![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
We like to think that we are in control of the future of "artificial" intelligence. The reality, though, is that we--the everyday people whose data powers AI--aren't actually in control of anything. When, for example, we speak with Alexa, we contribute that data to a system we can't see and have no input into--one largely free from regulation or oversight. The big nine corporations--Amazon, Google, Facebook, Tencent, Baidu, Alibaba, Microsoft, IBM and Apple--are the new gods of AI and are short-changing our futures to reap immediate financial gain. In this book, Amy Webb reveals the pervasive, invisible ways in which the foundations of AI - the people working on the system, their motivations, the technology itself - are broken. Within our lifetimes, AI will, by design, begin to behave unpredictably, thinking and acting in ways which defy human logic. The big nine corporations may be inadvertently building and enabling vast arrays of intelligent systems that don't share our motivations, desires, or hopes for the future of humanity. Much more than a passionate, human-centred call-to-arms, this book delivers a strategy for changing course and provides a path for liberating us from algorithmic decision-makers and powerful corporations.
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.
This book constitutes the refereed proceedings of the 7th International Conference on Well-Being in the Information Society, WIS 2018, held in Turku, Finland, in August 2018. The 19 revised full papers presented were carefully reviewed and selected from 42 submissions. With the core topic "Fighting Inequalities" WIS 2018 focused on innovations and fresh ideas in the cross-section of information society and health as understood in a wide sense. The papers presented in this volume are organized along the following broad topics: digital society and e-health.
This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: themes and issues; control systems security; infrastructure modeling and simulation; risk and impact assessment. This book is the tenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of fourteen edited papers from the Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2016. Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
This book constitutes the thoroughly refereed proceedings of the third International Conference on Communication Technologies for Ageing Well and e-Health, ICT4AWE 2017, held in Porto, Portugal in April 2017. The 10 full papers presented were carefully reviewed and selected from 32 submissions. The papers aim at contributing to the understanding of relevant trends of current research on ICT for Ageing Well and eHealth including the collection and evaluation of day/night end user behavior patterns through the adoption of wearable technologies.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.
This book constitutes the proceedings of the 11th International Conference on Social, Cultural, and Behavioral Modeling, SBP-BRiMS 2018, held in Washington, DC, USA, in July 2018. The total of 27 short and 18 full papers presented in this volume was carefully reviewed and selected from 85 submissions. The contributions were organized in topical sections named: advances in sociocultural and behavioral process modeling; information, systems, and network science; applications for health and well-being; military and intelligence applications; cybersecurity.
This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.
This book provides insights on how emerging technosciences come together with new forms of governance and ethical questioning. Combining science and technologies and ethics approaches, it looks at the emergence of three key technoscientific domains - body enhancement technologies, biometrics and technologies for the production of space -exploring how human bodies and minds, the movement of citizens and space become matters of technoscientific governance. The emergence of new and digital technologies pose new challenges for representative democracy and existing forms of citizenship. As citizens encounter and have to adapt to technological change in their everyday life, new forms of conviviality and contestation emerge. This book is a key reference for scholars interested in the governance of emerging technosciences in the fields of science and technology studies and ethics.
This book gathers visionary ideas from leading academics and scientists to predict the future of wireless communication and enabling technologies in 2050 and beyond. The content combines a wealth of illustrations, tables, business models, and novel approaches to the evolution of wireless communication. The book also provides glimpses into the future of emerging technologies, end-to-end systems, and entrepreneurial and business models, broadening readers' understanding of potential future advances in the field and their influence on society at large
This book stems from the desire to systematize and put down on paper essential historical facts about the Web, a system that has undoubtedly changed our lives in just a few decades. But how did it manage to become such a central pillar of modern society, such an indispensable component of our economic and social interactions? How did it evolve from its roots to today? Which competitors, if any, did it have to beat out? Who are the heroes behind its success?These are the sort of questions that the book addresses. Divided into four parts, it follows and critically reflects on the Web's historical path. "Part I: The Origins" covers the prehistory of the Web. It examines the technology that predated the Web and fostered its birth. In turn, "Part II: The Web" describes the original Web proposal as defined in 1989 by Tim Berners-Lee and the most relevant technologies associated with it. "Part III: The Patches" combines a historical reconstruction of the Web's evolution with a more critical analysis of its original definition and the necessary changes made to the initial design. In closing, "Part IV: System Engineering" approaches the Web as an engineered infrastructure and reflects on its technical and societal success. The book is unique in its approach, combining historical facts with the technological evolution of the Web. It was written with a technologically engaged and knowledge-thirsty readership in mind, ranging from curious daily Web users to undergraduate computer science and engineering students.
This book constitutes the proceedings of the 6th International Workshop on Symbiotic Interaction, Symbiotic 2017, held in Eindhoven, The Netherlands in December 2017. The 8 full papers, 2 short papers and 1 report presented in this volume were carefully reviewed and selected from 23 submissions. The International Workshop on Symbiotic Interaction is the primary venue for presenting scientific work dealing with the symbiotic relationships between humans and computers and for discussing the nature and implications of such relationships.
The author first introduces the basic framework for cultural algorithms and he then explains the social structure of a cultural system as a mechanism for the distribution of problem-solving information throughout a population. Three different models for social organizations are presented: the homogeneous (nuclear family), heterogeneous (expanded family), and subculture (descent groups) social models. The chapters that follow compare the learning capabilities of these social organizations relative to problems of varying complexity. The book concludes with a discussion of how the results can impact our understanding of social evolution.
This book constitutes the revised and selected papers from the 5th International Workshop on Engineering Multi-Agent Systems held in Sao Paulo, Brazil, in May 2018, in conjunction with AAMAS 2018. The 11 full papers presented in this volume were carefully reviewed and selected from 18 submissions. The book contains also the best paper of the workshop that has been published previously in another LNCS volume. The EMAS workshop focusses on the cross-fertilisation of ideas and experiences in the various fields with the aim to enhance knowledge and expertise in MAS engineering , to improve the state-of-the-art, to define new directions for MAS engineering, to investigate how established methodologies for engineering and large-scale and open MAS can be adapted.
This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.
This edited book is the first of its kind to systematically address the intersection of e-democracy and European politics. It contributes to an improved understanding of the role that new media technologies play in European politics and the potential impact that Internet-based political participation processes may have on modern-day representative democracy in Europe. A unique, holistic approach is taken to examine e-democracy's current state and prospects in Europe from three, partially overlapping and interlocking perspectives: e-public, e-participation and e-voting. The authors provide both theory-inspired reflections on e-democracy's contribution to the formation of the European public sphere, as well as rich empirical analyses of contemporary e-participation phenomena such as the European Citizens' Initiative or e-voting practices in Estonia. Based on the presented findings, the concluding chapter combines a prospective outlook with recommendations for future paths towards meaningful integration of e-democracy in European politics and governance.
This book collects multiple research articles studying the factors influencing wearable device usage. Based on multiple empirical studies, which research different kinds of wearable devices such as smartwatches, activity trackers, and smartglasses, potential drivers of wearable device usage are identified and evaluated. Overall, the book provides novel and important insights for both practitioners and academics, highlights their various practical implications for the development and marketing of wearable devices and offers outlooks on further research directions.
This book constitutes the refereed proceedings of the 13th International Conference on Persuasive Technology, PERSUASIVE 2018, held in Waterloo, ON, Canada, in April 2018. The 21 revised full papers and 4 short papers presented were carefully reviewed and selected from 59 submissions. The papers demonstrate how persuasive technologies can help solve societal issues. They explore new frontiers for persuasive technology, such as personalized persuasion, new sensor usage, uses of big data, and new ways of creating engagement through gaming or social connection, focusing on a variety of technologies (e.g., web, wearables, AI, and smart environments). The papers are organized in the following topical sections: social means to persuasion; nudging and just-in-time interventions; design principles and practices; persuasive games; personalization and tailoring; and theoretical reflections.
Controversies in Digital Ethics explores ethical frameworks within digital culture. Through a combination of theoretical examination and specific case studies, the essays in this volume provide a vigorous examination of ethics in a highly individualistic and mediated world. Focusing on specific controversies-privacy, surveillance, identity politics, participatory culture-the authors in this volume provide a roadmap for navigating the thorny ethical issues in new media. Paul Booth and Amber Davisson bring together multiple writers working from different theoretical traditions to represent the multiplicity of ethics in the 21st century. Each essay has been chosen to focus on a particular issue in contemporary ethical thinking in order to both facilitate classroom discussion and further scholarship in digital media ethics. Accessible for students, but with a robust analysis providing contemporary scholarship in media ethics, this collection unites theory, case studies, and practice within one volume.
In this book readers will find technological discussions on the existing and emerging technologies across the different stages of the big data value chain. They will learn about legal aspects of big data, the social impact, and about education needs and requirements. And they will discover the business perspective and how big data technology can be exploited to deliver value within different sectors of the economy. The book is structured in four parts: Part I "The Big Data Opportunity" explores the value potential of big data with a particular focus on the European context. It also describes the legal, business and social dimensions that need to be addressed, and briefly introduces the European Commission's BIG project. Part II "The Big Data Value Chain" details the complete big data lifecycle from a technical point of view, ranging from data acquisition, analysis, curation and storage, to data usage and exploitation. Next, Part III "Usage and Exploitation of Big Data" illustrates the value creation possibilities of big data applications in various sectors, including industry, healthcare, finance, energy, media and public services. Finally, Part IV "A Roadmap for Big Data Research" identifies and prioritizes the cross-sectorial requirements for big data research, and outlines the most urgent and challenging technological, economic, political and societal issues for big data in Europe. This compendium summarizes more than two years of work performed by a leading group of major European research centers and industries in the context of the BIG project. It brings together research findings, forecasts and estimates related to this challenging technological context that is becoming the major axis of the new digitally transformed business environment.
This book constitutes the refereed proceedings of the Third International Conference on Love and Sex with Robots, LSR 2017, held in December 2017, in London, UK. The 12 revised papers presented together with 2 keynotes were carefully reviewed and selected from a total of 83 submissions. One of the biggest challenges of the Love and Sex with Robots conference is to engage a wider scientific community in the discussions of the multifaceted topic, which has only recently established itself as an academic research topic within, but not limited to, the disciplines of artificial intelligence, human-computer interaction, robotics, biomedical science and robot ethics etc.
The two-volume set LNCS 11185 + 11186 constitutes the proceedings of the 10th International Conference on Social Informatics, SocInfo 2018, held in Saint-Petersburg, Russia, in September 2018. The 30 full and 32 short papers presented in these proceedings were carefully reviewed and selected from 110 submissions. They deal with the applications of methods of the social sciences in the study of socio-technical systems, and computer science methods to analyze complex social processes, as well as those that make use of social concepts in the design of information systems. |
![]() ![]() You may like...
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,952
Discovery Miles 29 520
|