Social media, once heralded as revolutionary and democratic, have instead proved exclusionary and elitist Social media technologies such as YouTube, Twitter, and Facebook promised a new participatory online culture.
An argument that the movement for network neutrality was of a piece with its neoliberal environment, solidifying the continued existence of a commercially driven internet.
The aim of this book is to provide "e;human engineering"e; for workplaces, tools, machinery, computers, shift work, lighting, sound, climate, work demands, offices, vehicles, healthcare, and the home - and everything else that we can produce - to suit the human body and mind.
This book explores the intersection of legal frameworks, healthcare innovation, and computational intelligence, shedding light on how emerging technologies like artificial intelligence (AI) and machine learning (ML) are reshaping the medical landscape.
This book takes readers on a captivating journey through the history of social engineering, tracing its evolution from the mechanical marvels of the clockwork era and the rise of automata to the modern age of artificial intelligence and the looming dawn of quantum computing.
This book takes readers on a captivating journey through the history of social engineering, tracing its evolution from the mechanical marvels of the clockwork era and the rise of automata to the modern age of artificial intelligence and the looming dawn of quantum computing.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possibilities in mitigating cyber risks.
The aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data.
This book provides a comprehensive overview of security and privacy challenges in 6G networks, addressing the urgent need for advanced security frameworks as the next generation of wireless technology emerges.
The purpose of this book is to avail students of the many different reasons and back-stories equated with the advent of interaction design and its effect on our world.
This edited collection provides the reader with a comprehensive knowledge of automated decision-making, artificial intelligence (AI), and algorithms, and how they can be used in criminal proceedings.
This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes.
The subject of Artificial Intelligence (AI) is continuing on its journey of affecting each and every individual and will keep on this path in the times to come.
Focusing on four key aspects of Web3, the book explores metaverses, data governance, public and private law interfaces, and access to justice, presenting new research on the impact of data analytics on transactions within law, on regulatory activities, and on the practice of law.
The Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge.
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts.
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment.
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks.
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets.
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to harden their security.
This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state.
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization.
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork.
Written on the occasion of copyright's 300th anniversary, John Tehranian's Infringement Nation presents an engaging and accessible analysis of the history and evolution of copyright law and its profound impact on the lives of ordinary individuals in the twenty-first century.
In this much anticipated sequel to the legal bestseller, The Future of Law, Susskind lays down a challenge to all lawyers to ask themselves, with their hands on their hearts, what elements of their current workload could be undertaken differently - more quickly, cheaply, efficiently, or to a higher quality - using alternative methods of working.
Highly publicized legal cases, such as those involving libel verdicts, obscenity prosecutions, the First Amendment, and other areas of media law have focused attention on only one part of the media's impact on law.
This sweeping introduction to the science of virtual environment technology masterfully integrates research and practical applications culled from a range of disciplines, including psychology, engineering, and computer science.