0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (7)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Three Tweets to Midnight - Effects of the Global Information Ecosystem on the Risk of Nuclear Conflict (Paperback): Herbert S.... Three Tweets to Midnight - Effects of the Global Information Ecosystem on the Risk of Nuclear Conflict (Paperback)
Herbert S. Lin, Benjamin Loehrke, Harold A. Trinkunas
R620 Discovery Miles 6 200 Ships in 12 - 17 working days

Disinformation and misinformation have always been part of conflict. But as the essays in this volume outline, the rise of social media and the new global information ecosystem have created conditions for the spread of propaganda like never before-with potentially disastrous results. In our "post-truth" era of bots, trolls, and intemperate presidential tweets, popular social platforms like Twitter and Facebook provide a growing medium for manipulation of information directed to individuals, institutions, and global leaders. A new type of warfare is being fought online each day, often in 280 characters or fewer. Targeted influence campaigns have been waged in at least forty-eight countries so far. We've entered an age where stability during an international crisis can be deliberately manipulated at greater speed, on a larger scale, and at a lower cost than at any previous time in history. This volume examines the current reality from a variety of angles, considering how digital misinformation might affect the likelihood of international conflict and how it might influence the perceptions and actions of leaders and their publics before and during a crisis. It sounds the alarm about how social media increases information overload and promotes "fast thinking," with potentially catastrophic results for nuclear powers

Youth, Pornography, and the Internet (Paperback): National Research Council, Computer Science and Telecommunications Board,... Youth, Pornography, and the Internet (Paperback)
National Research Council, Computer Science and Telecommunications Board, Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content; Edited by Herbert S. Lin, Dick Thornburgh
R1,707 Discovery Miles 17 070 Ships in 12 - 17 working days

The Internet has changed the way we access the world. This is especially true for kids, who soak up new technologies like eager little sponges. They have access to an enormous array of material, including educational links, sports info, chat rooms?and, unfortunately, pornography. But we must approach our need to protect children with care to avoid placing unnecessary restrictions on the many positive features of the Internet. Youth, Pornography, and the Internet examines approaches to protecting children and teens from Internet pornography, threats from sexual predators operating on-line, and other inappropriate material on the Internet. The National Research Council's Computer Science and Telecommunications Board explores a number of fundamental questions: Who defines what is inappropriate material? Do we control Internet access by a 17-year-old in the same manner as for a 7-year-old? What is the role of technology and policy in solving such a problem in the context of family, community, and society? The book discusses social and educational strategies, technological tools, and policy options for how to teach children to make safe and appropriate decisions about what they see and experience on the Internet. It includes lessons learned from case studies of community efforts to intervene in kids' exposure to Internet porn. Providing a foundation for informed debate, this very timely and relevant book will be a must-read for a variety of audiences. Table of Contents Front Matter Executive Summary 1. Introduction 2. Technology 3. The Adult Online Entertainment Industry 4. Legal and Regulatory Issues 5. Children, Media, and Exposure to Sexually Explicit Material 6. The Research Base on the Impact of Exposure to Sexually Explicit Material: What Theory and Empirical Studies Offer 7. Beyond the Science: Perspectives on Impact and the Public Debate 8. Approaches to Protection from Inappropriate Material 9. Legal and Regulatory Tools 10. Social and Educational Strategies to Develop Personal and Community Responsibility 11. A Perspective on Technology-Based Tools 12. Technology-Based Tools for Users 13. Technology-Based Tools Available to Non-End Users 14. Findings, Conclusions, and Future Needs Appendix A: Information-Gathering Sessions of the Committee Appendix B: Glossary and Acronyms Appendix C: Selected Technology Issues Appendix D: Site Visit Synthesis Appendix E: Biographies Index

At the Nexus of Cybersecurity and Public Policy - Some Basic Concepts and Issues (Paperback): National Research Council,... At the Nexus of Cybersecurity and Public Policy - Some Basic Concepts and Issues (Paperback)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work; Edited by Herbert S. Lin, …
R1,187 Discovery Miles 11 870 Ships in 12 - 17 working days

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace. Table of Contents Front Matter Summary 1 Why Care About Cybersecurity? 2 Some Basics of Computing and Communications Technology and Their Significance for Cybersecurity 3 On the Nature of Cybersecurity 4 Enhancing Cybersecurity 5 Tensions Between Cybersecurity and Other Public Policy Concerns 6 Findings and Conclusion Appendixes Appendix A: Committee Members and Staff Appendix B: Bibliography

Toward a Safer and More Secure Cyberspace (Paperback, New): National Academy of Engineering, National Research Council,... Toward a Safer and More Secure Cyberspace (Paperback, New)
National Academy of Engineering, National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Improving Cybersecurity Research in the United States; Edited by …
R1,747 Discovery Miles 17 470 Ships in 12 - 17 working days

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation's critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety. Table of Contents Front Matter Executive Summary Part I Setting the Stage 1 Introduction 2 What Is at Stake? 3 Improving the Nation's Cybersecurity Posture Part II An Illustrative Research Agenda 4 Category 1 - Blocking and Limiting the Impact of Compromise 5 Category 2 - Enabling Accountability 6 Category 3 - Promoting Deployment 7 Category 4 - Deterring Would-Be Attackers and Penalizing Attackers 8 Category 5 - Illustrative Crosscutting Problem-Focused Research Areas 9 Category 6 - Speculative Research Part III Conclusion 10 Looking to the Future Appendix A Committee and Staff Biographies Appendix B Cybersecurity Reports and Policy: The Recent Past Appendix C Contributors to the Study

Emerging and Readily Available Technologies and National Security - A Framework for Addressing Ethical, Legal, and Societal... Emerging and Readily Available Technologies and National Security - A Framework for Addressing Ethical, Legal, and Societal Issues (Paperback)
National Academy of Engineering, National Research Council, Center for Engineering, Ethics, and Society Advisory Group, Committee on Science, Technology, and Law, Board on Life Sciences, …
R1,660 Discovery Miles 16 600 Ships in 12 - 17 working days

Emerging and Readily Available Technologies and National Security is a study on the ethical, legal, and societal issues relating to the research on, development of, and use of rapidly changing technologies with low barriers of entry that have potential military application, such as information technologies, synthetic biology, and nanotechnology. The report also considers the ethical issues associated with robotics and autonomous systems, prosthetics and human enhancement, and cyber weapons. These technologies are characterized by readily available knowledge access, technological advancements that can take place in months instead of years, the blurring of lines between basic research and applied research, and a high uncertainty about how the future trajectories of these technologies will evolve and what applications will be possible. Emerging and Readily Available Technologies and National Security addresses topics such as the ethics of using autonomous weapons that may be available in the future; the propriety of enhancing the physical or cognitive capabilities of soldiers with drugs or implants or prosthetics; and what limits, if any, should be placed on the nature and extent of economic damage that cyber weapons can cause. This report explores three areas with respect to emerging and rapidly available technologies: the conduct of research; research applications; and unanticipated, unforeseen, or inadvertent ethical, legal, and societal issues. The report articulates a framework for policy makers, institutions, and individual researchers to think about issues as they relate to these technologies of military relevance and makes recommendations for how each of these groups should approach these considerations in its research activities. Emerging and Readily Available Technologies and National Security makes an essential contribution to incorporate the full consideration of ethical, legal, and societal issues in situations where rapid technological change may outpace our ability to foresee consequences. Table of Contents Front Matter Summary 1 Framing the Issues 2 Foundational Technologies 3 Application Domains 4 Sources of ELSI Insight 5 An Analytical Framework for Identifying Ethical, Legal, and Societal Issues 6 Going Beyond Initial A Priori Analysis 7 Mechanisms for Addressing Ethical, Legal, and Societal Issues 8 Findings and Recommendations Appendixes Appendix A: Committee Members and Staff Appendix B: Meeting Agendas and Participants Appendix C: Research and Development Organizations Within the Department of Defense Appendix D: Established Institutional Mechanisms for Addressing Ethical, Legal, and Societal Issues

Engaging Privacy and Information Technology in a Digital Age (Hardcover): National Research Council, Division on Engineering... Engaging Privacy and Information Technology in a Digital Age (Hardcover)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Privacy in the Information Age; Edited by Lynette I. Millett, …
R1,583 Discovery Miles 15 830 Ships in 12 - 17 working days

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable. Table of Contents Front Matter Executive Summary Part I Thinking About Privacy, 1 Thinking About Privacy Part II The Backdrop for Privacy, 2 Intellectual Approaches and Conceptual Underpinnings 3 Technological Drivers 4 The Legal Landscape in the United States 5 The Politics of Privacy Policy in the United States Part III Privacy in Context, 6 Privacy and Organizations 7 Health and Medical Privacy 8 Libraries and Privacy 9 Privacy, Law Enforcement, and National Security Part IV Findings and Recommendations, 10 Findings and Recommendations Appendix A A Short History of Surveillance and Privacy in the United States Appendix B International Perspectives on Privacy Appendix C Biographies Index

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (Paperback): National... Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (Paperback)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee On Offensive Information Warfare; Edited by Herbert S. Lin, …
R1,456 Discovery Miles 14 560 Ships in 12 - 17 working days

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic. Table of Contents Front Matter Synopsis 1 Overview, Findings, and Recommendations Part I: Framing and Basic Technology 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation Part II: Mission and Institutional Perspectives 3 A Military Perspective on Cyberattack 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation 5 Perspectives on Cyberattack Outside National Security 6 Decision Making and Oversight Part III: Intellectual Tools for Understanding and Thinking About Cyberattack 7 Legal and Ethical Perspectives on Cyberattack 8 Insights from Related Areas 9 Speculations on the Dynamics of Cyberconflict 10 Alternative Futures Appendixes Appendix A: Biographies of Committee Members and Staff Appendix B: Meeting Participants and Other Contributors Appendix C: Illustrative Criminal Cyberattacks Appendix D: Views on the Use of Force in Cyberspace Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions

Computational Technology for Effective Health Care - Immediate Steps and Strategic Directions (Paperback, New): Committee on... Computational Technology for Effective Health Care - Immediate Steps and Strategic Directions (Paperback, New)
Committee on Engaging the Computer Science Research Community in Health Care Informatics, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council; Edited by Willam W. Stead, …
R1,273 Discovery Miles 12 730 Ships in 12 - 17 working days

Despite a strong commitment to delivering quality health care, persistent problems involving medical errors and ineffective treatment continue to plague the industry. Many of these problems are the consequence of poor information and technology (IT) capabilities, and most importantly, the lack cognitive IT support. Clinicians spend a great deal of time sifting through large amounts of raw data, when, ideally, IT systems would place raw data into context with current medical knowledge to provide clinicians with computer models that depict the health status of the patient. Computational Technology for Effective Health Care advocates re-balancing the portfolio of investments in health care IT to place a greater emphasis on providing cognitive support for health care providers, patients, and family caregivers; observing proven principles for success in designing and implementing IT; and accelerating research related to health care in the computer and social sciences and in health/biomedical informatics. Health care professionals, patient safety advocates, as well as IT specialists and engineers, will find this book a useful tool in preparation for crossing the health care IT chasm.

Rights and Responsibilities of Participants in Networked Communities (Paperback): National Research Council, Division on... Rights and Responsibilities of Participants in Networked Communities (Paperback)
National Research Council, Division on Engineering and Physical Sciences, Commission on Physical Sciences, Mathematics, and Applications, Steering Committee on Rights and Responsibilities of Participants in Networked Communities; Edited by Herbert S. Lin, …
R771 Discovery Miles 7 710 Ships in 12 - 17 working days

This book describes a number of social and legal issues as they relate to various members of electronically networked communities. After a brief introduction to relevant legal precedents and to the manner in which societies develop norms for social behavior, the book explores right and responsibilities related to free speech, vandalism, property interests, and privacy. Table of Contents FRONT MATTER EXECUTIVE SUMMARY 1 THE NATURE OF ELECTRONIC NETWORKS 2 NETWORKS AND SOCIETY 3 LEGAL CONSIDERATIONS FOR ELECTRONIC NETWORKS 4 FREE SPEECH 5 ELECTRONIC VANDALISM 6 INTELLECTUAL PROPERTY INTERESTS 7 PRIVACY 8 COMMON THEMES A Network Technology B Workshop Schedule and Session Descriptions C Forum Statement of Purpose and Agenda D Keynote Speech: Networked Communities and the Laws of Cyberspace E Biographical Sketches

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Energizer LED 2D/4D Lantern
R159 R121 Discovery Miles 1 210
Microsoft Xbox Series X Console (1TB…
R16,499 Discovery Miles 164 990
Bostik Neon Twisters - Gel Highlighters…
R48 Discovery Miles 480
Professor Snape Wizard Wand - In…
 (8)
R832 Discovery Miles 8 320
Speak Now - Taylor's Version
Taylor Swift CD R521 Discovery Miles 5 210
3 Layer Fabric Face Mask (Blue)
R15 Discovery Miles 150
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Genuine Leather Wallet With Clip Closure…
R299 R246 Discovery Miles 2 460
Kingston Technology DataTraveler Exodia…
 (1)
R106 Discovery Miles 1 060

 

Partners