Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
First book to look at legal and regulatory aspects of personal care robots
The ideal of an inclusive and participatory Internet has been undermined by the rise of misogynistic abuse on social media platforms. However, limited progress has been made at national - and to an extent European - levels in addressing this issue. In England and Wales, the tackling of underlying causes of online abuse has been overlooked because the law focuses on punishment rather than measures to prevent such abuses. Furthermore, online abuse has a significant impact on its victims that is underestimated by policymakers. This volume critically analyses the legal provisions that are currently deployed to tackle forms of online misogyny, and focuses on three aspects; firstly, the phenomenon of social media abuse; secondly, the poor and disparate legal responses to social media abuses; and thirdly, the similar failings of hate crime to tackle problems of online gender-based abuses. This book advances a compelling argument for legal changes to the existing hate crime, and communications legislation.
In this book Pragati Rawat and John C. Morris identify and evaluate the impact of factors that can help explain the difference in e-participation, public participation using information and communication technology, in different countries. While cross-sectional studies have been covered, few have taken an in-depth look at cross-national studies. This book attempts to fill the gap using quantitative panel data to explore the influence of technology and institutions, and the impact of their complex relationships in a mediation and moderation analysis, on e-participation. The current study reviews the scholarly work in the field of "offline" and "online participation" to identify a set of antecedents that influence e-participation. A conceptual framework is developed, supported by the theories from the public policy and socio-technical premise. The authors utilize secondary data, primarily from the UN and World Economic Forum, for 143 countries from three waves of surveys to measure the dependent and explanatory variables. The panel data is statistically analyzed and findings reveal the role of technology as a mediator as well as a moderator for institutions' impact on e-participation. The Effects of Technology and Institutions on E-Participation provides a groundbreaking country-level analysis that will appeal to academics and students of e-government and Digital Government, Public Policy, Public Administration, Public Sector Innovation, and Public Participation.
This book covers the relationship between information and communication technologies (ICTs) and communities both physical and virtual. Community technology applications are studied in many contexts. The book demonstrates the dynamic and interdisciplinary nature of evolving communities and technologies scholarship.
Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field. FEATURES Presents descriptions for each type of cybersecurity technology and their specifications Explains applications, usages, and offers case studies to enhance comprehension Offers an easy-to-understand classification of existing cybersecurity technologies Provides an understanding of the technologies without getting lost in technical details Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.
Thematically organized around three of the most pressing ethical issues of the digital age (shifting of professional norms, moderating offensive content, and privacy), this volume offers a window into some of the hot-button ethical issues facing a society where digital has become the new normal. Straddling an applied ethical and theoretical approach, the research represented not only reflects on how our ethical frameworks have been changed and challenged by digital technology, but also provides insights for those confronted with specific ethical dilemmas related to digital technology. With contributions from established experts and up-and-coming scholars alike, this book cuts across disciplines and with appeal to communication scholars, philosophers, and anyone with an interest in ethics and technology.
1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.
1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.
Teaches students how to solve ethical dilemmas in the field of computing, taking a philosophical, rather than a legal, approach to the topic. It first examines the principles of Idealism, Realism, Pragmatism, Existentialism, and Philosophical Analysis, explaining how each of them might be adopted as a basis for solving computing dilemmas. The book then presents a worksheet of key questions to be used in solving dilemmas. Twenty-nine cases, drawn from the real-life experiences of computer professionals, are included in the book as a means to let students experiment with solving ethical dilemmas and identify the philosophical underpinnings of the solutions.
Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem
This book considers the radical effects the emergence of social media and digital politics have had on the way that advocacy organisations mobilise and organise citizens into political participation. It argues that these changes are due not only to technological advancement but are also underpinned by hybrid media systems, new political narratives, and a new networked generation of political actors. The author empirically analyses the emergence and consolidation within advanced democracies of online campaigning organisations, such as MoveOn, 38 Degrees, Getup and AVAAZ. Vromen shows that they have become leading political advocates, and influential on both national and international level governance. The book critically engages with this digital disruption of traditional patterns of political mobilisation and organisation, and highlights the challenges in embracing new ideas such as entrepreneurialism and issue-driven politics. It will be of interest to advanced students and scholars in political participation and citizen politics, interest groups, civil society organisations, e-government and politics and social media.
Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.
Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.
Being a digital citizen has transformed from a process of familiarizing ones self with terminology and techniques to a full-time responsibility in the hands of any who want to stay abreast of the latest technological change in their respective field. Current Trends and Future Practices for Digital Literacy and Competence offers a look at the latest research within digital literacy and competence, setting the bar for the digital citizen of today and tomorrow. Presented in the form of case studies, frameworks, methodologies, architectures, and research, this compendium offers a vital resource for practitioners and academics in any field looking to stay up-to-date on their digital literacy. Chapters range from technically fundamental to the layman to complex, from experts around the world in a variety of jobs and countries.
This study examines findings from a 4-year-long ethnography of communication among a research university's community of scientists and engineers working in nanoscience and nanotechnology. It includes analysis of 20 in-depth interviews with scientists and engineers from 18 different disciplines self-identified as working in nanoscale science and engineering. Using multiple methods of inquiry, including fieldwork, interviews, and textual analysis, elements of a shared speech code are presented, each of which indicate culturally distinctive understandings of psychology, sociology and rhetoric. In particular, the interview data addresses questions such as "What kind of person is a scientist?" "What is the role of science in society?" and "What is the role of communication in science?" This book will appeal to readers interested in science and society, scientific communication, and ethnography of communication.
From the Internet's infrastructure to operating systems like GNU/Linux, the open source movement comprises some of the greatest accomplishments in computing over the past quarter century. Its story embraces technological advances, unprecedented global collaboration, and remarkable tools for facilitating distributed development. The evolution of the Internet enabled an enormous expansion of open development, allowing developers to exchange information and ideas without regard to constraints of space, time, or national boundary. The movement has had widespread impact on education and government, as well as historic cultural and commercial repercussions. Part I discusses key open source applications, platforms, and technologies used in open development. Part II explores social issues ranging from demographics and psychology to legal and economic matters. Part III discusses the Free Software Foundation, open source in the public sector (government and education), and future prospects.
Considers how different fields across technology and business have been affected by the Covid-19 pandemic Explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape technology Offers a wealth of perspectives from international contributors working in a variety of contexts.
Considers how different fields across technology and business have been affected by the Covid-19 pandemic Explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape technology Offers a wealth of perspectives from international contributors working in a variety of contexts.
In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be read by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.
First published in 2000. Routledge is an imprint of Taylor & Francis, an informa company.
The purpose of this book is to develop capacity building in strategic and non-strategic machine tool technology. The book contains chapters on how to functionally reverse engineer strategic and non-strategic computer numerical control machinery. Numerous engineering areas, such as mechanical engineering, electrical engineering, control engineering, and computer hardware and software engineering, are covered. The book offers guidelines and covers design for machine tools, prototyping, augmented reality for machine tools, modern communication strategies, and enterprises of functional reverse engineering, along with case studies. Features Presents capacity building in machine tool development Discusses engineering design for machine tools Covers prototyping of strategic and non-strategic machine tools Illustrates augmented reality for machine tools Includes Internet of Things (IoT) for machine tools
Offers parents, and training and practising professionals in psychology, psychotherapy, education and social work insight into what the evidence says about human behaviour online, what this means for how children develop and how we can best support children to be safe and healthy online now and in future. Accessibly presents the key research from psychology, sociology and biology to reveal how and why humans interact with platforms, apps and software. Covers essential topics including social media, gaming and harmful effects of technology and social media.
The internet has begun to develop into a much more immersive and multi-dimensional space. Three dimensional spaces and sites of interaction have not just gripped our attention but have begun to weave or be woven into the fabric of our professional and social lives. The Immersive Internet - including social media, augmented reality, virtual worlds, online games, 3D internet and beyond - is still nascent, but is moving towards a future where communications technologies and virtual spaces offer immersive experiences persuasive enough to blur the lines between the virtual and the physical. It is this emerging Immersive Internet that is the focus of this book of short thought pieces - postcards from the metaverse - by some of the leading thinkers in the field. The book questions what a more immersive and intimate internet might mean for society and for each of us.
Humanities Computing provides a rationale for a computing practice that is of and for as well as in the humanities and the interpretative social sciences. It engages philosophical, historical, ethnographic and critical perspectives to show how computing helps us fulfil the basic mandate of the humane sciences to ask ever better questions of the most challenging kind. It strengthens current practice by stimulating debate on the role of the computer in our intellectual life, and outlines an agenda for the field to which individual scholars across the humanities can contribute. |
You may like...
|