0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (384)
  • R250 - R500 (1,132)
  • R500+ (11,178)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.): It Governance... EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.)
It Governance Privacy Team
R751 Discovery Miles 7 510 Ships in 12 - 17 working days

Understand your GDPR obligations and prioritise the steps you need to take to comply The GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection. The Regulation applies to all data controllers and processors that handle EU residents' personal information. It supersedes the 1995 EU Data Protection Directive and all EU member states' national laws that are based on it - including the UK's DPA (Data Protection Act) 1998. Failure to comply with the Regulation could result in fines of up to 20 million or 4% of annual global turnover - whichever is greater. This guide is a perfect companion for anyone managing a GDPR compliance project. It provides a detailed commentary on the Regulation, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Clear and comprehensive guidance to simplify your GDPR compliance project Now in its fourth edition, EU General Data Protection Regulation (GDPR) - An implementation and compliance guide provides clear and comprehensive guidance on the GDPR. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand. Topics covered include: The DPO (data protection officer) role, including whether you need one and what they should do; Risk management and DPIAs (data protection impact assessments), including how, when and why to conduct one; Data subjects' rights, including consent and the withdrawal of consent, DSARs (data subject access requests) and how to handle them, and data controllers and processors' obligations; Managing personal data internationally, including updated guidance following the Schrems II ruling; How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. Supplemental material While most of the EU GDPR's requirements are broadly unchanged in the UK GDPR, the context is quite different and will have knock-on effects. You may need to update contracts regarding EU-UK data transfers, incorporate standard contractual clauses into existing agreements, and update your policies, processes and procedural documentation as a result of these changes. We have published a supplement that sets out specific extra or amended information for this pocket guide. Click here to download the supplement. About the authors The IT Governance Privacy Team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, their understanding of the background and drivers for the GDPR, and the input of expert consultants and trainers are combined in this must-have guide to GDPR compliance. Start your compliance journey now and buy this book today.

Multimodal Biometric Systems - Security and Applications (Hardcover): Rashmi Gupta, Manju Khari Multimodal Biometric Systems - Security and Applications (Hardcover)
Rashmi Gupta, Manju Khari
R4,128 Discovery Miles 41 280 Ships in 12 - 17 working days

Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action. The current performance of some biometric systems in terms of their error rates, robustness, and system security may prove to be inadequate for large-scale applications to process millions of users at a high rate of throughput. This book focuses on fusion in biometric systems. It discusses the present level, the limitations, and proposed methods to improve performance. It describes the fundamental concepts, current research, and security-related issues. The book will present a computational perspective, identify challenges, and cover new problem-solving strategies, offering solved problems and case studies to help with reader comprehension and deep understanding. This book is written for researchers, practitioners, both undergraduate and post-graduate students, and those working in various engineering fields such as Systems Engineering, Computer Science, Information Technology, Electronics, and Communications.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,441 Discovery Miles 14 410 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

The Governance of Online Expression in a Networked World (Hardcover): Helena Carrapico, Benjamin Farrand The Governance of Online Expression in a Networked World (Hardcover)
Helena Carrapico, Benjamin Farrand
R1,779 Discovery Miles 17 790 Ships in 10 - 15 working days

In recent years, we have witnessed the mushrooming of pro- democracy and protest movements not only in the Arab world, but also within Europe and the Americas. Such movements have ranged from popular upheavals, like in Tunisia and Egypt, to the organization of large-scale demonstrations against unpopular policies, as in Spain, Greece and Poland. What connects these different events are not only their democratic aspirations, but also their innovative forms of communication and organization through online means, which are sometimes considered to be outside of the State's control. At the same time, however, it has become more and more apparent that countries are attempting to increase their understanding of, and control over, their citizens' actions in the digital sphere. This involves striving to develop surveillance instruments, control mechanisms and processes engineered to dominate the digital public sphere, which necessitates the assistance and support of private actors such as Internet intermediaries. Examples include the growing use of Internet surveillance technology with which online data traffic is analysed, and the extensive monitoring of social networks. Despite increased media attention, academic debate on the ambivalence of these technologies, mechanisms and techniques remains relatively limited, as is discussion of the involvement of corporate actors. The purpose of this edited volume is to reflect on how Internet-related technologies, mechanisms and techniques may be used as a means to enable expression, but also to restrict speech, manipulate public debate and govern global populaces. This book was published as a special issue of the Journal of Information Technology and Politics.

Social Networks, Terrorism and Counter-terrorism - Radical and connected (Hardcover): Martin Bouchard Social Networks, Terrorism and Counter-terrorism - Radical and connected (Hardcover)
Martin Bouchard
R4,586 Discovery Miles 45 860 Ships in 12 - 17 working days

This book examines two key themes in terrorism studies, the radicalization process and counter-terrorism policies, through the lens of social networks. The book aims to show that networks should be at the forefront not only when analysing terrorists, but also when assessing the responses to their actions. The volume makes a unique contribution by addressing two relatively new themes for terrorism studies. First it puts social relations and cooperation issues at the forefront - an approach often identified as crucial to future breakthroughs in the field. Second, many contributions tackle the role of the Internet in the process of radicalization and in recruitment more generally, a highly debated topic in the field today. In addition, the book provides a valuable mix of review essays, critical essays, and original empirical studies. This balanced approach is also found in the topics covered by the authors, as well as their academic disciplines, which include sociology, computer science, geography, history, engineering, and criminology as well as political science. Many of the true advances in terrorism studies depend on the successful collaboration of multi-disciplinary teams, each with a different set of methodological and conceptual tools. This volume reflects the newfound diversity in this field and is a true product of its time. This book will be of much interest to students of terrorism studies, social networks, security studies, sociology, criminology and international relations in general.

Technology and Human Development (Hardcover): Ilse Oosterlaken Technology and Human Development (Hardcover)
Ilse Oosterlaken
R4,123 Discovery Miles 41 230 Ships in 12 - 17 working days

This book introduces the capability approach - in which wellbeing, agency and justice are the core values - as a powerful normative lens to examine technology and its role in development. This approach attaches central moral importance to individual human capabilities, understood as effective opportunities people have to lead the kind of lives they have reason to value. The book examines the strengths, limitations and versatility of the capability approach when applied to technology, and shows the need to supplement it with other approaches in order to deal with the challenges that technology raises. The first chapter places the capability approach within the context of broader debates about technology and human development - discussing amongst others the appropriate technology movement. The middle part then draws on philosophy and ethics of technology in order to deepen our understanding of the relation between technical artefacts and human capabilities, arguing that we must simultaneously 'zoom in' on the details of technological design and 'zoom out' to see the broader socio-technical embedding of a technology. The book examines whether technology is merely a neutral instrument that expands what people can do and be in life, or whether technology transfers may also impose certain views of what it means to lead a good life. The final chapter examines the capability approach in relation to contemporary debates about 'ICT for Development' (ICT4D), as the technology domain where the approach has been most extensively applied so far. This book is an invaluable read for students in Development Studies and STS, as well as policy makers, practitioners and engineers looking for an accessible overview of technology and development from the perspective of the capability approach.

Representation and Processing of Spatial Expressions (Paperback): Patrick Olivier, Klaus-Peter Gapp Representation and Processing of Spatial Expressions (Paperback)
Patrick Olivier, Klaus-Peter Gapp
R797 Discovery Miles 7 970 Ships in 10 - 15 working days

Coping with spatial expressions in a plausible manner is a crucial problem in a number of research fields, specifically cognitive science, artificial intelligence, psychology, and linguistics. This volume contains a set of theoretical analyses as well as accounts of applications which deal with the problems of representing and processing spatial expressions. These include dialogue understanding using mental images; interfaces to CAD and multi-media systems, such as natural language querying of photographic databases; speech-driven design and assembly; machine translation systems; spatial queries for Geographic Information Systems; and systems which generate spatial descriptions on the basis of maps, cognitive maps, or other spatial representations, such as intelligent vehicle navigation systems. Though there have been many different approaches to the representation and processing of spatial expressions, most existing computational characterizations have so far been restricted to particularly narrow problem domains, usually specific spatial contexts determined by overall system goals. To date, artificial intelligence research in this field has rarely taken advantage of language and spatial cognition studies carried out by the cognitive science community. One of the fundamental aims of this book is to bring together research from both disciplines in the belief that artificial intelligence has much to gain from an appreciation of cognitive theories.

Libr@ries - Changing Information Space and Practice (Paperback): Cushla Kapitzke, Bertram C. Bruce Libr@ries - Changing Information Space and Practice (Paperback)
Cushla Kapitzke, Bertram C. Bruce
R1,668 Discovery Miles 16 680 Ships in 12 - 17 working days

This volume is the first to examine the social, cultural, and political implications of the shift from the traditional forms and functions of print-based libraries to the delivery of online information in educational contexts. Libr@ries are conceptualized as physical places, virtual spaces, communities of literate practice, and discourses of information work. Despite the centrality of libraries in literacy and learning, the study of libraries has remained isolated within the disciplinary boundaries of information and library science since its inception in the early twentieth century. The aim of this book is to problematize and thereby mainstream this field of intellectual endeavor and inquiry. Collectively the contributors interrogate the presuppositions of current library practice, seek to understand how library as place and library as space blend together in ways that may be both contradictory and complementary, and envision new modes of information access and new multimodal literacies enabled by online environments. Libr@ries: Changing Information Space and Practice is intended for advanced undergraduate and graduate students, researchers, and educators in the fields of literacy and multiliteracies education, communication technologies in education, library sciences, information and communication studies, media and cultural studies, and the sociology of computer-mediated space.

Diagnostic Expertise in Organizational Environments (Hardcover, New Ed): Mark W. Wiggins, Thomas Loveday Diagnostic Expertise in Organizational Environments (Hardcover, New Ed)
Mark W. Wiggins, Thomas Loveday
R3,392 Discovery Miles 33 920 Ships in 12 - 17 working days

Diagnostic Expertise in Organizational Environments provides a state-of-the-art foundation for a new paradigm in expertise research and practice. Skilled diagnosis is essential for accurate and efficient performance across a range of organizational contexts, including aviation, finance, rail, forensic investigation, firefighting, and medicine. However, it is also a complex process, subject to the abilities and experience of individual operators, the culture and practices of organizations, the relationships between operators, and the availability and usefulness of technology. As a consequence, diagnostic skills can be difficult to learn, maintain, and evaluate. This volume is a comprehensive approach that examines diagnostic expertise at the level of the individual practitioner, in the social context, and at the organizational level. The chapter authors comprise both academics and highly skilled practitioners so that there is a clear transition from understanding the problem of diagnostic skills to the implementation of solutions, either through redesign, training, and/or selection. It will appeal to those academics and practitioners interested and involved in this field and also prove useful to students of psychology, cognitive science education and/or computer interaction.

COVID-19 - Origin, Detection and Impact Analysis Using Artificial Intelligence Computational Techniques (Hardcover): Parag... COVID-19 - Origin, Detection and Impact Analysis Using Artificial Intelligence Computational Techniques (Hardcover)
Parag Verma, Ankur Dumka, Alaknanda Ashok, Amit Dumka, Anuj Bhardwaj
R3,762 Discovery Miles 37 620 Ships in 12 - 17 working days

This book highlights progress in terms of Virus Biology and Infection Detection, Prevention, and Control, along with Screening, Testing, and Detection Techniques, that will provide learners and researchers (from basic to advanced) with the most innovative computer-driven methodologies for the fight against COVID-19. In addition, this book also covers the Pre- and Post-Impact of the COVID-19 Pandemic Crisis that will definitely provide useful content for researchers to think broadly about the analytical areas affected by COVID-19. This ultimately shows different paths to the same destination to help understand the nature of the COVID-19 pandemic and how to avoid it in the future.

Net Zeros and Ones - How Data Erasure Promotes Sustainability, Privacy, and Security (Paperback): R Stiennon Net Zeros and Ones - How Data Erasure Promotes Sustainability, Privacy, and Security (Paperback)
R Stiennon
R451 Discovery Miles 4 510 Ships in 12 - 17 working days

Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished industry veterans delivers a comprehensive guide to managing permanent and sustainable data erasure while complying with regulatory, legal, and industry requirements. In the book, you'll discover the why, how, and when of data sanitization, including why it is a crucial component in achieving circularity within IT operations. You will also learn about future-proofing yourself against security breaches and data leaks involving your most sensitive information--all while being served entertaining industry anecdotes and commentary from leading industry personalities. The authors also discuss: Several new standards on data erasure, including the soon-to-be published standards by the IEEE and ISO How data sanitization strengthens a sustainability or Environmental, Social, and Governance (ESG) program How to adhere to data retention policies, litigation holds, and regulatory frameworks that require certain data to be retained for specific timeframes An ideal resource for ESG, data protection, and privacy professionals, Net Zeros and Ones will also earn a place in the libraries of application developers and IT asset managers seeking a one-stop explanation of how data erasure fits into their data and asset management programs.

Cyberspace and Cybersecurity (Paperback, 2nd edition): George Kostopoulos Cyberspace and Cybersecurity (Paperback, 2nd edition)
George Kostopoulos
R1,393 Discovery Miles 13 930 Ships in 12 - 17 working days

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

Social Media Warfare - Equal Weapons for All (Paperback): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Paperback)
Michael Erbschloe
R1,395 Discovery Miles 13 950 Ships in 12 - 17 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback): William R. Simpson Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback)
William R. Simpson
R1,409 Discovery Miles 14 090 Ships in 12 - 17 working days

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.

Analyzing and Securing Social Networks (Paperback): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Paperback)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R1,436 Discovery Miles 14 360 Ships in 12 - 17 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Cyber-Risk and Youth - Digital Citizenship, Privacy, and Surveillance (Paperback): Michael Adorjan, Rosemary Ricciardelli Cyber-Risk and Youth - Digital Citizenship, Privacy, and Surveillance (Paperback)
Michael Adorjan, Rosemary Ricciardelli
R1,293 Discovery Miles 12 930 Ships in 12 - 17 working days

Cyber-risks are moving targets and societal responses to combat cyber-victimization are often met by the distrust of young people. Drawing on original research, this book explores how young people define, perceive, and experience cyber-risks, how they respond to both the messages they are receiving from society regarding their safety online, and the various strategies and practices employed by society in regulating their online access and activities. This book complements existing quantitative examinations of cyberbullying assessing its extent and frequency, but also aims to critique and extend knowledge of how cyber-risks such as cyberbullying are perceived and responded to. Following a discussion of their methodology and their experiences of conducting research with teens, the authors discuss the social network services that teens are using and what they find appealing about them, and address teens' experiences with and views towards parental and school-based surveillance. The authors then turn directly to areas of concern expressed by their participants, such as relational aggression, cyberhacking, privacy, and privacy management, as well as sexting. The authors conclude by making recommendations for policy makers, educators and teens - not only by drawing from their own theoretical and sociological interpretations of their findings, but also from the responses and recommendations given by their participants about going online and tackling cyber-risk. One of the first texts to explore how young people respond to attempts to regulate online activity, this book will be key reading for those involved in research and study surrounding youth crime, cybercrime, youth culture, media and crime, and victimology - and will inform those interested in addressing youth safety online how to best approach what is often perceived as a sensitive and volatile social problem.

An Anthropology of Robots and AI - Annihilation Anxiety and Machines (Hardcover): Kathleen Richardson An Anthropology of Robots and AI - Annihilation Anxiety and Machines (Hardcover)
Kathleen Richardson
R4,580 Discovery Miles 45 800 Ships in 12 - 17 working days

This book explores the making of robots in labs at the Massachusetts Institute of Technology (MIT). It examines the cultural ideas that go into the making of robots, and the role of fiction in co-constructing the technological practices of the robotic scientists. The book engages with debates in anthropological theorizing regarding the way that robots are reimagined as intelligent, autonomous and social and weaved into lived social realities. Richardson charts the move away from the "worker" robot of the 1920s to the "social" one of the 2000s, as robots are reimagined as companions, friends and therapeutic agents.

Electronic Collaboration in Science (Paperback): Stephen H. Koslow, Michael F. Huerta Electronic Collaboration in Science (Paperback)
Stephen H. Koslow, Michael F. Huerta
R1,694 Discovery Miles 16 940 Ships in 12 - 17 working days

The increasingly sophisticated and powerful information technology we are creating plays an ever more prominent role in facilitating interaction and cooperation in everyday life. The time has come to harness it in the service of scientific research. This pathbreaking book describes the technical and social challenges and opportunities of electronic collaboration and offers specific examples of the ways in which it has not only facilitated but in some cases enabled work by scientists. Key players all, the chapter authors illuminate the general issues with their first-hand accounts. Very few researchers today can work in isolation. Electronic Collaboration in Science provides the first clear road map for all whose investigations are leading them into this fascinating new multidisciplinary domain.

Enterprise Level Security 1 & 2 (Hardcover): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Hardcover)
Kevin Foltz, William R. Simpson
R3,237 Discovery Miles 32 370 Ships in 12 - 17 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Ethics in Information Technology - A Practical Guide (Paperback): G K Awari, Sarvesh V. Warjurkar Ethics in Information Technology - A Practical Guide (Paperback)
G K Awari, Sarvesh V. Warjurkar
R2,118 Discovery Miles 21 180 Ships in 9 - 15 working days

Discusses the legal, ethical, and societal implications of information technology. Covers important topics including infringement of intellectual property, security risks, Internet crime, and social networking. Provides in-depth knowledge of privacy techniques. Discusses concepts of intellectual property (IPR) and issues in software development.

Current Research on Information Technologies and Society - Papers from the 2013 Meetings of the American Sociological... Current Research on Information Technologies and Society - Papers from the 2013 Meetings of the American Sociological Association (Hardcover)
Jennifer Earl, Katrina Kimport
R555 Discovery Miles 5 550 Ships in 10 - 15 working days

Research on communication and information technologies is of growing importance to sociology and the interdisciplinary examination of communication and (new) media. This volume includes eight chapters examining recent developments in the field, illustrating the maturation, vibrancy, and diversity of this field of study as well as pointing to rich new avenues for scholarly exploration. Contributions aptly chart three key developments that characterize current research on communication and digital media. First, chapters demonstrate the maturation of work on measurement, demonstrating the importance of refining measurements of online activities and their consequences. For instance, contributions evaluate: social network measures frequently used in online research; alternative measures for online activity; and alternative measures of Twitter activity. Second, the volume showcases continued work on understanding user behaviour, including research on the consequence of reward systems similar to badges and on the limitations of purely technological solutions to social dilemmas in emergency preparedness. Finally, chapters identify emerging questions for the field related to social media, such as research on potential privacy and identity implications of social media, different dispositions toward social media use, and variation in levels of social media usage. This book was originally published as a special issue of Information, Communication & Society.

Digital Learning: The Key Concepts (Paperback, 2nd edition): Frank Rennie, Keith Smyth Digital Learning: The Key Concepts (Paperback, 2nd edition)
Frank Rennie, Keith Smyth
R445 R421 Discovery Miles 4 210 Save R24 (5%) Ships in 5 - 10 working days

The new edition of Digital Learning: The Key Concepts is the perfect reference for anyone seeking to navigate the myriad of named concepts, approaches, issues and technologies associated with digital learning. Key terms are explained succinctly, making this book ideal to dip into for a quick answer, or to read from cover-to-cover, in order to gain a mastery of how digital concepts fit within the world of education. Fully updated to include important developments in digital practice and technology in education over the last ten years, this book takes the reader from A to Z through a range of relevant topics including: * Course design * Digital scholarship * Learning design * Open education * Personal learning environments * Social media and social networking. Ideal as an introductory guide, or as a reference book for ongoing referral, this quick-to-use and comprehensive guide is fully crossreferenced and complete with suggestions for further reading and exploration, making it an essential resource for anyone looking to extend their understanding of digital practices, techniques and pedagogic concepts.

The Role of Communication in Learning To Model (Paperback): Paul Brna, Michael Baker, Keith Stenning, Andree Tiberghien The Role of Communication in Learning To Model (Paperback)
Paul Brna, Michael Baker, Keith Stenning, Andree Tiberghien
R1,654 Discovery Miles 16 540 Ships in 12 - 17 working days

In this book, a number of experts from various disciplines take a look at three different strands in learning to model. They examine the activity of modeling from disparate theoretical standpoints, taking into account the individual situation of the individuals involved. The chapters seek to bridge the modeling of communication and the modeling of particular scientific domains. In so doing, they seek to throw light on the educational communication that goes on in conceptual learning. Taken together, the chapters brought together in this volume illustrate the diversity and vivacity of research on a relatively neglected, yet crucially important aspect of education across disciplines: learning to model. A common thread across the research presented is the view that communication and interaction, as fundamental to most educational practices and as a repository of conceptual understanding and a learning mechanism in itself, is intimately linked to elaborating meaningful, coherent, and valid representations of the world. The editors hope this volume will contribute to both the fundamental research in its field and ultimately provide results that can be of practical value in designing new situations for teaching and learning modeling, particularly those involving computers.

Mobile Social Networking and Computing - A Multidisciplinary Integrated Perspective (Hardcover): Yufeng Wang, Jianhua Ma Mobile Social Networking and Computing - A Multidisciplinary Integrated Perspective (Hardcover)
Yufeng Wang, Jianhua Ma
R3,125 Discovery Miles 31 250 Ships in 12 - 17 working days

Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanisms, and techniques with the capacity to autonomously manage their functioning and evolution. Currently, most books about mobile networks focus mainly on the technical point of view. Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective not only addresses the theoretical aspects of MSN and computing, but also introduces and categorizes existing applications. It supplies a multidisciplinary perspective that considers the technology, economics, social sciences, and psychology behind MSNs. In addition to fundamental theory, the book investigates the practical issues in MSN, including characteristics, inner structural relationship, incentive mechanisms, resource allocating, information diffusion, search, ranking, privacy, trust, and reputation. Introducing recently developed technologies, modes, and models, the book provides two distinct (but related) viewpoints about MSN applications: socially inspired networking technology and networking technology that uses recent advancements to enhance quality of life. The text illustrates the interaction between the macrolevel structure and the local rational behaviors (microlevel) in MSN. It summarizes currently available MSN development platforms, including Android and iOS, and introduces and categorizes existing applications related to MSN and computing. Both location-based service (LBS) and mobile social networks in proximity (MSNPs) are presented in a comprehensive manner. Highlighting key research opportunities, this much-needed reference outlines incentive mechanisms inspired by classical economics, behavioral economics, and social psychology, and, perhaps for the first time, it presents a summary of the economic and business models of MSNs.

Kawaii Engineering - Measurements, Evaluations, and Applications of Attractiveness (Hardcover, 1st ed. 2019): Michiko Ohkura Kawaii Engineering - Measurements, Evaluations, and Applications of Attractiveness (Hardcover, 1st ed. 2019)
Michiko Ohkura
R4,271 Discovery Miles 42 710 Ships in 12 - 17 working days

"Kawaii" is a Japanese word that denotes "cute," "lovable," or "charming" although it does not have exactly the same meaning as those adjectives. This book proposes engineering methodologies for systematic measurement of the affective perception of kawaii, by using virtual reality and biological signals, and discusses the effectiveness of kawaii engineering for designing industrial products and services. Kawaii can draw sympathy from people and can embody a special kind of cute design, which reduces fear and makes dull information more acceptable and appealing. Following the introduction of the background of kawaii engineering in Chapter 1, Chapters 2 and 3 describe experiments on the systematic measurement and evaluation methods for kawaii products and affective evaluation experiments. Chapter 4 proposes a mathematical model to identify the physical attributes that determine kawaii in motion. Chapters 5 and 6 explain research that uses biological signals and eye-tracking. After a brief survey of psychological research on kawaii and cuteness in Chapter 7, Chapters 8 and 9 introduce the use of spoons designed to stimulate the appetite of the elderly and the practical implementation of an emotion-driven camera. Chapters 10-14 explain experimental research that examines kawaii perception of people from various cultural backgrounds. Kawaii Engineering will appeal to those who work on affective computing, product design, user experience design, virtual reality, and biological signals.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information And Communications…
Dana van der Merwe Paperback R1,119 R961 Discovery Miles 9 610
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R449 Discovery Miles 4 490
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R312 Discovery Miles 3 120
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R273 Discovery Miles 2 730
Financial Regulation and Technology - A…
Iain Sheridan Hardcover R3,986 Discovery Miles 39 860
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi Paperback R620 R500 Discovery Miles 5 000
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,483 Discovery Miles 64 830
Extremely Hardcore - Inside Elon Musk's…
Zoë Schiffer Hardcover R655 R449 Discovery Miles 4 490

 

Partners