Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing
Mobile Data Visualization is about facilitating access to and understanding of data on mobile devices. Wearable trackers, mobile phones, and tablets are used by millions of people each day to read weather maps, financial charts, or personal health meters. What is required to create e ffective visualizations for mobile devices? This book introduces key concepts of mobile data visualization and discusses opportunities and challenges from both research and practical perspectives. Mobile Data Visualization is the first book to provide an overview of how to e ffectively visualize, analyze, and communicate data on mobile devices. Drawing from the expertise, research, and experience of an international range of academics and practitioners from across the domains of Visualization, Human Computer Interaction, and Ubiquitous Computing, the book explores the challenges of mobile visualization and explains how it diff ers from traditional data visualization. It highlights opportunities for reaching new audiences with engaging, interactive, and compelling mobile content. In nine chapters, this book presents interesting perspectives on mobile data visualization including: how to characterize and classify mobile visualizations; how to interact with them while on the go and with limited attention spans; how to adapt them to various mobile contexts; specific methods on how to design and evaluate them; reflections on privacy, ethical and other challenges, as well as an outlook to a future of ubiquitous visualization. This accessible book is a valuable and rich resource for visualization designers, practitioners, researchers, and students alike.
This text examines the impact of information and communication technologies (ICTs) and their consequences for political institutions, and assesses critically the concept of an emergent electronic democracy. The first section discusses the concepts and issues of "Electronic Democracy" with chapters on democracy and cyberspace, local democracy, global control and interactive ICTs. In the second section, entitled ICTs and the state, the chapters examine the impacts and implications of televising the British "House of Commons", the effects of ICTs on political parties, and closed circuit television. The final section discusses ICTs and the citizen with chapters covering democracies online, strengthening communities in the information age and the community network. This book provides a source for those studying social policy, politics and sociology as well as for policy analysts, social scientists and computer scientists.
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media. For over a century, the indexical relationship of the photographic image, and its related media of film and video, to the scene of capture has served as a basis for truth claims. Historically, the iconicity of these images has featured a causal traceback to actual light rays in a particular time and space, which were fixed by chemical reactions or digital sensors to the resultant image. Today, photorealistic audiovisual media can be generated from deep learning networks that sever any connection to an actual event. Should society instantiate new regimes to manage this new challenge to our sense of reality and the traditional evidential capacities of the 'mechanical image'? How do these images generate information disorder while also providing the basis for legitimate tools used in entertainment and creative industries? Scholars and students from many backgrounds, as well as policymakers, journalists and the general reading public, will find a multidisciplinary approach to questions posed by deep fake research from Communication, International Studies, Writing and Rhetoric.
The calculus of IT support for the banking, securities and insurance industries has changed dramatically and rapidly over the past few years. Unheard of just a few years ago, corporate intranets are now used for everything from job postings to enhanced team communications. Whole new departments are being created to support e-commerce. And the Internet/Intranet/Extranet triple-whammy is the most critical component of most financial IT shops. At the same time, new intelligent agents stand ready to take on such diverse functions as customer profiling and data mining.
This wide-ranging introductory text looks at the virtual community of cyberspace and analyzes its relationship to the real one as lived out in today's societies. Such issues as race, gender, power, economics and ethics in cyberspace are discussed by the leading experts on the subject of the Internet, grouped under four main sections: identity; social order and control; community structure and dynamics; and collective action. The book displays how the idea of community is being challenged and rewritten by the increasing power and range of cyberspace. As new societies and relationships are formed in this virtual landscape, we are now having to consider the potential consequences this might have on our own community and societies.;The text should appeal to students and professionals, but also to those concerned about the changing relationships between information technology and a society which is fast becoming divided between those on-line and those not.
Politicians, policy makers and business gurus are all encouraging us to join the information superhighway at the nearest junction or risk being excluded from the social and economic benefits of the information revolution. "Cyberspace Divide" critically considers the complex relationship between technological change, its effect upon social divisions, its consequences for social action an the emerging strategies for social inclusion in the Information Age. The contributors cover such themes as human interaction, ethical behavior, and the growing disparity between the information rich and the information poor.
Is the emerging digital multimedia culture of today transforming
the textbook or forever displacing it? As new media of transmission
enter the classroom, the traditional textbook is now caught up in a
dialogue reshaping the textual boundaries of the book, and with it
the traditional modes of cognition and learning, which are bound
more to language than to visual form. Most of the important work in
the past two decades in the field of curriculum has focused on the
culture of the textbook. A rich literature has evolved around
textbooks as the traditional object of instructional activity. This
volume is an important contribution to this literature, which
focuses on the actual making of a textbook. This design process
serves as a metaphor that suggests new paradigms of learning and
instruction, in which text content is but one component in a
multidimensional information space."The Visual Turn" is an
exploration along the border of this new learning space
transforming the traditional center of instruction in the
classroom.
Hypertext, email, word-processing: electronic technologies have
revolutionized the way we write language. How does language on
screen work differently from language on the page? What new
literacy skills are needed and how do we teach them?
Putting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape. Technology not only disrupts the traditional idea of what it is 'to think like a lawyer,' as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules - thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in shaping both legal doctrine and our regulatory thinking. This is a book for those studying, or about to study, law - as well as others with interests in the legal, political, and social impact of technology.
Is information technology enhancing democracy? Developments in information technology and the Internet are taking place at an almost bewildering pace. Such improvements, however, are believed to present opportunities for improving the responsiveness and accountability of political institutions and enhancing citizen participation. In this text the theoretical arguments for and against "electronic democracy" and the potential of information and communication technology are closely examined. The book is underpinned by a series of case studies in the US and Europe that demonstrate the application of "electronic democracy" in a number of city and civic projects. The book aims to provide a balanced and considered evaluation of the potential for "electronic democracy" based on empirical research.
Deptford.TV is an audio-visual documentation of the urban change of Deptford (south-east London) in collaboration with SPC.org media lab, Bitnik.org, Boundless.coop, Liquid Culture and Goldsmiths College. The unedited as well as edited media content is being made available on the Deptford.TV database and distributed over the Boundless.coop wireless network. The media is licensed through open content licenses such as Creative Commons and the GNU general public license. This reader problematises the notion of 'tactical media'. As McKenzie Wark and others stated already in 2003: 'can tactical media anticipate, rather than be merely reactive?' By calling for a strategic approach to media production and distribution, the intention is to overcome some of the structural paradoxes inherent to 'alternative' or 'oppositional' media, especially since much of the free / open culture dissemination on the Internet has become the new "mainstream" in itself (think of the casual defiance of copyright played out relentlessly and on a mass scale with file-sharing, social networking, and everyday media consumption). This book is a compilation of theoretical underpinnings, local narratives and written documentation not only of the local Deptford.TV project but of phenomena relating to this new situation of 'strategic media'. Contributors: Adnan Hadzi, Jonas Andersson, Ben Gidley, Duncan Reekie, Brianne Selman, Neil Gordon-Orr, Alison Rooke, Gesche Wuerfel, the University of Openness, Jamie King, Armin Medosch, Rasmus Fleischer, andrea rota, Bitnik Mediengruppe, Sven Koenig, Jo Walsh, Rufus Pollock, Platoniq, The People Speak, Zoe Young, Mick Fuzz, Denis Jaromil Rojo, Lennaart van Oldenborgh
This CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA's latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questions Key Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You'll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you'll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you'll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world. What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization's security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.
Suzanne Keene's pioneering book shows how museums and other cultural organizations fit into the new world of information and electronic communications and, most importantly, how they can take advantage of what it has to offer.
As we begin a new century, the astonishing spread of nationally and
internationally accessible computer-based communication networks
has touched the imagination of people everywhere. Suddenly, the
Internet is in everyday parlance, featured in talk shows, in
special business "technology" sections of major newspapers, and on
the covers of national magazines. If the Internet is a new world of
social behavior it is also a new world for those who study social
behavior. This volume is a compendium of essays and research
reports representing how researchers are thinking about the social
processes of electronic communication and its effects in society.
Taken together, the chapters comprise a first gathering of social
psychological research on electronic communication and the
Internet.
As we begin a new century, the astonishing spread of nationally and internationally accessible computer-based communication networks has touched the imagination of people everywhere. Suddenly, the Internet is in everyday parlance, featured in talk shows, in special business "technology" sections of major newspapers, and on the covers of national magazines. If the Internet is a new world of social behavior it is also a new world for those who study social behavior. This volume is a compendium of essays and research reports representing how researchers are thinking about the social processes of electronic communication and its effects in society. Taken together, the chapters comprise a first gathering of social psychological research on electronic communication and the Internet. The authors of these chapters work in different disciplines and have different goals, research methods, and styles. For some, the emergence and use of new technologies represent a new perspective on social and behavioral processes of longstanding interest in their disciplines. Others want to draw on social science theories to understand technology. A third group holds to a more activist program, seeking guidance through research to improve social interventions using technology in domains such as education, mental health, and work productivity. Each of these goals has influenced the research questions, methods, and inferences of the authors and the "look and feel" of the chapters in this book. Intended primarily for researchers who seek exposure to diverse approaches to studying the human side of electronic communication and the Internet, this volume has three purposes: * to illustrate how scientists are thinking about the social processes and effects of electronic communication; * to encourage research-based contributions to current debates on electronic communication design, applications, and policies; and * to suggest, by example, how studies of electronic communication can contribute to social science itself.
- The author is one of the most influential AI reseachers of recent decades. - Written in an accessible language, the book provides a probing account of AI today and proposes a new narrative to connect and make sense of events that happened in the recent tumultuous past and enable us to think soberly about the road ahead. - The book is divided into ten carefully crafted and easily-digestible chapters, each grapples with an important question for AI, ranging from the scientific concepts that underpin the technology to wider implications for society, using real examples wherever possible.
Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management presents new cyber-physical security findings for Industry 4.0 using emerging technologies like artificial intelligence (with machine/deep learning), data mining, applied mathematics. All these are the essential components for processing data, recognizing patterns, modeling new techniques, and improving the advantages of data science. Features * Presents an integrated approach with Cyber-Physical Systems, CPS security, and Industry 4.0 in one place * Exposes the necessity of security initiatives, standards, security policies, and procedures in the context of industry 4.0 * Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security * Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security for industry 4.0 This book is primarily aimed at graduates, researchers and professionals working in the field of security. Executives concerned with security management, knowledge dissemination, information, and policy development for data and network security in different educational, government, and non-government organizations will also find this book useful.
Vital to the effective functioning of voluntary organisations is the trust of people - the beneficiaries, clients, regulators, donors, volunteers and paid staff. Open, fair and well-managed data protection practice is not just desirable in helping to achieve that trust, but essential. Get it wrong and there is reputational damage and costs attached. Data Protection for voluntary organisations will enable you to set a shining example of best practice and also comply with UK data legislation and the General Data Protection Regulation (GDPR) in force since 2018. This book will help you: * Understand the key principles and elements of data protection * Recognise your main responsibilities as a data controller * Distinguish when you can and can't retain data * Appreciate what the rights of the data subject are Who is this book for? A must-read for anyone in the UK voluntary sector who wants to get beyond tick-box data management. Invaluable to data managers or those who handle personal information such as IT, personnel, marketing and fundraising departments. For professional advisers, and academics it will also offers a valuable summary drawing out key data protection points by examining and interpreting the primary legislation.
Revealing the inside workings of the International Monetary Fund (IMF), this text studies the culture of organizations and uses sociological methods to understand the technology which underpins office and commercial life. It advises on how to improve work processes and computer systems by exploring systems which use search and retrieval applications, hypertext documents, and shared database applications such as Lotus Notes.
Hypermedia and multimedia have penetrated the world of computer
games, Internet, and CD-ROM based reference manuals. However, the
fields of education, schooling, and training ask more specific
benefits from them. This book provides practical approaches to
transform these media into learning tools. Crucial helping steps
include the migration from expository to exploratory learning
strategies, the integration of collaborative learning practices in
plenary and individualistic teaching styles, and the evolution from
test-driven to experience-oriented training.
Hypermedia and multimedia have penetrated the world of computer
games, Internet, and CD-ROM based reference manuals. However, the
fields of education, schooling, and training ask more specific
benefits from them. This book provides practical approaches to
transform these media into learning tools. Crucial helping steps
include the migration from expository to exploratory learning
strategies, the integration of collaborative learning practices in
plenary and individualistic teaching styles, and the evolution from
test-driven to experience-oriented training.
In this book, David Braund offers a significantly different perspective upon the history of Roman Britain. Rather than relying on archaeology, the author concentrates on the literary evidence, drawing a colorful picture of the social and political context of Roman imperialism. The study discusses Roman theories of imperialism as well as the intellectual and political atmosphere within which Caesar mounted his invasions of Britain in 55 and 54 B.C. Braund shows how the ideologies and power structures at work in Rome fundamentally shaped politics and society in Roman Britain. Thus he develops an understanding of the literary sources which goes beyond mere translation and allows the reader insights into this remote corner of the Roman world.
Safety-critical systems are found in almost every sector of industry. Faults in these systems will result in a breach of safe operating conditions and exposure to the possible risk of major loss of life or catastrophic damage to plant, equipment or the environment. An understanding of the basis for the functioning of these systems is therefore vital to all involved in their operation. In particular, the interaction of the disciplines of software engineering, safety engineering, human factors and safety management is a total process whose entirety is not widely understood by those working in any of the individual fields. This book will redress that problem by providing an introduction to each constituent part with a cohesive structure and overview of the whole subject. It will be of interest to engineers, managers, students and anyone with responsibilities in these areas. |
You may like...
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,809
Discovery Miles 58 090
|