![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing
This book aims to serve as a multidisciplinary forum covering technical, pedagogical, organizational, instructional, as well as policy aspects of ICT in Education and e-Learning. Special emphasis is given to applied research relevant to educational practice guided by the educational realities in schools, colleges, universities and informal learning organizations. In a more generic scope, the volume aims to encompass current trends and issues determining ICT integration in practice, including learning and teaching, curriculum and instructional design, learning media and environments, teacher education and professional development, assessment and evaluation, etc.
As technology expands and evolves, one-dimensional, graphical user
interface (GUI) design becomes increasingly limiting and
simplistic. Designers must meet the challenge of developing new and
creative interfaces that adapt to meet human needs and
technological trends. HCI Beyond the GUI provides designers with
this know how by exploring new ways to reach users that involve all
of the human senses. Dr. Kortum gathers contributions from leading
human factors designers to present a single reference for
professionals, researchers, and students.
Electronic commerce is big business, and it is getting bigger: it now accounts for 7.5 percent of all retail sales in the US, and continues to expand at double-digit annual rates. The steady growth of Internet commerce over the past twenty years has given rise to a host of new legal issues in a broad range of fields. This authoritative Research Handbook comprises chapters by leading scholars which will provide a solid foundation for newcomers to the subject and also offer exciting new insights that will further the understanding of e-commerce experts. Key topics covered include: contracting, payments, intellectual property, extraterritorial enforcement, alternative dispute resolution, social media, consumer protection, network neutrality, online gambling, domain name governance and privacy. With the rise of Internet commerce, this book will be an invaluable resource for business lawyers as well as legal scholars with an interest in any phase of e-commerce law. Contributors include: A. Bridy, N.R. Cahn, I. Calbol, M.W. Carroll, C.M. Hayes, S.J. Hughes, A. Katz, J.P. Kesan, N.S. Kim, C.L. Kunz, A.R. Levinson, D. Lindsay, C. Markou, S.T. Middlebrook, J. Moringiello, E.A. Morse, J.P. Nehf, C. Riefa, S.E. Rolland, J.A. Rothchild, A.J. Schmitz, D.J. Shakow, S.B. Spencer, H. Travis, M. Trimble, A. Vranaki, S. Walsh, J. Winn
Information and communication technology (ICT) innovations provide significant implications for business and socioeconomic development due to the role it plays in the diffusion of knowledge sharing, community development, and equality. E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development provides comprehensive coverage and definitions of the most important issues, concepts, trends, and technologies related to the adoption, diffusion, and adaptation of national electronic strategies for ICTs in socioeconomic development. This book addresses the importance of such strategies as setting national agendas to complement efforts and resources allocated, as well as includes model strategies, implications, and case studies to work as models for future implementations.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives
Smart healthcare systems, made up of advanced wearable devices, internet of things (IoT) technologies and mobile internet connectivity, allow significant medical information to be easily and regularly transmitted over public networks. Personal patient information and clinical records are stored on hospitals and healthcare centres and can be accessed remotely by healthcare workers. Due to the widespread increase in the sheer volume of medical data being collected and created all the time, it has never been more important to ensure that such information is collected, stored and processed in a reliable and secure manner. This edited book covers the recent trends in the field of medical information processing, including prediction of complications using machine learning and trends in visualization and image analysis. Further chapters focus on information security and privacy solutions for smart healthcare applications, including encryption of medical information, privacy in smart IoT environments, medical image watermarking and secure communication systems. Medical Information Processing and Security: Techniques and applications can be used as a reference book for practicing engineers, researchers and scientists. It will also be useful for senior undergraduate and graduate students, and practitioners from government and industry as well as healthcare technology professionals working on state-of-the-art security solutions for smart healthcare applications.
Big data analytics utilizes a wide range of software and analytical tools to provide immediate, relevant information for efficient decision-making. Companies are recognizing the immense potential of BDA, but ensuring the data is appropriate and error-free is the largest hurdle in implementing BDA applications. The Handbook of Research on Organizational Transformations through Big Data Analytics not only catalogues the existing platforms and technologies, it explores new trends within the field of big data analytics (BDA). Containing new and existing research materials and insights on the various approaches to BDA; this publication is intended for researchers, IT professionals, and CIOs interested in the best ways to implement BDA applications and technologies.
Virtual communities have gained popularity in many growing fields and have continued to expand into healthcare environments. Analyzing the impact these communities have can help provide more effective methods to support patients and community members. Novel Applications of Virtual Communities in Healthcare Settings is a crucial scholarly reference source that examines the challenges virtual communities can face, as well as the advantages they provide to members of healthcare organizations. Featuring pertinent topics that include evaluation frameworks, disaster management, knowledge translation, and user engagement, this book is ideal for medical practitioners, academicians, students, and healthcare researchers that are interested in taking part in the latest discussions of virtual communities within medical fields.
As the cliche reminds us, information is power. In this age of
computer systems and technology, an increasing majority of the
world's information is stored electronically. It makes sense then
that as an industry we rely on high-tech electronic protection
systems to guard that information. As a professional hacker, I get
paid to uncover weaknesses in those systems and exploit them.
Whether breaking into buildings or slipping past industrial-grade
firewalls, my goal has always been the same: extract the
informational secrets using any means necessary. After hundreds of
jobs, I discovered the secret to bypassing every conceivable
high-tech security system. This book reveals those secrets, and as
the title suggests, it has nothing to do with high technology. As
it turns out, the secret isn't much of a secret at all. Hackers
have known about these techniques for years. Presented in a light,
accessible style, you'll get to ride shotgun with the authors on
successful real-world break-ins as they share photos, videos and
stories that prove how vulnerable the high-tech world is to no-tech
attacks.
Advances in communication technologies have created an overabundance of available information and knowledge to people in contemporary society. Consequently, it has become pivotal to develop new approaches for information processing and understanding. Information and Communication Overload in the Digital Age is a comprehensive reference source for the latest scholarly material on the increased amount of information created by evolving technologies, examining creative methods for improved control of information overload. Focusing on theoretical and experimental topics, such as media consumption, media literacy, and business applications, this book is ideally designed for researchers, practitioners, academics, graduate students, and professionals seeking emerging perspectives on information and communication management.
Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology. This book explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication. It examines media practices and privacy frameworks in the fields of copyright, digital management and genetic information. New models of data protection are proposed along with their advantages and disadvantages.
With complex stories and stunning visuals eliciting intense emotional responses, coupled with opportunities for self-expression and problem solving, video games are a powerful medium to foster empathy, critical thinking, and creativity in players. As these games grow in popularity, ambition, and technological prowess, they become a legitimate art form, shedding old attitudes and misconceptions along the way. Examining the Evolution of Gaming and Its Impact on Social, Cultural, and Political Perspectives asks whether videogames have the power to transform a player and his or her beliefs from a sociopolitical perspective. Unlike traditional forms of storytelling, videogames allow users to immerse themselves in new worlds, situations, and politics. This publication surveys the landscape of videogames and analyzes the emergent gaming that shifts the definition and cultural effects of videogames. This book is a valuable resource to game designers and developers, sociologists, students of gaming, and researchers in relevant fields.
The new generation of internet technologies and web applications is seeing a growth in social software and networking, as well as other communications tools. This infrastructure of social interaction and collaboration has provided an increase in more dynamic user participation and expertise in knowledge of contents and facts traditionally only held by experts.Social Software and the Evolution of User Expertise: Future Trends in Knowledge Creation and Dissemination examines the vital role that social software applications play in regards to the cultural definitions of experts and challenges the reader to consider how recent changes in this area influence how we create and distribute knowledge. This collection brings together scholars and practitioners from various disciplines and professions to project a new kind of thinking about the understanding of the major changes in many professions.
Book DescriptionHow will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level machine intelligence? What should we be concerned about as artificial intelligence advances? Architects of Intelligence contains a series of in-depth, one-to-one interviews where New York Times bestselling author, Martin Ford, uncovers the truth behind these questions from some of the brightest minds in the Artificial Intelligence community. Martin has wide-ranging conversations with twenty-three of the world's foremost researchers and entrepreneurs working in AI and robotics: Demis Hassabis (DeepMind), Ray Kurzweil (Google), Geoffrey Hinton (Univ. of Toronto and Google), Rodney Brooks (Rethink Robotics), Yann LeCun (Facebook) , Fei-Fei Li (Stanford and Google), Yoshua Bengio (Univ. of Montreal), Andrew Ng (AI Fund), Daphne Koller (Stanford), Stuart Russell (UC Berkeley), Nick Bostrom (Univ. of Oxford), Barbara Grosz (Harvard), David Ferrucci (Elemental Cognition), James Manyika (McKinsey), Judea Pearl (UCLA), Josh Tenenbaum (MIT), Rana el Kaliouby (Affectiva), Daniela Rus (MIT), Jeff Dean (Google), Cynthia Breazeal (MIT), Oren Etzioni (Allen Institute for AI), Gary Marcus (NYU), and Bryan Johnson (Kernel). Martin Ford is a prominent futurist, and author of Financial Times Business Book of the Year, Rise of the Robots. He speaks at conferences and companies around the world on what AI and automation might mean for the future.
'Computer-Mediated Relationships and Trust' examines how building trust is different for managers developing 'virtual' (i.e. computer mediated) relationships.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
Control Applications for Biomedical Engineering Systems presents different control engineering and modeling applications in the biomedical field. It is intended for senior undergraduate or graduate students in both control engineering and biomedical engineering programs. For control engineering students, it presents the application of various techniques already learned in theoretical lectures in the biomedical arena. For biomedical engineering students, it presents solutions to various problems in the field using methods commonly used by control engineers.
Intended for both the student and the practitioner, this is the
first user-centered design casebook. It follows the Harvard Case
study method, where the reader is placed in the role of the
decision-maker in a real-life professional situation. In this book,
the reader is asked to perform analysis of dozens of UCD work
situations and propose solutions for the problem set.
Education and research in the field of humanside information technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on the Human Side of Information Technology supplements course instruction and student research with quality chapters focused on key issues concerning the behavioral and social aspects of information technology. Containing over 30 chapters from authors across the globe, these selected readings in areas such as user behavior, human computer interaction, and social computing depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.
This publication contributes to the serious games field by investigating original contributions and methods that use serious games in various domains. This comprehensive and timely publication works as an essential reference source, building on the available literature in the field of Serious Games for the economic and social development of countries while providing for further research opportunities in this dynamic and growing field. Thus, the book provides the opportunity for a reflection on this important issue, increasing the understanding of the importance of Serious Games in the context of organizations' improvements, providing relevant academic work, empirical research findings, and an overview of this relevant field of study. This text provides the resources necessary for policy makers, technology developers and managers to adopt and implement solutions for a more digital era.
We are in an ever-changing and fast-paced world that is entrenched in technological innovation. But how is technology and science impacting our society? How does it affect our interactions with these products and ultimately with each other? How is society shaping the types of technologies we are advancing? Critical Issues Impacting Science, Technology, Society (STS) and Our Future compiles theory and research from the confluence of a variety of disciplines to discuss how scientific research and technological innovation is shaping society, politics, and culture, and predicts what can be expected in the future. While highlighting topics including political engagement, artificial intelligence, and wearable technology, this book is ideally designed for policymakers, government officials, business managers, computer engineers, IT specialists, scientists, and professionals and researchers in the science, technology, and humanities fields.
The use of multimodality combined with mobile devices allows a simple, intuitive communication approach and generates new and pervasive services for users. ""Multimodal Human Computer Interaction and Pervasive Services"" provides theoretical and practical concepts, methodologies, and applications used to design and develop multimodal systems. Collecting cutting-edge research by international experts, this Premier Reference Source addresses the many challenges of multimodal systems with a particular focus on mobile devices. Topics covered in this title include: amibuity management in multimodal systems; analyzing multimodal interaction; mobile virtual blackboard; multimodal human computer interaction; multimodal input fusion strategies; multimodal language processor; multimodal user interface; pervasive services; technology acceptance models; and, usability evaluation of multimodal interfaces. |
You may like...
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter
Paperback
Brain Machine Interfaces for Space…
Luca Rossini, Dario Izzo
Hardcover
R4,841
Discovery Miles 48 410
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, …
Hardcover
R3,569
Discovery Miles 35 690
|