![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
As blogs have evolved over the last few years, they have begun to take on distinct characteristics depending on audience and purpose. Though political blogs remain the most high profile (and most read), other types of blogs are gaining in strength and visibility. This book-a follow-up volume to Barlow's Rise of the Blogosphere, which examined the historical context for the modern blog-provides an examination of the many current aspects of the blogosphere, from the political to the professional to the personal, with many stops in between. Given that millions of blogs have been created over the past five years and yet more come online at an undiminished rate, and given that enthusiasm for both reading them and writing them has yet to wane, it is likely that the blog explosion will continue indefinitely. As blogs have evolved over the last few years, they have begun to take on distinct characteristics depending on audience and purpose. Though political blogs remain the most high profile (and most read), other types of blogs are gaining in strength and visibility. This book-a follow-up volume to Barlow's Rise of the Blogosphere, which examined the historical context for the modern blog-provides an examination of the many current aspects of the blogosphere, from the political to the professional to the personal, with many stops in between. Areas covered include the personal blog; the political blog; the use of blogs by various religious communities both for discussion within communities and for outreach; the growth of blogs dedicated to specific geographic communities, and their relations with older local media; blogs dedicated to technical subjects, particularly relating to computers; blogs and business; blogs sparked by video games, movies, music, and other forms of entertainment; and more. Given that millions of blogs have been created over the past five years and yet more come online at an undiminished rate, and given that enthusiasm for both reading them and writing for them has yet to wane, it is likely that the blog explosion will continue indefinitely.
This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual technologies enabled by social manufacturing for each topic, supported by case studies. The technologies discussed include manufacturing resource minimalization and their socialized reorganizations, blockchain models in cybersecurity, computing and decision-making, social business relationships and organizational networks, open product design, social sensors and extended cyber-physical systems, and social factory and inter-connections. This book helps engineers and managers in industry to practice social manufacturing, as well as offering a systematic reference resource for researchers in manufacturing. Students also benefit from the detailed discussions of the latest research and technologies that will have been put into practice by the time they graduate.
The Internet has transformed the way people research, shop, conduct business, and communicate. But the Internet and technologies that enable online interaction and access to a variety of content can be a perilous place for minors 8 to 18. The dangers are real, and parents and teachers today are confronted with many threats they simply do not understand. This book shares the risks of the Internet by detailing recent, real-world tragedies and revealing some of the secrets of online activities. It provides a pragmatic approach to help parents and teachers protect children against the threats of going online. Parents and teachers are often ill-equipped to deal with the variety of devices and applications such as email, instant messaging, browsing, blogs, cell phones, and personal digital assistant devices (PDAs) that can facilitate the dangers lurking online. How to Protect Your Children on the Internet offers a comprehensive overview of the ways in which youth use such technologies and exposes the risks they represent. At the same time, it provides a roadmap that will enable parents and teachers to become more engaged in children's online activities, arming them with techniques and tips to help protect their children. Smith underscores his arguments through chilling, real-life stories, revealing approaches people are using to deceive and to conceal their activities online. Filled with practical advice and recommendations, his book is indispensable to anyone who uses the Internet and related technologies, and especially to those charged with keeping children safe.
Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.
Teachers of political science, social studies, and economics, as well as school library media specialists, will find this resource invaluable for incorporating the Internet into their classroom lessons. Over 150 primary source Web sites are referenced and paired with questions and activities designed to encourage critical thinking skills. Completing the activities for the lessons in this book will allow students to evaluate the source of information, the content presented, and it usefulness in the context of their assignments. Along with each Web site, a summary of the site's contents identifies important primary source documents such as constitutions, treaties, speeches, court cases, statistics, and other official documents. The questions and activites invite the students to log on to the Web site, read the information presented, interact with the data, and analyze it critically to answer such questions as: Who created this document? Is the source reliable? How is the information useful and how does it relate to present-day circumstances? If I were in this situation, would I have responded the same way as the person in charge? Strengthening these critical thinking skills will help prepare students for both college and career in the 21st century.
The Semantic Web has been around for some years with recent advances in mature technologies and applications. Lately, its development has been demonstrated in its contribution to businesses through the enhancement of e-commerce. Semantic Web for Business: Cases and Applications delivers real-life cases that illustrate the benefits of Semantic Web technologies as applied to e-business and e-commerce scenarios. Covering topics such as business integration, organizational knowledge management, and Semantic Web services, this book provides academic research libraries with a comprehensive reference to the commercial capabilities of Semantic Web technologies, as well as practical applications for the benefit of IT professionals, business executives, consultants, and students.
The Internet has dramatically altered the landscape of crime and national security, creating new threats, such as identity theft, computer viruses, and cyberattacks. Moreover, because cybercrimes are often not limited to a single site or nation, crime scenes themselves have changed. Consequently, law enforcement must confront these new dangers and embrace novel methods of prevention, as well as produce new tools for digital surveillance-which can jeopardize privacy and civil liberties. Cybercrime brings together leading experts in law, criminal justice, and security studies to describe crime prevention and security protection in the electronic age. Ranging from new government requirements that facilitate spying to new methods of digital proof, the book is essential to understand how criminal law-and even crime itself-have been transformed in our networked world. Contributors: Jack M. Balkin, Susan W. Brenner, Daniel E. Geer, Jr., James Grimmelmann, Emily Hancock, Beryl A. Howell, Curtis E.A. Karnow, Eddan Katz, Orin S. Kerr, Nimrod Kozlovski, Helen Nissenbaum, Kim A. Taipale, Lee Tien, Shlomit Wagman, and Tal Zarsky. Jack M. Balkin is Knight Professor of Constitutional Law and the First Amendment at Yale Law School, and the Founder and Director of Yale's Information Society Project (ISP). He is the co-editor of The State of Play: Law, Games, and Virtual Worlds, also from NYU Press. James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman, and Tal Zarsky are Fellows of the ISP. Eddan Katz is the Executive Director of the Information Society Project.
The recent rapid proliferation in hardware, software, and communication technologies has facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any time and for anyone. This ecosystem is referred to as the Internet of Things (IoT). IoT networks collect, store, and exchange a large amount of heterogeneous data. It has already shown promising outcomes in the provisioning of potentially critical services (e.g., safety applications, healthcare, manufacturing), but it raises many challenges related to the security, data analysis, and limited resources of the performed operations and provided services. Accordingly, research on the data analysis and security of IoT is attractive to both industry and academia. Thus, the central theme of this book is to report novel methodologies, theories, technologies, techniques, and solutions for security and data analytics techniques and energy-aware solutions for IoT. This book aims at addressing these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols, and interfaces to specific implementation approaches. Furthermore, additional focus will be given to areas related to the role of artificial intelligence in modeling and deploying secure and trustworthy sensors, actuators, and wireless networks for IoT systems. It aims to present the most start-of-the-art technologies to overcome the challenges related to security, data analytics, and energy-aware solutions in the Internet of Things.
This book provides a thorough overview of the Wisdom Web of Things (W2T), a holistic framework for computing and intelligence in an emerging hyper-world with a social-cyber-physical space. Fast-evolving Web intelligence research and development initiatives are now moving toward understanding the multifaceted nature of intelligence and incorporating it at the Web scale in a ubiquitous environment with data, connection and service explosion. The book focuses on the framework and methodology of W2T, as well as its applications in different problem domains, such as intelligent businesses, urban computing, social computing, brain informatics and healthcare. From the researcher and developer perspectives, the book takes a systematic, structured view of various W2T facets and their overall contribution to the development of W2T as a whole. Written by leading international researchers, this book is an essential reference for researchers, educators, professionals, and tertiary HDR students working on the World Wide Web, ubiquitous computing, knowledge management, and business intelligence.
By joining bodies of research in media theory, cultural studies, and critical pedagogy, "Developing Media Literacy in Cyberspace" offers a vision of learning that values social empowerment over technical skills. An inquiry into the existence and range of models equipped to cultivate critical teaching and learning in the Internet-supported classroom, this new study argues that media literacy offers the best long-term training for today's youth to become experienced practitioners of 21st-century technology. Author Julie Frechette helps educators develop and provide concrete learning strategies that enable students to judge the validity and worth of what they see on the Internet as they strive to become critically autonomous in a technology-laden world. Part of this effort lies in developing a keen awareness of the institutional, political, and economic structure of the Internet as a means of communication that is increasingly marketing products and targeting advertisements toward youth. Values on the Internet are discussed constantly both by the major media and by the private sector, with little regard for the pervasive interests and authority of profitable industries staking out their territory in this new global village. Unlike other studies that provide a broad sociohistorical context for the development of theoretical uses of new technologies in the classroom, "Developing Media Literacy in Cyberspace" lays the groundwork for establishing critical thinking skills that will serve students' interests as they navigate this vast and complicated cyberterritory.
Internet use for business-to-business e-commerce is expected to grow at spectacular rates. Many experts feel that perceived lack of trust in e-commerce transactions on the Internet has contributed to the slow adoption of e-commerce in the recent past. This book provides an avenue for managers and researchers to explore, examine and describe interorganizaitonal trust relationships in e-commerce participation. With the identification of trust behaviours in business relationships this will increase the awareness of e-commerce participants, who can then examine their own and their trading partners' trust behaviours.
This book throws new light on the way in which the Internet impacts on democracy. Based on Jurgen Habermas' discourse-theoretical reconstruction of democracy, it examines one of the world's largest, most diverse but also most unequal democracies, Brazil, in terms of the broad social and legal effects the internet has had. Focusing on the Brazilian constitutional evolution, the book examines how the Internet might impact on the legitimacy of a democratic order and if, and how, it might yield opportunities for democratic empowerment. The book also assesses the ways in which law, as an institution and a system, reacts to the changes and challenges brought about by the Internet: the ways in which law may retain its strength as an integrative force, avoiding a 'virtual' legitimacy crisis.
Readers seeking to gain a handle on the internet's global expansion will find this book rich in scholarly foundations combined with cutting-edge discussion of emerging ICTs and services and the complex societal contexts in which they are embedded. To explore possibilities to the fullest extent, a sociotechnical systems approach is employed, focusing on the interplay of technical, social, cultural, political, and economic dynamics to explore alternative futures (ones that are not part of the dominant discourse about the internet). These shared perspectives are not well addressed elsewhere in current discussions. Awareness of these dynamics, and the fluidity of the future, is important, as humankind moves forward into the uncertain future. Due to the sociotechnical complexity of the Internet, policymakers, businesspeople, and academics worldwide have struggled to keep abreast of developments. This volume's approach is intended to stimulate dialogue between academics and practitioners on a topic that will affect most aspects of human life in the near-term future.
As the growing relationship between individuals and technology continue to play a vital role in our society and work place, the progress and execution of information technology communication systems is important in maintaining our current way of life. Knowledge and Technological Development Effects on Organizational and Social Structures provides a wide ranging discussion on the exchanging of research ideas and practices in an effort to bring together the social and technical aspects within organizations and society. This collection focuses on new ideas and studies for research, students, and practitioners.
An essential tool for dispute resolution professionals as well as for anyone considering using dispute resolution in their lives and work, Online Dispute Resolution explains the many diverse and unique applications of doing conflict resolution online. The expert authors examine the tremendous growth of online dispute resolution-including its use by eBay and other e-commerce companies-and reveal the enormous possibilities to come, along with the many employment opportunities for practitioners in the field. They show how the online environment will affect the role of those who are concerned with dispute resolution just as it has brought changes to those who practice law, sell stocks, or run for office. For those who see the value of technology as a critical building block in the future of dispute resolution, Online Dispute Resolution will be an indispensable resource.
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening for years, with firms such as Google capturing everything you type into a browser and selling it to the highest bidder. Apps take information about where you go, and your contact book details, harvest them and sell them on - and people just click the EULA without caring. No one is revealing the dirty secret that is the tech firms harvesting customers' personal data and selling it for vast profits - and people are totally unaware of the dangers. You: For Sale is for anyone who is concerned about what corporate and government invasion of privacy means now and down the road. The book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as facebook and Google, and then tells you what you can do to protect yourself. The book also covers legal and government issues as well as future trends. With interviews of leading security experts, black market data traders, law enforcement and privacy groups, You: For Sale will help you view your personal data in a new light, and understand both its value, and its danger. |
You may like...
Geo-disaster Modeling and Analysis: An…
Yu Huang, Zili Dai, …
Hardcover
R3,020
Discovery Miles 30 200
Decolonisation - Revolution & Evolution
David Boucher, Ayesha Omar
Paperback
A Modern Guide to the Digitalization of…
Juan Montero, Matthias Finger
Hardcover
R4,667
Discovery Miles 46 670
Statistical Approaches in Oncology…
Satrajit Roychoudhury, Soumi Lahiri
Hardcover
R3,793
Discovery Miles 37 930
Geological Controls for Gas Hydrates and…
Sanjeev Rajput, N K Thakur
Paperback
|