frameworks and gives examples from actual cases. New material in this edition include chapters on GDPR, cyber security, cloud computing contracts and Agile.
AMAZON BEST BOOKS OF 2019 PICK FORTUNE WRITERS AND EDITORS' RECOMMENDED BOOKS OF 2019 PICK 'A tour de force, an engrossing fusion of scholarly research, professional experience and revelations from intrepid firsthand reporting' -- New York Times USER FRIENDLY is a must-read for anyone who loves well-designed products-and for the innovators aspiring to make them. It seems like magic when some new gadget seems to know what we want before we know ourselves. But why does some design feel intrinsically good, and why do some designs last forever, while others disappear? User Friendly guides readers through the hidden rules governing how design shapes our behaviour, told through fascinating stories such as what the nuclear accident at Three Mile Island reveals about the logic of the smartphone; how the pressures of the Great Depression and World War II created our faith in social progress through better product design; and how a failed vision for Disney World yielded a new paradigm for designed experience.
This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader.
Trust plays a critical part during the online shopping process. Engaging customers and building long-term brand trust is vital for enterprises that rely on e-commerce. But the rise of digital and social media platforms has created a new commercial environment, meaning current strategic models and branding practices are quickly becoming outdated and ineffectual. With greater corporate transparency, consumer empowerment and online activism come new commercial opportunities and pitfalls. Exploring both the positives and negatives, Digital Trust outlines the ways in which SMEs and e-SMEs can successfully and authentically engage within social media communities to influence their brand trust and reputation. Developed from the authors research, Digital Trust proposes new strategic models to create and reinforce consumer trust as well as build corporate value through social media platforms. The book provides an overview of how organizations can use these platforms to conduct their own research into increasing trust and engagement, with specific industry considerations taken into account, as well as explores the growing impact of e-currencies on businesses.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
'The most important book of 2022.' Dr. Robert Malone Desmet's work on mass formation theory was brought to the world's attention on The Joe Rogan Experience and in major alternative news outlets around the globe. Read this book to get beyond the sound bites! In The Psychology of Totalitarianism, world-renowned Professor of Clinical Psychology Mattias Desmet deconstructs the societal conditions that allow collective hypnosis to take hold. By analysing the global pandemic, he identifies the phenomenon of 'mass formation' and illustrates how humanity is being forcibly, unconsciously led into a reality of technocratic totalitarianism, which aggressively excludes alternative views and relies on destructive groupthink, vilifying non-conformist thought as 'dissident.' Building on Hannah Arendt's essential work on totalitarianism, The Origins of Totalitarianism, Desmet offers a sharp critique of the cultural 'groupthink' that existed pre-pandemic but has steadily and inexorably advanced during the Covid crisis. He cautions against the dangers of our current societal landscape, media consumption, and reliance on manipulative technologies, offering simple solutions - both individual and collective - to prevent the willing sacrifice of our ability to think critically. The Psychology of Totalitarianism serves as an indispensable and fundamental guide to understanding this key moment in history. 'Mattias Desmet's [theory of mass formation hypnosis] is great. . . . Once I kind of started to look for it, I saw it everywhere.' Eric Clapton
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment
Twenty-first-century culture is obsessed with books. In a time when many voices have joined to predict the death of print, books continue to resurface in new and unexpected ways. From the proliferation of "shelfies" to Jane Austen-themed leggings and from decorative pillows printed with beloved book covers to bookwork sculptures exhibited in prestigious collections, books are everywhere and are not just for reading. Writers have caught up with this trend: many contemporary novels depict books as central characters or fetishize paper and print thematically and formally. In Bookishness, Jessica Pressman examines the new status of the book as object and symbol. She explores the rise of "bookishness" as an identity and an aesthetic strategy that proliferates from store-window decor to experimental writing. Ranging from literature to kitsch objects, stop-motion animation films to book design, Pressman considers the multivalent meanings of books in contemporary culture. Books can represent shelter from-or a weapon against-the dangers of the digital; they can act as memorials and express a sense of loss. Examining the works of writers such as Jonathan Safran Foer, Jennifer Egan, Mark Z. Danielewski, and Leanne Shapton, Pressman illuminates the status of the book as a fetish object and its significance for understanding contemporary fakery. Bringing together media studies, book history, and literary criticism, Bookishness explains how books still give meaning to our lives in a digital age.
The book develops a general legal theory concerning the liability for offenses involving artificial intelligence systems. The involvement of the artificial intelligence systems in these offenses may be as perpetrators, accomplices or mere instruments. The general legal theory proposed in this book is based on the current criminal law in most modern legal systems. In most modern countries, unmanned vehicles, sophisticated surgical systems, industrial computing systems, trading algorithms and other artificial intelligence systems are commonly used for both industrial and personal purposes. The question of legal liability arises when something goes wrong, e.g. the unmanned vehicle is involved in a car accident, the surgical system is involved in a surgical error or the trading algorithm is involved in fraud, etc. Who is to be held liable for these offenses: the manufacturer, the programmer, the user, or, perhaps, the artificial intelligence system itself? The concept of liability for crimes involving artificial intelligence systems has not yet been widely researched. Advanced technologies are forcing society to face new challenges, both technical and legal. The idea of liability in the specific context of artificial intelligence systems is one such challenge that should be thoroughly explored.
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks. |
You may like...
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,719
Discovery Miles 137 190
Research Anthology on Social Media's…
Information Resources Management Association
Hardcover
R9,426
Discovery Miles 94 260
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
|