|
Books > Computing & IT > Social & legal aspects of computing > General
The optimization of traffic management operations has become a
considerable challenge in today's global scope due to the
significant increase in the number of vehicles, traffic
congestions, and automobile accidents. Fortunately, there has been
substantial progress in the application of intelligent computing
devices to transportation processes. Vehicular ad-hoc networks
(VANETs) are a specific practice that merges the connectivity of
wireless technologies with smart vehicles. Despite its relevance,
empirical research is lacking on the developments being made in
VANETs and how certain intelligent technologies are being applied
within transportation systems. IoT and Cloud Computing Advancements
in Vehicular Ad-Hoc Networks provides emerging research exploring
the theoretical and practical aspects of intelligent transportation
systems and analyzing the modern techniques that are being applied
to smart vehicles through cloud technology. Featuring coverage on a
broad range of topics such as health monitoring, node localization,
and fault tolerance, this book is ideally designed for network
designers, developers, analysists, IT specialists, computing
professionals, researchers, academics, and post-graduate students
seeking current research on emerging computing concepts and
developments in vehicular ad-hoc networks.
Using a multi-disciplinary and comparative approach, this study
examines emerging and innovative attempts to tackle privacy and
legal issues in cloud computing such as personal data privacy,
security and intellectual property protection. An international
team of legal scholars, computer science researchers, regulators
and practitioners present original and critical responses to the
growing challenges posed by cloud computing. They analyze the
specific legal implications pertaining to jurisdiction, biomedical
practice and information ownership, as well as issues of regulatory
control, competition and cross-border regulation. Law academics,
practitioners and regulators will find this book to be a valuable,
practical and accessible resource, as will computer science
scholars interested in cloud computing issues. Contributors: H.
Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y.
Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny,
C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu
With near-universal internet access and ever-advancing electronic
devices, the ability to facilitate interactions between various
hardware and software provides endless possibilities. Though
internet of things (IoT) technology is becoming more popular among
individual users and companies, more potential applications of this
technology are being sought every day. There is a need for studies
and reviews that discuss the methodologies, concepts, and possible
problems of a technology that requires little or no human
interaction between systems. The Handbook of Research on the
Internet of Things Applications in Robotics and Automation is a
pivotal reference source on the methods and uses of advancing IoT
technology. While highlighting topics including traffic information
systems, home security, and automatic parking, this book is ideally
designed for network analysts, telecommunication system designers,
engineers, academicians, technology specialists, practitioners,
researchers, students, and software developers seeking current
research on the trends and functions of this life-changing
technology.
User opinions about service experiences have been extensively
acknowledged to play a key role in influencing the consumption
decisions of other customers. The widespread adoption of internet
technologies has amplified enormously the volume and the potential
impact of such customer-generated content in the form of electronic
word-of-mouth (eWOM). Exploring the Power of Electronic
Word-of-Mouth in the Services Industry is an essential research
book that explores the importance of consumer perception and the
influence of word-of-mouth in the digital world. Featuring a range
of topics such as data mining, online engagement, and social media,
this book is ideal for academicians, researchers, IT developers,
marketers, managers, media specialists, and professionals.
As the internet and its applications grow more sophisticated and
widespread, so too do the strategies of modern terrorist groups.
The existence of the dark web adds to the online arsenal of groups
using digital networks and sites to promulgate ideology or recruit
supporters. It is necessary to understand how terrorist cells are
using and adapting online tools in order to counteract their
efforts. Utilization of New Technologies in Global Terror: Emerging
Research and Opportunities is an informative resource that explores
new developments in technological advancements and the progression
of terror organizations while also examining non-government
activist organizations and their new role in protecting internet
freedom and combating cyberterrorism. Featuring relevant topics
such as social media, cyber threats, and counterterrorism, this
publication will benefit government officials, political
scientists, policymakers, researchers, academicians, and graduate
students interested in political science, mass communication, and
cyberwarfare.
Scientific experiments and medical improvements in recent years
have augmented our bodies, made them manipulable; our personal data
have been downloaded, stored, sold, analyzed; and the pandemic has
given new meaning to the idea of 'virtual presence'. Such phenomena
are often thought to belong to the era of the 'posthuman', an era
that both promises and threatens to redefine the notion of the
human: what does it mean to be human? Can technological advances
impact the way we define ourselves as a species? What will the
future of humankind look like? These questions have gained urgency
in recent years, and continue to preoccupy cultural and legal
practitioners alike. How can the law respond and adapt to a world
shaped by technology and AI? How can it ensure that technological
developments remain inclusive, while simultaneously enforcing
ethical limits to its reach? The volume explores how fictional
texts, whether on the page or on screen, negotiate the legal
dilemmas posed by the increasing infiltration of technology into
modern life.
Knowledge is a valuable resource that must be managed well for any
organization to thrive. Proper knowledge management can improve
business processes by creating value, yet the available tools meant
to aid in the creation, collection, and storage of information have
drastically changed since the emergence of social media. By using
this collaborative online application for engaging with
information, organizations are able to precisely decimate knowledge
to the correct audience. Harnessing Social Media as a Knowledge
Management Tool addresses the challenges and rewards of the proper
use of social media, as well as the key enablers and barriers of
its application. This publication endeavors to provide thorough
insight into the role of social media in knowledge management from
both an organizational and individual perspective. This book
elucidates emerging strategies perfect for policy makers, managers,
advertisers, academics, students, and organizations who wish to
optimize performance.
Researchers have harnessed the flood of personal information and
opinions shared on social media platforms in a variety of ways.
People communicate not only what they imagine they are purposely
sharing but also unintentionally leak information, which allows
others to glimpse a sense of the subconscious and unconscious at a
macro level. Electronic Hive Minds on Social Media: Emerging
Research and Opportunities explores various research techniques to
profile the electronic hive mind around social topics as expressed
on various modalities of social media, from human, bot, and cyborg
social media accounts, and proposes new research methods for
harnessing public data from social media platforms. Highlighting
topics such as knowledge sharing, swarm intelligence, and social
psychology, this publication is designed for researchers, social
psychologists, practitioners, and students in marketing,
communications, mass media, and similar fields.
Intellectual property goods are frequently referred to as
intangible or abstract. Yet, traditionally, they have almost always
needed to be embodied or materialized in order to be protected (and
- to a certain extent - to be used and enjoyed), regardless of
whether they are copyrighted works, patented inventions or
trademarks. With a focus on the issue of access and the challenges
of new technologies such as biotechnology and digital technologies,
this unique collection analyzes the relationship between
intellectual property and its physical embodiments. It contains a
mixture of theoretical and practical perspectives and encompasses
an interdisciplinary approach, including chapters on the connection
between intellectual property and cultural heritage law, cultural
property law and international trade law. The book furthermore
comprises historical reflections that illuminate how intellectual
property has never been purely about the intangible. Intellectual
Property and Access to Im/material Goods will be of interest to
scholars, practitioners and law and policymakers. Users of
intellectual property goods such as museums, libraries, archives
and/or other cultural institutions, as well as users of
biomaterials, copyrighted works, patented inventions and/or
trademarked goods will find value in this book. Contributors
include: C.E. Bell, M. Blakeney, D.L. Burk, S. Corbett, S. Frankel,
M.J. Madison, A. McMahon, A. Pottage, L.K. Skorodenski, G.
Spedicato, P.K. Yu
This book uses literature as a wrench to pry open social networks
and to ask different questions than have been asked about social
networks previously. The book emphasizes the story-telling aspect
of social networks, as well as the connection between narrative and
social networks by incorporating narrative, dynamic networks, and
time. Thus, it constructs a bridge between literature, digital
humanities, and social networks. This book is a pioneering work
that attempts to express social and philosophic constructs in
mathematical terms. The material used to test the algorithms is
texts intended for performance, such as plays, film scripts, and
radio plays; mathematical representations of the texts, or
"literature networks", are then used to analyze the social networks
found in the respective texts. By using literature networks and
their accompanying narratives, along with their supporting
analyses, this book allows for a novel approach to social network
analysis.
This book is open access and available on
www.bloomsburycollections.com. It is funded by the University of
Sussex, UK. How can we know about children's everyday lives in a
digitally saturated world? What is it like to grow up in and
through new media? What happens between the ages of 7 and 15 and
does it make sense to think of maturation as mediated? These
questions are explored in this innovative book, which synthesizes
empirical documentation of children's everyday lives with
discussions of key theoretical and methodological concepts to
provide a unique guide to researching childhood and youth.
Researching Everyday Childhoods begins by asking what recent
'post-empirical' and 'post-digital' frameworks can offer
researchers of children and young people's lives, particularly in
researching and theorising how the digital remakes childhood and
youth. The key ideas of time, technology and documentation are then
introduced and are woven throughout the book's chapters.
Research-led, the book is informed by two state of the art
empirical studies - 'Face 2 Face' and 'Curating Childhoods' - and
links to a dynamic multimedia archive generated by the studies.
|
|