![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Due to the prevalence of social network service and social media, the problem of cyberbullying has risen to the forefront as a major social issue over the last decade. Internet hate, harassment, cyberstalking, cyberbullying-these terms, which were almost unknown 10 years ago-are in the everyday lexicon of all internet users. Unfortunately, it is becoming increasingly difficult to undertake continuous surveillance of websites as new ones are appearing daily. Methods for automatic detection and mitigation for online bullying have become necessary in order to protect the online user experience. Automatic Cyberbullying Detection: Emerging Research and Opportunities provides innovative insights into online bullying and methods of early identification, mitigation, and prevention of harassing speech and activity. Explanations and reasoning for each of these applied methods are provided as well as their pros and cons when applied to the language of online bullying. Also included are some generalizations of cyberbullying as a phenomenon and how to approach the problem from a practical technology-backed point of view. The content within this publication represents the work of deep learning, language modeling, and web mining. It is designed for academicians, social media moderators, IT consultants, programmers, education administrators, researchers, and professionals and covers topics centered on identification methods and mitigation of internet hate and online harassment.
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
With complex stories and stunning visuals eliciting intense emotional responses, coupled with opportunities for self-expression and problem solving, video games are a powerful medium to foster empathy, critical thinking, and creativity in players. As these games grow in popularity, ambition, and technological prowess, they become a legitimate art form, shedding old attitudes and misconceptions along the way. Examining the Evolution of Gaming and Its Impact on Social, Cultural, and Political Perspectives asks whether videogames have the power to transform a player and his or her beliefs from a sociopolitical perspective. Unlike traditional forms of storytelling, videogames allow users to immerse themselves in new worlds, situations, and politics. This publication surveys the landscape of videogames and analyzes the emergent gaming that shifts the definition and cultural effects of videogames. This book is a valuable resource to game designers and developers, sociologists, students of gaming, and researchers in relevant fields.
Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
This insightful book presents a radical rethinking of the relationship between law, regulation, and technology. While in traditional legal thinking technology is neither of particular interest nor concern, this book treats modern technologies as doubly significant, both as major targets for regulation and as potential tools to be used for legal and regulatory purposes. It explores whether our institutions for engaging with new technologies are fit for purpose. Having depicted a legal landscape that includes legal rules and principles, regulatory frameworks, technical measures and technological governance, this thought-provoking book presents further exercises in rethinking. These exercises confront communities with a fundamental question about how they are to be governed-by humans using rules or by technical measures and technological management? Chapters rethink the traditional arguments relating to legality, the rule of law, legitimacy, regulatory practice, dispute resolution, crime and control, and authority and respect for law. Examining the role of lawyers and law schools in an age of governance by smart technologies, Rethinking Law, Regulation, and Technology will be a key resource for students and scholars of law and technology, digital innovation and regulation and the law.
This volume highlights current research and developments on organizations and (their) performance against the background of ubiquitous complexity. It investigates some of the challenges and trends dominating the complex world of nowadays and the ways organizations are dealing with them in their continuous search for performance. The papers in the volume cover a series of hot and/or emerging topics (i.e. sustainable development, corporate social responsibility, green marketing, digital revolution, social media, global trade, intangible assets, economic intelligence and innovation). Built on an interdisciplinary perspective and a multi-level approach global (trade, power, sustainable development), regional (EU, BRICS), national (country-based systems, cultures, policies, practices), industry (airlines, pharma, luxury, retailing, banking, tourism), local (communities, destinations), and organization (entrepreneurship, MNEs, public organizations: national and local) the volume uniquely addresses issues of high interest for researchers, practitioners and policymakers.
The use of multimodality combined with mobile devices allows a simple, intuitive communication approach and generates new and pervasive services for users. ""Multimodal Human Computer Interaction and Pervasive Services"" provides theoretical and practical concepts, methodologies, and applications used to design and develop multimodal systems. Collecting cutting-edge research by international experts, this Premier Reference Source addresses the many challenges of multimodal systems with a particular focus on mobile devices. Topics covered in this title include: amibuity management in multimodal systems; analyzing multimodal interaction; mobile virtual blackboard; multimodal human computer interaction; multimodal input fusion strategies; multimodal language processor; multimodal user interface; pervasive services; technology acceptance models; and, usability evaluation of multimodal interfaces.
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.
Exploring how technological apparatuses "capture" invisible worlds, this book looks at how spirits, UFOs, discarnate entities, spectral energies, atmospheric forces and particles are mattered into existence by human minds. Technological and scientific discourse has always been central to the nineteenth- and early twentieth-century spiritualist quest for legitimacy, but as this book shows, machines, people, and invisible beings are much more ontologically entangled in their definitions and constitution than we would expect. The book shows this entanglement through a series of contemporary case studies where the realm of the invisible arises through technological engagement, and where the paranormal intertwines with modern technology.
'Information Technology and Economic Development' looks at the effect of information technology on fields such as politics, education, sociology and technology.
Education and research in the field of humanside information technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on the Human Side of Information Technology supplements course instruction and student research with quality chapters focused on key issues concerning the behavioral and social aspects of information technology. Containing over 30 chapters from authors across the globe, these selected readings in areas such as user behavior, human computer interaction, and social computing depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
Community Informatics: Enabling Communities with Information and Communications Technologies provides an introduction to the community use of information and communications technologies, an overview of the various areas in which ICT is impacting local development and a set of case studies of CI.
In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker. Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran
Social media platforms have emerged as an influential and popular tool in the digital era. No longer limited to just personal use, the applications of social media have expanded in recent years into the business realm. Analyzing the Strategic Role of Social Networking in Firm Growth and Productivity examines the role of social media technology in organizational settings to promote business development and growth. Highlighting a range of relevant discussions from the public and private sectors, this book is a pivotal reference source for professionals, researchers, upper-level students, and academicians.
Technology has become ubiquitous to everyday life in modern society, and particularly in various social aspects. This has significant impacts on adolescents as they develop and make their way into adulthood. Identity, Sexuality, and Relationships among Emerging Adults in the Digital Age is a pivotal reference source for the latest research on the role of digital media and its impact on identity development, behavioral formations, and the inter-personal relationships of young adults. Featuring extensive coverage across a range of relevant perspectives and topics, such as self-comparison, virtual communities, and online dating, this book is ideally designed for academicians, researchers and professionals seeking current research on the use and impact of online social forums among progressing adults.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
Social Media: Principles and Applications examines social media in interpersonal, mass-mediated, educational, organizational, and political settings. Social media technologies take on many different forms, including social network sites like Facebook and Twitter, blogs, wikis, online video and photo-sharing sites (e.g., Pinterest), rating and social bookmarking sites, and video/text chatting sites (e.g., Skype). Beginning with the principles of social media, Sheldon disassembles applications of social media in a variety of settings to understand who is using social media, how they develop meaningful relationships, and how they use social media during major events. Sheldon also delves into the political, educational, commercial, and privacy issues of social media use, making this an excellent resource for communication, psychology, and social media scholars.
The transformative impacts of digitalization on society are visible both within nation states and across borders. Information and communication technologies are typically considered beneficial for democracy. Nevertheless, this book explores the challenges that technology brings to democracy, and in so doing advances our understanding of this crucial digital, social and political phenomenon. It contributes to the broader discussion of the relationship between international, national and sub-national norms, institutions and actors in an increasingly connected world. Insightful and current, this book offers a wide variety of perspectives in an area where there is still not yet an extensive body of research. It considers, for example: the extent to which new forms of digital political engagement change traditional democratic decision-making; how receptive national governments and authorities are to digital democratic movements; how governments can uphold the values of democratic society while also ensuring flexibility with regard to the private sector; and how we should judge these developments in light of the cross-border effects of digitalization. Understanding the influence of digitalization on democracy is crucial. As such, this book will appeal to a broad audience including, but not limited to, social scientists, policy makers, legal researchers, NGOs, governments, students and lawyers. Contributors include: M. Adams, A. Banerjee, E. Bayamlioglu, C.L. Blake, J. Cudmore, C. Cuijpers, A. Dumas, C.R. Farina, M.-J. Garot, T. Gylfason, H.L. Kong, E.A. Lazzari, P.L. Lindseth, N. Luka, A. Meuwese, L.F.M. Moncau, C. Nam, M. Newhart, U. Pagallo, I. Pernice, C. Prins, R. Radu, M.S.G. Rosina, R. Weill, K. van Aeken, B. Zhao, N. Zingales
This book offer clear descriptions of the basic structure for the recognition and classification of human activities using different types of sensor module and smart devices in e.g. healthcare, education, monitoring the elderly, daily human behavior, and fitness monitoring. In addition, the complexities, challenges, and design issues involved in data collection, processing, and other fundamental stages along with datasets, methods, etc., are discussed in detail. The book offers a valuable resource for readers in the fields of pattern recognition, human-computer interaction, and the Internet of Things.
This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Social, casual and mobile games, played on devices such as smartphones, tablets, or PCs and accessed through online social networks, have become extremely popular, and are changing the ways in which games are designed, understood, and played. These games have sparked a revolution as more people from a broader demographic than ever play games, shifting the stereotype of gaming away from that of hardcore, dedicated play to that of activities that fit into everyday life. Social, Casual and Mobile Games explores the rapidly changing gaming landscape and discusses the ludic, methodological, theoretical, economic, social and cultural challenges that these changes invoke. With chapters discussing locative games, the new freemium economic model, and gamer demographics, as well as close studies of specific games (including Candy Crush Saga, Angry Birds, and Ingress), this collection offers an insight into the changing nature of games and the impact that mobile media is having upon individuals and societies around the world. |
![]() ![]() You may like...
Mathematical Statistics with…
William Mendenhall, Dennis Wackerly, …
Paperback
Applied Informatics for Industry 4.0
Nazmul Siddique, Mohammad Shamsul Arefin, …
Hardcover
R2,981
Discovery Miles 29 810
Proceedings of the 2020 DigitalFUTURES…
Philip F. Yuan, Jiawei Yao, …
Hardcover
R1,708
Discovery Miles 17 080
|