Legal aspects Books
Edward Elgar Publishing Ltd Advanced Introduction to Law and Artificial
Book SynopsisElgar Advanced Introductions are stimulating and thoughtful introductions to major fields in the social sciences and law, expertly written by the world's leading scholars. Designed to be accessible yet rigorous, they offer concise and lucid surveys of the substantive and policy issues associated with discrete subject areas. Woodrow Barfield and Ugo Pagallo present a succinct introduction to the legal issues related to the design and use of artificial intelligence (AI). Exploring human rights, constitutional law, data protection, criminal law, tort law, and intellectual property law, they consider the laws of a number of jurisdictions including the US, the European Union, Japan, and China, making reference to case law and statutes. Key features include: a critical insight into human rights and constitutional law issues which may be affected by the use of AI discussion of the concept of legal personhood and how the law might respond as AI evolves in intelligence an introduction to current laws and statutes which apply to AI and an identification of the areas where future challenges to the law may arise. This Advanced Introduction is ideal for law and social science students with an interest in how the law applies to AI. It also provides a useful entry point for legal practitioners seeking an understanding of this emerging field.Trade Review‘Barfield and Pagallo’s book offers a great overview on the most discussed and practically relevant legal discussions about AI. The authors portray the currently applicable laws and the relevant decisions comprehensibly for law students and non-lawyers. The references throughout the book as well as a list of additional topics will assist readers who would like to expand their knowledge. They present an overview and offer law students several carefully chosen gateways through which readers may explore the vast and steadily growing literature in the field. If you are looking for a concise book on the manifold issues of artificial intelligence and law, Barfield and Pagallo’s Advanced Introduction to Law and Artificial Intelligence is a great starting point.’ -- Carolin Kemper, Prometheus‘Edward Elgar has hit the nail on the head by choosing this particular topic to publish in its Edward Elgar Advanced Introduction Series. It is a much need book at this time when the hype about Artificial Intelligence (AI) is at a crescendo level.’ -- Sally Ramage, Criminal Lawyer‘This book provides an authoritative introduction into the specific legal topics covered, and a springboard into further research, and will prove a useful resource for its intended audience.’ -- Stephanie Falconer, Law in Context'A much needed comprehensive and up-to-date introduction to the law of AI, a must read for all ICT lawyers!' --Giovanni Sartor, University of Bologna and European University Institute, ItalyTable of ContentsContents: Introduction to Law and Artificial Intelligence 1. Definitions, Actors, Concepts 2. Human Rights Considerations 3. Constitutional Law Issues 4. Legal Personality and Artificial Intelligence 5. Issues of Data Protection 6. Tort Law Approaches 7. Criminal Law 8. Copyright Law 9. Patent Law 10. Business Law, Antitrust, and Trade Secrets 11. Looking Ahead: Towards a Law of Artificial Intelligence Index
£18.95
CRC Press Cyber Security Using Modern Technologies
Book Synopsis
£42.74
CRC Press Software Security
Book SynopsisSoftware Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. Itâs not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
£42.74
Taylor & Francis Inc Leading the Internal Audit Function
Book SynopsisWhile the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to balance the requirements of the IPPF with management expectations. The true challenge for any internal auditor is to appropriately apply the Standards while exerting adequate independence and objectivity in the face of management pressure.In Leading the Internal Audit Function, Lynn Fountain presents lessons learned from her extensive experience as an internal auditor, internal audit manager, and CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book identifies more than 50 challenges for auditors and discusses potential alternative actions the auditor can take when they experience a similTable of ContentsLessons of an Auditor. Defining the Purpose of the Internal Audit Function. Building an Internal Audit Team. Audit Plan. Executing Internal Audit Responsibilities. Internal Audit Reporting and Communication. Final Word.
£59.84
Oxford University Press Inc Cyber War Versus Cyber Realities
Book SynopsisIn 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based?Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict.As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term efTrade Review"Valeriano and Maness have done real service to the field by taking cyber hyperbole down a notch and highlighting the need for better theory about and empirical evaluation of cyber conflict, even if they will not have the last word on the topic." --Jon R. Lindsay, Assistant Professor of Digital Media and Global Affairs, University of Toronto Munk School of Global Affairs "Path-breaking...the first [book] to provide both theory and empirical evidence to bear on the subject. In doing so it is likely to direct all serious research on the subject in the immediate and medium term." --Paul F. Diehl, Associate Provost and Ashbel Smith Professor of Political Science, University of Texas-Dallas "Why haven't more cyber wars occurred? Valeriano and Maness present theory and evidence to show why states exercise cyber restraint. Their book is a healthy corrective to the usual hype." --Joseph S. Nye, Jr., Harvard University and author of The Future of Power "An important contribution to international relations theory and analysis. A path-breaking empirical work." --Nazli Choucri, Professor of Political Science, Massachusetts Institute of Technology "Most books that touch on theories of cyber power are stuck in either the mire of technical realities or zoom in the other direction, into the stratosphere of 'battles' over cognition and perception. Neither is very relevant for understanding actual conflict between nations. With Cyber War versus Cyber Realities, Valeriano and Maness have a rare gem, a book rooted in a deep analysis of the true realities of cyber conflict from which they draw both lessons and theories with real relevance in national capitals." --Jay Healey, Director of the Cyber Statecraft Initiative, The Atlantic Council "Valeriano and Maness have provided scholars with an impressive starting point that contributes towards greater understanding of the cyber security threat landscape as well as the prospect of a less threatening cyber future." --Francis C. Domingo, De La Salle University and the University of Nottingham, Journal of Information and Technology "Cyber War Versus Cyber Realities is a groundbreaking empirical work and a necessary read for scholars focusing on cyber conflict and people generally interested in international relations." -- Journal of Information Technology & Politics "Overall...the book is an essential contribution to the cyber security literature, and one that substantially advances the debate about the impact of cyber war as a term of reference and an empirical reality." --Joe Burton, H-Net Reviews "Overall, this book provides a new perspective on cyber conflict, countering the media hype of impending Cyber Pearl Harbors or Cyber 9/11s. Further, it offers one of the first viable attempts to quantify the impact of cyber actions, and presents facts and evidence to support their theories. As such, [the authors] build a strong case for cyber policy based on moderation versus worst-case scenarios." -- Small Wars & Insurgencies "Valeriano and Maness view cyber conflict through the lens of international relations and primarily focus on cyber interactions among states and directed towards states in the realm of foreign policy." --Small Wars & InsurgenciesTable of ContentsPreface ; Acknowledgements ; Chapter 1: The Contours of the Cyber Conflict World ; Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations ; Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era ; Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists ; Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus ; Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations ; Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear ; Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations ; Chapter 9: Conclusion ; Tables and Figures
£36.44
Oxford University Press Inc Between Truth and Power The Legal Constructions
Book SynopsisOur current legal system is to a great extent the product of an earlier period of social and economic transformation. From the late nineteenth century through the mid-twentieth century, as accountability for industrial-age harms became a pervasive source of conflict, the U.S. legal system underwent profound, tectonic shifts. Today, ownership of information-age resources and accountability for information-age harms have become pervasive sources of conflict, and different kinds of change are emerging. In Between Truth and Power, Julie E. Cohen explores the relationships between legal institutions and political and economic transformation. Systematically examining struggles over the conditions of information flow and the design of information architectures and business models, she argues that as law is enlisted to help produce the profound economic and sociotechnical shifts that have accompanied the emergence of the informational economy, it is too is transforming in fundamental ways. DraTrade ReviewJulie Cohen, a legal scholar, is the latest to undertake the challenge of charting that process for an information-driven culture. While her book follows on other ambitious, synthesizing work such as Shoshana Zuboff's The Age of Surveillance Capitalism and Nicolas Suzor's Lawless, it uniquely offers a detailed look at how the rise of powerful information intermediaries operates within and with the active assistance of legal, regulatory and political systems. * International Journal of Communication *
£31.49
Oxford University Press Inc The Ethical Algorithm
Book SynopsisOver the course of a generation, algorithms have gone from mathematical abstractions to powerful mediators of daily life. In evolving from static computer programs hand-coded by engineers to the products of machine learning, these technologies have made our lives more efficient, more entertaining, and, sometimes, better informed. At the same time, complex algorithms are increasingly crushing the basic rights of individual citizens. Allegedly anonymized datasets and statistical models routinely leak our most sensitive personal information; applications for everything from loans to college reflect racial and gender bias. Meanwhile, users manipulate algorithms to game search engines, spam filters, online reviewing services and navigation apps. Understanding and improving the science behind the algorithms that run our lives is quickly becoming one of the most pressing issues of this century. Traditional solutions, such as laws, regulations and watchdog groups, have proven woefully inadequate, at best. Derived from the cutting-edge of scientific research, The Ethical Algorithm offers a new approach: a set of principled solutions based on the emerging and exciting science of socially aware algorithm design. Weaving together the science behind algorithm design with stories of citizens, lawyers, scientists, and activists experiencing the trial-and-error of research in real-time, Michael Kearns and Aaron Roth present a strikingly original way forward, showing how we can begin to work together to protect people from the unintended impacts of algorithms--and, sometimes, protect the science that could save us from ourselves.Trade Review...the authors take us on a journey through the main socio-algorithmic problems representing social constraints upon algorithms, their consequences and trade-offs. [T]hey provide concrete technical solutions for the challenges discussed throughout the book's 5 chapters: privacy, fairness, user-data-algorithm feedback loop, data-driven scientific discoveries and (brief) thoughts on the ethical issues (transparency, accountability, morality) yet to be pursued scientifically. * ESSSAT News & Reviews *It is elegantly written, easy to read and full of entertaining examples. * Martin Peterson, Prometheus *Table of ContentsIntroduction Chapter 1: Algorithmic Privacy: The Power of Randomization Chapter 2: Fairness: Discriminating Algorithms Chapter 3: Games People Play (With Algorithms) Chapter 4: Lost in the Garden: Led Astray by Data Chapter 5: Risky Business: Interpretability, Morality, and the Singularity Some Concluding Thoughts Acknowledgements Notes
£21.14
University of Chicago Press The Electronic Word
Book SynopsisSurveys the effects of electronic text on the arts and letters and how they might be taught in a newly democratized society. To those who view electronic text as a cultural catastrophe, Lanham counters that "electronic expression has come not to destroy the Western arts but to fulfil them."Table of ContentsPreface Acknowledgments 1: The Electronic Word: Literary Study and the Digital Revolution 2: Digital Rhetoric and the Digital Arts 3: Twenty Years After: Digital Decorum and Bi-stable Allusions 4: The Extraordinary Convergence: Democracy, Technology, Theory, and the University Curriculum 5: Electronic Textbooks and University Structures 6: Strange Lands, Strange Languages, and Useful Miracles 7: The "Q" Question 8: Elegies for the Book 9: Operating Systems, Attention Structures, and the Edge of Chaos 10: Conversation with a Curmudgeon Index
£21.42
Palgrave MacMillan Us How Computer Games Help Children Learn
Book SynopsisHow Computer Games Help Children Learn shows how video and computer games can help teach children to build successful futures - but only if we think in new ways about education itself.Trade Review"Shaffer offers practical advice to assist parents and educators to respond to his call to radically transform an increasingly outdated educational system..." Barry Joseph, Online Leadership Director, Global Kids "This totally enchanting book shows what education in the 21st century couldlook likeif we are willing to expand our notions of learning in ways that foster productive inquiry and design An extremely readable book that should be on the bookshelf of anyone who cares about having schools that help young people prepare to compete in the global economy." John Seely Brown, Former Chief Scientist of Xerox Corporation and Director of its Palo Alto Research Center (PARC), Senior Fellow, Annenberg Center, USC, and co-author, The Social Life of Information and The Only Sustainable Edge "Beautifully written...How Computer Games Help Children Learn breaks new ground in exciting ways. What a treat! A book about the development of innovative thinking that is refreshingly innovative...A tour de force." Deborah Lowe Vandell, Chair, Department of Education, University of California, Irvine "You may have asked yourself if computer games are destroying the minds of our nation's children. How Computer Games Help Children Learn shows that the exact opposite is true. Parents, educators, and computer game makers take note: by combining years of research and his front-line classroom experiences, Shaffer makes a cogent and compelling argument for the educational power of intelligently crafted games that can serve as tools to help children think and learn about real world problems and their solutions." Michael McCormick, Senior Designer, Backbone Entertainment, and Lead Designer of SimCity 4 "Shaffer's book moves from vivid case studies and accessible accounts of key ideas from the learning sciences to practical advice on how parents can help theirchildren learn more from the games they play. This book represents the logical next step in a conversation started by James Paul Gee's What Video GamesHave toTeach Us about Learning and Literacy and Steven Johnson's Everything Bad Is Good For You." Henry Jenkins, Director, Comparative Media Studies Program, MIT "This well-written and important book will introduce parents and teachers to a radical idea: video games can be good for children. When children play games like Sim City or The Oregon Trail, they learn about urban planning or the American West in spite of themselves. But these games are just the tip of the iceberg; Shaffer describes a wide range of fascinating new learning games that are just now emerging...Because these games give children the chance to creatively manipulate a virtual world, they can teach creativity and innovation, abilities that are more important than ever in today's competitive global economy Shaffer advises parents how to pick out a good learning game, how to play it with your children, and how to make sure they are learning from it." R. Keith Sawyer, author of Group Genius: The Creative Power of Collaboration "Shaffer's book points out forcefully a paradigm of future schooling: to better prepare our kids for a globally competitive world, we have to bring the thinking, practices, and cultures of various professions into school learning. With convincing examples of simulated professional games that can integrate learning, working, and playing, he proves that this is feasible." Tak-Wai Chan, National Central University, Taiwan 'This groundbreaking book raises fundamental issues concerning the goals of education and highlights the need for innovative thinkers in the 21st century. Written in a clear, lucid, and direct manner, Shaffer makes his ideas easily accessible to professional as well as lay readers. The book will benefit educators, school administrators, policy makers, and, most importantly, parents.' Yam San Chee, Associate Professor, Learning Sciences & Technologies Academic Group & Learning Sciences Lab, National Institute of Education, Nanyang Technological University "Deep learning, technical learning, learning that leads to the ability to innovate: these are the most important natural resources in our global high-tech world. Will our children be able to compete with kids in China and India? Shaffer shows us how to mine the potential of video game technologies to transform learning at home, in communities, and in schools." James Paul Gee, University of Wisconsin-Madison, author of What Video Games Have to Teach Us about Learning and Literacy "Like Dewey, Piaget, and Papert before him, Shaffer challenges us to rethink learning in a new age. He uses vivid examples - backed by solid research - to show what education should look like in the 21st century." - Kurt D. Squire, Assistant Professor of Education, University ofWisconsin-Madison,and Game Designer"A must read for anyone who cares about learning. Game designers depend on having millions of people voluntarily learn more than anyone would dare put into a school curriculum. So studying games - how they are designed and how they are played - is one of the best sources of insight about learning, and Shaffer is an excellent guide to making the most of it." - Seymour Papert, Professor Emeritus, Media and Education Technology, MIT Media LabTable of ContentsForeword: Seeing the Future; J.P.Gee Introduction Epistemology: The Debating Game Knowledge: The Digital Zoo Skills: Escher's World Values: The Pandora Project Identity: Science.net Beyond the Industrial School: The Future of Education and How We Get There
£47.49
MIT Press Ltd Human Rights in the Age of Platforms Information
Book SynopsisScholars from across law and internet and media studies examine the human rights implications of today's platform society.Today such companies as Apple, Facebook, Google, Microsoft, and Twitter play an increasingly important role in how users form and express opinions, encounter information, debate, disagree, mobilize, and maintain their privacy. What are the human rights implications of an online domain managed by privately owned platforms? According to the Guiding Principles on Business and Human Rights, adopted by the UN Human Right Council in 2011, businesses have a responsibility to respect human rights and to carry out human rights due diligence. But this goal is dependent on the willingness of states to encode such norms into business regulations and of companies to comply. In this volume, contributors from across law and internet and media studies examine the state of human rights in today's platform society.The contributors consider the “dataficationR
£25.65
CRC Press Vulnerability Management
Book SynopsisVulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means.Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foremanâs more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up aTable of ContentsPrefaceAcknowledgmentsAbout the Author1 Introduction2 The Vulnerability Experience 3 Program and Organization4 Technology 5 Selecting Technology 6 Process 7 Execution, Reporting, and Analysis 8 Planning 9 Strategic Vulnerabilities10 Managing Vulnerabilities in the Cloud 11 Summary and the FutureIndex
£104.50
Taylor & Francis Professional Security Management
Book SynopsisHistorically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the ''need to know''. The reader will benefit from an understandingTable of Contents1 Private security and the development of the Security Manager2 Security risk management and strategic business awareness3 Critical Security Areas 3.1 Security Risk Management 3.2 Crime Prevention through Environmental Design and Situational Crime Prevention 3.3 Physical and Electronic Security Systems3.4 The Security Survey and Security Audit3.5 Business Resilience Risk Management Crisis Management Disaster Management Business Continuity Management 3.6 The Chief Security Officer (CSO) and the Chief Information Security Officer(CISO)3.7 Cyber Crime3.8 Critical National Infrastructure3.9 Terrorism and Counter Terrorism3.10 Aviation and Maritime Security Management3.11 Supply Chain Security Management3.12 Hostile Environment Awareness3.13 Strategic Business Awareness3.14 Fraud Investigations3.15 Retail Loss Prevention3.16 Workplace Investigations3.17 Academic and vocational qualifications3.18 ConclusionBibliographyIndex
£47.49
Taylor & Francis Ltd Understanding Users
Book SynopsisGrounded in the user-centered design movement, this book offers a broad consideration of how our civilization has evolved its technical infrastructure for human purpose to help us make sense of our contemporary information infrastructure and online existence. The author incorporates historical, cultural, and aesthetic approaches to situating information and its underlying technologies across time in the collective, lived experiences of humanity.In today's digital environment, user experience is vital to the success of any product or service. Yet as the user population expands to include us all, designing for people who vary in skills, abilities, preferences, and backgrounds is challenging. This book provides an integrated understanding of users, and the methods that have evolved to identify usability challenges, that can facilitate cohesive and earlier solutions. The book treats information creation and use as a core human behavior based on acts of representation and recordinTable of Contents1. Information as a Human Process, 2. The Emergence of User-Centeredness, 3. Designing Our Information World: Craft or Science?, 4. Humans and the Vertical Slice, 5. The Physio-Tech Layer, 6. The Cogito-Tech Layer, 7. The Socio-Tech Layer, 8. The Culturo-Tech Layer, 9. Usability as a Design Value, 10. Acceptability as a Design Value, 11. Augmentation as the REAL Value
£29.99
CRC Press CISO COMPASS
Book Synopsis#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021, 2022, 2023, and 2024!2020 Cybersecurity CANON Hall of Fame WinnerTodd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program.CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the Table of ContentsSection 1: THE CISO ROAD MAP 1. CISO Role: Evolution or Revolution? 2. Cybersecurity Leadership and the McKinsey 7-S Framework Section 2: STRATEGY 3. Developing Strategy 4. Emerging Technologies and Trends Section 3: STRUCTURE 5. Cybersecurity Organization Structure 6. CISO Reporting Models Section 4: SYSTEMS 7. Leveraging the Incidents of Others 8. The Security Control Framework Maze 9. Risk Management Practices Section 5: SHARED VALUES 10. It’s the Law 11. Data Protection and Privacy Every CISO Must Know 12. Meaningful Policies and Procedures Section 6: STAFF 13. Multigenerational Workforce Team Dynamics Section 7: SKILLS 14. CISO Soft Skills Section 8: STYLE 15. The CISO and the Board of Directors
£42.74
Taylor & Francis Law 3.0
Book SynopsisPutting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape.Technology not only disrupts the traditional idea of what it is âto think like a lawyer,â as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules â thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in sTable of Contents1. Introduction to Law 3.0 2. BookWorld: A Short Story about Disruption Part One: The Technological Disruption of Law 3. Law 1.0: Easy Cases, Difficult Cases, and Hard Cases 4. Law 1.0 Disrupted 5. Law 2.0 and Technology as a Problem 6. Law 2.0 and the ‘Crazy Wall’ 7. Law 2.0 Disrupted: Technology as a Solution 8. Law 3.0: Coherentist, Regulatory-Instrumentalist, and Technocratic Conversations 9. Tech Test Case I: Liability for Robot Supervisors 10. Tech Test Case II: Smart Shops, Code Law, and Contract Law 11. Easterbrook and the Law of the Horse Part Two: Law Reimagined 12. Law as One Element in the Regulatory Environment 13. Mapping the Regulatory Environment 14. The Complexion of the Regulatory Environment 15. Law 3.0 and Liberty: The Pianos at St Pancras 16. Law 3.0: The Thin End of the Wedge, and the Thick End Part Three: Living with Law 3.0 17. The Benchmarks of Legitimacy: The Range of Regulatory Responsibilities 18. Uncertainty, Precaution, Stewardship 19. Re-inventing the Rule of Law 20. Technology and the Triple Licence 21. High Tech Policing and Crime Control 22. The Renewal of Coherentism 23. Redesigning the Institutional Framework I: National Institutions 24. Redesigning the Institutional Framework II: International Institutions Part Four: Learning the Law 25. Rethinking Legal Education 26. Any Questions? 27. Concluding Remarks: Looking Back, Looking Forward
£19.99
Taylor & Francis Ltd Smartphones Current Events and Mobile Information
Book SynopsisSmartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news. Advancing our knowledge of mobile behaviour, the book also highlights the ways in which mobile news impacts the lives of the general public. Using a multi-faceted research model on mobile news consumption behaviour, Oh and Tang examined a wide spectrum of mobile news consumption activities, outlined the key characteristics of mobile news, as well as captured users' near real-time evaluation of and emotional reactions to news stories. The book also shows that the process of using smartphones to receive, read, find, share, and store news stories has resulted in new behavioural patterns that enable people to consume news in a multifaceted way. Analyzing the extent and various methods of mobile news sharing can, Oh and Tang argue, help us understand how such exchanges reshape contemporary society. Demonstrating that mTable of Contents1. Background and Introduction; 2. Mobile News Consumed by Study Participants; 3. Mobile News Consumption Cycle and Activities; 4. Mobile News Reactions: Evaluative Reactions, Affective Reactions; 5. Summary and Conclusion
£47.49
Taylor & Francis Ltd Economic Crime
Book SynopsisThis book is the first attempt to establish 'economic crime' as a new sub-discipline within criminology. Fraud, corruption, bribery, money laundering, price-fixing cartels and intellectual property crimes pursued typically for financial and professional gain, have devastating consequences for the prosperity of economic life. While most police forces in the UK and the USA have an âeconomic crimeâ department, and many European bodies such as Europol use the term and develop strategies and structures to deal with it, it is yet to grain traction as a widely used term in the academic community. Economic Crime: From Conception to Response aims to change that and covers: definitions of the key premises of economic crime as the academic sub-discipline within criminology; an overview of the key research on each of the crimes associated with economic crime; public, private and global responses to economic crime across its different forms and sectors of the economy, both within the UK and globally. This book is an essential resource for students, academics and practitioners engaged with aspects of economic crime, as well as the related areas of financial crime, white-collar crime and crimes of the powerful. Trade Review"The scope of economic crimes are unparalleled in modern times, particularly with the rise of the Internet and online financial services. This work provides an excellent approach to understand these offenses, and the individuals responsible. It is essential reading for professionals and the academy." Thomas Holt, School of Criminal Justice at Michigan State University, USA"This volume makes a convincing case for an offense-based approach to the category of economic crimes, ranging from corporate cartels and money laundering, to counterfeiting, industrial espionage and intellectual property crime. It provides an encompassing overview of these crimes as well as a highly up-to-date and integrated discussion of national, transnational and private policing of economic crimes. An accessible and well-written introduction that is useful to anyone interested in understanding the character and harmfulness of crimes in the context of global business, as well as in the design of smart prevention strategies."Judith van Erp, Professor of Regulatory Governance, Utrecht University, The Netherlands"This is a very helpful compendium to guide private and public sector practitioners and scholars through a rapidly evolving field of theory and action, and a clarion call for more serious evidence-based resourcing and policy attention to a range of economic crimes" Michael Levi, Professor of Criminology, Cardiff University"This book delivers on the case for economic criminology! In an engaging and accessible style, it walks the reader through the complexity of the types, causes and consequences of economic crimes. Effectively balancing theory and practice, and not shying away from critical definitional issues, it is chock full of illustrative and provocative examples. Button, Hock and Shepherd have created a strong foundation for students, scholars, policy makers and practitioners to further advance this critical yet understudied area of criminology."Jeremy M. Wilson, Professor, School of Criminal Justice, Michigan State University, US"This is a go-to text for understanding the latest patterns in the fast-evolving area of economic crime. The authors combine analytical clarity with an entertaining readable style, providing fascinating insights into an area that is under-researched despite being an increasingly present part of our lives."Elizabeth Dávid-Barrett, Professor of Governance and Integrity, University of Sussex, UK The scope of economic crimes are unparalleled in modern times, particularly with the rise of the Internet and online financial services. This work provides an excellent approach to understand these offenses, and the individuals responsible. It is essential reading for professionals and the academy. Thomas Holt, School of Criminal Justice at Michigan State University, USAThis volume makes a convincing case for an offense-based approach to the category of economic crimes, ranging from corporate cartels and money laundering, to counterfeiting, industrial espionage and intellectual property crime. It provides an encompassing overview of these crimes as well as a highly up-to-date and integrated discussion of national, transnational and private policing of economic crimes. An accessible and well-written introduction that is useful to anyone interested in understanding the character and harmfulness of crimes in the context of global business, as well as in the design of smart prevention strategies.Judith van Erp, Professor of Regulatory Governance, Utrecht University, The Netherlands"This is a very helpful compendium to guide private and public sector practitioners and scholars through a rapidly evolving field of theory and action, and a clarion call for more serious evidence-based resourcing and policy attention to a range of economic crimes" Michael Levi, Professor of Criminology, Cardiff UniversityThis book delivers on the case for economic criminology! In an engaging and accessible style, it walks the reader through the complexity of the types, causes and consequences of economic crimes. Effectively balancing theory and practice, and not shying away from critical definitional issues, it is chock full of illustrative and provocative examples. Button, Hock and Shepherd have created a strong foundation for students, scholars, policy makers and practitioners to further advance this critical yet understudied area of criminology.Jeremy M. Wilson, Professor, School of Criminal Justice, Michigan State University, USThis is a go-to text for understanding the latest patterns in the fast-evolving area of economic crime. The authors combine analytical clarity with an entertaining readable style, providing fascinating insights into an area that is under-researched despite being an increasingly present part of our lives.Elizabeth Dávid-Barrett, Professor of Governance and Integrity, University of Sussex Table of Contents1.Economic Crime and Economic Criminology 2.Fraud 3.Bribery and Corruption 4.Cartel and Antitrust Offences 5.Economic Cybercrime 6.Intellectual Property Crime and Illicit Trade 7.Industrial and Economic Espionage 8.Money Laundering 9.Explaining Economic Crime 10.Economic Crime: Law and Regulation 11.State and Transnational Policing of Economic Crime 12.Private Policing of Economic Crime Conclusion: An Agenda for Economic Criminologists and Economic Crime Practitioners
£34.19
CRC Press Technology is Dead
Book SynopsisHow did we end up here, masters of scientific insight, purveyors of ever more powerful technologies, astride the burning planet that created us, and now responsible for cleaning up the mess and determining the future direction of all of life? And what do we do about it?Technology is Dead is a book that attempts to answer both of those questions. It is a book of both challenge and hope, written for those who are able or willing to lead us out of our global predicament. It is a book for everybody: the politicians, CEOs, community leaders, everyday parents, and young people who understand that we must change our ways to ensure a sustainable future for all living things and the planet we rely on.
£95.00
Taylor & Francis Ltd Health Data Privacy under the GDPR
Book SynopsisThe growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity.This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technologTable of ContentsSection 1Health Data Privacy under the GDPRChapter 1The GDPR and (Big) Health Data: Assessing the EU Legislator’s ChoicesMaria Tzanou, Keele University, UKChapter 2Attribution of Responsibility under the GDPR in the Context of Health Data ProcessingYordanka Ivanova, Sofia University St. Kliment Ohridski, Bulgaria, and Vrije Universiteit Brussel, BelgiumChapter 3Healthcare data about children in social media: the challenges raised under the GDPRRosemary Jay, Hunton Andrews Kurth, UKChapter 4European-wide Big Health Data Analytics under the GDPRJos Dumortier, KU Leuven and Timelex Lawyers, Brussels, BelgiumMahault Piéchaud Boura, Timelex Lawyers, Brussels, BelgiumChapter 5Privacy Issues in eHealth and mHealth AppsBeatriz Sainz-de-Abajo, University of Valladolid, SpainIsabel de la Torre-Díez, University of Valladolid, SpainSusel Góngora-Alonso, University of Valladolid, SpainMiguel López-Coronado, University of Valladolid, SpainSection 2A Critical Assessment of the GDPR’s Regulatory SolutionsChapter 6Regulating non-personal data in the age of Big DataBart van der Sloot, Tilburg University, the NetherlandsChapter 7Addressing Big Data and AI Challenges: A Taxonomy and Why the GDPR Cannot Provide a One-size-fits-all SolutionMaria Tzanou, Keele University, UKChapter 8The GDPR, AI and the NHS Code of Conduct for Data-Driven Health and Care Technology Joseph Savirimuthu, University of Liverpool, UK
£36.09
CRC Press A History of Cyber Security Attacks
Book SynopsisStories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.Table of ContentsHistorical Overview of Cyber Security. Morris Worm. MafiaBoy. Google in China. Attack on NASA. Church of Scientology. Solar Sunrise. Melissa Virus. Internet Domain Name Root Server Attack. Target. The Original Logic Bomb. The Estonian Cyberwar. Epsilon. Moonlight Maze. Titan Rain. Sasser Worm.
£40.84
Taylor & Francis Information Security Policies Procedures and
Book SynopsisInformation Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and Table of ContentsIntroduction. Information Security Policy Basics. Information Security Policy Framework. Information Security Policy Details. Information Security Procedures and Standards. Information Security Policy Projects. Appendices.
£30.39
CRC Press An Interdisciplinary Approach to Modern Network
Book SynopsisAn Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and privatTable of ContentsChapter 1: Application of Artificial Intelligence in Cyber-security – A Detail Survey on Intrusion Detection System Chapter 2: IoMT data Security Approach: Blockchain in Healthcare Chapter 3: Machine Learning Approach for Network Intrusion Detection SystemChapter 4: Deep learning approach for network intrusion detection systemChapter 5: Firewalls and SecurityChapter 6: Application of Machine Learning and Deep Learning in Cyber Security: An Innovative ApproachChapter 7: A Modified Authentication Approach for Cloud computing in E-Healthcare SystemChapter 8: Advanced Security System in Video Surveillance for COVID-19Chapter 9: Secure Sound and Data Communication via Li-FiChapter 10: A Novel Secured Method for Rapid Data Accumulation in Energy Aware WSN
£99.75
Taylor & Francis Ltd Blockchain and Artificial Intelligence
Book SynopsisPresent energy systems are undergoing a radical transformation, driven by the urgent need to address the climate change crisis. At the same time, we are witnessing the sharp growth of energy data and a revolution of advanced technologies, with artificial intelligence (AI) and Blockchain emerging as two of the most transformative technologies of our time. The convergence of these two technologies has the potential to create a paradigm shift in the energy sector, enabling the development of smart energy systems that are more resilient, efficient, and sustainable.This book situates itself at the forefront of this paradigm shift, providing a timely and comprehensive guide to AI and Blockchain technologies in the energy system. Moving from an introduction to the basic concepts of smart energy systems, this book proceeds to examine the key challenges facing the energy system, and how AI and Blockchain can be used to address these challenges. Research examples are presented to showcTable of ContentsList of FiguresList of TablesForewordPrefaceAuthor BiosContributorsSection I Fundamental TheoriesChapter 1 Smart Energy SystemsChapter 2 Theories of Artificial IntelligenceChapter 3 Theories of Blockchain TechnologiesSection II Applications in Smart Energy SystemsChapter 4 Reforms in Energy Systems: Prosumers Era and Future Low Carbon Energy SystemsChapter 5 Application of Artificial Intelligence for Energy SystemsChapter 6 Implementation of Blockchain in Local Energy MarketsChapter 7 Cyber Physical System Modeling for Energy InternetSection III Testbeds for Smart Energy SystemsChapter 8 Developing Testbeds for Smart Energy Systems
£71.24
CRC Press The Naked Android
Book SynopsisThe Naked Android: Synthetic Socialness and the Human Gaze illuminates the connection between the stories people tell, their expectations of what a robot is, and how these beliefs and values manifest in how real robots are designed and used.The introduction of the âœhuman gazeâ articulates how peoplesâ expectations and perceptions about robots are ultimately based on deeply personal cultural interpretations of what is artificial or human and what problems social robots should âor should not âsolve. The Naked Android clarifies how human qualities like understanding and desire are designed into robots as mediums as well as projected onto them by the people who live with them.By investigating the fluidity of identities across human culture and social robotics, this book unpacks the contextual complexities of their interactions and mutual influences. Using ethnographic methods including in-depth interviews with a variety of stakeholders, each chapter
£42.74
Taylor & Francis Ltd Ergonomics Mw Vol 1 HistScop
Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.
£285.00
Taylor & Francis Ltd Ergonomics Mw Vol 2 SkillDis
Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.
£285.00
Taylor & Francis Ltd Ergonomics Mw Vol 3Psych Mech
Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.
£403.75
Taylor & Francis Ltd Ergonomics Mw Vol 4 Manu Cont
Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.
£356.74
Taylor & Francis Ltd Systems Practice in the Information Society
Book SynopsisAs a collection of ideas and methodologies, systems thinking has made an impact in organizations and in particular in the information systems field. However, this main emphasis on organizations limits the scope of systems thinking and practice. There is a need first to use systems thinking in addressing societal problems, and second to enable people involved in developing the information society to reflect on the impacts of systems and technologies in society as a whole. Thus, there are opportunities to review the scope and potential of systems thinking and practice to deal with information society-related issues. Systems Practice in the Information Society provides students of information systems as well as practicing Inofrmation Systems managers with concepts and strategies to enable them to understand and use systems thinking methodologies and address challenges posed by the development of information-based societies. This book brings experiences, ideaTable of Contents1. Introduction 2. The Information Society 3. Systems-Thinking 4. Applied Systems-Thinking 5. Idealist Pattern for Practice in the Information Society 6. Strategic Pattern of Pracitice for the Information Society 7. Power-based Pattern for Practice in the Information Society 8. A Dynamic Practice Framework for Living and Working in the Information Society 9. Conclusions
£171.00
John Wiley & Sons Inc ServiceOriented Architecture Governance for the
Book SynopsisA must-have guide for all companies undertaking service-oriented architecture (SOA) and IT governance Service-Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance, security, and technology facets of SOA and IT governance. This book provides a comprehensive enterprise view of governance from a strategic and tactical perspective, as well as modeling and planning tools to help evolve a company''s ongoing governance requirements. Written by Eric Marks and the industry''s leading SOA authorities, this essential book provides a refreshing business-driven perspective to SOA and IT governance.Table of ContentsPreface. Acknowledgments. CHAPTER 1: The SOA Governance Imperative. The Inevitable SOA Trend. Introduction to Governance. Introduction to Enterprise SOA Governance. Governance and Resource Management and Allocation. Do Not Confuse Governance with Management. Governance Is About Results and Appropriate Use of Resources. Information Technology Governance. IT Process Frameworks: ITIL, COBIT, CMMI, and Others. IT Governance Approaches. Who Are the SOA Stakeholders? Addressing SOA Stakeholder Biases. SOA Governance Impacts IT Governance and Enterprise Architecture. SOA Governance Requirements Vary by SOA Maturity. SOA Bill of Rights. Pursue the ‘‘Right’’ SOA Strategy. Apply SOA to the "Right" Challenges. Identify and Build the "Right" Services. Build Your Services the "Right" Way (Design-Time Governance). Get Your SOA Tools Platform "Right" Create the "Right" Organizational, Cultural, and Behavioral Model. Achieve the ‘‘Right’’ SOA Results. Establish the "Right" SOA Governance Model and Policies. Common SOA Governance Mistakes. Right-Sized SOA Governance: How Much Governance Do We Need? Summary. CHAPTER 2: SOA Governance Reference Model. Why an SOA Governance Reference Model? Elements of the SOA Governance Reference Model. Decomposing the SOA Governance Reference Model. SOA Environmental Dimensions. Applying the SOA Governance Reference Model. Summary. CHAPTER 3: Four Tiers of SOA Governance. Expanded Four Tiers of Governance. Tier 1: Enterprise/Strategic Governance Tier. Tier 2: SOA Operating Model Governance Tier. Tier 3: SOA and Services Development Lifecycle Tier. Tier 4: SOA Governance Enabling Technology Tier. Summary. CHAPTER 4: Organizing Your SOA Governance Toolkit. SOA Governance Assessment Tools. SOA Maturity Assessments. Governance Model Design Tools. Policy Model. Governance and Policy Enforcement Model. Governance Execution Model. Summary. CHAPTER 5: SOA Governance Model Design Process. Governance Model Design Prerequisites. Governance Model Validation, Refinement, and Implementation Planning. SOA Governance Model Design Framework Checklist. Summary. CHAPTER 6: SOA Governance Goals, Principles, and Policies. Overview of the Goals–Principles–Policy Cycle. SOA Strategy and SOA Goals. SOA Governance Goals. Turning SOA Goals into SOA Principles. Deriving SOA Governance Principles. SOA Governance Policies. Introduction to Policies. What Policies Are Required? Suggested Policy Definition Process. Decoupling Policies from Services. Identifying Technical Policies. Toward an Integrated Model of SOA Policies. Policy Taxonomy and Vocabulary. Policy Granularity. Multi-Level or Multi-Tiered Policies. Vertical and Horizontal Policy Enforcement. Policy Enforcement Models: Manual, Technology-Assisted, and Automated. Policy Categories Determine Policy Enforcement Mechanisms. Governance Threads and Governance Process Orchestration. Barriers to a Unified Policy Model. Integrated Policy Enforcement Model. Barriers to Integrated Policy Enforcement Models. Policy Provisioning Model (and Process). SOA Goals, Principle, and Policy Management. Transforming SOA Policies into Behavioral Norms. Summary. CHAPTER 7: SOA Governance Organizational Models. First Things First: Understand Your Current Organizational Structure. Conway’s Law and Enterprise SOA Governance. Marks’s Law? Organization Reflects Funding. Organizational Analysis Steps. Purpose of the SOA Governance Organization. Governance Organization Patterns and Best Practices. Other SOA Governance Board Considerations. Specific Governance Organizational Models to Consider. Federated Organizational Models. SOA Governance for Federated IT Models. Best Practice SOA Governance Organizational Roadmap. SOA Governance Organizational Modeling Steps. SOA Governance Organizational Roadmap. SOA Governance Organizational Model Summary. SOA Governance Organizational Model by SOA Adoption Phase. Summary. CHAPTER 8: SOA and Services Lifecycle Governance. Lifecycle Governance Matrix. Lifecycle Governance Tools and Platforms. Production versus Consumption Perspective. Service Reusability. Governance Gaps in a Typical Enterprise. Service Lifecycle Governance Best Practices. Summary. CHAPTER 9: SOA Governance Enabling Technology and Tools. Policy Management Model (PMM). Policy Enforcement Model (PEM). Policy Provisioning Model (PPM). Introduction to the Governance Technical Reference Model. Technology and Standards of SOA Governance and Policies. Design Time. QA and Testing. Publishing and Discovery. Run Time. Battle for Control of SOA Technology Governance. Summary. CHAPTER 10: SOA Governance and Beyond. Governance as a Strategic Competency. Governance Beyond Policies and Edicts. Evolving Governance: Policies to Norms to Culture. Community Models for Governance: Open Source as a Guide. Governance Open Source Style. Governance of the Internet: The Mac Daddy of Communities. Integrating Governance Paradigms. Governance Performance Management: A Necessary Discipline. Creation of an Enterprise Governance Executive. Separation of Enterprise and IT Governance from the PMO. Plan for the Structural Accordion: Centralized to Decentralized to Centralized Again. Governance Going Forward: The Way Ahead. Develop a Unified Model of Policies. Integrated Policy Enforcement Models. Development of Governance Collaboration Tools. "That Governance Is Best that Governs Best with Least" Summary. Index.
£45.00
John Wiley & Sons Inc SOA Modeling Patterns for ServiceOriented
Book SynopsisLearn the essential tools for developing a sound service-oriented architecture SOA Modeling Patterns for Service-Oriented Discovery and Analysis introduces a universal, easy-to-use, and nimble SOA modeling language to facilitate the service identification and examination life cycle stage. This business and technological vocabulary will benefit your service development endeavors and foster organizational software asset reuse and consolidation, and reduction of expenditure. Whether you are a developer, business architect, technical architect, modeler, business analyst, team leader, or manager, this essential guide-introducing an elaborate set of more than 100 patterns and anti-patterns-will help you successfully discover and analyze services, and model a superior solution for your project,. Explores how to discover services Explains how to analyze services for construction and production How to assess service feasibility for deploymeTable of ContentsPreface xix Foreword xxi CHAPTER 1 Introduction 1 What is Service-Oriented Discovery and Analysis? 2 Service-Oriented Analysis Endeavor 2 Service-Oriented Discovery Endeavor 7 Service-Oriented Discovery and Analysis Proposition 11 Driving Principles of Service-Oriented Discovery and Analysis 13 Service-Oriented Discovery and Analysis Modeling 15 Service-Oriented Discovery and Analysis Patterns 17 Summary 20 PART ONE Service-Oriented Discovery and Analysis Road Map Patterns 21 CHAPTER 2 Vertical Service Discovery and Analysis: Pursuing Inward and Downward Road Map Patterns 25 Service Discovery and Analysis Inward Road Map Pattern 25 Service Discovery and Analysis Downward Road Map Pattern 32 Deliverables 38 Summary 39 CHAPTER 3 Horizontal Service Discovery and Analysis: Pursuing Upward and Outward Road Map Patterns 41 Service-Oriented Discovery and Analysis Upward Road Map Pattern 42 Service Discovery and Analysis Outward Road Map Pattern 46 Deliverables 56 Summary 56 CHAPTER 4 Service-Oriented Discovery and Analysis Best Practices Model: Striving for Balanced Solutions 59 Meet-in-the-Middle Service Discovery: Balancing the Identification Venture 59 Structural and Contextual Analysis and Modeling: Balanced Solutions 61 Focus on Service Discovery and Analysis Cross-Cutting Activities 62 Categorization of Services: Reality Check 64 Service-Oriented Discovery and Analysis Best Practices Model 64 Deliverables 68 Summary 68 PART TWO Service-Oriented Discovery Patterns 69 CHAPTER 5 Top-Down Business Process-Driven Service Discovery Pattern 71 Is Business Process Top-Down Service Discovery Practical? 71 Documenting Business Processes: Industry Standards 72 Understand Business Processes 72 Define Business Process Analysis Maturity Level 76 Study Documented Business Processes 77 Establish Service-Oriented Business Process Model 78 Discover Analysis Services 82 Deliverables 87 Summary 88 CHAPTER 6 Top-Down Attribute-Driven Service Discovery Pattern 89 Study Business and Technology Discovery Sources 89 Attend to the Service Discovery Process 90 Institute Core Attributes 91 Establish Attribution Model 93 Select Attributes for Service Discovery 95 Found Decision Model 97 Discover Analysis Services 100 Establish Service Taxonomy 102 Deliverables 104 Summary 104 CHAPTER 7 Front-to-Back Service Discovery Pattern 105 Front-to-Back Service Discovery Model 105 User Interface Control Services 106 User Interface Content Delivery Services 111 User Interface Content Rendering Services 114 User Interface Value Services 117 Front-to-Back Service Discovery Process 118 Deliverables 122 Summary 122 CHAPTER 8 Back-to-Front Service Discovery Pattern 123 Conceptual Data Model Perspective 123 Logical Data Model Perspective 127 Physical Data Model Perspective 139 Back-to-Front Service Discovery Process 139 Deliverables 144 Summary 144 CHAPTER 9 Bottom-Up Service Discovery Pattern 145 Bottom-Up Business Functionality–Driven Service Discovery 145 Bottom-Up Technology-Driven Service Discovery 152 Bottom-Up Reference Architecture–Driven Service Discovery 157 Deliverables 163 Summary 163 CHAPTER 10 Meet-in-the-Middle Service Discovery Pattern 165 Integration-Oriented Services 165 Common Business Services 172 Infrastructure-Oriented Services 175 Deliverables 179 Summary 180 PART THREE Service-Oriented Categorization Patterns 181 CHAPTER 11 Service Source Categorization Patterns 183 Service Ideas and Concepts 183 Service Abstractions 185 Legacy Entities: Road-Tested Executables 188 Service Portfolio 189 Virtual Entities 191 Deliverables 191 Summary 192 CHAPTER 12 Service Structure Categorization Patterns 193 Service Structure Model 193 Environmental Influences on Service Structure 194 Service Structure Categorization Driving Principles 195 Atomic Service Structure: Indivisible Pattern 195 Composite Service Structure: Hierarchical Pattern 196 Service Cluster: Distributed and Federated Pattern 200 Deliverables 203 Summary 204 CHAPTER 13 Service Contextual Categorization Patterns 205 Contextual Classification Model: Patterns for ServiceContextual Categorization 205 Establishing Leading Service Categories 207 Service Subcategories Establishment Process 211 Deliverables 219 Summary 219 PART FOUR Service-Oriented Contextual Analysis Process and Modeling Patterns 221 CHAPTER 14 Contextual Generalization Analysis Process and Modeling Patterns 225 Contextual Generalization Process 225 Contextual Generalization Patterns 232 Contextual Generalization Anti-Patterns 240 Deliverables 243 Summary 243 CHAPTER 15 Contextual Specification Analysis Process and Modeling Patterns 245 Contextual Specification Process 245 Contextual Specification Patterns 250 Service Specification Anti-Patterns 258 Deliverables 261 Summary 261 CHAPTER 16 Contextual Expansion Analysis Process and Modeling Patterns 263 Contextual Expansion Process 264 Contextual Expansion Levels: Organizational Zones for Distribution of Services 265 Contextual Expansion Patterns 270 Service Contextual Expansion Anti-Patterns 278 Deliverables 281 Summary 281 CHAPTER 17 Contextual Contraction Analysis Process and Modeling Patterns 283 Accommodating Demand for Contextual Contraction 283 Service Contextual Contraction Benefits 284 Service Contextual Contraction Example 285 Contextual Contraction Process 286 Contextual Contraction Patterns 290 Contextual Contraction Anti-Patterns 299 Deliverables 301 Summary 301 PART FIVE Service-Oriented Structural Analysis Process and Modeling Patterns 303 CHAPTER 18 Structural Analysis and Modeling Principles: Introduction to Service Structural Notation and Modeling 305 Structural Analysis Modeling Principles 305 Structural Modeling Notation Introduction 306 Aggregation 310 Decomposition 311 Subtraction 312 Coupling and Decoupling 313 Compounding 315 Unification 316 Transformation 318 Intersection 319 Exclusion 321 Clipping 323 Binding and Unbinding 324 Cloning and Decloning 326 Deliverables 328 Summary 329 CHAPTER 19 Structural Generalization Analysis Process and Modeling Patterns 331 Aggregation Analysis: Patterns and Implementation 332 Unification Analysis: Patterns and Implementation 339 Structural Compounding Analysis: Patterns and Implementation 345 Contract Analysis: Patterns and Implementation 351 Deliverables 357 Summary 357 CHAPTER 20 Structural Specification Analysis Process and Modeling Patterns 359 Decomposition Analysis: Patterns and Implementation 359 Subtraction Analysis: Patterns and Implementation 368 Refactoring Analysis: Patterns and Implementation 375 Contract Analysis: Patterns and Implementation 382 Deliverables 388 Summary 388 CHAPTER 21 Structural Expansion Analysis Process and Modeling Patterns 389 Distribution Analysis: Patterns and Implementation 390 Mediation Analysis: Patterns and Implementation 405 Contract Analysis: Patterns and Implementation 414 Deliverables 420 Summary 420 CHAPTER 22 Structural Contraction Analysis Process and Modeling Patterns 423 Distribution Reduction Analysis: Patterns and Implementation 424 Mediation Rollback Analysis: Patterns and Implementation 435 Contract Analysis: Patterns and Implementation 444 Deliverables 450 Summary 450 Index 451
£37.50
John Wiley & Sons Inc Killer Robot Stories about the Professional
Book SynopsisA unique and entertaining look at the ethical issues in the computer science profession, this book tells the fictional story of a robot programmed to automate an assembly line that ended up taking the life of a worker.Table of ContentsPartial table of contents: PRINT MEDIA. Robot Kills Operator in Grisly Accident. McMurdock Promises Justice in "Killer Robot" Case. "Killer Robot" Developers Worked Under Enormous Stress. "Killer Robot" Programmer Was Prima Donna, Co-Workers Claim. "Killer Robot" Project Mired in Controversy Right from Start. The "Killer Robot" Interface. Silicon Techchronics Promised to Deliver a Safe Robot. A Conversation with Dr. Harry Yoder. The Unhealthy Workplace. A Tale of Two Cities. Web of Deception. BROADCAST MEDIA. Varieties of Teamwork Experience. The Case of the Virtual Epidemic. The Case of the Deadly Data. Candid Professor.
£68.36
John Wiley & Sons Inc The Handbook of Information and Computer Ethics
Book SynopsisDiscover how developments in information technology are raising new ethical debates Information and computer ethics has emerged as an important area of philosophical and social theorizing, combining conceptual, meta-ethical, normative, and applied elements.Trade Review"This book should be of interest to students and scholars in computer science, philosophy, communications, business, library science, and law. It offers a thorough examination of important and timely ethics issues and is recommended for all academic libraries." (American Reference Books Annual, March 2009) "Although each contributor's writing style is obvious, the sectional layout of the text is consistent from article to article, each beginning with an introduction, offering a conclusion for cursory review, and providing reference for further study." (CHOICE, October 2008)Table of ContentsForeword (Deborah G. Johnson). Preface. Contributors. Introduction (Kenneth Einar Himma and Herman T. Tavani). PART I: FOUNDATIONAL ISSUES AND METHODOLOGICAL FRAMEWORKS. 1. Foundations of Information Ethics (Luciano Floridi). 2. Milestones in the History of Information Ethics (Terrell Ward Bynum). 3. Moral Methodology and Information Technology (Jeroen van den Hoven). 4. Value Sensitive Design and Information Systems (Batya Friedman, Peter H. Kahn, and Alan Borning). PART II: THEORETICAL ISSUES AFFECTING PROPERTY, PRIVACY, ANONYMITY, AND SECURITY. 5. Personality-Based, Rule Utilitarian, and Lockean Justifications of Intellectual Property (Adam D. Moore). 6. Informational Privacy: Concepts, Theories, and Controversies (Herman T. Tavani). 7. Online Anonymity (Kathleen A. Wallace). 8. Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking (Kenneth Einar Himma). PART III: PROFESSIONAL ISSUES AND THE INFORMATION-RELATED PROFESSIONS. 9. Information Ethics and the Library Profession (Kay Mathiesen and Don Fallis). 10. Ethical Interest in Free and Open Source Software (Frances S. Grodzinsky and Marty J. Wolf). 11. Internet Research Ethics: The Field and its Critical Issues (Elizabeth A. Buchanan and Charles Ess). 12. Health Information Technology: Challenges in Ethics, Science, and Uncertainty (Kenneth W. Goodman). 13. Ethical Issues of Information and Business (Bernd Carsten Stahl). PART IV: RESPONSIBILITY ISSUES AND RISK ASSESSMENT. 14. Responsibilities for Information on the Internet (Anton Vedder). 15. Virtual Reality and Computer Simulation (Philip Brey). 16. Genetic Information: Epistemological and Ethical Issues (Antonio Marturano). 17. The Ethics of Cyber Conflict (Dorothy E. Denning). 18. A Practical Mechanism for Ethical Risk Assessment - A SoDIS Inspection (Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan). PART V: REGULATORY ISSUES AND CHALLENGES. 19. Regulation and Governance on the Internet (John Weckert and Yeslam Al-Saggaf). 20. Information Overload (David M. Levy). 21. Email Spam (Keith W. Miller and James H. Moor). 22. The Matter of Plagiarism: What, Why, and If (John Snapper). 23. Intellectual Property: Legal and Moral Challenges of Online File Sharing (Richard A. Spinello). PART VI: ACCESS AND EQUITY ISSUES. 24. Censorship and Access to Information (Kay Mathiesen). 25. The Gender Agenda in Computer Ethics (Alison Adam). 26. The Digital Divide: Perspective for the Future (Maria Canellopoulou-Botti and Kenneth Einar Himma). 27. Intercultural Information Ethics (Rafael Capurro). Index.
£140.35
O'Reilly Media Beautiful Security
Book SynopsisAn anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations regarding security; security as a design requirement; evolution and new projects in Web of Trust; and, legal sanctions to enforce security precautions.
£23.99
Harvard University Press Passwords Philology Security Authentication
Book SynopsisCryptology, the science of ciphers and codes, and philology, the study of languages, are typically understood as separate domains. But Brian Lennon contends that computing’s humanistic applications, no less than its technical ones, are marked by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.Trade ReviewPasswords is a fascinating book. What is especially impressive is the author’s deft and knowing engagements with both the long histories of computational text processing and the many discourses that make up literary philology. This is just the sort of work that the present mania for the digital demands, and yet books that actually live up to those demands are few and far between. Lennon is one of the few scholars who is even capable of managing that feat, and he does so here with style and erudition. -- David Golumbia, Virginia Commonwealth UniversityA stunning intervention, Passwords rivets our attention to the long history of our present fascination with the digital humanities. Through a series of close, contextual readings, from ninth-century Arabic philology and medieval European debates on language to twentieth-century stylometry and machine translation, this book recalls us to a series of engagements with language about which ‘all of us—we scholars, we philologists,’ as Lennon puts it, ought to know more. Passwords is eloquent and timely, and it offers a form of deep, institutional-lexical study, which schools us in a refusal to subordinate scholarship in the humanities to the identitarian and stabilizing imperatives of the national-security state. -- Jeffrey Sacks, University of California, Riverside
£33.11
John Wiley and Sons Ltd Mode of Information Poststructuralism and Social
Book SynopsisThis book is a major new contribution to debates about modernity and post-modernity, emphasising the influence of electronic communication. Poster highlights the emergence of a new communication order, an interaction between humankind and a new kind of reality.Trade Review'Poster has begun to theorize a very significant topic.' SociologyTable of ContentsIntroduction: Words Without Things. 1. The Concept of Postindustrial Society. 2. Baudrillard and TV Ads. 3. Foucault and Data Bases. 4. Derrida and Electronic Writing. 5. Lyotard and Computer Science. Notes. Index.
£16.14
Edinburgh University Press Law on the Electronic Frontier
Book SynopsisThis is an issue of our quarterly journal Hume Papers on Public Policy - the journal of the David Hume Institute.Trade ReviewProvides some useful insights into computers and the law over a broad area. -- E Susan Singleton Provides some useful insights into computers and the law over a broad area.Table of ContentsRacing Forms and the Exhibition(ist) (Mis)Match: Second Thoughts on the Anxiety of Production
£25.64
Jones and Bartlett Publishers, Inc Computer Ethics A Global Perspective A Global
Book Synopsis
£81.60
Wiley-Blackwell Ethics and Computing Living Responsibly in a
Book Synopsis"All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers.Table of ContentsPreface. Acknowledgments for the First Edition. Acknowledgments for the Second Edition Getting Started. Critical-Thinking Skills. Professional Codes of Ethics. "Cracking" and Computer Security. Encryption, Law Enforcement, and Privacy. Computers in Safety-Critical Systems. Whistle Blowing. Intellectual-Property Issues. Environmental and Health Concerns. Striving for Fairness. Managing Your Career. Appendix A: Notes for the Instructor. Appendix B: Codes of Ethics. Appendix C: Pointers to Additional Resources. Index. About the Editor.
£95.36
Open Court Publishing Co ,U.S. Ontology of Cyberspace Philosophy Law and the
Book SynopsisIs software a creation to be patented, like an invented machine or process, or an original expression to be copyrighted, like drawings and books? This distinction is artificial, argues Koepsell, and is responsible for the growing legal problems related to intellectual property law. Computer-mediated objects are no different from books, songs, or machines and do not require any special treatment by the law. The author suggests revisions to the legal framework itself which prevent this artificial and problematic distinction, and simplifies the protection of all intellectual property.Trade Review"Is software a creature to be patented, like an invented machine or process, or an original expression to be copyrighted, like drawings and books? This distinction is artificial, argues Koepsell, and is responsible for the growing legal problems related to intellectual property law. The author suggests revisions to the legal framework itself which prevent this artificial and problematic distinction, and simplifies the protection of all intellectual property.
£14.24
CRC Press Computer and Cyber Security
Book SynopsisThis is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.Table of Contents1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse. 5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6 Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETs. 8 Security in Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection Techniques: A Review. 10 Overview of Smartphone Security: Attack and Defense Techniques. 11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues. 12 Medical Image Enhancement Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes. 21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures. 22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective. 23 A Compendium of Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime.
£142.50
Peter Lang Group AG Cutting Code Software and Sociality 30 Digital
Book SynopsisSoftware has often been marginalized in accounts of digital cultures and network societies. Although software is everywhere, it is hard to say what it actually is. Cutting Code: Software and Sociality is one of the first books to treat software seriously as a full-blown cultural process and as a subtly powerful material in contemporary communication. From deCSS to Java, from Linux to Extreme Programming, this book analyses software artworks, operating systems, commercial products, infrastructures, and programming practices. It explores social forms, identities, materialities, and power relations associated with software, and it asks how software provokes the re-thinking of production, consumption and distribution as entwined cultural processes. Cutting Code argues that analysis of code as a mosaic of algorithms, protocols, infrastructures, and programming conventions offers valuable insights into how contemporary social formations invent new kinds of personhood and new ways of acting.
£27.74
Taylor & Francis Ltd Securing Windows NT2000
Book SynopsisIn today''s business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization. The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure the project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that will fit the unique needs of your organization. Part two provides the reader with practical hands-on applications for the preparation, installatiTable of ContentsManagement / Executive Overview. What is Security? Defining a Corporate Security Policy. Implementing the Security Policy. Perimeter Security Scenarios. Future Directions in Security Planning. Corporate Security Requirements for Conducting Business on the Internet. Putting the Puzzle Together. Fortifying the Environment.
£90.24
Taylor & Francis Ltd Audit and Trace Log Management
Book SynopsisAs regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. Audit and Trace Log Management: Consolidation and Analysis offers a comprehensive introduction and explanation of requirements and problem definition, and also delivers a multidimensional solution set with broad applicability across a wide range of organizations.Itprovidesa wealth of information in the form of processwalkthroughs. These include problem determination, requirements gathering,scope definition, risk assessment, compliance objectives, systemdesign and architecture, implementation and operational challenges, productand solution evaluation, communication plans, project managementchallenges, and determining Return on Investment (ROI). By using templates, tools, and samples that enhance your understanding of processes and solution sets, the author successfully emphasizes the core themes of the book. He also includes mTrade Review“There are only a few books that I would recommend every security professional keep on the shelf, … this is one of them. It was written by someone who has lived the numbing nightmare of surveying the endlessly proliferating sources of event data in a modern enterprise, of identifying what must be collected, how it should be collected, filtered and stored, and what should be done with it. Most importantly, Maier kept careful notes along the way and has provided a guidebook that will help those of us who follow.” —Richard Austin, MSC, CISSP, MCSE, Hewlett Packard, in IEEE Cipher, January 2007 “Ultimately the readers are provided with a roadmap and a “how to” guideline leading to the successful implementation of a state-of-the-art auditing and monitoring system. Most will want to read it from cover to cover, and also add it to their bookshelves for frequent reference. …Armed with the knowledge from this book, you will be able to champion and guide your organization through a disciplined and well-defined audit and monitoring project. It isn’t a stretch to be able further to design and implement the system while fulfilling a diverse set of requirements and organizational needs.” Linda L. McGhie, CISSP, CISM, PCS ISO/Risk Manager, Wells Fargo BankTable of ContentsIntroduction to audit logging. The “why” of consolidated audit logging. Taking stock, what is in place today. Deciding what to capture and how to do it. Setting up correlation rules, putting your assembled infrastructure to work. Security event management, generating reports from your system. Setting security alert levels and escalation processes. Pulling it all together and making your case.
£95.00
Taylor & Francis Inc Software Deployment Updating and Patching
Book SynopsisThe deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoftâs top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities. Table of ContentsIntroduction. What is Software Deployment and Update Management? Deployment and Update Management Program Overview. Deployment and Update Management Goals and Strategies. Deployment and Update Management Policies. Deployment and Update Management Infrastructure and Facilities. The Software Deployment Process. The Update Management Process. Access Tasks. Identify Tasks. Evaluate and Plan Tasks. Change Management Tasks. Deploy Tasks. Update Testing. Technologies and Resources.
£123.50
Taylor & Francis Inc Access Device Fraud and Related Financial Crimes
Book SynopsisAccess Device Fraud and Related Financial Crimes offers front-line exposure. It is a reference text that affords the student, financial investigator or law enforcement professional a true insight into a wide spectrum of criminal activity involving financial crimes. This book brings the reader back to the scene of cases in which the intensity and maTable of ContentsPreface The Authors: Jerry Iannacci and Ronald Morris Technical Assistance: Chuck Baggeroer Acknowledgements Resources for Investigators Introduction History of Access Devices What is an Access Device History of Access Devices Significance of Access Devices in World Economy Fraud as it Relates to Such Devices Parties Who Investigate-Industry and Law Enforcement False Identification History of Use of False ID How Obtained How False ID is Utilized Security Elements of ID Documents Criminal Violations (State and Federal) Sources of Investigative Assistance External Schemes Involving Access Devices Credit Cards Bank Cards Check Cards Debit Cards False Applications Account Takeovers Mail Theft (NRI) Altered Cards White Plastic True Counterfeit Mail Order/Telephone Order Telemarketing Fraud Card Holder Fraud Internal Schemes Moles (Employees and Contract Workers) Merchant Collusion Employee Collusion Corrupt Federal And Sate Government Officials Investigation of Financial Access Device Crimes Police Officer Investigative Officer Parameters of Interviewing Suspects Other Interviews (POS Merchants, Victims, Cardholders) Technological Advancements Smart Cards Encryption Biometrics Other Organized Crime Enterprises Traditional West Africans Asians Russians Others Investigative Resources Available From Industry Training Aids Speakers Printed Materials 800 Numbers and Other Resources Banking and Retail Investigators Associations (Visa and Master Card) IAFCI Forensics How a Forensics Examiner Can Provide Assistance Types of Examinations Expected Results Investigator's Duties Samples-Specimens Criminal Case Preparation Witness Interviews Evidence Gathering Execution of Warrants Serving of Subpoenas Link Analysis Case Presentation Testimony (Lay and Expert) Appendix Glossary of Terms
£63.64
Cambridge University Press The Cambridge Handbook of Responsible Artificial
Book SynopsisThere is an urgent need for responsible governance of Artificial Intelligence systems. This Handbook maps important features of responsible AI governance and demonstrates how to achieve and implement them at the regional, national and international level.Trade Review'… an indispensable and thought-provoking resource for shaping the future of AI and its societal impact.' Matija Franklin, PrometheusTable of ContentsIntroduction; Part I. Foundations of Responsible AI: 1. Artificial Intelligence – Key Technologies and Opportunities Wolfram Burgard; 2. Automating Supervision of AI Delegates Jaan Tallinn and Richard Ngo; 3. Artificial Moral Agents – Conceptual Issues and Ethical Controversy Catrin Misselhorn;4. Risk Imposition by Artificial Agents – The Moral Proxy Problem Johanna Thoma; 5. Artificial Intelligence and its Integration into the Human Lifeworld Christoph Durt; Part II. Current and Future Approaches to AI Governance: 6. Artificial Intelligence and the Past, Present and Future of Democracy Mathias Risse; 7. The New Regulation of the European Union on Artificial Intelligence – Fuzzy Ethics Diffuse into Domestic Law and Sideline International Law Thomas Burri; 8. Fostering the Common Good – An Adaptive Approach Regulating High-Risk AI-Driven Products and Services Thorsten Schmidt and Silja Voeneky; 9. China's Normative Systems for Responsible AI – From Soft Law to Hard Law Weixing Shen and Yun Liu; 10. Towards a Global Artificial Intelligence Charter Thomas Metzinger; 11. Intellectual Debt – With Great Power Comes Great Ignorance Jonathan Zittrain; Part III. Responsible AI Liability Schemes: 12. Liability for Artificial Intelligence – The Need to Address both Safety Risks and Fundamental Rights Risks Christiane Wendehorst; 13. Forward to the Past – A Critical Evaluation of the European Approach to Artificial Intelligence in Private International Law Jan von Hein; Part IV. Fairness and Non-Discrimination in AI Systems: 14. Differences that Make a Difference – Computational Profiling and Fairness to Individuals Wilfried Hinsch; 15. Discriminatory AI and the Law – Legal Standards for Algorithmic Profiling Antje von Ungern-Sternberg; Part V. Responsible Data Governance: 16. Artificial Intelligence and the Right to Data Protection Ralf Poscher; 17. Artificial Intelligence as a Challenge for Data Protection Law – And Vice Versa Boris Paal; 18. Data Governance and Trust – Lessons from South Korean Experiences Coping with COVID-19 Haksoo Ko, Sangchul Park and Yong Lim; Part VI. Responsible Corporate Governance of AI Systems: 19. From Corporate Governance to Algorithm Governance – Artificial Intelligence as a Challenge for Corporations and their Executives Jan Lieder; 20. Autonomization and Antitrust – On the Construal of the Cartel Prohibition in the Light of Algorithmic Collusion Stefan Thomas; 21. Artificial Intelligence in Financial Services – New Risks and the Need for More Regulation? Matthias Paul; Part VII. Responsible AI Healthcare and Neurotechnology Governance: 22. Medical AI – Key Elements at the International Level Fruzsina Molnár-Gábor and Johanne Giesecke; 23. 'Hey Siri, How Am I Doing?' – Legal Challenges for Artificial Intelligence Alter Egos in Healthcare Christoph Kroenke; 24. Neurorights – A Human-Rights Based Approach for Governing Neurotechnologies Philipp Kellmeyer; 25. AI-Supported Brain-Computer Interfaces and the Emergence of 'Cyberbilities' Boris Essmann and Oliver Mueller; Part VIII. Responsible AI for Security Applications and in Armed Conflict: 26. Artificial Intelligence, Law and National Security Ebrahim Afsah; 27. Morally Repugnant Weaponry? Ethical Responses to the Prospect of Autonomous Weapons Alex Leveringhaus; 28. On 'Responsible AI' in War – Exploring Preconditions for Respecting International Law in Armed Conflict Dustin A. Lewis.
£142.50
Taylor & Francis Access and Control in Digital Humanities
Book SynopsisAccess and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful. Contributors to this volume present case studies and theoretical approaches from their experience with applications for digital technology in classrooms, museums, archives, in the field and with the general public. Offering potential answers to the issues of access and control from a variety of perspectives, the volume acknowledges that access is subject to competing interests of a variety of stakeholders. Museums, universities, archives, and some communities all place claims on how data can or cannot be shared through digital initiatives and, given the collaborative nature of most digital humanities projects, those in the field need to be cognizant of the various and often competing interests and rights that shape the Table of Contents1. Introduction: access and control in digital humanitiesShane HawkinsPart I. Access, Control, and DH in Academia2. From Stone to Screen: the built-in obsolescence of digitizationKaitlyn Solberg, Lisa Tweten, and Chelsea A. M. Gardner3. Digital humanities and a new research culture: between promoting and practicing open research dataUrszula Pawlicka-DegerPart II. Networks of Access and Control4. Computational ontologies for accessing, controlling, and disseminating knowledge in the cultural heritage sector: a case studyJohn Roberto Rodríguez5. Digital approaches to the ‘Big Ancient Mediterranean’Ryan Horne6. Questioning authority: creation, use, and distribution of linked data in digital humanitiesLindsay Kistler Mattock & Anu ThapaPart III. Access, Control and Immersive Media7. Visuality as historical experience: immersive multi-directional narrative in the MIT Visualizing Cultures ProjectEllen Sebring8. Architectonic connections: virtual reconstruction to disseminate understanding of South and Southeast Asian templesDavid Beynon and Sambit Datta9. Postscript on the Ctrl+Alt society: protocols for locative mediaBrian GreenspanPart IV. Access, Control, and Indigenous Knowledge10. Cross-cultural collaborations in the digital world: a case study from the Great Lakes Research Alliance’s Knowledge Sharing DatabaseHeidi Bohaker, Lisa Truong, and Kate Higginson11. Issues and intersections of Indigenous knowledge protection and copyright for DHKim Paula NayyerPart V. Access, Control, and the Law12. The open access spectrum: redefining the access discourse for the electronic editions of literary worksSetsuko Yokoyama13. Ownership, copyright, and the ethics of the unpublishedEmily C. Friedman14. Digital humanities research under United States and European copyright laws: evolving frameworksErik Ketzan and Paweł Kamocki15. Trust is good, control is better? The GDPR and control over personal data in digital humanities researchPaweł Kamocki
£35.14