0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (385)
  • R250 - R500 (1,133)
  • R500+ (11,175)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

The Role of Communication in Learning To Model (Paperback): Paul Brna, Michael Baker, Keith Stenning, Andree Tiberghien The Role of Communication in Learning To Model (Paperback)
Paul Brna, Michael Baker, Keith Stenning, Andree Tiberghien
R1,654 Discovery Miles 16 540 Ships in 12 - 17 working days

In this book, a number of experts from various disciplines take a look at three different strands in learning to model. They examine the activity of modeling from disparate theoretical standpoints, taking into account the individual situation of the individuals involved. The chapters seek to bridge the modeling of communication and the modeling of particular scientific domains. In so doing, they seek to throw light on the educational communication that goes on in conceptual learning. Taken together, the chapters brought together in this volume illustrate the diversity and vivacity of research on a relatively neglected, yet crucially important aspect of education across disciplines: learning to model. A common thread across the research presented is the view that communication and interaction, as fundamental to most educational practices and as a repository of conceptual understanding and a learning mechanism in itself, is intimately linked to elaborating meaningful, coherent, and valid representations of the world. The editors hope this volume will contribute to both the fundamental research in its field and ultimately provide results that can be of practical value in designing new situations for teaching and learning modeling, particularly those involving computers.

Mobile Social Networking and Computing - A Multidisciplinary Integrated Perspective (Hardcover): Yufeng Wang, Jianhua Ma Mobile Social Networking and Computing - A Multidisciplinary Integrated Perspective (Hardcover)
Yufeng Wang, Jianhua Ma
R3,125 Discovery Miles 31 250 Ships in 12 - 17 working days

Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanisms, and techniques with the capacity to autonomously manage their functioning and evolution. Currently, most books about mobile networks focus mainly on the technical point of view. Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective not only addresses the theoretical aspects of MSN and computing, but also introduces and categorizes existing applications. It supplies a multidisciplinary perspective that considers the technology, economics, social sciences, and psychology behind MSNs. In addition to fundamental theory, the book investigates the practical issues in MSN, including characteristics, inner structural relationship, incentive mechanisms, resource allocating, information diffusion, search, ranking, privacy, trust, and reputation. Introducing recently developed technologies, modes, and models, the book provides two distinct (but related) viewpoints about MSN applications: socially inspired networking technology and networking technology that uses recent advancements to enhance quality of life. The text illustrates the interaction between the macrolevel structure and the local rational behaviors (microlevel) in MSN. It summarizes currently available MSN development platforms, including Android and iOS, and introduces and categorizes existing applications related to MSN and computing. Both location-based service (LBS) and mobile social networks in proximity (MSNPs) are presented in a comprehensive manner. Highlighting key research opportunities, this much-needed reference outlines incentive mechanisms inspired by classical economics, behavioral economics, and social psychology, and, perhaps for the first time, it presents a summary of the economic and business models of MSNs.

Kawaii Engineering - Measurements, Evaluations, and Applications of Attractiveness (Hardcover, 1st ed. 2019): Michiko Ohkura Kawaii Engineering - Measurements, Evaluations, and Applications of Attractiveness (Hardcover, 1st ed. 2019)
Michiko Ohkura
R4,271 Discovery Miles 42 710 Ships in 12 - 17 working days

"Kawaii" is a Japanese word that denotes "cute," "lovable," or "charming" although it does not have exactly the same meaning as those adjectives. This book proposes engineering methodologies for systematic measurement of the affective perception of kawaii, by using virtual reality and biological signals, and discusses the effectiveness of kawaii engineering for designing industrial products and services. Kawaii can draw sympathy from people and can embody a special kind of cute design, which reduces fear and makes dull information more acceptable and appealing. Following the introduction of the background of kawaii engineering in Chapter 1, Chapters 2 and 3 describe experiments on the systematic measurement and evaluation methods for kawaii products and affective evaluation experiments. Chapter 4 proposes a mathematical model to identify the physical attributes that determine kawaii in motion. Chapters 5 and 6 explain research that uses biological signals and eye-tracking. After a brief survey of psychological research on kawaii and cuteness in Chapter 7, Chapters 8 and 9 introduce the use of spoons designed to stimulate the appetite of the elderly and the practical implementation of an emotion-driven camera. Chapters 10-14 explain experimental research that examines kawaii perception of people from various cultural backgrounds. Kawaii Engineering will appeal to those who work on affective computing, product design, user experience design, virtual reality, and biological signals.

Texting Toward Utopia - Kids, Writing, and Resistance (Paperback): Ben Agger Texting Toward Utopia - Kids, Writing, and Resistance (Paperback)
Ben Agger
R1,282 Discovery Miles 12 820 Ships in 12 - 17 working days

This book examines the contemporary era where parents complain that children today don't do their homework because they are distracted by the Internet, texting, and video games. Texting Toward Utopia presents the writings of todays children and develops the argument that this is actually a time of mass literary, in which young people write furiously, albeit often below the adult radar. Agger argues that where texting replaces textbooks, the writing may be emoticon-laden, slangy, or terse, but it is still profound, as children (and their parents) engage in resistance and write for a better world. This book is a guide to understanding the meeting point between a new generation of children and new communication technologies.

A Fresh Look at Fraud - Theoretical and Applied Perspectives (Paperback): Yaniv Hanoch, Stacey Wood A Fresh Look at Fraud - Theoretical and Applied Perspectives (Paperback)
Yaniv Hanoch, Stacey Wood
R1,141 R1,062 Discovery Miles 10 620 Save R79 (7%) Ships in 9 - 15 working days

Features cross-disciplinary exchange among psychologists, criminologists, and computer scientists addressing fraud, scams, and financial abuse Includes discussion of the 'Next Frontiers' in research and important insights on how to create solutions

To the Cloud - Big Data in a Turbulent World (Hardcover): Vincent Mosco To the Cloud - Big Data in a Turbulent World (Hardcover)
Vincent Mosco
R5,337 Discovery Miles 53 370 Ships in 12 - 17 working days

In the wake of revelations about National Security Agency activities many of which occur in the cloud this book offers both enlightenment and a critical view. Cloud computing and big data are arguably the most significant forces in information technology today. In clear prose, To the Cloud explores where the cloud originated, what it means, and how important it is for business, government, and citizens. It describes the intense competition among cloud companies like Amazon and Google, the spread of the cloud to government agencies like the controversial NSA, and the astounding growth of entire cloud cities in China. From advertising to trade shows, the cloud and big data are furiously marketed to the world, even as dark clouds loom over environmental, privacy, and employment issues that arise from the cloud. Is the cloud the long-promised information utility that will solve many of the world s economic and social problems? Or is it just marketing hype? To the Cloud provides the first thorough analysis of the potential and the problems of a technology that may very well disrupt the world.

The Gender Politics of ICT (Paperback): Jacqueline Achibald, Judy Emms, Frances Grundy, Janet Payne, Eva Turner The Gender Politics of ICT (Paperback)
Jacqueline Achibald, Judy Emms, Frances Grundy, Janet Payne, Eva Turner
R558 Discovery Miles 5 580 Ships in 12 - 17 working days
Technology - New Trajectories in Law (Hardcover): Penny Crofts, Honni Van Rijswijk Technology - New Trajectories in Law (Hardcover)
Penny Crofts, Honni Van Rijswijk
R1,573 Discovery Miles 15 730 Ships in 12 - 17 working days

Placing contemporary technological developments in their historical context, this book argues for the importance of law in their regulation. Technological developments are focused upon overcoming physical and human constraints. There are no normative constraints inherent in the quest for ongoing and future technological development. In contrast, law proffers an essential normative constraint. Just because we can do something, does not mean that we should. Through the application of critical legal theory and jurisprudence to pro-actively engage with technology, this book demonstrates why legal thinking should be prioritised in emerging technological futures. This book articulates classic skills and values such as ethics and justice to ensure that future and ongoing legal engagements with socio-technological developments are tempered by legal normative constraints. Encouraging them to foreground questions of justice and critique when thinking about law and technology, the book addresses law students and teachers, lawyers and critical thinkers concerned with the proliferation of technology in our lives.

The Leisure Commons - A Spatial History of Web 2.0 (Hardcover): Payal Arora The Leisure Commons - A Spatial History of Web 2.0 (Hardcover)
Payal Arora
R3,563 R2,945 Discovery Miles 29 450 Save R618 (17%) Ships in 12 - 17 working days

There is much excitement about Web 2.0 as an unprecedented, novel, community-building space for experiencing, producing, and consuming leisure, particularly through social network sites. What is needed is a perspective that is invested in neither a utopian or dystopian posture but sees historical continuity to this cyberleisure geography. This book investigates the digital public sphere by drawing parallels to another leisure space that shares its rhetoric of being open, democratic, and free for all: the urban park. It makes the case that the history and politics of public parks as an urban commons provides fresh insight into contemporary debates on corporatization, democratization and privatization of the digital commons. This book takes the reader on a metaphorical journey through multiple forms of public parks such as Protest Parks, Walled Gardens, Corporate Parks, Fantasy Parks, and Global Parks, addressing issues such as virtual activism, online privacy/surveillance, digital labor, branding, and globalization of digital networks. Ranging from the 19th century British factory garden to Tokyo Disneyland, this book offers numerous spatial metaphors to bring to life aspects of new media spaces. Readers looking for an interdisciplinary, historical and spatial approach to staid Web 2.0 discourses will undoubtedly benefit from this text.

Automata and Computability - A Programmer's Perspective (Paperback): Ganesh Gopalakrishnan Automata and Computability - A Programmer's Perspective (Paperback)
Ganesh Gopalakrishnan
R1,307 Discovery Miles 13 070 Ships in 12 - 17 working days

Automata and Computability is a class-tested textbook which provides a comprehensive and accessible introduction to the theory of automata and computation. The author uses illustrations, engaging examples, and historical remarks to make the material interesting and relevant for students. It incorporates modern/handy ideas, such as derivative-based parsing and a Lambda reducer showing the universality of Lambda calculus. The book also shows how to sculpt automata by making the regular language conversion pipeline available through a simple command interface. A Jupyter notebook will accompany the book to feature code, YouTube videos, and other supplements to assist instructors and students Features Uses illustrations, engaging examples, and historical remarks to make the material accessible Incorporates modern/handy ideas, such as derivative-based parsing and a Lambda reducer showing the universality of Lambda calculus Shows how to "sculpt" automata by making the regular language conversion pipeline available through simple command interface Uses a mini functional programming (FP) notation consisting of lambdas, maps, filters, and set comprehension (supported in Python) to convey math through PL constructs that are succinct and resemble math Provides all concepts are encoded in a compact Functional Programming code that will tesselate with Latex markup and Jupyter widgets in a document that will accompany the books. Students can run code effortlessly. All the code can be accessed here.

Guide to the De-Identification of Personal Health Information (Paperback): Khaled El Emam Guide to the De-Identification of Personal Health Information (Paperback)
Khaled El Emam
R1,408 Discovery Miles 14 080 Ships in 12 - 17 working days

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-based methodology and provides a general overview of its steps. The book supplies a detailed case for why de-identification is important as well as best practices to help you pin point when it is necessary to apply de-identification in the disclosure of personal health information. It also: Outlines practical methods for de-identification Describes how to measure re-identification risk Explains how to reduce the risk of re-identification Includes proofs and supporting reference material Focuses only on transformations proven to work on health information-rather than covering all possible approaches, whether they work in practice or not Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible-while protecting patients' privacy and complying with current regulations.

Cyber-Security Threats, Actors, and Dynamic Mitigation (Hardcover): Nicholas Kolokotronis, Stavros Shiaeles Cyber-Security Threats, Actors, and Dynamic Mitigation (Hardcover)
Nicholas Kolokotronis, Stavros Shiaeles
R3,406 Discovery Miles 34 060 Ships in 12 - 17 working days

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT. With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits. Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.

The Shortcut - Why Intelligent Machines Do Not Think Like Us (Paperback): Nello Cristianini The Shortcut - Why Intelligent Machines Do Not Think Like Us (Paperback)
Nello Cristianini
R770 Discovery Miles 7 700 Ships in 9 - 15 working days

- The author is one of the most influential AI reseachers of recent decades. - Written in an accessible language, the book provides a probing account of AI today and proposes a new narrative to connect and make sense of events that happened in the recent tumultuous past and enable us to think soberly about the road ahead. - The book is divided into ten carefully crafted and easily-digestible chapters, each grapples with an important question for AI, ranging from the scientific concepts that underpin the technology to wider implications for society, using real examples wherever possible.

The Internet Is Not What You Think It Is - A History, a Philosophy, a Warning (Hardcover): Justin E. H. Smith The Internet Is Not What You Think It Is - A History, a Philosophy, a Warning (Hardcover)
Justin E. H. Smith
R580 Discovery Miles 5 800 Ships in 12 - 17 working days

An original deep history of the internet that tells the story of the centuries-old utopian dreams behind it-and explains why they have died today Many think of the internet as an unprecedented and overwhelmingly positive achievement of modern human technology. But is it? In The Internet Is Not What You Think It Is, Justin Smith offers an original deep history of the internet, from the ancient to the modern world-uncovering its surprising origins in nature and centuries-old dreams of radically improving human life by outsourcing thinking to machines and communicating across vast distances. Yet, despite the internet's continuing potential, Smith argues, the utopian hopes behind it have finally died today, killed by the harsh realities of social media, the global information economy, and the attention-destroying nature of networked technology. Ranging over centuries of the history and philosophy of science and technology, Smith shows how the "internet" has been with us much longer than we usually think. He draws fascinating connections between internet user experience, artificial intelligence, the invention of the printing press, communication between trees, and the origins of computing in the machine-driven looms of the silk industry. At the same time, he reveals how the internet's organic structure and development root it in the natural world in unexpected ways that challenge efforts to draw an easy line between technology and nature. Combining the sweep of intellectual history with the incisiveness of philosophy, The Internet Is Not What You Think It Is cuts through our daily digital lives to give a clear-sighted picture of what the internet is, where it came from, and where it might be taking us in the coming decades.

Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback): Sinjini Mitra, Mikhail Gofman Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback)
Sinjini Mitra, Mikhail Gofman
R1,474 Discovery Miles 14 740 Ships in 12 - 17 working days

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,394 Discovery Miles 13 940 Ships in 12 - 17 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

Network Neutrality and Digital Dialogic Communication - How Public, Private and Government Forces Shape Internet Policy... Network Neutrality and Digital Dialogic Communication - How Public, Private and Government Forces Shape Internet Policy (Paperback)
Alison N Novak, Melinda Sebastian
R650 Discovery Miles 6 500 Ships in 12 - 17 working days

In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet. Using dialogic communication tactics, the public, governmental actors and organizations impacted the ruling through YouTube comments, the FCC online system and social network communities. Network neutrality, which requires that all digital sites can be accessed with equal speed and ability, is an important example of how dialogic communication facilitates public engagement in policy debates. However, the practice and ability of the public, organizations and media to engage in dialogic communication are also greatly impacted by the FCC's decision. This book reflects on decades of global engagement in the network neutrality debate and the evolution of dialogic communication techniques used to shape one of the most relevant and critical digital policies in history.

Wired Citizenship - Youth Learning and Activism in the Middle East (Hardcover, New): Linda Herrera Wired Citizenship - Youth Learning and Activism in the Middle East (Hardcover, New)
Linda Herrera
R4,592 Discovery Miles 45 920 Ships in 12 - 17 working days

Wired Citizenship examines the evolving patterns of youth learning and activism in the Middle East and North Africa (MENA). In today's digital age, in which formal schooling often competes with the peer-driven outlets provided by social media, youth all over the globe have forged new models of civic engagement, rewriting the script of what it means to live in a democratic society. As a result, state-society relationships have shifted-never more clearly than in the MENA region, where recent uprisings were spurred by the mobilization of tech-savvy and politicized youth. Combining original research with a thorough exploration of theories of democracy, communications, and critical pedagogy, this edited collection describes how youth are performing citizenship, innovating systems of learning, and re-imagining the practices of activism in the information age. Recent case studies illustrate the context-specific effects of these revolutionary new forms of learning and social engagement in the MENA region.

Driver Acceptance of New Technology - Theory, Measurement and Optimisation (Hardcover, New Ed): Michael A. Regan, Tim Horberry,... Driver Acceptance of New Technology - Theory, Measurement and Optimisation (Hardcover, New Ed)
Michael A. Regan, Tim Horberry, Alan Stevens
R4,764 Discovery Miles 47 640 Ships in 12 - 17 working days

Acceptance of new technology and systems by drivers is an important area of concern to governments, automotive manufacturers and equipment suppliers, especially technology that has significant potential to enhance safety. To be acceptable, new technology must be useful and satisfying to use. If not, drivers will not want to have it, in which case it will never achieve the intended safety benefit. Even if they have the technology, drivers may not use it if it is deemed unacceptable, or may not use it in the manner intended by the designer. At worst, they may seek to disable it. This book brings into a single edited volume the accumulating body of thinking and research on driver and operator acceptance of new technology. Bringing together contributions from international experts from around the world, the editors have shaped a book that covers the theory behind acceptance, how it can be measured and how it can be improved. Case studies are presented that provide data on driver acceptance of a wide range of new and emerging vehicle technology. Although driver acceptance is the central focus of this book, acceptance of new technology by operators in other domains, and across cultures, is also investigated. Similarly, perspectives are derived from domains such as human computer interaction, where user acceptance has long been regarded as a key driver of product success. This book comes at a critical time in the history of the modern motor vehicle, as the number of new technologies entering the modern vehicle cockpit rapidly escalates. The goal of this book is to inspire further research and development of new vehicle technology to optimise user acceptance of it; and, in doing so, to maximise its potential to be useful, satisfying to use and able to save human life.

The Future of Digital Data, Heritage and Curation - in a More-than-Human World (Hardcover): Fiona R. Cameron The Future of Digital Data, Heritage and Curation - in a More-than-Human World (Hardcover)
Fiona R. Cameron
R4,156 Discovery Miles 41 560 Ships in 12 - 17 working days

The Future of Digital Data, Heritage and Curation critiques digital cultural heritage concepts and their application to data, developing new theories, curatorial practices and a more-than-human museology for a contemporary and future world. Presenting a diverse range of case examples from around the globe, Cameron offers a critical and philosophical reflection on the ways in which digital cultural heritage is currently framed as societal data worth passing on to future generations in two distinct forms: digitally born and digitizations. Demonstrating that most perceptions of digital cultural heritage are distinctly western in nature, the book also examines the complicity of such heritage in climate change, and environmental destruction and injustice. Going further still, the book theorizes the future of digital data, heritage, curation and the notion of the human in the context of the profusion of new types of societal data and production processes driven by the intensification of data economies and through the emergence of new technologies. In so doing, the book makes a case for the development of new types of heritage that comprise AI, automated systems, biological entities, infrastructures, minerals and chemicals - all of which have their own forms of agency, intelligence and cognition. The Future of Digital Data, Heritage and Curation is essential reading for academics and students engaged in the study of museums, archives, libraries, galleries, archaeology, cultural heritage management, information management, curatorial studies and digital humanities.

100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback): Nick Vandome 100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback)
Nick Vandome
R159 Discovery Miles 1 590 Ships in 12 - 17 working days
Technocrime: Policing and Surveillance (Paperback): Stephane Leman-Langlois Technocrime: Policing and Surveillance (Paperback)
Stephane Leman-Langlois
R1,695 Discovery Miles 16 950 Ships in 12 - 17 working days

The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens. Technology offers not only new tools for committing and fighting crime, but new ways to look for, unveil, label crimes and new ways to know, watch, prosecute and punish criminals. This book attempts to disentangle the realities, the myths, the politics, the theories and the practices of our new, technology-assisted, era of crime and policing. Technocrime, policing and surveillance explores new areas of technocrime and technopolicing, such as credit card fraud, the use of DNA and fingerprint databases, the work of media in creating new crimes and new criminals, as well as the "proper" way of doing policing, and the everyday work of police investigators and intelligence officers, as seen through their own eyes. These chapters offer new avenues for studying technology, crime and control, through innovative social science methodologies. This book builds on the work of Leman-Langlois' last book Technocrime, and brings together fresh perspectives from eminent scholars to consider how our relationship with technology and institutions of social control are being reframed, with particular emphasis on policing and surveillance. Technocrime, policing and surveillance will be of interest to those studying criminal justice, policing and the sociology of surveillance as well as practitioners involved with the legal aspects of law enforcement technologies, , domestic security government departments and consumer advocacy groups.

Networks of Power in Digital Copyright Law and Policy - Political Salience, Expertise and the Legislative Process (Hardcover,... Networks of Power in Digital Copyright Law and Policy - Political Salience, Expertise and the Legislative Process (Hardcover, New)
Benjamin Farrand
R2,947 Discovery Miles 29 470 Ships in 12 - 17 working days

In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.

Designing Robot Behavior in Human-Robot Interactions (Paperback): Changliu Liu, Te Tang, Hsien-Chung Lin, Masayoshi Tomizuka Designing Robot Behavior in Human-Robot Interactions (Paperback)
Changliu Liu, Te Tang, Hsien-Chung Lin, Masayoshi Tomizuka
R1,593 Discovery Miles 15 930 Ships in 12 - 17 working days

In this book, we have set up a unified analytical framework for various human-robot systems, which involve peer-peer interactions (either space-sharing or time-sharing) or hierarchical interactions. A methodology in designing the robot behavior through control, planning, decision and learning is proposed. In particular, the following topics are discussed in-depth: safety during human-robot interactions, efficiency in real-time robot motion planning, imitation of human behaviors from demonstration, dexterity of robots to adapt to different environments and tasks, cooperation among robots and humans with conflict resolution. These methods are applied in various scenarios, such as human-robot collaborative assembly, robot skill learning from human demonstration, interaction between autonomous and human-driven vehicles, etc. Key Features: Proposes a unified framework to model and analyze human-robot interactions under different modes of interactions. Systematically discusses the control, decision and learning algorithms to enable robots to interact safely with humans in a variety of applications. Presents numerous experimental studies with both industrial collaborative robot arms and autonomous vehicles.

Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback): Todd Fitzgerald Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback)
Todd Fitzgerald
R1,456 Discovery Miles 14 560 Ships in 12 - 17 working days

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,181 Discovery Miles 11 810
E-Commerce In South Africa
Adheesh Budree Paperback R403 R325 Discovery Miles 3 250
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay Hardcover R3,520 Discovery Miles 35 200
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R175 Discovery Miles 1 750
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R273 Discovery Miles 2 730
Social Media Marketing - A Quickstudy…
Edwards Poster R226 Discovery Miles 2 260
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Information And Communications…
Dana van der Merwe Paperback R1,119 R961 Discovery Miles 9 610

 

Partners