Browse Results

Showing 44,901 through 44,925 of 54,505 results

Rigged: America, Russia, and One Hundred Years of Covert Electoral Interference

by David Shimer

"This pioneering and judicious history of foreign intervention in elections should be read by everyone who wants to defend democracy now." --Timothy Snyder, author of On TyrannyThe definitive account of covert operations to influence elections from the Cold War to 2016, why the threat to American democracy is greater than ever in 2020, and what we can do about it.Russia's interference in 2016 marked only the latest chapter of a hidden and revelatory history. In Rigged, David Shimer tells the sweeping story of covert electoral interference past and present. He exposes decades of secret operations--by the KGB, the CIA, and Vladimir Putin's Russia--to shape electoral outcomes, melding deep historical research with groundbreaking interviews with more than 130 key players, from leading officials in both the Trump and Obama administrations, to CIA and NSA directors, to a former KGB general.What Americans should make of Russia's attack in 2016 is still hotly debated, even after the Mueller report and years of media coverage. Shimer shows that Putin's operation was, in fact, a continuation of an ongoing struggle, using familiar weapons radically enhanced by new technology. Throughout history and in 2016, both Russian and American operations achieved their greatest success by influencing the way voters think, rather than tampering with actual vote tallies.Casting aside partisanship and sensationalism, Rigged reveals new details about what Russia achieved in 2016, how the Obama administration responded, and why Putin has also been interfering covertly in elections across the globe in recent years, while American presidents have largely refrained from doing so. Shimer also makes disturbingly clear that this type of intrusion can be used to harm Democrats and Republicans alike. Russia's central aim is to undermine and disrupt our democracy, to the detriment of all Americans.Understanding 2016 as one battle in a much longer war is essential to understanding the critical threat currently posed to America's electoral sovereignty and how to defend against it. Illuminating how the lessons of the past can be used to protect our democracy in the future, Rigged is an essential book for readers of every political persuasion.

Rigging for Games: A Primer for Technical Artists Using Maya and Python

by Eyal Assaf

Rigging for Games: A Primer for Technical Artists Using Maya and Python is not just another step-by-step manual of loosely related tutorials. Using characters from the video game Tin, it takes you through the real-world creative and technical process of rigging characters for video games and cinematics, allowing readers a complete inside look at a single project. You’ll explore new ways to write scripts and create modular rigs using Maya and Python, and automate and speed up the rigging process in your creative pipeline. Finally, you’ll learn the most efficient ways of exporting your rigs into the popular game engine Unity. This is the practical, start-to-finish rigging primer you’ve been waiting for! Enhance your skillset by learning how to efficiently rig characters using techniques applicable to both games and cinematics Keep up with all the action with behind-the-scenes images and code scripts Refine your rigging skills with tutorials and project files available on the companion website

The Right Hook of Devin Velma

by Jake Burt

From the author of Greetings from Witness Protection! comes another unforgettable middle-grade novel about friendship and family.Devin wants to hit it big on the internet by pulling a stunt at an NBA game—one the entire nation will be watching. Addison can’t turn Devin down, but he can barely manage talking to his teachers without freezing up. How’s he supposed to handle the possibility of being a viral sensation?Addi’s not sure why Devin is bent on pulling off this almost-impossible feat. Maybe it has something to do with Devin’s dad’s hospital bills. Maybe it all goes back to the Double-Barreled Monkey Bar Backflip of Doom. Or maybe it’s something else entirely. No matter what, though, it’s risky for both of them, and when the big day finally comes, Devin’s plan threatens more than just their friendship.With memorable protagonists and a wonderful supporting cast, The Right Hook of Devin Velma is a one-of-kind knockout in middle-grade fiction.

The Right To Be Forgotten: A Comparative Study of the Emergent Right's Evolution and Application in Europe, the Americas, and Asia (Ius Comparatum - Global Studies in Comparative Law #40)

by Franz Werro

This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression. According to its traditional understanding, this right gives individuals the possibility to preclude the media from revealing personal facts that are no longer newsworthy, at least where no other interest prevails. Cases sanctioning this understanding still abound in a number of countries. In today’s world, however, the right to be forgotten has evolved, and it appears in a more multi-faceted way. It can involve for instance also the right to access, control and even erase personal data. Of course, these prerogatives depend on various factors and competing interests, of both private and public nature, which again require careful balancing. Due to ongoing technological evolution, it is likely that the right to be forgotten in some of its new manifestations will become increasingly relevant in our societies.

The Right to Data Protection: Individual and Structural Dimensions of Data Protection in EU Law (Information Technology and Law Series #34)

by Felix Bieker

This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data protection under the EU Charter and its relationship to the secondary legislation. Furthermore, the case law of the Court of Justice of the EU as well as current academic conceptualizations are analysed. The author finds that current approaches invariably link data protection to privacy and often fail to address the structural implications of data processing. He therefore suggests a dualistic approach to data protection: in its individual dimension, data protection aims to protect natural persons and their rights, while the structural dimension protects the democratic society as a whole from the adverse effects of data processing. Using this approach, the full potential of an independent right to data protection can be realized. Researchers, practitioners and students will find this a valuable resource on the rationales, scope and application of data protection. Felix Bieker is Legal Researcher at the Office of the Data Protection Commissioner of Schleswig-Holstein (Unabhängiges Landeszentrum für Datenschutz) in Kiel, Germany.

The Right to Privacy 1914–1948: The Lost Years (SpringerBriefs in Law)

by Megan Richardson

The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by the two world wars of the first half of the twentieth century – focusing (in particular) on the socio-technological transformations associated with modernism. It argues that, with many of the most interesting modern thinkers of the period dead or marginalised (or both) by 1948, their ideas about how rights such as privacy should develop to accommodate the exigencies of modern life failed to find much of a voice in the drafting of the Universal Declaration of Human Rights. Yet they anticipated in surprising ways some of our ‘new’ ways of thinking in more recent times. After a brief introduction, the chapters are framed in terms of case studies on the right to privacy, the right to data protection and the right to be forgotten, each finishing with a consideration of how these rights require further rethinking in the digital century.

Rights for Robots: Artificial Intelligence, Animal and Environmental Law

by Joshua C. Gellers

Bringing a unique perspective to the burgeoning ethical and legal issues surrounding the presence of artificial intelligence in our daily lives, the book uses theory and practice on animal rights and the rights of nature to assess the status of robots. Through extensive philosophical and legal analyses, the book explores how rights can be applied to nonhuman entities. This task is completed by developing a framework useful for determining the kinds of personhood for which a nonhuman entity might be eligible, and a critical environmental ethic that extends moral and legal consideration to nonhumans. The framework and ethic are then applied to two hypothetical situations involving real-world technology—animal-like robot companions and humanoid sex robots. Additionally, the book approaches the subject from multiple perspectives, providing a comparative study of legal cases on animal rights and the rights of nature from around the world and insights from structured interviews with leading experts in the field of robotics. Ending with a call to rethink the concept of rights in the Anthropocene, suggestions for further research are made. An essential read for scholars and students interested in robot, animal and environmental law, as well as those interested in technology more generally, the book is a ground-breaking study of an increasingly relevant topic, as robots become ubiquitous in modern society.

Rigor in the Remote Learning Classroom: Instructional Tips and Strategies

by Barbara R. Blackburn

Learn how to keep the rigor and motivation alive in a remote learning or hybrid K–12 classroom. In this essential book, bestselling author Barbara R. Blackburn shares frameworks and tools to help you move online without compromising the rigor of your instruction. You’ll learn… how to create a remote culture of high expectations; how to scaffold so students reach higher levels of learning; how to have students collaborate in different settings; and how to provide virtual feedback and deliver effective assessments. You’ll also discover how common activities, such as virtual field trips, can lack rigor without critical thinking prompts. The book provides practical strategies you can implement immediately to help all students reach higher levels of success.

A Rigorous Semantics for BPMN 2.0 Process Diagrams

by Felix Kossak Christa Illibauer Verena Geist Jan Kubovy Christine Natschläger Thomas Ziebermayr Theodorich Kopetzky Bernhard Freudenthaler Klaus-Dieter Schewe

This book provides the most complete formal specification of the semantics of the Business Process Model and Notation 2. 0 standard (BPMN) available to date, in a style that is easily understandable for a wide range of readers - not only for experts in formal methods, but e. g. also for developers of modeling tools, software architects, or graduate students specializing in business process management. BPMN - issued by the Object Management Group - is a widely used standard for business process modeling. However, major drawbacks of BPMN include its limited support for organizational modeling, its only implicit expression of modalities, and its lack of integrated user interaction and data modeling. Further, in many cases the syntactical and, in particular, semantic definitions of BPMN are inaccurate, incomplete or inconsistent. The book addresses concrete issues concerning the execution semantics of business processes and provides a formal definition of BPMN process diagrams, which can serve as a sound basis for further extensions, i. e. , in the form of horizontal refinements of the core language. To this end, the Abstract State Machine (ASMs) method is used to formalize the semantics of BPMN. ASMs have demonstrated their value in various domains, e. g. specifying the semantics of programming or modeling languages, verifying the specification of the Java Virtual Machine, or formalizing the ITIL change management process. This kind of improvement promotes more consistency in the interpretation of comprehensive models, as well as real exchangeability of models between different tools. In the outlook at the end of the book, the authors conclude with proposing extensions that address actor modeling (including an intuitive way to denote permissions and obligations), integration of user-centric views, a refined communication concept, and data integration.

Rigorous Software Development

by Maria João Frade Jorge Sousa Pinto José Bacelar Almeida Simão Melo de Sousa

The use of mathematical methods in the development of software is essential when reliable systems are sought; in particular they are now strongly recommended by the official norms adopted in the production of critical software. Program Verification is the area of computer science that studies mathematical methods for checking that a program conforms to its specification. This text is a self-contained introduction to program verification using logic-based methods, presented in the broader context of formal methods for software engineering. The idea of specifying the behaviour of individual software components by attaching contracts to them is now a widely followed approach in program development, which has given rise notably to the development of a number of behavioural interface specification languages and program verification tools. A foundation for the static verification of programs based on contract-annotated routines is laid out in the book. These can be independently verified, which provides a modular approach to the verification of software. The text assumes only basic knowledge of standard mathematical concepts that should be familiar to any computer science student. It includes a self-contained introduction to propositional logic and first-order reasoning with theories, followed by a study of program verification that combines theoretical and practical aspects - from a program logic (a variant of Hoare logic for programs containing user-provided annotations) to the use of a realistic tool for the verification of C programs (annotated using the ACSL specification language), through the generation of verification conditions and the static verification of runtime errors.

Rigorous State-Based Methods: 8th International Conference, ABZ 2021, Ulm, Germany, June 9–11, 2021, Proceedings (Lecture Notes in Computer Science #12709)

by Alexander Raschke Dominique Méry

This book constitutes the proceedings of the 8th International Conference on Rigorous State-Based Methods, ABZ 2021, which was planned to take place in Ulm, Germany, during June 6-11, 2021. The conference changed to an online format due to the COVID-19 pandemic. The 6 full and 8 short papers included in this volume were carefully reviewed and selected from 18 submissions. The proceedings also include 3 PhD symposium contributions. They deal with state-based and machine-based formal methods, mainly Abstract State Machines (ASM), Alloy, B, TLA+, VDM, and Z.

Rigorous State-Based Methods: 7th International Conference, ABZ 2020, Ulm, Germany, May 27–29, 2020, Proceedings (Lecture Notes in Computer Science #12071)

by Alexander Raschke Dominique Méry Frank Houdek

This book constitutes the refereed proceedings of the 7th International Conference on Rigorous State-Based Methods, ABZ 2020, which was due to be held in Ulm, Germany, in May 2020. The conference was cancelled due to the COVID-19 pandemic. The 12 full papers and 9 short papers were carefully reviewed and selected from 61 submissions. They are presented in this volume together with 2 invited papers, 6 PhD-Symposium-contributions, as well as the case study and 6 accepted papers outlining solutions to it. The papers are organized in the following sections: keynotes and invited papers; regular research articles; short articles; articles contributing to the case study; short articles of the PhD-symposium (work in progress).

Ripple-Down Rules: The Alternative to Machine Learning

by Paul Compton Byeong Ho Kang

"In this era of deep learning, where is our deeper understanding of AI? The answer is, here, in this book. Compton and Kang's ideas are a ‘must-read’ for anyone working with AI. Based on examples of real-world applications, they show us a better way to use AI. If your AI models are confusing to understand and hard to maintain, then this book is for you." Tim Menzies, Professor, North Carolina State University Machine learning algorithms hold extraordinary promise, but the reality is that their success depends entirely on the suitability of the data available. This book is about Ripple-Down Rules (RDR), an alternative manual technique for rapidly building AI systems. With a human in the loop, RDR is much better able to deal with the limitations of the data. Ripple-Down Rules: The Alternative to Machine Learning starts by reviewing the problems with data quality and the problems with conventional approaches to incorporating expert human knowledge into AI systems. It suggests that problems with knowledge acquisition arise because of mistaken philosophical assumptions about knowledge. It argues people never really explain how they reach a conclusion, rather they justify their conclusion by differentiating between cases in a context. RDR is based on this more situated understanding of knowledge. The central features of a RDR approach are explained, and detailed worked examples are presented for different types of RDR, based on freely available software developed for this book. The examples ensure developers have a clear idea of the simple yet counter-intuitive RDR algorithms to easily build their own RDR systems. It has been proven in industrial applications that it takes only a minute or two per rule to build RDR systems with perhaps thousands of rules. The industrial uses of RDR have ranged from medical diagnosis through data cleansing to chatbots in cars. RDR can be used on its own or to improve the performance of machine learning or other methods.

Ripple Quick Start Guide: Get started with XRP and develop applications on Ripple's blockchain

by Febin John James

Learn to work with XRP and build applications on Ripple's blockchain Key Features Learn to use Ripple's decentralized system for transfering digital assets globally A simpilfied and shortened learning curve to understand the Ripple innovation and Blockchain Takes a hands-on approach to work with XRP – Ripple's native currency Book Description This book starts by giving you an understanding of the basics of blockchain and the Ripple protocol. You will then get some hands-on experience of working with XRP. You will learn how to set up a Ripple wallet and see how seamlessly you can transfer money abroad. You will learn about different types of wallets through which you can store and transact XRP, along with the security precautions you need to take to keep your money safe. Since Ripple is currency agnostic, it can enable the transfer of value in USD, EUR, and any other currency. You can even transfer digital assets using Ripple. You will see how you can pay an international merchant with their own native currency and how Ripple can exchange it on the ?y. Once you understand the applications of Ripple, you will learn how to create a conditionally-held escrow using the Ripple API, and how to send and cash checks. Finally, you will also understand the common misconceptions people have about Ripple and discover the potential risks you must consider before making investment decisions. By the end of this book, you will have a solid foundation for working with Ripple's blockchain. Using it, you will be able to solve problems caused by traditional systems in your respective industry. What you will learn Understand the fundamentals of blockchain and Ripple Learn how to choose a Ripple wallet Set up a Ripple wallet to send and receive XRP Learn how to protect your XRP Understand the applications of Ripple Learn how to work with the Ripple API Learn how to build applications on check and escrow features of Ripple Who this book is for This book is for anyone interested in getting their hands on Ripple technology and learn where it can be used to gain competitive advantages in their respective fields. For most parts of the book, you need not have any pre-requisite knowledge. However, you need to have basic background of JavaScript to write an escrow.

RISC-V Assembly Language Programming: Unlock the Power of the RISC-V Instruction Set (Maker Innovations Series)

by Stephen Smith

Gain the skills required to dive into the fundamentals of the RISC-V instruction set architecture. This book explains the basics of code optimization, as well as how to interoperate with C and Python code, thus providing the starting points for your own projects as you develop a working knowledge of assembly language for various RISC-V processors.The RISC-V processor is the new open-source CPU that is quickly gaining popularity and this book serves as an introduction to assembly language programming for the processor in either 32- or 64-bit mode. You’ll see how to write assembly language programs for several single board computers, including the Starfive Visionfive 2 and the Espressif ESP32-C3 32-bit RISC-V microcontroller. The book also covers running RISC-V Linux with the QEMU emulator on and Intel/AMD based PC or laptop and all the tools required to do so.Moving on, you’ll examine the basics of the RISC-V hardware architecture, all the groups of RISC-V assembly language instructions and understand how data is stored in the computer’s memory. In addition, you’ll learn how to interface to hardware such as GPIO ports. With RISC-V Assembly Language Programming you’ll develop enough background to use the official RISC-V reference documentation for your own projects.What You'll LearnProgram basic RISC-V Assembly LanguageSee how data is represented and stored in a RISC-V based computerMake operating system calls from Assembly Language and include other software libraries in projectsInterface to various hardware devicesComprehend code containing Assembly LanguageReverse engineer and hack codeUse the official RISC-V reference documentationWho This Book Is ForThose who have already learned to program in a higher-level language like Python, Java, C# or even C and now wish to learn Assembly Language programming.

The Rise and Development of FinTech: Accounts of Disruption from Sweden and Beyond (Routledge International Studies in Money and Banking)

by Robin Teigland Shahryar Siri Anthony Larsson Alejandro Moreno Puertas Claire Ingram Bogusz

This comprehensive guide serves to illuminate the rise and development of FinTech in Sweden, with the Internet as the key underlying driver. The multiple case studies examine topics such as: the adoption of online banking in Sweden; the identification and classification of different FinTech categories; process innovation developments within the traditional banking industry; and the Venture Capital (VC) landscape in Sweden, as shown through interviews with VC representatives, mainly from Sweden but also from the US and Germany, as well as offering insight into the companies that are currently operating in the FinTech arena in Sweden. The authors address questions such as: How will the regulatory landscape shape the future of FinTech companies? What are the factors that will likely drive the adoption of FinTech services in the future? What is the future role of banks in the context of FinTech and digitalization? What are the policies and government initiatives that aim to support the FinTech ecosystem in Sweden? Complex concepts and ideas are rendered in an easily digestible yet thought-provoking way. The book was initiated by the IIS (the Internet Foundation in Sweden), an independent organization promoting the positive development of the Internet in the country. It is also responsible for the Internet’s Swedish top-level domain .se, including the registration of domain names, and the administration and technical maintenance of the national domain name registry. The book illustrates how Sweden acts (or does not act) as a competitive player in the global FinTech arena, and is a vital addition to students and practitioners in the field.

The Rise of AI User Applications: Chatbots Integration Foundations and Trends

by Svetlana Bialkova

This monograph introduces readers to core theories and applications in the chatbot AI context. Although AI is attracting significant attention, there is a literature gap and lack of practical guidelines on the key drivers of chatbot efficiency and agency capacity. There is a caveat between algorithmic explanations and actionable understanding, despite the acknowledged importance of inherently human-centric properties. Addressing these gaps, this state-of-the-art book offers a distinctive combination of content, theory, practice evaluation, and a holistic framework encompassing cognitive, emotional and social aspects, focusing on how to enhance AI agency and user experience. The framework aims to drive design, encouraging development of intelligent systems, techniques to evaluate chatbot with purposes, to appropriately meet user needs and market demand for responsible and explainable AI, XAI. Avenues for transforming business and life by implementing new generation AI systems are further discussed, as well as recommendations to overcome consumer resistance and advice for policy measures to reduce risks given the AI boost. While the community is still in an exploratory mode, we hope “The Rise of AI User Applications: Chatbots Integration Foundations and Trends” provides the needed understanding and will inspire researchers across disciplines to combine their efforts and work together on this very intriguing topic.

The Rise of Artificial Intelligence and Big Data in Pandemic Society: Crises, Risk and Sacrifice in a New World Order

by Kazuhiko Shibuya

This book presents a study of the COVID-19 pandemic using computational social scientific analysis that draws from, and employs, statistics and simulations. Combining approaches in crisis management, risk assessment and mathematical modelling, the work also draws from the philosophy of sacrifice and futurology. It makes an original contribution to the important issue of the stability of society by highlighting two significant factors: the COVID-19 crisis as a catalyst for change and the rise of AI and Big Data in managing society. It also emphasizes the nature and importance of sacrifices and the role of politics in the distribution of sacrifices. The book considers the treatment of AI and Big Data and their use to both “good” and “bad” ends, exposing the inevitability of these tools being used. Relevant to both policymakers and social scientists interested in the influence of AI and Big Data on the structure of society, the book re-evaluates the ways we think of lifestyles, economic systems and the balance of power in tandem with digital transformation.

The Rise of Big Spatial Data

by Igor Ivan Alex Singleton Jiří Horák Tomáš Inspektor

This edited volume gathers the proceedings of the Symposium GIS Ostrava 2016, the Rise of Big Spatial Data, held at the Technical University of Ostrava, Czech Republic, March 16-18, 2016. Combining theoretical papers and applications by authors from around the globe, it summarises the latest research findings in the area of big spatial data and key problems related to its utilisation. Welcome to dawn of the big data era: though it's in sight, it isn't quite here yet. Big spatial data is characterised by three main features: volume beyond the limit of usual geo-processing, velocity higher than that available using conventional processes, and variety, combining more diverse geodata sources than usual. The popular term denotes a situation in which one or more of these key properties reaches a point at which traditional methods for geodata collection, storage, processing, control, analysis, modelling, validation and visualisation fail to provide effective solutions. >Entering the era of big spatial data calls for finding solutions that address all "small data" issues that soon create "big data" troubles. Resilience for big spatial data means solving the heterogeneity of spatial data sources (in topics, purpose, completeness, guarantee, licensing, coverage etc. ), large volumes (from gigabytes to terabytes and more), undue complexity of geo-applications and systems (i. e. combination of standalone applications with web services, mobile platforms and sensor networks), neglected automation of geodata preparation (i. e. harmonisation, fusion), insufficient control of geodata collection and distribution processes (i. e. scarcity and poor quality of metadata and metadata systems), limited analytical tool capacity (i. e. domination of traditional causal-driven analysis), low visual system performance, inefficient knowledge-discovery techniques (for transformation of vast amounts of information into tiny and essential outputs) and much more. These trends are accelerating as sensors become more ubiquitous around the world.

The Rise of Games and High-Performance Computing for Modeling and Simulation

by National Research Council of the National Academies

The technical and cultural boundaries between modeling, simulation, and games are increasingly blurring, providing broader access to capabilities in modeling and simulation and further credibility to game-based applications. The purpose of this study is to provide a technical assessment of Modeling, Simulation, and Games (MS&G) research and development worldwide and to identify future applications of this technology and its potential impacts on government and society. Further, this study identifies feasible applications of gaming and simulation for military systems; associated vulnerabilities of, risks to, and impacts on critical defense capabilities; and other significant indicators and warnings that can help prevent or mitigate surprises related to technology applications by those with hostile intent. Finally, this book recommends priorities for future action by appropriate departments of the intelligence community, the Department of Defense research community, and other government entities. The Rise of Games and High Performance Computing for Modeling and Simulation will serve as a useful tutorial and reference document for this particular era in the evolution of MS&G. The book also highlights a number of rising capabilities facilitated by MS&G to watch for in the coming years.

The Rise of Herobrine: An Unofficial Overworld Adventure, Book Three (Unofficial Overworld Adventure)

by Danica Davidson

Stevie has been having repeated nightmares about the mysterious figure known as "Herobrine.” Some say Herobrine is an old ghost story. Some say he’s a virus. But no one believes he is real...except maybe Stevie, whose nightmares are telling him that Herobrine is going to take over the Overworld.His cousin Alex has come to visit, and during one of her explorations, she finds a music disc that predicts the destruction of the Overworld! Are Stevie’s nightmares and the music disc connected? Stevie and Alex hook up with Stevie’s best friend Maison, and the three quickly begin looking for answers.While they look, Herobrine is drawing ever closer. Someone is stealing the villagers’ most precious belongings, including Stevie’s cat, Ossie. People are angry and turning against one another. And there are mysterious signs appearing around the Overworld.Stevie, Maison, and Alex must unearth more music discs, piece together clues from the nightmares, and, ultimately, confront Herobrine-the most feared being of all-at his dark home in an abandoned temple high atop a forbidding mountain. The fate of the Overworld is depending on them.Sky Pony Press, with our Good Books, Racehorse and Arcade imprints, is proud to publish a broad range of books for young readers-picture books for small children, chapter books, books for middle grade readers, and novels for young adults. Our list includes bestsellers for children who love to play Minecraft; stories told with LEGO bricks; books that teach lessons about tolerance, patience, and the environment, and much more. In particular, this adventure series is created especially for readers who love the fight of good vs. evil, magical academies like Hogwarts in the Harry Potter saga, and games like Minecraft, Terraria, and Pokemon GO. While not every title we publish becomes a New York Times bestseller or a national bestseller, we are committed to books on subjects that are sometimes overlooked and to authors whose work might not otherwise find a home.

The Rise of Metacreativity: AI Aesthetics After Remix

by Eduardo Navas

This book brings together history and theory in art and media to examine the effects of artificial intelligence and machine learning in culture, and reflects on the implications of delegating parts of the creative process to AI. In order to understand the complexity of authorship and originality in relation to creativity in contemporary times, Navas combines historical and theoretical premises from different areas of research in the arts, humanities, and social sciences to provide a rich historical and theoretical context that critically reflects on and questions the implications of artificial intelligence and machine learning as an integral part of creative production. As part of this, the book considers how much of postproduction and remix aesthetics in art and media preceded the current rise of metacreativity in relation to artificial intelligence and machine learning, and explores contemporary questions on aesthetics. The book also provides a thorough evaluation of the creative application of systematic approaches to art and media production, and how this in effect percolates across disciplines including art, design, communication, as well as other fields in the humanities and social sciences. An essential read for students and scholars interested in understanding the increasing role of AI and machine learning in contemporary art and media, and their wider role in creative production across culture and society.

The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity (Routledge Studies in Crime and Society)

by Tine Munk

This book outlines the complexity in understanding different forms of cyber attacks, the actors involved, and their motivations. It explores the key challenges in investigating and prosecuting politically motivated cyber attacks, the lack of consistency within regulatory frameworks, and the grey zone that this creates, for cybercriminals to operate within. Connecting diverse literatures on cyberwarfare, cyberterrorism, and cyberprotests, and categorising the different actors involved – state-sponsored/supported groups, hacktivists, online protestors – this book compares the means and methods used in attacks, the various attackers, and the current strategies employed by cybersecurity agencies. It examines the current legislative framework and proposes ways in which it could be reconstructed, moving beyond the traditional and fragmented definitions used to manage offline violence. This book is an important contribution to the study of cyber attacks within the areas of criminology, criminal justice, law, and policy. It is a compelling reading for all those engaged in cybercrime, cybersecurity, and digital forensics.

The Rise of the Algorithms: How YouTube and TikTok Conquered the World

by John M. Jordan

The meteoric rise of online video is reshaping the competition for human attention. The Rise of the Algorithms argues that this new technology has changed the way we interact with others, our relationships with public institutions, and our very own behaviors and psyches. In tracing the origins and evolution of online video, John M. Jordan examines the mechanics—and the ethical stakes—of online video platforms, especially YouTube and TikTok but also others, such as Twitch. Tracing the use of algorithms pioneered by Facebook and Google and so successfully exploited by TikTok’s corporate parent, ByteDance, Jordan shows how these platforms now engineer human behavior—with consequences for culture, politics, and identity. Jordan argues that we are at an inflection point. Until now we have proved, as a society, ill-prepared or unwilling to address such problems as the power of digital platforms, the personal cost of viral celebrity, the invasion of privacy, and the proliferation of disinformation. The Rise of the Algorithms combines this urgent assessment with a clear-eyed discussion of present challenges and recommendations for reclaiming our online futures.A valuable resource for understanding the transformations that have been and will be brought by YouTube, TikTok, and similar platforms, Jordan’s timely book is a vital work for anyone who uses the internet and especially for policy makers, technologists, communication and media specialists, and researchers who have a direct hand in determining the future of our online world.

The Rise of the Computer State

by David Burnham

The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation's corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the American people. This book was written in 1983 as a warning. Today it is a history. Most of its grim scenarios are now part of everyday life. The remedy proposed here, greater public oversight of industry and government, has not occurred, but a better one has not yet been found. While many individuals have willingly surrendered much of their privacy and all of us have lost some of it, the right to keep what remains is still worth protecting.

Refine Search

Showing 44,901 through 44,925 of 54,505 results