![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
How To Date Men When You Hate Men is a comedy philosophy book aimed at interrogating what it means to date men within the trappings of modern society. Blythe Roberson’s sharp observational humor is met by her open-hearted willingness to revel in the ugliest warts and shimmering highs of choosing to live our lives amongst other humans. She collects her crushes like ill cared-for pets, skewers her own suspect decisions, and assures readers that any date you can mess up, she can top tenfold. And really, was that date even a date in the first place? With sections like Real Interviews With Men About Whether Or Not It Was A Date; Good Flirts That Work; Bad Flirts That Do Not Work; and Definitive Proof That Tom Hanks Is The Villain Of You’ve Got Mail, How To Date Men When You Hate Men is a one stop shop for dating advice when you love men but don't like them.
The book develops a general legal theory concerning the liability for offenses involving artificial intelligence systems. The involvement of the artificial intelligence systems in these offenses may be as perpetrators, accomplices or mere instruments. The general legal theory proposed in this book is based on the current criminal law in most modern legal systems. In most modern countries, unmanned vehicles, sophisticated surgical systems, industrial computing systems, trading algorithms and other artificial intelligence systems are commonly used for both industrial and personal purposes. The question of legal liability arises when something goes wrong, e.g. the unmanned vehicle is involved in a car accident, the surgical system is involved in a surgical error or the trading algorithm is involved in fraud, etc. Who is to be held liable for these offenses: the manufacturer, the programmer, the user, or, perhaps, the artificial intelligence system itself? The concept of liability for crimes involving artificial intelligence systems has not yet been widely researched. Advanced technologies are forcing society to face new challenges, both technical and legal. The idea of liability in the specific context of artificial intelligence systems is one such challenge that should be thoroughly explored.
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
Despite 80% of business leaders thinking it important to make the most
of social media, 70% admitted that their efforts are currently
ineffective - CMI SURVEY.
The FT Guide to Social Media Strategy will help you understand how social media works, how to use it to build your networks and deliver business growth.
In the future, how many identities will you have? How many do you want? Digital technology is causing us to think differently about who we are and who we could become, but with the right knowledge we can turn this incredible capacity to our advantage. 'Who am I?' is one of the most fundamental questions of all. But it is becoming increasingly difficult to answer as technology enables us to negotiate and create many different versions of ourselves. In our digital, data-driven world, Facebook gets a say in verifying who we are, science can alter our biology, and advances in AI are revolutionizing not only how we interact online but with the physical world around us. Understanding and defining ourselves is becoming confusing but, as this fascinating book argues, it is possible to embrace this new era of transformation while preserving our autonomy. In The Future of You, Professional futurist Tracey Follows shows how our personal freedoms and potential will be transformed over the coming decades. From health passports, bio-hacking and relationships with machines to mind clones, digital voting and virtual legacies beyond the grave, we need to understand these vital issues today so that we might design the future of our identity tomorrow. 'This fascinating book explores the way that emerging technologies such as AI might affect the nature of personal identity and personhood. It paints an intriguing, thought-provoking, and occasionally disturbing picture.' Michael Wooldridge, author of The Road to Conscious
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.
The main interest of this research has been in understanding and characterizing large networks of human interactions as continuously changing objects. In fact, although many real social networks are dynamic networks whose elements and properties continuously change over time, traditional approaches to social network analysis are essentially static, thus neglecting all temporal aspects. Specifically, we have investigated the role that temporal patterns of human interaction play in three main fields of social network analysis and data mining: characterization of time (or attention) allocation in social networks, prediction of link decay/persistence, and information spreading. In order to address this we analyzed large anonymized data sets of phone call communication traces over long periods of time. Access to these observations was granted by Telefonica Research, Spain. The findings that emerge from our research indicate that the observed heterogeneities and correlations of human temporal patterns of interaction significantly affect the traditional view of social networks, shifting from a very steady to a highly complex entity. Since structure and dynamics are tightly coupled, they cannot be disentangled in the analysis and modeling of human behavior, though traditional models seek to do so. Our results impact not only the way in which social network are traditionally characterized, but more importantly also the understanding and modeling phenomena such as group formation, spread of epidemics, and the dissemination of ideas, opinions and information.
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
Digital influencing is one of the most exciting and disruptive new media industries, forecast to be worth over GBP10bn by 2020. Influencers now dominate the digital world and, when it comes to growth, they are consistently outperforming traditional media and brand advertising. Despite their prominence, digital influencers continue to be misunderstood and undervalued by many people, as those charged with incorporating the influencer space into their digital strategy rarely comprehend how this extremely powerful industry works. As one of the leading authorities on the influencer space, Sara McCorquodale demystifies exactly how it operates, as she interrogates the phenomenon, analyses its problems and forecasts its future. Influence draws upon first-hand interviews with world-renowned influencers, providing an invaluable insight into the inner-workings of digital culture and how it can best be used as an effective marketing and branding platform. This compelling guide on how to effectively identify and utilise the power of influencers is a must-read for anyone who wants their business to succeed and prosper online.
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.
What happens when the internet is absorbed into everyday life? How do we make sense of something that is invisible but still so central? A group of digital culture experts address these questions in Metaphors of Internet: Ways of Being in the Age of Ubiquity. Twenty years ago, the internet was imagined as standing apart from humans. Metaphorically it was a frontier to explore, a virtual world to experiment in, an ultra-high-speed information superhighway. Many popular metaphors have fallen out of use, while new ones arise all the time. Today we speak of data lakes, clouds and AI. The essays and artwork in this book evoke the mundane, the visceral, and the transformative potential of the internet by exploring the currently dominant metaphors. Together they tell a story of kaleidoscopic diversity of how we experience the internet, offering a richly textured glimpse of how the internet has both disappeared and at the same time, has fundamentally transformed everyday social customs, work, and life, death, politics, and embodiment.
Die Themen 'Flucht und Asyl' dominieren seit dem langen Sommer der Migration 2015 die Nachrichtenagenda. Neben den stereotypisierten entmenschlichenden Massendarstellungen der fruhen visuellen Berichterstattungen ist von besonderem Interesse, inwiefern Gefluchtete im Zuge der Arbeitsmarktintegration 2015 bis 2018 dargestellt werden. Anhand eines Mixed Methods Designs, einer visuellen Diskursanalyse und einem Online-Experiment, sollen idealtypische Reprasentationen extrahiert und die emotionalen Wirkungen auf die Mediennutzer*innen untersucht werden. Es wird deutlich, dass vor allem anzugtragende, weisse und mannliche Politiker den Diskurs dominieren. Soziodemografische Aspekte haben keinen signifikanten Einfluss auf die Wahrnehmung von Integrationsmassnahmen auf dem Arbeitsmarkt, wohingegen der Kontakt mit Fluchtlingen eine negative Wirkung hat.
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.
The book that every parent needs. Written by the expert child psychologist, Dr Elizabeth Kilbey, from Channel 4's The Secret Life of 4, 5 and 6 Year Olds. 'Children who get too much screen time are at risk of anxiety disorders' - BBC News This is the book that every parent with a child under the age of 11 (in the latency stage of brain development) needs in order to navigate the tricky pathway of how much screen time to allow on a daily basis. Play has gone from a physical, creative experience using toys and imagination to something that now involves sitting down alone for hours at a time. Parents are dealing with children who don't listen to them, who are unable to concentrate for very long, who refuse to do homework and who constantly battle against them for more screen time. In this book, Dr Elizabeth Kilbey will offer tangible, practical advice about how to 'unplug' your child from their device so their online time doesn't become all-consuming and how we, as parents, can plug in to connect with our children.
This book covers blockchain from the underlying principles to how it enables applications to survive and surf on its shoulder. Having covered the fundamentals of blockchain, the book turns to cryptocurrency. It thoroughly examines Bitcoin before presenting six other major currencies in a rounded discussion. The book then bridges between technology and finance, concentrating on how blockchain-based applications, including cryptocurrencies, have pushed hard against mainstream industries in a bid to cement their positions permanent. It discusses blockchain as underlying banking technology, crypto mining and offering, cryptocurrency as investment instruments, crypto regulations, and markets.
New Media, Communication, and Society is a fast, straightforward examination of key topics which will be useful and engaging for both students and professors. It connects students to wide-ranging resources and challenges them to develop their own opinions. Moreover, it encourages students to develop media literacy so they can speak up and make a difference in the world. Short chapters with lots of illustrations encourage reading and provide a springboard for conversation inside and outside of the classroom. Wide-ranging topics spark interest. Chapters include suggestions for additional exploration, a media literacy exercise, and a point that is just for fun. Every chapter includes thought leaders, ranging from leading researchers to business leaders to entrepreneurs, from Socrates to Doug Rushkoff and Lance Strate to Bill Gates.
Want to make money online? Then ignore social media at your own risk. Social media is vital if you want to your business to thrive, and though you can't control the conversations, you can influence them. This book will teach you how. If mismanaged, social media can create more noise than signal. It can be a time and energy suck - for you and your audience. Or worse still, it can become an echo chamber for negative PR. If done well, guerrilla social media marketing can help you persuade, command attention, establish dialogue, differentiate yourself, capture new markets, and outmaneuver the competition - all on a shoestring budget. Whether you're selling digital goods and services, physical goods, or local services, this book has the answers. Strategize and optimize your social presence in ways you didn't know were possible Drive more clicks and sales with better-performing Facebook ads Develop remarkable content with viral potential Manage your online reputation, instead of letting it manage you Integrate social media into your SEO strategy, and vice versa Leverage online influencers to promote your brand, and become an influencer yourself
One of the first edited collections devoted exclusively to digital comics, Perspectives on Digital Comics demonstrates the varied ways one can read, interpret, view, and use digital comics. These original essays discuss digital comics made specifically for web consumption, digital reproductions of print-comics, and scanned comics. Written for those who may not be familiar with digital comics and/or digital comic scholarship, the contributors explore theories for understanding and reading digital comics, criticism and analysis of specific digital comic titles, the global reach of digital comics, and how digital comics can be used in educational settings.
Grab your phone and your friends and start making fame-worthy content today! Get TikTok Famous Fast is a bite-sized guide to building your own empire on TikTok and using it as a launchpad for your personal brand and media career. Top TikTok stars and industry insiders provide their tips on how be a hit, how to make your content the best possible, how to tap into the latest memes and trends, how to edit and - most importantly - how to grow your following.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation. |
You may like...
Security in IoT Social Networks
Fadi Al-Turjman, B.D. Deebak
Paperback
R2,634
Discovery Miles 26 340
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Research Anthology on Applying Social…
Information R Management Association
Hardcover
R8,997
Discovery Miles 89 970
Research Anthology on Social Media's…
Information Resources Management Association
Hardcover
R9,426
Discovery Miles 94 260
|