![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.
Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.
First book to look at legal and regulatory aspects of personal care robots
- the book provides a short and accessible introduction to AI for learners - it examines seven different educational roles and settings, from AI as a peer to AI as a tutor and AI as textbook, among others - it considers both opportunities and risks: technological developments as well as ethical considerations
Feminist War Games? explores the critical intersections and collisions between feminist values and perceptions of war, by asking whether feminist values can be asserted as interventional approaches to the design, play, and analysis of games that focus on armed conflict and economies of violence. Focusing on the ways that games, both digital and table-top, can function as narratives, arguments, methods, and instruments of research, the volume demonstrates the impact of computing technologies on our perceptions, ideologies, and actions. Exploring the compatibility between feminist values and systems of war through games is a unique way to pose destabilizing questions, solutions, and approaches; to prototype alternative narratives; and to challenge current idealizations and assumptions. Positing that feminist values can be asserted as a critical method of design, as an ideological design influence, and as a lens that determines how designers and players interact with and within arenas of war, the book addresses the persistence and brutality of war and issues surrounding violence in games, whilst also considering the place and purpose of video games in our cultural moment. Feminist War Games? is a timely volume that questions the often-toxic nature of online and gaming cultures. As such, the book will appeal to a broad variety of disciplinary interests, including sociology, education, psychology, literature, history, politics, game studies, digital humanities, media and cultural studies, and gender studies, as well as those interested in playing, or designing, socially engaged games.
1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.
* Outlines a holistic, evidence-based mindset shift for designing and implementing technology-rich learning experiences that are attentive to social concerns such as equity, ethics, play, diversity, and democratic participation. * Driven by a balance of theoretical and methodological chapters with grounded empirical bases. * Concludes with a future-focused discussion about upcoming digital competencies and the implications of applying design-oriented approaches to digital learning practices.
Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem
Improves the reader's teaching and learning methodologies by deepening cognition processes and digital education models related to mobile technologies; Discovers how innovative interactions in teaching/learning, user/device, learning/mixed-reality, and virtual body/sound can affect the educational design of mobile learning environments; Enhances your knowledge on learning performance in mixed reality - embedded in mobile technologies - through its use in smartphones and technology tools; Reviews how to design a mobile learning environment according to spatial learning, sound production, and virtual body interactions; Reviews ones educational knowledge on how to manage mobile technology and specific learning disorders, attention deficit disorder, digital amnesia, and information overload.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.
Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business. Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book. Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.
This book describes capacity building in strategic and non-strategic machine tool technology. It includes machine building in sectors such as machine tools, automobiles, home appliances, energy, and biomedical engineering, along with case studies. The book offers guidelines for capacity building in academia, covering how to promote enterprises of functional reverse engineering enterprises. It also discusses machine tool development, engineering design, prototyping of strategic, and non-strategies machine tools, as well as presenting communication strategies and IoT, along with case studies. Professionals from the CNC (Computer Numeric Control) machine tools industry, industrial and manufacturing engineers, and students and faculty in engineering disciplines will find interest in this book.
In this short introduction, David J. Gunkel examines the shifting world of artificial intelligence, mapping it onto everyday twenty-first century life and probing the consequences of this ever-growing industry and movement. The book investigates the significance and consequences of the robot invasion in an effort to map the increasingly complicated social terrain of the twenty-first century. Whether we recognize it as such or not, we are in the midst of a robot invasion. What matters most in the face of this machine incursion is not resistance, but how we decide to make sense of and respond to the social opportunities and challenges that autonomous machines make available. How to Survive a Robot Invasion is a fascinating and accessible volume for students and researchers of new media, philosophy of technology, and their many related fields. It aims both to assist readers' efforts to understand a changing world and to provide readers with the critical insight necessary for grappling with our science fiction-like future.
The purpose of this book is to develop capacity building in strategic and non-strategic machine tool technology. The book contains chapters on how to functionally reverse engineer strategic and non-strategic computer numerical control machinery. Numerous engineering areas, such as mechanical engineering, electrical engineering, control engineering, and computer hardware and software engineering, are covered. The book offers guidelines and covers design for machine tools, prototyping, augmented reality for machine tools, modern communication strategies, and enterprises of functional reverse engineering, along with case studies. Features Presents capacity building in machine tool development Discusses engineering design for machine tools Covers prototyping of strategic and non-strategic machine tools Illustrates augmented reality for machine tools Includes Internet of Things (IoT) for machine tools
Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R. Each of the eight chapters provides a detailed case study, showing readers: how to develop exploratory indicators; understand 'spatial process' and develop spatial analytics; how to develop 'useful' predictive analytics; how to convey these outputs to non-technical decision-makers through the medium of data visualization; and why, ultimately, data science and 'Planning' are one and the same. A graduate-level introduction to data science, this book will appeal to researchers and data scientists at the intersection of data analytics and public policy, as well as readers who wish to understand how algorithms will affect the future of government.
Offers parents, and training and practising professionals in psychology, psychotherapy, education and social work insight into what the evidence says about human behaviour online, what this means for how children develop and how we can best support children to be safe and healthy online now and in future. Accessibly presents the key research from psychology, sociology and biology to reveal how and why humans interact with platforms, apps and software. Covers essential topics including social media, gaming and harmful effects of technology and social media.
Old age is currently the greatest risk factor for developing dementia. Since older people make up a larger portion of the population than ever before, the resulting increase in the incidence of dementia presents a major challenge for society. Dementia is complex and multifaceted and impacts not only the person with the diagnosis but also those caring for them and society as a whole. Human-Computer Interaction (HCI) design and development are pivotal in enabling people with dementia to live well and be supported in the communities around them. HCI is increasingly addressing the need for inclusivity and accessibility in the design and development of new technologies, interfaces, systems, services, and tools. Using interdisciplinary approaches HCI engages with the complexities and 'messiness' of real-world design spaces to provide novel perspectives and new ways of addressing the challenge of dementia and multi-stakeholder needs. HCI and Design in the Context of Dementia brings together the work of international experts, designers and researchers working across disciplines. It provides methodologies, methods and frameworks, approaches to participatory engagement and case studies showing how technology can impact the lives of people living with dementia and those around them. It includes examples of how to conduct dementia research and design in-context in the field of HCI, ethically and effectively and how these issues transcend the design space of dementia to inform HCI design and technology development more broadly. The book is valuable for and aimed at designers, researchers, scholars and caregivers that work with vulnerable groups like people with dementia, and those directly impacted.
Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field. FEATURES Presents descriptions for each type of cybersecurity technology and their specifications Explains applications, usages, and offers case studies to enhance comprehension Offers an easy-to-understand classification of existing cybersecurity technologies Provides an understanding of the technologies without getting lost in technical details Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.
In the wake of the dot-com shakeout of 2000, the time is ripe for a reappraisal of how information technology (IT) has created new environments for businesses and workers in the US and Europe. This book draws on the experiences of the 1990s to discern successful strategies for competing and winning in the New Economy. The lessons are most sharply defined in specific regional clusters of innovation. Accordingly, contributors are mainly on-the-scene observers and practitioners from Silicon Valley, New England and Europe. The common theme is the attempt to find innovative ways (in part through non-traditional business models) to create and build increasingly networked, flexible, participatory companies. Drawing on the notion of entrepreneurial behavior as "the pursuit of goals that are beyond the means currently available," the collection examines management, leadership, and innovation issues in start-up and established companies alike. While recognizing the hard realities of the new competition, the book highlights emerging win-win scenarios. Enabled in part by the new IT systems, these new approaches help companies succeed by seeking and rewarding decision-making, initiative and creativity on the part of all employees.
Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies. Drawing on 14 case studies organized around four sites of work, this book shows how definitions of labor have been influenced by the digital technologies that employees use to produce, interpret, or process text. Incorporating methodology and theory from a range of disciplines and highlighting labor issues related to topics as diverse as census tabulation, market research, electronic games, digital archives, and 3D modeling, contributors uncover the roles played by race, class, gender, sexuality, and national politics in determining how narratives of digital labor are constructed and erased. Because each chapter is centered on the human cost of digital technologies, however, it is individual people immersed in cultures of technology who are the focus of the volume, rather than the technologies themselves. Humans at Work in the Digital Age shows how humanistic inquiry can be a valuable tool in the emerging conversation surrounding digital textual labor. As such, this book will be essential reading for academics and postgraduate students engaged in the study of digital humanities; human-computer interaction; digital culture and social justice; race, class, gender, and sexuality in digital realms; the economics of the internet; and technology in higher education.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to produce information and knowledge, has created a secondary and very active informal marketplace of ideas and knowledge. Anchored by platforms like Wikipedia, YouTube, Facebook and Twitter, this informal marketplace has low barriers to entry and has become a gigantic and potentially questionable, knowledge resource for the public at large. Roles, Trust and Reputation in Social Media Knowledge Markets will discuss some of the emerging trends in defining, measuring and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book will propose a future research agenda related to these issues. The ultimate goal of research agenda being to shape the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. The authors, including leading scholars and young innovators, will share with the readers some of the main lessons they have learned from their own work in these areas and will discuss the issues, topics and sub-areas that they find under-studied or that promise the greatest intellectual payoff in the future. The discussion will be placed in the context of social network analysis and "big data" research. Roles, Trust and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature, as the research agenda in reputation and authorship is still emerging. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories and methodologies proposed by the contributors offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow's information consumers make smarter choices, developers to create new tools and researchers to launch new research programs.
This book investigates the ways in which the mobile telephone has transformed societies around the world, bringing both opportunities and challenges. At a time when knowledge and truth are increasingly contested, the book asks how mobile technology has changed the ways in which people create, disseminate, and access knowledge. Worldwide, mobile internet access has surpassed desktop access, and it is estimated that by 2022 there will be AN excess of 6 billion mobile phone users in the world. This widespread proliferation raises all sorts of questions around who creates knowledge, how is that knowledge shared and proliferated, and what are the structural political, economic, and legal conditions in which knowledge is accessed. The practices and power dynamics around mobile technologies are location specific. They look different depending on whether one chooses to highlight the legal, social, political, or economic context. Bringing together scholars, journalists, activists and practitioners from around the world, this book embraces this complexity, providing a multifaceted picture that acknowledges the tensions and contradictions surrounding accessing knowledge through mobile technologies. With case studies from Hong Kong, South Korea, India, Syria, Egypt, Botswana, Brazil, and the US, this book provides an important account of the changing nature of our access to knowledge, and is key reading for students, researchers, activists and policy makers with an interest in technology and access to knowledge, communication, social transformation, and global development.
Considering the overall situation of the current pandemic and pertinent recommendations, this book focuses on the use of augmented reality (AR) applications for preventing COVID-19 outbreaks along with techniques, tools, and platforms to achieve social distancing.and sanitization. COVID-19 Public Health Measures: An Augmented Reality Perspective contains theoretical and practical knowledge of AR and remedies on how to cope with the pandemic, including multiple use cases along with a set of recommendations. This book illustrates application building using open-source software with an interactive interface to aid impaired users. The initial part of this book emphasizes the basic knowledge of AR, technology, devices, and rest of the relevant theories. This book is aimed at researchers, students of AR, technical healthcare professionals, and practitioners. Key Features: * Consists of an extensive introduction to the terminologies and components of AR * Provides in-depth knowledge of various tools and techniques used in AR * Introduces various platforms and software development kits (SDKs) such as Unity Engine, Unreal Engine, and Vuforia * Gives a step-by-step guide for the development of an AR app * Describes how AR can be used specifically by impaired users not only in the situation of current pandemic but also in normal situations thus simplifying day-to-day activities
Inside the life of a hacker and cybercrime culture. Public discourse, from pop culture to political rhetoric, portrays hackers as deceptive, digital villains. But what do we actually know about them? In Hacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and situates the practice of hacking within the larger political and economic structures of capitalism, crime, and control.This captivating book challenges many of the common narratives of hackers, suggesting that not all forms of hacking are criminal and, contrary to popular opinion, the broader hacker community actually plays a vital role in our information economy. Hacked thus explores how governments, corporations, and other institutions attempt to manage hacker culture through the creation of ideologies and laws that protect powerful economic interests. Not content to simply critique the situation, Steinmetz ends his work by providing actionable policy recommendations that aim to redirect the focus from the individual to corporations, governments, and broader social issues. A compelling study, Hacked helps us understand not just the figure of the hacker, but also digital crime and social control in our high-tech society. |
You may like...
New Trends in the Physics and Mechanics…
Martine Ben Amar, Alain Goriely, …
Hardcover
R2,505
Discovery Miles 25 050
German Phrase Book - The Ultimate German…
Language Learning University
Hardcover
Liengme's Guide to Excel 2016 for…
Bernard Liengme, Keith Hekman
Paperback
R1,354
Discovery Miles 13 540
|