![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
The importance of data analytics is well known, but how can you get end users to engage with analytics and business intelligence (BI) when adoption of new technology can be frustratingly slow or may not happen at all? Avoid wasting time on dashboards and reports that no one uses with this practical guide to increasing analytics adoption by focusing on people and process, not technology. Pulling together agile, UX and change management principles, Delivering Data Analytics outlines a step-by-step, technology agnostic process designed to shift the organizational data culture and gain buy-in from users and stakeholders at every stage of the project. This book outlines how to succeed and build trust with stakeholders amid the politics, ambiguity and lack of engagement in business. With case studies, templates, checklists and scripts based on the author's considerable experience in analytics and data visualisation, this book covers the full cycle from requirements gathering and data assessment to training and launch. Ensure lasting adoption, trust and, most importantly, actionable business value with this roadmap to creating user-centric analytics projects.
Mokyr provides a long term perspective on the economic impact of technological change, surveying developments in production technologies between 500 BC and 1914.
Much has been written on the grand prospects for "Information Society"; much less on what this might mean in everyday terms. So what do we find when we look at what is happening in a society, Finland, that is one of closest to an information society? Bringing together studies of everyday local practices in workplaces within information society, this book has a special focus on social space and the agency of actors. It includes both theoretical reviews and detailed qualitative research. It also highlights the political challenges of the information society, challenges which are likely to become subjects of international concern.
User interface (UI) design rules and guidelines, developed by early HCI gurus and recognized throughout the field, were based on cognitive psychology (study of mental processes such as problem solving, memory, and language), and early practitioners were well informed of its tenets. But today practitioners with backgrounds in cognitive psychology are a minority, as user interface designers and developers enter the field from a wide array of disciplines. HCI practitioners today have enough experience in UI design that they have been exposed to UI design rules, but it is essential that they understand the psychological basis behind the rules in order to effectively apply them. In Designing with the Mind in Mind, best-selling author Jeff Johnson provides designers with just enough background in perceptual and cognitive psychology that UI design guidelines make intuitive sense rather than being just a list of rules to follow.
This book surveys a 'cluster' of works that seek to explore the
cultures of cyberspace, the Internet and the information society.
It introduces key ideas, and includes detailed discussion of the
work of two key thinkers in this area, Manuel Castells and Donna
Haraway, as well as outlining the development of cyberculture
studies as a field. To do this, the book also explores selected
'moments' in this development, from the early 1990s, when
cyberspace and cyberculture were only just beginning to come
together as ideas, up to the present day, when the field of
cyberculture studies has grown and bloomed, producing innovative
theoretical and empirical work from a diversity of standpoints. Key
topics include:
Cyberculture Theorists is the ideal starting point for anyone wanting to understand how to theorise cyberculture in all its myriad forms.
The U.S., and countries around the globe, are facing an ever-evolving series of health issues, including obesity, food deserts, child hunger, poor maternal health outcomes, and the resurgence of communicable diseases. Traditionally, health communicators and marketers have talked about these issues in a vacuum, in which related information is only visible when people are specifically seeking it out. If we are to give global health the attention it deserves, we need to weave it into our everyday conversations and experiences. Ultimately, we need to normalize the conversation around health. The emergence of everyday online opinion leaders has created a whole new market for shifting consumer perceptions and behaviors. In fact, many of these everyday online opinion leaders, called influencers, have built such large-scale social media presences that they now have the voice, the platform, and the following to reach millions of people with personal points of view on any number of topics. There are great opportunities for engaging with online influencers to support health promotion programs. However, navigating this online community is new to many people. Understanding how this online community works, the opportunities for paid and unpaid engagements, and the value that health programs specifically have with this community, is paramount to successfully working with influencers. This book draws from research with over 400 online influencers, the latest industry data, and practical, real-world experiences working with influencers over the past ten years. An easy-to-read guidebook for marketers and health communicators alike, this book leverages storytelling as a means for sharing lessons-learned and providing readers with practical knowledge about the online marketing industry and influencer community, as they relate to health.
* Targests readers with a background in programming, interested in an introduction/refresher in statistical hypothesis testing * Uses Python throughout * Provides the reader with the opportunity of using the book whenever needed rather than following a sequential path.
Social critics and artificial intelligence experts have long prophesized that computers and robots would soon relegate humans to the dustbin of history. Many among the general population seem to have shared this fear of a dehumanized future. But how are people in the twenty-first century actually reacting to the ever-expanding array of gadgets and networks at their disposal? Is computer anxiety a significant problem, paralyzing and terrorizing millions, or are ever-proliferating numbers of gadgets being enthusiastically embraced? Machines that Become Us explores the increasingly intimate relationship between people and their personal communication technologies. In the first book of its kind, internationally recognized scholars from the United States and Europe explore this topic. Among the technologies analyzed include the Internet, personal digital assistants (PDAs), mobile phones, networked homes, "smart" fabrics and wearable computers, interactive location badges, and implanted monitoring devices. The authors discuss critical policy issues, such as the problems of information resource access and equity, and the recently discovered "digital dropouts" phenomena. The use of the word "become" in the book's title has three different meanings. The first suggests how people use these technologies to broaden their abilities to communicate and to represent themselves to others. Thus the technologies "become" extensions and representatives of the communicators. A second sense of "become" applies to analysis of the way these technologies become physically integrated with the user's clothing and even their bodies. Finally, contributors examine fashion aspects and uses of these technologies, that is, how they are used in ways becoming to the wearer. The conclusions of many chapters are supported by data, including ethnographic observations, attitude surveys and case studies from the United States, Britain, France, Italy, Finland, and Norway. This approach is especially valuable given the dearth of empirical studies in a field that has been traditionally dominated by extrapolation and speculation, and that has focused on possible future states rather than analysis of current situations. Other chapters are integrative, seeking to advance emerging theoretical perspectives. This exciting volume generates new insights concerning the burgeoning electronic confusion that increasingly penetrates and blurs the boundaries of various spheres of life in modern society. Machines That Become Us will be of interest to students of communications and technology, sociologists, and social psychologists.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.
This book explores how predictive policing transforms police work. Police departments around the world have started to use data-driven applications to produce crime forecasts and intervene into the future through targeted prevention measures. Based on three years of field research in Germany and Switzerland, this book provides a theoretically sophisticated and empirically detailed account of how the police produce and act upon criminal futures as part of their everyday work practices. The authors argue that predictive policing must not be analyzed as an isolated technological artifact, but as part of a larger sociotechnical system that is embedded in organizational structures and occupational cultures. The book highlights how, for crime prediction software to come to matter and play a role in more efficient and targeted police work, several translation processes are needed to align human and nonhuman actors across different divisions of police work. Police work is a key function for the production and maintenance of public order, but it can also discriminate, exclude, and violate civil liberties and human rights. When criminal futures come into being in the form of algorithmically produced risk estimates, this can have wide-ranging consequences. Building on empirical findings, the book presents a number of practical recommendations for the prudent use of algorithmic analysis tools in police work that will speak to the protection of civil liberties and human rights as much as they will speak to the professional needs of police organizations. An accessible and compelling read, this book will appeal to students and scholars of criminology, sociology, and cultural studies as well as to police practitioners and civil liberties advocates, in addition to all those who are interested in how to implement reasonable forms of data-driven policing.
Combining a stimulating blend of academic authority and senior practitioner experience, this book tackles the principle of openness to official documentation and information flow. It covers important areas such as the Hutton Report into the death of Dr David Kelly, the freedom of speech in democratic societies, the value of the freedom of information and international comparisons. The book is a must read for courses on public policy and governance and information law.
Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed or why. It's time we changed that. Many of the services we rely on are full of oversights, biases and downright ethical nightmares. Chatbots that harass women. Sign-up forms that fail anyone who's not straight. Social media sites that send messages about dead relatives. Algorithms that put more black people behind bars. Technically Wrong takes an unflinching look at the values, processes and assumptions that lead to these problems and more. Wachter-Boettcher demystifies the tech industry, leaving those of us on the other side of the screen better prepared to make informed choices about the services we use-and demand more from the companies behind them.
Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Description Fully updated to include the latest revisions and updates to AWS; this new edition also offers three new chapters covering the latest additions to the AWS platform: serverless infrastructure automation with AWS Lambda, sharing data volumes between machines with EFS, and caching data in memory with ElastiCache! Amazon Web Services in Action, Second Edition is a comprehensive introduction to computing, storing, and networking in the AWS cloud. Readers will find clear, relevant coverage of all the essential AWS services they need to know, emphasizing best practices for security, high availability and scalability. Key features * Hands-on guide * Practical examples * Step-by-step instructions Audience Written for developers and DevOps engineers moving distributed applications to the AWS platform. About the technology AWS is known as a cloud computing platform. Cloud computing, or the cloud, is a metaphor for supply and consumption of IT resources. The IT resources in the cloud aren't directly visible to the user; there are layers of abstraction in between.
Communication defines political representation. At the core of the representational relationship lies the interaction between principal and agent; the quality of this relationship is predicated upon the accessibility of effective channels of communication between the constituent and representative. Over the past decade, congressional websites have become the primary way constituents communicate with their members and a prominent place for members to communicate with constituents. Yet, as we move toward the third decade of the 21st century, little work has systematically analyzed this forum as a distinct representational space. In this book, Jocelyn Evans and Jessica Hayden offer a fresh, timely, and mixed-methods approach for understanding how the emergence of virtual offices has changed the representational relationship between constituents and members of Congress. Utilizing strong theoretical foundations, a broad historical perspective, elite interviews, and rich original datasets, Evans and Hayden present evidence that virtual offices operate as a distinct representational space, and they demonstrate that their use has resulted in unprecedented and ill-understood changes in representational behavior. Congressional Communication in the Digital Age contributes to the scholarship on representation theory and its application to the contemporary Congress. It is valuable reading for students and researchers interested in American politics, political communication, and legislative politics.
This book will delve into how new ICTs, represented by 5G, collectively empower industries from the perspective of theories and practices. 5G is integrating with cloud, intelligence, big data, and applications to push the boundaries of industries and diversify industrial services. Starting from the background and value of industry digitalization, Section I introduces the new ICT infrastructure for industry digitalization, as well as a new support system based on this infrastructure to enable 5GtoB to bring new value to industries. Section II summarizes the success factors and four key capabilities for achieving 5GtoB success from methodological perspective. Abundant application cases are provided in Section III to explore the adoption of 5GtoB in key enterprises across industries, as well as the benefits brought to these enterprises. The final section analyzes the future evolution and applications of 5GtoB. 5G enables a plethora of possibilities. We believe that this book will inspire everyone in the 5GtoB industry chain to embrace 5GtoB and take the digital transformation of industries to new heights.
Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem
Usability Testing Essentials presents a practical, step-by-step approach to learning the entire process of planning and conducting a usability test. It explains how to analyze and apply the results and what to do when confronted with budgetary and time restrictions. This is the ideal book for anyone involved in usability or user-centered design-from students to seasoned professionals. Filled with new examples and case studies, Usability Testing Essentials, Second Edition is completely updated to reflect the latest approaches, tools and techniques needed to begin usability testing or to advance in this area.
Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions. This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what they've learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams. This edition features up-to-date coverage of all nine domains of the CEH v11 exam and the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaingin access and clearing tracks. In all, the bundle includes more than 900 accurate questions with detailed answer explanations Online content includes test engine that provides full-length practice exams and customizable quizzes by chapter or exam domain This bundle is 33% cheaper than buying the two books separately
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill |
![]() ![]() You may like...
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,213
Discovery Miles 32 130
|