You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
When Kellyanne Conway, counselor to President Trump, coined the phrase "alternative facts" in January 2017, objectivity in public discourse--the long-held belief in a more or less agreed-upon set of verifiable truths--went into a tailspin. The use of alternative facts and narratives quickly became the go-to rhetorical strategy, especially among Trump's administration and base. Rebuttals based on fact-checking and hard data were demoted to mere choices in a media bazaar where consumers are free to source their own versions of reality. This volume explores the social and political disruption accompanying the loss of faith in objectivity, along with reflections on the disregard for truth and honesty, both within the Trump Administration and in contemporary popular culture.
This book is the first systematic, multicountry exploration of far-right Newspeak. The contributors analyze the ways in which contemporary far-right politicians, intellectuals, and pundits use and abuse traditional liberal concepts and ideas to justify positions that threaten democratic institutions and liberal principles. They explore cases of both far-right and right-wing thought in eastern and western Europe, the United States, and Canada. Subjects include well-known figures, such as Marine Le Pen, Tucker Carlson, Peter Thiel, Nick Griffin, Thierry Baudet, Jordan Peterson, Russell Brand, and Viktor Orbán, and lesser-known names, such as the Czech politician Tomio Okamura and the Internet...
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection VII describes original research results and innovative applications in the interdisciplinary ...
Encoding Bioethics addresses important ethical concerns from the perspective of each of the stakeholders who will develop, deploy, and use artificial intelligence systems to support clinical decisions. Utilizing an applied ethical model of patient-centered care, this book considers the viewpoints of programmers, health system and health insurance leaders, clinicians, and patients when AI is used in clinical decision-making. The authors build on their respective experiences as a surgeon-bioethicist and a surgeon-AI developer to give the reader an accessible account of the relevant ethical considerations raised when AI systems are introduced into the physician-patient relationship.
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011. The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.
How play and gaming culture have mainstreamed far right ideology through social media platforms. From #Gamergate to the ongoing Big Lie, the far right has gone mainstream. In Gaming Democracy, Adrienne Massanari tracks the flames of toxicity found in the far right and “alt-right” movements as they increasingly take up oxygen in American and global society. In this pathbreaking contribution to the fields of internet studies, game studies, and gender studies, Massanari argues that Silicon Valley’s emphasis on meritocracy and free speech absolutism has driven this rightward slide. These ideologies have been coded into social media spaces that implicitly silence marginalized communities an...
A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics. We all keep secrets—from our gym locker codes to our email passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In this fascinating book Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets. Louridas explains just how cryptography works to keep our communications confidential, tracing it back all the way to its ancient roots. Then h...