![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing
This book provides a comprehensive guide to legal issues which have arisen as a result of the growth of the internet and the worldwide web. As well as discussing each topic in detail, Jonathan Rosenoer includes extensive coverage of the relevant cases and their implications for the future. Topics covered include: copyright and trademark issues, defamation, privacy, liability, electronic contracts, tax issues, and ethics. A potted history of the significant legal events is included which runs from the founding of the Electronic Frontier Foundation to the 1996 Telecommunications Act. About the author: Jonathan Rosenoer has been general counsel for the Haft Corporation, Executive Editor for Lexis Counsel Connect, and is best known for his CyberLaw column which has a distribution list of over four million.
Social network analysis dates back to the early 20th century, with initial studies focusing on small group behavior from a sociological perspective. The emergence of the Internet and subsequent increase in the use of online social networking applications has caused a shift in the approach to this field. Faced with complex, large datasets, researchers need new methods and tools for collecting, processing, and mining social network data. Social Network Mining, Analysis and Research Trends: Techniques and Applications covers current research trends in the area of social networks analysis and mining. Containing research from experts in the social network analysis and mining communities, as well as practitioners from social science, business, and computer science, this book proposes new measures, methods, and techniques in social networks analysis and also presents applications and case studies in this changing field.
Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It s not just computer hackers and cyber crooks who lurk in the dark corners of the Web the cops are there, too. In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose natural male enhancement pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces but also how dystopian a fully ordered alternative would be."
This book constitutes the refereed proceedings of the 8th International Conference on Human Choice and Computers (HCC8), IFIP TC9, held in Pretoria, South Africa on September 25-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services. Data grows rapidly, since applications produce continuously increasing volumes of both unstructured and structured data. Large-scale interconnected systems aim to aggregate and efficiently exploit the power of widely distributed resources. In this context, major solutions for scalability, mobility, reliability, fault tolerance and security are required to achieve high performance and to create a smart environment. The impact on data processing, transfer and storage is the need to re-evaluate the approaches and solutions to better answer the user needs. A variety of solutions for specific applications and platforms exist so a thorough and systematic analysis of existing solutions for data science, data analytics, methods and algorithms used in Big Data processing and storage environments is significant in designing and implementing a smart environment. Fundamental issues pertaining to smart environments (smart cities, ambient assisted leaving, smart houses, green houses, cyber physical systems, etc.) are reviewed. Most of the current efforts still do not adequately address the heterogeneity of different distributed systems, the interoperability between them, and the systems resilience. This book will primarily encompass practical approaches that promote research in all aspects of data processing, data analytics, data processing in different type of systems: Cluster Computing, Grid Computing, Peer-to-Peer, Cloud/Edge/Fog Computing, all involving elements of heterogeneity, having a large variety of tools and software to manage them. The main role of resource management techniques in this domain is to create the suitable frameworks for development of applications and deployment in smart environments, with respect to high performance. The book focuses on topics covering algorithms, architectures, management models, high performance computing techniques and large-scale distributed systems.
This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
This book provides a comprehensive picture of fog computing technology, including of fog architectures, latency aware application management issues with real time requirements, security and privacy issues and fog analytics, in wide ranging application scenarios such as M2M device communication, smart homes, smart vehicles, augmented reality and transportation management. This book explores the research issues involved in the application of traditional shallow machine learning and deep learning techniques to big data analytics. It surveys global research advances in extending the conventional unsupervised or clustering algorithms, extending supervised and semi-supervised algorithms and association rule mining algorithms to big data Scenarios. Further it discusses the deep learning applications of big data analytics to fields of computer vision and speech processing, and describes applications such as semantic indexing and data tagging. Lastly it identifies 25 unsolved research problems and research directions in fog computing, as well as in the context of applying deep learning techniques to big data analytics, such as dimensionality reduction in high-dimensional data and improved formulation of data abstractions along with possible directions for their solutions.
In thispa per, we describe the key lessons from an earlier HCI Educators' conference, held in Limerick in 2006, on 'inventivity' - a term coined to highlight the confluence of inventiveness and creativ ity. There is a distinction between being creative andbein g artistic. HCI education, in terms of creative inventiveness, is not just about artistically pleasing user inte rfaces, but also about solutions that are innovative. We can know much about creativ ity and inventiveness. However, tobe able to teach and train students so that th ey can be creatively inventive, we believe that it would be helpful if educators themselves have personally experienced this. With this in mind, we organised the follow up conference HCIEd 2007 Creativity: Experiencing to Educate and Design. Inventivity was coined to refer to the notiono f inventing creative and innovative solutions. This term was also intended tomean that such solutionsb e more than 'creative', artistic or appealing interfaces as designed by artistic or 'creative types' of people. It was also intended to reflect the creativeness of the solutions that had to be invented. One reason for emphasising this as pect at the conference was that, in HCI design it is easy to mis interpret the focus ofHCI d esign solutions - which should notad dress just visualisation and interaction design, but also address how that visualisation and interactioncreativ ely repr esents and simplifies the complexities in work thatpe ople engage in.
Coordinative Practices in the Building Process: An Ethnographic Perspective presents the principles of the practice-oriented research programmes in the CSCW and HCI domains, explaining and examining the ideas and motivations behind basing technology design on ethnography. The focus throughout is on generating ethnographically informed accounts of the building process and discussing the concepts of cooperative work and coordinative practices in order to frame technology development. Lars Rune Christensen provides an invaluable resource for these communities in this book. Illustrated with real examples from the building process, he reports on the cooperative work and coordinative practices found, allowing readers to feel that they know, from the point of view of the people working in the building process, what it is like to coordinate and do this kind of cooperative work.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
The calculus of IT support for the banking, securities and insurance industries has changed dramatically and rapidly over the past few years. Unheard of just a few years ago, corporate intranets are now used for everything from job postings to enhanced team communications. Whole new departments are being created to support e-commerce. And the Internet/Intranet/Extranet triple-whammy is the most critical component of most financial IT shops. At the same time, new intelligent agents stand ready to take on such diverse functions as customer profiling and data mining.
This text examines the impact of information and communication technologies (ICTs) and their consequences for political institutions, and assesses critically the concept of an emergent electronic democracy. The first section discusses the concepts and issues of "Electronic Democracy" with chapters on democracy and cyberspace, local democracy, global control and interactive ICTs. In the second section, entitled ICTs and the state, the chapters examine the impacts and implications of televising the British "House of Commons", the effects of ICTs on political parties, and closed circuit television. The final section discusses ICTs and the citizen with chapters covering democracies online, strengthening communities in the information age and the community network. This book provides a source for those studying social policy, politics and sociology as well as for policy analysts, social scientists and computer scientists.
This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techniques, as well as various attempts at developing hardware Trojans in IP cores and ICs. While describing existing Trojan detection methods, the authors also analyze their effectiveness in disclosing various types of Trojans, and demonstrate several architecture-level solutions.
- the book provides a short and accessible introduction to AI for learners - it examines seven different educational roles and settings, from AI as a peer to AI as a tutor and AI as textbook, among others - it considers both opportunities and risks: technological developments as well as ethical considerations
This wide-ranging introductory text looks at the virtual community of cyberspace and analyzes its relationship to the real one as lived out in today's societies. Such issues as race, gender, power, economics and ethics in cyberspace are discussed by the leading experts on the subject of the Internet, grouped under four main sections: identity; social order and control; community structure and dynamics; and collective action. The book displays how the idea of community is being challenged and rewritten by the increasing power and range of cyberspace. As new societies and relationships are formed in this virtual landscape, we are now having to consider the potential consequences this might have on our own community and societies.;The text should appeal to students and professionals, but also to those concerned about the changing relationships between information technology and a society which is fast becoming divided between those on-line and those not.
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
Takes an interdisciplinary approach to contribute to the ongoing development of human-AI interaction. Current debate and development of AI is "algorithm-driven" or technical-oriented in lieu of human-centered. At present, there is no systematic interdisciplinary discussion to effectively deal with issues and challenges arising from AI. This book offers critical analysis of the logic and social implications of algorithmic processes. Reporting from the processes of scientific research, the results can be useful for understanding the relationship between algorithms and humans, allowing AI designers to assess the quality of the meaningful interactions with AI systems.
Entertain Me! features the most popular influencers and celebrities from Schoen! magazine, a biannual English language publication and online platform with a cutting-edge aesthetic. This book presents a visual explosion of talent in film, music, TV, fashion and art from its debut as an online forum in 2009 to 2020. Stunning photographs from the worlds of culture, fashion, and beauty showcase the biggest names and rising stars who entertain and lead the world in high-octane creativity. It will appeal to the visionary, the collector, and the fashion-conscious, and is intended not only for the magazine's established and loyal readership, but also for a broader demographic of readers around the globe who monitor the pulse of the latest in creative talent.
Is information technology enhancing democracy? Developments in information technology and the Internet are taking place at an almost bewildering pace. Such improvements, however, are believed to present opportunities for improving the responsiveness and accountability of political institutions and enhancing citizen participation. In this text the theoretical arguments for and against "electronic democracy" and the potential of information and communication technology are closely examined. The book is underpinned by a series of case studies in the US and Europe that demonstrate the application of "electronic democracy" in a number of city and civic projects. The book aims to provide a balanced and considered evaluation of the potential for "electronic democracy" based on empirical research.
Politicians, policy makers and business gurus are all encouraging us to join the information superhighway at the nearest junction or risk being excluded from the social and economic benefits of the information revolution. "Cyberspace Divide" critically considers the complex relationship between technological change, its effect upon social divisions, its consequences for social action an the emerging strategies for social inclusion in the Information Age. The contributors cover such themes as human interaction, ethical behavior, and the growing disparity between the information rich and the information poor.
- Written by world-leading subject specialist in both sport management and artificial intelligence - Includes interviews with elite sports managers and coaches - Examines the competitive advantages offered by AI to a wide-range of areas including Recruitment, Performance & Tactics, Health & Fitness, Pedagogy, Broadcasting, eSports, Gambling, and Stadium Design |
You may like...
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,570
Discovery Miles 35 700
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Brain Machine Interfaces for Space…
Luca Rossini, Dario Izzo
Hardcover
R4,841
Discovery Miles 48 410
|