Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
2,509 result(s) for "Social Aspects of Computing "
Sort by:
Ambient urbanities as the intersection between the IoT and the IoP in smart cities
\"This book focuses on the ambient and the adaptive and dynamic nature of information, enabled by what is referred to in this volume as aware technologies that are influencing and being influenced by people's everyday interactions and activities\"-- Provided by publisher.
Infoglut
Today, more mediated information is available to more people than at any other time in human history. New and revitalized sense-making strategies multiply in response to the challenges of \"cutting through the clutter\" of competing narratives and taming the avalanche of information. Data miners, \"sentiment analysts,\" and decision markets offer to help bodies of data \"speak for themselves\"-making sense of their own patterns so we don't have to. Neuromarketers and body language experts promise to peer behind people's words to see what their brains are really thinking and feeling. New forms of information processing promise to displace the need for expertise and even comprehension-at least for those with access to the data. Infoglut explores the connections between these wide-ranging sense-making strategies for an era of information overload and \"big data,\" and the new forms of control they enable. Andrejevic critiques the popular embrace of deconstructive debunkery, calling into question the post-truth, post-narrative, and post-comprehension politics it underwrites, and tracing a way beyond them.
Phase media : space, time and the politics of smart objects
James Ash theorizes how smart objects, understood as Internet-connected and sensor-enabled devices, are altering users' experience of their environment. Rather than networks connected by lines of transmission, smart objects generate phases, understood as space-times that modulate the spatio-temporal intelligibility of both humans and non-humans. Examining a range of objects and services from the Apple Watch to Nest Cam to Uber, Ash suggests that the modulation of spatio-temporal intelligibility is partly shaped by the commercial logics of the industries that design and manufacture smart objects, but can also exceed them. Drawing upon the work of Martin Heidegger, Gilbert Simondon and Bruno Latour, Ash argues that smart objects have their own phase politics, which offer opportunities for new forms of public to emerge. Phase Media develops a conceptual vocabulary to contend that smart objects do more than just enabling a world of increased corporate control and surveillance, as they also provide the tools to expose and re-order the very logics and procedures that created them.
The Human Factor of Cybercrime
Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.
Developing a Cybersecurity Immune System for Industry 4.0
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity. This book contains four chapters 1. Cyber Immunity Concept of the Industry 4.0; 2. Mathematical Framework for Immune Protection of Industry 4.0; 3. Trends and prospects of the development of Immune Protection of Industry 4.0; 4. From detecting cyber-attacks to self-healing Industry 4.0;
Digital Afterlife
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in Digital Afterlife and the wide-ranging issues that relate to this. The book covers a variety of matters that have been neglected in other research texts, for example: The legal, ethical, and philosophical conundrums of Digital Afterlife The ways digital media are currently being used to expand the possibilities of commemorating the dead and managing the grief of those left behind Our lives are shaped by and shape the creation of our Digital Afterlife as the digital has become a taken for granted aspect of human experience. This book will be of interest to undergraduates from computing, theology, business studies, philosophy, psychology, sociology, and education from all types of institutions. Secondary audiences include researchers and postgraduate researchers with an interest in the digital. At a practical level, the cost of data storage and changing data storage systems mitigate the likelihood of our digital presence existing in perpetuity. Whether we create accidental or intentional digital memories, this has psychological consequences for ourselves and for society. Essentially, the foreverness of forever is in question.
Information Systems
Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key \"Take-Aways\" that alert students to material they will need to remember during their careers. Sections titled \"Where You Fit In\" and \"Why This Chapter Matters\" explain how the topics being covered will impact students on the job. Review questions, discussion questions, and summaries are also included. This second edition is updated to include new technology, along with a new running case study. Key features: Single-mindedly for business students who are not technical specialists Doesn't try to prepare IS professionals; other courses will do that Stresses the enabling technologies and application areas that matter the most today Based on the author's real-world experience Up to date regarding technology and tomorrow's business needs This is the book the author-and, more importantly, his students-wishes he had when he started teaching. Dr. Mallach holds degrees in engineering from Princeton and MIT, and in business from Boston University. He worked in the computer industry for two decades, as Director of Strategic Planning for a major computer firm and as co-founder/CEO of a computer marketing consulting firm. He taught information systems in the University of Massachusetts (Lowell and Dartmouth) business schools for 18 years, then at Rhode Island College following his retirement. He consults in industry and serves as Webmaster for his community, in between hiking and travel with his wife. Dr. Mallach has taught in the information systems field since 1984. In addition, he has had a long and varied career in the information technology industry - before this time, during a break from teaching in 1998-2003, and on a part-time basis while teaching. This exposure to real-world practice, which continues today, gives him a perspective on information systems that is impossible to obtain through academic pursuits alone. Table of Contents Why Information Systems Matter in Business Role of Information Systems in Business information Systems Hardware Information Systems Software Data, Databases, and Database Management Information Networks Integrating the Organization Connecting with Customers and Suppliers Making Better Decisions Planning and Selecting Information Systems Developing Information Systems Managing Information Systems Index
Professionalism in the Information and Communication Technology Industry
Professionalism is arguably more important in some occupations than in others. It is vital in some because of the life and death decisions that must be made, for example in medicine. In others the rapidly changing nature of the occupation makes efficient regulation difficult and so the professional behaviour of the practitioners is central to the good functioning of that occupation. The core idea behind this book is that Information and Communication Technology (ICT) is changing so quickly that professional behaviour of its practitioners is vital because regulation will always lag behind.
Social Media Analytics for User Behavior Modeling
User-generated social media content provides an excellent opportunity to mine data of interest and helps in developing functional data-driven applications. The rise in the number of healthcare-related social media platforms and the volume of healthcare knowledge available online in the last decade have resulted in increased social media usage for personal healthcare. In the United States, nearly ninety percent of adults, in the age group 50-75, have used social media to seek and share health information. Motivated by the growth of social media usage, this book focuses on healthcare-related applications, studies various challenges posed by social media data, and addresses them through novel and effective machine learning algorithms.
Australian Politics in a Digital Age
Information and communications technologies are increasingly important in the Australian political landscape. From the adoption of new forms of electoral campaigning to the use of networking technology to organise social movements, media technology has the potential to radically change the way politics is conducted and experienced in this country. The first comprehensive volume on the impact of digital media on Australian politics, this book examines the way these technologies shape political communication, alter key public and private institutions, and serve as the new arena in which discursive and expressive political life is performed. Employing a range of theoretical perspectives, empirical data, and case examples, the book provides insights on political behaviour of Australia’s elites, as well as the increasingly important politics of mirco-activism and social media. Energetic and fast-paced, the book draws together a wide range of Australian and international scholarship on the interface between communications technology and politics. Crossing several genres, the book will find a wide audience amongst scholars of both politics and communication, among public relations professionals, and with members of the media themselves.