|
Books > Computing & IT > Internet > General
In today's society, the utilization of social media platforms has
become an abundant forum for individuals to post, share, tag, and,
in some cases, overshare information about their daily lives. As
significant amounts of data flood these venues, it has become
necessary to find ways to collect and evaluate this information.
Social Media Data Extraction and Content Analysis explores various
social networking platforms and the technologies being utilized to
gather and analyze information being posted to these venues.
Highlighting emergent research, analytical techniques, and best
practices in data extraction in global electronic culture, this
publication is an essential reference source for researchers,
academics, and professionals.
The implementation of virtual environments in education has been
rapidly increasing in frequency after the COVID-19 pandemic. As
these technologies rise in popularity, it is essential to
understand the roles digital technologies play in fostering
connections and learning, the affordances of digital texts and
spaces for virtual classroom experiences, the difficulties
educators have faced and how these practices have been crafted to
meet these challenges, and more. Innovations in Digital Instruction
Through Virtual Environments advances knowledge about the
pedagogical decisions and lived experiences of researchers and
educators both before and after the COVID-19 pandemic. It features
research from those who have worked to sustain and develop
digital/media pedagogical practices. Covering topics such as active
learning environments, emotional labor, and textual engagements,
this premier reference source is an excellent resource for
educators and administrators of both K-12 and higher education,
pre-service teachers, teacher educators, librarians, researchers,
and academicians.
Contesting Media Power is the most ambitious international
collection to date on the worldwide growth of alternative media
that are challenging the power concentration in large media
corporations. Media scholars and political scientists develop a
broad comparative framework for analyzing alternative media in
Australia, Chile, China, Indonesia, Malaysia, Russia, Sweden, South
Africa, the United Kingdom, and the United States. Topics include
independent media centers, gay online networks and alternative web
discussion forums, feminist film, political journalism and social
networks, indigenous communication, and church-sponsored media.
This important book will help shape debates on the media's role in
current global struggles, such as the anti-globalization movement.
Since the dawn of the digital era, the transfer of knowledge has
shifted from analog to digital, local to global, and individual to
social. Complex networked communities are a fundamental part of
these new information-based societies. Emerging Pedagogies in the
Networked Knowledge Society: Practices Integrating Social Media and
Globalization examines the production, dissemination, and
consumption of knowledge within networked communities in the wider
global context of pervasive Web 2.0 and social media services. This
book will offer insight for business stakeholders, researchers,
scholars, and administrators by highlighting the important concepts
and ideas of information- and knowledge-based economies.
About the series: Technology builders, entrepreneurs, consultants,
academicians, and futurists from around the world share their
wisdom in The Future of the Internet surveys conducted by the Pew
Internet & American Life Project and Elon University. The
series of surveys garners smart, detailed assessments of
multi-layered issues from a variety of voices, ranging from the
scientists and engineers who created the first Internet
architecture a decade ago to social commentators to technology
leaders in corporations, media, government, and higher education.
Among the respondents are people affiliated with many of the
world's top organizations, including IBM, AOL, Microsoft, Intel,
ICANN, the Internet Society, Google, W3C, Internet2, and Oracle;
Harvard, MIT, and Yale; and the Federal Communications Commission,
FBI, U.S. Census Bureau, Social Security Administration, and U.S.
Department of State. They provide significant and telling responses
to questions about the future of government, education, media,
entertainment, commerce, and more. They foresee continuing
conflicts over control of networked communications and the content
produced and shared online. They also predict the major changes
ahead for everyone in every field of endeavor. Hopes and Fears: The
Future of the Internet, Volume 2 The 2006 Future of the Internet II
survey asked its participants to react to variety of networked
information technology scenarios related to national boundaries,
human languages, artificial intelligence and other topics. Among
the questions implicit in the scenarios were: Will more people
choose to live "off the grid"? Will autonomous machines leave
people out of the loop? Will English be the lingua franca? Will
national boundaries be displaced by new groupings? Among the themes
in the predictions: Continued serious erosion of individual
privacy; the improvement of virtual reality and rising problems
tied to it; greater economic opportunities in developing nations;
changes in languages; the rise of autonomous machines that operate
beyond human control.
Cyber-physical systems play a crucial role in connecting aspects of
online life to physical life. By studying emerging trends in these
systems, programming techniques can be optimized and strengthened
to create a higher level of effectiveness. Solutions for
Cyber-Physical Systems Ubiquity is a critical reference source that
discusses the issues and challenges facing the implementation,
usage, and challenges of cyber-physical systems. Highlighting
relevant topics such as the Internet of Things, smart-card
security, multi-core environments, and wireless sensor nodes, this
scholarly publication is ideal for engineers, academicians,
computer science students, and researchers that would like to stay
abreast of current methodologies and trends involving
cyber-physical system progression. Topics Covered The many academic
areas covered in this publication include, but are not limited to:
Automotive Domain Internet of Things Multi-Core Environments Safety
Concerns Security strategies Smart Card Security System
Verification Wireless Sensor Nodes
This book introduces social manufacturing, the next generation
manufacturing paradigm that covers product life cycle activities
that deal with Internet-based organizational and interactive
mechanisms under the context of socio-technical systems in the
fields of industrial and production engineering. Like its subject,
the book's approach is multi-disciplinary, including manufacturing
systems, operations management, computational social sciences and
information systems applications. It reports on the latest research
findings regarding the social manufacturing paradigm, the
architecture, configuration and execution of social manufacturing
systems and more. Further, it describes the individual technologies
enabled by social manufacturing for each topic, supported by case
studies. The technologies discussed include manufacturing resource
minimalization and their socialized reorganizations, blockchain
models in cybersecurity, computing and decision-making, social
business relationships and organizational networks, open product
design, social sensors and extended cyber-physical systems, and
social factory and inter-connections. This book helps engineers and
managers in industry to practice social manufacturing, as well as
offering a systematic reference resource for researchers in
manufacturing. Students also benefit from the detailed discussions
of the latest research and technologies that will have been put
into practice by the time they graduate.
Computer-mediated communication and cyberculture are
dramatically changing the nature of social relationships. Whether
cyberspace will simply retain vestiges of traditional communities
with hierarchical social links and class-structured relationships
or create new egalitarian social networks remains an open question.
The chapters in this volume examine the issue of social justice on
the Internet by using a variety of methodological and theoretical
perspectives.
Political scientists, sociologists, and communications and
information systems scholars address issues of race, class, and
gender on the Internet in chapters that do not assume any
specialized training in computer technology.
Advances in Electronic Business, Volume 1 advances the
understanding of management methods, information technology, and
their joint application in business processes. The applications of
electronic commerce draw great attention of the practitioners in
applying digital technologies to the buy-and-sell activities. This
first volume addresses the importance of management and technology
issues in electronic business, including collaborative design,
collaborative engineering, collaborative decision making,
electronic collaboration, communication and cooperation, workflow
collaboration, knowledge networking, collaborative e-learning,
costs and benefits analysis of collaboration, collaborative
transportation, and ethics.
Online Harassment is one of the most serious problems in social
media. To address it requires understanding the forms harassment
takes, how it impacts the targets, who harasses, and how technology
that stands between users and social media can stop harassers and
protect users. The field of Human-Computer Interaction provides a
unique set of tools to address this challenge. This book brings
together experts in theory, socio-technical systems, network
analysis, text analysis, and machine learning to present a broad
set of analyses and applications that improve our understanding of
the harassment problem and how to address it. This book tackles the
problem of harassment by addressing it in three major domains.
First, chapters explore how harassment manifests, including
extensive analysis of the Gamer Gate incident, stylistic features
of different types of harassment, how gender differences affect
misogynistic harassment. Then, we look at the results of
harassment, including how it drives people offline and the impacts
it has on targets. Finally, we address techniques for mitigating
harassment, both through automated detection and filtering and
interface options that users control. Together, many branches of
HCI come together to provide a comprehensive look at the phenomenon
of online harassment and to advance the field toward effective
human-oriented solutions.
This work discusses issues relating to distance education and
distributed learning. There are essays covering: rethinking
assessment for the online environment; the role of collaborative
learning in social and intellectual development; and the embodiment
of knowledge in virtual environments.
Social Media has transformed the ways in which individuals keep in
touch with family and friends. Likewise, businesses have identified
the profound opportunities present for customer engagement and
understanding through the massive data available on social media
channels, in addition to the customer reach of such sites. Social
Media Listening and Monitoring for Business Applications explores
research-based solutions for businesses of all types interested in
an understanding of emerging concepts and technologies for engaging
customers online. Providing insight into the currently available
social media tools and practices for various business applications,
this publication is an essential resource for business
professionals, graduate-level students, technology developers, and
researchers.
The Web is notoriously unreliable, yet it is the first place many
students look for information. How can students, teachers, parents,
and librarians be certain that the information a Web site provides
is accurate and age appropriate? In this unique book, experienced
science educator Judith A. Bazler reviews hundreds of the most
reliable earth science-related Web sites. Each review discusses the
most appropriate grade level of the site, analyzes its accuracy and
usefulness, and provides helpful hints for getting the most out of
the resource. Sites are organized by topic, from "Air Movements" to
"Wetlands," making it easy to locate the most useful sites. A handy
summary presents the best places on the Web to find information on
science museums, science centers, careers in the earth sciences,
and supplies.
As blogs have evolved over the last few years, they have begun to
take on distinct characteristics depending on audience and purpose.
Though political blogs remain the most high profile (and most
read), other types of blogs are gaining in strength and visibility.
This book-a follow-up volume to Barlow's Rise of the Blogosphere,
which examined the historical context for the modern blog-provides
an examination of the many current aspects of the blogosphere, from
the political to the professional to the personal, with many stops
in between. Given that millions of blogs have been created over the
past five years and yet more come online at an undiminished rate,
and given that enthusiasm for both reading them and writing them
has yet to wane, it is likely that the blog explosion will continue
indefinitely. As blogs have evolved over the last few years, they
have begun to take on distinct characteristics depending on
audience and purpose. Though political blogs remain the most high
profile (and most read), other types of blogs are gaining in
strength and visibility. This book-a follow-up volume to Barlow's
Rise of the Blogosphere, which examined the historical context for
the modern blog-provides an examination of the many current aspects
of the blogosphere, from the political to the professional to the
personal, with many stops in between. Areas covered include the
personal blog; the political blog; the use of blogs by various
religious communities both for discussion within communities and
for outreach; the growth of blogs dedicated to specific geographic
communities, and their relations with older local media; blogs
dedicated to technical subjects, particularly relating to
computers; blogs and business; blogs sparked by video games,
movies, music, and other forms of entertainment; and more. Given
that millions of blogs have been created over the past five years
and yet more come online at an undiminished rate, and given that
enthusiasm for both reading them and writing for them has yet to
wane, it is likely that the blog explosion will continue
indefinitely.
Let an award-winning school library media specialist who has
implemented a local area network (LAN) in her media center help you
plan this important addition to your media center while avoiding
the pitfalls. This hands-on practical guide contains all the
information the network novice needs to plan, fund, create, and
maintain a LAN in the media center. Based on the experience of the
school library media specialist who received the 1994 Follett/AASL
"Microcomputer in the Media Center Award" for creating a local area
network in the high school media center, this guide describes the
procedures for planning, designing, funding, installing,
organizing, training, evaluating, and maintaining a LAN in a
library media center setting. Step-by-step nontechnical
instructions and advice for creating an information network are
presented in an understandable format. How to expand into a
school-district wide area network (WAN) and gain access to the
Internet are also discussed. This comprehensive work takes the
network novice from dream to implementation, maintenance, and
evaluation of a local area network. It covers funding sources, tips
for writing technology grants, requests for proposals from vendors,
staff inservice and student training, evaluation and assessment,
student internships, technology teams, troubleshooting equipment,
and network administration. Useful forms, simple network schematic
diagrams, a model school-board approved electronic resources
policy, a glossary of technical terms, and sample assessment tools
are included. No other book walks the library media specialist
through every step in creating a LAN. Media professionals who want
to provide networked electronic information to thestaff and
students but are not sure of how to proceed will benefit from this
clear, nontechnical guide to the process.
As software and computer hardware grows in complexity, networks
have grown to match. The increasing scale, complexity,
heterogeneity, and dynamism of communication networks, resources,
and applications has made distributed computing systems brittle,
unmanageable, and insecure. Internet and Distributed Computing
Advancements: Theoretical Frameworks and Practical Applications is
a vital compendium of chapters on the latest research within the
field of distributed computing, capturing trends in the design and
development of Internet and distributed computing systems that
leverage autonomic principles and techniques. The chapters provided
within this collection offer a holistic approach for the
development of systems that can adapt themselves to meet
requirements of performance, fault tolerance, reliability,
security, and Quality of Service (QoS) without manual intervention.
The Internet has transformed the way people research, shop, conduct
business, and communicate. But the Internet and technologies that
enable online interaction and access to a variety of content can be
a perilous place for minors 8 to 18. The dangers are real, and
parents and teachers today are confronted with many threats they
simply do not understand. This book shares the risks of the
Internet by detailing recent, real-world tragedies and revealing
some of the secrets of online activities. It provides a pragmatic
approach to help parents and teachers protect children against the
threats of going online. Parents and teachers are often
ill-equipped to deal with the variety of devices and applications
such as email, instant messaging, browsing, blogs, cell phones, and
personal digital assistant devices (PDAs) that can facilitate the
dangers lurking online. How to Protect Your Children on the
Internet offers a comprehensive overview of the ways in which youth
use such technologies and exposes the risks they represent. At the
same time, it provides a roadmap that will enable parents and
teachers to become more engaged in children's online activities,
arming them with techniques and tips to help protect their
children. Smith underscores his arguments through chilling,
real-life stories, revealing approaches people are using to deceive
and to conceal their activities online. Filled with practical
advice and recommendations, his book is indispensable to anyone who
uses the Internet and related technologies, and especially to those
charged with keeping children safe.
|
|