![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
From the early demise of Trent Lott at the hands of bloggers to the agonized scream of Howard Dean; from Daily Kos and the blogosphere to the rise of Twitter and Facebook, politics and new media have co-existed and evolved in rapid succession. Here, an academic and practitioner team up to consider how new and old media technologies mix with combustible politics to determine, in real time, the shape of the emerging political order. Our political moment shares with other realigning periods the sense that political parties are failing to address the public interest. In an era defined by the collapse of the political center, extreme income inequality, rapidly changing demography, and new methods of communicating and organizing, a second-generation online progressive movement fueled by email and social media is coming into its own. In this highly readable text, the authors - one a scholar of Internet politics, the other a leading voice of the first generation netroots - draw on unique data and on-the-ground experience to answer key questions at the core of our tumultuous politics: How has Internet activism changed in form and function? How have the left and right changed with it? How does this affect American political power?
Reviews: Ronald Eyerman, Professor of Sociology, Yale University and author of 'Myth, Meaning and Performance' - Fun to read... It makes a strong case for the democratic power of blogging and the internet, a form of empowerment for the voiceless. Norman Solomon, author of 'War Made Easy: How Presidents and Pundits Keep Spinning Us to Death' - Anyone eager to understand how cyberspace has changed our possibilities - and how it often remains trapped in grim social contexts - would do well to read Erik Ringmar's A Blogger's Manifesto.
This book is about internet finance, a concept coined by the authors in 2012. Internet finance deals specifically with the impacts of internet based technologies, such as mobile payments, social networks, search engines, cloud computation, and big data, on the financial sector. Major types of internet finance include third-party payments and mobile payments, internet currency, P2P lending, crowdfunding, and the use of big data in financial activities. Internet finance is highly popular and heavily discussed in China. Chinese Premier Li Keqiang made the healthy development of internet finance a policy priority in 2014 state-of-union address. This book, as a detailed report on internet finance in China, will help readers understand the status quo and development of China's financial system.
Journalism Online tackles the pressing question of how to apply fundamental journalism skills to the online medium. It provides an essential guide to the Internet as a research and publishing tool. In particular, it examines how to forge key journalism skills with the distinctive qualities of the World Wide Web to provide compelling web content. Trainee and practicing online journalists will learn: - core journalism skills of identifying, collecting, selecting and presenting news and information; - multimedia skills such as audio recording and editing; - online research methods including use of search tools, newsgroups and listservs; - story construction and writing for the Web; - an introduction to HTML; - web site design for the effective use of content. Journalism Online takes the best of the 'new' and 'old' media to provide an essential primer for this emerging discipline. Leading web designers such as Jakob Nielsen rub shoulders with established journalists like Harold Evans in the search for clear guidance in this rapidly developing field. It also provides a useful insight for non-news organisations into how to prepare and present effective web content and avoid the deepest pitfall of the online world - being ignored. Supplementary resources can be found on the book's supporting web site www.journalismonline.co.uk, which features additional exercises, useful links and reviews.
This edited volume brings together experts from around the world to provide coverage and analysis of infrastructure's role in Internet governance, both now and in the future. Never in history have conflicts over Internet governance attracted such widespread attention. High-profile controversies include the disclosures about NSA surveillance by intelligence analyst Edward Snowden, controversy over a decision by the US government to relinquish its historic oversight of Internet names and numbers, and countless cybersecurity breaches involving unauthorized access to Internet users' personal data. Much of the Internet governance ecosystem-both technical architecture and coordinating institutions-is behind the scenes but increasingly carries significant public interest implications. An area once concealed in institutional and technological complexity is now rightly bracketed among other shared global issues-such as environmental protection and human rights-that have considerable global implications but are simply incongruous with national borders. This transformation into an era of global governance by Internet infrastructure presents a moment of opportunity for scholars to bring these politicized infrastructures to the foreground.
Under the term Customer Relationship Management (CRM), companies such as SAP, Siebel Systems or E.piphany offer software solutions to optimize customer-facing processes. Business units responsible for the implementation of CRM software are in many cases relatively inexperienced in the reorganization of these processes. It is important for them to consider the needs of their customers as a whole. This book describes the customer relatioship using the concept of the Customer Buying Cycle, thereby creating a neutral orientation framework for CRM projects. For each phase of the Customer Buying Cycle it shows how Information Technologies can be used to generate benefits either for the customer or for the company that implements the CRM tools. This book includes many case studies exemplifying how CRM is realized in the practical business world.
* Provides simple, conceptual descriptions of everyday technologies * Includes clear examples and diagrams that demonstrate the principles and techniques, not just a "how-to" punch list * Covers advanced topics for readers who want to dive into the deep end of the technology pool * Avoids jargon-where terminology does appear, the text will provide clear, concise definitions
Just say "no" to piles of sticky notes and scraps of paper with your passwords and logins! Keep track of them in this elegant, yet inconspicuous, alphabetically tabbed cognac leatherette notebook. In this 4" x 6" hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You'll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.
This work provides a thorough overview of the technical and social aspects of electronic mail. It analyzes the problems, solutions and effects of e-mail and includes coverage of the market for e-mail, the ethical and legal aspects of it, recent research and the X.400 and Internet mail standards.
Todd Whitaker, Jeffrey Zoul, and Jimmy Casas are widely acclaimed experts on teaching and leading and are pioneers in the education twitterverse, and now they are sharing their best practices! In What Connected Educators Do Differently, they show how being a connected educator-by using social media to connect with peers across the country and even across the globe-will greatly enhance your own learning and your success in a school or classroom. You'll find out how to create a personal and professional learning network to share resources and ideas, gain support, and make an impact on others. By customizing your professional development in this way, you'll be able to learn what you want, how you want, when you want. Best of all, you'll become energized and inspired by all the great ideas out there and how you can contribute, benefiting both you and your students. Whether you are a teacher or school leader, you will come away from this book with step-by-step advice and fresh ideas to try immediately. Being a connected educator has never been easier or more important than it is right now!
"Facebook and Philosophy" is an entertaining, multi-faceted exploration of what Facebook means for us and for our relationships. With discussions ranging from the nature of friendship and its relationship to "friending," to the (debatable) efficacy of "online activism," this book is the most extensive and systematic attempt to understand Facebook yet. And with plenty of new perspectives on Twitter and Web 2.0 along the way, this fun, thought-provoking book is a serious and significant contribution for anyone working with social media, whether in academia, journalism, public relations, activism, or business. Exploring far-reaching questions -- Can our interactions on Facebook help us care about each other more? Does Facebook signal the death of privacy, or (perhaps worse yet) the death of our desire for privacy? -- "Facebook and Philosophy" is vital reading for anyone involved in social networks today.
Originally published in 2003. This book examines the growth of news provision on the internet and its implications for news presentation, journalism practice, news consumers, and the business of running news organizations. Much of the focus is placed on the migration of newspapers onto the internet, but references are also made to the establishment of news websites by other organizations. The book examines the growth of online technology as a source of information and entertainment and considers how this development can be framed within models of communication and comments, on the apparent shortage of new models to explain the use, role, effectiveness, and impact of online communications.
Information and the technology to rapidly transmit, analyze, document, and disperse this information are increasing arithmetically, if not logarithmi cally. Arguably, no discipline better exemplifies this trend than medicine. It can be further argued that care of the trauma patient is one of the better examples of informatics and the potential benefit to the health profession als who care for these patients. Maull and Augenstein have provided us with a primer on informatics and its use in trauma care. The subject matter is timely and covers the gamut of trauma care from prehospital to rehabilitation. Who will benefit from trauma informatics? A simple answer would be anyone who takes care of trauma patients. From a broader perspective, however, at least three examples illustrate how trauma informatics can be used today to exert a positive effect on patient outcome. The first example is care of combat casualties, including battlefield resuscitation, evacuation, acute care, and ultimate return to the continental United States. Current technology is such that via global positioning satellite, a corpsman could transmit to a remote area the vital signs and pertinent physical findings of a combat casualty. Furthermore, the location of the corpsman and the casu alty would be precisely known, and consultation and destination disposition would be possible. The injured person, when admitted to a combat support hospital, could be continuously monitored and additional remote consulta tion obtained."
The world of Internet law is constantly changing and is difficult to follow, even for those for whom doing so is a full-time job. This updated, everything-you-need-to-know reference removes the uncertainty. Internet and the Law: Technology, Society, and Compromises, Second Edition is the go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about how to protect intellectual creations, but about what should be protected. Entries also discuss how the Web has brought First Amendment rights and free expression into question as society grapples with attempts to control "leaks" and to restrict content such as pornography, spam, defamation, and criminal speech. Explains complex legal and technical concepts clearly and understandably through entries that range from 500 to 5,000 words Covers a wide range of topics, including censorship, copyright, domain name disputes, file-sharing, hacking, patents, spam, malware, international law, tax issues, trademarks, and viruses Features an introductory guide to the U.S. legal system, including how to find, read, and understand sources of law Includes cases, statutes, and international treaties relevant to the law of information technology and the Internet
Focused on the mathematical foundations of social media analysis, Graph-Based Social Media Analysis provides a comprehensive introduction to the use of graph analysis in the study of social and digital media. It addresses an important scientific and technological challenge, namely the confluence of graph analysis and network theory with linear algebra, digital media, machine learning, big data analysis, and signal processing. Supplying an overview of graph-based social media analysis, the book provides readers with a clear understanding of social media structure. It uses graph theory, particularly the algebraic description and analysis of graphs, in social media studies. The book emphasizes the big data aspects of social and digital media. It presents various approaches to storing vast amounts of data online and retrieving that data in real-time. It demystifies complex social media phenomena, such as information diffusion, marketing and recommendation systems in social media, and evolving systems. It also covers emerging trends, such as big data analysis and social media evolution. Describing how to conduct proper analysis of the social and digital media markets, the book provides insights into processing, storing, and visualizing big social media data and social graphs. It includes coverage of graphs in social and digital media, graph and hyper-graph fundamentals, mathematical foundations coming from linear algebra, algebraic graph analysis, graph clustering, community detection, graph matching, web search based on ranking, label propagation and diffusion in social media, graph-based pattern recognition and machine learning, graph-based pattern classification and dimensionality reduction, and much more. This book is an ideal reference for scientists and engineers working in social media and digital media production and distribution. It is also suitable for use as a textbook in undergraduate or graduate courses on digital media, social media, or social networks.
The Architectural Imagination at the Digital Turn asks what it means to speak of a "digital turn" in architecture. It examines how architects at the time engaged with the digital and imagined future modes of practice, and looks at the technological, conceptual and economic phenomena behind this engagement. It argues that the adoption of digital technology in architecture was far from linear but depended on complex factors, from the operative logic of the technology itself to the context in which it was used and the people who interacted with it. Creating a mosaic-like account, the book presents debates, projects and publications that changed how architecture was visualized, fabricated and experienced using digital technology. Spanning the university, new media art institutes, ecologies, architectural bodies, fabrication and the city, it re-evaluates familiar narratives that emphasized formal explorations; instead, the book aims to complicate the "myth" of the digital by presenting a nuanced analysis of the material and social context behind each case study. During the 1990s, architects repurposed software and technological concepts from other disciplines and tested them in a design environment. Some architects were fascinated by its effects, others were more critical. Through its discussion on case studies, places and themes that fundamentally influenced discourse formation in the era, this book offers scholars, researchers and students fresh insights into how architecture can engage with the digital realm today.
Becoming a blogger takes practice, hard work, and, ultimately, a passion for the craft. Whether you plan to blog on politics or parenting, The Elements of Blogging is designed to give you the skills and strategies to get started, to sustain your work, and to seek out a robust audience. This book is loaded with practical advice on important topics such as determining a niche, finding the best stories, and blogging effectively and ethically. It features examples from both amateur and professional bloggers that show the techniques for building an argument, finding a voice, crafting a headline, and establishing a brand. Key features: Real-world applicability. This book includes thumbnail profiles of bloggers and their sites, which illuminate key skills you will need to become an effective blogger Interactivity. Each chapter features discussion points and exercises intended to get you to think about, reflect on, and apply the contents of each chapter Creativity. While this book dives into software and plug-ins for bloggers, its main goal is to cover how to write blogs on a myriad of topics: news, opinion pieces, travel, politics, art, and more. Visit the companion website: http://www.theelementsofblogging.com/
In recent years, we have witnessed the mushrooming of pro- democracy and protest movements not only in the Arab world, but also within Europe and the Americas. Such movements have ranged from popular upheavals, like in Tunisia and Egypt, to the organization of large-scale demonstrations against unpopular policies, as in Spain, Greece and Poland. What connects these different events are not only their democratic aspirations, but also their innovative forms of communication and organization through online means, which are sometimes considered to be outside of the State's control. At the same time, however, it has become more and more apparent that countries are attempting to increase their understanding of, and control over, their citizens' actions in the digital sphere. This involves striving to develop surveillance instruments, control mechanisms and processes engineered to dominate the digital public sphere, which necessitates the assistance and support of private actors such as Internet intermediaries. Examples include the growing use of Internet surveillance technology with which online data traffic is analysed, and the extensive monitoring of social networks. Despite increased media attention, academic debate on the ambivalence of these technologies, mechanisms and techniques remains relatively limited, as is discussion of the involvement of corporate actors. The purpose of this edited volume is to reflect on how Internet-related technologies, mechanisms and techniques may be used as a means to enable expression, but also to restrict speech, manipulate public debate and govern global populaces. This book was published as a special issue of the Journal of Information Technology and Politics.
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.
This book presents state of the art theoretical and empirical research on the ubiquitous internet: its everyday users and its economic stakeholders. The book offers a 360-degree media analysis of the contemporary terrain of the internet by examining both user and industry perspectives and their relation to one another. Contributors consider user practices in terms of internet at your fingertips-the abundance, free flow, and interconnectivity of data. They then consider industry's use of user data and standards in commodification and value-creation.
Created around the world and available only on the Web, internet ""television"" series are independently produced, mostly low budget shows that often feature talented but unknown performers. Typically financed through crowd-funding, they are filmed with borrowed equipment and volunteer casts and crews, and viewers find them through word of mouth or by chance. The third of five volumes on Internet TV series, this book covers 335 alphabetically arranged gay and lesbian programs, giving casts, credits, story lines, episode descriptions, websites, dates and commentary. A complete index lists program titles and headings for gay, lesbian, bi-sexual, transgender and drag queen shows.
Web-Based Instruction details how faculty members can design web-based and web-assisted instructional delivery approaches to provide students with the opportunity to learn anytime and anyplace. It stresses the paradigm shift in using technology as an alternative instructional delivery tool but recognizes that the course design and delivery method must maintain the principles of good teaching practices and academic rigor. The book examines how to win student respect and trust, provide support systems, and transition from the classroom-based approach, and it includes examples of course designs, as well as student feedback systems. James Van Keuren takes the frustration out of designing and implementing alternative instructional delivery approaches that do not rely on face-to-face contact. He also creates a step-by-step process for shifting from a teacher-centered to a more student-centered learning environment.
There is much excitement about Web 2.0 as an unprecedented, novel, community-building space for experiencing, producing, and consuming leisure, particularly through social network sites. What is needed is a perspective that is invested in neither a utopian or dystopian posture but sees historical continuity to this cyberleisure geography. This book investigates the digital public sphere by drawing parallels to another leisure space that shares its rhetoric of being open, democratic, and free for all: the urban park. It makes the case that the history and politics of public parks as an urban commons provides fresh insight into contemporary debates on corporatization, democratization and privatization of the digital commons. This book takes the reader on a metaphorical journey through multiple forms of public parks such as Protest Parks, Walled Gardens, Corporate Parks, Fantasy Parks, and Global Parks, addressing issues such as virtual activism, online privacy/surveillance, digital labor, branding, and globalization of digital networks. Ranging from the 19th century British factory garden to Tokyo Disneyland, this book offers numerous spatial metaphors to bring to life aspects of new media spaces. Readers looking for an interdisciplinary, historical and spatial approach to staid Web 2.0 discourses will undoubtedly benefit from this text. |
You may like...
How Do Families Cope With Chronic…
Robert E. Cole, David Reiss
Hardcover
R3,935
Discovery Miles 39 350
Personality Disorders In Children And…
Alan Weiner, Karen Bardenstein, …
Hardcover
R1,437
Discovery Miles 14 370
Black Radio/Black Resistance - The Life…
Micaela Di Leonardo
Hardcover
R3,102
Discovery Miles 31 020
|