Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
In the wake of revelations about National Security Agency activities many of which occur in the cloud this book offers both enlightenment and a critical view. Cloud computing and big data are arguably the most significant forces in information technology today. In clear prose, To the Cloud explores where the cloud originated, what it means, and how important it is for business, government, and citizens. It describes the intense competition among cloud companies like Amazon and Google, the spread of the cloud to government agencies like the controversial NSA, and the astounding growth of entire cloud cities in China. From advertising to trade shows, the cloud and big data are furiously marketed to the world, even as dark clouds loom over environmental, privacy, and employment issues that arise from the cloud. Is the cloud the long-promised information utility that will solve many of the world s economic and social problems? Or is it just marketing hype? To the Cloud provides the first thorough analysis of the potential and the problems of a technology that may very well disrupt the world.
Wired Citizenship examines the evolving patterns of youth learning and activism in the Middle East and North Africa (MENA). In today's digital age, in which formal schooling often competes with the peer-driven outlets provided by social media, youth all over the globe have forged new models of civic engagement, rewriting the script of what it means to live in a democratic society. As a result, state-society relationships have shifted-never more clearly than in the MENA region, where recent uprisings were spurred by the mobilization of tech-savvy and politicized youth. Combining original research with a thorough exploration of theories of democracy, communications, and critical pedagogy, this edited collection describes how youth are performing citizenship, innovating systems of learning, and re-imagining the practices of activism in the information age. Recent case studies illustrate the context-specific effects of these revolutionary new forms of learning and social engagement in the MENA region.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.
The financial/social cataclysm beginning in 2007 ended notions of a "great moderation" and the view that capitalism had overcome its systemic tendencies to crisis. The subsequent failure of contemporary social formations to address the causes of the crisis gives renewed impetus to better analysis in aid of the search for a better future. This book contributes to this search by reviving a broad discussion of what we humans might want a post-capitalist future to be like. It argues for a comparative anthropological critique of capital notions of value, thereby initiating the search for a new set of values, as well as identifying a number of selected computing practices that might evoke new values. It articulates a suggestive set of institutions that could support these new values, and formulates a group of measurement practices usable for evaluating the proposed institutions. The book is grounded in contemporary social science, political theory, and critical theory. It aims to leverage the possibility of alternative futures implied by some computing practices while avoiding hype and technological determinism, and uses these computing practices to explicate one possible way to think about the future.
"The data economy" is a term used by many, but properly understood by few. Even more so the concept of "big data". Both terms embody the notion of a digital world in which many transactions and data flows animate a virtual space. This is the unseen world in which technology has become the master, with the hand of the human less visible. In fact, however, it is human interaction in and around technology that makes data so pervasive and important - the ability of the human mind to extract, manipulate and shape data that gives meaning to it. This book outlines the findings and conclusions of a multidisciplinary team of data scientists, lawyers, and economists tasked with studying both the possibilities of exploiting the rich data sets made available from many human-technology interactions and the practical and legal limitations of trying to do so. It revolves around a core case study of Singapore's public transport system, using data from both the private company operating the contactless payment system (EZ-Link) and the government agency responsible for public transport infrastructure (Land Transport Authority). In analysing both the possibilities and the limitations of these data sets, the authors propose policy recommendations in terms of both the uses of large data sets and the legislation necessary to enable these uses while protecting the privacy of users.
In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet. Using dialogic communication tactics, the public, governmental actors and organizations impacted the ruling through YouTube comments, the FCC online system and social network communities. Network neutrality, which requires that all digital sites can be accessed with equal speed and ability, is an important example of how dialogic communication facilitates public engagement in policy debates. However, the practice and ability of the public, organizations and media to engage in dialogic communication are also greatly impacted by the FCC's decision. This book reflects on decades of global engagement in the network neutrality debate and the evolution of dialogic communication techniques used to shape one of the most relevant and critical digital policies in history.
The Future of Digital Data, Heritage and Curation critiques digital cultural heritage concepts and their application to data, developing new theories, curatorial practices and a more-than-human museology for a contemporary and future world. Presenting a diverse range of case examples from around the globe, Cameron offers a critical and philosophical reflection on the ways in which digital cultural heritage is currently framed as societal data worth passing on to future generations in two distinct forms: digitally born and digitizations. Demonstrating that most perceptions of digital cultural heritage are distinctly western in nature, the book also examines the complicity of such heritage in climate change, and environmental destruction and injustice. Going further still, the book theorizes the future of digital data, heritage, curation and the notion of the human in the context of the profusion of new types of societal data and production processes driven by the intensification of data economies and through the emergence of new technologies. In so doing, the book makes a case for the development of new types of heritage that comprise AI, automated systems, biological entities, infrastructures, minerals and chemicals - all of which have their own forms of agency, intelligence and cognition. The Future of Digital Data, Heritage and Curation is essential reading for academics and students engaged in the study of museums, archives, libraries, galleries, archaeology, cultural heritage management, information management, curatorial studies and digital humanities.
This book examines the contemporary era where parents complain that children today don't do their homework because they are distracted by the Internet, texting, and video games. Texting Toward Utopia presents the writings of todays children and develops the argument that this is actually a time of mass literary, in which young people write furiously, albeit often below the adult radar. Agger argues that where texting replaces textbooks, the writing may be emoticon-laden, slangy, or terse, but it is still profound, as children (and their parents) engage in resistance and write for a better world. This book is a guide to understanding the meeting point between a new generation of children and new communication technologies.
It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading, peer-to-peer networks, "piracy," and (not least) policy issues regarding these practices. Andersson Schwartz critically engages with the justificatory discourses of the actual file-sharers, taking Sweden as a geographic focus. By focusing on the example of Sweden-home to both The Pirate Bay and Spotify-he provides a unique insight into a mentality that drives both innovation and deviance and accommodates sharing in both its unadulterated and its compliant, business-friendly forms.
Driving automation and autonomy are already upon us and the problems that were predicted twenty years ago are beginning to appear. These problems include shortfalls in expected benefits, equipment unreliability, driver skill fade, and error-inducing equipment designs. Designing Interaction and Interfaces for Automated Vehicles: User-Centred Ecological Design and Testing investigates the difficult problem of how to interface drivers with automated vehicles by offering an inclusive, human-centred design process that focusses on human variability and capability in interaction with interfaces. This book introduces a novel method that combines both systems thinking and inclusive user-centred design. It models driver interaction, provides design specifications, concept designs, and the results of studies in simulators on the test track, and in road going vehicles. This book is for designers of systems interfaces, interactions, UX, Human Factors and Ergonomics researchers and practitioners involved with systems engineering and automotive academics._ "In this book, Prof Stanton and colleagues show how Human Factors methods can be applied to the tricky problem of interfacing human drivers with vehicle automation. They have developed an approach to designing the human-automation interaction for the handovers between the driver and the vehicle. This approach has been tested in driving simulators and, most interestingly, in real vehicles on British motorways. The approach, called User-Centred Ecological Interface Design, has been validated against driver behaviour and used to support their ongoing work on vehicle automation. I highly recommend this book for anyone interested, or involved, in designing human-automation interaction in vehicles and beyond." Professor Michael A. Regan, University of NSW Sydney, AUSTRALIA
A form of 'electronic opium' is how some people have characterised young people's internet use in China. The problem of 'internet addiction' (wangyin) is seen by some parents as so severe that they have sought psychiatric help for their children. This book, which is based on extensive original research, including discussions with psychiatrists, parents and 'internet-addicted' young people, explores the conflicting attitudes which this issue reveals. It contrasts the views of young people who see internet use, especially gaming, as a welcome escape from the dehumanising pressures of contemporary Chinese life, with the approach of those such as their parents, who medicalise internet overuse and insist that working hard for good school grades is the correct way to progress. The author shows that these contrasting attitudes lead to battles which are often fierce and violent, and argues that the greater problem may in fact lie with parents and other authority figures, who misguidedly apply high pressure to enforce young people to conform to the empty values of a modern, dehumanised consumer-oriented society.
We delegate more and more decisions and tasks to artificial agents, machine-learning mechanisms, and algorithmic procedures or, in other words, to computational systems. Not that we are driven by powerful ambitions of colonizing the Moon, replacing humans with legions of androids, creating sci-fi scenarios a la Matrix or masterminding some sort of Person of Interest-like Machine. No, the current digital revolution based on computational power is chiefly an everyday revolution. It is therefore that much more profound, unnoticed and widespread, for it affects our customary habits and routines and alters the very texture of our day-to-day lives. This opens a precise line of inquiry, which constitutes the basic thesis of the present text: our computational power is exercised by trying to adapt not just the world but also our representation of reality to how computationally based ICTs work. The impact of this technology is such that it does not leave things as they are: it changes the nature of agents, habits, objects and institutions and hence it subverts the existing order, without necessarily generating a new one. I argue that this power is often not distributed in an egalitarian manner but, on the contrary, is likely to result in concentrations of wealth, in dominant positions or in unjust competitive advantages. This opens up a struggle, with respect to which the task of reaffirming the fundamental values, the guiding principles, the priorities and the rules of the game, which can transform, or attempt to transform, a fierce confrontation between enemies in a fair competition between opponents rests on us.
Internet of Things (IoT) has become a valuable tool for connection and information exchange between devices. This book provides a brief introduction to this new field, focuses on wearable medical devices, and covers the basic concepts by providing the reader with enough information to solve various practical problems. This book provides the latest applications, experiments, fundamentals concepts, and cutting-edge topics for the ehealth and wearable devices field. The book also offers topics related to Security in IoT and Wearable Devices, Wearable Devices and Internet of Medical Devices (IoMT), IoT for Medical Applications, and Tools and study cases. The book brings new and valuable information to PhD researchers, students, professors, and professionals working in IoT and related fields.
We are often told that we are "living in an information society" or that we are "information workers." But what exactly do these claims mean, and how might they be verified? In this important methodological study, Alistair S. Duff cuts through the rhetoric to get to the bottom of the "information society thesis." Wide-ranging in coverage, this study will be of interest to scholars in information science, communication and media studies and social theory. It is a key text for the newly-unified specialism of information society studies, and an indispensable guide to the future of this discipline.
Today, more mediated information is available to more people than at any other time in human history. New and revitalized sense-making strategies multiply in response to the challenges of "cutting through the clutter" of competing narratives and taming the avalanche of information. Data miners, "sentiment analysts," and decision markets offer to help bodies of data "speak for themselves"-making sense of their own patterns so we don't have to. Neuromarketers and body language experts promise to peer behind people's words to see what their brains are really thinking and feeling. New forms of information processing promise to displace the need for expertise and even comprehension-at least for those with access to the data. " Infoglut "explores the connections between these wide-ranging sense-making strategies for an era of information overload and "big data," and the new forms of control they enable. Andrejevic critiques the popular embrace of deconstructive debunkery, calling into question the post-truth, post-narrative, and post-comprehension politics it underwrites, and tracing a way beyond them.
Today, more mediated information is available to more people than at any other time in human history. New and revitalized sense-making strategies multiply in response to the challenges of "cutting through the clutter" of competing narratives and taming the avalanche of information. Data miners, "sentiment analysts," and decision markets offer to help bodies of data "speak for themselves"-making sense of their own patterns so we don't have to. Neuromarketers and body language experts promise to peer behind people's words to see what their brains are really thinking and feeling. New forms of information processing promise to displace the need for expertise and even comprehension-at least for those with access to the data. Infoglut explores the connections between these wide-ranging sense-making strategies for an era of information overload and "big data," and the new forms of control they enable. Andrejevic critiques the popular embrace of deconstructive debunkery, calling into question the post-truth, post-narrative, and post-comprehension politics it underwrites, and tracing a way beyond them.
Provides advanced system implementation for Smart Cities using Artificial Intelligence Addresses the complete functional framework workflow in Artificial Intelligence Explores basic and high-level concepts, thus servicing as a manual for those in the industry while also helping beginners Based on the latest technologies, and covering the major challenges, issues, and advances in Artificial Intelligence and Cybersecurity Discusses intelligent data management and automated systems through Artificial Intelligence and Cyber Security
What did you do before Google? The rise of Google as the dominant Internet search provider reflects a generationally-inflected notion that "everything" that matters is now on the Web, and "should," in the moral sense of the verb, be accessible through search. In this theoretically nuanced study of search technology s broader implications for knowledge production and social relations, the authors shed light on a culture of search in which our increasing reliance on search engines influences not only the way we navigate, classify, and evaluate Web content, but also how we think about ourselves and the world around us, online and off. Ken Hillis, Michael Petit, and Kylie Jarrett seek to understand the ascendancy of search and its naturalization by historicizing and contextualizing Google s dominance of the search industry, and suggest that the contemporary culture of search is inextricably bound up with a metaphysical longing to manage, order, and categorize all knowledge. Calling upon this nexus between political economy and metaphysics, "Google and the Culture of Search "explores what is at stake for an increasingly networked culture in which search technology is a site of knowledge and power.
Nationwide, and indeed worldwide, there has been a growing awareness of the importance of access to information. Accordingly, information technology (IT), broadly defined and its role beyond the internal workings of businesses has leapt into the social consciousness. Diving into the Bitstream distinguishes itself by weaving together the concepts and conditions of IT. What distinguishes these trends is their focus on the impacts of IT on societies, and the responsibilities of IT s creators and users. The author pulls together important, often complex issues in the relationships among information, information technologies, and societal constructs. The text explores a synopsis of these issues that are foundations for further consideration.
What did you do before Google? The rise of Google as the dominant Internet search provider reflects a generationally-inflected notion that "everything" that matters is now on the Web, and "should," in the moral sense of the verb, be accessible through search. In this theoretically nuanced study of search technology s broader implications for knowledge production and social relations, the authors shed light on a culture of search in which our increasing reliance on search engines influences not only the way we navigate, classify, and evaluate Web content, but also how we think about ourselves and the world around us, online and off. Ken Hillis, Michael Petit, and Kylie Jarrett seek to understand the ascendancy of search and its naturalization by historicizing and contextualizing Google s dominance of the search industry, and suggest that the contemporary culture of search is inextricably bound up with a metaphysical longing to manage, order, and categorize all knowledge. Calling upon this nexus between political economy and metaphysics, "Google and the Culture of Search "explores what is at stake for an increasingly networked culture in which search technology is a site of knowledge and power.
The speed and cost effectiveness of new information technology has prompted many to view these innovations as a panacea for social and economic development. However, such a view flies in the face of continuing inequities in education, health, food, and infrastructure. This volume explores these issues - along with questions of access, privilege, literacy, training, and the environmental and health effects of information technologies in the developing world - arguing that a higher level of development does not always result from a higher level of technologization.
The United States is currently grappling with how to prepare our students to be computer literate citizens in the competitive technological world we live in. Understanding how children develop computer knowledge, and the ways that adults are able to guide their computer learning experiences, is a vital task facing parents and educators. This groundbreaking book is an attempt to fill a gap in current understanding of how we become computer literate and proposes a theory of how computer literacy skills emerge in computer users.
Over the last decade there has been dramatically increased interest in the ways that technology has been used in the abuse and exploitation of children, due in part to increasing numbers of convictions for child pornography-related offenses. Opinion swings between those who feel that there is a danger of distorting the threat posed to children by technology, and those for whom it appears that the threat has been grossly underestimated. Current literature surrounding the debate at times seems to create more questions than answers and what quickly becomes apparent is that the data we have to inform our understanding is partial, potentially context specific, and at times seemingly contradictory. This book broadens our understanding of the complex nature of online sexual exploitation of children and considers the risk that those engaged in Internet-related offences pose to children in both the online and offline environments. It focuses on cutting-edge research and conceptual thinking that views perpetrators within context, examines those impacted by such offending, describes emerging legal and policy issues, and proposes innovative strategies for prevention within a dynamic global environment. Understanding and Preventing Online Sexual Exploitation of Children responds to the growing call for help across all practice areas, from judicial to therapeutic, and will provide an invaluable resource for practitioners and policy makers working in the field, as well as students and academics studying sexual exploitation and cyber crime.
Over the last decade there has been dramatically increased interest in the ways that technology has been used in the abuse and exploitation of children, due in part to increasing numbers of convictions for child pornography-related offenses. Opinion swings between those who feel that there is a danger of distorting the threat posed to children by technology, and those for whom it appears that the threat has been grossly underestimated. Current literature surrounding the debate at times seems to create more questions than answers and what quickly becomes apparent is that the data we have to inform our understanding is partial, potentially context specific, and at times seemingly contradictory. This book broadens our understanding of the complex nature of online sexual exploitation of children and considers the risk that those engaged in Internet-related offences pose to children in both the online and offline environments. It focuses on cutting-edge research and conceptual thinking that views perpetrators within context, examines those impacted by such offending, describes emerging legal and policy issues, and proposes innovative strategies for prevention within a dynamic global environment. Understanding and Preventing Online Sexual Exploitation of Children responds to the growing call for help across all practice areas, from judicial to therapeutic, and will provide an invaluable resource for practitioners and policy makers working in the field, as well as students and academics studying sexual exploitation and cyber crime. |
You may like...
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,650
Discovery Miles 36 500
Translation Tools and Technologies
Andrew Rothwell, Joss Moorkens, …
Hardcover
R3,693
Discovery Miles 36 930
|