You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This work investigates the precise effects on society of the new and much vaunted electronic technologies (ICTs). Are fundamental shifts already taking place in the way in which we behave, organize, and interact as a direct result of their implementation? Providing a comprehensive set of detailed empirical studies of the genesis and use of these new technologies, the book also presents some surprising counterintuitive results.
The goals of this book are to provide a comprehensive review of identity policies as they are being implemented in various countries around the world, to consider the key arenas where identity policies are developed and to provide intellectual coherence for making sense of these various activities.
Drawing on an international survey of over 1,000 business and executives, this book provides a management perspective on cloud technology. It outlines the need to know information for strategic decisions on cloud technology including its capabilities, how it can be implemented securely and the way forward for the next ten years.
Aadhaar, India's unique identity system, was introduced in 2009 with the stated purpose of creating a more inclusive and efficient welfare system. Hundreds of millions of Indians were enrolled into the biometric database, with successive governments creating pressure by making it compulsory for social benefits. Even after the Supreme Court verdict in 2018, it remains a must-have for welfare.Dissent on Aadhaar argues that Aadhaar was never really about welfare. The essays in this book explain how the project opens the doors to immense opportunities for government surveillance and commercial data-mining.Focussing on Aadhaar, but drawing lessons from ID projects from other parts of the world also, this book alerts readers to the dangers lurking in such expansive digital ID projects. For example, how profiling, made possible by Aadhaar, impinges on the fundamental Right to Privacy; or how surveillance leads to self-censorship and can choke free thought and expression; or how Aadhaar, contrary to government claims, excludes people entitled by right from welfare when made compulsory.
The articles in this book constitute the proceedings papers from the IFIP WG 8.2 Working Conference, "IS2000: The Social and Organizational Perspective on Research and Practice in Information Technology," held June 1 0-12, 2000, in Aalborg, Denmark. The focus of the conference, and therefore this book, is on the basic aim of the working group, namely, the investigation of the interrelationships among four major components: information systems (IS), information technology (IT), organizations, and society. This basic social and organizational perspective on research and practice in information technology may have evolved substantially since the founding ofthe group, for example, increasing the...
This book, written by two nationally renowned scholars in the area of ethics in higher education, is intended to help teachers and administrators understand and handle problems of academic dishonesty. Chock-full of practical advice, the book is divided into three parts. Part I reviews the existing published literature about academic dishonesty among college and university students and how faculty members respond to the problem. Part II presents practical advice designed to help college and university instructors and administrators deal proactively and effectively with academic dishonesty. Part III considers the broader question of academic integrity as a system-wide issue within institutions of higher education.
Additional written evidence is available in Volume 3, available on the Committee website www.parliament.uk/pasc
None
The value of personal data has traditionally been understood in ethical terms as a safeguard for personality rights such as human dignity and privacy. However, we have entered an era where personal data are mined, traded and monetized in the process of creating added value - often in terms of free services including efficient search, support for social networking and personalized communications. This volume investigates whether the economic value of personal data can be realized without compromising privacy, fairness and contextual integrity. It brings scholars and scientists from the disciplines of computer science, law and social science together with policymakers, engineers and entrepreneurs with practical experience of implementing personal data management. The resulting collection will be of interest to anyone concerned about privacy in our digital age, especially those working in the field of personal information management, whether academics, policymakers, or those working in the private sector.