EPDF and EPUB available Open Access under CC-BY-NC-ND licence. Today, the intensive use of data is changing politics, power relations and everyday life. Drawing on the study of different cities in ...the Global South, this book explores how data have become a generative force in shaping what cities are, how they are governed and inhabited, especially during times of crisis, such as the COVID-19 pandemic.
The ebook edition of this title is Open Access and freely available to read online. Our culture has an uneasy relationship with repetition and sameness. On the one hand, we find familiarity ...pleasurable and soothing; on the other, we crave novelty and long for a sense of discovery. We blame algorithms, intent on selling us more of the same, and on a media industry too greedy to risk investing in intellectually challenging, radically new, products. Sameness and Repetition in Contemporary Media Culture takes a comprehensive approach that both theorises and historically grounds the idea of repetition in relation to media as something that is deeply embedded in our cultural tradition. This project received funding from the Carlsberg Foundation.
Public International Law: A Multi-Perspective Approach is a comprehensive yet critical introduction to the diverse field of public international law. Bringing together a unique range of perspectives ...from around the world and from different theoretical approaches, this textbook introduces both the overarching questions and doctrines of public international law, as well as the specialised sub-fields. These include emerging fields such as international law in cyberspace, international migration law, and the international climate regime. The book includes numerous case examples, references to debates and controversies in the literature, and focus sections addressing topics in more depth. Featuring an array of pedagogical features, including learning objectives, suggested further reading and resources, and QR codes to interactive exercises, this book is ideal for students studying this field for the first time and also offers something new for students who would like to deepen their knowledge via a diverse and engaging range of perspectives. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-ShareAlike (CC-BY-SA) 4.0 License.
This book delivers an introduction and overview of developing intersections between digital methods and literary studies. The Digital Humanities and Literary Studies serves as a starting place for ...those who wish to learn more about the possibilities, and the limitations, of the oft-touted digital humanities in the literary space. The volume engages with the proponents of digital humanities and its detractors alike, aiming to offer a fair and balanced perspective on this controversial topic. The book combines a survey and background approach with original literary research and, therefore, straddles the divide between seasoned digital experts and interested newcomers.
EPDF and EPUB available Open Access under CC-BY-NC-ND licence. Drawing on empirical data from US and UK as well as the unique example of Nordic countries where there is a high level of confidence in ...state and media institutions, this book shows how platforms and algorithms are transforming media, journalism and audiences’ civic practices today.
Artificial Intelligence (AI) is widely used in society today. The (mis)use of biased data sets in machine learning applications is well‑known, resulting in discrimination and exclusion of citizens. ...Another example is the use of non‑transparent algorithms that can’t explain themselves to users, resulting in the AI not being trusted and therefore not being used when it might be beneficial to use it.
Responsible Use of AI in Military Systems lays out what is required to develop and use AI in military systems in a responsible manner. Current developments in the emerging field of Responsible AI as applied to military systems in general (not merely weapons systems) are discussed. The book takes a broad and transdisciplinary scope by including contributions from the fields of philosophy, law, human factors, AI, systems engineering, and policy development.
Divided into five sections, Section I covers various practical models and approaches to implementing military AI responsibly; Section II focuses on liability and accountability of individuals and states; Section III deals with human control in human‑AI military teams; Section IV addresses policy aspects such as multilateral security negotiations; and Section V focuses on ‘autonomy’ and ‘meaningful human control’ in weapons systems.
Key Features:
Takes a broad transdisciplinary approach to responsible AI
Examines military systems in the broad sense of the word
Focuses on the practical development and use of responsible AI
Presents a coherent set of chapters, as all authors spent two days discussing each other’s work
This book provides the reader with a broad overview of all relevant aspects involved with the responsible development, deployment and use of AI in military systems. It stresses both the advantages of AI as well as the potential downsides of including AI in military systems.
A significant gap exists in the conceptualization of entrepreneurship in the digital age. This paper introduces a conceptual framework for studying entrepreneurship in the digital age by integrating ...two wellestablished concepts: the digital ecosystem and the entrepreneurial ecosystem. The integration of these two ecosystems helps us better understand the interactions of agents and users that incorporate insights of consumers' individual and social behavior. The Digital Entrepreneurial Ecosystem framework consists of four concepts: digital infrastructure governance, digital user citizenship, digital entrepreneurship, and digital marketplace. The paper develops propositions for each of the four concepts and provides a theoretical framework of multisided platforms to better understand the digital entrepreneurial ecosystem. Finally, it outlines a new research agenda to fill the gap in our understanding of entrepreneurship in the digital age.
While the manufacturing industry in Europe is looking at Industry 4.0 approaches and technologies to maintain the current competitive advantage, on the other hand, in the building industry (BI) they ...may push an improvement of the overall productivity also. This paper presents a research activity, which has aimed at investigating potentials and criticisms of Parametric and Generative Design techniques in mass-production environments of the BI though a pilot-case-study analysis in Glued-Laminated-Timber (GLT) industry. Starting from programming a parametric algorithm for GLT engineering, the research has measured manufacturing effectiveness and manufacturing efficiency through a Value-Stream Map of an ordinary supply-chain system of GLT. Considering all the limits of referring to a single case study, results highlight improvements both in manufacturing effectiveness and manufacturing efficiency; but limitations have to be considered as well, due to the complete absence of Industry 4.0 approaches and technologies in an ordinary supply-chain system of GLT.
•Application of Parametric and Generative Design techniques in mass production environments of the Building Industry•Development of a pilot case study in the Glued-Laminated-Timber (GLT) Industry•Analysis of impacts implementing a parametric algorithm in an ordinary value-chain system of GLT•Testing the effectiveness of a parametric algorithm for product design and engineering through Value-Stream Modelling•The paper highlights needs of Industry 4.0 approaches and technologies in order to overcome actual limitations
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
The information age has opened a new front of adversarial statecraft. The past decades have seen the rise and refinement of conflict enacted in the world of information, with tactics including ...seeding disinformation, the theft of sensitive data, confusing or obscuring public opinion to forward specific goals, and beyond. Deterrence in the 21st Century asks how, and if it is indeed possible, to deter an enemy in the realm of information warfare. Setting the stage with an overview of key concepts of deterrence in the information age, the book presents new conceptual approaches and their possible applications. Bringing together some of the most respected analysts working today, Deterrence in the 21st Century looks beyond the technical aspects of the use of information and disinformation as adversarial statecraft to seek new avenues to deter the undermining of institutions and societies. Treating deterrence as a concept, a policy, a social challenge, and a series of practical solutions, Deterrence in the 21st Century presents theoretical approaches, conceptual analysis, empirical research, and content analysis. This is a thorough, thoughtful, and expert analysis of one of the most difficult and essential security challenges of our time. With contributions by: Christopher Ankersen, Yair Ansbacher, Oshri Bar-Gill, Stephen J. Cimbala, Maddie D’Agata, Molly Ellenberg, Leandre R. Fabrigar, Rachel Lea Heide, Nicole J. Jackson, Pierre Jolicoeur, Christian Leuprecht, Adam Lowther, Sarah Jane Meharg, Eric Ouellet, Ronald D. Porter, Anthony Seaboyer, Ron Schleifer, Miniqian Shen, Anne Speckhard, Keith Stewart, Joseph Szeman, and Alex Wilner
PURPOSE: Information technologies occupy an important place in modern education. This is necessitated both by digitalization processes and by increased public expectations and the labor market. ...Creating and improving young people's digital skills is a key priority of the education system. In this context, the development aims to systematize some of the main problems facing information technology education. METHODS: The applied methods are related to: literature review; survey to identify the problems in information technology training, analysis of possible technological solutions for conducting information technology training. RESULTS: The main results are aimed at systematizing the main problems of information technology education. CONCLUSIONS: The conclusions are in the direction of identifying the main problems in information technology education in the high school stage of secondary schools.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK