|
Books > Computing & IT > Social & legal aspects of computing
This book covers COVID-19 related research works and focuses on
recent advances in the Internet of Things (IoT) in smart healthcare
technologies. It includes reviews and original works on COVID-19 in
terms of e-healthcare, medicine technology, life support systems,
fast detection, diagnoses, developed technologies and innovative
solutions, bioinformatics, datasets, apps for diagnosis, solutions
for monitoring and control of the spread of COVID-19, among other
topics. The book covers comprehensive studies from bioelectronics
and biomedical engineering, artificial intelligence, and big data
with a prime focus on COVID-19 pandemic.
IN LITTLE MORE THAN HALF A DECADE, Facebook has gone from a
dorm-room novelty to a company with 500 million users. It is one of
the fastest growing companies in history, an essential part of the
social life not only of teenagers but hundreds of millions of
adults worldwide. As Facebook spreads around the globe, it creates
surprising effects--even becoming instrumental in political
protests from Colombia to Iran.
Veteran technology reporter David Kirkpatrick had the full
cooperation of Facebook's key executives in researching this
fascinating history of the company and its impact on our lives.
Kirkpatrick tells us how Facebook was created, why it has
flourished, and where it is going next. He chronicles its successes
and missteps, and gives readers the most complete assessment
anywhere of founder and CEO Mark Zuckerberg, the central figure in
the company's remarkable ascent. This is the Facebook story that
can be found nowhere else.
How did a nineteen-year-old Harvard student create a company that
has transformed the Internet and how did he grow it to its current
enormous size? Kirkpatrick shows how Zuckerberg steadfastly refused
to compromise his vision, insistently focusing on growth over
profits and preaching that Facebook must dominate (his word)
communication on the Internet. In the process, he and a small group
of key executives have created a company that has changed social
life in the United States and elsewhere, a company that has become
a ubiquitous presence in marketing, altering politics, business,
and even our sense of our own identity. This is the Facebook
Effect.
YouTube has afforded new ways of documenting, performing and
circulating musical creativity. This first sustained exploration of
YouTube and music shows how record companies, musicians and amateur
users have embraced YouTube's potential to promote artists, stage
performances, build artistic (cyber)identity, initiate interactive
composition, refresh music pedagogy, perform fandom, influence
musical tourism and soundtrack our everyday lives. Speaking from a
variety of perspectives, musicologists, film scholars,
philosophers, new media theorists, cultural geographers and
psychologists use case studies to situate YouTube as a vital
component of contemporary musical culture. This book works together
with its companion text Remediating Sound: Repeatable Culture,
YouTube and Music.
The field of high technology focuses on new, rapidly developing
technologies, which include electronic technology, new material
technology, new energy technology, bioengineering technology, and
communication technology. Social Development and High Technology
Industries: Strategies and Applications highlights the
relationships between contemporary high technology and social
development, the development and application of high technology,
high technology competition, and economic development as it
pertains to high technology. This book addresses society s growing
need to adopt emerging technologies for all aspects of business and
economic activity and develop innovative solutions to research
problems, which will result in the creation of high performance
systems.
This book is written for software product teams that use AI to add
intelligent models to their products or are planning to use it. As
AI adoption grows, it is becoming important that all AI driven
products can demonstrate they are not introducing any bias to the
AI-based decisions they are making, as well as reducing any
pre-existing bias or discrimination. The responsibility to ensure
that the AI models are ethical and make responsible decisions does
not lie with the data scientists alone. The product owners and the
business analysts are as important in ensuring bias-free AI as the
data scientists on the team. This book addresses the part that
these roles play in building a fair, explainable and accountable
model, along with ensuring model and data privacy. Each chapter
covers the fundamentals for the topic and then goes deep into the
subject matter - providing the details that enable the business
analysts and the data scientists to implement these fundamentals.
AI research is one of the most active and growing areas of computer
science and statistics. This book includes an overview of the many
techniques that draw from the research or are created by combining
different research outputs. Some of the techniques from relevant
and popular libraries are covered, but deliberately not drawn very
heavily from as they are already well documented, and new research
is likely to replace some of it.
This book introduces the state-of-the-art algorithms for data and
computation privacy. It mainly focuses on searchable symmetric
encryption algorithms and privacy preserving multi-party
computation algorithms. This book also introduces algorithms for
breaking privacy, and gives intuition on how to design algorithm to
counter privacy attacks. Some well-designed differential privacy
algorithms are also included in this book. Driven by lower cost,
higher reliability, better performance, and faster deployment, data
and computing services are increasingly outsourced to clouds. In
this computing paradigm, one often has to store privacy sensitive
data at parties, that cannot fully trust and perform privacy
sensitive computation with parties that again cannot fully trust.
For both scenarios, preserving data privacy and computation privacy
is extremely important. After the Facebook-Cambridge Analytical
data scandal and the implementation of the General Data Protection
Regulation by European Union, users are becoming more privacy aware
and more concerned with their privacy in this digital world. This
book targets database engineers, cloud computing engineers and
researchers working in this field. Advanced-level students studying
computer science and electrical engineering will also find this
book useful as a reference or secondary text.
Although it has become commonplace for users and organizations
alike to regularly collaborate during the seeking, searching,
retrieval and use of information, a definitive work on the
behaviors, practices, and systems that enable this Collaborative
information behavior has been sorely lacking. Collaborative
Information Behavior: User Engagement and Communication Sharing
fulfills that urgent demand by presenting current research and
practices in the area of collaborative information behavior.
Providing empirical research findings, theoretical frameworks, and
models relevant to the myriad aspects of collaborative information
behavior, this book is an ambitious and important work for
professionals, educators and researchers in the fields of
information science, knowledge management, human-computer
interaction and computer-supported cooperative work.
This book aims to explore and discuss theories and technologies for
the development of socially competent and culture-aware embodied
conversational agents for elderly care. To tackle the challenges in
ageing societies, this book was written by experts who have a
background in assistive technologies for elderly care,
culture-aware computing, multimodal dialogue, social robotics and
synthetic agents. Chapter 1 presents a vision of an intelligent
agent to illustrate the current challenges for the design and
development of adaptive systems. Chapter 2 examines how notions of
trust and empathy may be applied to human-robot interaction and how
it can be used to create the next generation of emphatic agents,
which address some of the pressing issues in multicultural ageing
societies. Chapter 3 discusses multimodal machine learning as an
approach to enable more effective and robust modelling technologies
and to develop socially competent and culture-aware embodied
conversational agents for elderly care. Chapter 4 explores the
challenges associated with real-world field tests and deployments.
Chapter 5 gives a short introduction to socio-cognitive language
processing that describes the idea of coping with everyday
language, irony, sarcasm, humor, paralinguistic information such as
the physical and mental state and traits of the dialogue partner,
and social aspects. This book grew out of the Shonan Meeting
seminar entitled "Multimodal Agents for Ageing and Multicultural
Societies" held in 2018 in Japan. Researchers and practitioners
will be helped to understand the emerging field and the
identification of promising approaches from a variety of
disciplines such as human-computer interaction, artificial
intelligence, modelling, and learning.
Digital innovations, such as mobile technologies, have had a
significant impact on the way people relate to one another, as well
as the way they obtain and distribute information. As mobile
devices continue to evolve, it has become easier to socialize;
however, these mobile advancements have also made certain aspects
of interaction more complex. The Handbook of Research on Human
Social Interaction in the Age of Mobile Devices features an
interdisciplinary perspective on mobile innovations and the use of
this technology in daily life. Investigating the successes, issues,
and challenges of the utilization of mobile technology, this
handbook of research is a comprehensive reference source for
professionals, educators, policymakers, and students interested in
the impact these devices have on digital interaction, media, and
communication.
Explaining cybercrime in a highly networked world, this book
provides a comprehensive yet accessible summary of the history,
modern developments, and efforts to combat cybercrime in various
forms at all levels of government-international, national, state,
and local. As the exponential growth of the Internet has made the
exchange and storage of information quick and inexpensive, the
incidence of cyber-enabled criminal activity-from copyright
infringement to phishing to online pornography-has also exploded.
These crimes, both old and new, are posing challenges for law
enforcement and legislators alike. What efforts-if any-could deter
cybercrime in the highly networked and extremely fast-moving modern
world? Introduction to Cybercrime: Computer Crimes, Laws, and
Policing in the 21st Century seeks to address this tough question
and enables readers to better contextualize the place of cybercrime
in the current landscape. This textbook documents how a significant
side effect of the positive growth of technology has been a
proliferation of computer-facilitated crime, explaining how
computers have become the preferred tools used to commit crimes,
both domestically and internationally, and have the potential to
seriously harm people and property alike. The chapters discuss
different types of cybercrimes-including new offenses unique to the
Internet-and their widespread impacts. Readers will learn about the
governmental responses worldwide that attempt to alleviate or
prevent cybercrimes and gain a solid understanding of the issues
surrounding cybercrime in today's society as well as the long- and
short-term impacts of cybercrime. Provides accessible,
comprehensive coverage of a complex topic that encompasses identity
theft to copyright infringement written for non-technical readers
Pays due attention to important elements of cybercrime that have
been largely ignored in the field, especially politics Supplies
examinations of both the domestic and international efforts to
combat cybercrime Serves an ideal text for first-year undergraduate
students in criminal justice programs
Winner of the 2016 PROSE Award in Language and Linguistics Data.
Suddenly it is everywhere, and more and more of it is about us. The
computing revolution has transformed our understanding of nature.
Now it is transforming human behaviour. For some, pervasive
computing offers a powerful vehicle of introspection and
self-improvement. For others it signals the arrival of a dangerous
'control society' in which surveillance is no longer the
prerogative of discrete institutions but a simple fact of life. In
Computable Bodies, anthropologist Josh Berson asks how the data
revolution is changing what it means to be human. Drawing on
fieldwork in the Quantified Self and polyphasic sleeping
communities and integrating perspectives from interaction design,
the history and philosophy of science, and medical and linguistic
anthropology, he probes a world where everyday life is mediated by
a proliferating array of sensor montages, where we adjust our
social signals to make them legible to algorithms, and where old
rubrics for gauging which features of the world are animate no
longer hold. Computable Bodies offers a vision of an anthropology
for an age in which our capacity to generate data and share it over
great distances is reconfiguring the body-world interface in ways
scarcely imaginable a generation ago.
Technology for Facilitating Humanity and Combating Social
Deviations: Interdisciplinary Perspectives provides a
state-of-the-art compendium of research and development on
socio-technical approaches to support the prevention, mitigation,
and elimination of social deviations with the help of computer
science and technology. This book provides historical backgrounds,
experimental studies, and future perspectives on the use of
computing tools to prevent and deal with physical, psychological
and social problems that impact society as a whole.
As methods that enable or facilitate the development of usable
systems for the Web can provide complementary results in enhancing
the Web experience, it is important to examine the ways that these
methods can be combined and integrated in the development process.
Integrating Usability Engineering for Designing the Web Experience:
Methodologies and Principles provides a link between theoretical
research and Web engineering, presenting a more holistic approach
to Internet serviceability. Containing analysis from leading
international experts, this publication offers new insights on
applications that enable or facilitate the development of usable
Web systems.
As virtual worlds increase in their depth and number, evolving into
virtual communities with separate rules and expectations, they are
often brought into conflict with the legal rules of the physical
world. Law and Order in Virtual Worlds: Exploring Avatars, Their
Ownership and Rights provides an understanding of the interface
between the laws of the real world and the laws of the virtual
worlds. Written for anyone who has ventured into a virtual reality
and wondered what, if any, real world consequences would follow
their actions, this book raises and answers compelling legal
questions about such issues as owning virtual assets, intellectual
property right infringements and virtual liabilities in the real
world.
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
This publication contributes to the serious games field by
investigating original contributions and methods that use serious
games in various domains. This comprehensive and timely publication
works as an essential reference source, building on the available
literature in the field of Serious Games for the economic and
social development of countries while providing for further
research opportunities in this dynamic and growing field. Thus, the
book provides the opportunity for a reflection on this important
issue, increasing the understanding of the importance of Serious
Games in the context of organizations' improvements, providing
relevant academic work, empirical research findings, and an
overview of this relevant field of study. This text provides the
resources necessary for policy makers, technology developers and
managers to adopt and implement solutions for a more digital era.
This book is dedicated to addressing the major challenges in
fighting COVID-19 using artificial intelligence (AI) and machine
learning (ML) - from cost and complexity to availability and
accuracy. The aim of this book is to focus on both the design and
implementation of AI-based approaches in proposed COVID-19
solutions that are enabled and supported by sensor networks, cloud
computing, and 5G and beyond. This book presents research that
contributes to the application of ML techniques to the problem of
computer communication-assisted diagnosis of COVID-19 and similar
diseases. The authors present the latest theoretical developments,
real-world applications, and future perspectives on this topic.
This book brings together a broad multidisciplinary community,
aiming to integrate ideas, theories, models, and techniques from
across different disciplines on intelligent solutions/systems, and
to inform how cognitive systems in Next Generation Networks (NGN)
should be designed, developed, and evaluated while exchanging and
processing critical health information. Targeted readers are from
varying disciplines who are interested in implementing the smart
planet/environments vision via wireless/wired enabling
technologies.
This book provides an analysis of the role of fog computing, cloud
computing, and Internet of Things in providing uninterrupted
context-aware services as they relate to Healthcare 4.0. The book
considers a three-layer patient-driven healthcare architecture for
real-time data collection, processing, and transmission. It gives
insight to the readers for the applicability of fog devices and
gateways in Healthcare 4.0 environments for current and future
applications. It also considers aspects required to manage the
complexity of fog computing for Healthcare 4.0 and also develops a
comprehensive taxonomy.
Creativity is crucial to the Information Age economy. It is the
basis of production in the cultural industries. In this excellent
book, Ruth Towse provides an analysis of the interaction between
creativity, the law, and markets for cultural goods and services.
Copyright law establishes property rights that create economic
incentives to cultural production and Ruth Towse uses her analysis
to draw conclusions about policy on copyright. This unique study is
of interest to a range of disciplines in economics, law, cultural
studies and management.
Breaches and identity theft involving medical data are on the rise.
Data security has become especially critical to the healthcare
industry as patient privacy hinges on legal compliance and secure
adoption of electronic health records. As cyber criminals see
medical data as an easy way to illegally obtain medical goods and
services or sell sensitive information, major security flaws can
pose serious threats to the health and safety of patients. The
Handbook of Research on Medical Data Security for Bioengineers
seeks to provide a cross-disciplinary forum on research in privacy
preserving healthcare systems and engineering applications in
medical data security. The goal of the book is to instigate
discussion on these critical issues since the success of electronic
healthcare applications depends directly on patient security and
privacy for ethical and legal reasons. While highlighting topics
including data privacy, encryption strategies, and smart health,
this book is ideally designed for IT experts, computer engineers,
biomedical engineer practitioners, professionals, researchers, and
post-doctoral and graduate students.
This book presents high-quality research papers presented at the
International Conference on Smart Computing and Cyber Security:
Strategic Foresight, Security Challenges and Innovation (SMARTCYBER
2020) held during July 7-8, 2020, in the Department of Smart
Computing, Kyungdong University, Global Campus, South Korea. The
book includes selected works from academics and industrial experts
in the field of computer science, information technology, and
electronics and telecommunication. The content addresses challenges
of cyber security.
Recently, the ICT field has seen a shift from machine centered
focuses to human and user knowledge-based approaches. However, as
the priorities shift, questions arise on how to detect and monitor
users' behaviour. Human Behavior Recognition Technologies:
Intelligent Applications for Monitoring and Security addresses
these questions and more as it takes an insightful glance into the
applications and dependability of behaviour detection. In addition,
this comprehensive publication looks into the social, ethical, and
legal implications of these areas. Researchers and practitioners
interested in the computational aspects of behaviour monitoring as
well as the ethical and legal implications will find this reference
source beneficial.
There are multiple aspects of electronically-mediated communication
that influence and have strong implications for legal practice.
This volume focuses on three major aspects of mediated
communication through social media. Part I examines social media
and the legal community. It explores how this has influenced
professional legal discourse and practice, contributing to the
popularity of internet-based legal research, counselling and
assistance through online services offering explanations of law,
preparing documents, providing evidence, and even encouraging
electronically mediated alternative dispute resolution. Part II
looks at the use of social media for client empowerment. It
examines how it has taken legal practice from a formal and distinct
business to one that is publicly informative and accessible. Part
III discusses the way forward, exploring the opportunities and
challenges. Based on cases from legal practice in diverse
jurisdictions, the book highlights key issues as well as
implications for legal practitioners on the one hand, and clients
on the other. The book will be a valuable reference for
international scholars in law and other socio-legal studies,
discourse analysis, and practitioners in legal and alternative
dispute resolution contexts.
|
|