![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Investigates theoretically and empirically what it means to design technological artefacts while embracing the large number of practices which practitioners engage with when handling technologies. The authors discusses the fields of design and sociomateriality through their shared interests towards the basic nature of work, collaboration, organization, technology, and human agency, striving to make the debates and concepts originating in each field accessible to each other, and thus moving sociomateriality closer to the practical concerns of design and providing a useful analytical toolbox to information system designers and field researchers alike. Sociomaterial-Design: Bounding Technologies in Practice takes on the challenge of redefining design practices through insights from the emerging debate on sociomateriality. It does so by bringing forward a comparative examination of two longitudinal ethnographic studies of the practices within two emergency departments - one in Canada and one in the United States of America. A particular focus is placed upon the use of current collaborative artefacts within the emergency departments and the transformation into digital artefacts through design.
This book argues for the value of digital literacy in the multilingual writing classroom. Against the background of huge changes in literacy practices prompted by online communication, and a growing acceptance of a broader definition of academic literacy that encompasses multimodality, the book examines the relationship between digital and print literacies and addresses the design of literacy spaces for multilingual classrooms. The author critically evaluates the latest developments in the use of technology in multilingual writing spaces, and focuses on the role of teachers in their design; it also addresses areas that are not often discussed in relation to multilingual students, from blogging to publishing and intellectual property. The book will help teachers meet the challenges created by rapidly shifting technology, as well as making an innovative contribution to research on multilingual writing classrooms.
While the general public may feel uncomfortable discussing sexual assault and violence with neighbors or coworkers, the popularity of Twitter, Snapchat, and a host of other social media platforms suggests that we are not shy about expressing our opinions online. Debates that just a few years ago would have taken place in real life have been relocated online; allowing eager commenters to share their thoughts on guilt or innocence with legions of virtual strangers. Crowdsourcing the Law explores how everyday participants interpret and apply law in the influential online court of public opinion. Engaging a multidisciplinary, case study approach, the book analyzes social media comments about public figures such as Bill Cosby, Brock Turner, and Harvey Weinstein to address ambitious questions like: How are rape myths being challenged, reinforced, and reinvented on social media? What is the promise and peril of the #MeToo movement for transforming the law? And can due process be afforded in the face of an increasingly powerful virtual jury?
We live in a world that's constantly redesigned. Today's redesign is tomorrow's vintage look. But times of crisis rapidly change the picture. Suddenly, the whole world is in dire need of a proper redesign. From capitalism to communication, from work to supply chains, from cities to office space - it's hard to find an area of our lives that's not due for an overhaul. This is a challenge, but also a huge opportunity: to design a better world.
This book addresses the application of computing to cultural heritage and the discipline of Digital Humanities that formed around it. Digital Humanities research is transforming how the Human record can be transmitted, shaped, understood, questioned and imagined and it has been ongoing for more than 70 years. However, we have no comprehensive histories of its research trajectory or its disciplinary development. The authors make a first contribution towards remedying this by uncovering, documenting, and analysing a number of the social, intellectual and creative processes that helped to shape this research from the 1950s until the present day. By taking an oral history approach, this book explores questions like, among others, researchers' earliest memories of encountering computers and the factors that subsequently prompted them to use the computer in Humanities research. Computation and the Humanities will be an essential read for cultural and computing historians, digital humanists and those interested in developments like the digitisation of cultural heritage and artefacts. This book is open access under a CC BY-NC 2.5 license
Analysing the convergence of law and regulation with rapidly evolving communications technologies, this interdisciplinary work navigates the intricate balancing act between human rights protection and technological innovation in a digital age, and illuminates the comprehensive potential of human rights to frame our intelligent use of technology. The authors address such pressing questions as how to protect user privacy online, whether digital pollution is a health hazard, who should have control and be responsible for data technologies and how to maintain human autonomy in a world of interconnected objects. By considering specific cases, this book provides an in-depth exploration of the many regulatory and technological choices citizens, states, civil society organizations and the private sector should consider to ensure that digital technology more fully serves human needs.
As a foreword, here we publish an email letter of Late Professor Herb Simon, Nobel Laureate, that he wrote on the occasion ofthe death of the fatherofa friend. This letterofcondolence, more than any other wisdom, tells about the essence of the process of scientific creation, which is so important for both, the specific subject being covered by this book, and for the general science. When asked to address an SSGRR conference in Italy, prior to his death, Professor Herb Simon agreed that these lines be presented to all those who are interested in understanding the real essence oftheir own scientific struggle. Dear Professor Milutinovic: I want to extend my deepest sympathy to you and your family on the death of your father. His career was a very distinguished one, and his life spanned a most complex and difficult sequence of epochs in your country's history. Our generation (I am just a year younger than he was), like all its predecessors, leaves many tasks - hopefully no more than it inherited - for the next generation to take up; but even knowing that it must be so does not remove one's senseofloss in the parting.
Der Domainname ist SchlA1/4ssel und AushAngeschild jeder Website. Je durchdachter die Wahl der Domain, um so besser die Kommunikation. Dieses Buch bietet einen Rundum-Service: ausgehend von der Bedeutung eines guten Domain-Namens bis hin zu Suche, Registrierung, Handel, Rechtsfragen und Zukunftsprognosen soll das BewuAtsein fA1/4r den Domain-Namen als Grundlage von Marketingstrategien im Internet geschArft werden. Das Buch bietet auAerdem eine Basis fA1/4r das Management von Domain-Portfolios und richtet sich an Internetverantwortliche in Unternehmen ebenso wie an AnwAlte mit Schwerpunkt Online-Recht.
This book provides a critical overview of the changing ways people mourn, commemorate and interact with the remains of the dead, including bodies, materials and digital artefacts. It focuses on how residues of death persist and circulate through different spaces, materials, data and mediated memories, refiguring how the disposal of the dead is understood, enacted and contested across the globe. The volume contains contributions by scholars from a number of disciplines and includes a diverse range of case studies drawn from Asia, Europe and North America. Together they reveal how rapidly changing practices, industries and experiences around death's remains involve the entwining of digital technologies with other material and ritualised forms of commemoration, as well as with shifting boundaries between the sacred and the profane, the institutional and the vernacular, the public and the private.
This book is about the nature of publishing: its processes, history and technologies. It also explores the relationship of technology to pedagogy and how publishing has been a part of reading and writing instruction throughout the 20th century. Today publishing is both an individual and a collaborative process that is commercially, organizationally and pedagogically driven. The goal of the book is to provide a theoretical, historical, and philosophical conception of publishing that would help teachers who are beginning to work in computer-supported environments.
This book is an academic publication about the global development of massive open online courses (MOOCs) and major MOOC platforms worldwide in the past decade, as well as the outlook of MOOCs in the future, with an emphasis on Greater China. The book also discusses the upsurge of the demand for online learning and MOOCs during the COVID-19 pandemic.The book is divided into three main parts - Part I: Overview of MOOCs introduces the origin and history of MOOCs and the development of MOOC platforms in Greater China and the global context; Part II: Key Issues discuss the MOOC policies, innovative pedagogy, technology, and ecosystems worldwide; and Part III: Beyond MOOCs probes into the roles and benefits of MOOCs in times of crises, as well as the outlook of MOOCs in the future. In terms of topic diversity, the book contains a comprehensive investigation of the past and latest MOOC developments, extracting and elaborating on relevant information regarding platforms, policies, pedagogy, technology, and ecosystems. Subsequently, in-depth analyses of MOOC data are utilized to deduce the current trends related to the MOOC movement and to extrapolate the likeliest direction of development for MOOCs in the years to come. The book can inform policymakers, education institutions, course instructors, platform developers, investors, researchers, and individual learners of MOOCs about critical information on the present and future of MOOC development, assisting them in making crucial decisions on what initiatives can optimize their advantages in the sector.
Ensure the success of your security programme by understanding users' motivations"This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronising or prescriptive, making it an easy read with some very real practical takeaways."Thom Langford, Chief Information Security Officer at Publicis Groupe"Based on real world examples the book provides valuable insights into the relationship of information security, compliance, business economics and decision theory. Drawing on interdisciplinary studies, commentary from the field and his own research Leron gives the reader the necessary background and practical tools to drive improvements in their own information security program."Daniel Schatz, Director for Threat & Vulnerability Management at Thomson Reuters In today's corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their company's assets and mitigate risks to the furthest extent possible.Security professionals can often be ignorant of the impact that implementing security policies in a vacuum can have on the end users' core business activities. These end users are, in turn, often unaware of the risk they are exposing the organisation to. They may even feel justified in finding workarounds because they believe that the organisation values productivity over security. The end result is a conflict between the security team and the rest of the business, and increased, rather than reduced, risk.This can be addressed by factoring in an individual's perspective, knowledge and awareness, and a modern, flexible and adaptable information security approach. The aim of the security practice should be to correct employee misconceptions by understanding their motivations and working with the users rather than against them - after all, people are a company's best assets.Product descriptionBased on insights gained from academic research as well as interviews with UK-based security professionals from various sectors, The Psychology of Information Security - Resolving conflicts between security compliance and human behaviour explains the importance of careful risk management and how to align a security programme with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.The Psychology of Information Security redresses the balance by considering information security from both viewpoints in order to gain insight into security issues relating to human behaviour , helping security professionals understand how a security culture that puts risk into context promotes compliance. About the authorLeron Zinatullin (zinatullin.com) is an experienced risk consultant specialising in cyber security strategy, management and delivery. He has led large-scale, global, high-value security transformation projects with a view to improve cost performance and support business strategy.He has extensive knowledge and practical experience in solving information security, privacy and architectural issues across multiple industry sectors.He has an MSc in information security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behaviour.Series informationThe Psychology of Information Security is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.Ensure the success of your security programmes by understanding the psychology of information security. Buy this book today.
The special issue of the "Comparative Law Yearbook of international Business deals with the very topical subject of e-commerce. This is an area that has seen an explosion of interest in recent years but, since the increase in the use of the Internet as a vehicle for conducting business transactions has been so rapid, the law has again fallen behind, particularly in the areas of regulation and jurisdiction. The situation is changing, however, with the introduction of both national and international legislation dealing with issues and relating to, "inter alia, data protection, privacy, electronic signatures, consumer protection and morality. The authors in this volume provide commetaries on the most recent developments in various jurisdictions, including the approach of the European Union to the problems raised by e-commerce. They discuss the difficulties in relation to jurisdiction arising from the global nature of Internet and the possibilities for dispute resolution between multi national parties to an electronic transaction. The topic is obviously one that will require much attention in the coming years and one which will need strict regulation if electronic commerce is destined to become the trading medium of the future.
Everyday Innovators explores the active role of people, collectively and individually, in shaping the use of information and communication technologies. It examines issues around acquiring and using that knowledge of users, how we should conceptualise the role of users and understand the forms and limitations of their participation.
This book enables a cross-fertilisation of perspectives from different disciplines and aims to provide new insights into the role of users, drawing out both applied and theoretical implications
The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.
Sociotechnical theory, which focuses on the interplay between social and technical behaviors in a society or organization, encourages critical discussion of the relationship between individuals and technology. Knowledge Development and Social Change through Technology: Emerging Studies reviews practices that lead to social and organizational change and how these practices are influenced by technology. Focusing on applications and approaches, this book encourages focused research on societal change and growth on an organizational level.
Communities of Computing is the first book-length history of the Association for Computing Machinery (ACM), founded in 1947 and with a membership today of 100,000 worldwide. It profiles ACM's notable SIGs, active chapters, and individual members, setting ACM's history into a rich social and political context. The book's 12 core chapters are organized into three thematic sections. ""Defining the Discipline"" examines the 1960s and 1970s when the field of computer science was taking form at the National Science Foundation, Stanford University, and through ACM's notable efforts in education and curriculum standards. "Broadening the Profession" looks outward into the wider society as ACM engaged with social and political issues - and as members struggled with balancing a focus on scientific issues and awareness of the wider world. Chapters examine the social turbulence surrounding the Vietnam War, debates about the women's movement, efforts for computing and community education, and international issues including professionalization and the Cold War. "Expanding Research Frontiers" profiles three areas of research activity where ACM members and ACM itself shaped notable advances in computing, including computer graphics, computer security, and hypertext. Featuring insightful profiles of notable ACM leaders, such as Edmund Berkeley, George Forsythe, Jean Sammet, Peter Denning, and Kelly Gotlieb, and honest assessments of controversial episodes, the volume deals with compelling and complex issues involving ACM and computing. It is not a narrow organizational history of ACM committees and SIGS, although much information about them is given. All chapters are original works of research. Many chapters draw on archival records of ACM's headquarters, ACM SIGs, and ACM leaders. This volume makes a permanent contribution to documenting the history of ACM and understanding its central role in the history of computing.
Communities of Computing is the first book-length history of the Association for Computing Machinery (ACM), founded in 1947 and with a membership today of 100,000 worldwide. It profiles ACM's notable SIGs, active chapters, and individual members, setting ACM's history into a rich social and political context. The book's 12 core chapters are organized into three thematic sections. "Defining the Discipline" examines the 1960s and 1970s when the field of computer science was taking form at the National Science Foundation, Stanford University, and through ACM's notable efforts in education and curriculum standards. "Broadening the Profession" looks outward into the wider society as ACM engaged with social and political issues - and as members struggled with balancing a focus on scientific issues and awareness of the wider world. Chapters examine the social turbulence surrounding the Vietnam War, debates about the women's movement, efforts for computing and community education, and international issues including professionalization and the Cold War. "Expanding Research Frontiers" profiles three areas of research activity where ACM members and ACM itself shaped notable advances in computing, including computer graphics, computer security, and hypertext. Featuring insightful profiles of notable ACM leaders, such as Edmund Berkeley, George Forsythe, Jean Sammet, Peter Denning, and Kelly Gotlieb, and honest assessments of controversial episodes, the volume deals with compelling and complex issues involving ACM and computing. It is not a narrow organizational history of ACM committees and SIGS, although much information about them is given. All chapters are original works of research. Many chapters draw on archival records of ACM's headquarters, ACM SIGs, and ACM leaders. This volume makes a permanent contribution to documenting the history of ACM and understanding its central role in the history of computing.
This book is an insightful meta-narrative about schooling which explores the global natural experiment of the COVID-19 pandemic and its potential impact on school culture. The proposed book discusses how the abrupt and somewhat forced digital transformation of schooling on a global scale (caused by the COVID-19 pandemic) did not change the educational status quo. It states that online teaching and learning failed to transform the role of the key school actors, students and teachers as well as the relationship between them, despite megatrends such as digitalisation, automation and the development of artificial intelligence. This focus text discusses why the global experience of distance education did not translate into a significant qualitative change and provides a theoretical framework which enables the reader to interpret and explain the processes that occurred during distance education, as well as understand why extraordinarily little (if nothing) has changed in school culture. It will appeal to scholars and students from the sociology of education and from education studies, particularly those interested in school culture, innovation in education, online teaching and learning, curriculum studies, and education policy.
This anthology contributes to creating awareness on how digital ageism operates in relation to the widely spread symbolic representations of old and young age, the (lack of) representation of diverse older individuals in the design, development, and discourses and in the actual algorithms and datasets. It also shows how individuals and institutions deal with digital ageism in everyday life. In the past decades, digital technologies permeated most aspects of everyday life and became ingrained into human existence. With a focus on how age is represented and experienced in relation to digital technologies leading to digital ageism, digitalisation's reinforcement of spirals of exclusion and loss of autonomy of some collectives is explored, when it could be natural for a great part of society and represent a sort of improvement. The book addresses social science students and scholars interested in everyday digital technologies, society and the power struggles about it, providing insights from different parts of the globe. By using different methods and touching upon different aspects of digital ageism and how it plays out in contemporary connected data societies, this volume will raise awareness, challenge power, initiate discussions and spur further research into this field.
The text focuses on the theory, design, and implementation of the Internet of Things (IoT), in a modern communication system. It will be useful to senior undergraduate, graduate students, and researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology. Features: Presents all the necessary information on the Internet of Things in modern computing Examines antenna integration challenges and constraints in the Internet of Things devices Discusses advanced Internet of Things networks and advanced controllers required for modern architecture Explores security and privacy challenges for the Internet of Things-based health care system Covers implementation of Internet of Things security protocols such as MQTT, Advanced Message Queuing Protocol, XMPP, and DSS The text addresses the issues and challenges in implementing communication and security protocols for IoT in modern computing. It further highlights the applications of IoT in diverse areas including remote health monitoring, remote monitoring of vehicle data and environmental characteristics, industry 4.0, 5G communications, and Next-gen IoT networks. The text presents case studies on IoT in modern digital computing. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology.
Social machines are a type of network connected by interactive digital devices made possible by the ubiquitous adoption of technologies such as the Internet, the smartphone, social media and the read/write World Wide Web, connecting people at scale to document situations, cooperate on tasks, exchange information, or even simply to play. Existing social processes may be scaled up, and new social processes enabled, to solve problems, augment reality, create new sources of value, and disrupt existing practice. This book considers what talents one would need to understand or build a social machine, describes the state of the art, and speculates on the future, from the perspective of the EPSRC project SOCIAM - The Theory and Practice of Social Machines. The aim is to develop a set of tools and techniques for investigating, constructing and facilitating social machines, to enable us to narrow down pragmatically what is becoming a wide space, by asking 'when will it be valuable to use these methods on a sociotechnical system?' The systems for which the use of these methods adds value are social machines in which there is rich person-to-person communication, and where a large proportion of the machine's behaviour is constituted by human interaction.
Digital Approaches to Inclusion and Participation in Cultural Heritage brings together best examples and practices of digital and interactive approaches and platforms from a number of projects based in European countries to foster social inclusion and participation in heritage and culture. It engages with ongoing debates on the role of culture and heritage in contemporary society relating to inclusion and exclusion, openness, access, and bottom-up participation. The contributions address key themes such as the engagement of marginalised communities, the opening of debates and new interpretations around socially and historically contested heritages, and the way in which digital technologies may foster more inclusive cultural heritage practices. They will also showcase examples of work that can inspire reflection, further research, and also practice for readers such as practice-focused researchers in both HCI and design. Indeed, as well as consolidating the achievements of researchers, the contributions also represent concrete approaches to digital heritage innovation for social inclusion purposes. The book's primary audience is academics, researchers, and students in the fields of cultural heritage, digital heritage, human-computer interaction, digital humanities, and digital media, as well as practitioners in the cultural sector.
In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing book, Matt Curtin charts the rise and fall of DES and chronicles the efforts of those who were determined to master it.
1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms |
![]() ![]() You may like...
Emerging Technologies - Ethics, Law and…
Gary E Marchant, Wendell Wallach
Hardcover
R9,928
Discovery Miles 99 280
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,876
Discovery Miles 38 760
The Democracy Gap - The Politics of…
Jill Hills, Stylianos Papathanassopoulos
Hardcover
R2,976
Discovery Miles 29 760
|