![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part I are organized in the following thematic blocks: blockchain and federated learning; malware analysis and detection; IoT security; software security; Internet security; data-driven cybersecurity.
Have you ever puzzled over how to punctuate a text message? Wondered where memes came from? Fret no more: Because Internet is the perfect book for understanding how the internet is changing the English language, why that's a good thing, and what our online interactions reveal about who we are.
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces types and characteristics of DDoS attacks, reasons why such attacks are often successful, what aspects of the network infrastructure are usual targets, and methods used to launch attacks. The book elaborates upon the emerging botnet technology, current trends in the evolution and use of botnet technology, its role in facilitating the launching of DDoS attacks, and challenges in countering the role of botnets in the proliferation of DDoS attacks. It introduces statistical and machine learning methods applied in the detection and prevention of DDoS attacks in order to provide a clear understanding of the state of the art. It presents DDoS reaction and tolerance mechanisms with a view to studying their effectiveness in protecting network resources without compromising the quality of services. To practically understand how attackers plan and mount DDoS attacks, the authors discuss the development of a testbed that can be used to perform experiments such as attack launching, monitoring of network traffic, and detection of attacks, as well as for testing strategies for prevention, reaction, and mitigation. Finally, the authors address current issues and challenges that need to be overcome to provide even better defense against DDoS attacks.
This book discusses issues relating to the application of AI and computational modelling in criminal proceedings from a European perspective. Part one provides a definition of the topics. Rather than focusing on policing or prevention of crime - largely tackled by recent literature - it explores ways in which AI can affect the investigation and adjudication of crime. There are two main areas of application: the first is evidence gathering, which is addressed in Part two. This section examines how traditional evidentiary law is affected by both new ways of investigation - based on automated processes (often using machine learning) - and new kinds of evidence, automatically generated by AI instruments. Drawing on the comprehensive case law of the European Court of Human Rights, it also presents reflections on the reliability and, ultimately, the admissibility of such evidence. Part three investigates the second application area: judicial decision-making, providing an unbiased review of the meaning, benefits, and possible long-term effects of 'predictive justice' in the criminal field. It highlights the prediction of both violent behaviour, or recidivism, and future court decisions, based on precedents. Touching on the foundations of common law and civil law traditions, the book offers insights into the usefulness of 'prediction' in criminal proceedings.
Pensar el estudio de la comunicacion como una "guerra" implica reconocer que este no es un campo de estudio delimitado por una sola disciplina o una estricta definicion del concepto "comunicacion". Exige, tambien, identificar diversas tradiciones de investigacion, asi como explorar los principales dilemas que han guiado varias disciplinas en distintas epocas historicas y latitudes del mundo. Esta coleccion de tres volumenes propone, entonces, analizar la comunicacion y los medios desde diversas trincheras. Estos diversos panoramas, enfoques, tradiciones, epocas, escuelas, autores y sus preocupaciones dialogan entre si. No hay consensos definitivos; pero tampoco perdedores o ganadores en el debate. La "guerra" consiste, entonces, en identificar lo que esta en juego, en reconocer la diversidad de opiniones e intereses y en considerar el vasto arsenal disponible para resolver los grandes dilemas de la comunicacion. Volumen II. Tradiciones de pensamiento y escuelas Este segundo volumen de La comunicacion y sus guerras teoricas. Introduccion a las teorias de la comunicacion y los medios analiza y contrasta distintas escuelas de pensamiento comunmente ancladas en fronteras nacionales: la influencia norteamericana, el pensamiento frances, la Escuela de Frankfurt, los estudios culturales ingleses, la propuesta de la Escuela Invisible, los planteamientos de la escuela canadiense o el enfoque critico desde America Latina. Estas diversas tradiciones han evolucionado de manera paralela, pero desde trincheras y paradigmas encontrados. Sin embargo, los analisis en este tomo de expertas y expertos en cada tradicion dejan ver que es posible rastrear origenes e intereses comunes. Y aunque las diferencias siguen siendo evidentes, en la mayoria de los casos residen en aspectos menos visibles como: el regimen politico bajo el cual estas escuelas se desarrollan, el interes, el financiamiento e incluso, el impulso que las y los propios academicos dan a algunos temas frente a otros.
Pensar el estudio de la comunicacion como una "guerra" implica reconocer que este no es un campo de estudio delimitado por una sola disciplina o una estricta definicion del concepto "comunicacion". Exige, tambien, identificar diversas tradiciones de investigacion, asi como explorar los principales dilemas que han guiado varias disciplinas en distintas epocas historicas y latitudes del mundo. Esta coleccion de tres volumenes propone, entonces, analizar la comunicacion y los medios desde diversas trincheras. Estos diversos panoramas, enfoques, tradiciones, epocas, escuelas, autores y sus preocupaciones dialogan entre si. No hay consensos definitivos; pero tampoco perdedores o ganadores en el debate. La "guerra" consiste, entonces, en identificar lo que esta en juego, en reconocer la diversidad de opiniones e intereses y en considerar el vasto arsenal disponible para resolver los grandes dilemas de la comunicacion. Volumen II. Tradiciones de pensamiento y escuelas Este segundo volumen de La comunicacion y sus guerras teoricas. Introduccion a las teorias de la comunicacion y los medios analiza y contrasta distintas escuelas de pensamiento comunmente ancladas en fronteras nacionales: la influencia norteamericana, el pensamiento frances, la Escuela de Frankfurt, los estudios culturales ingleses, la propuesta de la Escuela Invisible, los planteamientos de la escuela canadiense o el enfoque critico desde America Latina. Estas diversas tradiciones han evolucionado de manera paralela, pero desde trincheras y paradigmas encontrados. Sin embargo, los analisis en este tomo de expertas y expertos en cada tradicion dejan ver que es posible rastrear origenes e intereses comunes. Y aunque las diferencias siguen siendo evidentes, en la mayoria de los casos residen en aspectos menos visibles como: el regimen politico bajo el cual estas escuelas se desarrollan, el interes, el financiamiento e incluso, el impulso que las y los propios academicos dan a algunos temas frente a otros.
Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.
Explores new perspectives on social media entertainment There is a new class of cultural producers-YouTube vloggers, Twitch gameplayers, Instagram influencers, TikTokers, Chinese wanghong, and others-who are part of a rapidly emerging and highly disruptive industry of monetized "user-generated" content. As this new wave of native social media entrepreneurs emerge, so do new formations of culture and the ways they are studied. In this volume, contributors draw on scholarship in media and communication studies, science and technology studies, and social media, Internet, and platform studies, in order to define this new field of study and the emergence of creator culture. Creator Culture introduces readers to new paradigms of social media entertainment from critical perspectives, demonstrating both relations to and differentiations from the well-established media forms and institutions traditionally within the scope of media studies. This volume does not seek to impose a uniform perspective; rather, the goal is to stimulate in-depth, globally-focused engagement with this burgeoning industry and establish a dynamic research agenda for scholars, teachers, and students, as well as creators and professionals across the media, communication, creative, and social media industries. Contributors include: Jean Burgess, Zoe Glatt, Sarah Banet-Weiser, Brent Luvaas, Carlos A. Scolari, Damian Fraticelli, Jose M. Tomasena, Junyi Lv, Hector Postigo, Brooke Erin Duffy, Megan Sawey, Jarrod Walzcer, Sangeet Kumar, Sriram Mohan, Aswin Punathambekar, Mohamed El Marzouki, Elaine Jing Zhao, Arturo Arriagada, Jeremy Shtern, Stephanie Hill
This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linkoeping University, Sweden, and held online during November 23-24, 2020.The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.
Sponsored by the Communication, Information Technologies, and Media Sociology section of the American Sociological Association (CITAMS), this volume focuses on media and social movements. Contributing authors draw on cases as diverse as the Harry Potter Alliance to youth oriented, non-profit educational organizations, in order to assess systematically how media environments, systems, and usage affect collective action in the 21st century. The volume demonstrates that the study of media and social movements has developed into a vibrant sub-field stretched across Communication Studies, Political Science, and Sociology, and illustrates the need for serious interdisciplinary research. Chapters in the volume reinforce the need to examine many kinds of media (such as fiction) for social movements, particularly in terms of recruitment and framing. They show the critical importance of connecting classic and contemporary social movement research when trying to understand topics such as recruitment, identity, and discourse, even when these are playing out in the digital world. Chapters explore the difficulties that organizations face in organizing whether or not they are primarily offline or online; the ways that digital media usage affects various organizational functions and effectiveness; and the importance of examining the role of youth in social movements across all of these topics.
This book constitutes revised selected papers of the 9th International Conference on Analysis of Images, Social Networks and Texts, AIST 2020, held in Moscow, Russia, in october 2020. Due to the COVID-19 pandemic the conference was held online. The 14 full papers, 9 short papers and 4 poster papers were carefully reviewed and selected from 108 qualified submissions. The papers are organized in topical sections on natural language processing; computer vision; social network analysis; data analysis and machine learning; theoretical machine learning and optimization; process mining; posters.
Pensar el estudio de la comunicacion como una "guerra" implica reconocer que este no es un campo de estudio delimitado por una sola disciplina o una estricta definicion del concepto "comunicacion". Exige, tambien, identificar diversas tradiciones de investigacion, asi como explorar los principales dilemas que han guiado varias disciplinas en distintas epocas historicas y latitudes del mundo. Esta coleccion de tres volumenes propone, entonces, analizar la comunicacion y los medios desde muy diversas trincheras. Estos diversos panoramas, enfoques, tradiciones, epocas, escuelas, autores y sus preocupaciones dialogan entre si. No hay consensos definitivos; pero tampoco perdedores o ganadores en el debate. La "guerra" consiste pues, en identificar lo que esta en juego; reconocer la diversidad de opiniones e intereses, y; considerar el vasto arsenal disponible para resolver los grandes dilemas de la comunicacion. Volumen I. Enfoques disciplinarios Este primer volumen de La comunicacion y sus guerras teoricas. Introduccion a las teorias de la comunicacion y los medios revisa los principales enfoques disciplinarios: sus supuestos, alcances y limites, asi como las propuestas generales de los diversos cristales desde los que se mira este complejo campo de estudio. "Y es que en el mundo traidor", dicta el verso, "no hay ni verdad ni mentira: todo es segun el color del cristal con que se mira". Este volumen presenta algunas (im)precisiones necesarias, al tiempo que propone un mapa tentativo para navegar en esta muy variada area de estudio. El recorrido comienza por el enfoque tradicional de la sociologia invitandonos a cuestionar el determinismo tecnologico que constantemente amenaza el estudio de la comunicacion y los medios. Otros "cristales" como el enfoque normativo, el cultural, el afectivo, el biologico, el economico, el digital o el politico complementan esta revision critica a traves de las plumas de los grandes expertos de cada mirada.
Pensar el estudio de la comunicacion como una "guerra" implica reconocer que este no es un campo de estudio delimitado por una sola disciplina o una estricta definicion del concepto "comunicacion". Exige, tambien, identificar diversas tradiciones de investigacion, asi como explorar los principales dilemas que han guiado varias disciplinas en distintas epocas historicas y latitudes del mundo. Esta coleccion de tres volumenes propone, entonces, analizar la comunicacion y los medios desde muy diversas trincheras. Estos diversos panoramas, enfoques, tradiciones, epocas, escuelas, autores y sus preocupaciones dialogan entre si. No hay consensos definitivos; pero tampoco perdedores o ganadores en el debate. La "guerra" consiste pues, en identificar lo que esta en juego; reconocer la diversidad de opiniones e intereses, y; considerar el vasto arsenal disponible para resolver los grandes dilemas de la comunicacion. Volumen I. Enfoques disciplinarios Este primer volumen de La comunicacion y sus guerras teoricas. Introduccion a las teorias de la comunicacion y los medios revisa los principales enfoques disciplinarios: sus supuestos, alcances y limites, asi como las propuestas generales de los diversos cristales desde los que se mira este complejo campo de estudio. "Y es que en el mundo traidor", dicta el verso, "no hay ni verdad ni mentira: todo es segun el color del cristal con que se mira". Este volumen presenta algunas (im)precisiones necesarias, al tiempo que propone un mapa tentativo para navegar en esta muy variada area de estudio. El recorrido comienza por el enfoque tradicional de la sociologia invitandonos a cuestionar el determinismo tecnologico que constantemente amenaza el estudio de la comunicacion y los medios. Otros "cristales" como el enfoque normativo, el cultural, el afectivo, el biologico, el economico, el digital o el politico complementan esta revision critica a traves de las plumas de los grandes expertos de cada mirada.
What's your story? The most successful brands aren't created, they are unearthed. Successful branding is based on authenticity. So how do you reveal your own brand? First, by searching yourself for answers to questions like these: What do you do better than anyone? What are you most proud of? What makes you lose track of time? In Digital You: Real Personal Branding in the Virtual Age, branding authority William Arruda describes the 21st century world of personal branding and guides you to define, express, and expand your personal brand for the virtual world. Branding is not about being famous, Arruda explains; it's about being selectively famous. It's about more than social media excess. When you understand the true value of personal branding, you can use it as a serious career development strategy. Digital You offers a deep dive to understanding and defining your unique promise of value-making a great first impression, mastering multimedia, and, ultimately, expanding your network and promoting thought leadership. You'll learn how to develop, design, and sustain a personal brand throughout the fluid movements of any career. Understand how to be clear about your digital brand and your unique promise of value so you can increase your success and happiness at work and in life. It's time to stop worrying about career extinction and start crafting a brand of distinction.
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues; Infrastructure Protection; Vehicle Infrastructure Security; Telecommunications Infrastructure Security; Cyber-Physical Systems Security; and Industrial Control Systems Security. This book is the thirteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Thirteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2019. Critical Infrastructure Protection XIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression. According to its traditional understanding, this right gives individuals the possibility to preclude the media from revealing personal facts that are no longer newsworthy, at least where no other interest prevails. Cases sanctioning this understanding still abound in a number of countries. In today's world, however, the right to be forgotten has evolved, and it appears in a more multi-faceted way. It can involve for instance also the right to access, control and even erase personal data. Of course, these prerogatives depend on various factors and competing interests, of both private and public nature, which again require careful balancing. Due to ongoing technological evolution, it is likely that the right to be forgotten in some of its new manifestations will become increasingly relevant in our societies.
This book assesses the normative and practical challenges for artificial intelligence (AI) regulation, offers comprehensive information on the laws that currently shape or restrict the design or use of AI, and develops policy recommendations for those areas in which regulation is most urgently needed. By gathering contributions from scholars who are experts in their respective fields of legal research, it demonstrates that AI regulation is not a specialized sub-discipline, but affects the entire legal system and thus concerns all lawyers. Machine learning-based technology, which lies at the heart of what is commonly referred to as AI, is increasingly being employed to make policy and business decisions with broad social impacts, and therefore runs the risk of causing wide-scale damage. At the same time, AI technology is becoming more and more complex and difficult to understand, making it harder to determine whether or not it is being used in accordance with the law. In light of this situation, even tech enthusiasts are calling for stricter regulation of AI. Legislators, too, are stepping in and have begun to pass AI laws, including the prohibition of automated decision-making systems in Article 22 of the General Data Protection Regulation, the New York City AI transparency bill, and the 2017 amendments to the German Cartel Act and German Administrative Procedure Act. While the belief that something needs to be done is widely shared, there is far less clarity about what exactly can or should be done, or what effective regulation might look like. The book is divided into two major parts, the first of which focuses on features common to most AI systems, and explores how they relate to the legal framework for data-driven technologies, which already exists in the form of (national and supra-national) constitutional law, EU data protection and competition law, and anti-discrimination law. In the second part, the book examines in detail a number of relevant sectors in which AI is increasingly shaping decision-making processes, ranging from the notorious social media and the legal, financial and healthcare industries, to fields like law enforcement and tax law, in which we can observe how regulation by AI is becoming a reality.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market is disrupting consolidated legal acquisitions, such as classical internal market categories, as well as the applicability of consumer protection, data protection, and labour and competition law. It argues that the collaborative economy will, sooner or later, require some sort of regulatory intervention from the European Union. This regulatory intervention, far from stifling innovation, will benefit online platforms, service providers and users by providing them with a clearer and more predictable environment in which to conduct their business. Although primarily intended for academics, this book also appeals to a wider readership, including, but not limited to, national and international regulators, private firms and lobbies as well as online platforms, consumer associations and trade unions.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.
This book identifies and explains the different national approaches to data protection - the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals - and determines the extent to which they could be harmonised in the foreseeable future. In recent years, data protection has become a major concern in many countries, as well as at supranational and international levels. In fact, the emergence of computing technologies that allow lower-cost processing of increasing amounts of information, associated with the advent and exponential use of the Internet and other communication networks and the widespread liberalization of the trans-border flow of information have enabled the large-scale collection and processing of personal data, not only for scientific or commercial uses, but also for political uses. A growing number of governmental and private organizations now possess and use data processing in order to determine, predict and influence individual behavior in all fields of human activity. This inevitably entails new risks, from the perspective of individual privacy, but also other fundamental rights, such as the right not to be discriminated against, fair competition between commercial enterprises and the proper functioning of democratic institutions. These phenomena have not been ignored from a legal point of view: at the national, supranational and international levels, an increasing number of regulatory instruments - including the European Union's General Data Protection Regulation applicable as of 25 May 2018 - have been adopted with the purpose of preventing personal data misuse. Nevertheless, distinct national approaches still prevail in this domain, notably those that separate the comprehensive and detailed protective rules adopted in Europe since the 1995 Directive on the processing of personal data from the more fragmented and liberal attitude of American courts and legislators in this respect. In a globalized world, in which personal data can instantly circulate and be used simultaneously in communications networks that are ubiquitous by nature, these different national and regional approaches are a major source of legal conflict.
How do highly-successful people like Elon Musk and Bill Gates get so much done? The answer is time blocking; a time-management method that Cal Newport, productivity expert and bestselling author of Digital Minimalism, has been using for fifteen years. For the first time, this game-changing system has been captured in a daily planner that makes it easy for you to prioritise tasks and focus on the things that really matter. Using the time-block method you'll no longer be distracted by your inbox, social media and other peoples' demands for your time. The Time-Block Planner will help you push aside distractions and focus on the work that will make the difference to you.
Billions of you have watched their videos and millions of you have followed them on social media. So here we go; it's time to back up because YouTube superstars, The Sidemen, are finally here in book form and they're dishing the dirt on each other as well as the YouTube universe. There's nowhere to hide as KSI, Miniminter, Behzinga, Zerkaa,Vikkstar123, Wroetoshaw and Tobjizzle go in hard on their living habits, their football ability, and their dodgy clobber, while also talking Fifa, Vegas and superheroes. They'll also give you their grand house tour, letting you in on a few secrets, before showing you their hall of fame, as well as revealing some of their greatest shames. Along the way you'll learn how seven of the world's biggest YouTube stars started off with nothing more than a computer console, a PC and a bad haircut before joining forces to crush the internet. And they'll tell you just how they did it (because they're nice like that) with their ultimate guide to YouTube while also sharing their memories of recording their favourite videos as well as a typical day in the life of The Sidemen. You'll feel like you're with them every step of the way, smelling the 'sweet' aroma of the boys' favourite dishes in the kitchen, stamping your passport as you follow them on their trips around the world and kicking every ball as the boys gear up for the biggest football match of their lives. It's going to get personal. It's going to get intense, and JJ is going to have lots of tantrums, so take a moment to prepare yourself, because this is The Sidemen book you've been waiting for!
A thorough analysis of contemporary digital media practices, showing how people increasingly not only consume but also produce and even design media. With many new forms of digital media-including such popular social media as Facebook, Twitter, and Flickr-the people formerly known as the audience no longer only consume but also produce and even design media. Jonas Loewgren and Bo Reimer term this phenomenon collaborative media, and in this book they investigate the qualities and characteristics of these forms of media in terms of what they enable people to do. They do so through an interdisciplinary research approach that combines the social sciences and humanities traditions of empirical and theoretical work with practice-based, design-oriented interventions. Loewgren and Reimer offer analysis and a series of illuminating case studies-examples of projects in collaborative media that range from small multidisciplinary research experiments to commercial projects used by millions of people. Loewgren and Reimer discuss the case studies at three levels of analysis: society and the role of collaborative media in societal change; institutions and the relationship of collaborative media with established media structures; and tribes, the nurturing of small communities within a large technical infrastructure. They conclude by advocating an interventionist turn within social analysis and media design. |
You may like...
Atomic and Molecular Manipulation…
Andrew J. Mayne, Gerard Dujardin
Hardcover
R3,430
Discovery Miles 34 300
Full-Duplex Communications for Future…
Hirley Alves, Taneli Riihonen, …
Hardcover
R2,691
Discovery Miles 26 910
Hardware Accelerators in Data Centers
Christoforos Kachris, Babak Falsafi, …
Hardcover
R3,812
Discovery Miles 38 120
Next Generation Intelligent Environments…
Stefan Ultes, Florian Nothdurft, …
Hardcover
Advances in Physical Organic Chemistry…
Ian Williams, Nick Williams
Hardcover
R5,460
Discovery Miles 54 600
|