Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

Audio Content Security

  • 1st Edition
  • July 16, 2016
  • Sogand Ghorbani + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 1 3 8 4 - 4
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.

Library Consortia

  • 1st Edition
  • July 13, 2016
  • Aditya Tripathi + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 0 8 - 1 0 0 9 0 8 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 9 4 9 - 9
Libraries are burdened with increased demand for resources and services and inflating expectations against shrinking or stagnant budgets. An individual library cannot cope with the situation. Hence, libraries form alliances for cooperation and sharing. Emerging changes in the publishing industry are phenomenal and have forced libraries to move toward a strategic partnership called library consortia. Information technology has played a vital role in developing such partnerships. Publishers offer packages of resources to library consortia benefitting all member libraries. Library consortia protect the interests of individual members while considering the business interests of publishers. This book is a start-up guide to libraries and librarians desiring to form library consortia. It covers the various facets of library consortia and corresponding activities. The chapters are presented with different consortia models, formations, business negotiations and various licensing schemes.

Working with Text

  • 1st Edition
  • July 12, 2016
  • Emma Tonkin + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 8 4 3 3 4 - 7 4 9 - 1
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 4 3 0 - 2
What is text mining, and how can it be used? What relevance do these methods have to everyday work in information science and the digital humanities? How does one develop competences in text mining? Working with Text provides a series of cross-disciplinary perspectives on text mining and its applications. As text mining raises legal and ethical issues, the legal background of text mining and the responsibilities of the engineer are discussed in this book. Chapters provide an introduction to the use of the popular GATE text mining package with data drawn from social media, the use of text mining to support semantic search, the development of an authority system to support content tagging, and recent techniques in automatic language evaluation. Focused studies describe text mining on historical texts, automated indexing using constrained vocabularies, and the use of natural language processing to explore the climate science literature. Interviews are included that offer a glimpse into the real-life experience of working within commercial and academic text mining.

Overcoming Information Poverty

  • 1st Edition
  • July 6, 2016
  • Anthony Mckeown
  • English
  • Paperback
    9 7 8 - 0 - 0 8 - 1 0 1 1 1 0 - 2
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 1 2 3 1 - 4
Overcoming Information Poverty: Investigating the Role of Public Libraries in The Twenty-First Century considers the role of public libraries in alleviating information poverty and targeting social exclusion, using a three-level information poverty framework. The book proposes a model for understanding the concept of information poverty, develops indicators for its measurement, and provides recommendations for service improvement based on analysis of public library services at macro (strategic), meso (community) and micro (individual) levels. The topic is of theoretical and practical importance when considering the changing role of public libraries today. The book is the first time a macro, meso, and micro model of information poverty indicators has been developed and applied to illustrate the impact of public libraries at strategic, community, and personal levels.

Information Security Science

  • 1st Edition
  • June 21, 2016
  • Carl Young
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 6 - 8
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Successes and Failures of Knowledge Management

  • 1st Edition
  • June 14, 2016
  • Jay Liebowitz
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 1 8 7 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 3 3 7 - 9
Successes and Failures of Knowledge Management highlights examples from across multiple industries, demonstrating where the practice has been implemented well—and not so well—so others can learn from these cases during their knowledge management journey. Knowledge management deals with how best to leverage knowledge both internally and externally in organizations to improve decision-making and facilitate knowledge capture and sharing. It is a critical part of an organization’s fabric, and can be used to increase innovation, improve organizational internal and external effectiveness, build the institutional memory, and enhance organizational agility. Starting by establishing KM processes, measures, and metrics, the book highlights ways to be successful in knowledge management institutionalization through learning from sample mistakes and successes. Whether an organization is already implementing KM or has been reluctant to do so, the ideas presented will stimulate the application of knowledge management as part of a human capital strategy in any organization.

Cyber Guerilla

  • 1st Edition
  • June 13, 2016
  • Jelle Van Haaster + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 1 9 7 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 2 8 4 - 6
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

Accidental Information Discovery

  • 1st Edition
  • June 13, 2016
  • Tammera M. Race + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 8 4 3 3 4 - 7 5 0 - 7
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 4 3 1 - 9
Accidental Information Discovery: Cultivating Serendipity in the Digital Age provides readers with an interesting discussion on the ways serendipity—defined as the accidental discovery of valued information—plays an important role in creative problem-solving. This insightful resource brings together discussions on serendipity and information discovery, research in computer and information science, and interesting thoughts on the creative process. Five thorough chapters explore the significance of serendipity in creativity and innovation, the characteristics of serendipity-friendly tools and minds, and how future discovery environments may encourage serendipity.

Crime Scene Photography

  • 3rd Edition
  • June 12, 2016
  • Edward M. Robinson
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 2 7 6 4 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 6 8 - 4
Crime Scene Photography, Third Edition, covers the general principles and concepts of photography, while also delving into the more practical elements and advanced concepts of forensic photography. Robinson assists the reader in understanding and applying essential concepts in order to create images that are able to withstand challenges in court. This text is a required reading by both the International Association for Identification’s Crime Scene Certification Board and the Forensic Photography Certification Board. Includes an instructor website with lecture slides, practical exercises, a test bank, and image collection and many videos which can be used.

Socializing Children through Language

  • 1st Edition
  • June 11, 2016
  • Pamela Davis-Kean + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 3 6 2 4 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 5 0 - 1
Using psychological theory as a basis, Socializing Children through Language examines naturally occurring conversations between mothers and children in the context of achievement, self-regulation, food consumption, and television watching to illustrate how families of different socioeconomic means interact and discuss a variety of topics in the home. Specifically, the chapters in this book draw on enhanced audio recordings of over 40 families across a range of education and income levels to investigate how mothers’ language relates to child behaviors over time. The unique pairing of this digital observer data with empirical data on achievement tests, regulation tasks, and parenting information on the home environment collected one year later presents an altogether revolutionary way to understand and think about how family socialization works across socioeconomic levels.