![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
A 2021 'BOOK TO LOOK OUT FOR' - THE INDEPENDENT 'A mouthpiece for our anxieties and a tonic for our hearts.' Charly Cox 'Funny and honest.' Pandora Sykes 'Offers readers of all stripes and ages a great overview of relationships in the digital era'. Matt Haig Have you ever been ghosted? Found yourself stalking your partner's ex for days on Instagram? Spent hours swiping right (or left) to no avail? Yep, us too. Finding love today is overwhelming. Thanks to apps, social media, and even reality TV, the way we date is constantly changing. But how is it possible that, despite having so much technology designed to aid connection, it feels harder to meet someone now than ever before? In Millennial Love, journalist Olivia Petter expertly investigates this question, providing a reassuring and relatable exploration of modern dating.
Have you ever wondered what specific strategies the world's highest-paid Internet entrepreneurs are using to get rich? Are you tired of working forty hours per week at a job you dislike and not getting paid what you're worth? Would you like to learn how to package the knowledge already in your head and put it into high-earning digital products (ebooks, online courses, coaching programs, software, etc.)? Wouldn't it be great to make a bigger impact in the world by helping others and doing what you love? If you answered yes to any of these questions, read Matthew Loop's Social Media Made Me Rich. This tactical blueprint shares the common denominators of the wealthiest movers and shakers online. You'll learn: - How to profit big from Facebook, Instagram, YouTube, Twitter, Pinterest, Amazon, and Google. - The biggest (and dumbest) mistakes to avoid when using high-leverage social platforms. - A million-dollar plan so you can start from scratch and monetize who you are along with what you know. - The most sought after scripts that grow your brand, influence, and bottom line fast. - How to become the celebrity expert in your industry. - The secret to attracting greater numbers of clients and sales without spending money. Social Media Made Me Rich is a comprehensive resource that helps you achieve prosperity and abundance on your terms, even if you're starting from zero.
Social media and smartphones are criticised for being addictive, destroying personal relationships, undermining productivity, and invading privacy. In this book, Trine Syvertsen explores the phenomenon of digital detox: users taking a break from digital media or adopting measures to limit smartphone and social media use. Based on studies, documents, media texts and interviews with media users, Syvertsen discusses how media industries intensify the quest for attention, how companies and governments team up to get everybody online, and how the main responsibility for managing online risks and problems are placed on the users' shoulders. She provides a rich account of how users reduce their online engagement through time-limitations, restrictions on smartphone use, productivity apps, and use of analogue media. Syvertsen shows how digital detoxing has much in common with other forms of self-help such as mindfulness, decluttering and simple living and places digital detox within a culture of self-optimisation. But digital detox is also about sustaining face-to-face conversations, better work-life-balance, a deeper connection with nature and more meaningful interpersonal relationships. With a wealth of examples, analyses and stories, Digital Detox is a valuable guide to why digital detox and disconnection has become a topic, how it is practised, what it says about the state of media industries and how people express resistance in the 21st century.
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits. It shows how to effectively evaluate the relevant dynamics associated with programs and processes, including operational, strategic, technological, financial and compliance objectives and risks. This book merges traditional internal audit concepts and practices with contemporary quality control methodologies, tips, tools and techniques. It explains how internal auditors can perform operational audits that result in meaningful findings and useful recommendations to help organizations meet objectives and improve the perception of internal auditors as high-value contributors, appropriate change agents and trusted advisors. The 2nd edition introduces or expands the previous coverage of: * Control self-assessments. * The 7 Es framework for operational quality. * Linkages to ISO 9000. * Flowcharting techniques and value-stream analysis * Continuous monitoring. * The use of Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs). * Robotic process automation (RPA), artificial intelligence (AI) and machine learning (ML); and * Adds a new chapter that will examine the role of organizational structure and its impact on effective communications, task allocation, coordination, and operational resiliency to more effectively respond to market demands.
Welcome to the world of 2051 through the eyes of digital marketing pioneers from around the world: engineers, developers, designers, writers and analysts who closely follow tech trends. With their finely honed intuition for user experience and a passion for technology, the authors boldly predict life 30 years from now through a collection of fascinating, futuristic, stories.
While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to balance the requirements of the IPPF with management expectations. The true challenge for any internal auditor is to appropriately apply the Standards while exerting adequate independence and objectivity in the face of management pressure. In Leading the Internal Audit Function, Lynn Fountain presents lessons learned from her extensive experience as an internal auditor, internal audit manager, and CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book identifies more than 50 challenges for auditors and discusses potential alternative actions the auditor can take when they experience a similar challenge. The book explains how to: Build a value-oriented function that abides by the standards and supports the objectives and goals of the organization. Execute the many aspects of the internal audit, including assurance and consulting work. Build a risk-based audit process. Develop and sustain the internal audit team. Develop and manage relationships with management and the audit committee. Manage internal audit's role in corporate governance, compliance, and fraud. Leading the Internal Audit Function includes real-life examples, scenarios, and lessons learned from internal auditors and CAEs to emphasize the importance of carefully managing all aspects of the internal audit. The author summarizes her many lessons learned into ten "commandments" for both CAEs and internal auditors. By following the guidelines in this book, you should be well-equipped to gain management support, perform effective and ethical audits, and uphold IIA Standards.
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. * Covers all aspects of security * Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions * Discusses ways for achieving better access control and trust in the IoT ecosystem * Contributes exhaustive strategic plans to deal with security issues of IoT * Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.
Digital development not only marked today's world in terms of technology, but also transformed our social life into different forms, and it has moved our social practices to a different media.With the development of technology, one of the many aspects of the digital representation that penetrates all areas of life is created by new technology's impacts on human health and behavior. Digital technology that penetrates all areas of life has some impacts on human health and behavior. Some of them are due to virtual reality, and some are due to overuse of new media. These include the following diseases such as cyber disease, digital addiction, binge watching, ego surfing, and many more. The book tackles the abovementioned diseases specifically and includes a wide spectrum of both literature reviews and original studies regarding the diseases of the digital era for a better comprehension of today's world. The studies help to deal with these diseases and develop defense mechanisms against them.
ESPN and the Changing Sports Media Landscape considers the ways the network is reinventing itself as it enters its fifth decade. In their previous book, The ESPN Effect (2015), the editors made the observation that ESPN was a pervasive branded-content provider across multiple media platforms, delivering programs and information 24 hours a day, 365 days a year, to influence how sports fans think and feel about the people who play and control these games. ESPN and the Changing Sports Media Landscape asks whether that will hold true in the 2020s and beyond. The past decade has seen momentous changes in the sports media landscape, among them the massive proliferation of mobile platforms as a major source of sports content, astronomical growth in fantasy sport and esport industries, and the increasing entanglement of sports media in contentious sociopolitical debates. The contributors to this book analyze how ESPN has navigated the shifting playing field and speculate on what the next decade might bring for ESPN and the global sports media industry.
ESPN and the Changing Sports Media Landscape considers the ways the network is reinventing itself as it enters its fifth decade. In their previous book, The ESPN Effect (2015), the editors made the observation that ESPN was a pervasive branded-content provider across multiple media platforms, delivering programs and information 24 hours a day, 365 days a year, to influence how sports fans think and feel about the people who play and control these games. ESPN and the Changing Sports Media Landscape asks whether that will hold true in the 2020s and beyond. The past decade has seen momentous changes in the sports media landscape, among them the massive proliferation of mobile platforms as a major source of sports content, astronomical growth in fantasy sport and esport industries, and the increasing entanglement of sports media in contentious sociopolitical debates. The contributors to this book analyze how ESPN has navigated the shifting playing field and speculate on what the next decade might bring for ESPN and the global sports media industry.
Turn Up the Volume equips journalism students, professionals, and others interested in producing audio content with the know-how necessary to launch a podcast for the first time. It addresses the unique challenges beginner podcasters face in producing professional level audio for online distribution. Beginners can learn how to handle the technical and conceptual challenges of launching, editing, and posting a podcast. This book exposes readers to various techniques and formats available in podcasting. It includes the voices of industry experts as they recount their experiences producing their own podcasts and podcast content. It also examines how data analytics can help grow an audience and provide strategies for marketing and monetization. Written accessibly, Turn Up the Volume gives you a clear and detailed path to launching your first podcast.
The new edition of Digital Learning: The Key Concepts is the perfect reference for anyone seeking to navigate the myriad of named concepts, approaches, issues and technologies associated with digital learning.
The new edition of Digital Learning: The Key Concepts is the perfect reference for anyone seeking to navigate the myriad of named concepts, approaches, issues and technologies associated with digital learning. Key terms are explained succinctly, making this book ideal to dip into for a quick answer, or to read from cover-to-cover, in order to gain a mastery of how digital concepts fit within the world of education. Fully updated to include important developments in digital practice and technology in education over the last ten years, this book takes the reader from A to Z through a range of relevant topics including: * Course design * Digital scholarship * Learning design * Open education * Personal learning environments * Social media and social networking. Ideal as an introductory guide, or as a reference book for ongoing referral, this quick-to-use and comprehensive guide is fully crossreferenced and complete with suggestions for further reading and exploration, making it an essential resource for anyone looking to extend their understanding of digital practices, techniques and pedagogic concepts.
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
US society has controversially debated civil-military relationships and war trauma since the Vietnam War. Civic activists today promote Indigenous warrior traditions as role models for non-Native veteran reintegration and health care. They particularly stress the role of ritual and narrative for civil-military negotiations of war experience and for trauma therapy. Applying a cultural-comparative lens, this book reads non-Native soldiers' and veterans' life writing from post-9/11 wars as "ceremonial storytelling." It analyzes activist academic texts, "milblogs" written in the war zone, as well as "homecoming scenarios." Soldiers' and veterans' interactions with civilians constitute jointly constructed, narrative civic rituals that discuss the meaning of war experience and homecoming.
The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 - 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.
Trope Publishing Company's new Mobile Edition Series identifies fine art photographers shooting in a new way, using mobile devices as their primary tool to capture images, in a category still defining itself. Among the millions of images posted to social media every day, the work of these photographers stands out for its discipline and mastery. Beijing native Cocu Liu's work emphasizes its simplicity, ordered composition, and mastery of light and shadow. An early adopter of the iPhone, Cocu has built his work around the idea that the best camera is the one you have with you. His ability to notice, compose, and capture an image with such spontaneity, so simply, is a true sign of his artistry. Cocu Liu introduces a wider audience to the talent that has won him multiple awards, notice from mobile phone makers, and the admiration of fellow photographers and his over 130K social media followers. |
You may like...
Pearson REVISE Edexcel GCSE Computer…
Ann Weidmann, Cynthia Selby
Paperback
R252
Discovery Miles 2 520
Pearson REVISE BTEC National Information…
Ian Bruce, Daniel Richardson, …
Digital product license key
R496
Discovery Miles 4 960
|