|
|
Books > Computing & IT > Social & legal aspects of computing
Though humans have been communicating through virtual mediators
since the invention of the telephone, new technologies make the use
of virtual communications even more immediate and pervasive than
ever before. By understanding the theories and models behind
virtual communication, one can understand the way society has been
changed and how it will continue to do so. Analyzing Digital
Discourse and Human Behavior in Modern Virtual Environments
examines the implications of virtual communication and online
interaction and the theories and trends associated with them. It
will discuss and address the differences and challenges that
develop when communicating virtually and explore the various
influences virtual communication plays in work, education, and
quotidian life. This title provides a foundation of emerging trends
from which new theories and models of communication can grow. This
book will become a cherished resource for academics, researchers,
technology developers, students, and government or institutional
leaders.
Researchers have harnessed the flood of personal information and
opinions shared on social media platforms in a variety of ways.
People communicate not only what they imagine they are purposely
sharing but also unintentionally leak information, which allows
others to glimpse a sense of the subconscious and unconscious at a
macro level. Electronic Hive Minds on Social Media: Emerging
Research and Opportunities explores various research techniques to
profile the electronic hive mind around social topics as expressed
on various modalities of social media, from human, bot, and cyborg
social media accounts, and proposes new research methods for
harnessing public data from social media platforms. Highlighting
topics such as knowledge sharing, swarm intelligence, and social
psychology, this publication is designed for researchers, social
psychologists, practitioners, and students in marketing,
communications, mass media, and similar fields.
Using a multi-disciplinary and comparative approach, this study
examines emerging and innovative attempts to tackle privacy and
legal issues in cloud computing such as personal data privacy,
security and intellectual property protection. An international
team of legal scholars, computer science researchers, regulators
and practitioners present original and critical responses to the
growing challenges posed by cloud computing. They analyze the
specific legal implications pertaining to jurisdiction, biomedical
practice and information ownership, as well as issues of regulatory
control, competition and cross-border regulation. Law academics,
practitioners and regulators will find this book to be a valuable,
practical and accessible resource, as will computer science
scholars interested in cloud computing issues. Contributors: H.
Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y.
Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny,
C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu
Human computer interaction is constantly evolving in many areas and
facets of modern society. Analyzing these interactions can provide
a more balanced understanding of these technological advances as
they pertain to people's lives. Experience-Based Human-Computer
Interactions: Emerging Research and Opportunities is a pivotal
reference source that provides in-depth discussions on the
progression and contemporary applications of human computer
interaction. Highlighting relevant topic areas such as semantic
support, software intensive systems, ontology applications, and
conceptual objects, this publication is ideal for engineers,
academicians, students, and researchers that would like to attain
more information on recent advances being made to bridge the gap
between human and computer interactions.
Coding for Penetration Testers: Building Better Tools, Second
Edition provides readers with an understanding of the scripting
languages that are commonly used when developing tools for
penetration testing, also guiding users through specific examples
of custom tool development and the situations where such tools
might be used. While developing a better understanding of each
language, the book presents real-world scenarios and tool
development that can be incorporated into a tester's toolkit. This
completely updated edition focuses on an expanded discussion on the
use of Powershell, and includes practical updates to all tools and
coverage.
Knowledge is a valuable resource that must be managed well for any
organization to thrive. Proper knowledge management can improve
business processes by creating value, yet the available tools meant
to aid in the creation, collection, and storage of information have
drastically changed since the emergence of social media. By using
this collaborative online application for engaging with
information, organizations are able to precisely decimate knowledge
to the correct audience. Harnessing Social Media as a Knowledge
Management Tool addresses the challenges and rewards of the proper
use of social media, as well as the key enablers and barriers of
its application. This publication endeavors to provide thorough
insight into the role of social media in knowledge management from
both an organizational and individual perspective. This book
elucidates emerging strategies perfect for policy makers, managers,
advertisers, academics, students, and organizations who wish to
optimize performance.
Intelligent Data Analysis for e-Learning: Enhancing Security and
Trustworthiness in Online Learning Systems addresses information
security within e-Learning based on trustworthiness assessment and
prediction. Over the past decade, many learning management systems
have appeared in the education market. Security in these systems is
essential for protecting against unfair and dishonest conduct-most
notably cheating-however, e-Learning services are often designed
and implemented without considering security requirements. This
book provides functional approaches of trustworthiness analysis,
modeling, assessment, and prediction for stronger security and
support in online learning, highlighting the security deficiencies
found in most online collaborative learning systems. The book
explores trustworthiness methodologies based on collective
intelligence than can overcome these deficiencies. It examines
trustworthiness analysis that utilizes the large amounts of
data-learning activities generate. In addition, as processing this
data is costly, the book offers a parallel processing paradigm that
can support learning activities in real-time. The book discusses
data visualization methods for managing e-Learning, providing the
tools needed to analyze the data collected. Using a case-based
approach, the book concludes with models and methodologies for
evaluating and validating security in e-Learning systems. Indexing:
The books of this series are submitted to EI-Compendex and SCOPUS
The Internet serves as an essential tool in promoting health
awareness through the circulation of important research among the
medical professional community. While digital tools and
technologies have greatly improved healthcare, challenges are still
prevalent among diverse populations worldwide. The Handbook of
Research on Advancing Health Education through Technology presents
a comprehensive discussion of health knowledge equity and the
importance of the digital age in providing life-saving data for
diagnosis and treatment of diverse populations with limited
resources. Featuring timely, research-based chapters across a broad
spectrum of topic areas including, but not limited to, online
health information resources, data management and analysis, and
knowledge accessibility, this publication is an essential reference
source for researchers, academicians, medical professionals, and
upper level students interested in the advancement and
dissemination of medical knowledge.
Introduction to EEG- and Speech-Based Emotion Recognition Methods
examines the background, methods, and utility of using
electroencephalograms (EEGs) to detect and recognize different
emotions. By incorporating these methods in brain-computer
interface (BCI), we can achieve more natural, efficient
communication between humans and computers. This book discusses how
emotional states can be recognized in EEG images, and how this is
useful for BCI applications. EEG and speech processing methods are
explored, as are the technological basics of how to operate and
record EEGs. Finally, the authors include information on EEG-based
emotion recognition, classification, and a proposed EEG/speech
fusion method for how to most accurately detect emotional states in
EEG recordings.
Demand for integral and sustainable solutions is on the rise. As
new ways of defining reality emerge, this generates the progression
of more humanistic and sustainable construction of operating
systems. Designing for Human-Machine Symbiosis using the URANOS
Model: Emerging Research and Opportunities is a pivotal reference
source for the latest research on human-centered system modeling
and methods to provide a generic system model to describe complex
non-linear systems. Featuring extensive coverage across a range of
relevant topics, such as pervasive computing systems, smart
environments, and smart industrial machines, this book is ideally
designed for researchers, engineers, and professionals seeking
current research on the integration of human beings and their
natural, informational, and socio-cultural environments into system
design.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods
with Forensic Analysis exposes the latest electronic covert
communication techniques used by cybercriminals, along with the
needed investigative methods for identifying them. The book shows
how to use the Internet for legitimate covert communication, while
giving investigators the information they need for detecting
cybercriminals who attempt to hide their true identity. Intended
for practitioners and investigators, the book offers concrete
examples on how to communicate securely, serving as an ideal
reference for those who truly need protection, as well as those who
investigate cybercriminals.
In recent years, technological advances have led to significant
developments within a variety of business applications. In
particular, data-driven research provides ample opportunity for
enterprise growth, if utilized efficiently. Privacy and Security
Policies in Big Data is a pivotal reference source for the latest
research on innovative concepts on the management of security and
privacy analytics within big data. Featuring extensive coverage on
relevant areas such as kinetic knowledge, cognitive analytics, and
parallel computing, this publication is an ideal resource for
professionals, researchers, academicians, advanced-level students,
and technology developers in the field of big data.
As the world has adapted to the age of digital technology, present
day business leaders are required to change with the times as well.
Addressing and formatting their business practices to not only
encompass digital technologies, but expand their capabilities, the
leaders of today must be flexible and willing to familiarize
themselves with all types of global business practices. Global
Business Leadership Development for the Fourth Industrial
Revolution is a collection of advanced research on the methods and
tactics utilized to succeed as a leader in the digital age. While
highlighting topics including data privacy, corporate governance,
and risk management, this book is ideally designed for business
professionals, administrators, managers, executives, researchers,
academicians, and business students who want to improve their
understanding of the strategic role of digital technologies in the
global economy, in networks and organizations, in teams and work
groups, in information systems, and at the level of individuals as
actors in digitally networked environments.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
Intellectual property goods are frequently referred to as
intangible or abstract. Yet, traditionally, they have almost always
needed to be embodied or materialized in order to be protected (and
- to a certain extent - to be used and enjoyed), regardless of
whether they are copyrighted works, patented inventions or
trademarks. With a focus on the issue of access and the challenges
of new technologies such as biotechnology and digital technologies,
this unique collection analyzes the relationship between
intellectual property and its physical embodiments. It contains a
mixture of theoretical and practical perspectives and encompasses
an interdisciplinary approach, including chapters on the connection
between intellectual property and cultural heritage law, cultural
property law and international trade law. The book furthermore
comprises historical reflections that illuminate how intellectual
property has never been purely about the intangible. Intellectual
Property and Access to Im/material Goods will be of interest to
scholars, practitioners and law and policymakers. Users of
intellectual property goods such as museums, libraries, archives
and/or other cultural institutions, as well as users of
biomaterials, copyrighted works, patented inventions and/or
trademarked goods will find value in this book. Contributors
include: C.E. Bell, M. Blakeney, D.L. Burk, S. Corbett, S. Frankel,
M.J. Madison, A. McMahon, A. Pottage, L.K. Skorodenski, G.
Spedicato, P.K. Yu
The notion of surveillance has become increasingly more crucial in
public conversation as new tools of observation are obtained by
many different players. The traditional notion of "overseeing" is
being increasingly replaced by multi-level surveillance where many
different actors, at different levels of hierarchy, from the child
surveilling the parent to the state surveilling its citizens, are
entering the surveillance theater. This creates a unique
surveillance ecosystem where the individual is observed not only as
an analog flesh-and-blood body moving through real spaces such as a
shopping mall, but also tracked as a data point where the volume of
data is perpetually and permanently expanding as the digital life
story is inscribed in the digital spaces. The combined narrative of
the individual is now under surveillance. Modern Day Surveillance
Ecosystem and Impacts on Privacy navigates the reader through an
understanding of the self as a narrative element that is open for
observation and analysis. This book provides a broad-based and
theoretically grounded look at the overall processes of
surveillance in a global system. Covering topics including
commodity, loss of privacy, and big data, this text is essential
for researchers, government officials, policymakers, security
analysts, lawmakers, teachers, professors, graduate and
undergraduate students, practitioners, and academicians interested
in communication, technology, surveillance, privacy, and more.
Due to its versatility and accessibility, individuals all around
the world routinely use various forms of technology to interact
with one another. Over the years, the design and development of
technologies and interfaces have increasingly aimed to improve the
human-computer interactive experience in unimaginable ways. The
Handbook of Research on Human-Computer Interfaces and New Modes of
Interactivity is a collection of innovative research on the methods
and applications of interactive technologies in the modern age.
Highlighting topics including digital environments, sensory
applications, and transmedia applications, this book is ideally
designed for academicians, researchers, HCI developers,
programmers, IT consultants, and media specialists seeking current
research on the design, application, and advancement of different
media technologies and interfaces that can support interaction
across a wide range of users.
Sustainable Work in Europe brings together a strong core of Swedish
working life research, with additional contributions from across
Europe, and discussion of current issues such as digitalisation,
climate change and the Covid pandemic. It bridges gaps between
social science and medicine, and adds emphasis on age and gender.
The book links workplace practice, theory and policy, and is
intended to provide the basis for ongoing debate and dialogue.
|
You may like...
Harry's House
Harry Styles
CD
(1)
R435
R350
Discovery Miles 3 500
ABC Day
Dipti Joshi
Hardcover
R526
R490
Discovery Miles 4 900
|