Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing
Written by successful Second Life resort owner Irie Tsure, this comprehensive guide will accompany you on the tricky journey from Newbie to practising expert in the virtual world of Second Life. Teach Yourself Making Money in the Second Life World is intended to cover every skill required to enjoy and prosper within this virtual world but in particular focuses on those entrepreneurial activities, strategies and skills which can help you get ahead in business in Second Life. This book is packed with advice for virtual entrepreneurs looking to develop independent businesses within SL, perfect for individuals or small companies interested in entering SL and succeeding there. Authored by an established, popular business savvy and creative SL character, areas covered include: The Second Life economy Intellectual property rights Creating retail objects Creating fashion items including clothing, hair and footwear Scripting Creating animations including QAvimator and how to upload an animation Putting it all together including the creative process Retail outlets and venues including how,to rent or to buy space,store design and layout, selling your products in-world,opening a resort or nightclub, streaming music into Second Life,including your own music, developing the business,minimising lag, community and staff Land management including: finding, buying and selling land in Second Life, obtaining a private island, making money from virtual land, managing a Shopping Mall, checking and improving a region's performance Real-world brands in Second Life - examining the opportunities etc Marketing in second life including: branding, Second Life groups, promoting your business Appendices: A Irie's summary of success; B My past, our present and the future; C: Useful keyboard shortcuts Most other books are written by techies or tourists, not by an author who has actually made the SL experience work for themselves. This is the real McCoy.
1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.
Exploring the evolution of the right to be forgotten, its challenges, and impacts on privacy, reputation, and online expression, this book lays out the current state of the law on the right to be forgotten in Canada and in the international context while addressing the broader theoretical tensions at the core of the right to be forgotten.
The field of information technology continues to advance at a brisk pace, including the use of Remote Laboratory (RL) systems in education and research. To address the needs of remote laboratory development for such purposes, the authors present a new state-of-the-art unified framework for RL system development. Included are solutions to commonly encountered RL implementation issues such as third-party plugin, traversing firewalls, cross platform running, and scalability, etc. Additionally, the book introduces a new application architecture of remote lab for mobile-optimized RL application development for Mobile Learning (M-Learning). It also shows how to design and organize the remote experiments at different universities and make available a framework source code. The book is intended to serve as a complete guide for remote lab system design and implementation for an audience comprised of researchers, practitioners and students to enable them to rapidly and flexibly implement RL systems for a range of fields.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.
This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.
First book to look at legal and regulatory aspects of personal care robots
In this book Pragati Rawat and John C. Morris identify and evaluate the impact of factors that can help explain the difference in e-participation, public participation using information and communication technology, in different countries. While cross-sectional studies have been covered, few have taken an in-depth look at cross-national studies. This book attempts to fill the gap using quantitative panel data to explore the influence of technology and institutions, and the impact of their complex relationships in a mediation and moderation analysis, on e-participation. The current study reviews the scholarly work in the field of "offline" and "online participation" to identify a set of antecedents that influence e-participation. A conceptual framework is developed, supported by the theories from the public policy and socio-technical premise. The authors utilize secondary data, primarily from the UN and World Economic Forum, for 143 countries from three waves of surveys to measure the dependent and explanatory variables. The panel data is statistically analyzed and findings reveal the role of technology as a mediator as well as a moderator for institutions' impact on e-participation. The Effects of Technology and Institutions on E-Participation provides a groundbreaking country-level analysis that will appeal to academics and students of e-government and Digital Government, Public Policy, Public Administration, Public Sector Innovation, and Public Participation.
This book offers a comprehensive scholarly overview of Reddit, one of the most popular and least studied social platforms of the early 21st century. The book inspires new ways of thinking about Reddit, considering it from multiple perspectives: through a historical lens, as a site where identity is forged, as a democracy, as a community, and as a news aggregator and distributor. By bringing theories from computer-mediated communication, communication studies, and sociology to bear on original, large-scale observational analyses of Reddit's communities, this book provides a uniquely comprehensive overview of the platform's first 15 years. Understanding Reddit will help us make sense of how rapidly growing communities function in an era of mass online anonymity. Serving both as a primer on how social behavior on Reddit plays out, and as a way of locating it within multiple theoretical traditions, the book will offer important insights to scholars and students in the disciplines of communication, media studies, information science, internet and emerging media studies, and sociology.
Includes detailed applications of cybersecurity and forensics for real life problems Addresses the challenges and solutions related to implementation of cybersecurity in multiple domains of smart computational technologies Includes the latest trends and area of research in cybersecurity and forensics Offers both quantitative and qualitative assesmnet of the topics Includes case studies that will be helpful for the researchers
Examines how digital media and the creation of digital immortals may affect religious understandings of death and the afterlife; Understands the impact of digital media on those living and those working with the bereaved; Explores the impact of digital memorialisation post death; Looks at the ways in which digital media may be changing conceptions and theologies of death
Following on the success of his introductory text, "Digital
Evidence and Computer Crime," Eoghan Casey brings together a few
top experts to create the first detailed guide for professionals
who are already familiar with digital evidence. The Handbook of
Computer Crime Investigation helps readers master the forensic
analysis of computer systems with a three-part approach covering
tools, technology, and case studies.
Features interviews and personal stories from a range of industry-leading UX professionals to show readers how they broke into the industry, stayed with it, and evolved with it. Accompanied by a companion website that provides readers with featured articles and updated resources covering new and changing information to help them stay on top of this fast-paced industry. Provides worksheets and activities to help readers make decisions for their careers and build their soft business skills and portfolios
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
The key feature of the text is its concise, scholarly depth, and accessible format, which enable readers to gain a clear understanding of the theory that they may use in future research. Current texts on the market include redundant, lengthy presentations of theories that fail to distinguish among key theoretical contributions. Terrorism is an area of urgent global concern. The number of terrorism and homeland security-focused academic programs, think tanks, and research centers has dramatically increased over the past two decades. Many universities now offer courses on issues related to terrorism at both the undergraduate and graduate levels within the social science disciplines as well as interdisciplinary centers. Yet, there is only one text and a few book chapters on theories of terrorism. The approach that we will use in the book will make it attractive to academics, students, and policy makers who seek to develop theoretically-driven approaches to policy making. Considering the current number of programs on terrorism and homeland security within the United States alone, the growing emphasis on terrorism studies across the world, and the absence of a clear text on theories of terrorism, the demand should be quite high. This will be the only text that offers chapter-length descriptions of each stage of the radicalization process covering pressing issues in the field of terrorism.
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.
Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.
This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.
A must have book on how GDPR is actively working in the privacy, compliance and technology space. Gain a clear understanding of GDPR requirements and recognise opportunities to reshape your data privacy compliance programs. Learn unique techniques to avoid GDPR non-compliance in the third and fourth industrial revolution era. A practical guide to providing great insights on data privacy challenges and compliance with invaluable practical approaches. Demonstrates data privacy legislation differences and similarities in multi-jurisdictions and how to man oeuvre the minefield of privacy successfully.
Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.
1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.
In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be read by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.
Offers parents, and training and practising professionals in psychology, psychotherapy, education and social work insight into what the evidence says about human behaviour online, what this means for how children develop and how we can best support children to be safe and healthy online now and in future. Accessibly presents the key research from psychology, sociology and biology to reveal how and why humans interact with platforms, apps and software. Covers essential topics including social media, gaming and harmful effects of technology and social media. |
You may like...
|