0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (391)
  • R250 - R500 (1,129)
  • R500+ (11,331)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Digital Innovation for Pandemics - Concepts, Challenges, Constraints, and Opportunities (Hardcover): Jasleen Kaur, Navjot Sidhu Digital Innovation for Pandemics - Concepts, Challenges, Constraints, and Opportunities (Hardcover)
Jasleen Kaur, Navjot Sidhu
R3,399 Discovery Miles 33 990 Ships in 12 - 17 working days

A pandemic does not only bring health concerns for society but also significantly affects individuals and government and business operations. Recently, COVID-19 has substantially hampered conventional businesses and organizations worldwide. Digital technology can help achieve business continuity and overcome challenges caused by pandemic situations. Digital innovation is the application of digital technology to existing business problems. Ideas such as digital transformation and digitization are closely related to digital innovation. In this pandemic period, many businesses recognize that they need to transform, innovate, and adopt new technologies to stay competitive. However, digital transformation is an inherently complex process, and the time pressure to adopt quickly may result in further complexities for organizations in fostering digital technologies. Digital Innovations for Pandemics: Concepts, Challenges, Constraints, and Opportunities presents the potential of digital responses to the COVID-19 pandemic. It explores new digital concepts for learning and teaching, provides an overview of organizational responses to the crisis through digital technologies, and examines digital solutions developed to manage the crisis. Examining how information systems researchers can contribute to these global efforts, this book seeks to showcase how consumers, citizens, entrepreneurs, organizations, institutions, and governments are leveraging new and emerging digital innovations to disrupt and transform value creation in the pandemic era. It captures the breadth of digital innovations carried out to handle the pandemic and looks at the use of digital technologies to strengthen various processes. The book features the following: Solutions on how digital technologies enable responses to a global crisis An analysis of information systems used during the management of the COVID-19 pandemic New concepts for digital business and innovative content models for different sectors This book is written for advanced undergraduate students, postgraduate students, researchers, and scholars in the field of digital business, education, and healthcare. It includes theoretical chapters and case studies from leading scholars and practitioners on the technology-adoption practices of non-government organizations (NGOs), government, and business.

Data Publics - Public Plurality in an Era of Data Determinacy (Paperback): Peter Moertenboeck, Helge Mooshammer Data Publics - Public Plurality in an Era of Data Determinacy (Paperback)
Peter Moertenboeck, Helge Mooshammer
R1,266 Discovery Miles 12 660 Ships in 12 - 17 working days

Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,444 Discovery Miles 44 440 Ships in 12 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,499 Discovery Miles 54 990 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover): Adam Henschke Ethics in an Age of Surveillance - Personal Information and Virtual Identities (Hardcover)
Adam Henschke
R2,970 Discovery Miles 29 700 Ships in 12 - 17 working days

People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to designing surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.

Cyberpredators and Their Prey (Hardcover): Lauren R Shapiro Cyberpredators and Their Prey (Hardcover)
Lauren R Shapiro
R3,269 Discovery Miles 32 690 Ships in 12 - 17 working days

Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets

Digitalization - Contexts, Roles, and Outcomes (Hardcover): Sergey V. Samoilenko Digitalization - Contexts, Roles, and Outcomes (Hardcover)
Sergey V. Samoilenko
R3,095 Discovery Miles 30 950 Ships in 12 - 17 working days

Conceptually, as well as practically, digitalization is similar to the implementation of a modern computation model - the model may be a centralized setup using a mainframe or it may be extended to an N-tier architecture. Regardless of the specifics of the implementation, however, the conceptual model of data processing remains the same. Digitalization is nothing but a system relying on digital technologies to create, conduct and, potentially, expand a business activity of some sort. Digitalization can be used to create an e-commerce model for a small business or to create a global supply and distribution chain geared toward almost any kind of a business. It could also be used for non-profit purposes, such as on-line education and telemedicine or e-government. Digitalization: Contexts, Roles, and Outcomes is a contemplation and analysis of the socio-technical system that is known as digitalization. It considers the context of digitalization as well as the ways by which digitalization offers value to the context within which it operates. This book aims to offer readers an entry point to a path of inquiry into the different aspects of digitalization. The goal is to identify main directions for further inquiry as well as to outline the most obvious obstacles along the way. The book aims to guide readers on their own unique journeys using the basic ideas, principles, and concepts synthesized, developed, and presented in the book. It is beneficial to both practitioners and researchers. The book covers: The functionality of digitalization The significance of digitalization Identifying the context of digitalization Designing a control system A cognitive model for the theory of digitalization Designing a theory of digitalization The book helps readers to consider the subject of digitalization in a rigorous and rational way so their own perspectives can emerge stronger and be substantiated and reinforced by building an argument vis-a-vis perspectives and points examined in this book.

Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover): Tan Yigitcanlar, Nayomi Kankanamge Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover)
Tan Yigitcanlar, Nayomi Kankanamge
R3,112 Discovery Miles 31 120 Ships in 12 - 17 working days

The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.

The Web Accessibility Project - Development and Testing Best Practices (Hardcover): Narayanan Palani The Web Accessibility Project - Development and Testing Best Practices (Hardcover)
Narayanan Palani
R5,191 Discovery Miles 51 910 Ships in 12 - 17 working days

Approximately 15% of the global population is affected by some sort of disability, according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders, one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software's and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile, the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design, development, and extensive accessibility testing, which are essential for most of the customer-facing websites. In a fast-paced world, incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit, accessibility functional tests, and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book, developers can help their organizations rise to a whole new level of accessibility adherence, innovation, and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users.

Streaming and Copyright Law - An end-user perspective (Hardcover): Lasantha Ariyarathna Streaming and Copyright Law - An end-user perspective (Hardcover)
Lasantha Ariyarathna
R4,150 Discovery Miles 41 500 Ships in 12 - 17 working days

This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.

Swarm Intelligence and Machine Learning - Applications in Healthcare (Hardcover): Manish Gupta, Jitendra Agrawal, Dac-Nhuong... Swarm Intelligence and Machine Learning - Applications in Healthcare (Hardcover)
Manish Gupta, Jitendra Agrawal, Dac-Nhuong Le, Shikha Agarwal
R4,443 Discovery Miles 44 430 Ships in 12 - 17 working days

Highlights the importance and applications of Swarm Intelligence and Machine learning in Healthcare industry. Elaborates Swarm Intelligence and Machine Learning for Cancer Detection. Focuses on applying Swarm Intelligence and Machine Learning for Heart Disease detection and diagnosis. Explores of the concepts of machine learning along with swarm intelligence techniques, along with recent research developments in healthcare sectors. Investigates how healthcare companies can leverage the tapestry of big data to discover new business values. Provides a strong foundation for Diabetic Retinopathy detection using Swarm and Evolutionary algorithms.

Digital Transformation and Social Well-Being - Promoting an Inclusive Society (Hardcover): Antonio Lopez Pelaez, Sergei... Digital Transformation and Social Well-Being - Promoting an Inclusive Society (Hardcover)
Antonio Lopez Pelaez, Sergei Zelenev, Sang-Mok Suh
R4,193 Discovery Miles 41 930 Ships in 12 - 17 working days

Shows how social services provided now and in the future can be enhanced through digitization. Contains country case-studies from USA, Brasil, Korea, Taiwan, Hong Kong (China), India, Zimbabwe, Morocco, Spain, Portugal, Ireland and Singapore. Will be of interest to all scholars and students of social work, social policy and social welfare provision.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,809 Discovery Miles 18 090 Ships in 12 - 17 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover): Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram... Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover)
Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram Janghel
R3,246 Discovery Miles 32 460 Ships in 12 - 17 working days

This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the basics as well as the advanced concepts to help beginners, as well as industry professionals, get up to speed on the latest developments in healthcare systems. The book examines descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in finding solutions to problems in healthcare systems. A framework of robust and novel healthcare techniques is highlighted, as well as implementation strategies and a setup for future research endeavors. Healthcare Systems Using Soft Computing Techniques is a valuable resource for researchers and postgraduate students in healthcare systems engineering, computer science, information technology, and applied mathematics. The book introduces beginners to-and at the same time brings industry professionals up to speed with-the important role soft computing techniques play in smart healthcare systems.

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,138 Discovery Miles 11 380 Ships in 12 - 17 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

Ethical Artificial Intelligence from Popular to Cognitive Science - Trust in the Age of Entanglement (Paperback): Jordan... Ethical Artificial Intelligence from Popular to Cognitive Science - Trust in the Age of Entanglement (Paperback)
Jordan Richard Schoenherr
R1,290 Discovery Miles 12 900 Ships in 12 - 17 working days

This book offers a unique interdisciplinary perspective on the ethics of 'artificial intelligence' - autonomous, intelligent, (and connected) systems, or AISs, applying principles of social cognition to understand the social and ethical issues associated with the creation, adoption, and implementation of AISs. As humans become entangled in sociotechnical systems defined by human and artificial agents, there is a pressing need to understand how trust is created, used, and abused. Compounding the difficulty in answering these questions, stakeholders directly or indirectly affected by these systems differ in their motivations, understanding, and values. This volume provides a comprehensive resource to help stakeholders understand ethical issues of designing and implementing AISs using an ethical sensemaking approach. Starting with the general technical affordances of AIS, Dr. Jordan Richard Schoenherr considers the features of system design relating data integrity, selection and interpretation of algorithms, and the evolution processes that drive AISs innovation as a sociotechnological system. The poles of technophobia (algorithmic aversion) and technophilia (algorithmic preference) in the public perception of AISs are then described and considered against existing evidence, including issues ranging from the displacement and re-education needs of the human workforce, the impact of use of technology on interpersonal accord, and surveillance and cybersecurity. Ethical frameworks that provide tools for evaluating the values and outcomes of AISs are then reviewed, and how they can be aligned with ethical sensemaking processes identified by psychological science is explored. Finally, these disparate threads are brought together in a design framework. Also including sections on policies and guideline, gaming and social media, and Eastern philosophical frameworks, this is fascinating reading for students and academics in psychology, computer science, philosophy, and related areas, as well as professionals such as policy makers and those working with AI systems.

Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Paperback): Ulf Mattsson Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Paperback)
Ulf Mattsson
R1,277 Discovery Miles 12 770 Ships in 12 - 17 working days

Unique selling point: * Gain practical tools to solve complex data privacy and security subjects for different business use cases and types of data. Core audience: * Suited to anyone in a CISOs, CSOs, CPOs, CDOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. Place in the market: * Tackles the critical skills needed to succeed in the evolving landscape of regulations and data breaches.

Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Hardcover): Ulf Mattsson Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Hardcover)
Ulf Mattsson
R1,828 Discovery Miles 18 280 Ships in 12 - 17 working days

Unique selling point: * Gain practical tools to solve complex data privacy and security subjects for different business use cases and types of data. Core audience: * Suited to anyone in a CISOs, CSOs, CPOs, CDOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. Place in the market: * Tackles the critical skills needed to succeed in the evolving landscape of regulations and data breaches.

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,235 Discovery Miles 32 350 Ships in 12 - 17 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Security Analytics - A Data Centric Approach to Information Security (Hardcover): Mehak Khurana, Shilpa Mahajan Security Analytics - A Data Centric Approach to Information Security (Hardcover)
Mehak Khurana, Shilpa Mahajan
R4,593 Discovery Miles 45 930 Ships in 12 - 17 working days

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

Digital Forensics in the Era of Artificial Intelligence (Hardcover): Nour Moustafa Digital Forensics in the Era of Artificial Intelligence (Hardcover)
Nour Moustafa
R2,586 Discovery Miles 25 860 Ships in 12 - 17 working days

Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.

Human-Machine Interaction and IoT Applications for a Smarter World (Hardcover): Nishu Gupta, Srinivasa Kiran Gottapu, Rakesh... Human-Machine Interaction and IoT Applications for a Smarter World (Hardcover)
Nishu Gupta, Srinivasa Kiran Gottapu, Rakesh Nayak, Anil Kumar Gupta, Mohammad Derawi, …
R4,142 Discovery Miles 41 420 Ships in 12 - 17 working days

Discusses algorithms and design methodologies for the implementation of HMI based IoT systems. Covers real-time utility of IoT based devices and systems. Provides human-machine interactive technologies and smart applications using IoT. Covers cyber-physical systems, IoT in HMI, using a blend of theoretical knowledge with a practical approach.

Posthuman Property and Law - Commodification and Control through Information, Smart Spaces and Artificial Intelligence... Posthuman Property and Law - Commodification and Control through Information, Smart Spaces and Artificial Intelligence (Hardcover)
Jannice Kall
R4,130 Discovery Miles 41 300 Ships in 12 - 17 working days

This book analyses the phenomenon of digitally mediated property and considers how it problematises the boundary between human and nonhuman actors. The book addresses the increasingly porous border between personhood and property in digitized settings and considers how the increased commodification of knowledge makes visible a rupture in the liberal concept of the property owning, free, person. Engaging with the latest work in posthumanist and new materialist theory, it shows, how property as a concept as well as a means for control, changes fundamentally under advanced capitalism. Such change is exemplified by the way in which data, as an object of commodification, is extracted from human activities yet is also directly used to affectively control - or nudge - humans. Taking up a range of human engagements with digital platforms and coded architectures, as well as the circulation of affects through practices of artificial intelligence that are employed to shape behaviour, the book argues that property now needs to be understood according to an ecology of human as well as nonhuman actors. The idea of posthuman property, then, offers both a means to critique property control through digital technologies, as well as to move beyond the notion of the self-owning, object-owning, human. Engaging the most challenging contemporary technological developments, this book will appeal to researchers in the areas of Law and Technology, Legal Theory, Intellectual Property Law, Legal Philosophy, Sociology of Law, Sociology, and Media Studies.

The Gentrification of the Internet - How to Reclaim Our Digital Freedom (Hardcover): Jessa Lingel The Gentrification of the Internet - How to Reclaim Our Digital Freedom (Hardcover)
Jessa Lingel
R455 Discovery Miles 4 550 Ships in 12 - 17 working days

How we lost control of the internet-and how to win it back. The internet has become a battleground. Although it was unlikely to live up to the hype and hopes of the 1990s, only the most skeptical cynics could have predicted the World Wide Web as we know it today: commercial, isolating, and full of, even fueled by, bias. This was not inevitable. The Gentrification of the Internet argues that much like our cities, the internet has become gentrified, dominated by the interests of business and capital rather than the interests of the people who use it. Jessa Lingel uses the politics and debates of gentrification to diagnose the massive, systemic problems blighting our contemporary internet: erosions of privacy and individual ownership, small businesses wiped out by wealthy corporations, the ubiquitous paywall. But there are still steps we can take to reclaim the heady possibilities of the early internet. Lingel outlines actions that internet activists and everyday users can take to defend and secure more protections for the individual and to carve out more spaces of freedom for the people-not businesses-online.

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Paperback): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Paperback)
Ann M. Butera
R1,198 Discovery Miles 11 980 Ships in 12 - 17 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
You're Doing Great! - And Other Reasons…
Tom Papa Paperback R539 R448 Discovery Miles 4 480
Handbook on Crime and Technology
Don Hummer, James M. Byrne Hardcover R6,403 Discovery Miles 64 030
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
Tomorrow, and Tomorrow, and Tomorrow…
Gabrielle Zevin Paperback  (1)
R475 R399 Discovery Miles 3 990
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R175 Discovery Miles 1 750
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R449 Discovery Miles 4 490

 

Partners