Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
This book discusses all critical privacy and data protection aspects of biometric systems from a legal perspective. It contains a systematic and complete analysis of the many issues raised by these systems based on examples worldwide and provides several recommendations for a transnational regulatory framework. An appropriate legal framework is in most countries not yet in place. Biometric systems use facial images, fingerprints, iris and/or voice in an automated way to identify or to verify (identity) claims of persons. The treatise which has an interdisciplinary approach starts with explaining the functioning of biometric systems in general terms for non-specialists. It continues with a description of the legal nature of biometric data and makes a comparison with DNA and biological material and the regulation thereof. After describing the risks, the work further reviews the opinions of data protection authorities in relation to biometric systems and current and future (EU) law. A detailed legal comparative analysis is made of the situation in Belgium, France and the Netherlands. The author concludes with an evaluation of the proportionality principle and the application of data protection law to biometric data processing operations, mainly in the private sector. Pleading for more safeguards in legislation, the author makes several suggestions for a regulatory framework aiming at reducing the risks of biometric systems. They include limitations to the collection and storage of biometric data as well as technical measures, which could influence the proportionality of the processing. The text is supported by several figures and tables providing a summary of particular points of the discussion. The book also uses the 2012 biometric vocabulary adopted by ISO and contains an extensive bibliography and literature sources.
Remote working is the new reality, and transactional work - provided by freelancers, contract employees or consultants - has increased exponentially. It is forecast that as much as half the labor force will be working independently and virtually by 2020. Most organizations are still grappling with how to effectively manage their virtual staff and how to effectively support and motivate them - an increasingly urgent task as more Millennials join the workforce, bringing changed attitudes to work satisfaction. This book, the fruit of the author's three decades of experience planning and implementing remote working environments, provides expert guidance for anyone planning a shift to remote working, managing teams of teleworkers, or themselves working in a virtual team. The author's key message is that, in an environment where there is no face to face and informal contact, virtual working requires the creation of a matrix of distributed teams, and that their success depends on the right preparation, changing corporate culture and rewards, and implementing appropriate strategies at the management level to create team cohesion and motivate team members. Working Virtually is for the executive leading changes in an enterprise that is preparing for virtual work or seeking to improve current performance. It offers tools to assess readiness, advice on creating appropriate reward policies, and strategies to adapt performance management processes to be more team-driven and technology leveraged. Working Virtually is written to and for the virtual leader who wants to establish high performing virtual teams. It provides an understanding of the roles and responsibilities of managing a virtual team, offering a wealth of advice on creating the conditions for collaboration, motivating team members, and identifying and defusing problems. Working Virtually is for the professional who works remotely from home, on the road, or in an office with remote colleagues. It is for anyone who wants to succeed in this new work environment by developing skills and networks to create a sustained and satisfying career path. With this new edition providing a 360 Degrees view of the roles and objectives of all stakeholders in the virtual workspace, this book uniquely provides readers with a rounded picture of the policies, processes, work habits, and commitments needed to achieve the shared goal of high performance remote teams.
Remote working is the new reality, and transactional work - provided by freelancers, contract employees or consultants - has increased exponentially. It is forecast that as much as half the labor force will be working independently and virtually by 2020. Most organizations are still grappling with how to effectively manage their virtual staff and how to effectively support and motivate them - an increasingly urgent task as more Millennials join the workforce, bringing changed attitudes to work satisfaction. This book, the fruit of the author's three decades of experience planning and implementing remote working environments, provides expert guidance for anyone planning a shift to remote working, managing teams of teleworkers, or themselves working in a virtual team. The author's key message is that, in an environment where there is no face to face and informal contact, virtual working requires the creation of a matrix of distributed teams, and that their success depends on the right preparation, changing corporate culture and rewards, and implementing appropriate strategies at the management level to create team cohesion and motivate team members. Working Virtually is for the executive leading changes in an enterprise that is preparing for virtual work or seeking to improve current performance. It offers tools to assess readiness, advice on creating appropriate reward policies, and strategies to adapt performance management processes to be more team-driven and technology leveraged. Working Virtually is written to and for the virtual leader who wants to establish high performing virtual teams. It provides an understanding of the roles and responsibilities of managing a virtual team, offering a wealth of advice on creating the conditions for collaboration, motivating team members, and identifying and defusing problems. Working Virtually is for the professional who works remotely from home, on the road, or in an office with remote colleagues. It is for anyone who wants to succeed in this new work environment by developing skills and networks to create a sustained and satisfying career path. With this new edition providing a 360 Degrees view of the roles and objectives of all stakeholders in the virtual workspace, this book uniquely provides readers with a rounded picture of the policies, processes, work habits, and commitments needed to achieve the shared goal of high performance remote teams.
Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.
Sex in college has never been simple. And with modern technology, the rising rates of sexual assault and STDs, and an increasingly ambiguous hookup culture, it is getting ever more complex. Sex, College, and Social Media: A Commonsense Guide to Navigating the Hookup Culture is a compassionate, funny, and well-researched primer for the modern college student, both male and female. It covers a range of topics, including: * How improved communication can make sex better for everyone * Ways that porn and the media have warped our expectations * Trustworthy information about STDs and contraception * How to have a healthy relationship with alcohol and drugs * What terminology is appropriate and respectful to use for all things LGBTQ * The facts about sexual assault on campus, and what to do if you or someone you know is assaulted * Consent * and much more Based on author Cindy Pierce's experience talking to college students and on extensive social and medical research, Sex, College, and Social Media provides trustworthy answers for pressing questions about all aspects of the college social scene. It will prepare entering freshmen for their new environment and continue to provide helpful and supportive guidance through senior year and beyond.
This book constitutes the proceedings of the Fourth International Conference on Analysis of Images, Social Networks and Texts, AIST 2015, held in Yekaterinburg, Russia, in April 2015. The 24 full and 8 short papers were carefully reviewed and selected from 140 submissions. The papers are organized in topical sections on analysis of images and videos; pattern recognition and machine learning; social network analysis; text mining and natural language processing.
For outdoor adventurers who hike, fish, kayak, cross-country ski, or mountain bike in the backcountry, a GPS receiver can help them reach their destination and return safely -- but only if they know how to use it! Here is the guide to getting the most out of a GPS receiver, from basic consumer advice to advanced techniques. It even includes fun solo and team games that utilize GPS. Starting with essential definitions and moving on to creating waypoints, and using your GPS with a computer, this succinct book teaches the basics of navigation and outdoor GPS use. Advanced techniques are covered, such as creating custom maps, and new technologies are discussed, including using GPS-enabled mobile phones, and how to use GPS with Google Earth and Google Maps. With years of experience as a GPS instructor, Hinch is well-versed in all aspects of navigation and GPS use, and he covers them in a jargon-free, easy-to-follow style.
Micronesia, Hawaii, Polynesia, Bora Bora, Seychelles, Maldives, Australia - where does the mind go when imagining such places. Drawn from the best travel blogs and Instagram images, this book brings together the most beautiful locations near, on, or under water. From eco resorts to remote, pristine islands; from sailing on ultra-blue oceans to diving in translucent waters; in aerial and underwater photography, the focus is on finding paradise. Whether thinking about a trip or longing for sun and sand, this book is where those daydreams begin.
This book is a thorough treatise concerned with coherence and its significance in legal reasoning. The individual chapters present the topic from the general philosophical perspective, the perspective of legal-theory as well as the viewpoint of cognitive sciences and the research on artificial intelligence and law. As it has turned out the interchange of knowledge among these disciplines is very fruitful for each of them, providing mutual inspiration and increasing understanding of a given topic. This book is a unique resource for anyone interested in the concept of coherence and the role it plays in reasoning. As this book captures important contemporary issues concerning the ongoing discussion on coherence and law, those interested in legal reasoning should find it particularly helpful. By presenting such a broad scope of views and methods on approaching the issue of coherence we hope to promote the general interest in the topic as well as the academic research that centers around coherence and law.
The main interest of this research has been in understanding and characterizing large networks of human interactions as continuously changing objects. In fact, although many real social networks are dynamic networks whose elements and properties continuously change over time, traditional approaches to social network analysis are essentially static, thus neglecting all temporal aspects. Specifically, we have investigated the role that temporal patterns of human interaction play in three main fields of social network analysis and data mining: characterization of time (or attention) allocation in social networks, prediction of link decay/persistence, and information spreading. In order to address this we analyzed large anonymized data sets of phone call communication traces over long periods of time. Access to these observations was granted by Telefonica Research, Spain. The findings that emerge from our research indicate that the observed heterogeneities and correlations of human temporal patterns of interaction significantly affect the traditional view of social networks, shifting from a very steady to a highly complex entity. Since structure and dynamics are tightly coupled, they cannot be disentangled in the analysis and modeling of human behavior, though traditional models seek to do so. Our results impact not only the way in which social network are traditionally characterized, but more importantly also the understanding and modeling phenomena such as group formation, spread of epidemics, and the dissemination of ideas, opinions and information.
The ever increasing use of computers, networks and the Internet has led to the need for regulation in the fields of cybercrime, cybersecurity and national security. This SpringerBrief provides insights into the development of self- and co-regulatory approaches to cybercrime and cybersecurity in the multi-stakeholder environment. It highlights the differences concerning the ecosystem of stakeholders involved in each area and covers government supported initiatives to motivate industry to adopt self-regulation. Including a review of the drawbacks of existing forms of public-private collaboration, which can be attributed to a specific area (cybercrime, cybersecurity and national security), it provides some suggestions with regard to the way forward in self- and co-regulation in securing cyberspace.
The book deals with data protection issues from practical viewpoints. 40% of the content focus on the Malaysian Personal Data Protection Act (PDPA) 2010 progress, whilst 60% of the content focus on leading comparative practical guidance from Europe. Part of the PDPA provisions is mirrored from European approaches and practices. The approach of this book is straightforward, handy and readable and is supplemented by practical applications, illustrations, tables and diagrams. Practical examples highlighted in this book range from cloud computing, radio frequency identification technology, social media networks and information security to basic related aspects of data protection issues covering strategic leadership, management, governance and audit in businesses, organisations and local authorities. Recommended best practices have been outlined for practical guidance accompanied with future challenges and opportunities for Malaysia and ASEAN. The book is equally suitable for academics, practitioners, governmental officials and regulators dealing with data protection within their sector-specific legislation.
In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial and insurance services. Further, it identifies the differences in the data protection systems of EU member states and examines the development of common standards and principles of data protection that could help build a data protection model for Mercosur. Divided into four parts, the book starts out with a discussion of the evolution of the right to privacy, focusing on the last few decades, and taking into account the development of new technologies. The second part discusses the interaction between data protection and specific industries that serve as case studies: insurance, banking and credit reporting. The focus of this part is on generalization and discrimination, adverse selection and the processing of sensitive and genetic data. The third part of the book presents an analysis of the legislation of three EU Member States (France, Italy and UK). Specific elements of analysis that are compared are the concepts of personal and anonymous data, data protection principles, the role of the data protection authorities, the role of the data protection officer, data subjects' rights, the processing of sensitive data, the processing of genetic data and the experience of the case studies in processing data. The book concludes with the proposal of a model for data protection that could be adopted by Mercosur, taking into account the different levels of data protection that exist in its member states.
Today's teenagers spend an average of nine hours per day with their noses immersed in the glow of their screens. Tweens are not far behind, at six hours a day. Parents of this new, ultra-connected generation struggle with decisions completely new to parenting: Should they limit a child's screen time? Should an eight-year old be allowed to go on social media? What about playing video games with strangers? How can we keep them safe from harm when they go online? Are they going to grow up less socially able if their friendships are mostly conducted via text and emojis? In The Connected Parent, acclaimed childhood development and technology experts John Palfrey and Urs Gasser tackle these and other concerns of parents in the digital age. The book is organized by the topics parents have asked about most often, from screen time and safety to addiction and aggressive behaviour. But rather than pretending to have the only-or even the best-advice for every child and every family, the authors share the evidence as well as their own (sometimes strong) point of view, all in order to empower parents with ground-breaking insights that they can use to inform their approach for their own unique situations. The outcome of over a decade of research on children and technology conducted at the Berkman Klein Center for Internet & Society at Harvard Law School, The Connected Parent is required reading for any parent trying to help their kids safely navigate the fast-changing, uncharted territory our hyper-connected world.
The information society is a key issue in everyday life and a phenomenon enc- passing social, cultural, economic, and legal facettes. Currently, an information society's legal framework is gradually crystallizing under the newly introduced term of "Internet governance". During the last few years, intensive discussions about the contents of Internet governance have addressed manifold aspects of a possible regulatory regime. In light of the general comprehension that an international treaty structure is mi- ing and that self-regulation as a normative model does not sufce in all respects, new architectural and constitutional theories have been developed; furthermore, the international body of the Internet Governance Forum (IGF) came to life. N- withstanding the available literature on IGF, however, a thorough and systematic study sheding light on the main topics of Internet governance (such as legitimacy, transparency, accountability, and participation) and on the key regulatory issues (for example critical Internet resources, access, protection of civil liberties/- man rights, realization of security, safety and privacy standards, as well as the overcoming of the digital divide) from a legal perspective is not yet at hand. The present publication aims at discussing these legal challenges. This book has benefted from many inputs and encouragements from colleagues that I am deeply grateful for. In particular, I am indebted to the very meaningful discussions and valuable support in the preparation of the publication by my - search assistants lic. iur Mirin . a Grosz and lic. iurR . omana Weber, to lic. iur.
The Internet's rapid diffusion and digitization of economic activities have led to the emergence of a new breed of criminals. Economic, political, and social impacts impacts of these cyber-criminals' activities have received considerable attention in recent years. Individuals, businesses, and governments rightfully worry about the security of their systems, networks, and IT infrastructures. Looking at the patterns of cybercrimes, it is apparent that many underlying assumptions about crimes are ?awed, unrealistic, and implausible to explain this new form of criminality. The empirical records regarding crime patterns and stra- gies to avoid and ?ght crimes run counter to the functioning of the cyberworld. The ?elds of hacking and cybercrime have also undergone political, social, and psychological metamorphosis. The cybercrime industry is a comparatively young area of inquiry. While there has been an agreement that the global cybercrime industry is tremendously huge, little is known about its exact size and structure. Very few published studies have examined economic and institutional factors that in?uence strategies and behaviors of various actors associated with the cybercrime industry. Theorists are also debating as to the best way to comprehend the actions of cyber criminals and hackers and the symbiotic relationships they have with various players.
Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents. The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular "Swiss solution", which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents. Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case, but also a wealth of background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships.
Digital technology is fundamentally altering the world we live in, but can only be truly understood in relation to the physical world we all inhabit. The most successful future products and policies will be those that take this rich digital/physical ecology seriously. The physical world is increasingly filled with digital products to the extent that the boundaries of digital and physical reality become blurred. From mundane devices such as mobile phones and washing machines, to esoteric research including tangible computation and body implants, we continually bridge two worlds literally touching buttons and dials and simultaneously interacting with the digital systems that lie behind them. The connection between pure thought and abstract information is through solid keyboard and mouse; but likewise the material world of buildings, cars and running shoes is suffused with computation through sensors, displays and flashing LEDs. How do people understand this world and how can designers create usable hybrid physical-digital products? TouchIT brings together insights from human-computer interaction and industrial design, exploring these themes under four main headings: human body and mind; objects and things; space; and information and computation. In considering each, the authors look into the underlying physical processes, our human understanding of them, and then the way these inform and are informed by digital design. The end draws together the theoretical and practical implications of this for design, including practical advice, potential tools, and philosophical underpinnings.
The Internet of Things as an emerging global Internet-based information archit- ture facilitating the exchange of goods and services is gradually developing. While the technology of the Internet of Things is still being discussed and created, the legal framework should be established before the Internet of Things is fully operable, in order to allow for an efective introduction of the new information architecture. If a self-regulatory approach is to be adopted to provide a legal framework for the Internet of Things, and this seems preferable, rulemakers can draw on experiences from the current regime of Internet governance. In the near future, mainly businesses will operate in the Internet of Things. Civil society is only expected to make use of the Internet of Things, as it now does of the Internet, at a later stage (e.g. for healthcare). The Internet of Things will have an impact in various areas. The regulatory fra- work must provide for provisions ensuring the security of the structure as well as the privacy of its users. Furthermore, legal barriers that may stand in the way of the coming into operation of the Internet of Things will have to be considered. However, the Internet of Things will also have positive efects in diferent felds, such as the inclusion of developing countries in global trade, the use of search engines to the beneft of civil society, combating product counterfeiting, tackling environmental concerns, improving health conditions, securing food supply and monitoring compliance with labor standards.
This book sheds light on the world of the Internet and social media through a historical prism drawn from the Medieval Age. Memes and metaphors originating in medieval society have often been used to describe and explain contemporary society. Social shaming has been described as "a pillory", good deeds have been deemed as knightly, persecution or censorship has been labelled as inquisitions and elitist tendencies in political life are sometimes dubbed feudalism. This book argues that terms and concepts originating in medieval society are suitable for describing and discussing a plethora of social and political phenomena, all related to the massive rise and use of new digital media technologies and adherent societal paradoxes, dilemmas and challenges. The author argues that apparently distinct social phenomena related to the spread of new media are related and a product of logics that dominated medieval society, not at least those of control, surveillance and feudalism.
This book introduces the capability approach - in which wellbeing, agency and justice are the core values - as a powerful normative lens to examine technology and its role in development. This approach attaches central moral importance to individual human capabilities, understood as effective opportunities people have to lead the kind of lives they have reason to value. The book examines the strengths, limitations and versatility of the capability approach when applied to technology, and shows the need to supplement it with other approaches in order to deal with the challenges that technology raises. The first chapter places the capability approach within the context of broader debates about technology and human development - discussing amongst others the appropriate technology movement. The middle part then draws on philosophy and ethics of technology in order to deepen our understanding of the relation between technical artefacts and human capabilities, arguing that we must simultaneously 'zoom in' on the details of technological design and 'zoom out' to see the broader socio-technical embedding of a technology. The book examines whether technology is merely a neutral instrument that expands what people can do and be in life, or whether technology transfers may also impose certain views of what it means to lead a good life. The final chapter examines the capability approach in relation to contemporary debates about 'ICT for Development' (ICT4D), as the technology domain where the approach has been most extensively applied so far. This book is an invaluable read for students in Development Studies and STS, as well as policy makers, practitioners and engineers looking for an accessible overview of technology and development from the perspective of the capability approach.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
This book focuses on the basic concepts and the related technologies of data mining for social medial. Topics include: big data and social data, data mining for making a hypothesis, multivariate analysis for verifying the hypothesis, web mining and media mining, natural language processing, social big data applications, and scalability. It explains analytical techniques such as modeling, data mining, and multivariate analysis for social big data. This book is different from other similar books in that presents the overall picture of social big data from fundamental concepts to applications while standing on academic bases.
"Elliott and Spence have produced a tight, teachable, and timely primer on media ethics for users and creators of information in the digital age. Pitched at just the right depth of detail to provide a big picture contextualization of changing media practices grounded in concerns for democracy and the public good, the book explores and reflects the implications of the convergence of the Fourth and Fifth Estates with an open-access, hyper-linked architecture which invites self-reflective practice on the part of its users" Philip Gordon, Utah Valley University 2019 PROSE Award Finalist in the Media & Cultural Studies category! The rapid and ongoing evolution of digital technologies has transformed the waythe world communicates and digests information. Fueled by a 24-hour news cycleand post-truth politics, media consumption and the technologies that drive ithave become more influential in shaping public opinion, and it has become more imperative than ever to examine their social and ethical consequences. Ethics for a Digital Era provides a penetrating analysis of the ethical issues that have emerged as the digital revolution progresses, including journalistic practices that impact on the truth, reliability, and trustworthiness of communicating information. The volume explores new methods and models for ethical inquiry in a digital world, and maps out guidelines for web-based news producers and users to conceptualize ethical issuesand analyze ethically questionable acts. In each of three thematic sections, Deni Elliott and Edward H. Spence reflect upon shifts in media ethics as contemporary mass communication combines traditional analog practices with new forms like blogs, vlogs, podcasts, and social media posts, and evolves into an interactive medium with users who both produce and consume the news. Later chapters apply a process of normative decision-making to some of the most important issues which arise in these interactions, and encourage users to bridge their own thinking between the virtual and physical worlds of information and its communication. Timely and thought-provoking, Ethics for a Digital Era is an invaluable resource for undergraduate and graduate students in media and mass communication, applied ethics, and journalism, as well as general readers interested in the ethical impact of their media consumption. |
You may like...
Research Handbook on the Law of Virtual…
Woodrow Barfield, Marc J. Blitz
Paperback
R1,612
Discovery Miles 16 120
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,015
Discovery Miles 30 150
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R639
Discovery Miles 6 390
|