Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
Are you considering a career in social media? Are you an entrepreneur or freelancer looking to boost your online content marketing? Maybe you're looking for your next career pivot, or you're simply seeking skills to give your CV that competitive edge? Wherever you are in your career, Confident Digital Content can help. Covering the essentials of online content, this book takes you through everything you need to know - from how to write effectively for online platforms, to video, audio, graphic design and photography. Featuring inspiring case studies from individuals at companies including CNN International, Mumsnet, Bunster's Hot Sauce and HuffPost UK, this practical beginner's guide includes guidance on content marketing strategy, metrics and community management. This updated second edition also features advice on the latest trends, including fake news, the importance of stories, and social listening analysis, and a new chapter on campaign planning for digital. Though trends, fads and hashtags change, the principles of great online content remain the same - let Confident Digital Content give you the grounding you need to ace your social channels and supercharge your career. About the Confident series... From coding and web design to data, digital content and cyber security, the Confident books are the perfect beginner's resource for enhancing your professional life, whatever your career path.
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
Continuing the explorations begun in the first two Produsing Theory volumes, this book investigates some of the tensions generated in the spaces enabled by the confluence of the formerly disparate activities of producing and consuming media. Multiple and varied theories-some still emerging-are invoked in attempts to illuminate the spaces between what previously had been neatly-separated components of media systems. This book is useful in a number of courses such as media culture and theory, introduction to new media, the Internet and the audience, new media theory and research, mass communication theory, emerging media, critical analysis and new media, concepts of new media, new media participants, new media in a democratic society, critical studies in new media, new media and social media, digital media studies, participatory media, media audiences in a digital world, digital cultures and social media, Web culture and new media studies, introduction to new media, new media and society, and more.
The Oxford Handbook of Philosophy of Technology gives readers a view into this increasingly vital and urgently needed domain of philosophical understanding, offering an in-depth collection of leading and emerging voices in the philosophy of technology. The thirty-two contributions in this volume cut across and connect diverse philosophical traditions and methodologies. They reveal the often-neglected importance of technology for virtually every subfield of philosophy, including ethics, epistemology, philosophy of science, metaphysics, aesthetics, philosophy of language, and political theory. The Handbook also gives readers a new sense of what philosophy looks like when fully engaged with the disciplines and domains of knowledge that continue to transform the material and practical features and affordances of our world, including engineering, arts and design, computing, and the physical and social sciences. The chapters reveal enduring conceptual themes concerning technology's role in the shaping of human knowledge, identity, power, values, and freedom, while bringing a philosophical lens to the profound transformations of our existence brought by innovations ranging from biotechnology and nuclear engineering to artificial intelligence, virtual reality, and robotics. This new collection challenges the reader with provocative and original insights on the history, concepts, problems, and questions to be brought to bear upon humanity's complex and evolving relationship to technology.
This important text/reference presents the first dedicated review of techniques for contactless 3D fingerprint identification, including novel and previously unpublished research. The text provides a systematic introduction to 3D fingerprint identification, covering the latest advancements in contactless 2D and 3D sensing technologies, and detailed discussions on each key aspect in the development of an effective 3D fingerprint identification system. Topics and features: introduces the key concepts and trends in the acquisition and identification of fingerprint images, and a range of 3D fingerprint imaging techniques; proposes a low-cost method for online 3D fingerprint image acquisition, and an efficient 3D fingerprint imaging approach using coloured photometric stereo; describes pre-processing operations on point cloud 3D fingerprint data, and explains the specialized operations for reconstructing 3D fingerprints from live finger scans; examines the representation of minutiae in 3D space, providing details on recovering these features from point cloud data, and on matching such 3D minutiae templates; reviews various 3D fingerprint matching methods, including binary surface code-based approaches and a tetrahedron-based matching approach; discusses the uniqueness of 3D fingerprints, evaluating the benefits of employing 3D fingerprint identification over conventional 2D fingerprint techniques. This unique work is a must-read for all researchers seeking to make further advances in this area, towards the exciting opportunities afforded by contactless 3D fingerprint identification for improving the hygiene, user convenience, and matching accuracy of fingerprint biometric technologies.
This book presents a comparative study on access to public information in the context of the main legal orders worldwide(inter alia China,France,Germany,Japan,Russia,Sweden,United States).The international team of authors analyzes the Transparency- and Freedom-to-Information legislation with regard to the scope of the right to access, limitations of this right inherent in the respective national laws, the procedure, the relationship with domestic legislation on administrative procedure, as well as judicial protection. It particularly focuses on the Brazilian law establishing the right of access to information, which is interpreted as a benchmark for regulations in other Latin-American states.
The new edition of Digital Learning: The Key Concepts is the perfect reference for anyone seeking to navigate the myriad of named concepts, approaches, issues and technologies associated with digital learning. Key terms are explained succinctly, making this book ideal to dip into for a quick answer, or to read from cover-to-cover, in order to gain a mastery of how digital concepts fit within the world of education. Fully updated to include important developments in digital practice and technology in education over the last ten years, this book takes the reader from A to Z through a range of relevant topics including: * Course design * Digital scholarship * Learning design * Open education * Personal learning environments * Social media and social networking. Ideal as an introductory guide, or as a reference book for ongoing referral, this quick-to-use and comprehensive guide is fully crossreferenced and complete with suggestions for further reading and exploration, making it an essential resource for anyone looking to extend their understanding of digital practices, techniques and pedagogic concepts.
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.
This book constitutes the refereed proceedings of the 14th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2018, held in Athens, Greece, in June 2018. The 14 revised full papers and 2 short papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of free/libre open source software (FLOSS) and are organized in the following thematic sections: organizational aspects of OSS projects, OSS projects validity, mining OSS data, OSS in public administration, OSS governance, and OSS reusability.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
New Media, Communication, and Society is a fast, straightforward examination of key topics which will be useful and engaging for both students and professors. It connects students to wide-ranging resources and challenges them to develop their own opinions. Moreover, it encourages students to develop media literacy so they can speak up and make a difference in the world. Short chapters with lots of illustrations encourage reading and provide a springboard for conversation inside and outside of the classroom. Wide-ranging topics spark interest. Chapters include suggestions for additional exploration, a media literacy exercise, and a point that is just for fun. Every chapter includes thought leaders, ranging from leading researchers to business leaders to entrepreneurs, from Socrates to Doug Rushkoff and Lance Strate to Bill Gates.
Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.2, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row. You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.2, you can improve your productivity and regain your focus. This book will show you how. This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10. Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system. Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
The scope of criminal justice surveillance, from the police to the prisons, has expanded rapidly in recent decades. At the same time, the use of big data has spread across a range of fields, including finance, politics, health, and marketing. While law enforcement's use of big data is hotly contested, very little is known about how the police actually use it in daily operations and with what consequences. In Predict and Surveil, Sarah Brayne offers an unprecedented, inside look at how police use big data and new surveillance technologies, leveraging on-the-ground fieldwork with one of the most technologically advanced law enforcement agencies in the world-the Los Angeles Police Department. Drawing on original interviews and ethnographic observations from over two years of fieldwork with the LAPD, Brayne examines the causes and consequences of big data and algorithmic control. She reveals how the police use predictive analytics and new surveillance technologies to deploy resources, identify criminal suspects, and conduct investigations; how the adoption of big data analytics transforms police organizational practices; and how the police themselves respond to these new data-driven practices. While big data analytics has the potential to reduce bias, increase efficiency, and improve prediction accuracy, Brayne argues that it also reproduces and deepens existing patterns of inequality, threatens privacy, and challenges civil liberties. A groundbreaking examination of big data policing, this book challenges the way we think about the data-driven supervision law enforcement increasingly imposes upon civilians in the name of objectivity, transparency, and twenty-first century policing.
The main interest of this research has been in understanding and characterizing large networks of human interactions as continuously changing objects. In fact, although many real social networks are dynamic networks whose elements and properties continuously change over time, traditional approaches to social network analysis are essentially static, thus neglecting all temporal aspects. Specifically, we have investigated the role that temporal patterns of human interaction play in three main fields of social network analysis and data mining: characterization of time (or attention) allocation in social networks, prediction of link decay/persistence, and information spreading. In order to address this we analyzed large anonymized data sets of phone call communication traces over long periods of time. Access to these observations was granted by Telefonica Research, Spain. The findings that emerge from our research indicate that the observed heterogeneities and correlations of human temporal patterns of interaction significantly affect the traditional view of social networks, shifting from a very steady to a highly complex entity. Since structure and dynamics are tightly coupled, they cannot be disentangled in the analysis and modeling of human behavior, though traditional models seek to do so. Our results impact not only the way in which social network are traditionally characterized, but more importantly also the understanding and modeling phenomena such as group formation, spread of epidemics, and the dissemination of ideas, opinions and information.
This book offers guidance for US-based IT businesses on both sides of the Atlantic when dealing with big data and government data, since transatlantic data flows are key to the success of these enterprises. It offers practical insights into many of the data-protection challenges US companies in various industries face when seeking to comply with US and EU data-protection laws, and analyses the potential conflicts in the light of their risks and the way in which US-based cloud providers react to the uncertainties of the applicable data-protection rules. The book particularly focuses on the insights derived from a qualitative study conducted in 2016 with various cloud-based IT businesses in the Silicon Valley area, which shows the diversity of views on data protection and the many approaches companies take to this topic. Further, it discusses key data-protection issues in the field of big data and government data.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.
This book examines the ability of citizens across ten European countries to exercise their democratic rights to access their personal data. It presents a socio-legal research project, with the researchers acting as citizens, or data subjects, and using ethnographic data collection methods. The research presented here evidences a myriad of strategies and discourses employed by a range of public and private sector organizations as they obstruct and restrict citizens' attempts to exercise their informational rights. The book also provides an up-to-date legal analysis of legal frameworks across Europe concerning access rights and makes several policy recommendations in the area of informational rights. It provides a unique and unparalleled study of the law in action which uncovered the obstacles that citizens encounter if they try to find out what personal data public and private sector organisations collect and store about them, how they process it, and with whom they share it. These are simple questions to ask, and the right to do so is enshrined in law, but getting answers to these questions was met by a raft of strategies which effectively denied citizens their rights. The book documents in rich ethnographic detail the manner in which these discourses of denial played out in the ten countries involved, and explores in depth the implications for policy and regulatory reform.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation.
This edited collection explores ways to better understand the rhetorical workings of political executives, especially the United States president. Scholars of the presidency, rhetorical theorists and critics, and various authors examine the ways in which presidents use the institution, the media, and popular culture to instantiate, expand, and wield executive power.
One of the first edited collections devoted exclusively to digital comics, Perspectives on Digital Comics demonstrates the varied ways one can read, interpret, view, and use digital comics. These original essays discuss digital comics made specifically for web consumption, digital reproductions of print-comics, and scanned comics. Written for those who may not be familiar with digital comics and/or digital comic scholarship, the contributors explore theories for understanding and reading digital comics, criticism and analysis of specific digital comic titles, the global reach of digital comics, and how digital comics can be used in educational settings. |
You may like...
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R6,078
Discovery Miles 60 780
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,015
Discovery Miles 30 150
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R639
Discovery Miles 6 390
Research Handbook on the Law of Virtual…
Woodrow Barfield, Marc J. Blitz
Paperback
R1,612
Discovery Miles 16 120
|