|
Books > Computing & IT > Social & legal aspects of computing
Cyber Security - Essential principles to secure your organisation
takes you through the fundamentals of cyber security, the
principles that underpin it, vulnerabilities and threats, and how
to defend against attacks. Organisations large and small experience
attacks every day, from simple phishing emails to intricate,
detailed operations masterminded by criminal gangs, and for every
vulnerability fixed, another pops up, ripe for exploitation. Cyber
security doesn't have to cost vast amounts of money or take a short
ice age to implement. No matter the size of your organisation,
improving cyber security helps protect your data and that of your
clients, improving business relations and opening the door to new
opportunities. This pocket guide will take you through the
essentials of cyber security - the principles that underpin it,
vulnerabilities and threats and the attackers who use them, and how
to defend against them - so you can confidently develop a cyber
security programme. Cyber Security - Essential principles to secure
your organisation Covers the key differences between cyber and
information security; Explains how cyber security is increasingly
mandatory and how this ties into data protection, e.g. the Data
Protection Act 2018 and the GDPR (General Data Protection
Regulation); Focuses on the nature of the problem, looking at
technical, physical and human threats and vulnerabilities; Explores
the importance of security by design; Gives guidance on why
security should be balanced and centralised; and Introduces the
concept of using standards and frameworks to manage cyber security.
No matter the size of your organisation, cyber security is no
longer optional - it is an essential component of business success
and a critical defence against the risks of the information age.
The only questions left are to decide when and where your journey
will begin. Start that journey now - buy this book today!
Grounded in the user-centered design movement, this book offers a
broad consideration of how our civilization has evolved its
technical infrastructure for human purpose to help us make sense of
the contemporary world of information infrastructure and online
existence. The author incorporates historical, cultural and
aesthetic approaches to situating information and its underlying
technologies across time in the collective, lived experiences of
humanity. In today's digital information world, user experience is
vital to the success of any product or service. Yet as the user
population expands to include us all, designing for people who vary
in skills, abilities, preferences and backgrounds is challenging.
This book provides an integrated understanding of users, and the
methods that have evolved to identify usability challenges, that
can facilitate cohesive and earlier solutions. The book treats
information creation and use as a core human behavior based on acts
of representation and recording that humans have always practiced.
It suggests that the traditional ways of studying information use,
with their origins in the distinct layers of social science
theories and models is limiting our understanding of what it means
to be an information user and hampers our efforts at being truly
user-centric in design. Instead, the book offers a way of
integrating the knowledge base to support a richer view of use and
users in design education and evaluation. Understanding Users is
aimed at those studying or practicing user-centered design and
anyone interested in learning how people might be better integrated
in the design of new technologies to augment human capabilities and
experiences.
It explore issues of diversity and inclusion in relation to
artificial intelligence (AI). The author leads a research group on
Digitalization and Robotization of Society at NTNU Norwegian
University of Science and Technology.
This book offers a comprehensive introduction to seven commonly
used image understanding techniques in modern information
technology. Readers of various levels can find suitable techniques
to solve their practical problems and discover the latest
development in these specific domains. The techniques covered
include camera model and calibration, stereo vision, generalized
matching, scene analysis and semantic interpretation, multi-sensor
image information fusion, content-based visual information
retrieval, and understanding spatial-temporal behavior. The book
provides aspects from the essential concepts overview and basic
principles to detailed introduction, explanation of the current
methods and their practical techniques. It also presents
discussions on the research trends and latest results in
conjunction with new development of technical methods. This is an
excellent read for those who do not have a subject background in
image technology but need to use these techniques to complete
specific tasks. These essential information will also be useful for
their further study in the relevant fields.
ISO/IEC 27701:2019: An introduction to privacy information
management offers a concise introduction to the Standard, aiding
those organisations looking to improve their privacy information
management regime, particularly where ISO/IEC 27701:2019 is
involved.
What do philosophy and computer science have in common? It turns
out, quite a lot! In providing an introduction to computer science
(using Python), Daniel Lim presents in this book key philosophical
issues, ranging from external world skepticism to the existence of
God to the problem of induction. These issues, and others, are
introduced through the use of critical computational concepts,
ranging from image manipulation to recursive programming to
elementary machine learning techniques. In illuminating some of the
overlapping conceptual spaces of computer science and philosophy,
Lim teaches the reader fundamental programming skills and also
allows her to develop the critical thinking skills essential for
examining some of the enduring questions of philosophy. Key
Features Teaches readers actual computer programming, not merely
ideas about computers Includes fun programming projects (like
digital image manipulation and Game of Life simulation), allowing
the reader to develop the ability to write larger computer programs
that require decomposition, abstraction, and algorithmic thinking
Uses computational concepts to introduce, clarify, and develop a
variety of philosophical issues Covers various aspects of machine
learning and relates them to philosophical issues involving science
and induction as well as to ethical issues Provides a framework to
critically analyze arguments in classic and contemporary
philosophical debates
This important new book explores contemporary concerns about the
protection of national security. It examines the role, influence,
and impact of Big Tech on politics, power, and individual rights.
The volume considers the manner in which digital technology and its
business models have shaped public policy and charts its future
course. In this vital text for legislators and policymakers, Andrea
Monti and Raymond Wacks draw on several case studies to analyse the
changing nature of national security and revisit the traditional
idea of the sovereignty of the State. They highlight some of the
limitations of the conventional understanding of public policy,
national security, and the rule of law to reveal the role of
digital technology as an enabler as well as discriminator in
governance and social disorder. Further, the chapters in the book
explore the tenuous balance between individual freedom and national
security; the key role of data protection in safeguarding digital
data; Big Tech's appropriation of national security policy; the
debate relating to datagathering technologies and encryption; and
offers an unsettling answer to the question 'what is a leak?' A
stimulating read, this key text will be of immense interest to
scholars of politics, cyberculture, and national security, as well
as to policy analysts, lawyers, and journalists.
In providing a theoretical framework for understanding human-
computer interaction as well as design of user interfaces, this
book combines elements of anthropology, psychology, cognitive
science, software engineering, and computer science. The framework
examines the everyday work practices of users when analyzing and
designing computer applications. The text advocates the unique
theory that computer application design is fundamentally a
collective activity in which the various practices of the
participants meet in a process of mutual learning.
The Construction of Truth in Contemporary Media Narratives about
Risk provides a theoretical framework for how, in a post-truth era,
media audiences are able to understand and navigate everyday risk.
The book examines media risk narratives and explores forms of
truth, experiential knowledge, and authority. Using the concept of
parrhesia to show how we invest trust in various types of knowledge
in a changing media environment, the book demonstrates how we
choose between expert and non-expert information when navigating a
seemingly risky world. It considers how news media formats have
previously engaged audiences through risk narratives and examines
how experiential knowledge has come to hold a valuable place for
individuals navigating what we are often told is an increasingly
risky and uncertain world. The book also examines the increasingly
precarious position of expert knowledge and examines how
contemporary truth-games play out between experts and non-experts,
and considers how this extends into the world of online and social
media. This book will be of interest to those researching or
teaching in the areas of criminology, sociology, media and cultural
studies, and of interest to readers in professional areas such as
journalism and politics.
Summary Explains in easy-to-understand terms what executives and
senior managers need to know and do about the ever-changing cyber
threat landscape. Gives strategic, business-focused guidance and
advice relevant to C-suite executives. Provides an effective and
efficient framework for managing cyber governance, risk and
compliance. Explains what is required to implement an effective
cyber security strategy. Description With high-profile cyber
attacks, data breaches and fines for GDPR (General Data Protection
Regulation) non-compliance hitting the headlines daily, businesses
must protect themselves and their reputations, while reassuring
stakeholders they take cyber security seriously. Cyber attacks are
becoming more sophisticated and prevalent, and the cost of data
breaches is soaring. In addition, new regulations and reporting
requirements make cyber security a critical business issue. Board
members and senior management must understand the threat landscape
and the strategies they can employ to establish, implement and
maintain effective cyber resilience throughout their organisation.
How Cyber Security Can Protect your Business - A guide for all
stakeholders provides an effective and efficient framework for
managing cyber governance, risk and compliance, which organisations
can adapt to meet their own risk appetite and synchronise with
their people, processes and technology. It explains what is meant
by governance, risk and compliance, how it applies to cyber
security and what is required to implement an effective cyber
security strategy. The pocket guide: Gives readers a greater
understanding of cyber governance, risk and compliance; Explains
what executives, senior managers and their advisors need to know
and do about the ever-changing cyber threat landscape; Provides
context as to why stakeholders need to be aware of and in control
of their organisation's cyber risk management and cyber incident
response; Gives guidance on building an appropriate and efficient
governance framework that enables organisations to demonstrate
their cyber approach in a non-technical, strategic,
business-focused way; Details an overview process to enable risk
assessment, assess existing defence mitigations and provide a
framework for developing suitable controls; and Includes a
checklist to help readers focus on their higher-priority cyber
areas. Suitable for all managers and executives, this pocket guide
will be of interest to non-cyber specialists, including
non-executive directors, who may be required to review cyber
arrangements. For cyber specialists, it provides an approach for
explaining cyber issues in non-jargonistic, business-based
language. Kick-start your journey to becoming cyber secure - buy
this pocket guide today!
Takes an interdisciplinary approach to contribute to the ongoing
development of human-AI interaction. Current debate and development
of AI is "algorithm-driven" or technical-oriented in lieu of
human-centered. At present, there is no systematic
interdisciplinary discussion to effectively deal with issues and
challenges arising from AI. This book offers critical analysis of
the logic and social implications of algorithmic processes.
Reporting from the processes of scientific research, the results
can be useful for understanding the relationship between algorithms
and humans, allowing AI designers to assess the quality of the
meaningful interactions with AI systems.
This book takes a holistic view of the roles of ICTs during the
pandemic through the lens of social informatics, as it is critical
to our understanding of the relations between society and
technology. Specific attention is given to various stakeholders and
social contexts, with analysis at the individual, group, community,
and society levels. Pushing the boundaries of information science
research with timely and critical research questions, this edited
volume showcases information science research in the context of
COVID-19, by specifically accentuating sociotechnical practices,
activities, and ICT interventions during the pandemic. Its social
informatics focus appeals to a broad audience, and its global and
international orientation provides a timely, innovative, and
much-needed perspective to information science. This book is unique
in its interdisciplinary nature as it consists of research studies
on the intersections between ICTs and health, culture, social
interaction, civic engagement, information dissemination, work, and
education. Chapters apply a range of research methods, including
questionnaire surveys, content analyses, and case studies from
countries in Asia, Europe, and America, as well as global and
international comparisons. The book's primary target audience
includes scholars and students in information and library science,
particularly those interested in the social aspect of the
information society. It may be of interest to information
professionals, library practitioners, educators, and information
policymakers, as well as scholars and students in science and
technology studies, cultural studies, political science, public
administration, sociology, and communication studies.
Explore straightforward drawing skills to help you communicate
product ideas exponentially faster than you could with text In
Drawing Product Ideas: Fast and Easy UX Drawing for Anyone, RSA
Fellow and Google Data Visualization Lead, Kent Eisenhuth delivers
a new and exciting guide to effectively communicating product ideas
by drawing just two simple things: boxes and lines! In the book,
you'll learn why drawing is important and how it supports the
design thinking process. You'll also discover how to build your
drawing toolkit by exploring your own personal drawing style. The
author also includes: Strategies for how to use your drawing to
support your solutions to real-world problems Tips and tricks for
applying your new drawing skills in a workshop setting, in
real-time An illuminating foreword by the celebrated Manuel Lima, a
Fellow of the Royal Society of Arts An essential volume for
engineers, researchers, and product managers, Drawing Product Ideas
is also an indispensable blueprint for anyone seeking to improve
their public, ad-hoc drawing skills.
* Targests readers with a background in programming, interested in
an introduction/refresher in statistical hypothesis testing * Uses
Python throughout * Provides the reader with the opportunity of
using the book whenever needed rather than following a sequential
path.
Digital Approaches to Inclusion and Participation in Cultural
Heritage brings together best examples and practices of digital and
interactive approaches and platforms from a number of projects
based in European countries to foster social inclusion and
participation in heritage and culture. It engages with ongoing
debates on the role of culture and heritage in contemporary society
relating to inclusion and exclusion, openness, access, and
bottom-up participation. The contributions address key themes such
as the engagement of marginalised communities, the opening of
debates and new interpretations around socially and historically
contested heritages, and the way in which digital technologies may
foster more inclusive cultural heritage practices. They will also
showcase examples of work that can inspire reflection, further
research, and also practice for readers such as practice-focused
researchers in both HCI and design. Indeed, as well as
consolidating the achievements of researchers, the contributions
also represent concrete approaches to digital heritage innovation
for social inclusion purposes. The book's primary audience is
academics, researchers, and students in the fields of cultural
heritage, digital heritage, human-computer interaction, digital
humanities, and digital media, as well as practitioners in the
cultural sector.
Focused on the latest mobile technologies, this book addresses
specific features (such as IoT) and their adoptions that aim to
enable excellence in business in Industry 4.0. Furthermore, this
book explores how the adoption of these technologies is related to
rising concerns about privacy and trusted communication issues that
concern management and leaders of business organizations. Managing
IoT and Mobile Technologies with Innovation, Trust, and Sustainable
Computing not only targets IT experts and drills down on the
technical issues but also provides readers from various groups with
a well-linked concept about how the latest trends of mobile
technologies are closely related to daily living and the workplace
at managerial and even individual levels.
A landmark history that traces the creation, management, and
sharing of information through six centuries Thanks to modern
technological advances, we now enjoy seemingly unlimited access to
information. Yet how did information become so central to our
everyday lives, and how did its processing and storage make our
data-driven era possible? This volume is the first to consider
these questions in comprehensive detail, tracing the global
emergence of information practices, technologies, and more, from
the premodern era to the present. With entries spanning archivists
to algorithms and scribes to surveilling, this is the ultimate
reference on how information has shaped and been shaped by
societies. Written by an international team of experts, the book's
inspired and original long- and short-form contributions
reconstruct the rise of human approaches to creating, managing, and
sharing facts and knowledge. Thirteen full-length chapters discuss
the role of information in pivotal epochs and regions, with chief
emphasis on Europe and North America, but also substantive
treatment of other parts of the world as well as current global
interconnections. More than 100 alphabetical entries follow,
focusing on specific tools, methods, and concepts-from ancient
coins to the office memo, and censorship to plagiarism. The result
is a wide-ranging, deeply immersive collection that will appeal to
anyone drawn to the story behind our modern mania for an informed
existence. Tells the story of information's rise from 1450 through
to today Covers a range of eras and regions, including the medieval
Islamic world, late imperial East Asia, early modern and modern
Europe, and modern North America Includes 100 concise articles on
wide-ranging topics: Concepts: data, intellectual property, privacy
Formats and genres: books, databases, maps, newspapers, scrolls and
rolls, social media People: archivists, diplomats and spies,
readers, secretaries, teachers Practices: censorship, forecasting,
learning, political reporting, translating Processes: digitization,
quantification, storage and search Systems: bureaucracy, platforms,
telecommunications Technologies: cameras, computers, lithography
Provides an informative glossary, suggested further reading (a
short bibliography accompanies each entry), and a detailed index
Written by an international team of notable contributors, including
Jeremy Adelman, Lorraine Daston, Devin Fitzgerald, John-Paul
Ghobrial, Lisa Gitelman, Earle Havens, Randolph C. Head, Niv
Horesh, Sarah Igo, Richard R. John, Lauren Kassell, Pamela Long,
Erin McGuirl, David McKitterick, Elias Muhanna, Thomas S. Mullaney,
Carla Nappi, Craig Robertson, Daniel Rosenberg, Neil Safier, Haun
Saussy, Will Slauter, Jacob Soll, Heidi Tworek, Siva Vaidhyanathan,
Alexandra Walsham, and many more.
This book introduces the basics in game usability and overall game
UX mindset and techniques, as well as looking at current industry
best practices and trends. Fully updated for its second edition, it
includes practical advice on how to include usability in already
tight development timelines, and how to advocate for UX and
communicate results to higher-ups effectively. The book begins with
an introduction to UX strategy considerations for games, and to UX
design, before moving on to cover core user research and usability
techniques as well as how to fit UX practices into the business
process. It provides considerations of player differences and
offers strategies for inclusion as well as chapters that give
platform and context specific advice. With a wealth of new
interviews with industry leaders and contributions from the very
best in game UX, the book also includes brand new chapters on:
Accessibility Mobile Game Usability Data Science Virtual and
Augmented Reality Esports This book will be vital reading for all
professional game developers and game UX advocates, as well as
those students aspiring to work in game development and game UX.
Understand the CCPA (California Consumer Privacy Act) and how to
implement strategies to comply with this privacy regulation.
Established in June 2018, the CCPA was created to remedy the lack
of comprehensive privacy regulation in the state of California.
When it comes into effect on January 1, 2020, the CCPA will give
California residents the right to: Learn what personal data a
business has collected about them Understand who this data has been
disclosed to Find out whether their personal data has been sold to
third parties, and who these third parties are Opt-out of such data
transactions, or request that the data be deleted. Many
organizations that do business in the state of California must
align to the provisions of the CCPA. Much like the EU's GDPR
(General Data Protection Regulation), businesses that fail to
comply with the CCPA will face economic penalties. Prepare your
business for CCPA compliance with our implementation guide that:
Provides the reader with a comprehensive understanding of the
legislation by explaining key terms Explains how a business can
implement strategies to comply with the CCPA Discusses potential
developments of the CCPA to further aid compliance Your guide to
understanding the CCPA and how you can implement a strategy to
comply with this legislation - buy this book today to get the
guidance you need! About the author Preston Bukaty is an attorney
and consultant. He specializes in data privacy GRC projects, from
data inventory audits to gap analyses, contract management, and
remediation planning. His compliance background and experience
operationalizing compliance in a variety of industries give him a
strong understanding of the legal issues presented by international
regulatory frameworks. Having conducted more than 3,000 data
mapping audits, he also understands the practical realities of
project management in operationalizing compliance initiatives.
Preston's legal experience and enthusiasm for technology make him
uniquely suited to understanding the business impact of privacy
regulations such as the GDPR and the CCPA. He has advised more than
250 organizations engaged in businesses as varied as SaaS
platforms, mobile geolocation applications, GNSS/telematics tools,
financial institutions, fleet management software,
architectural/engineering design systems, and web hosting. He also
teaches certification courses on GDPR compliance and ISO 27001
implementation, and writes on data privacy law topics. Preston
lives in Denver, Colorado. Prior to working as a data privacy
consultant, he worked for an international GPS software company,
advising business areas on compliance issues across 140 countries.
Preston holds a juris doctorate from the University of Kansas
School of Law, along with a basketball signed by Hall of Fame coach
Bill Self.
A heterogeneous network is a network which connects computers and
other devices with different operating systems, protocols, or
access technologies. By definition, managing heterogenous networks
is more difficult that homogenous networks. Confidentiality,
integrity, availability (CIA) remain the foundation of security.
This book sheds light upon security threats, defenses, and
remediation on various networking and data processing domains,
including wired networks, wireless networks, mobile ad-hoc
networks, wireless sensor networks, and social networks through the
prisms of confidentiality, integrity, availability, authentication,
and access control. The book is broken into different chapters that
explore central subjects and themes in the development of the
heterogenous networks we see today. The chapters look at: Access
control methods in cloud-enabled Internet of Things Secure routing
algorithms for mobile ad-hoc networks Building security trust in
mobile ad-hoc networks using soft computing methods The use and
development of Blockchain technology, with a particular focus on
the nonce-free hash generation in Blockchain Password
authentication and keystroke biometrics Health care data analytics
over Big Data Bluetooth: and its open issues for managing security
services in heterogenous networks Managing Security Services in
Heterogenous Networks will be a valuable resource for a whole host
of undergraduate and postgraduate students studying related topics,
as well as career professionals who have to effectively manage
heterogenous networks in the workplace.
AI's impact on human societies is and will be drastic in so many
ways. AI is being adopted and implemented around the world, and
government and universities are investing in AI studies, research,
and development. However, very little research exists about the
impact of AI on our lives. This book will address this gap; it will
gather reflections from around the world to assess the impact of AI
on different aspects of society as well as propose ways in which we
can address this impact and the research agendas needed.
This book deals with how to measure innovation in crisis
management, drawing on data, case studies, and lessons learnt from
different European countries. The aim of this book is to tackle
innovation in crisis management through lessons learnt and
experiences gained from the implementation of mixed methods through
a practitioner-driven approach in a large-scale demonstration
project (DRIVER+). It explores innovation from the perspective of
the end-users by focusing on the needs and problems they are trying
to address through a tool (be it an app, a drone, or a training
program) and takes a deep dive into what is needed to understand if
and to what extent the tool they have in mind can really bring
innovation. This book is a toolkit for readers interested in
understanding what needs to be in place to measure innovation: it
provides the know-how through examples and best practices. The book
will be a valuable source of knowledge for scientists,
practitioners, researchers, and postgraduate students studying
safety, crisis management, and innovation.
|
|