![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment. Focusing on Facebook pages dedicated to hosting footage of street fights, brawls, and other forms of bareknuckle violence, Wood demonstrates that to properly grapple with antisocial media, we must address not only their content, but also their software. In doing so, this study goes a long way to addressing the fundamental question: how have social media changed the way we consume crime? Synthesizing criminology, media theory, software studies, and digital sociology, Antisocial Media is media criminology for the Facebook age. It is essential reading for students and scholars interested in social media, cultural criminology, and the crime-media interface.
A new framework for the digital society that merges the science of degrowth with a global analysis of the high-tech economy. The world is racing toward an irreversible ecological catastrophe. Environmental science makes clear that humans must reduce total material resource use, requiring a radical redistribution of wealth within and between countries. Yet little attention has been paid to how the digital economy fits into this equation. Michael Kwet is a Postdoctoral researcher of the Centre for Social Change at the University of Johannesburg and a leading expert on digital colonialism, and here presents a new framework for the digital society. Merging the science of degrowth with a global analysis of the high-tech economy, he argues that digital capitalism and colonialism must be abolished quickly. In Digital Degrowth, Kwet maps out a path to a people's tech future. He calls for direct action against Silicon Valley, US imperialism and power elites everywhere in order to realise a radically egalitarian digital society that fosters equality in harmony with nature.
Automation now supplants economic activity more than it supports it. Furthermore, this process is fueled by enormous economic forces, which intensifies dependence on automation and spawns other sociological consequences. Of these consequences, fraud generates the highest immediate losses, amounting to $300 billion annually. In the long run, however, the greatest economic cost will occur through loss of jobs, and a lowering of net skills for most of the balance. Other consequences include pervasive invasion of privacy, and overdependence on technology at the expense of developing critical reasoning, judgement, and a personal sense of responsibility. Fortunately, many of these consequences could be ameliorated by automated countermeasures that offset the excesses. Unfortunately, it usually takes a crisis to institute fundamental reform, though the looming economic meltdown stemming from the mounting federal debt offers just such an opportunity.
Discussion, whether in online or face-to-face environments, is central to attaining and disseminating information. Cases on Online Discussion and Interaction: Experiences and Outcomes contains examples of online discussions in a variety of contexts and for a variety of purposes, allowing readers to understand what is likely to facilitate discussion online, what is likely to encourage collaborative meaning-making, what is likely to encourage productive, supportive, engaged discussion, and what is likely to foster critical thinking. This book assembles cases that address an array of research methods, online communication media, forms of expression, communication contexts, and philosophical perspectives.
This volume contains the proceedings of the 5th International Conference on Frontier Computing (FC 2016), Tokyo, Japan, July 13-15, 2016. This international meeting provided a forum for researchers to share current understanding of recent advances and emergence in information technology, science, and engineering, with themes in the scope of Communication Networks, Business Intelligence and Knowledge Management, Web Intelligence, and any related fields that further the development of information technology. The articles presented cover a wide spectrum of topics: database and data mining, networking and communications, web and internet of things, embedded system, soft computing, social network analysis, security and privacy, optics communication, and ubiquitous/pervasive computing. Many papers report results of great academic potential and value, and in addition, indicate promising directions of research in the focused realm of this conference series. Readers, including students, academic researchers, and professionals, will benefit from the results presented in this book. It also provides an overview of current research and can be used as a guidebook for those new to the field.
This book outlines the legal powers of a major Western nation - Australia - to collect and use location information. Mobile service and social media service providers now have the ability to track, record and store more precise location information. Unlike 4G, 5G mobile communications require that cell towers and antennas be in much closer proximity; as a result, the location data can reveal more personal and sensitive information about individual citizens. Despite this aspect, service providers are required to disclose the data to the authorities, without the need for a judicial warrant. This book was written from the perspective of big location data software analytics, a capability that makes it possible to combine various location data points to create a profile on a given individual's movements, habits, and political, religious and ideological orientation. In this regard, privacy is poorly protected. The rationale used to justify the powers was enforcing serious crimes - terrorism offences. Location data can now be retained for at least two years and be collected to investigate even minor offences. This can be done without the person being reasonably suspected of a criminal offence - when the individual is simply determined to be a person of interest. This poses legal risks to vulnerable communities. And yet, such investigative techniques are deemed lawful and reasonable. At a time when national security is so broadly defined to include economic issues, which in turn overlap with climate change and environmental protection, these legal powers should be reassessed. The book clarifies the complex rules that every citizen must know in order to have agency. Further, it calls upon authorities to reflect and to self-regulate, by making the conscious decision to surrender some of their powers to review by the independent judiciary. Without the requirement for a judicial warrant or judicial review, the powers are unfairly broad. The book pursues an interdisciplinary approach to assess the functionality of mobile telecommunications in direct relation to law enforcement powers and existing judicial precedents. Further, it offers a unifying techno-legal perspective on a complex issue touching on modern privacy law and communications technologies.
As computers become more prevalent throughout society, the issue of computer-human interaction has become paramount to computer scientists and professionals furthering the computerization of organizations. "Computers, Human Interaction, and Organizations" revisits important theoretical and conceptual issues that have not been resolved in discussions of the increasing computerization of society. The authors here move beyond the technical issues relating to computerization to examine the social and political nature of information and computer technology using contemporary critical theory. This unique volume, therefore, offers a serious reflection on the proper scope and nature of computerization and the proper adjustment to and utilization of these instruments. According to the authors, without the guiding use of theory, computer use will be misguided and socially disruptive. Without a critical analysis of the issues involved in computer-human interaction, the current push to have computers support intimate interaction among workers and other groups may never come to fruition. By contrast, recognizing the computer as an expression of the technological worldview allows one to recognize the limits as well as the promise of these instruments and to define the proper scope of computerization. The authors of this volume help the reader understand the social nature of computer technology and the limits of its application while circumscribing socially responsible uses of the new technology.
Continuous improvements in technological applications have allowed more opportunities to develop systems with user-focused designs. This not only leads to higher success in day-to-day usage, but it increases the overall probability of technology adoption. Design Solutions for User-Centric Information Systems provides a comprehensive examination of the latest strategies and methods for creating technological systems with end users as the focal point of the design process. Highlighting innovative practices and applications across a variety of areas, such as cloud-based computing services, e-government adoption, and logistics evaluation, this book is an ideal reference source for computer engineers, practitioners, project managers, graduate students, and researchers interested in the enhancement of user-centric information system development.
This book presents a comprehensive framework for IoT, including its architectures, security, privacy, network communications, and protocols. The book starts by providing an overview of the aforementioned research topics, future directions and open challenges that face the IoT development. The authors then discuss the main architectures in the field, which include Three- and Five-Layer Architectures, Cloud and Fog Based Architectures, a Social IoT Application Architecture. In the security chapter, the authors outline threats and attacks, privacy preservation, trust and authentication, IoT data security, and social awareness. The final chapter presents case studies including smart home, wearables, connected cars, industrial Internet, smart cities, IoT in agriculture, smart retail, energy engagement, IoT in healthcare, and IoT in poultry and farming. Discusses ongoing research into the connection of the physical and virtual worlds; Includes the architecture, security, privacy, communications, and protocols of IoT; Presents a variety of case studies in IoT including wearables, smart cities, and energy management.
Intelligent Computing for Interactive System Design provides a comprehensive resource on what has become the dominant paradigm in designing novel interaction methods, involving gestures, speech, text, touch and brain-controlled interaction, embedded in innovative and emerging human-computer interfaces. These interfaces support ubiquitous interaction with applications and services running on smartphones, wearables, in-vehicle systems, virtual and augmented reality, robotic systems, the Internet of Things (IoT), and many other domains that are now highly competitive, both in commercial and in research contexts. This book presents the crucial theoretical foundations needed by any student, researcher, or practitioner working on novel interface design, with chapters on statistical methods, digital signal processing (DSP), and machine learning (ML). These foundations are followed by chapters that discuss case studies on smart cities, brain-computer interfaces, probabilistic mobile text entry, secure gestures, personal context from mobile phones, adaptive touch interfaces, and automotive user interfaces. The case studies chapters also highlight an in-depth look at the practical application of DSP and ML methods used for processing of touch, gesture, biometric, or embedded sensor inputs. A common theme throughout the case studies is ubiquitous support for humans in their daily professional or personal activities. In addition, the book provides walk-through examples of different DSP and ML techniques and their use in interactive systems. Common terms are defined, and information on practical resources is provided (e.g., software tools, data resources) for hands-on project work to develop and evaluate multimodal and multi-sensor systems. In a series of in-chapter commentary boxes, an expert on the legal and ethical issues explores the emergent deep concerns of the professional community, on how DSP and ML should be adopted and used in socially appropriate ways, to most effectively advance human performance during ubiquitous interaction with omnipresent computers. This carefully edited collection is written by international experts and pioneers in the fields of DSP and ML. It provides a textbook for students and a reference and technology roadmap for developers and professionals working on interaction design on emerging platforms.
Technology has always played a decisive role in humanity's progress. Throughout history, it has not only strengthened economic development but has become a powerful tool for human development. Nevertheless, the positive impact technology has on human development may become tainted by the risks it entails.ICT Influences on Human Development, Interaction, and Collaboration creates awareness on how ICTs contribute to human development in multiple areas. This publication describes the link between ICTs and human development, which includes economic, social, and political development. It identifies potential applications for the development of human beings and provides insightful analysis about those factors (also contextual and institutional ones) that affect ICTs for human development initiatives. This book addresses future challenges, proposing strategies to both governments and international cooperation organizations for moving forward.
This book offers a systematic introduction to an understanding-oriented approach to multimedia content analysis. It integrates the visual understanding and learning models into a unified framework, within which the visual understanding guides the model learning while the learned models improve the visual understanding. More specifically, it discusses multimedia content representations and analysis including feature selection, feature extraction, image tagging, user-oriented tag recommendation and understanding-oriented multimedia applications. The book was nominated by the University of Chinese Academy of Sciences and China Computer Federation as an outstanding PhD thesis. By providing the fundamental technologies and state-of-the-art methods, it is a valuable resource for graduate students and researchers working in the field computer vision and machine learning.
This anthology brings together multiple viewpoints on the social dimensions of the revolution in information technology. The chapters cover social, political, educational, personal, and international dimensions of information technology impacts. Each chapter focuses on different aspects of the effects of computing and the new information technologies that have accelerated every area of human life. Social Dimensions of Information Technology: Issues for the New Millennium raises important issues with profound implications for public policy and societal development.
This book presents a compilation of the most recent implementation of artificial intelligence methods for solving different problems generated by the COVID-19. The problems addressed came from different fields and not only from medicine. The information contained in the book explores different areas of machine and deep learning, advanced image processing, computational intelligence, IoT, robotics and automation, optimization, mathematical modeling, neural networks, information technology, big data, data processing, data mining, and likewise. Moreover, the chapters include the theory and methodologies used to provide an overview of applying these tools to the useful contribution to help to face the emerging disaster. The book is primarily intended for researchers, decision makers, practitioners, and readers interested in these subject matters. The book is useful also as rich case studies and project proposals for postgraduate courses in those specializations.
This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems. It first details the concepts of system design, life cycle, impact assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design of information systems with a focused view on cloud-computing systems and big data analytics. This informative book is a valuable resource for graduate students, researchers and industry-based practitioners working in engineering, information and business systems as well as strategy.
This book provides an examination of e-Government frameworks and maturity stages in governments around the world, including an overview of the legal frameworks that have supported them. Divided into three sections, the first part of this book analyses the theoretical context of current policies, codes of best practice and their implementation. The second section presents case studies which bring key issues to the fore including open government, privacy protection, social media, democracy, systems failures, innovations in inter-organizational e-government projects, and open data systems. The authors demonstrate the importance of the successful implementation of e-Government for improving managerial efficiency, public service delivery and citizen engagement, with special attention given to developing countries. The book concludes by drawing out the lessons learned from the latest research and recommending solutions for improving the implementation of e-Government in the future, thereby helping to achieve more transparent, participative and democratic societies. This book will provide an invaluable resource for researchers, policy-makers, public managers, international organizations and technical experts.
"Softwars: The Legal Battles for Control of the Global Software Industry" explains why the future of the computer industry depends on the nature and extent of intellectual property protection for the software that controls computer hardware. The softwars it discusses are the confrontations taking place in the courtroom, in the legislative chambers and in professional symposia around the world in which the scope of intellectual property protection for computer software is being debated and, in some cases, determined. In a highly readable and entertaining series of essays, the author explains the influences of clones, hackers, vendors of proprietary systems, vendors of open systems, software patents, copyrights and trade secrets on the evolution of the industry. No other book to date has provided either as lucid a description of the major litigation involving software protection or as cogent an analysis of the economic and strategic consequences of that litigation. "SoftwarS" is divided into five parts, each consisting of two or more essays. In Part I, the author discusses the nature of computer programs and the history of intellectual property protection for computer programs. Part II deals with the look and feel issue; it explains what constitutes infringement of rights in screen displays and other aspects of user interfaces, and the importance of the issue. Part III concerns the practice known as reverse engineering of software; who does it, why, and what the legal and economic consequences are. In Part IV, the reader is led to the boundaries of the legal debate, where the limits of the law are being tested. Part V is the author's conclusion and prognostications for the future of the computer industry and the law. Anyone interested in the intersection of law and technology, and particularly those involved in the computer industry, will find Softwars valuable and compelling reading.
This book focuses on the implementation of digital strategies in the public sectors in the US, Mexico, Brazil, India and Germany. The case studies presented examine different digital projects by looking at their impact as well as their alignment with their national governments' digital strategies. The contributors assess the current state of digital government, analyze the contribution of digital technologies in achieving outcomes for citizens, discuss ways to measure digitalization and address the question of how governments oversee the legal and regulatory obligations of information technology. The book argues that most countries formulate good strategies for digital government, but do not effectively prescribe and implement corresponding policies and programs. Showing specific programs that deliver results can help policy makers, knowledge specialists and public-sector researchers to develop best practices for future national strategies.
Technology in the world today impacts every aspect of society and has infiltrated every industry, affecting communication, management, security, etc. With the emergence of such technologies as IoT, big data, cloud computing, AI, and virtual reality, organizations have had to adjust the way they conduct business to account for changing consumer behaviors and increasing data protection awareness. The Handbook of Research on Social and Organizational Dynamics in the Digital Era provides relevant theoretical frameworks and the latest empirical research findings on all aspects of social issues impacted by information technology in organizations and inter-organizational structures and presents the conceptualization of specific social issues and their associated constructs. Featuring coverage on a broad range of topics such as business management, knowledge management, and consumer behavior, this publication seeks to advance the practice and understanding of technology and the impacts of technology on social behaviors and norms in the workplace and society. It is intended for business professionals, executives, IT practitioners, policymakers, students, and researchers.
Global Health Informatics: How Information Technology Can Change Our Lives in a Globalized World discusses the critical role of information and communication technologies in health practice, health systems management and research in increasingly interconnected societies. In a global interconnected world the old standalone institutional information systems have proved to be inadequate for patient-centered care provided by multiple providers, for the early detection and response to emerging and re-emerging diseases, and to guide population-oriented public health interventions. The book reviews pertinent aspects and successful current experiences related to standards for health information systems; digital systems as a support for decision making, diagnosis and therapy; professional and client education and training; health systems operation; and intergovernmental collaboration.
Right now is the time for new opinions and new ideas to be generated and be presented as a solution. With the ever changing economic status of society, prosperity depends on the ability to run and maintain an active equilibrium between society and individuals. Therefore, it is essential for both parties to promote innovation and creativity in order to enable a proper and valuable lifestyle. Digital Economy Innovations and Impacts on Society provides theoretical and practical approaches about digital economy, increasing people s awareness on what the digital economy is and exactly what competitive advantages exist to provide information technology and innovation as its main resources. This publication focuses on rethinking the classical economic theory in the context of new technology, information, and innovation, making it a publication that brings the best research to the forefront for economics and social researchers, academicians, professionals and practitioners.
This book offers a compendium of best practices in game dynamics. It covers a wide range of dynamic game elements ranging from player behavior over artificial intelligence to procedural content generation. Such dynamics make virtual worlds more lively and realistic and they also create the potential for moments of amazement and surprise. In many cases, game dynamics are driven by a combination of random seeds, player records and procedural algorithms. Games can even incorporate the player's real-world behavior to create dynamic responses. The best practices illustrate how dynamic elements improve the user experience and increase the replay value. The book draws upon interdisciplinary approaches; researchers and practitioners from Game Studies, Computer Science, Human-Computer Interaction, Psychology and other disciplines will find this book to be an exceptional resource of both creative inspiration and hands-on process knowledge.
Interaction design is acknowledged as an important area of study, and more especially of design practice. Hugely popular and profitable consumer devices, such as mobile phones and tablets, are seen as owing much of their success to the way they have been designed, not least their interface characteristics and the styles of interaction that they support. Interaction design studies point to the importance of a user-centred approach, whereby products are in principle designed around their future users' needs and capacities. However, it is the market, and marketing, that determine which products are available for people to interact with and to a great extent what their designed characteristics are. Primitive Interaction Design is based on the realisation that designers need to be freed from the marketplace and industry pressure, and that the usual user-centred arguments are not enough to make a practical difference. Interaction designers are invited to cast themselves as "savages", as if wielding primitive tools in concrete physical environments. A theoretical perspective is presented that opens up new possibilities for designers to explore fresh ideas and practices, including the importance of conscious and unconscious being, emptiness and trickery. Building on this, a set of design tools for primitive design work is presented and illustrated with practical examples. This book will be of particular interest to undergraduate and graduate students and researchers in interaction design and HCI, as well as practicing interaction designers and computer professions. It will also appeal to those with an interest in psychology, anthropology, cultural studies, design and the future of technology in society.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable. |
![]() ![]() You may like...
Taxation Of Individuals Simplified 2025
K.L. de Hart, E.H. Hamel, …
Paperback
Trust in Electronic Commerce: The Role…
J. E. J. Prins, P.M.A. Ribbers, …
Hardcover
R5,121
Discovery Miles 51 210
Pearson REVISE Edexcel GCSE History…
Rob Bircher
Digital product license key
![]() R251 Discovery Miles 2 510
|