![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
'We need more warriors like Carrie' TARANA BURKE, founder of the MeToo movement 'In the age of doxxing, revenge porn, and misogynist trolls, this book is required reading' ESQUIRE Nobody's Victim is an unflinching look at a hidden world most people don't know exists-one of stalking, blackmail, and sexual violence, online and off-and the incredible story of how one lawyer, determined to fight back, turned her own hell into a revolution. Nobody's Victim invites readers to join Carrie Goldberg on the front lines of the war against sexual violence and privacy violations as her law firm sues the hell out of tech companies, schools, and sexual predators. Her battleground is the courtroom; her crusade is to transform clients from victims into warriors. In gripping detail, Carrie shares the diabolical ways her clients are attacked and how she, through her unique combination of relentless advocacy, badass risk-taking, and unique client-empowerment, pursues justice for them all. There is the ex-boyfriend who made fake bomb threats in a client's name, causing a national panic; the girl who was sexually assaulted on school grounds and then suspended when she reported the attack; and the guy who used a dating app to send more than 1,200 men to his ex's home and office for sex. Carrie also shares her own shattering story about why she began her work and became the lawyer she needed. Riveting and essential, Nobody's Victim is a bold and timely analysis of victim protection in the era of the Internet. This book is an urgent warning of a coming crisis, a predictor of imminent danger, and a weapon to take back control and protect ourselves-both online and off. 'A rallying cry for privacy justice . . . chilling . . . take-no-prisoners and warmly gregarious' New York Times *Perfect for fans of She Said by Jodi Kantor and Megan Twohey, The Whisper Network by Chandler Baker and The Good Fight*
"There is much of value in Jenkins' work. He manages to discuss CP
calmly, while at the same time making clear his personal revulsion,
an achievement in itself in an area characterized by so much
hysteria." "Magnificently readable social science on a widely misunderstood
subject." "A useful introduction to the methods that the kiddie-porn
community uses to hide its activities...a smart history of the
child-porn industry" "This is a troubling book that exposes how child pornography has
found a safe haven on the Internet. Philip Jenkins's innovative
research methods let him explore and map the secret electronic
networks that link individuals whose deviance seems not just
outrageous, but incomprehensible. Jenkins shows how culture and
social structure emerge in a virtual--and decidedly not
virtuous--world. This book raises profound questions about the
nature of deviance in an electronic future." "A disturbing, thought-provoking study" "A detailed yet engaging account . . . . Engrossing" Perhaps nothing evokes more universal disgust as child pornography. The world of its makers and users is so abhorrent that it is rarely discussed much less studied. Child pornographers have taken advantage of this and are successfully using the new electronic media to exchange their wares without detection or significant sanction. What are the implications of this threat for free speech and a free exchange of ideas on the internet? And how can we stop this illegal activity, which is so repugnant that eventhe most laissez-faire cyberlibertarians want it stamped out, if we know nothing about it? Philip Jenkins takes a leap onto the lower tiers of electronic media in this first book on the business of child pornography online. He tells the story of how the advent of the internet caused this deviant subculture to become highly organized and go global. We learn how the trade which operates on clandestine websites from Budapest or Singapore to the U.S. is easy to glimpse yet difficult to eradicate. Jenkins details how the most sophisticated transactions are done through a proxy, a "false flag" address, rendering the host computer, and participants, virtually unidentifiable. And these sites exist for only a few minutes or hours allowing on-line child pornographers to stay one step ahead of the law. This is truly a globalized criminal network which knows no names or boundaries, and thus challenges both international and U.S. law. Beyond Tolerance delves into the myths and realities of child pornography and the complex process to stamp out criminal activity over the web, including the timely debates over trade regulation, users' privacy, and individual rights. This sobering look and a criminal community contains lessons about human behavior and the law that none interested in media and the new technology can afford to ignore.
Violent behavior has become deeply integrated into modern society and it is an unavoidable aspect of human nature. Examining peacemaking strategies through a critical and academic perspective can assist in resolving violence in societies around the world. The Handbook of Research on Examining Global Peacemaking in the Digital Age is a pivotal reference source for the latest research findings on the utilization of peacemaking in media, leadership, and religion. Featuring extensive coverage on relevant areas such as human rights, spirituality, and the Summer of Peace, this publication is an ideal resource for policymakers, universities and colleges, graduate-level students, and organizations seeking current research on the application of conflict resolution and international negotiation.
Today every business is an e-business, and whether you are selling golf outings over the Internet or manufacturing the carts, there is no escaping the fact that every aspect of organizational design is profoundly affected by the new rules of the electronic economy. What many people and organizations overlook, however, is the degree to which these new rules are requiring a fundamentally different style of leadership. In E-Leader , Robert Hargrove identifies the new mindset and skills that leaders must develop in order to thrive in a world where wealth is built on relationships and experiences, not products or even technology. The old model of leader as "steward," protecting the company's brands and assets, is being replaced by a model of leader as "entrepreneur," searching constantly for new sources of wealth creation establishing creative ventures with suppliers, distributors, and even competitors and discovering new ways to attract, retain, and nurture talent- all at the speed of light. E-Leader captures the energy of the mavericks who are redefining leadership on the electronic frontier and shows managers in all types of organizations how to manage for the future, not for the past or even the present.
Scholars and students are searching for information on what a Web portfolio is, what it is not, what to put into a Web portfolio, and what technical skills are needed to succeed in the process. ""Web Portfolio Design and Applications"" provides a combination of theory, pedagogy, and practice to help enable faculty and students across disciplines to explore creating a Web portfolio. This book provides research conclusions, case studies, and hands-on technical processes, which allow people of all levels to develop a personal approach to creating a Web portfolio. ""Web Portfolio Design and Applications"" is designed for anyone who has an interest in Web portfolios and electronic portfolios.
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. The Internet of Things: Breakthroughs in Research and Practice is an authoritative reference source for the latest academic material on the interconnectivity of networks and devices in the digital era and examines best practices for integrating this advanced connectivity across multiple fields. Featuring extensive coverage on innovative perspectives, such as secure computing, regulatory standards, and trust management, this book is ideally designed for engineers, researchers, professionals, graduate students, and practitioners seeking scholarly insights on the Internet of Things.
This collection of essays addresses whether all nations will actively participate in building the information superhighway or whether the Internet will reflect global technological inequalities. The writings are grouped in four major sections, which examine theoretical issues on cyberglobalization, politics in the electronic global village, global economic issues in cyberspace, and national identities and grassroots movements in cyberspace. Contributing scholars represent a wide spectrum of disciplines from political science, economics, and communications to sociology, anthropology, and philosophy. A number of methodological and theoretical perspectives direct the writings. Collectively, the essays point toward an emerging technology that exhibits innate qualities characteristic of the classic notion of cultural imperialism. This edited collection, with its timely approach to the implications of the Internet for global relations, will appeal to communication, sociology, and political science scholars. The interdisciplinary approach will also attract students and educators from such fields as anthropology, philosophy and economics. To aid in further research, select bibliographies follow each essay.
IN LITTLE MORE THAN HALF A DECADE, Facebook has gone from a
dorm-room novelty to a company with 500 million users. It is one of
the fastest growing companies in history, an essential part of the
social life not only of teenagers but hundreds of millions of
adults worldwide. As Facebook spreads around the globe, it creates
surprising effects--even becoming instrumental in political
protests from Colombia to Iran.
The ever-growing influence of the Internet has caused a paradigm shift in relationships between customers and companies. New types of interaction introduced by Web 1.0 have undergone a dramatic change in quantity and quality with the advent of Web 2.0. Web 3.0, better known as the Semantic Web, will also significantly impact how companies understand Customer Relationship Management (CRM). Customer Relationship Management and the Social and Semantic Web: Enabling Cliens Conexus provides an overview of the field of the Semantic Web, social Web, and CRM by uniting various research studies from different subfields. Providing a forum for the exchange of research ideas and practices, this book is a reference convergence point for professionals, managers, and researchers in the CRM field together with IT professionals. It also aims to explore the opportunities and challenges confronting organizations in the light of customers in Web 2.0 by using new technologies, including semantic technologies (Web 3.0).
A paradigm shift is taking place in computer science: one generation ago, we learned to abstract from hardware to software, now we are abstracting from software to serviceware implemented through service-oriented computing. Yet ensuring interoperability in open, heterogeneous, and dynamically changing environments, such as the Internet, remains a major challenge for actual machine-to-machine integration. Usually significant problems in aligning data, processes, and protocols appear as soon as a specific piece of functionality is used within a different application context. The Semantic Web Services (SWS) approach is about describing services with metadata on the basis of domain ontologies as a means to enable their automatic location, execution, combination, and use. Fensel and his coauthors provide a comprehensive overview of SWS in line with actual industrial practice. They introduce the main sociotechnological components that ground the SWS vision (like Web Science, Service Science, and service-oriented architectures) and several approaches that realize it, e.g. the Web Service Modeling Framework, OWL-S, and RESTful services. The real-world relevance is emphasized through a series of case studies from large-scale R&D projects and a business-oriented proposition from the SWS technology provider Seekda. Each chapter of the book is structured according to a predefined template, covering both theoretical and practical aspects, and including walk-through examples and hands-on exercises. Additional learning material is available on the book website www.swsbook.org. With its additional features, the book is ideally suited as the basis for courses or self-study in this field, and it may also serve as a reference for researchers looking for a state-of-the-art overview of formalisms, methods, tools, and applications related to SWS."
Online social media have transformed the face of human interaction in the 21st century. Wikis, blogs, online groups and forums, podcasts, virtual worlds, and social tagging are but a few of the applications enabling innovative behaviors that support acquisition, access, manipulation, retrieval, and visualization of information. It is, therefore, no surprise that educational practitioners and theorists have begun to explore how social media can be harnessed to describe and implement new paradigms for communication, learning, and education. The editors' goal in publishing this book was to identify original research on the application of online social media and related technologies in education as well as emerging applications in Web technologies that could provide and shape future educational platforms. The selected contributions deal with questions such as how social media can truly enrich and enhance learning and teaching experiences in ways not otherwise possible; how learning can be integrated in a distributed and ubiquitous social computing environment; or what theories, paradigms, and models are applicable for the support of social computing in education. Researchers in education or educational software will find interesting and sometimes provocative chapters on paradigms and methodologies, virtual and mobile learning spaces, and assessment and social factors. Practitioners in these fields will benefit from an additional section devoted to case studies and first experience reports.
This book presents the first paradigm of social multimedia computing completely from the user perspective. Different from traditional multimedia and web multimedia computing which are content-centric, social multimedia computing rises under the participatory Web2.0 and is essentially user-centric. The goal of this book is to emphasize the user factor in facilitating effective solutions towards both multimedia content analysis, user modeling and customized user services. Advanced topics like cross-network social multimedia computing are also introduced as extensions and potential directions along this research line.
The Handbook on Socially Interactive Agents provides a comprehensive overview of the research fields of Embodied Conversational Agents, Intelligent Virtual Agents, and Social Robotics. Socially Interactive Agents (SIAs), whether virtually or physically embodied, are autonomous agents that are able to perceive an environment including people or other agents, reason, decide how to interact, and express attitudes such as emotions, engagement, or empathy. They are capable of interacting with people and one another in a socially intelligent manner using multimodal communicative behaviors, with the goal to support humans in various domains. Written by international experts in their respective fields, the book summarizes research in the many important research communities pertinent for SIAs, while discussing current challenges and future directions. The handbook provides easy access to modeling and studying SIAs for researchers and students, and aims at further bridging the gap between the research communities involved. In two volumes, the book clearly structures the vast body of research. The first volume starts by introducing what is involved in SIAs research, in particular research methodologies and ethical implications of developing SIAs. It further examines research on appearance and behavior, focusing on multimodality. Finally, social cognition for SIAs is investigated using different theoretical models and phenomena such as theory of mind or pro-sociality. The second volume starts with perspectives on interaction, examined from different angles such as interaction in social space, group interaction, or long-term interaction. It also includes an extensive overview summarizing research and systems of human-agent platforms and of some of the major application areas of SIAs such as education, aging support, autism, and games.
|
You may like...
|