Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing
This book explores cognitive behavior among Internet of Things. Using a series of current and futuristic examples - appliances, personal assistants, robots, driverless cars, customer care, engineering, monetization, and many more - the book covers use cases, technology and communication aspects of how machines will support individuals and organizations. This book examines the Cognitive Things covering a number of important questions: * What are Cognitive Things? * What applications can be driven from Cognitive Things - today and tomorrow? * How will these Cognitive Things collaborate with each and other, with individuals and with organizations? * What is the cognitive era? How is it different from the automation era? * How will the Cognitive Things support or accelerate human problem solving? * Which technical components make up cognitive behavior? * How does it redistribute the work-load between humans and machines? * What types of data can be collected from them and shared with external organizations? * How do they recognize and authenticate authorized users? How is the data safeguarded from potential theft? Who owns the data and how are the data ownership rights enforced? Overall, Sathi explores ways in which Cognitive Things bring value to individuals as well as organizations and how to integrate the use of the devices into changing organizational structures. Case studies are used throughout to illustrate how innovators are already benefiting from the initial explosion of devices and data. Business executives, operational managers, and IT professionals will understand the fundamental changes required to fully benefit from cognitive technologies and how to utilize them for their own success.
This book surveys a 'cluster' of works that seek to explore the cultures of cyberspace, the Internet and the information society. It introduces key ideas, and includes detailed discussion of the work of two key thinkers in this area, Manuel Castells and Donna Haraway, as well as outlining the development of cyberculture studies as a field. To do this, the book also explores selected 'moments' in this development, from the early 1990s, when cyberspace and cyberculture were only just beginning to come together as ideas, up to the present day, when the field of cyberculture studies has grown and bloomed, producing innovative theoretical and empirical work from a diversity of standpoints. Key topics include: life on the screen network society space of flows cyborg methods. Cyberculture Theorists is the ideal starting point for anyone wanting to understand how to theorise cyberculture in all its myriad forms.
This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: is the Internet qualitatively different from the more traditional forms of the media? has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen, or via better state transparency? does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? in authoritarian states, does the Internet function as a beacon for free speech or as another tool for propaganda?
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.
1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms
Closer Together, Further Apart offers current unique insight into
the cultural shifts brought about by digital technology and the
Internet. It considers how these new connections are impacting not
only society as a whole, but more specifically communication in
relationships and across generations. Robert Weiss, MSW, is a therapist, international speaker, author, and a blogger on PsychCentral.com, where he writes regularly on the topic of sex and intimacy in the digital age. He was featured in LA Weekly 2013 People issue as one of LA's most fascinating people. He currently serves as Senior Vice-President of Clinical Development for Elements Behavioral Health. Jennifer P. Schneider, MD, PhD, is a physician, international speaker, and the author of nine books and numerous journal articles.
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.
Changes in the media landscape present new challenges for scholars interested in the relationship between the mass media and civil society. Notably, the explosion of the Internet in advanced industrial democracies and its more limited introduction in other types of regimes has provided new pathways for communication. This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: * Is the Internet qualitativey different from the more traditional forms of the media? * Has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen or via better state transparency? * Alternatively, does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? * In authoritarian states, does the Internet function as a beacon for free speech or another tool for propaganda? This book will be of interest to students and scholars of the Internet and civil society. Jensen, University of Aarhus Weiner Lusoli, University of Salford Stephen Ward, University of Salford Scott Wr
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
The text focuses on the theory, design, and implementation of the Internet of Things (IoT), in a modern communication system. It will be useful to senior undergraduate, graduate students, and researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology. Features: Presents all the necessary information on the Internet of Things in modern computing Examines antenna integration challenges and constraints in the Internet of Things devices Discusses advanced Internet of Things networks and advanced controllers required for modern architecture Explores security and privacy challenges for the Internet of Things-based health care system Covers implementation of Internet of Things security protocols such as MQTT, Advanced Message Queuing Protocol, XMPP, and DSS The text addresses the issues and challenges in implementing communication and security protocols for IoT in modern computing. It further highlights the applications of IoT in diverse areas including remote health monitoring, remote monitoring of vehicle data and environmental characteristics, industry 4.0, 5G communications, and Next-gen IoT networks. The text presents case studies on IoT in modern digital computing. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology.
From security training simulations to war games to role-playing
games, to sports games to gambling, playing video games has become
a social phenomena, and the increasing number of players that cross
gender, culture, and age is on a dramatic upward trajectory.
"Playing Video Games: Motives, Responses, and Consequences"
integrates communication, psychology, and technology to examine the
psychological and mediated aspects of playing video games. It is
the first volume to delve deeply into these aspects of computer
game play. It fits squarely into the media psychology arm of
entertainment studies, the next big wave in media studies. The book
targets one of the most popular and pervasive media in modern
times, and it will serve to define the area of study and provide a
theoretical spine for future research.
Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology. It poses criminological, legal, ethical, and policy questions linked to such development and anticipates the impact of DFTs on crime and offending. It forestalls their wide-ranging consequences, including the proliferation of new types of vulnerability, policing and other mechanisms of social control, and the threat of pervasive and intrusive surveillance. Two key concerns lie at the heart of this volume. First, the book investigates the origins and development of emerging DFTs and their interactions with criminal behaviour, crime prevention, victimisation, and crime control. It also investigates the future advances and likely impact of such processes on a range of social actors: citizens, non-citizens, offenders, victims of crime, judiciary and law enforcement, media, NGOs. This book does not adopt technological determinism that suggests technology alone drives social development. Yet, while it is impossible to know where the emerging technologies are taking us, there is no doubt that DFTs will shape the way we engage with and experience criminal behaviour in the twenty-first century. As such, this book starts the conversation about a range of essential topics that this expansion brings to social sciences, and begins to decipher challenges we will be facing in the future. An accessible and compelling read, this book will appeal to those engaged with criminology, sociology, politics, policymaking, and all those interested in the impact of DFTs on the criminal justice system.
A little birdy told us you needed to know more about Mastodon Ready to escape the drama of existing social media platforms and try something new and awesome in the world of social media? In Mastodon For Dummies, experienced tech trainers Chris Minnick and Mike McCallister show you exactly how to use Mastodon, the hot decentralized social media offering on the web and destination for thousands of social media migrants. Learn how to sign up for the service on your choice of server and get familiar with the rules of what's sure to become your new favorite app. You'll discover how to connect with other people, attract your own followers, and make yourself right at home in the Mastodon community. In the book, you'll find: Easy-to-follow instructions on how to choose the Mastodon server that suits you best Instructions for establishing new connections on a new social platform and learning the rules of the road Tips for conducting business on Mastodon and making a home for your home-based business or brand on the social media service Step-by-step guides on launching your very own server If you're ready to leave old social platforms in the rear-view and try something new, grab a copy of Mastodon For Dummies.
This book demonstrates how GIS techniques and statistical methods can be used to emphasise the characteristics of population and its related variables, vis-a-vis care facilities and the status of vector borne diseases, as well as for malaria modeling. Concentrating on the Varanasi district of India, the main aim of the book is to determine and map the density areas of vector borne diseases using GIS techniques. The book explores how health GIS is an important sub-discipline of health science and medical geography, which is traditionally focused on the spatial aspects of disease ecology and health care facility analysis.
Becoming a Digital Parent is a practical, readable guide that will help all parents have confidence to successfully navigate technology with their children. It accessibly presents evidence-based guidance to offer an overview of the digital landscape, empowering parents to embrace opportunities whilst keeping children responsible and safe online. Covering a range of topics including developmental stages, screen time, bed time, gaming, digital identities, and helpful parenting apps and resources, Carrie Rogers-Whitehead explores the challenges and opportunities involved in parenting in the digital age. With advice for parents of babies through to teenagers, each chapter includes an explanation of the latest research, interviews with parents and experts, and helpful case studies gathered by the author during her extensive experience of working directly with parents and children. This book will show parents how to communicate better with their children, create a family technology plan, put in place intervention strategies when things happen, and take advantage of the benefits technology can afford us. Becoming a Digital Parent is ideal for all parents looking to effectively navigate the technological world, and the range of professionals who work with them.
This anthology contributes to creating awareness on how digital ageism operates in relation to the widely spread symbolic representations of old and young age, the (lack of) representation of diverse older individuals in the design, development, and discourses and in the actual algorithms and datasets. It also shows how individuals and institutions deal with digital ageism in everyday life. In the past decades, digital technologies permeated most aspects of everyday life and became ingrained into human existence. With a focus on how age is represented and experienced in relation to digital technologies leading to digital ageism, digitalisation's reinforcement of spirals of exclusion and loss of autonomy of some collectives is explored, when it could be natural for a great part of society and represent a sort of improvement. The book addresses social science students and scholars interested in everyday digital technologies, society and the power struggles about it, providing insights from different parts of the globe. By using different methods and touching upon different aspects of digital ageism and how it plays out in contemporary connected data societies, this volume will raise awareness, challenge power, initiate discussions and spur further research into this field.
The 9th International Conference on Entertainment Computing (ICEC 2010) was held in September 2010 in Seoul Korea. After Pittsburgh (2008) and Paris (2009), the event returned to Asia. The conference venue was the COEX Exhibition Hall in one of the most vivid and largest cities of the world. This amazing mega-city was a perfect location for the c- ference. Seoul is on the one hand a metropolitan area with modern industries, univer- ties and great economic power. On the other hand, it is also a place with a very fas- nating historical and cultural background. It bridges the past and the future as well as east and west. Entertainment computing also aims at building bridges from technology to leisure, education, culture and work. Entertainment computing at its core has a strong focus on computer games. However, it is not only about computer games. The last ICEC c- ferences have shown that entertainment computing is a much wider field. For instance in games, technology developed for games can be used for a wide range of appli- tions such as therapy or education. Moreover, entertainment does not necessarily have to be understood as games. Entertainment computing finds its way to stage perfo- ances and all sorts of new interactive installations.
The internet could have been purpose-built for fostering the growth of the social movements and citizen initiatives which have had such a significant impact on the political landscape since the 1990s. In "Cyberprotest" the contributors explore the effects of this synergy between ICTs (Information Communication Technologies) and people power, analysing the implications for politics and social policy at both a national and a global level. Through a number of different international examples answers are sought to questions such as: to what extent and in what forms do social movements use ICTs?; how do new ICTs facilitate new patterns and forms of citizen mobilization?; how does this use affect the relationship between social movements and their members?; how do ICTs change the way social movement organizations communicate with each other?; and how do they affect the way these movements mobilize and intervene in public debates and political conflicts?
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
The NODE.London Reader II projects a critical context around the Season of Media Arts in London, March 2008. NODE.London (Networked, Open, Distributed, Events. London) is a voluntary network of people, organisations and projects sharing and developing the infrastructure for media arts and related ctivities in London and beyond. This reader revisits debates on media arts and activism, collaborative practices and organization and the political economy of media economics. It includes contributions from Ruth Catlow, Marc Garrett, Anna Colin, Julie Freeman, Matthew Fuller, Usman Haque, Jamie King, Armin Medosch, Jonas Andersson, Toni Prug, Adnan Hadzi, Cinzia Cremona and Petra Bauer. Edited by Mia Jankowicz, Anna Colin, Adnan Hadzi and Jonas Andersson.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. |
You may like...
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,151
Discovery Miles 31 510
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R6,357
Discovery Miles 63 570
|