|
Books > Computing & IT > Social & legal aspects of computing
As the IoT market is booming, several issues are delaying the full
realization of the technology. IoT devices, in cybersecurity terms,
greatly increase security risk. This means that any scientific work
that offers cybersecurity strategies will excite security experts
who will be glad to expand their knowledge base on IoT
cybersecurity. As a result of the booming of the IoT market,
business competitors are jockeying for a piece of the market. This
means that solutions from researchers that address compatibility
issues will be greatly welcomed by IoT technology developers.
Connectivity providers are likely to embrace solutions to
challenges of bandwidth since a growing IoT market must be followed
up by bandwidth-intensive IoT applications which tend to jostle for
space on the current client-server model. Overpromising followed by
underdelivering, has been the current approach by many innovators
and the mismatch results in losses in production, orphaned
technologies accompanied by frequent system failures. Solutions
that address IoT performance issues are likely to excite many
start-ups. Solutions to challenges of fragmentation presented by
thousands of devices from different manufacturers operating on
proprietary ecosystems are likely to be warmly embraced by many IoT
brands developers. As such, a publication that specifically
addresses the challenges faced in the rolling out of IoT
technologies is sorely needed.
Peer to Peer Accommodation networks presents a new conceptual
framework which offers an initial explanation for the continuing
and rapid success of 'disruptive innovators' and their effects on
the international hospitality industry, with a specific focus on
Airbnb, in the international context. Using her first-hand
experience as a host on both traditional holiday accommodation
webpages and a peer-to-peer accommodation network, respected
tourism academic Sara Dolnicar examines possible reasons for the
explosive success of peer to peer accommodation networks,
investigates related topics which are less frequently discussed -
such as charitable activities and social activism - and offers a
future research agenda. Using first hand empirical results, this
text provides much needed insight into this 'disruptive innovator'
for those studying and working within the tourism and hospitality
industries. This book discusses a wealth of issues including: * The
disruptive innovation model - the criteria for identifying and
understanding new disruptive innovators, and how peer-to-peer
accommodation networks comply with these; * The factors postulated
to drive the success of these networks and the celebration of
variation; * Who are genuine networks members, tourist motivators
and the chance of the 'perfect match'; * Pricing, discrimination
and stimulation of the creation of new businesses.
In the information society, technology has become ubiquitous, but
its intrinsic vulnerabilities and the complexity of managing
mission-critical systems create an attractive target for potential
attackers. Law, Policy, and Technology: Cyberterorrism, Information
Warfare, and Internet Immobilization provides relevant frameworks
and best practices as well as current empirical research findings
in the area. It is aimed at professionals who want to improve their
understanding of the impact of cyber-attacks on critical
infrastructures and other information systems essential to the
smooth running of society, how such attacks are carried out, what
measures should be taken to mitigate their impact and what lessons
can be learned from the attacks and simulations of the last few
years.
The recent explosion in complex global networking architectures has
spurred a concomitant rise in the need for robust information
security. Further, as computing power increases exponentially with
every passing year, so do the number of proposed cryptographic
schemata for improving and ensuring the encryption integrity of
cutting-edge infosec protocols. Improving Information Security
Practices through Computation Intelligence presents an overview of
the latest and greatest research in the field, touching on such
topics as cryptology, stream ciphers, and intrusion detection, and
providing new insights to an audience of students, teachers, and
entry-level researchers working in computational intelligence,
information security, and security engineering.
Ethical values in computing are essential for understanding and
maintaining the relationship between computing professionals and
researchers and the users of their applications and programs. While
concerns about cyber ethics and cyber law are constantly changing
as technology changes, the intersections of cyber ethics and cyber
law are still underexplored. Investigating Cyber Law and Cyber
Ethics: Issues, Impacts and Practices discusses the impact of cyber
ethics and cyber law on information technologies and society.
Featuring current research, theoretical frameworks, and case
studies, the book will highlight the ethical and legal practices
used in computing technologies, increase the effectiveness of
computing students and professionals in applying ethical values and
legal statues, and provide insight on ethical and legal discussions
of real-world applications.
In more ways than one, assistive technologies can have a profound
impact on humans and their operations within society. Understanding
these emerging technologies is crucial to their effective use in
improving human lives. Human-Computer Interfaces and Interactivity:
Emergent Research and Applications aims to address the main issues
of interest within the culture and design of interactive systems
for individuals living with disabilities. This premier reference
work addresses a range of approaches including, but not limited to,
the conceptual, technological, and design issues related to
human-computer interaction, issues of interest to a range of
individuals including academics, university teachers, researchers,
post-graduate students, public and private institutions, and HCI
developers and researchers.
Electric Dreams turns to the past to trace the cultural history
of computers. Ted Friedman charts the struggles to define the
meanings of these powerful machines over more than a century, from
the failure of Charles Babbage's "difference engine" in the
nineteenth century to contemporary struggles over file swapping,
open source software, and the future of online journalism. To
reveal the hopes and fears inspired by computers, Electric Dreams
examines a wide range of texts, including films, advertisements,
novels, magazines, computer games, blogs, and even operating
systems.
Electric Dreams argues that the debates over computers are
critically important because they are how Americans talk about the
future. In a society that in so many ways has given up on imagining
anything better than multinational capitalism, cyberculture offers
room to dream of different kinds of tomorrow.
This text helps the reader generate clear, effective documentation
that is tailored to the information requirements of the end-user.
Written for technical writers and their managers, quality assurance
experts, and software engineers, the book describes a user-centered
information design method (UCID) that should help ensure
documentation conveys significant information for the user. The
UCID shows how to: integrate the four major information components
of a software system - user interface labels, messages, online and
printed documentation; make sure these elements work together to
improve usability; deploy iterative design and prototyping
procedures that minimize flaws and save time and money; and guide
technical writers effectively.
The e-commerce revolution has allowed many organizations around the
world to become more effective and efficient in managing their
resources. Through the use of e-commerce many businesses can now
cut the cost of doing business with their customers in a speed that
could only be imagined a decade ago. However, doing business on the
Internet has opened up business to additional vulnerabilities and
misuse. It has been estimated that the cost of misuse and criminal
activities related to e-commerce now exceeds 10 billion dollars per
year, and many experts predict that this number will increase in
the future. IT Solutions Series: E-Commerce Security: Advice from
Experts provides insight and practical knowledge obtained from
industry leaders regarding the overall successful management of
e-commerce practices and solutions.
 |
Social Media and Living Well
(Hardcover)
Berrin A Beasley, Mitchell R. Haney; Contributions by Alan B Albarran, Paul Bloomfield, Kathy Brittain Richardson, …
|
R2,457
Discovery Miles 24 570
|
Ships in 12 - 17 working days
|
|
What is well-being? Is it a stable income, comfortable home, and
time shared with family and friends? Is it clean drinking water and
freedom from political oppression? Is it finding Aristotle's Golden
Mean by living a life of reason and moderation? Scholars have
sought to define well-being for centuries, teasing out nuances
among Aristotle's writings and posing new theories of their own.
With each major technological shift this question of well-being
arises with new purpose, spurring scholars to re-examine the
challenge of living the good life in light of significantly altered
conditions. Social media comprise the latest technological shift,
and in this book leading scholars in the philosophy and
communication disciplines bring together their knowledge and
expertise in an attempt to define what well-being means in this
perpetually connected environment. From its blog prototype in the
mid-to-late-2000s to its microblogging reality of today, users have
been both invigorated and perplexed by social media's seemingly
near-instant propagation. Platforms such as Facebook, Twitter,
YouTube, Instagram, and LinkedIn have been hailed as everything
from revolutionary to personally and societally destructive. In an
exploration of the role social media play in affecting well-being,
whether among individuals or society as a whole, this book offers
something unique among academic tomes, an opening essay by an
executive in the social media industry who shares his observations
of the ways in which social communication conventions have changed
since the introduction of social media. His essay is followed by an
interdisciplinary academic exploration of the potential
contributions and detractions of social media to well-being.
Authors investigate social media's potential influence on
friendship, and on individuals' physical, emotional, social,
economic, and political needs. They consider the morality of online
deception, how memes and the very structure of the internet inhibit
rational social discourse, and how social media facilitate our
living a very public life, whether through consent or coercion.
Social media networks serve as gathering places for the exchange of
information, inspiration, and support, but whether these exchanges
are helpful or harmful to well-being is a question whose answer is
necessary to living a good life.
Keep track of your online passwords in this elegant, yet
inconspicuous, alphabetically tabbed notebook featuring a modern
black-and-gold design. In this 4 x 5.75-inch, 128-page hardcover
notebook with removable cover band, record the necessarily complex
passwords and user login names required to thwart hackers. You'll
find: Internet password safety and naming tips A to Z tabbed pages
with space to list website, username, and five passwords for each
Dedicated pages to record software license information, with spaces
for license number, purchase date, renewal date, and monthly fee
Dedicated pages to record network settings and passwords, including
for modem, router, WAN, LAN, and wireless A notes section with
blank lined pages Just say "no" to piles of sticky notes and scraps
of paper with your passwords and logins! This internet password
logbook provides an easy way to keep track of website addresses,
usernames, and passwords in one discreet and convenient location.
This self-study guide covers every topic on the Certified
Information Privacy Manager exam Take IAPP's rigorous Certified
Information Privacy Manager (CIPM) exam with complete confidence
using the comprehensive information contained in this highly
effective study guide. The book enhances candidates' abilities to
design, build, and run information privacy management programs.
Written by a security and privacy expert and experienced author,
CIPM Certified Information Privacy Manager All-in-One Exam Guide is
based on proven pedagogy and thoroughly prepares candidates to pass
this exam. Beyond exam preparation, the guide also serves as a
valuable on-the-job reference. *Provides 100% coverage of all eight
objectives for the CIPM exam *Online content includes 300 practice
questions in the Total Tester exam engine *Written by a security
and privacy expert, educator, and experienced author
The debate over cyber technology has resulted in new considerations
for national security operations. States find themselves in an
increasingly interconnected world with a diverse threat spectrum
and little understanding of how decisions are made within this
amorphous domain. With The Decision to Attack, Aaron Franklin
Brantly investigates how states decide to employ cyber in military
and intelligence operations against other states and how rational
those decisions are. In his examination, Brantly contextualizes
broader cyber decision-making processes into a systematic expected
utility-rational choice approach to provide a mathematical
understanding of the use of cyber weapons at the state level.
Topics Discussed: The Key Concepts of Cyber The Motivation and
Utility for Covert Action Digital Power Anonymity and Attribution
in Cyberspace Cyber and Conventional Operations: The Dynamics of
Conflict Defining the Role of Intelligence in Cyberspace How actors
decide to use cyber-a rational choice approach Cognitive Processes
and Decision-Making in Cyberspace Finding meaning in the expected
utility of international cyber conflict
Master the art of user experience design through the 100 laws,
guidelines, human biases, and general considerations in this
comprehensive, cross-disciplinary encyclopedia. Richly illustrated
and easy to navigate, Universal Principles of UX pairs clear
explanations of each concept with visual examples of the ideas
applied in practice. The book is organized into six broad
categories: Consider Empathize Define Research Design Validate And,
features principles as diverse as: Design is not neutral Make the
choice easy Some complexity cannot be reduced Map the ecosystem So
you think you can scroll Don't grade your own homework User
Experience is a field notable for its expansiveness, complexity and
persistent evolution. This book is not a chronological retelling of
the history of user experience design. It is also not a technical
how-to book that will show you how to become a perfect user
experience designer one step at a time. It's a philosophical
anthology of case studies, situations, problems, and contradictions
encountered across more than fifteen years of working on real world
client projects that will teach you how to think, rather than tell
you what to do. Each principle is presented in a two-page format.
The left-hand page contains a succinct definition, a full
description of the principle, examples of its use, and guidelines
for use. Sidenotes appear to the right of the text, and provide
elaborations and references. The right-hand page contains visual
examples and related graphics to support a deeper understanding of
the principle. This landmark reference is the standard for
designers, engineers, managers, and students who seek to broaden
and improve their user experience design expertise. The titles in
the Rockport Universal series offer comprehensive and authoritative
information and edifying and inspiring visual examples on
multidisciplinary subjects for designers, architects, engineers,
students, and anyone who is interested in expanding and enriching
their design knowledge.
 |
PAM Mastery
(Hardcover)
Michael W Lucas
|
R978
R878
Discovery Miles 8 780
Save R100 (10%)
|
Ships in 10 - 15 working days
|
|
As interactive application software such as apps, installations,
and multimedia presentations have become pervasive in everyday
life, more and more computer scientists, engineers, and technology
experts acknowledge the influence that exists beyond visual
explanations. Computational Solutions for Knowledge, Art, and
Entertainment: Information Exchange Beyond d104 focuses on the
methods of depicting knowledge-based concepts in order to assert
power beyond a visual explanation of scientific and computational
notions. This book combines formal descriptions with graphical
presentations and encourages readers to interact by creating visual
solutions for science-related concepts and presenting data. This
reference is essential for researchers, computer scientists, and
academics focusing on the integration of science, technology,
computing, art, and mathematics for visual problem solving.
Globalization has shifted perspectives on individualism and
identity as cultural exchange occurs more rapidly in an age of
heightened connectivity. As technology connects those around the
world, it too helps to provoke a shift in the autonomy of
individuals. The Handbook of Research on Individualism and Identity
in the Globalized Digital Age explores the ways in which
globalization has impacted the human experience with a specific
emphasis on the field of education and human development. This
research-based publication presents critical perspectives on the
global changes that are occurring as a result of globalization.
Researchers, professionals, and graduate-level students will find
this publication to be an essential resource.
|
|