Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Emotions, Technology, Design, and Learning

      • 1st Edition
      • October 7, 2015
      • Sharon Y. Tettegah + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 8 5 6 9
      • eBook
        9 7 8 0 1 2 8 0 1 8 8 1 1
      Emotions, Technology, Design, and Learning provides an update to the topic of emotional responses and how technology can alter what is being learned and how the content is learned. The design of that technology is inherently linked to those emotional responses. This text addresses emotional design and pedagogical agents, and the emotions they generate. Topics include design features such as emoticons, speech recognition, virtual avatars, robotics, and adaptive computer technologies, all as relating to the emotional responses from virtual learning.
    • Emerging Technologies for Librarians

      • 1st Edition
      • November 25, 2015
      • Sharon Q Yang + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 8 8 0
      • eBook
        9 7 8 1 7 8 0 6 3 4 6 9 2
      Emerging Technologies for Librarians: A Practical Approach to Innovation focuses on the practical applications of emerging technologies in libraries, defining the technologies in the context of their use in real situations. Each chapter includes an overview of the use of emerging technologies in a particular work area that is followed by a list of relevant applications. Chapters cover work areas such as advertising, distance learning, metadata. and digital libraries, and also focus on applications, including mobile computing and web conferencing, followed by a conclusion. This book serves as a guide for those interested in learning about, and implementing, the available technologies that enhance library services, and also lists and discusses the types of emerging technologies that are available for a specific area of work.
    • Environmental Mycology in Public Health

      • 1st Edition
      • August 3, 2015
      • Carla Viegas + 5 more
      • English
      • Hardback
        9 7 8 0 1 2 4 1 1 4 7 1 5
      • eBook
        9 7 8 0 1 2 4 1 1 5 3 5 4
      Environmental Mycology in Public Health: Fungi and Mycotoxins Risk Assessment and Management provides the most updated information on fungi, an essential element in the survival of our global ecology that can also pose a significant threat to the health of occupants when they are present in buildings. As the exposure to fungi in homes is a significant risk factor for a number of respiratory symptoms, including allergies and hypersensitivity pneumonitis, this book presents information on fungi and their disease agents, important aspects of exposure assessment, and their impacts on health. This book answers the hard questions, including, "How does one detect and measure the presence of indoor fungi?" and "What is an acceptable level of indoor fungi?" It then examines how we relate this information to human health problems.
    • Application of Big Data for National Security

      • 1st Edition
      • February 14, 2015
      • Babak Akhgar + 5 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 9 6 7 2
      • eBook
        9 7 8 0 1 2 8 0 1 9 7 3 3
      Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security
    • Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 8 7
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 5 4
      Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.
    • Protecting Transportation

      • 1st Edition
      • January 28, 2015
      • R William Johnstone
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 1 0 1 7
      • eBook
        9 7 8 0 1 2 4 0 7 9 2 8 1
      Protecting Transportation: Implementing Security Policies and Programs provides a thorough overview of transportation security in the United States, with a focus on policy. The book coversall major transportation modes and puts the American security system into perspective against other national and international systems. Author R. William Johnstone, a transportation security expert and member of the 9/11 Commission staff, discusses how the current transportation security system came to be and how it is performing. Whether you are a current or aspiring transportation security professional, a policymaker, or an engaged citizen, Johnstone’s presentation equips you to understand today’s issues and debates on a problem that affects every member of the global community. Transportation security has evolved in the years since 9/11 from a relatively modest, sporadic undertaking into a multi-billion dollar enterprise employing tens of thousands. Protecting Transportation describes how that system is organized, funded, and implemented.
    • Evolutionary Criminology

      • 1st Edition
      • March 12, 2015
      • Russil Durrant + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 9 7 9 3 7 7
      • eBook
        9 7 8 0 1 2 3 9 8 4 9 3 7
      In our attempts to understand crime, researchers typically focus on proximate factors such as the psychology of offenders, their developmental history, and the social structure in which they are embedded. While these factors are important, they don't tell the whole story. Evolutionary Criminology: Towards a Comprehensive Explanation of Crime explores how evolutionary biology adds to our understanding of why crime is committed, by whom, and our response to norm violations. This understanding is important both for a better understanding of what precipitates crime and to guide approaches for effectively managing criminal behavior. This book is divided into three parts. Part I reviews evolutionary biology concepts important for understanding human behavior, including crime. Part II focuses on theoretical approaches to explaining crime, including the evolution of cooperation, and the evolutionary history and function of violent crime, drug use, property offending, and white collar crime. The developmental origins of criminal behavior are described to account for the increase in offending during adolescence and early adulthood as well as to explain why some offenders are more likely to desist than others. Proximal causes of crime are examined, as well as cultural and structural processes influencing crime. Part III considers human motivation to punish norm violators and what this means for the development of a criminal justice system. This section also considers how an evolutionary approach contributes to our understanding of crime prevention and reduction. The section closes with an evolutionary approach to understanding offender rehabilitation and reintegration.
    • WISC-V Assessment and Interpretation

      • 1st Edition
      • June 4, 2015
      • Lawrence G. Weiss + 3 more
      • English
      • Hardback
        9 7 8 0 1 2 4 0 4 6 9 7 9
      • eBook
        9 7 8 0 1 2 4 0 5 1 8 5 0
      The Wechsler Intelligence Scale is the most widely used intelligence test for children worldwide. WISC-V introduces new subtests, composite scores, process scores, error scores, and scaled scores as a more complex and accurate means of assessing cognitive abilities. WISC-V Assessment and Interpretation provides practical information for clinicians on selection of subtest measures, administration, and interpretation. New subtests are described along with tips for accurate administration and scoring. Full Scale IQ is identified as important for predicting relevant behaviors, and primary index scores for characterizing the child’s strengths and weaknesses. Classroom indicators of low scores on each of these abilities are identified, with suggested interventions, accommodations, and instructional strategies for low scorers. Coverage includes ethnic differences for the Full Scale IQ and each primary index score, along with evidence of the profound influence of parental attitudes and expectations. Several other societal and contextual factors relevant to understanding racial/ethnic differences are presented. Two chapters review use of the WISC-V for identifying learning disabilities, testing of individuals with dyslexia, and best-practice recommendations to ensure accurate diagnosis and intervention. Concluding chapters describe advances in the Q-interactive system platform allowing administration of the WISC-V on iPads and other tablets and how clinicians can tailor assessment using select WISC-V subtests and features.
    • Security Litigation

      • 1st Edition
      • October 9, 2015
      • Eddie Sorrells
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 9 2 4 5
      • eBook
        9 7 8 0 1 2 8 0 1 9 3 7 5
      Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits provides practical guidance and examples on how to deal with the most difficult legal issues that security executives face every day, also exploring the key issues that occur before, during, and after a lawsuit. The book demonstrates scenarios that have actually played out in courtrooms, depositions, and contractual negotiations, and provides answers to challenging security litigation questions such as, What does this contractual provision mean if we get sued? Am I in legal trouble if I assign unarmed vs. armed officers and a crime occurs? How do I defend my company without blaming my customer? Increasingly, issues such as security surveys, contractual indemnification, and even marketing language are at the center of lawsuits concerning security practices. Many organizations face security-related lawsuits on an increasing basis, and this book provides a much needed resource to help security professionals successfully navigate the unique nature of security-related lawsuits. Accessibly written for those without a law background, the book assists readers through education, awareness, sample contract language, and assessment templates, offering meaningful recommendations and solutions.
    • The Myth and Magic of Library Systems

      • 1st Edition
      • September 23, 2015
      • Keith J. Kelley
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 0 7 6 2
      • eBook
        9 7 8 0 0 8 1 0 0 0 8 7 8
      The Myth and Magic of Library Systems not only defines what library systems are, but also provides guidance on how to run a library systems department. It is aimed at librarians or library administrations tasked with managing, or using, a library systems department. This book focuses on different scenarios regarding career changes for librarians and the ways they may have to interact with library systems, including examples that speak to IT decision-making responsibilities, work as a library administrator, or managerial duties in systems departments.