|
Books > Computing & IT > Social & legal aspects of computing
Big Tech has sold us the illusion that artificial intelligence is a frictionless technology that will bring wealth and prosperity to humanity. But hidden beneath this smooth surface lies the grim reality of a precarious global workforce of millions that labour under often appalling conditions to make AI possible. Feeding the Machine presents an urgent, riveting investigation of the intricate network of organisations that maintain this exploitative system, revealing the untold truth of AI.
Based on hundreds of interviews and thousands of hours of fieldwork over more than a decade, this book shows us the lives of the workers often deliberately concealed from view and the systems of power that determine their future. It shows how AI is an extraction machine that churns through ever-larger datasets and feeds off humanity's labour and collective intelligence to power its algorithms.
Feeding the Machine is a call to arms against this exploitative system and details what we need to do, individually and collectively, to fight for a more just digital future.
Crossing the Bridge of the Digital Divide: A Walk with Global
Leaders explores the combined effect of the rapid growth of
information as an increasingly fragmented information base, a large
component of which is available only to people with money and/or
acceptable institutional affiliations. In the recent past, the
outcome of these challenges has been characterized as the ""digital
divide"" between the information "haves" and "have nots" along
racial and socio economic lines that seem to widen as time passes.
To address the issues of digital equity and digital inequality in
an effort to bridge the digital divide, educational scholars,
researchers and practitioners are in positions to ensure equitable
opportunities are made available for people of all ages, races,
ability, sexual orientation, and ethnicity in support of social
justice for bridging the digital divide. The digital divide
addresses issues concerning equal opportunity, equity and access
that have an effect on the development of marginalized and
otherwise disenfranchised populations within and across systems
nationally and internationally. The contributing authors-
representing Unites States, Canada, South Africa, New Zealand, and
the UK - posit that education institutions can serve as the bridge
to close the digital divide for students who do not have access to
information technology in their homes. At a time when more
computers are made available in schools than ever before, the
digital divide continues to widen and fewer people in the lowest
SES groups are given the opportunity to join the world of computer
technology and the internet. As a result, the influence of
leadership activity on institutional racism, gender discrimination,
inequality of opportunity, inequity of educational processes,
digital exclusion, and justice have gained currency and attention.
The contributing national and international authors examine the
digital divide in terms of social justice leadership, equity and
access. It is within this context that the authors offer
discussions from a lens of their choice, i.e. conceptual, review of
literature, epistemological, etc. By adopting an educational
approach to bridging the digital divide, researchers and
practitioners can connect and extend long- established lines of
conceptual and empirical inquiry aimed at improving organizational
practices and thereby gain insights that might be otherwise
overlooked, or assumed. This holds great promise for generating,
refining, and testing theories of leadership for equity and access,
and helps strengthen already vibrant lines of inquiry on social
justice.
As a popular and powerful medium, mobile use has increased
significantly across the world. The effects of these communication
devices have not only transformed how we communicate but also how
we gather and distribute information in a variety of industries
including healthcare, business, and education. Impacts of Mobile
Use and Experience on Contemporary Society provides
cross-disciplinary research that examines mobile use and its impact
through 16 different stages of life, ranging from pre-birth through
after-death. Featuring research on topics such as academic
application, economic value, and mobile learning, scholars from
different disciplines identify the crucial implications behind one
of the leading communication tools from all over the world.
Included amongst the targeted audience are educators, policymakers,
healthcare professionals, managers, academicians, researchers, and
practitioners.
In the modern era each new innovation poses its own special ethical
dilemma. How can human society adapt to these new forms of
expression, commerce, government, citizenship, and learning while
holding onto its ethical and moral principles? The Changing Scope
of Technoethics in Contemporary Society is a critical scholarly
resource that examines the existing intellectual platform within
the field of technoethics. Featuring coverage on a broad range of
topics such as ethical perspectives on internet safety,
technoscience, and ethical hacking communication, this book is
geared towards academicians, researchers, and students seeking
current research on domains of technoethics.
Sustainable Work in Europe brings together a strong core of Swedish
working life research, with additional contributions from across
Europe, and discussion of current issues such as digitalisation,
climate change and the Covid pandemic. It bridges gaps between
social science and medicine, and adds emphasis on age and gender.
The book links workplace practice, theory and policy, and is
intended to provide the basis for ongoing debate and dialogue.
The authors' analyses of innovations in social and socio-emotional
education contribute to systematizing distance learning to
represent children's and young people's socio-emotional competences
and to model how they can be developed. Low social capital and poor
mental health, a key feature of the COVID-19 pandemic, are leading
to an increasing number of suicides among youth and adolescents.
These factors, reflecting the changing social-emotional feelings of
children, adolescents and teachers in schools during COVID-19,
require a new vision and support for learning practices. Modelling
a SEEP in the authors' vision would integrate family support,
support for every teacher and child, success stories in the
development of emotion therapy, and integrated practice in social
pedagogical institutions, private initiatives and non-governmental
organizations (NGOs).
The lead singer on Supercell's eponymous first album is Hatsune
Miku-a Vocaloid character created by Crypton Future Media with
voice synthesizers. A virtual superstar, over 100,000 songs,
uploaded mostly by fans, are attributed to her. Supercell is a
Japanese creator music group with the composer Ryo leading ten
artists, who design album illustrations and make music videos.
These videos are uploaded onto Niconico and other video-sharing
sites. By the time Supercell was released in March 2009, the
group's Vocaloid works were already well-known to Niconico users
and fans. This book explores the Vocaloid and DTM (desktop music)
phenomena through the lenses of media and fan studies, looking
closely at online social media platforms, the new technology for
composing, avid fans of the Vocaloid character, and these fans'
performative practices. It provides a sense of how interactive new
media and an empowered fan base combine to engage in the creation
processes and enhance the circulation of DTM works. 33 1/3 Global,
a series related to but independent from 33 1/3, takes the format
of the original series of short, music-basedbooks and brings the
focus to music throughout the world. With initial volumes focusing
on Japanese and Brazilian music, the series will also include
volumes on the popular music of Australia/Oceania, Europe, Africa,
the Middle East, and more.
Thanks to the digital revolution, even a traditional discipline
like philology has been enjoying a renaissance within academia and
beyond. Decades of work have been producing groundbreaking results,
raising new research questions and creating innovative educational
resources. This book describes the rapidly developing state of the
art of digital philology with a focus on Ancient Greek and Latin,
the classical languages of Western culture. Contributions cover a
wide range of topics about the accessibility and analysis of Greek
and Latin sources. The discussion is organized in five sections
concerning open data of Greek and Latin texts; catalogs and
citations of authors and works; data entry, collection and analysis
for classical philology; critical editions and annotations of
sources; and finally linguistic annotations and lexical databases.
As a whole, the volume provides a comprehensive outline of an
emergent research field for a new generation of scholars and
students, explaining what is reachable and analyzable that was not
before in terms of technology and accessibility.
This book sets out a possible trajectory for the co-development of
legal responsibility on the one hand and artificial intelligence
and the machines and systems driven by it on the other. As
autonomous technologies become more sophisticated it will be harder
to attribute harms caused by them to the humans who design or work
with them. This will put pressure on legal responsibility and
autonomous technologies to co-evolve. Mark Chinen illustrates how
these factors strengthen incentives to develop even more advanced
systems, which in turn inspire nascent calls to grant legal and
moral status to autonomous machines. This book is a valuable
resource for scholars and practitioners of legal doctrine, ethics
and autonomous technologies, as well as legislators and policy
makers, and engineers and designers who are interested in the
broader implications of their work.
Secret sharing schemes form one of the most important topic in
Cryptography. These protocols are used in many areas, applied
mathematics, computer science, electrical engineering. A secret is
divided into several pieces called shares. Each share is given to a
user of the system. Each user has no information about the secret,
but the secret can be retrieved by certain authorized coalition of
users.This book is devoted to such schemes inspired by Coding
Theory. The classical schemes of Shamir, Blakley, Massey are
recalled. Survey is made of research in Combinatorial Coding Theory
they triggered, mostly self-dual codes, and minimal codes.
Applications to engineering like image processing, and key
management of MANETs are highlighted.
The representation of abstract data and ideas can be a difficult
and tedious task to handle when learning new concepts; however, the
advances in emerging technology have allowed for new methods of
representing such conceptual data. Information Visualization
Techniques in the Social Sciences and Humanities is a critical
scholarly resource that examines the application of information
visualization in the social sciences and humanities. Featuring
coverage on a broad range of topics such as social network
analysis, complex systems, and visualization aesthetics, this book
is geared towards professionals, students, and researchers seeking
current research on information visualization.
The second in the Women Securing the Future with TIPPSS series,
this book provides insight and expert advice from seventeen women
leaders in technology, healthcare and policy to address the
challenges of Trust, Identity, Privacy, Protection, Safety and
Security (TIPPSS) for connected healthcare, and the growing
Internet of Medical Things (IoMT) ecosystem. The ten chapters in
this book delve into trust, security and privacy risks in connected
healthcare for patients, medical devices, personal and clinical
data, healthcare providers and institutions, and provide practical
approaches to manage and protect the data, devices, and humans.
Cybersecurity, technology and legal experts discuss risks, from
data and device hacks to ransomware, and propose approaches to
address the challenges including new frameworks for architecting
and evaluating medical device and connected hospital cybersecurity.
We all need to be aware of the TIPPSS challenges in connected
healthcare, and we call upon engineers, device manufacturers,
system developers and healthcare providers to ensure trust and
manage the risk. Featuring contributions from prominent female
experts and role models in technology, cybersecurity, engineering,
computer science, data science, business, healthcare,
accessibility, research, law, privacy and policy, this book sets
the stage to improve security and safety in our increasingly
connected world.
The optimization of traffic management operations has become a
considerable challenge in today's global scope due to the
significant increase in the number of vehicles, traffic
congestions, and automobile accidents. Fortunately, there has been
substantial progress in the application of intelligent computing
devices to transportation processes. Vehicular ad-hoc networks
(VANETs) are a specific practice that merges the connectivity of
wireless technologies with smart vehicles. Despite its relevance,
empirical research is lacking on the developments being made in
VANETs and how certain intelligent technologies are being applied
within transportation systems. IoT and Cloud Computing Advancements
in Vehicular Ad-Hoc Networks provides emerging research exploring
the theoretical and practical aspects of intelligent transportation
systems and analyzing the modern techniques that are being applied
to smart vehicles through cloud technology. Featuring coverage on a
broad range of topics such as health monitoring, node localization,
and fault tolerance, this book is ideally designed for network
designers, developers, analysists, IT specialists, computing
professionals, researchers, academics, and post-graduate students
seeking current research on emerging computing concepts and
developments in vehicular ad-hoc networks.
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
Present day sophisticated, adaptive, and autonomous (to a certain
degree) robotic technology is a radically new stimulus for the
cognitive system of the human learner from the earliest to the
oldest age. It deserves extensive, thorough, and systematic
research based on novel frameworks for analysis, modelling,
synthesis, and implementation of CPSs for social applications.
Cyber-Physical Systems for Social Applications is a critical
scholarly book that examines the latest empirical findings for
designing cyber-physical systems for social applications and aims
at forwarding the symbolic human-robot perspective in areas that
include education, social communication, entertainment, and
artistic performance. Highlighting topics such as evolinguistics,
human-robot interaction, and neuroinformatics, this book is ideally
designed for social network developers, cognitive scientists,
education science experts, evolutionary linguists, researchers, and
academicians.
Using a multi-disciplinary and comparative approach, this study
examines emerging and innovative attempts to tackle privacy and
legal issues in cloud computing such as personal data privacy,
security and intellectual property protection. An international
team of legal scholars, computer science researchers, regulators
and practitioners present original and critical responses to the
growing challenges posed by cloud computing. They analyze the
specific legal implications pertaining to jurisdiction, biomedical
practice and information ownership, as well as issues of regulatory
control, competition and cross-border regulation. Law academics,
practitioners and regulators will find this book to be a valuable,
practical and accessible resource, as will computer science
scholars interested in cloud computing issues. Contributors: H.
Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y.
Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny,
C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu
With near-universal internet access and ever-advancing electronic
devices, the ability to facilitate interactions between various
hardware and software provides endless possibilities. Though
internet of things (IoT) technology is becoming more popular among
individual users and companies, more potential applications of this
technology are being sought every day. There is a need for studies
and reviews that discuss the methodologies, concepts, and possible
problems of a technology that requires little or no human
interaction between systems. The Handbook of Research on the
Internet of Things Applications in Robotics and Automation is a
pivotal reference source on the methods and uses of advancing IoT
technology. While highlighting topics including traffic information
systems, home security, and automatic parking, this book is ideally
designed for network analysts, telecommunication system designers,
engineers, academicians, technology specialists, practitioners,
researchers, students, and software developers seeking current
research on the trends and functions of this life-changing
technology.
User opinions about service experiences have been extensively
acknowledged to play a key role in influencing the consumption
decisions of other customers. The widespread adoption of internet
technologies has amplified enormously the volume and the potential
impact of such customer-generated content in the form of electronic
word-of-mouth (eWOM). Exploring the Power of Electronic
Word-of-Mouth in the Services Industry is an essential research
book that explores the importance of consumer perception and the
influence of word-of-mouth in the digital world. Featuring a range
of topics such as data mining, online engagement, and social media,
this book is ideal for academicians, researchers, IT developers,
marketers, managers, media specialists, and professionals.
|
You may like...
Pollock
Donald Wigal
Hardcover
R1,091
Discovery Miles 10 910
Bosch
Virginia Pitts Rembert
Hardcover
R1,091
Discovery Miles 10 910
|