Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs).
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies.
This book describes the need of copyright protection for multimedia objects and develops an invisible image watermarking scheme to serve the purpose of copyright protection.
This book describes the need of copyright protection for multimedia objects and develops an invisible image watermarking scheme to serve the purpose of copyright protection.
This book provides a comprehensive and synthetic analysis of the legal acts of the Council of Europe and the European Union affecting regulation of cybercrime in EU countries.
Governments, the media, the information technology industry and scientists publicly argue that information and communication technologies (ICT) will bring about an inevitable transition from "e;industrial"e; to "e;information"e; or "e;knowledge-based"e; economies and societies.
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides a process-oriented discussion of the legal concerns presented by agent-based technologies, processes and programming.
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008.
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy.
In a world where data is constantly mined, processed, and used for profit and power, how can we become active citizens rather than passive inhabitants of the digital landscape?
The book underscores AI's transformative impact on reshaping physical, digital, and biological boundaries, converging with technologies like robotics, IoT, 3D printing, genetic engineering, and quantum computing-termed Web 3.
The complex world of online piracy and peer-to-peer file sharing is skillfully condensed into an easy-to-understand guide that provides insight into the criminal justice approach to illegal file sharing, while offering guidance to parents and students who have concerns about potential legal action in response to file-sharing activities.
Reach more customers and grow your business with today's most powerful marketing tool: Word-of-MouthHighly Recommended shows the impact of customer recommendations on businesses--transforming how people buy, how you reach customers, how you improve products, and ultimately how you can grow your company by leveraging the power of recommendations.
Activity, Behavior, and Healthcare Computing relates to the fields of vision and sensor-based human action or activity and behavior analysis and recognition.
Published in association with the Society of American Archivists Trusting Records in the Cloud presents key findings of InterPARES Trust, an international research project that has investigated issues of trust in, and trustworthiness of records and data online, with respect to privacy, accessibility, portability, metadata and ownership.
Find out how to get the most out of iTunes, iPhoto, iMovie, and iDVD and use all these applications together to create customized content with your own digital media.
Macromedia Flash is fast becoming the Web's most widely used platform for creating rich media with animation and motion graphics, but mastering Flash isn't easy.
An eye-opening look at the invisible workers who protect us from seeing humanity's worst on today's commercial internet Social media on the internet can be a nightmarish place.
A revealing and gripping investigation into how social media platforms police what we post online—and the large societal impact of these decisions Most users want their Twitter feed, Facebook page, and YouTube comments to be free of harassment and porn.
“[Tufekci’s] personal experience in the squares and streets, melded with her scholarly insights on technology and communication platforms, makes [this] such an unusual and illuminating work.