![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Gendertrolling arises out of the same misogyny that fuels other "real life" forms of harassment and abuse of women. This book explains this phenomenon, the way it can impact women's lives, and how it can be stopped. Designed to educate the general public on a popular and brutal form of harassment against women, Gendertrolling: How Misogyny Went Viral provides key insight into this Internet phenomenon. The book not only differentiates this violent form of trolling from others but also discusses the legal parameters surrounding the issue, such as privacy, anonymity, and free speech online as well as offering legal and policy recommendations for improving the climate for women online. The analysis of social media and legal aspects of the book make it highly suitable as a reliable source to many modern classes. Additionally, increased awareness among the general and scholarly public of the phenomenon of gendertrolling would help galvanize widespread support for laws, policies, new online content provider protocols, and positive social pressure. Combines the phenomenon of trolling and keen feminist insight to create a unique perspective on the treatment of women, male/female interaction, and online user interaction Demonstrates what online rape and death threats have in common with street harassment, sexual harassment in the workplace, domestic violence, and date rape, showing the serious, harmful nature of this practice Discusses what can be done to change laws and Internet policies to increase women's freedom of speech and safety online
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
This book offers a critical reconstruction of the fundamental ideas and methods of artificial intelligence research. Through close attention to the metaphors of artificial intelligence and their consequences for the field's patterns of success and failure, it argues for a reorientation of the field away from thought in the head and towards activity in the world. By considering computational ideas in a large, philosophical framework, the author eases critical dialogue between technology and the social sciences. AI can benefit from an understanding of the field in relation to human nature, and in return, it offers a powerful mode of investigation into the practicalities of physical realization. This is one of a series of publications associated with the Earth System Governance Project. For more publications, see www.cambridge.org/earth-system-governance.
Social network analysis has created novel opportunities within the field of data science. The complexity of these networks requires new techniques to optimize the extraction of useful information. Graph Theoretic Approaches for Analyzing Large-Scale Social Networks is a pivotal reference source for the latest academic research on emerging algorithms and methods for the analysis of social networks. Highlighting a range of pertinent topics such as influence maximization, probabilistic exploration, and distributed memory, this book is ideally designed for academics, graduate students, professionals, and practitioners actively involved in the field of data science. The many academic areas covered in this publication include, but are not limited to: Content Specific Modeling Distributed Memory Graph Mining Influence Maximization Information Spread Control Link Prediction Probabilistic Exploration
As technologies advance and become social norms worldwide, certain ethical considerations must be examined and reflected upon due to their various cultural implications. Information Technology and the Ethics of Globalization: Transnational Issues and Implications discusses the widespread influence of technologies across the globe with particular attention placed on moral consideration. A unique compilation of examinations on issues in IT, this innovative publication provides researchers, academicians, and practitioners with a comprehensive survey of theories and insight into human considerations of this vast globalization.
This is an edited collection by world-class experts, from diverse fields, focusing on integrating smart in-vehicle systems with human factors to enhance safety in automobiles. The book presents developments on road safety, in-vehicle technologies and state-of-the art systems. Includes coverage of DSP technologies in adaptive automobiles, algorithms and evaluation of in-car communication systems, driver-status monitoring and stress detection, in-vehicle dialogue systems and human-machine interfaces, challenges in video and audio processing for in-vehicle products, multi-sensor fusion for driver identification and vehicle to infrastructure wireless technologies.
In modernity, an individual identity was constituted from civil society, while in a globalized network society, human identity, if it develops at all, must grow from communal resistance. A communal resistance to an abstract conceptualised world, where there is no possibility for perception and experience of power and therefore no possibility for human choice and action, is of utmost importance for the constituting of human choosers and actors. This book therefore sets focus on those human choosers and actors wishing to read and enjoy the papers as they are actually perceiving and experiencing their lives in a diversity of social and cultural contexts. In so doing, the book tries to imagine in what kind of networks humans may choose and act based on the knowledge and empirical evidence presented in the papers. The topics covered in the book include: People and Their Changing Values. Citizens in a Network Society. The Individual and Knowledge Based Organisations. Human Responsibility and Technology. Exclusion and Regeneration. This valuable new book contains the edited proceedings of the Fifth World Conference on Human Choice and Computers (HCC-5), which was sponsored by the International Federation for Information Processing (IFIP) and held in Geneva, Switzerland in August 1998. Since the first HCC conference in 1974, IFIP's Technical Committee 9 has endeavoured to set the agenda for human choices and human actions vis-A -vis computers.
In this theoretically and empirically engaging volume, the
contributors demonstrate that despite the dynamism of India's
software industry and the rhetorical flourishes of industry
leaders, at present, the benefits of the revolution in information
and communication technologies (ICTs) touch only the hundreds of
thousands with the right skills and access. India still needs to do
more to bring the benefits of ICTs to the hundreds of millions of
its citizens still living in acute poverty. The contributors take
stock of the political economy implications of informational
development in India.
Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI.
This book presents the outcomes of recent endeavors that are expected to foster significant advances in the areas of communication design, fashion design, interior design, and product design, as well as overlapping areas. The fourteen chapters highlight carefully selected contributions presented during the 6th EIMAD conference, held on February 22-23, 2018 at the School of Applied Arts, Campus da Talagueira, in Castelo Branco, Portugal. They report on outstanding advances that offer new theoretical perspectives and practical research directions in design, and which are aimed at fostering communication in a global, digital world, while also addressing key individual and societal needs.
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.
By exploring the experiences of community activists and organizations working with information and communication technology (ICT) to build communities, this book offers a grounded and informed study of the role ICT plays in people's lives. The author emphasizes the importance of networks built around trust, shared spaces and local knowledge bases in the formation of significant relationships in contemporary Western societies and in doing so, questions many of the assumptions which inform the rhetorics of the information age.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand
As economies globalize, the number and power of transnational companies increases, especially in developing countries. Relevant, reliable, and comparable financial information and a common business language are needed to ensure communication between all users of financial information. Throughput Accounting in a Hyperconnected World provides innovative insights into controversial debates regarding the configuration and use of accounting and finance information both internally within economic entities and through third parties. These debates underline the major responsibility of users when configuring accounting and finance models and thereby in modelling business information. The content within this publication covers risk analysis, social accounting, and entrepreneurial models and is designed for managers, accountants, risk managers, academics, researchers, practitioners, and students.
This engaging volume celebrates the life and work of Theodor Holm "Ted" Nelson, a pioneer and legendary figure from the history of early computing. Presenting contributions from world-renowned computer scientists and figures from the media industry, the book delves into hypertext, the docuverse, Xanadu and other products of Ted Nelson's unique mind. Features: includes a cartoon and a sequence of poems created in Nelson's honor, reflecting his wide-ranging and interdisciplinary intellect; presents peer histories, providing a sense of the milieu that resulted from Nelson's ideas; contains personal accounts revealing what it is like to collaborate directly with Nelson; describes Nelson's legacy from the perspective of his contemporaries from the computing world; provides a contribution from Ted Nelson himself. With a broad appeal spanning computer scientists, science historians and the general reader, this inspiring collection reveals the continuing influence of the original visionary of the World Wide Web.
This research topic was first established in China by Professor Shengzhao Long in 1981, with direct support from one of the greatest modern Chinese scientists, Xuesen Qian. In a letter to Shengzhao Long from October 22nd, 1993, Xuesen Qian wrote: "You have created a very important modern science subject and technology in China!" MMESE primarily focuses on the relationship between Man, Machine and Environment, studying the optimum combination of man-machine-environment systems. In this system, "Man" refers to working people as the subject in the workplace (e.g. operators, decision-makers); "Machine" is the general name for any object controlled by Man (including tools, machinery, computers, systems and technologies), and "Environment" describes the specific working conditions under which Man and Machine interact (e.g. temperature, noise, vibration, hazardous gases etc.). The three goals of optimization are to ensure "Safety, High efficiency and Economy" of man-machine-environment systems. These proceedings are an academic showcase of the best papers selected from more than 400 submissions, introducing readers to the top research topics and the latest developmental trends in the theory and application of MMESE. These proceedings are interdisciplinary studies on the concepts and methods of physiology, psychology, system engineering, computer science, environment science, management, education, and other related disciplines. Researchers and professionals who study an interdisciplinary subject crossing above disciplines or researchers on MMESE subject will be mainly benefited from these proceedings.
While most discoverability evaluation studies in the Library and Information Science field discuss the intersection of discovery layers and library systems, this book looks specifically at digital repositories, examining discoverability from the lenses of system structure, user searches, and external discovery avenues. Discoverability, the ease with which information can be found by a user, is the cornerstone of all successful digital information platforms. Yet, most digital repository practitioners and researchers lack a holistic and comprehensive understanding of how and where discoverability happens. This book brings together current understandings of user needs and behaviors and poses them alongside a deeper examination of digital repositories around the theme of discoverability. It examines discoverability in digital repositories from both user and system perspectives by exploring how users access content (including their search patterns and habits, need for digital content, effects of outreach, or integration with Wikipedia and other web-based tools) and how systems support or prevent discoverability through the structure or quality of metadata, system interfaces, exposure to search engines or lack thereof, and integration with library discovery tools. Discoverability in Digital Repositories will be particularly useful to digital repository managers, practitioners, and researchers, metadata librarians, systems librarians, and user studies, usability and user experience librarians. Additionally, and perhaps most prominently, this book is composed with the emerging practitioner in mind. Instructors and students in Library and Information Science and Information Management programs will benefit from this book that specifically addresses discoverability in digital repository systems and services.
This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security. |
![]() ![]() You may like...
Barbarians at the Gate - The Fall of RJR…
Bryan Burrough, John Helyar
Hardcover
Applications in Electronics Pervading…
Sergio Saponara, Alessandro De Gloria
Hardcover
R5,689
Discovery Miles 56 890
The Merger Mystery - Why Spend Ever More…
Geoff Meeks, J. Gay Meeks
Hardcover
R1,103
Discovery Miles 11 030
Handbook of Research on Emerging Designs…
Jamal Zbitou, Mostafa Hefnawi, …
Hardcover
R8,709
Discovery Miles 87 090
Aldous Huxley - The Political Thought of…
Alessandro Maurini
Hardcover
|