Listing 1 - 10 of 265 | << page >> |
Sort by
|
Choose an application
David Bell's volume will introduce key ideas and concerns within cybertheory, then move on to discuss the major concepts developed by the three theorists --Donna Haraway, Sherry Turkle and Sean Cubitt, covering Haraway's foundational work on cyborgs, Sherry Turkle's contribution to debates about identity in cyberspace, and Sean Cubitt's development of cybertheory into the realm of aesthetics and visual culture.
Cyberspace --- Information technology --- Social aspects. --- Castells, Manuel. --- Haraway, Donna Jeanne.
Choose an application
Internet --- Computers and civilization. --- Cyberspace --- Virtual reality. --- Social aspects.
Choose an application
Computers and civilization --- Cyberspace --- Virtual reality --- Engineering & Applied Sciences --- Computer Science --- Space and time --- Computers --- Telematics
Choose an application
Online journalism. --- Blogs. --- Cyberspace. --- Journalism --- Journalisme en ligne --- Blogues --- Cyberespace --- Journalisme
Choose an application
Hypercrime develops a new theoretical approach toward current reformulations in criminal behaviours, in particular the phenomenon of cybercrime. Emphasizing a spatialized conception of deviance, one that clarifies the continuities between crime in the traditional, physical context and developing spaces of interaction such as a 'cyberspace', the book analyzes criminal behaviours in terms of the destructions, degradations or incursions to a hierarchy of regions that define our social world. Each chapter outlines violations to the boundaries of each of these spaces - from those defined by our bodies or our property, to the more subtle borders of the local and global spaces we inhabit. By treating cybercrime as but one instance of various possible criminal virtualities, the book develops a general theoretical framework, as equally applicable to the, as yet unrealized, technologies of criminal behaviour of the next century, as it is to those which relate to contemporary computer networks. Cybercrime is thereby conceptualized as one of a variety of geometries of harm, merely the latest of many that have extended opportunities for illicit gain in the physical world. Hypercrime offers a radical critique of the narrow conceptions of cybercrime offered by current justice systems and challenges the governing presumptions about the nature of the threat posed by it.
Computer crimes --- Cyberspace --- Criminology --- Internet --- Criminalité informatique --- Cyberespace --- Criminologie --- Government policy --- Law and legislation --- Politique gouvernementale --- Droit --- Computer crimes. --- Criminology. --- Government policy. --- Social aspects. --- Criminalité informatique
Choose an application
Internet --- Cyberspace --- Computers and civilization --- Electronic villages (Computer networks) --- Sociology, Urban --- Cyberespace --- Ordinateurs et civilisation --- Communautés virtuelles --- Sociologie urbaine --- Social aspects --- Aspect social
Choose an application
Which state has and should have the right and power to regulate sites and online events? Who can apply their defamation or contract law, obscenity standards, gambling or banking regulation, pharmaceutical licensing requirements or hate speech prohibitions to any particular Internet activity? Traditionally, transnational activity has been 'shared out' between national sovereigns with the aid of location-centric rules which can be adjusted to the transnational Internet. But can these allocation rules be stretched indefinitely, and what are the costs for online actors and for states themselves of squeezing global online activity into nation-state law? Does the future of online regulation lie in global legal harmonisation or is it a cyberspace that increasingly mirrors the national borders of the offline world? This 2007 book offers some uncomfortable insights into one of the most important debates on Internet governance.
Computer architecture. Operating systems --- International law --- Internet --- Jurisdiction --- Electronic commerce --- Cyberspace --- Law and legislation --- Government policy --- Jurisdiction. --- Transborder data flow --- Government policy. --- Law and legislation. --- Law --- General and Others --- Internet - Law and legislation --- Electronic commerce - Law and legislation --- Cyberspace - Government policy --- Space and time --- Computers --- Telematics --- Commercial law --- Competent authority --- Conflict of judicial decisions --- Courts --- Judgments --- Venue
Choose an application
ISVLSI 2007 covers a wide variety of topics from system-on-chip and network-on-chip issues to novel technologies and emerging trends. Field Programmable Gate Arrays were used to evaluate new design methods but also to integrate and exploit adaptive mechanisms for run-time reconfigurable systems. Design methodologies and CAD tools to enable the optimization of analog and digital chips for electronic systems of the future. Leading scientists and researchers from academia and industry discuss their ideas for technology filling the gap to new solutions for future systems in ISVLSI 2007. Contents: MPSOC; Reconfigurable Systems; Methods for Optimized Placement; VLSI System Design, Methods and Tools; Methods for Low Power Design; Mixed Signal Design; Verification and Test Methodology; Physical Design; SoC Embedded Processing; VLSI Circuits; NoC; IP and Design, System Level Design; Emerging Trends in VLSI.
Computer science --- Computers --- Circuits --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
Since its recent introduction, the ZigBee protocol has created an enormous amount of buzz in venues from magazine covers to trade show floors to water coolers. Its promise of providing a simpler, cheaper, more power-efficient WPAN (Wireless Personal Area Network) alternative to WiFi and Bluetooth has opened up new data collection possibilities in application areas from industrial controls to medical devices to intruder alarms. Yet, despite this widespread interest, there is still little information available that goes beyond detailing the spec itself. Missing from the current ZigBee lexicon is
Wireless LANs --- Computers. --- Standards. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
Much as we hate to admit it, most prototyping practice lacks a sophisticated understanding of the broad concepts of prototyping-and its strategic position within the development process. Often we overwhelm with a high fidelity prototype that designs us into a corner. Or, we can underwhelm with a prototype with too much ambiguity and flexibility to be of much use in the software development process. This book will help software makers-developers, designers, and architects-build effective prototypes every time: prototypes that convey enough information about the product at the appropriat
Computer software --- Computers. --- Development. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Development of computer software --- Software development --- Software prototyping. --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Listing 1 - 10 of 265 | << page >> |
Sort by
|