Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
The Internet has had a profound impact on society in general and on the field of library and information science in particular. Since 1990, scholars and librarians have striven to utilize various Internet technologies to improve library and information services. Since that time, the literature on the Internet and its impact on and role in libraries and research has exploded. A simple keyword search in Library Literature and Information Index, a primary electronic index of library and information science research literature, retrieves over 6,500 items related to the Internet. The dominance of the Internet not only provides great opportunities for libraries to provide better services, but also poses tremendous challenges to librarians and library and information science scholars. This volume includes discussions of current issues and trends, written by scholars and practitioners in the fields of library and information science, computer science, and computer engineering.
In today's rapidly changing global work environment, all workers directly experience increased organizational complexity. Companies are functionally distributed, many across the globe. Intense competition for markets and margins makes adaptiveness and innovation imperative. Information and communication technologies (ICT) are pervasive and fundamental infrastructures, their use deeply integrated into work processes. Workers collaborate electronically with co-workers they may never meet face-to-face or with employees of other companies. New boundaries of time, space, business unit, culture, company partnerships, and software tools are driving the adoption of a variety of novel organizational forms. On a macro level, these changes have started to reshape society, leading some to speak of the "Network Society" and "The Information Age." This book begins with consideration of possible frameworks for understanding virtuality and virtualization. It includes papers that consider ways of analyzing virtual work in terms of work processes. Following that, the book takes a look at group processes within virtual teams, focusing in particular on leadership and group identity. The book goes on to consider the role of knowledge in virtual settings and other implications of the role of fiction in structuring virtuality.
This book discusses in detail the great historical and social significance of the development of Artificial Intelligence (AI). It consists of seven chapters, each focusing on a specific issue related to AI, such as ethical principles, legal regulations, education, employment and security. Adopting a multidisciplinary approach, it appeals to wide readership, ranging from experts and government officials to the general public.
The first full account of the Slenderman stabbing, a true crime narrative of mental illness, the American judicial system, the trials of adolescence, and the power of the internetOn May 31, 2014, in the Milwaukee suburb of Waukesha, Wisconsin, two twelve-year-old girls attempted to stab their classmate to death. Morgan Geyser and Anissa Weier's violence was extreme, but what seemed even more frightening was that they committed their crime under the influence of a figure born by the internet: the so-called "Slenderman." Yet the even more urgent aspect of the story, that the children involved suffered from undiagnosed mental illnesses, often went overlooked in coverage of the case.Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls tells that full story for the first time in deeply researched detail, using court transcripts, police reports, individual reporting, and exclusive interviews. Morgan and Anissa were bound together by their shared love of geeky television shows and animals, and their discovery of the user-uploaded scary stories on the Creepypasta website could have been nothing more than a brief phase. But Morgan was suffering from early-onset childhood schizophrenia. She believed that she had seen Slenderman long before discovering him online, and the only way to stop him from killing her family was to bring him a sacrifice: Morgan's best friend Payton "Bella" Leutner, whom Morgan and Anissa planned to stab to death on the night of Morgan's twelfth birthday party. Bella survived the attack, but was deeply traumatized, while Morgan and Anissa were immediately sent to jail, and the severity of their crime meant that they would be prosecuted as adults. There, as Morgan continued to suffer from worsening mental illness after being denied antipsychotics, her life became more and more surreal.Slenderman is both a page-turning true crime story and a search for justice.
1.1 Introduction Each year corporations spend millions of dollars training and educating their - ployees. On average, these corporations spend approximately one thousand dollars 1 per employee each year. As businesses struggle to stay on the cutting-edge and to keep their employees educated and up-to-speed with professional trends as well as ever-changing information needs, it is easy to see why corporations are investing more time and money than ever in their efforts to support their employees' prof- sional development. During the Industrial Age, companies strove to control natural resources. The more resources they controlled, the greater their competitive edge in the mark- place. Senge (1993) refers to this kind of organization as resource-based. In the Information Age, companies must create, disseminate, and effectively use kno- edge within their organization in order to maintain their market share. Senge - scribes this kind of organization as knowledge-based. Given that knowledge-based organizations willcontinuetobeadrivingforcebehindtheeconomy, itisimperative that corporations support the knowledge and information needs of their workers.
The use of information and communication technologies to support public administrations, governments and decision makers has been recorded for more than 20 years and dubbed e-Government. Moving towards open governance roadmaps worldwide, electronic participation and citizen engagement stand out as a new domain, important both for decision makers and citizens; and over the last decade, there have been a variety of related pilot projects and innovative approaches. With contributions from leading researchers, Charalabidis and Koussouris provide the latest research findings such as theoretical foundations, principles, methodologies, architectures, technical frameworks, cases and lessons learnt within the domain of open, collaborative governance and online citizen engagement. The book is divided into three sections: Section one, "Public Policy Debate Foundations," lays the foundations regarding processes and methods for scoping, planning, evaluating and transforming citizen engagement. The second section, "Information and Communication Technologies for Citizen Participation," details practical approaches to designing and creating collaborative governance infrastructures and citizen participation for businesses and administrations. Lastly, the third section on "Future Research Directions of Open, Collaborative ICT-enabled Governance" provides a constructive critique of the developments in the past and presents prospects regarding future challenges and research directions. The book is mainly written for academic researchers and graduate students working in the computer, social, political and management sciences. Its audience includes researchers and practitioners in e-Governance, public administration officials, policy and decision makers at the local, national and international level engaged in the design and creation of policies and services, and ICT professionals engaged in e-Governance and policy modelling projects and solutions.
Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology. It poses criminological, legal, ethical, and policy questions linked to such development and anticipates the impact of DFTs on crime and offending. It forestalls their wide-ranging consequences, including the proliferation of new types of vulnerability, policing and other mechanisms of social control, and the threat of pervasive and intrusive surveillance. Two key concerns lie at the heart of this volume. First, the book investigates the origins and development of emerging DFTs and their interactions with criminal behaviour, crime prevention, victimisation, and crime control. It also investigates the future advances and likely impact of such processes on a range of social actors: citizens, non-citizens, offenders, victims of crime, judiciary and law enforcement, media, NGOs. This book does not adopt technological determinism that suggests technology alone drives social development. Yet, while it is impossible to know where the emerging technologies are taking us, there is no doubt that DFTs will shape the way we engage with and experience criminal behaviour in the twenty-first century. As such, this book starts the conversation about a range of essential topics that this expansion brings to social sciences, and begins to decipher challenges we will be facing in the future. An accessible and compelling read, this book will appeal to those engaged with criminology, sociology, politics, policymaking, and all those interested in the impact of DFTs on the criminal justice system.
This work serves as an introduction to both the theoretical and practical aspects of using computers to improve the delivery of social services. Though many practitioners believe that computerization dehumanizes clients and should be avoided, John Murphy and John Pardeck demonstrate how, through a holistic approach to computer use, this problem, and others like it, can be averted. By providing practitioners the opportunity to sharpen their conceptual skills in computer technology, this book promotes a rational understanding of the possible uses and limitations of computers in social service agencies. Unlike other, technically-oriented works in this field, Murphy and Pardeck's work focuses on the philosophical justification of computer use, along with the conceptual or symbolic nature of computerization. They fully illustrate how to create the organizational conditions necessary for computers to improve social-service delivery, and they do so in a manner that is easily accessible for both general classroom and professional use. Among the topics addressed are the technological world-view, Western philosophy, and knowledge; computer mediated therapy; ethical issues related to computerized service delivery; and construction of a socially responsible technology. This work will be a unique and important resource for courses in computer applications, policy analysis, and social service administration, as well as a useful reference source for human service agencies and practitioners. Public and academic libraries will also find it to be a valuable addition to their collections.
The Future of Digital Data, Heritage and Curation critiques digital cultural heritage concepts and their application to data, developing new theories, curatorial practices and a more-than-human museology for a contemporary and future world. Presenting a diverse range of case examples from around the globe, Cameron offers a critical and philosophical reflection on the ways in which digital cultural heritage is currently framed as societal data worth passing on to future generations in two distinct forms: digitally born and digitizations. Demonstrating that most perceptions of digital cultural heritage are distinctly western in nature, the book also examines the complicity of such heritage in climate change, and environmental destruction and injustice. Going further still, the book theorizes the future of digital data, heritage, curation and the notion of the human in the context of the profusion of new types of societal data and production processes driven by the intensification of data economies and through the emergence of new technologies. In so doing, the book makes a case for the development of new types of heritage that comprise AI, automated systems, biological entities, infrastructures, minerals and chemicals - all of which have their own forms of agency, intelligence and cognition. The Future of Digital Data, Heritage and Curation is essential reading for academics and students engaged in the study of museums, archives, libraries, galleries, archaeology, cultural heritage management, information management, curatorial studies and digital humanities.
This book constitutes the refereed proceedings of the 8th International Conference on Human Choice and Computers (HCC8), IFIP TC9, held in Pretoria, South Africa on September 25-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
We delegate more and more decisions and tasks to artificial agents, machine-learning mechanisms, and algorithmic procedures or, in other words, to computational systems. Not that we are driven by powerful ambitions of colonizing the Moon, replacing humans with legions of androids, creating sci-fi scenarios a la Matrix or masterminding some sort of Person of Interest-like Machine. No, the current digital revolution based on computational power is chiefly an everyday revolution. It is therefore that much more profound, unnoticed and widespread, for it affects our customary habits and routines and alters the very texture of our day-to-day lives. This opens a precise line of inquiry, which constitutes the basic thesis of the present text: our computational power is exercised by trying to adapt not just the world but also our representation of reality to how computationally based ICTs work. The impact of this technology is such that it does not leave things as they are: it changes the nature of agents, habits, objects and institutions and hence it subverts the existing order, without necessarily generating a new one. I argue that this power is often not distributed in an egalitarian manner but, on the contrary, is likely to result in concentrations of wealth, in dominant positions or in unjust competitive advantages. This opens up a struggle, with respect to which the task of reaffirming the fundamental values, the guiding principles, the priorities and the rules of the game, which can transform, or attempt to transform, a fierce confrontation between enemies in a fair competition between opponents rests on us.
This book provides a comprehensive guide to legal issues which have arisen as a result of the growth of the internet and the worldwide web. As well as discussing each topic in detail, Jonathan Rosenoer includes extensive coverage of the relevant cases and their implications for the future. Topics covered include: copyright and trademark issues, defamation, privacy, liability, electronic contracts, tax issues, and ethics. A potted history of the significant legal events is included which runs from the founding of the Electronic Frontier Foundation to the 1996 Telecommunications Act. About the author: Jonathan Rosenoer has been general counsel for the Haft Corporation, Executive Editor for Lexis Counsel Connect, and is best known for his CyberLaw column which has a distribution list of over four million.
Social network analysis dates back to the early 20th century, with initial studies focusing on small group behavior from a sociological perspective. The emergence of the Internet and subsequent increase in the use of online social networking applications has caused a shift in the approach to this field. Faced with complex, large datasets, researchers need new methods and tools for collecting, processing, and mining social network data. Social Network Mining, Analysis and Research Trends: Techniques and Applications covers current research trends in the area of social networks analysis and mining. Containing research from experts in the social network analysis and mining communities, as well as practitioners from social science, business, and computer science, this book proposes new measures, methods, and techniques in social networks analysis and also presents applications and case studies in this changing field.
This text examines the impact of information and communication technologies (ICTs) and their consequences for political institutions, and assesses critically the concept of an emergent electronic democracy. The first section discusses the concepts and issues of "Electronic Democracy" with chapters on democracy and cyberspace, local democracy, global control and interactive ICTs. In the second section, entitled ICTs and the state, the chapters examine the impacts and implications of televising the British "House of Commons", the effects of ICTs on political parties, and closed circuit television. The final section discusses ICTs and the citizen with chapters covering democracies online, strengthening communities in the information age and the community network. This book provides a source for those studying social policy, politics and sociology as well as for policy analysts, social scientists and computer scientists.
The 'smart city' is often promoted as a technology-driven solution to complex urban issues. While commentators are increasingly critical of techno-optimistic narratives, the political imagination is dominated by claims that technical solutions can be uniformly applied to intractable problems. This book provides a much-needed alternative view, exploring how 'home-grown' digital disruption, driven and initiated by local actors, upends the mainstream corporate narrative. Drawing on original research conducted in a range of urban African settings, Odendaal shows how these initiatives can lead to meaningful change. This is a valuable resource for scholars working in the intersection of science and technology studies, urban and economic geography and sociology.
The calculus of IT support for the banking, securities and insurance industries has changed dramatically and rapidly over the past few years. Unheard of just a few years ago, corporate intranets are now used for everything from job postings to enhanced team communications. Whole new departments are being created to support e-commerce. And the Internet/Intranet/Extranet triple-whammy is the most critical component of most financial IT shops. At the same time, new intelligent agents stand ready to take on such diverse functions as customer profiling and data mining.
This wide-ranging introductory text looks at the virtual community of cyberspace and analyzes its relationship to the real one as lived out in today's societies. Such issues as race, gender, power, economics and ethics in cyberspace are discussed by the leading experts on the subject of the Internet, grouped under four main sections: identity; social order and control; community structure and dynamics; and collective action. The book displays how the idea of community is being challenged and rewritten by the increasing power and range of cyberspace. As new societies and relationships are formed in this virtual landscape, we are now having to consider the potential consequences this might have on our own community and societies.;The text should appeal to students and professionals, but also to those concerned about the changing relationships between information technology and a society which is fast becoming divided between those on-line and those not.
Politicians, policy makers and business gurus are all encouraging us to join the information superhighway at the nearest junction or risk being excluded from the social and economic benefits of the information revolution. "Cyberspace Divide" critically considers the complex relationship between technological change, its effect upon social divisions, its consequences for social action an the emerging strategies for social inclusion in the Information Age. The contributors cover such themes as human interaction, ethical behavior, and the growing disparity between the information rich and the information poor.
Is the emerging digital multimedia culture of today transforming
the textbook or forever displacing it? As new media of transmission
enter the classroom, the traditional textbook is now caught up in a
dialogue reshaping the textual boundaries of the book, and with it
the traditional modes of cognition and learning, which are bound
more to language than to visual form. Most of the important work in
the past two decades in the field of curriculum has focused on the
culture of the textbook. A rich literature has evolved around
textbooks as the traditional object of instructional activity. This
volume is an important contribution to this literature, which
focuses on the actual making of a textbook. This design process
serves as a metaphor that suggests new paradigms of learning and
instruction, in which text content is but one component in a
multidimensional information space."The Visual Turn" is an
exploration along the border of this new learning space
transforming the traditional center of instruction in the
classroom.
Suzanne Keene's pioneering book shows how museums and other cultural organizations fit into the new world of information and electronic communications and, most importantly, how they can take advantage of what it has to offer.
|
You may like...
|