This book examines the effect of Information Technology on our lives, illustrating how a lack of proper social control over IT has led to a scene of technological wizardry and real everyday gains, contaminated by discrimination, deprivation and unacceptable ethical standards.
From AI ethics and cybersecurity to augmented realities, virtual interfaces, and much more, Futureshock provides an accessible introduction to the leading edge topics of today.
This book aims to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third party arrangements and emphasises that organisations retain accountability for business activities, functions and services outsourced to a third party.
The Internet and the many applications it supports continue to transform and expand the ways in which it is possible to relate, communicate, collaborate, and perform human service work.
The Internet and the many applications it supports continue to transform and expand the ways in which it is possible to relate, communicate, collaborate, and perform human service work.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing.
This book is the first to directly address the question of how to bridge what has been termed the "e;great divide"e; between the approaches of systems developers and those of social scientists to computer supported cooperative work--a question that has been vigorously debated in the systems development literature.
This book is the first to directly address the question of how to bridge what has been termed the "e;great divide"e; between the approaches of systems developers and those of social scientists to computer supported cooperative work--a question that has been vigorously debated in the systems development literature.
The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways.
The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways.
This book introduces the capability approach - in which wellbeing, agency and justice are the core values - as a powerful normative lens to examine technology and its role in development.
This book introduces the capability approach - in which wellbeing, agency and justice are the core values - as a powerful normative lens to examine technology and its role in development.
In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge.
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another.
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another.
This book provides the most current and comprehensive overview available today of the critical role of information systems in emergency response and preparedness.
This book provides the most current and comprehensive overview available today of the critical role of information systems in emergency response and preparedness.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice.
Quantum computing, particularly in conjunction with a high level of interconnectivity facilitated by quantum connectivity, can facilitate a host of new, previously unattainable applications-these include blind quantum computation, (information) teleporting, clock synchronization, quantum key distribution, secure access to remote quantum computers, superdense coding, secure identification, quantum-secure encryption, distributed sensors, and other scientific and commercial applications, including new drug development.
This popular text introduces the reader to all aspects of psychometric assessment, including its history, the construction and administration of traditional tests, and the latest techniques for psychometric assessment online.
This popular text introduces the reader to all aspects of psychometric assessment, including its history, the construction and administration of traditional tests, and the latest techniques for psychometric assessment online.
The fourth industrial revolution challenges humanity ethically and morally: mass unemployment, new forms of colonialism, and mass-and-granular surveillance are a few examples of these challenges.
This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy.