You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government’s mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security ...
Dialectics of Space and Place across Virtual and Corporeal Topographies explores the inter- and multi-disciplinary subjects of space and place in two parts. Part 1 Virtual topographies of Space and Place is concerned with themes related to immaterial places, and Part II Corporeal Topographies of Space and Place explores narratives of real and imagined experiences of places. This volume, underpinned by an array of philosophical positions provides a foundation for new and critical dialogues on space and place.
This book gathers selected high-quality research papers presented at the Sixth International Congress on Information and Communication Technology, held at Brunel University, London, on February 25–26, 2021. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of things (IoT) and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies. The book is presented in four volumes.
Contributions by Donald L. Anderson, Brian Brems, Eric Brinkman, Matthew Edwards, Brenda S. Gardenour Walter, Andrew Grossman, Lisa Haegele, Gavin F. Hurley, Mikel J. Koven, Sharon Jane Mee, Fernando Gabriel Pagnoni Berns, Émilie von Garan, Connor John Warden, and Sean Woodard The giallo (yellow) film cycle, characterized by its bloody murders and blending of high art and cinematic sleaze, rose to prominence in Italy in the 1960s and 1970s. Beginning with Mario Bava’s The Girl Who Knew Too Much (1963) and Dario Argento’s The Bird with the Crystal Plumage (1970), giallo films influenced the American slasher films of the 1980s and attracted an increasingly large fandom. In Bloodstained Na...
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change a...
"For researchers and scholars working at the intersection of physical, social, and technological space, this book provides critical research from leading experts in the space technology domain"--Provided by the publisher.
separated by the exigencies of the design life cycle into another compartment, that makes invisible the (prior) technical work of engineers that is not directly pertinent to the application work of practitioners. More recently (and notably after the work of Greisemer and Star) the black box has been opened and infrastructure has been discussed in terms of the social relations of an extended group of actors that includes developers. Ethical and political issues are involved (cf f accountable computing). Writing broadly within this context, Day (chapter 11) proposes that the concept of 'surface' can assist us to explore space as the product of 'power and the affective and expressive role for m...
The book presents the proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023), held at Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, Wales, UK, during April 11–12, 2023. Researchers, scientists, engineers, and practitioners exchange new ideas and experiences in the domain of intelligent computing theories with prospective applications in various engineering disciplines in the book. This book is divided into two volumes. It covers broad areas of information and decision sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management and networks, sensor networks, signal processing, wireless networks, protocols, and architectures. This book is a valuable resource for postgraduate students in various engineering disciplines.
Strategy literature is abundant, but there is no book that shows you how to actually think strategically. The Forgotten Vocabulary of Strategy (Vol. 1 and Vol. 2) fills this gap. For the first time it reveals the ways of thinking, acting and teaching of successful Western and Asian strategists as well as Arab and Indian mirrors for princes and looks 2500 years into the past. In its essence, the book demystifies the 12 most renowned strategic approaches, distills them into a holistic system and thus enables the reader to develop a universally strategic mind through a scientifically founded process. STRATEGISTS THINK IN PATTERNS These patterns, also called Strategic Principles, are based on th...
Psybersecurity: Human Factors of Cyber Defence is a clarion call to action in the face of a stark reality: over 90% of cyberattacks exploit human vulnerabilities, as highlighted by the 2022 Global Risks Report from the World Economic Forum. This gap between the rapid advancement of cyber security technologies and the slower pace of development in human-centric defences poses a formidable challenge to national security and personal safety. Amidst the dazzling progress of AI technologies like ChatGPT and Microsoft Security Co-Pilot, the human element of cyber security remains critically underdeveloped. Set against the backdrop of the Australian government's ambitious goal to become the world's...