Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet > General
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.
Social network analysis has created novel opportunities within the field of data science. The complexity of these networks requires new techniques to optimize the extraction of useful information. Graph Theoretic Approaches for Analyzing Large-Scale Social Networks is a pivotal reference source for the latest academic research on emerging algorithms and methods for the analysis of social networks. Highlighting a range of pertinent topics such as influence maximization, probabilistic exploration, and distributed memory, this book is ideally designed for academics, graduate students, professionals, and practitioners actively involved in the field of data science. The many academic areas covered in this publication include, but are not limited to: Content Specific Modeling Distributed Memory Graph Mining Influence Maximization Information Spread Control Link Prediction Probabilistic Exploration
The Semantic Web has evolved as a blueprint for a knowledge-based framework aimed at crossing the chasm from the current Web of unstructured information resources to a Web equipped with metadata and oriented to delegating tasks to software agents. Semantic Web Personalization and Context Awareness: Management of Personal Identities and Social Networking communicates relevant recent research in Semantic Web-based personalization as applied to the context of information systems. This book reviews knowledge engineering for organizational applications, and Semantic Web approaches to information systems and ontology-based information systems research, as well as the diverse underlying database and knowledge representation aspects that impact personalization and customization.
What the international phenomenon of The Rules did for conventional dating, The Rules for Online Dating does for the search for love on the Internet. You'll never hit the "reply" button the same way again. Millions of women around the world are meeting men on the Internet, or they've met in person and are corresponding by e-mail. But though e-mail and Net-based dating services have revolutionized the dating landscape, they've created their own pitfalls and challenges. Women need new strategies that will improve their chances of capturing Mr. Right. Boasting the same time-tested formula and romantic spirit that made The Rules an international bestseller and launched thousands of women down the path to committed relationships, The Rules for Online Dating shows all women -- regardless of age, status, or computer savvy -- how to use electronic communication to relate to men in a way that maintains self-esteem and leads to a healthy relationship. Here is a comprehensive list of dos and don'ts that will help every woman conduct an e-courtship safely and successfully; find and keep the interest of suitable mates; and save time, energy, and potential heartache by weeding out dead wood. The Rules for Online Dating takes women through the process -- step by step, Rule by Rule -- to the ultimate goal: a relationship based on mutual attraction, interest, and respect.
Mining the World Wide Web: An Information Search Approach explores the concepts and techniques of Web mining, a promising and rapidly growing field of computer science research. Web mining is a multidisciplinary field, drawing on such areas as artificial intelligence, databases, data mining, data warehousing, data visualization, information retrieval, machine learning, markup languages, pattern recognition, statistics, and Web technology. Mining the World Wide Web presents the Web mining material from an information search perspective, focusing on issues relating to the efficiency, feasibility, scalability and usability of searching techniques for Web mining. Mining the World Wide Web is designed for researchers and developers of Web information systems and also serves as an excellent supplemental reference to advanced level courses in data mining, databases and information retrieval.
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, ""Cyber Terrorism: Political and Economic Implications"" puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives.
Internet gambling is a rapidly growing phenomenon, which has profound social, psychological, economic, political, and policy implications. Until recently, Internet gambling has been understudied by the research community, but now a growing body of literature is emerging, on all aspects of Internet gambling and its attendant implications. As jurisdictions around the world grapple to understand the best way to respond to Internet gambling from a commercial, regulatory, and social perspective, scholarly studies of Internet gambling are becoming an ever more crucial resource. The Handbook of Internet Gambling consolidates this emerging body of literature into a single reference volume. Its twenty chapters comprise groundbreaking contributions from the world s leading authorities in the commercial, clinical, political and social aspects of Internet gambling. It is sure to be a foundational resource for academics, students, regulators, politicians, policy makers, commercial providers, and health care professionals who have an interest in understanding the history, dynamics, and impacts of Internet gambling in a global context.
This handbook focuses on the key issues that continue to hinder the formal development of cryptocurrencies as a mainstream financial asset. It primarily examines reputationally damaging events, particularly those related to illicit behavior. The goal of the handbook is to determine whether some of these events could be mitigated by improved or at least coordinated international regulation. The handbook will be useful for specialist technical audiences such as legal, accounting and financial practices. It will also be beneficial for upper level masters and research students in economics, law, accounting, taxation, investment and portfolio management.
Semantics, Web services, and Web processes promise better re-use, universal interoperability and integration. Semantics has been recognized as the primary tool to address the challenges of a broad spectrum of heterogeneity and for improving automation through machine understandable descriptions. Semantic Web Services, Processes and Applications brings contributions from researchers who study, explore and understand the semantic enabling of all phases of semantic Web processes. This encompasses design, annotation, discovery, choreography and composition. Also this book presents fundamental capabilities and techniques associated with ontological modeling or services, annotation, matching and mapping, and reasoning. This is complemented by discussion of applications in e-Government and bioinformatics. Special bulk rates are available for course adoption through Publishing Editor.
The Internet challenges many basic assumptions about the structure of business processes, channels of distribution, product marketing, competitiveness and resource management. It places new demands on organizations and those determining strategy and direction. There are tools and concepts that can enable managers to face these challenges and give them some appreciation of the consequences of this new technology. In this text, Dick Stroud looks at the business implications of the Internet at a strategic level. Without going into technical details, he looks at what is driving the development of the Internet and how it might impact on a number of aspects of an organization's operations. He then defines strategies that can be adopted and outlines the benefits and weaknesses of each, providing the diagnostic tools to enable managers to make decisions about their own businesses.
The year 1997 found the members of the OCLC (Online Computer Library Center) cooperative in an expansive mood. More than 1,000 library leaders attended the OCLC President's Luncheon in San Francisco, where they celebrated OCLC's 30th anniversary. There were more than 25,000 libraries participating in the cooperative, including nearly 3,000 libraries in 62 countries outside the U.S., and the WorldCat database contained more than 37 million bibliographic records. Over the next ten years, the global digital library would indeed emerge, but in a form that few could have predicted. Against a backdrop of continuous technological change and the rapid growth of the Internet, the OCLC cooperative's WorldCat database continued to grow and was a central theme of the past decade. As the chapters in this book show, OCLC's chartered objectives of furthering access to the world's information and reducing the rate of rising library costs continue to resonate among libraries and librarians, as the OCLC cooperative enters its fifth decade. This book was published as a special issue of the Journal of Library Administration.
This book highlights the challenges and potential of educational learning or industry-based training using serious games and social media platforms. In particular, the book addresses applications used in businesses and education-related organizations in Asia, where the framework and experience of serious games have been used to address specific problems in the real world. The topics that will be present in this book includes future of serious games and immersive technologies and their impact on society; online and mobile games; achievement systems in serious games; persuasive technology and games for saving and money management; malware analytics for social networking; serious games for mental health interventions; educational implications of social network games; learning and acquiring subject knowledge using serious games in classrooms. The target audience for this book includes scientists, engineers and practitioners involved in the field of Serious Games. The major part of this book comprises of papers that have been presented at the Serious Games and Social Connect 2012 conference held in Singapore (October 4, 2012). All the contributions have been peer reviewed and by scientific committee members with report about quality, content and originality.
Mathematics teachers and school library media specialists will find this book a valuable resource for using the Web to promote critical thinking in the high school mathematics classroom. It is filled with instructional strategies and an expansive set of activities that cover a broad array of mathematics topics spanning from prealgebra through calculus. Teachers using the questions and activities in this book will help their students meet the standards set forth by the National Council for Teachers of Mathematics. Various types of mathematics related sources on the Internet are outlined within this book, including data and simulations related to real world situations such as saving funds and computing interest earned for college, purchasing a home, or decoding train and plane schedules. The author develops a framework for critical thinking in mathematics and helps teachers create a supportive classroom environment. Each activity highlights a web source, the mathematics topics involved, the appropriate grade levels of study, possible student investigations, and related web sources for continued exploration, promoting a student-centered inquiry.
Modern information and communication technologies, together with a cultural upheaval within the research community, have profoundly changed research in nearly every aspect. Ranging from sharing and discussing ideas in social networks for scientists to new collaborative environments and novel publication formats, knowledge creation and dissemination as we know it is experiencing a vigorous shift towards increased transparency, collaboration and accessibility. Many assume that research workflows will change more in the next 20 years than they have in the last 200. This book provides researchers, decision makers, and other scientific stakeholders with a snapshot of the basics, the tools, and the underlying visions that drive the current scientific (r)evolution, often called 'Open Science.'
The rapid advancement of semantic web technologies, along with the fact that they are at various levels of maturity, has left many practitioners confused about the current state of these technologies. Focusing on the most mature technologies, Applied Semantic Web Technologies integrates theory with case studies to illustrate the history, current state, and future direction of the semantic web. It maintains an emphasis on real-world applications and examines the technical and practical issues related to the use of semantic technologies in intelligent information management. The book starts with an introduction to the fundamentals-reviewing ontology basics, ontology languages, and research related to ontology alignment, mediation, and mapping. Next, it covers ontology engineering issues and presents a collaborative ontology engineering tool that is an extension of the Semantic MediaWiki. Unveiling a novel approach to data and knowledge engineering, the text: Introduces cutting-edge taxonomy-aware algorithms Examines semantics-based service composition in transport logistics Offers ontology alignment tools that use information visualization techniques Explains how to enrich the representation of entity semantics in an ontology Addresses challenges in tackling the content creation bottleneck Using case studies, the book provides authoritative insights and highlights valuable lessons learned by the authors-information systems veterans with decades of experience. They explain how to create social ontologies and present examples of the application of semantic technologies in building automation, logistics, ontology-driven business process intelligence, decision making, and energy efficiency in smart homes.
Everything you need to know to choose and use your laptop. Brilliant Laptops guides you through the essential tasks step-by-step, showing you how to:
Human-Centered e-Business focuses on analysis, design and development of human-centered e-business systems. The authors illustrate the benefits of the human-centered approach in intelligent e-sales recruitment application, integrating data mining technology with decision support model for profiling transaction behavior of internet banking customers, user-centered context dependent data organization using XML, knowledge management, and optimizing the search process through human evaluation in an intelligent interactive multimedia application. The applications described in this work, facilitates both e-business analysis from a business professional's perspective, and human-centered system design from a system development perspective. These applications employ a range of internet and soft computing technologies.
Today, social media have attracted the attention of political actors and administrative institutions to inform citizens as a prerequisite of open and transparent administration, deliver public services, contact stakeholders, revitalize democracy, encourage the cross-agency cooperation, and contribute to knowledge management. In this context, the social media tools can contribute to the emergence of citizen-oriented, open, transparent and participatory public administration. Taking advantage of the opportunities offered by social media is not limited to central government. Local governments deploy internet-based innovative technologies that complement traditional methods in implementing different functions. This book focuses on the relationship between the local governments and social media, deals with the change that social media have caused in the organization, understanding of service provision, performance of local governments and in the relationships between local governments and their partners, and aims to advance our theoretical and empirical understanding of the growing use of social media by local governments. This book will be of interest to researchers and students in e-government, public administration, political science, communication, information science, and social media. Government officials and public managers will also find practical use recommendations for social media in several aspects of local governance
Through the last decade, Internet technologies such as electronic commerce have experienced exponential growth, and emerging issues surrounding this phenomenon have necessitated the amassment of research on the cognitive impact of electronic commerce technologies around the world. Web Technologies for Commerce and Services Online delivers a global perspective on the influence of electronic commerce on organizational behavior, development, and management in organizations, discussing issues such as information security; strategic management of electronic commerce; organizational learning; business process management; mediated enterprises; and electronic marketplaces. With the new insights it delivers on this rapidly evolving technological and commercial domain, this incisive reference will prove an essential addition to library collections worldwide. |
You may like...
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, …
Hardcover
R6,691
Discovery Miles 66 910
|