Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet > General
Invaluable guidance on the most important legal issues facing nonprofits today Internet communication is the lifeblood of countless nonprofit organizations, yet there exists no specific law to provide for its regulation. Without solid legal guidance, nonprofits risk not only missing out on the unlimited opportunities that the Internet has to offer, but also jeopardizing their tax-exempt status. The Nonprofits' Guide to Internet Communications Law analyzes and explains the laws applicable to Internet communications by nonprofit organizations. Nonprofit law expert Bruce Hopkins writes that with Congress and government agencies reluctant to create new law, it will ultimately be up to the courts to determine the future of Internet law affecting nonprofit organizations. Extrapolating from the underlying principles of existing law, Hopkins addresses the legal ramifications of Internet business activities, charitable-giving administration, fundraising programs, lobbying, political campaign activities, and more. The Nonprofits' Guide to Internet Communications Law proves an unparalleled resource for this emerging field.
The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communication, it has also put our confidential information at risk. The growing concern with online privacy has caused many Internet users to question the security of their Internet transactions. This book answers these questions through an examination of the Center for Democracy and Technology, an organization that advocates for privacy. Li's book introduces the many issues in online privacy and discusses legal ownership of personal data, specifically one's name, address, telephone number, and email. Her in-depth research of the issues confronted by the Center for Democracy and Technology over a five-year period documents its mission and demonstrates its achievements in the crusade to maintain privacy. As we find ourselves using the Internet for more and more transactions, both personal and professional, we must be aware of our privacy rights and the activities of the organizations that fight to protect them-thus, the information in Li's book makes it a necessary reference for all public and university libraries and a useful resource for courses in information technology. Internet Privacy serves as an introduction to the issues of online privacy in the United States and examines what one advocacy group is doing to protect privacy in cyberspace.
An indispensable guide for telling fact from fiction on the internet—often in less than 30 seconds. The internet brings information to our fingertips almost instantly. The result is that we often jump to thinking too fast, without taking a few moments to verify the source before engaging with a claim or viral piece of media. Information literacy expert Mike Caulfield and educational researcher Sam Wineburg are here to enable us to take a moment for due diligence with this informative, approachable guide to the internet. With this illustrated tool kit, you will learn to identify red flags, get quick context, and make better use of common websites like Google and Wikipedia that can help and hinder in equal measure. This how-to guide will teach you how to use the web to verify the web, quickly and efficiently, including how to
And so much more. Building on techniques like SIFT and lateral reading, Verified will help students and anyone else looking to get a handle on the internet’s endless flood of information through quick, practical, and accessible steps.
Voluntary distributed computing projects divide large computational tasks into small pieces of data or work that are sent out over the Internet to be processed by individual users, who participate voluntarily in order to provide solutions that would ordinarily require investments of millions of dollars. This approach is contributing to the transformation of computationally heavy scientific research, opening up participation in science to interested lay people and greatly reducing the cost-barriers to computation for financially challenged researchers. Drawing on face-to-face and online ethnographic, survey and interview data with participants in distributed computing projects around the world, this book sheds light on the organizational and social structures of voluntary distributed computing projects, communities and teams, with close attention to questions of motivation in projects that offer little or no traditional forms of reward, either financially or in terms of participants' careers. With its focus on non-market, non-hierarchical cooperation, this book is a case study of networked individuals around the world who are part of a new social production of information. A rich study of the transformative potential inherent in globalization and connectedness, Community, Competition and Citizen Science will appeal to sociologists and political scientists with interests in globalization, networks and science and technology studies, together with scholars and students of media and communication and those working in relevant fields of computing, information systems and scientific collaboration.
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. * Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications * Aids readers in understanding how to design and build cyber-assurance into the IoT * Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance * Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking. Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.
A successful Web site presents information to the user in a format with which he or she is accustomed. How much greater then the challenge to build a Web site capable of addressing the information needs of racially, ethnically, and linguistically diverse populations. Linda Main brings to the forefront those issues that should be considered by anyone building a Web site aimed at a multinational audience. It is a practical, hands-on look at issues such as: writing systems, character sets, encoding, and Unicode; XHTML and CSS style sheets; the effective placement of graphics; and the sensible use of Javascript, XML, and XSLT. Important subjective and objective cultural issues are also examined. Building Web Sites for Multicultural Communities is the perfect reference tool for people who know how to build a Web site but want to focus on globalizing their Web pages, for people who may outsource their Web sites need some understanding of the issues and techniques involved in globalization, and for people in the initial throes of Web site construction who want to do it right the first time.
This revised edition has more breadth and depth of coverage than the first edition. Information Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts that they will encounter throughout their IT studies and careers. The features of this edition include: Introductory system administration coverage of Windows 10 and Linux (Red Hat 7), both as general concepts and with specific hands-on instruction Coverage of programming and shell scripting, demonstrated through example code in several popular languages Updated information on modern IT careers Computer networks, including more content on cloud computing Improved coverage of computer security Ancillary material that includes a lab manual for hands-on exercises Suitable for any introductory IT course, this classroom-tested text presents many of the topics recommended by the ACM Special Interest Group on IT Education (SIGITE). It offers a far more detailed examination of the computer and IT fields than computer literacy texts, focusing on concepts essential to all IT professionals - from system administration to scripting to computer organization. Four chapters are dedicated to the Windows and Linux operating systems so that students can gain hands-on experience with operating systems that they will deal with in the real world.
If you have more questions than answers about online learning for K-12 students, then you need this comprehensive guide that takes you through all of the planning and implementation steps need to go from vision to actual delivery of online courses. Clearly written and incorporating useful aids such as a timeline for planning and creating your online program, this book provides information on evaluating online courses, how-to successfully mentor students online, and some opportunities and services that will enhance the online program. More multi-layered than step-by-step, the process described involves working in many areas simultaneously. Superintendents, board members, administrators, and teachers can successfully pull all of the pieces together with this book as their guide.
This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.
Cinematic Virtual Reality brings a combination of documentary, narrative and game design principles to the medical profession and, in the healthcare arena, collaboration is a key component for creating intellectually- and emotionally- rich immersive experiences. "The Power of Virtual Reality Cinema for Healthcare Training" gathers more than a dozen experts from both the production and healthcare fields to break down best practices for creating successful cine-VR projects. Designed for multi-disciplinary teams interested in integrating cine-VR production into their healthcare training and educational programs, this book has been written for two audiences: the healthcare professional interested in what production experts consider when approaching a project, and the media expert curious about how this new technology can be used in the medical field. Highlights include: Cutting edge medical education techniques developed by Ohio University's GRID Lab, including: PREality (creating a forced sense of deja-vu to increase acclimation time), a unique approach to eye-tracking to enhance team performance, and the low-CRIS technique (a low-cost rapid implementation strategy to capture patient care for rapid graduate student training). Insightful production techniques that will enhance your cine-VR projects including advanced plating methods to hide lighting set-ups, immersive audio considerations, and new ways to consider 360 storytelling including the Lovrick montage and the Christmas Carol continuum for story development. Detailed explanations of the production considerations and results of specific cine-VR productions (from funding approaches to distribution) including access to more than five hours of cine-VR examples of the actual productions available for download. Details on a wide variety of medical cine-VR projects, including 100 images that illustrate best practices for topics such as recording in active medical facilities, building successful multi-disciplinary teams, working within HIPAA regulations, conceptualizing cine-VR libraries for graduate education, and implementing innovative distribution models.
Fueled by recent films and TV series such as Saving Private Ryan and Band of Brothers and popular books by Stephen Ambrose and Tom Brokaw, interest in World War II has soared. As a result of this surge of attention, the number of websites on World War II has exploded. Many are excellent sources of information, but how can they be found among the massive number of sites? Search engines can't tell the good from the bad, making the process of uncovering quality World War II sites a frustrating and time-consuming process of sifting through hundreds of thousands of hits. But now, web users overwhelmed by this colossal task have a place to turn. World War II on the Web gives history buffs all the tools they need to zero in on the most useful sites. The authors-experts in web research-have examined and evaluated thousands of websites. In this new book, they have included only the most well constructed, informative, attractively designed sites on World War II. This book/CD-ROM is modeled on SR Books' bestselling Civil War on the Web, another indispensable guide to exceptional websites. World War II on the Web includes: i Detailed reviews of the top 100+ sites i A one- to five-star rating of each site's content, aesthetics, and navigation i A list of approximately 150 additional recommended sites including URLs and brief descriptions i Free CD-ROM (IBM and MAC compatible) with hotlinks to all sites in the book-the top 100+ sites as well as the 150 additional recommended sites. Users can simply click on the link to be taken to the site they've chosen. The first part of the book highlights the best 100+ sites and is divided into sections on the following topics: general sites on the war; political and military leaders; European/Atlantic/Mediterranean Theater of Operations; Pacific Theatre of Operations; the soldiers' stories; the homefront; women and African Americans; the Holocaust and war crimes; and unit histories. The second part of World War II on the Web o
* Fills a gap in the current Business and Management literature by addressing the relationship between a brand's visual identity and their stakeholders. * Combines a literature-based and theoretical approach with real life case studies from a broad range of industries. * Covers the full process of corporate brand design management, making the book suitable recommended reading for a broad range of modules and disciplines.
The book presents a comprehensive study of various cognitive and affective aspects of web searching for translation problem solving. Research into the use of the web as an external aid of consultation has frequently occupied a secondary position in the investigation of translation processes. The book aims to bridge this gap in the literature. Beginning with a detailed survey of previous studies of these processes, it then focuses on web search behaviors using qualitative and quantitative analysis that presents a multifaceted overview of translation-oriented web searching. The book concludes by addressing the implications for the teaching of and research into translators' web searching skills. With regard to teaching, the book's didactic discussions will make it a valuable tool for both translator trainers and translation students wanting to familiarize themselves with the intricacies of Web searching and to reflect upon the pedagogical implications of the study for acquiring online information literacy in translator training.
Fantasy sport has become big business. Recent estimates suggest that there as many as 33 million fantasy sport participants in the US alone, spending $3bn annually, with many millions more around the world. This is the first in-depth study of fantasy sport as a cultural and social phenomenon and a significant and growing component of the contemporary sports economy. This book presents an overview of the history of fantasy sport and its close connection to innovations in sports media. Drawing on extensive empirical research, it offers an analysis of the demographics of fantasy sport, the motivations of fantasy sport players and their significance as heavy consumers of sport media and as ultra-fans. It also draws cross-cultural comparisons between fantasy sport players in the US, UK, Europe and beyond. The Fantasy Sport Industry examines the key commercial and media stakeholders in the production and development of fantasy sport, and points to new directions for the fantasy sport industry within modern sport business. It is therefore, fascinating reading for any student, scholar or professional with an interest in sports media, sports business, fandom, the relationship between sport and society, or cultural studies.
In the wake of Edward Snowden's revelations, and concern that the internet has heightened rather than combatted various forms of political and social inequality, it is time we ask: What comes after a broken internet? Ramesh Srinivasan and Adam Fish reimagine the internet from the perspective of grassroots activists and citizens on the margins of political and economic power. They explore how the fragments of the existing internet are being utilised alongside a range of peoples, places, and laws to make change possible. From indigenous and non-western communities and activists in Tahrir Square, to imprisoned hackers and whistleblowers, this book illustrates how post-digital cultures are changing the internet as we know it - from a system which is increasingly centralized, commodified, and "personalized", into something more in line with its original spirit: autonomous, creative, subversive. Written by two highly respected scholars in the field, this compelling book is essential reading for anyone concerned with the quality and future of the internet.
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
The 7th Bandung Creative Movement conference presented the theme "Dynamics of Industrial Revolution 4.0" which discussed how the digital world and connectivity changed human culture in various aspects of life, and transformed in accordance to human needs and social culture. Digital technology has transformed society to serve people from manufacturing needs to smart cities, from network connectivity to people connectivity. The application of information technology has helped in improving live quality and environmental sustainability. Digital transformation is revolutionizing how businesses and workers interconnect to be more productive and efficient. The result is improved collaboration, faster processes and time-to-market, lower costs and better products. Devices are getting smarter, meaning they are able to perform more and more tasks without human intervention; moreover, these devices generate data that provide insights to further improve processes and gain greater efficiencies. Moreover, with the Internet of Things (IoT), all these smart devices are interconnected in ways that not only help make them even smarter, but also enhances the intelligence of the overall system. Digital technology is a formidable driver for the transformation of a highly carbon-dependent world into one that is more ecologically 'smart.' We are entering a new era of environmental innovation that is driving better alignment between technology and environmental goals. Since its first announcement in 2011, industrial revolution 4.0 has dynamically changed and transformed to adjust itself to the human needs and to serve more efficiency and effectiveness of everyday life as well as environmental enhancement. The 7th Bandung Creative Movement has brought forward discussions on dynamic changes, ups and downs, innovations, relations of industrial revolution of the internet of thing, data, automation, to human physical world, new art and aesthetic, business, product innovation, built environment, and education.
Child pornography and the sexual abuse of children through misuse of the media and the Internet are complex yet closely related issues. Not only do they necessitate complex solutions, they also demand a social response from all sectors of society. This volume records the response of these various sectors and shows how individuals and organizations can cooperate effectively. It describes the major work being carried out in some African countries, in Albania, Brazil, Guatemala, the Philippines, and Sri Lanka, and shows the efforts being made to share information and build networks. A reference section provides the site locations or organizations that have made significant advances in protecting children online. In addition, this book offers an action plan to encourage cooperation with others in the same fields in a coherent and coordinated manner.
Equips students and recent graduates with the tools and confidence to develop their own digital presence, addressing the growth in employability and professional skills courses globally; Unlike competing texts, requires no pre-existing technical knowledge, approaching the subject from a strategic and employability perspective rather than a technical or purely marketing approach; Introduces the new ABCDE framework and a series of practical tools and international case studies
Social Networking and Impression Management: Self-Presentation in the Digital Age, edited by Carolyn Cunningham, offers critical inquiry into how identity is constructed, deconstructed, performed, and perceived on social networking sites (SNSs), such as Facebook, and LinkedIn. The presentation of identity is key to success or failure in the Information Age, especially because SNSs are becoming the dominant form of communication among Internet users. The architecture of SNSs provide opportunities to ask questions such as who am I; what matters to me; and, how do I want others to perceive me? Original research studies in this collection utilize both quantitative and qualitative methods to study a range of issues related to identity management on SNSs including authenticity, professional uses of SNSs, LGBTQ identities, and psychological and cultural impacts. Together, the contributors to this volume draw on current research in the field and offer new theoretical frameworks and research methods to further the conversation on impression management and SNSs, making this text essential for both students and scholars of social media.
Within the past ten years, social media such as Twitter, Facebook, MySpace, YouTube, Flickr, and others have grown at a tremendous rate, enlisting an astronomical number of users. Social media have inevitably become an integral part of the contemporary classroom, of advertising and public relations industries, of political campaigning, and of numerous other aspects of our daily existence. Social Media: Usage and Impact, edited by Hana S. Noor Al-Deen and John Allen Hendricks, provides a comprehensive and scholarly analysis of social media. Designed as a reader for upper-level undergraduate and graduate level courses, this volume explores the emerging role and impact of social media as they evolve. The contributors examine the implementation and effect of social media in various environments, including educational settings, strategic communication (often considered to be a merging of advertising and public relations), politics, and legal and ethical issues. All chapters constitute original research while using varied research methodologies for analyzing and presenting information about social media. Social Media: Usage and Impact is a tremendous source for educators, practitioners (such as those in advertising, PR, and media industries), and librarians, among others. This collection is an essential resource for any media technology course. With the rapid proliferation and adoption of social media, it is a juggernaut that must be addressed in the higher education curriculum and research.
Misbehavior in Cyber Places studies computer-mediated, interpersonal communication on the Internet up to the turn of the century, portraying a technological universe that existed before social media, smartphones, and commercialism began to dominate cyberspace in the new millennium. Here, with amateurs prevailing over professionals, digital immigrants explored online frontiers and founded virtual communities. Based on early stages of Internet research, this book examines misbehavior across a wide range of online environments. Sternberg distinguishes misbehavior and rule-breaking from crime and law-breaking, and discusses cybercrime, cyberlaw, and the differences between local and global regulation. This book lays out the theoretical framework and fundamental ideas of media ecology, a branch of communication scholarship. Sternberg highlights pioneering media ecology perspectives on space, place, situations, rules, and behavior in public. These subjects are highly relevant for understanding digital media, mediated interpersonal communication, and behavior in online environments.
The sales function is the front--line of any business. Keeping up with the latest sales techniques is essential, as well as ensuring you have a motivated, incentivised and focused sales team well--versed in the basics of selling, from identifying new prospects and getting repeat business to closing the deal. This module gives essential insight into all the key sales drivers such as account management, handling complex sales, selling services, FMCG selling, customer relationships and self--development for sales people. |
You may like...
Tweeting to Power - The Social Media…
Jason Gainous, Kevin M. Wagner
Hardcover
R3,792
Discovery Miles 37 920
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R14,901
Discovery Miles 149 010
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, …
Hardcover
R6,691
Discovery Miles 66 910
Research Anthology on Applying Social…
Information R Management Association
Hardcover
R9,674
Discovery Miles 96 740
|