Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
How are our societies being transformed by internet and digital economics? This book provides an accessible introduction to the economics of the internet and a comprehensive account of the mechanisms of the digital economy. Leading scholars examine the original economic and business models being developed as a result of the internet system, and explore their impact on our economies and societies. Key issues are analysed, including the development of open source software and on-line communities, peer-to-peer and online sharing of cultural goods, electronic markets and the rise of new information intermediaries, e-retailing and e-banking. The volume examines how internet and digital economics have transformed the organization of firms, industries, markets, commerce, modes of distribution, money, finance, and innovation processes, and provides the analytical tools to understand both these recent transformations and the likely future directions of the 'New Economy'.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
This book investigates the narrativity of some of the most popular survival horror video games and the gender politics implicit in their storyworlds. In a thorough analysis of the genre that draws upon detailed comparisons with the mainstream action genre, Andrei Nae places his analysis firmly within a political and social context. In comparing survival horror games to the dominant game design norms of the action genre, the author differentiates between classical and postclassical survival horror games to show how the former reject the norms of the action genre and deliver a critique of the conservative gender politics of action games, while the latter are more heterogeneous in terms of their game design and, implicitly, gender politics. This book will appeal not only to scholars working in game studies, but also to scholars of horror, gender studies, popular culture, visual arts, genre studies and narratology.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.
Latent in the current environment of rapid technological advances are breakthroughs waiting to be discovered that will have profound impacts on how organizations will cope with the direction civilization is taking. Information Technology and Societal Development examines in depth the full range of impacts of information technology on civilization and the development of societies. Uniquely broad in the scope of examining the societal implications of informational technology, this groundbreaking reference work makes an essential contribution to research libraries worldwide.
Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R. Each of the eight chapters provides a detailed case study, showing readers: how to develop exploratory indicators; understand 'spatial process' and develop spatial analytics; how to develop 'useful' predictive analytics; how to convey these outputs to non-technical decision-makers through the medium of data visualization; and why, ultimately, data science and 'Planning' are one and the same. A graduate-level introduction to data science, this book will appeal to researchers and data scientists at the intersection of data analytics and public policy, as well as readers who wish to understand how algorithms will affect the future of government.
This book deals comprehensively with the question of the scope of copyright protection for computer programs. Offering a unique blend of scholarship, technical rigor, and readability, it dispels the confusion and controversy that surround the application of copyright law to computer programs. Through an orderly development of facts and analysis it shows why the copyright law is the appropriate regime for software protection and explains the nature of copyright protection for software. Alternating between essay format and case study, the book provides expert counsel to those interested in this interface between technology and law. "Software, Copyright, and Competition: The Look and Feel' of the LaW," is undoubtedly one of the best pieces of legal scholarship in any subject this editor has ever had the pleasure to read. As to its subject matter, it is the best analysis of look and feel' written to date. . . . The book is very readable. Not only does the author explain' the law for the non-lawyer, but he explains the zen' of computer programming to the non-programmer. With wit and insight he puts to rest the many old wives tales the legal community believes about programmers. . . . In the best of all possible worlds, this book would be mandatory reading for any judge or arbitrator faced with a look and feel' case. "The Software Law Bulletin," January 1990 Two forces, innovation and imitation, fuel the intense competition that underlies the dramatic technological progress taking place in the computer industry. As the competitive battleground shifts increasingly to the software sector, a vigorous debate has arisen over whether the principal legal regime for protecting the asset value of computer programs--the copyright law--encourages or inhibits that competition. Industry executives, computer lawyers, law professors and lawmakers alike are participating in the debate, the outcome of which will quite literally shape the future of the computer industry. This book deals comprehensively with the question of the scope of copyright protection for computer programs. Offering a unique blend of scholarship, technical rigor, and readability, it dispels the confusion and controversy that surround the application of copyright law to computer programs. Through an orderly development of facts and analysis it shows why the copyright law is the appropriate regime for software protection and explains the nature of copyright protection for software. Alternating between essay format and case study, the book provides expert counsel to those interested in this interface between technology and law.
Feminist War Games? explores the critical intersections and collisions between feminist values and perceptions of war, by asking whether feminist values can be asserted as interventional approaches to the design, play, and analysis of games that focus on armed conflict and economies of violence. Focusing on the ways that games, both digital and table-top, can function as narratives, arguments, methods, and instruments of research, the volume demonstrates the impact of computing technologies on our perceptions, ideologies, and actions. Exploring the compatibility between feminist values and systems of war through games is a unique way to pose destabilizing questions, solutions, and approaches; to prototype alternative narratives; and to challenge current idealizations and assumptions. Positing that feminist values can be asserted as a critical method of design, as an ideological design influence, and as a lens that determines how designers and players interact with and within arenas of war, the book addresses the persistence and brutality of war and issues surrounding violence in games, whilst also considering the place and purpose of video games in our cultural moment. Feminist War Games? is a timely volume that questions the often-toxic nature of online and gaming cultures. As such, the book will appeal to a broad variety of disciplinary interests, including sociology, education, psychology, literature, history, politics, game studies, digital humanities, media and cultural studies, and gender studies, as well as those interested in playing, or designing, socially engaged games.
Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies. Drawing on 14 case studies organized around four sites of work, this book shows how definitions of labor have been influenced by the digital technologies that employees use to produce, interpret, or process text. Incorporating methodology and theory from a range of disciplines and highlighting labor issues related to topics as diverse as census tabulation, market research, electronic games, digital archives, and 3D modeling, contributors uncover the roles played by race, class, gender, sexuality, and national politics in determining how narratives of digital labor are constructed and erased. Because each chapter is centered on the human cost of digital technologies, however, it is individual people immersed in cultures of technology who are the focus of the volume, rather than the technologies themselves. Humans at Work in the Digital Age shows how humanistic inquiry can be a valuable tool in the emerging conversation surrounding digital textual labor. As such, this book will be essential reading for academics and postgraduate students engaged in the study of digital humanities; human-computer interaction; digital culture and social justice; race, class, gender, and sexuality in digital realms; the economics of the internet; and technology in higher education.
* Outlines a holistic, evidence-based mindset shift for designing and implementing technology-rich learning experiences that are attentive to social concerns such as equity, ethics, play, diversity, and democratic participation. * Driven by a balance of theoretical and methodological chapters with grounded empirical bases. * Concludes with a future-focused discussion about upcoming digital competencies and the implications of applying design-oriented approaches to digital learning practices.
* Outlines a holistic, evidence-based mindset shift for designing and implementing technology-rich learning experiences that are attentive to social concerns such as equity, ethics, play, diversity, and democratic participation. * Driven by a balance of theoretical and methodological chapters with grounded empirical bases. * Concludes with a future-focused discussion about upcoming digital competencies and the implications of applying design-oriented approaches to digital learning practices.
This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.
While the general public may feel uncomfortable discussing sexual assault and violence with neighbors or coworkers, the popularity of Twitter, Snapchat, and a host of other social media platforms suggests that we are not shy about expressing our opinions online. Debates that just a few years ago would have taken place in real life have been relocated online; allowing eager commenters to share their thoughts on guilt or innocence with legions of virtual strangers. Crowdsourcing the Law explores how everyday participants interpret and apply law in the influential online court of public opinion. Engaging a multidisciplinary, case study approach, the book analyzes social media comments about public figures such as Bill Cosby, Brock Turner, and Harvey Weinstein to address ambitious questions like: How are rape myths being challenged, reinforced, and reinvented on social media? What is the promise and peril of the #MeToo movement for transforming the law? And can due process be afforded in the face of an increasingly powerful virtual jury?
In this short introduction, David J. Gunkel examines the shifting world of artificial intelligence, mapping it onto everyday twenty-first century life and probing the consequences of this ever-growing industry and movement. The book investigates the significance and consequences of the robot invasion in an effort to map the increasingly complicated social terrain of the twenty-first century. Whether we recognize it as such or not, we are in the midst of a robot invasion. What matters most in the face of this machine incursion is not resistance, but how we decide to make sense of and respond to the social opportunities and challenges that autonomous machines make available. How to Survive a Robot Invasion is a fascinating and accessible volume for students and researchers of new media, philosophy of technology, and their many related fields. It aims both to assist readers' efforts to understand a changing world and to provide readers with the critical insight necessary for grappling with our science fiction-like future.
This book describes capacity building in strategic and non-strategic machine tool technology. It includes machine building in sectors such as machine tools, automobiles, home appliances, energy, and biomedical engineering, along with case studies. The book offers guidelines for capacity building in academia, covering how to promote enterprises of functional reverse engineering enterprises. It also discusses machine tool development, engineering design, prototyping of strategic, and non-strategies machine tools, as well as presenting communication strategies and IoT, along with case studies. Professionals from the CNC (Computer Numeric Control) machine tools industry, industrial and manufacturing engineers, and students and faculty in engineering disciplines will find interest in this book.
This book explores various e-Services related to health, learning, culture, media and the news, and the influences the Web and related technologies have had and continue to have in each of these areas, both on service providers and service users. It provides insights into the main technological and human issues regarding healthcare, aging population, recent challenges in the educational environment, the impact of digital technologies on culture and heritage, cultural diversity, freedom of expression, intellectual property, fake news and, last but not least, public opinion manipulation and ethical issues. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services mostly delivered by private or public companies. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational and privacy issues, bureaucracy and workflows, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. This includes having a significant population of citizens who are willing and able to adopt and use online services; as well as developing the managerial and technical capability to implement applications that meet citizens' needs. This book helps readers understand the mutual dependencies involved; further, a selection of success stories and failures, duly commented on, enables readers to identify the right approach to innovation in areas that offer the opportunity to reach a wide audience with minimal effort. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.
Considering the overall situation of the current pandemic and pertinent recommendations, this book focuses on the use of augmented reality (AR) applications for preventing COVID-19 outbreaks along with techniques, tools, and platforms to achieve social distancing.and sanitization. COVID-19 Public Health Measures: An Augmented Reality Perspective contains theoretical and practical knowledge of AR and remedies on how to cope with the pandemic, including multiple use cases along with a set of recommendations. This book illustrates application building using open-source software with an interactive interface to aid impaired users. The initial part of this book emphasizes the basic knowledge of AR, technology, devices, and rest of the relevant theories. This book is aimed at researchers, students of AR, technical healthcare professionals, and practitioners. Key Features: * Consists of an extensive introduction to the terminologies and components of AR * Provides in-depth knowledge of various tools and techniques used in AR * Introduces various platforms and software development kits (SDKs) such as Unity Engine, Unreal Engine, and Vuforia * Gives a step-by-step guide for the development of an AR app * Describes how AR can be used specifically by impaired users not only in the situation of current pandemic but also in normal situations thus simplifying day-to-day activities
This book investigates the ways in which the mobile telephone has transformed societies around the world, bringing both opportunities and challenges. At a time when knowledge and truth are increasingly contested, the book asks how mobile technology has changed the ways in which people create, disseminate, and access knowledge. Worldwide, mobile internet access has surpassed desktop access, and it is estimated that by 2022 there will be AN excess of 6 billion mobile phone users in the world. This widespread proliferation raises all sorts of questions around who creates knowledge, how is that knowledge shared and proliferated, and what are the structural political, economic, and legal conditions in which knowledge is accessed. The practices and power dynamics around mobile technologies are location specific. They look different depending on whether one chooses to highlight the legal, social, political, or economic context. Bringing together scholars, journalists, activists and practitioners from around the world, this book embraces this complexity, providing a multifaceted picture that acknowledges the tensions and contradictions surrounding accessing knowledge through mobile technologies. With case studies from Hong Kong, South Korea, India, Syria, Egypt, Botswana, Brazil, and the US, this book provides an important account of the changing nature of our access to knowledge, and is key reading for students, researchers, activists and policy makers with an interest in technology and access to knowledge, communication, social transformation, and global development.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.
Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology. It poses criminological, legal, ethical, and policy questions linked to such development and anticipates the impact of DFTs on crime and offending. It forestalls their wide-ranging consequences, including the proliferation of new types of vulnerability, policing and other mechanisms of social control, and the threat of pervasive and intrusive surveillance. Two key concerns lie at the heart of this volume. First, the book investigates the origins and development of emerging DFTs and their interactions with criminal behaviour, crime prevention, victimisation, and crime control. It also investigates the future advances and likely impact of such processes on a range of social actors: citizens, non-citizens, offenders, victims of crime, judiciary and law enforcement, media, NGOs. This book does not adopt technological determinism that suggests technology alone drives social development. Yet, while it is impossible to know where the emerging technologies are taking us, there is no doubt that DFTs will shape the way we engage with and experience criminal behaviour in the twenty-first century. As such, this book starts the conversation about a range of essential topics that this expansion brings to social sciences, and begins to decipher challenges we will be facing in the future. An accessible and compelling read, this book will appeal to those engaged with criminology, sociology, politics, policymaking, and all those interested in the impact of DFTs on the criminal justice system.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.
Blockchain is no longer just about bitcoin or cryptocurrencies in general. Instead, it can be seen as a disruptive, revolutionary technology which will have major impacts on multiple aspects of our lives. The revolutionary power of such technology compares with the revolution sparked by the World Wide Web and the Internet in general. Just as the Internet is a means of sharing information, so blockchain technologies can be seen as a way to introduce the next level: sharing value. Blockchain and Web 3.0 fills the gap in our understanding of blockchain technologies by hosting a discussion of the new technologies in a variety of disciplinary settings. Indeed, this volume explains how such technologies are disruptive and comparatively examines the social, economic, technological and legal consequences of these disruptions. Such a comparative perspective has previously been underemphasized in the debate about blockchain, which has subsequently led to weaknesses in our understanding of decentralized technologies. Underlining the risks and opportunities offered by the advent of blockchain technologies and the rise of Web 3.0, Blockchain and Web 3.0 will appeal to researchers and academics interested in fields such as sociology and social policy, cyberculture, new media and privacy and data protection. |
You may like...
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,732
Discovery Miles 27 320
|