![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
Today, "community" seems to be everywhere. At home, at work, and online, the vague but comforting idea of the community pervades every area of life. But have we lost the ability truly to understand what it means? The Neighborhood in the Internet investigates social and civic effects of community networks on local community, and how community network designs are appropriated and extended by community members. Carroll uses his conceptual model of "community" to re-examine the Blacksburg Electronic Village - the first Web-based community network - applying it to attempts to sustain and enrich contemporary communities through information technology. The book provides an analysis of the role of community in contemporary paradigms for work and other activity mediated by the Internet. It brings to the fore a series of design experiments investigating new approaches to community networking and addresses the future trajectory and importance of community networks. This book will be of interest to students of sociology, community psychology, human-computer interaction, information science, and computer-supported collaborative work.
Voluntary distributed computing projects divide large computational tasks into small pieces of data or work that are sent out over the Internet to be processed by individual users, who participate voluntarily in order to provide solutions that would ordinarily require investments of millions of dollars. This approach is contributing to the transformation of computationally heavy scientific research, opening up participation in science to interested lay people and greatly reducing the cost-barriers to computation for financially challenged researchers. Drawing on face-to-face and online ethnographic, survey and interview data with participants in distributed computing projects around the world, this book sheds light on the organizational and social structures of voluntary distributed computing projects, communities and teams, with close attention to questions of motivation in projects that offer little or no traditional forms of reward, either financially or in terms of participants' careers. With its focus on non-market, non-hierarchical cooperation, this book is a case study of networked individuals around the world who are part of a new social production of information. A rich study of the transformative potential inherent in globalization and connectedness, Community, Competition and Citizen Science will appeal to sociologists and political scientists with interests in globalization, networks and science and technology studies, together with scholars and students of media and communication and those working in relevant fields of computing, information systems and scientific collaboration.
The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communication, it has also put our confidential information at risk. The growing concern with online privacy has caused many Internet users to question the security of their Internet transactions. This book answers these questions through an examination of the Center for Democracy and Technology, an organization that advocates for privacy. Li's book introduces the many issues in online privacy and discusses legal ownership of personal data, specifically one's name, address, telephone number, and email. Her in-depth research of the issues confronted by the Center for Democracy and Technology over a five-year period documents its mission and demonstrates its achievements in the crusade to maintain privacy. As we find ourselves using the Internet for more and more transactions, both personal and professional, we must be aware of our privacy rights and the activities of the organizations that fight to protect them-thus, the information in Li's book makes it a necessary reference for all public and university libraries and a useful resource for courses in information technology. Internet Privacy serves as an introduction to the issues of online privacy in the United States and examines what one advocacy group is doing to protect privacy in cyberspace.
This volume gives a comprehensive coverage of Internet technologies. It provides both a contemporary and extensive review of developments in the field and also gives details of research. Areas covered include: developments in the network protocols on which the Internet is based; the evolving capability of the Internet to carry audio and video traffic; and the development in security and payment technologies which are opening up a wide range of commercial electronic applications. As the importance of the Internet continues to increase, this book should be of interest to businesses. Several case studies of on-line services are included. The text should prove useful not only to researchers in the communications and computing sectors working directly in the development of the technology, but also to people working in banking and finance. Business users of the Internet should also find the book to be useful in the development of such applications as Internet trading and corporate intranets.
This book highlights the challenges and potential of educational learning or industry-based training using serious games and social media platforms. In particular, the book addresses applications used in businesses and education-related organizations in Asia, where the framework and experience of serious games have been used to address specific problems in the real world. The topics that will be present in this book includes future of serious games and immersive technologies and their impact on society; online and mobile games; achievement systems in serious games; persuasive technology and games for saving and money management; malware analytics for social networking; serious games for mental health interventions; educational implications of social network games; learning and acquiring subject knowledge using serious games in classrooms. The target audience for this book includes scientists, engineers and practitioners involved in the field of Serious Games. The major part of this book comprises of papers that have been presented at the Serious Games and Social Connect 2012 conference held in Singapore (October 4, 2012). All the contributions have been peer reviewed and by scientific committee members with report about quality, content and originality.
Its sheer functionality, connectivity and accessibility make the Internet an information force to be reckoned with. However, there is very little qualitative data on how the Internet is impacting upon information-seeking in the workplace. The Media and the Internet is a crucial piece of research into how journalists and other media workers are actually using this new resource. Using largely unstructured interviewing techniques, more than three hundred journalists and media librarians were surveyed. The findings are highly relevant to all those working in information-intensive sectors. Contents: Project information; Abstract; Introduction; Methods; Literature review; Size and growth of the Internet; Patterns of use and user characteristics; The special case of journalists; Conclusions; Internet use and users; Internet issues; Case studies; Conclusion; References; Appendices
Child pornography and the sexual abuse of children through misuse of the media and the Internet are complex yet closely related issues. Not only do they necessitate complex solutions, they also demand a social response from all sectors of society. This volume records the response of these various sectors and shows how individuals and organizations can cooperate effectively. It describes the major work being carried out in some African countries, in Albania, Brazil, Guatemala, the Philippines, and Sri Lanka, and shows the efforts being made to share information and build networks. A reference section provides the site locations or organizations that have made significant advances in protecting children online. In addition, this book offers an action plan to encourage cooperation with others in the same fields in a coherent and coordinated manner.
Modern information and communication technologies, together with a cultural upheaval within the research community, have profoundly changed research in nearly every aspect. Ranging from sharing and discussing ideas in social networks for scientists to new collaborative environments and novel publication formats, knowledge creation and dissemination as we know it is experiencing a vigorous shift towards increased transparency, collaboration and accessibility. Many assume that research workflows will change more in the next 20 years than they have in the last 200. This book provides researchers, decision makers, and other scientific stakeholders with a snapshot of the basics, the tools, and the underlying visions that drive the current scientific (r)evolution, often called 'Open Science.'
The Architectural Imagination at the Digital Turn asks what it means to speak of a "digital turn" in architecture. It examines how architects at the time engaged with the digital and imagined future modes of practice, and looks at the technological, conceptual and economic phenomena behind this engagement. It argues that the adoption of digital technology in architecture was far from linear but depended on complex factors, from the operative logic of the technology itself to the context in which it was used and the people who interacted with it. Creating a mosaic-like account, the book presents debates, projects and publications that changed how architecture was visualized, fabricated and experienced using digital technology. Spanning the university, new media art institutes, ecologies, architectural bodies, fabrication and the city, it re-evaluates familiar narratives that emphasized formal explorations; instead, the book aims to complicate the "myth" of the digital by presenting a nuanced analysis of the material and social context behind each case study. During the 1990s, architects repurposed software and technological concepts from other disciplines and tested them in a design environment. Some architects were fascinated by its effects, others were more critical. Through its discussion on case studies, places and themes that fundamentally influenced discourse formation in the era, this book offers scholars, researchers and students fresh insights into how architecture can engage with the digital realm today.
The book presents a comprehensive study of various cognitive and affective aspects of web searching for translation problem solving. Research into the use of the web as an external aid of consultation has frequently occupied a secondary position in the investigation of translation processes. The book aims to bridge this gap in the literature. Beginning with a detailed survey of previous studies of these processes, it then focuses on web search behaviors using qualitative and quantitative analysis that presents a multifaceted overview of translation-oriented web searching. The book concludes by addressing the implications for the teaching of and research into translators' web searching skills. With regard to teaching, the book's didactic discussions will make it a valuable tool for both translator trainers and translation students wanting to familiarize themselves with the intricacies of Web searching and to reflect upon the pedagogical implications of the study for acquiring online information literacy in translator training.
Fantasy sport has become big business. Recent estimates suggest that there as many as 33 million fantasy sport participants in the US alone, spending $3bn annually, with many millions more around the world. This is the first in-depth study of fantasy sport as a cultural and social phenomenon and a significant and growing component of the contemporary sports economy. This book presents an overview of the history of fantasy sport and its close connection to innovations in sports media. Drawing on extensive empirical research, it offers an analysis of the demographics of fantasy sport, the motivations of fantasy sport players and their significance as heavy consumers of sport media and as ultra-fans. It also draws cross-cultural comparisons between fantasy sport players in the US, UK, Europe and beyond. The Fantasy Sport Industry examines the key commercial and media stakeholders in the production and development of fantasy sport, and points to new directions for the fantasy sport industry within modern sport business. It is therefore, fascinating reading for any student, scholar or professional with an interest in sports media, sports business, fandom, the relationship between sport and society, or cultural studies.
Remote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video camera & microphone before the equipment and apparatus to capture what is actually happening in the laboratory allows the images and audio data to be streamed to the client side. Researchers in different countries can share equipment and conduct research cooperatively and remotely. The authors summarise their research and discuss the development of the 5 web-based laboratories launched from the National University of Singapore. The principles, structure, and technologies required for the creation of Internet remote experimentation systems are discussed with particular emphasis on the integration of hardware and software systems. Also highlighted is the design and development of interfaces and components for use in typical web-based laboratories or similar web-control applications.
'A fascinating expose of the world behind your screen. Timely, often disturbing, and so important' Caroline Criado Perez, author of Invisible Women 'Takes us beyond Zuckerberg, Bezos et al to a murkier world where we discover how everything online works and who benefits from it. Fascinating, engaging and important' Observer 'Could not be more timely' Spectator The internet is a network of physical cables and connections, a web of wires enmeshing the world, linking huge data centres to one another and eventually to us. All are owned by someone, financed by someone, regulated by someone. We refer to the internet as abstract from reality. By doing so, we obscure where the real power lies. In this powerful and necessary book, James Ball sets out on a global journey into the inner workings of the system. From the computer scientists to the cable guys, the billionaire investors to the ad men, the intelligence agencies to the regulators, these are the real-life figures powering the internet and pulling the strings of our society. Ball brilliantly shows how an invention once hailed as a democratising force has concentrated power in places it already existed - that the system, in other words, remains the same as it did before.
The A to Z Facebook guide for users, marketers, and developers alike Facebook has more than a billion users worldwide. Whether you enjoy spending time on Facebook every day, use it to advertise and market your product, or develop Facebook apps, this go-to guide has something you need. Its six minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps. It's fully updated to cover the latest Facebook changes, including Graph Search, mobile apps, Timeline enhancements, and news feed redesign. * Facebook has more than one billion active users who share more than 30 billion pieces of content each month * More than 37 million brands have Pages on Facebook * This complete guide has been fully updated to cover Facebook's latest changes, including Graph Search, mobile apps for both users and Page managers, a redesigned news feed, and enhancements to the Timeline * Minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps Facebook All-in-One For Dummies, 2nd Edition is packed with helpful information, great ideas, and ways to help you get even more out of Facebook.
This title includes a number of Open Access chapters. In today's world, there are new opportunities for disaster communications through modern technology and social media. Social network applications such as Facebook, Twitter, and Instagram can connect friends, family, first responders, and those providing relief and assistance. However, social media and other modern communication tools have their limitations. They can be affected by disaster situations where there are power outages or interrupted cellular service. The research contained in this valuable compendium offers much-needed information for emergency responders, utility companies, relief organizations, and governments as they invest in infrastructure to support post-disaster communications. In order to make use of modern communication methods, as well as fully utilize more traditional communication networks, it is imperative that we understand how people actually communicate in the wake of a disaster situation and how various communication strategies can best be utilized. Communication during and immediately after a disaster situation is a vital component of response and recovery. Effective communication connects first responders, support systems, and family members with the communities and individuals immersed in the disaster. Reliable communication also plays a key role in a community's resilience. With research from internationally recognized experts, this volume provides an overview of communication challenges and best-practice analyses, looks at the internet and social media and mobile phones and other technology for disaster communication, and explores the challenges to effective communication. Presents a quality improvement project that gathered expert consensus on best practices used to improve disaster communication Analyzes the information dissemination mechanisms of different media to establish an efficient information dissemination plan for disaster pre-warning, including short message service (SMS), microblogs, news portals, cell phones, television, and oral communication Gauges the effectiveness of disaster risk communication Looks at the future of social media use during emergencies and afterwards Proposes a disaster resilient network that integrates various wireless networks into a cognitive wireless network in the event of disaster occurrences Effective Communication During Disasters: Making Use of Technology, Media, and Human Resources is an informative, multi-faceted resource on preparedness planning for effective communication before, during, and after a disaster occurs.
This title helps the over 50 reader come to terms with the benefits of social networking.
The rapid advancement of digital multimedia technologies has not
only revolutionized the production and distribution of audiovisual
content, but also created the need to efficiently analyze TV
programs to enable applications for content managers and consumers.
Leaving no stone unturned, TV Content Analysis: Techniques and
Applications provides a detailed exploration of TV program analysis
techniques.
Most parts start with a chapter that provides an overview of that area, followed by state-of-the-art approaches focusing on specific issues covered in that section. Reporting on recent advances in the field, the book provides you with the global view and up-to-date understanding of emerging trends needed to participate in the development of the digital TV domain.
The Internet in China examines the cultural and political
ramifications of the Internet for Chinese society. The rapid growth
of the Internet has been enthusiastically embraced by the Chinese
government, but the government has also rushed to seize control of
the virtual environment. Individuals have responded with
impassioned campaigns against official control of information. The
emergence of a civil society via cyberspace has had profound
effects upon China--for example, in 2003, based on an Internet
campaign, the Chinese Supreme People's Court overturned the ruling
of a local court for the first time since the Communist Party came
to power in 1949.
Twenty five years ago, it didn't exist. Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.
Since the Chinese were officially plugged into the virtual community in 1994, the usage of the internet in the country has developed at an incredible rate. By the end of 2008, there were approximately 298 million netizens in China, a number which surpasses that of the U.S. and ranks China the highest user in the world. The rapid development of the online Chinese community has not only boosted the information flow among citizens across the territory, but has also created a new form of social interaction between the state, the media, various professionals and intellectuals, as well as China's ordinary citizens. Although the subject of this book is online Chinese nationalism, which to a certain extent is seen as a pro-regime phenomenon, the emergence of an online civil society in China intrinsically provides some form of supervision of state power-perhaps even a check on it. The fact that the party-state has made use of this social interaction, while at the same time remaining worried about the negative impact of the same netizens, is a fundamental characteristic of the nature of the relationship between the state and the internet community. Many questions arise when considering the internet and Chinese nationalism. Which are the most important internet sites carrying online discussion of nationalism related to the author's particular area of study? What are the differences between online nationalism and the conventional form of nationalism, and why do these differences exist? Has nationalist online expression influenced actual foreign policy making? Has nationalist online expression influenced discourse in the mainstream mass media in China? Have there been any counter reactions towards online nationalism? Where do they come from? Online Chinese Nationalism and China's Bilateral Relations seeks to address these questions.
Written for: Accountants, Doctors, Lawyers, Realtors, Insurance Brokers, Artists, all MLM Reps, Retail Stores...Any type of small to medium-size business interested in FREE ways to advertise on the internet. Email Marketing - Spam or a viable means of advertising? Classifieds - Quick ways to list your company or business for FREE. Search - Google, Yahoo, Bing and More...Easy Placement and all for FREE. Blogs - Should you or shouldn't you??An effective way to advertise for FREE? MySpace - Set your company on auto-pilot for more sales, and it's FREE! Facebook - Put a FREE face on your business and gain hundreds of new customers. Pay-Per-Click - Okay, it's not FREE, but can be quick and cost-effective! Secrets to Free Advertising on the Internet will help your business grow, whether you are already net-savvy or new to the World Wide Web. Marketing expert Robert Noll gives you helpful hints and clear, easy tips on how to use the wide variety of FREE advertising media available online. Reaching out to a whole new customer base can seem intimidating, but Secrets to Free Advertising on the Internet helps you focus your strategy so you don't feel overwhelmed. No matter what your company does, a strong online advertising campaign can help you do it better.
e-Finance: The Electronic Revolution is the first comprehensive and practical attempt to chart the history, progress and future of B2B and B2C electronic financial services. It explains clearly and concisely how and why the world of retail and institutional finance has started a migration from conventional foundations to computerized, Internet-driven practices, and considers where such efforts will ultimately lead. Industry examples from different countries and markets are included throughout the book to illustrate the expansion, failures, successes, and future of electronic finance.
The V-chip is a highly significant part of the discussion about
whether television (or broadcasting in general) deserves some
special attention in terms of its accessibility to children, its
particular power to affect conduct, and its invasiveness. But as
this notion of filtering and labeling has caught the imagination of
the regulator, the legislator, and all those who wish to consider
new ways to alter bargaining over imagery in society, the very
"idea" of the V-chip or its equivalent is moving across other
technologies, including the Internet. The V-chip issue has also
fueled the ongoing debate about violence and sexual practices in
society, and how representations on television relate to those
practices.
This book describes efficient and effective techniques for harnessing the power of Linked Data by tackling the various aspects of managing its growing volume: storing, querying, reasoning, provenance management and benchmarking. To this end, Chapter 1 introduces the main concepts of the Semantic Web and Linked Data and provides a roadmap for the book. Next, Chapter 2 briefly presents the basic concepts underpinning Linked Data technologies that are discussed in the book. Chapter 3 then offers an overview of various techniques and systems for centrally querying RDF datasets, and Chapter 4 outlines various techniques and systems for efficiently querying large RDF datasets in distributed environments. Subsequently, Chapter 5 explores how streaming requirements are addressed in current, state-of-the-art RDF stream data processing. Chapter 6 covers performance and scaling issues of distributed RDF reasoning systems, while Chapter 7 details benchmarks for RDF query engines and instance matching systems. Chapter 8 addresses the provenance management for Linked Data and presents the different provenance models developed. Lastly, Chapter 9 offers a brief summary, highlighting and providing insights into some of the open challenges and research directions. Providing an updated overview of methods, technologies and systems related to Linked Data this book is mainly intended for students and researchers who are interested in the Linked Data domain. It enables students to gain an understanding of the foundations and underpinning technologies and standards for Linked Data, while researchers benefit from the in-depth coverage of the emerging and ongoing advances in Linked Data storing, querying, reasoning, and provenance management systems. Further, it serves as a starting point to tackle the next research challenges in the domain of Linked Data management.
This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles. |
You may like...
Applications ofComputational Mechanics…
Lu s Ribeiro e Sousa
Paperback
Engineering Geology for Infrastructure…
Robert Hack, Rafig Azzam, …
Hardcover
R5,590
Discovery Miles 55 900
Design of Underground Structures
Zhen-Dong Cui, Zhong-Liang Zhang, …
Hardcover
R2,389
Discovery Miles 23 890
Inelastic Behaviour of Structures under…
Zenon Mroz, Dieter Weichert, …
Hardcover
R5,423
Discovery Miles 54 230
|