Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. The first section of the book provides an overview of developments in data protection in different parts of the world. The second section focuses on one of the most captivating innovations of the data protection package: how to forget, and the right to be forgotten in a digital world. The third section presents studies on a recurring, and still important and much disputed, theme of the Computers, Privacy and Data Protection (CPDP) conferences : the surveillance, control and steering of individuals and groups of people and the increasing number of performing tools (data mining, profiling, convergence) to achieve those objectives. This part is illustrated by examples from the domain of law enforcement and smart surveillance. The book concludes with five chapters that advance our understanding of the changing nature of privacy (concerns) and data protection.
Now in paperback for the first time, Social Movements and their Technologies explores the interplay between social movements and their 'liberated technologies'. It analyzes the rise of low-power radio stations and radical internet projects ('emancipatory communication practices') as a political subject, focusing on the sociological and cultural processes at play. It provides an overview of the relationship between social movements and technology, and investigates what is behind the communication infrastructure that made possible the main protest events of the past fifteen years. In doing so, Stefania Milan illustrates how contemporary social movements organize in order to create autonomous alternatives to communication systems and networks, and how they contribute to change the way people communicate in daily life, as well as try to change communication policy from the grassroots. She situates these efforts in a historical context in order to show the origins of contemporary communication activism, and its linkages to media reform campaigns and policy advocacy.
This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.
Now in paperback for the first time, Social Movements and their Technologies explores the interplay between social movements and their 'liberated technologies'. It analyzes the rise of low-power radio stations and radical internet projects ('emancipatory communication practices') as a political subject, focusing on the sociological and cultural processes at play. It provides an overview of the relationship between social movements and technology, and investigates what is behind the communication infrastructure that made possible the main protest events of the past fifteen years. In doing so, Stefania Milan illustrates how contemporary social movements organize in order to create autonomous alternatives to communication systems and networks, and how they contribute to change the way people communicate in daily life, as well as try to change communication policy from the grassroots. She situates these efforts in a historical context in order to show the origins of contemporary communication activism, and its linkages to media reform campaigns and policy advocacy.
The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life. With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.
This book makes an important contribution to the study of political communication. Its chapters provide a detailed analysis of forms of media talk associated with contemporary political elections. The approach is derived from the study of broadcast media talk, which extends here to political communication on the Internet. Key topics include: changing forms of political interview, televised political debates (held in the UK for the first time in 2010), the use of multimedia in promotional discourse, and uses of the Internet to engage with voters (an approach used successfully in the Obama presidential campaigns of 2008 and 2012). In addition to chapters from the UK and USA, there are also contributions from Greece, Spain, Sweden and Austria. Accordingly this book breaks new ground, not only in its coverage of the way politics is communicated to citizens, but also its recognition that in the modern world political culture is increasingly globalised, requiring an international critical perspective.
"Data Security Breaches and Privacy in Europe" aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.
This book constitutes the proceedings of the 13th International Conference on Transport Systems Telematics, TST 2013, held in Katowice-Ustron, Poland, in October 2013. The 58 papers included in this volume were carefully reviewed and selected for inclusion in this book. They provide an overview of solutions being developed in the field of intelligent transportation systems, and include theoretical and case studies in the countries of conference participants.
This book constitutes the refereed proceedings of the 5th International Conference on Social Robotics, ICSR 2013, held in Bristol, UK, in October 2013. The 55 revised full papers and 13 abstracts were carefully reviewed and selected from 108 submissions and are presented together with one invited paper. The papers cover topics such as human-robot interaction, child development and care for the elderly, as well as technical issues underlying social robotics: visual attention and processing, motor control and learning.
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.
This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.
Benedetta Brevini investigates the extent to which a Public Service
Broadcasting (PSB) ethos has been extended to the online world in
Europe. She examines the most significant policy initiatives
carried out by PSBs in Europe on online platforms, and analyzes how
the public service philosophy is being reinvented by policy makers
(at both the national and European level), by PSB institutions and
by their competitors. Brevini examines Denmark, France, Italy,
Spain and the UK, where PSB has been the subject of landmark
reforms that have changed its legal and policy frameworks.
Concurrently, at the European level, the debate about the
redefinition and expansion of PSB in the new media has been
vigorous. As such, Brevini elaborates on and discusses a normative
democratic framework for PSB online in Europe named 'PSB 2.0'. She
argues that, if the online world is to be infused with the same
public service ethos which characterizes traditional broadcasting,
European policy makers and institutions need to understand that a
reconfiguration of public service values and principles - in other
words, PSB 2.0 - is becoming crucial.
This book constitutes the proceedings of the 19th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Wellington, New Zealand, in October/November 2013. The 18 revised papers presented together with 4 progress papers were carefully reviewed and selected from 34 submissions. They are organized into six thematic sessions as follows social media, social networks, crowdsourcing, learning, collaboration design and software development.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.
This two volume set LNAI 8102 and LNAI 8103 constitutes the refereed proceedings of the 6th International Conference on Intelligent Robotics and Applications, ICIRA 2013, held in Busan, South Korea, in September 2013. The 147 revised full papers presented were carefully reviewed and selected from 184 submissions. The papers discuss various topics from intelligent robotics, automation and mechatronics with particular emphasis on technical challenges associated with varied applications such as biomedical application, industrial automation, surveillance and sustainable mobility.
This book examines the struggles over technology's use in education, digging into what the purpose of education is, how we should achieve it, who the stakeholders are, and whose voices win out. Drawing on theoretical and empirical work, it lays bare the messy realities of technology use in education and their implications for contemporary society.
This book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) - small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of "big data," and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation. PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities. Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care. Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics - "ethical analysis aimed at influencing the development of new technologies" (Deborah Johnson 2010). The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities - if only to "do no harm" - before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.
This book constitutes the proceedings of the 8th International and Interdisciplinary Conference on Modeling and Using Context, CONTEXT 2013, held in Annecy, France, in October/November 2013. The 23 full papers and 9 short papers presented were carefully reviewed and selected from numerous submissions. In addition the book contains two keynote speeches and 9 poster papers. They cover cutting-edge results from the wide range of disciplines concerned with context, including: Cognitive Sciences (Linguistics, Psychology, Computer Science, Neuroscience), and computer science (artificial intelligence, logics, ubiquitous and pervasive computing, context-awareness systems), and the Social Sciences and Organizational Sciences, as well as the Humanities and all application areas, including Medicine and Law.
This two volumes set LNAI 8102 and LNAI 8103 constitutes the refereed proceedings of the 6th International Conference on Intelligent Robotics and Applications, ICIRA 2013, held in Busan, South Korea, in September 2013. The 147 revised full papers presented were carefully reviewed and selected from 184 submissions. The papers discuss various topics from intelligent robotics, automation and mechatronics with particular emphasis on technical challenges associated with varied applications such as biomedical application, industrial automation, surveillance and sustainable mobility.
This book constitutes the refereed proceedings of the 10th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2013, held in Palma de Mallorca, Spain, in September 2013. The 34 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover all the topics of cooperative engineering, basic theories, methods and technologies that support CDVE, cooperative design, visualization and applications. There are special contributions dealing with the cooperative issues brought by the Internet of things - such as the situation in the ambient assisted living systems. Other papers in the volume cover a wide range of cooperative application topics such as cooperative e-learning, cooperative decision making and cooperative simulation etc.
This book constitutes the refereed proceedings of the 4th International Conference on Serious Games Development and Applications, SGDA 2013, held in Trondheim, Norway, in September 2013. The 32 papers (23 full papers, 9 short papers/posters and 2 invited keynotes) presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on games for health, games for education and training, games for other purposes, game design and theories, gaming interface, policy matters.
This book examines the struggles over technology's use in education, digging into what the purpose of education is, how we should achieve it, who the stakeholders are, and whose voices win out. Drawing on theoretical and empirical work, it lays bare the messy realities of technology use in education and their implications for contemporary society.
This book constitutes the refereed proceedings of the workshops held withthe 17th International Conference on Image Analysis and Processing, ICIAP 2013, held in Naples, Italy, in September 2013. The proceedings include papers from the five individual workshops focusing on topics of interest to the pattern recognition, image analysis, and computer vision communities, exploring emergent research directions or spotlight cross-disciplinary links with related fields and / or application areas."
This book constitutes the refereed proceedings of the 8th
International Conference on Haptic and Audio Interaction Design,
HAID 2013, held in Daejeon, Korea, in April 2013.
This book constitutes the refereed proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2013, held in Toulouse, France, in September 2013. The 20 revised full papers presented together with 5 practical experience reports were carefully reviewed and selected from more than 88 submissions. The papers are organized in topical sections on safety requirements and assurance, testing and verification, security, software reliability assessment, practical experience reports and tools, safety assurance in automotive, error control codes, dependable user interfaces, and hazard and failure mode analysis. |
You may like...
Palaces Of Stone - Uncovering Ancient…
Mike Main, Thomas Huffman
Paperback
Surfacing - On Being Black And Feminist…
Desiree Lewis, Gabeba Baderoon
Paperback
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, …
Paperback
BIM for Heritage - Developing a Historic…
Sofia Antonopoulou, Paul B. Ryan
Paperback
R1,186
Discovery Miles 11 860
Islamic Spirituality and Modern Science…
Muhammad Tahir-ul-Qadri
Paperback
R268
Discovery Miles 2 680
|