![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Sensing a future beyond work lurking in an age of crisis, the 'post-capitalist' utopias of today spread the idea of a permanent escape from work aided by the automation of production, a universal basic income and the reduction of working hours to zero. By skilfully unpicking the political economy of contemporary work and its futures, this book mounts a forceful critique of the post-work society vision. Dinerstein and Pitts reveal that transitional measures towards a world beyond work do not do enough to break away from the key features of capitalist society, and instead potentially stifle the capacity for transformative social change. Proposing an innovative alternative, the authors envision the construction of 'concrete utopias' that shape and anticipate non-capitalist futures.
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found in various key fields of law directly linked to the Internet such as information technology, consumer protection, personal data, e-commerce and copyright law. In addition, it aims to shed light on the content and importance of various pending legislative proposals in these fields, and of the Court of Justice of the European Union's recent case law in connection with solving the different problems encountered. The book focuses on challenging legal questions that have not been sufficiently analyzed, while also presenting original thinking in connection with the regulation of emerging legal questions. As such, it offers an excellent reference tool for researchers, policymakers, judges, practitioners and law students with a special interest in EU Internet law and regulation.
This book addresses the question of how competition authorities assess mergers in the Information Communication Technology (ICT) sector so as to promote competition in innovation. A closer look at the question reveals that it is far more complex and difficult to answer for the ICT, telecommunications and multi-sided platform (MSP) economy than for more traditional sectors of the economy. This has led many scholars to re-think and question whether the current merger control framework is suitable for the ICT sector, which is often also referred to as the new economy. The book pursues an interdisciplinary approach combining insights from law, economics and corporate strategy. Further, it has a comparative dimension, as it discusses the practices of the US, the EU and, wherever relevant, of other competition authorities from around the globe. Considering that the research was conducted in the EU, the practices of the European Commission remain a key aspect of the content.Considering its normative dimension, the book concentrates on the substantive aspects of merger control. To facilitate a better understanding of the most important points, the book also offers a brief overview of the procedural aspects of merger control in the EU, the US and the UK, and discusses recent amendments to Austrian and German law regarding the notification threshold. Given its scope, the book offers an invaluable guide for competition law scholars, practitioners in the field, and competition authorities worldwide.
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.
In Film und Literatur gibt es durch kanonisierte UEberwachungserzahlungen eine Vielzahl von Narrativen der UEberwachung, die in das Alltagswissen ubergegangen sind und die kulturellen Verhandlungen und Vorstellungen von Privatheit und Autonomie pragen. Doch auch in einer Vielzahl von anderen Medien und Diskursen lassen sich Narrative der UEberwachung finden, wie etwa im Computerspiel, in der Werbung, in Dokumentationen oder der Aktionskunst, und nicht zuletzt in der Wissenschaft selbst. Der Band widmet sich Modellierungen von UEberwachung und geht Entwicklungen von Erzahlungen und Diskursen anhand von verschiedenen Beispielen nach. Die interdisziplinaren Perspektiven nehmen dabei auch das Verhaltnis der UEberwachungsnarrative zu Sicherheits-, Privatheits- und Digitalisierungsthemen in den Blick.
Durante los ultimos anos se han hecho multiples investigaciones sobre estado de flujo (flow), todas ellas de muy diversa naturaleza, dada la versatilidad del concepto para ser aplicado a distintos contextos. Lo que se pretende con el presente trabajo es contribuir y ampliar la literatura sobre estado de flujo en la esfera online, mas concretamente, en el ambito de las redes sociales; buscando asi que las marcas contemplen este constructo en sus estrategias de marketing digital. Para ello, en primer lugar, se establece un marco teorico en el que definimos y describimos los aspectos mas importantes del estado de flujo. Posteriormente, ahondamos en las caracteristicas de dicho fenomeno pero, esta vez, aplicado al entorno virtual, y lo relacionamos con terminos propios de la disciplina comercial. Por ultimo, y a modo de estudio empirico del que extraer conclusiones practicas, se realiza un analisis estadistico para conocer la percepcion de los individuos acerca de las experiencias optimas que ofrecen las distintas redes sociales.
Politiker*innen haben in digitalen Mediengesellschaften eine starke, zumeist visuelle und multimodale mediatisierte Prasenz. Nicht nur klassische Massenmedien und strategische PR-Teams lassen Politiker*innen als Figuren in den unterschiedlichsten Online- und Offline-Formaten, semiotischen Kodierungen, sozialen Typisierungen und diskursiven Frames auftreten. In der digital strukturierten OEffentlichkeit greifen auch Online-Aktivisten und Social-Media-User in die medialen Diskurswelten politischer Kommunikation ein. Auf der Basis einer metapragmatisch ausgerichteten Diskurslinguistik entwickelt dieses Buch einen transdisziplinaren Konzept- und Kategorienrahmen fur die systematische Analyse dieses komplexen Phanomenbereichs spatmoderner Politik.
A vivid look at China's shifting place in the global political economy of technology production How did China's mass manufacturing and "copycat" production become transformed, in the global tech imagination, from something holding the nation back to one of its key assets? Prototype Nation offers a rich transnational analysis of how the promise of democratized innovation and entrepreneurial life has shaped China's governance and global image. With historical precision and ethnographic detail, Silvia Lindtner reveals how a growing distrust in Western models of progress and development, including Silicon Valley and the tech industry after the financial crisis of 2007-8, shaped the rise of the global maker movement and the vision of China as a "new frontier" of innovation. Lindtner's investigations draw on more than a decade of research in experimental work spaces-makerspaces, coworking spaces, innovation hubs, hackathons, and startup weekends-in China, the United States, Africa, Europe, Taiwan, and Singapore, as well as in key sites of technology investment and industrial production-tech incubators, corporate offices, and factories. She examines how the ideals of the maker movement, to intervene in social and economic structures, served the technopolitical project of prototyping a "new" optimistic, assertive, and global China. In doing so, Lindtner demonstrates that entrepreneurial living influences governance, education, policy, investment, and urban redesign in ways that normalize the persistence of sexism, racism, colonialism, and labor exploitation. Prototype Nation shows that by attending to the bodies and sites that nurture entrepreneurial life, technology can be extricated from the seemingly endless cycle of promise and violence. Cover image: Courtesy of Cao Fei, Vitamin Creative Space and Spru th Magers
Social media is supposed to bring us together - but it is tearing us apart. 'A blisteringly good, urgent, essential read' Zadie Smith The evidence suggests that social media is making us sadder, angrier, less empathetic, more fearful, more isolated and more tribal. Jaron Lanier is the world-famous Silicon Valley scientist-pioneer who first alerted us to the dangers of social media. In this witty and urgent manifesto he explains why its toxic effects are at the heart of its design, and, in ten simple arguments, why liberating yourself from its hold will transform your life and the world for the better. WITH A NEW AFTERWORD BY THE AUTHOR ‘Informed, heartfelt and often entertaining ... a timely reminder that even if we can’t bring ourselves to leave social media altogether, we should always think critically about how it works’ Sunday Times ‘Indispensable. Everyone who wants to understand the digital world, its pitfalls and possibilities should read this book – now’ Matthew d’Ancona, author of Post-Truth
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The IOSec Workshop received 17 submissions from which 7 full papers were selected for presentation. They cover topics related to security architectures and frameworks for enterprises, SMEs, public administration or critical infrastructures, threat models for IT & OT systems and communication networks, cyber-threat detection, classification and pro ling, incident management, security training and awareness, risk assessment safety and security, hardware security, cryptographic engineering, secure software development, malicious code analysis as well as security testing platforms. From the MSTEC Workshop 7 full papers out of 15 submissions are included. The selected papers deal focus on the verification and validation (V&V) process, which provides the operational community with confidence in knowing that cyber models represent the real world, and discuss how defense training may benefit from cyber models. The FINSEC Workshop received 8 submissions from which 3 full papers and 1 short paper were accepted for publication. The papers reflect the objective to rethink cyber-security in the light of latest technology developments (e.g., FinTech, cloud computing, blockchain, BigData, AI, Internet-of-Things (IoT), mobile-first services, mobile payments).
We live in a "metric culture" where data, algorithms, and numbers play an unmistakably powerful role in defining, shaping and ruling the world we inhabit. Increasingly, governments across the globe are turning towards metric technologies to find solutions for managing various social domains such as healthcare and education. While private corporations are becoming more and more interested in the collection and analysis of data and metrics for profit generation and service optimisation. What is striking about this metric culture is that not only are governments and private companies the only actors interested in using metrics and data to control and manage individuals and populations, but individuals themselves are now choosing to voluntarily quantify themselves and their lives more than ever before, happily sharing the resulting data with others and actively turning themselves into projects of (self-) governance and surveillance. Metric Culture is also not only about data and numbers alone but links to issues of power and control, to questions of value and agency, and to expressions of self and identity. This book provides a critical investigation into these issues examining what is driving the agenda of metric culture and how it is manifested in the different spheres of everyday life through self-tracking practices. Authors engage with a broad range of topics, examples, geographical contexts, and sites of analysis in order to account for the diversity and hybridity of metric culture and explore its various social, political and ethical implications.
This book critically reviews existing digital divide research and challenges its core thesis, which posits unequal Internet access as a newly formed source of social disadvantage. The author begins by introducing the building blocks of the information society theory. The book goes on to present a systematic overview of digital divide research - its development, arguments attesting to the social gravity of the digital divide, and current findings on the uneven diffusion and use of the Internet. It evaluates the validity of the theories and concepts associated with digital divide research. The author offers an overview and re-examination of six presumptions and biases found in the prevailing approach to the digital divide. Given that Internet use has, in certain contexts, become an absolute necessity, an alternative approach is proposed, recognizing the indispensability of Internet use as context dependent. The book concludes with a consideration of the implications that this new perspective has for the information society theory and policies as well as for the role of social science in the informatization process.
This book constitutes the refereed proceedings of the 6th International Conference on Multidisciplinary Social Networks Research, MISNC 2019, held in Wenzhou, China, in August 2019. The 15 full papers presented were carefully reviewed and selected from 37 submissions. The papers deal with the following topics: social network, social network analysis, data engineering, data mining, user behavior.
This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.
This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019.The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.
This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019.The 21 full papers presented together with 11 short papers were carefully reviewed and selected from 47 submissions.The papers focus on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods.
This two-volume set (CCIS 1075 and CCIS 1076) constitutes the refereed proceedings of the Third International Conference on Advanced Informatics for Computing Research, ICAICR 2019, held in Shimla, India, in June 2019. The 78 revised full papers presented were carefully reviewed and selected from 382 submissions. The papers are organized in topical sections on computing methodologies; hardware; information systems; networks; software and its engineering.
Fur die individuelle und gesamtgesellschaftliche Wissenskommunikation, d.h. den kommunikativ vermittelten Transfer sprachlich gefassten Wissens, haben sich durch die allumfassende Digitalisierung die Bedingungsgefuge in vielfacher Hinsicht verandert. Neue technisch-mediale Rahmenbedingungen, diversifizierte und flexibilisierte Textsorten und Interaktionstypen sowie undurchsichtige Akteurs-Konstellationen lassen eine ganze Reihe neuer wissenskommunikativer Erscheinungsformen entstehen, die trotz ihrer grossen alltaglichen Bedeutung erst in Ansatzen beschrieben sind. Der Sammelband dokumentiert sprach- und transferwissenschaftliche Perspektiven auf diesen multidisziplinar im Fokus stehenden Gegenstandsbereich.
This two-volume set (CCIS 1045 and CCIS 1046) constitutes the refereed proceedings of the Third International Conference on Advances in Computing and Data Sciences, ICACDS 2019, held in Ghaziabad, India, in April 2019. The 112 full papers were carefully reviewed and selected from 621 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.
This SpringerBrief brings order to the wealth of research studies that contribute to shape our understanding of on-line social networks (OSNs) lurking phenomena. This brief also drives the development of computational approaches that can be effectively applied to answer questions related to lurking behaviors, as well as to the engagement of lurkers in OSNs. All large-scale online social networks (OSNs) are characterized by a participation inequality principle, i.e., the crowd of an OSN does not actively contribute, rather it takes on a silent role. Silent users are also referred to as lurkers, since they gain benefit from others' information without significantly giving back to the community. Nevertheless, lurkers acquire knowledge from the OSN, therefore a major goal is to encourage them to more actively participate. Lurking behavior analysis has been long studied in social science and human-computer interaction fields, but it has also matured over the last few years in social network analysis and mining. While the main target audience corresponds to computer, network, and web data scientists, this brief might also help increase the visibility of the topic by bridging different closely related research fields. Practitioners, researchers and students interested in social networks, web search, data mining, computational social science and human-computer interaction will also find this brief useful research material .
This authorised book is the perfect gift for fans of the #1 plush property Based on the bestselling squishy toy, this adorable collector's guide is the perfect gift for any Squishmallows fan! They're lovable, they're squishy-they're Squishmallows! This OFFICIAL Collector's Guide is packed with quirky tidbits, top-ten lists, bios & stats, and a "rarity factor" for Squishmallows' collectible characters. Filled with hundreds of colorful photos and unique art styles. Avid fans, new collectors, young or old, Squishmallows: The Collector's Guide is perfect for just about anyone! Squishmallows are plush toys that are here to fill your hearts with love and affection. Since 2017, the versatile Squishmallows have grown into an international phenomenon and offer comfort, support, and warmth as friends, couch companions, bedtime buddies, and travel teammates. With more than 500 Squishmallows characters to collect, young fans can aspire to be like their favorite characters. Each Squishmallow has its own unique name and storyline to add to the fun.
This book offers the latest research and new perspectives on Interactive Collaborative Learning and Engineering Pedagogy. We are currently witnessing a significant transformation in education, and in order to face today's real-world challenges, higher education has to find innovative ways to quickly respond to these new needs. Addressing these aspects was the chief aim of the 21st International Conference on Interactive Collaborative Learning (ICL2018), which was held on Kos Island, Greece from September 25 to 28, 2018. Since being founded in 1998, the conference has been devoted to new approaches in learning, with a special focus on collaborative learning. Today the ICL conferences offer a forum for exchanging information on relevant trends and research results, as well as sharing practical experiences in learning and engineering pedagogy. This book includes papers in the fields of: * New Learning Models and Applications * Pilot Projects: Applications * Project-based Learning * Real-world Experiences * Remote and Virtual Laboratories * Research in Engineering Pedagogy * Technical Teacher Training It will benefit a broad readership, including policymakers, educators, researchers in pedagogy and learning theory, school teachers, the learning industry, further education lecturers, etc.
Soziale Medien fordern die Didaktik unter zweierlei Perspektive heraus: Als Instrumente didaktischen Handelns koennen sie Unterricht bei der Erreichung seiner Vermittlungs- und Foerderziele bereichern. Als Reflexionsgegenstand mussen sie hinsichtlich ihrer Effekte auf Sprache, Kommunikation, Individuum und Gesellschaft analysiert werden, um Lernenden Kompetenzen fur die Orientierung in der digitalen Welt zu vermitteln. Dieser Band prasentiert zehn Arbeiten von 17 Autorinnen und Autoren aus Linguistik, Sprach- und Mediendidaktik, die anhand von Praxisbeispielen und Unterrichtsanregungen aktuelle Entwicklungen und Herausforderungen in Bezug auf das Lehren und Lernen mit sozialen Medien und uber soziale Medien reflektieren.
This book constitutes the thoroughly refereed joint post-proceedings of the Third International Workshop on Mining Ubiquitous and Social Environments, MUSE 2012, held in Bristol, UK, in September 2012, and the Third International Workshop on Modeling Social Media, MSM 2012, held in Milwaukee, WI, USA, in June 2012. The 8 full papers included in the book are revised and significantly extended versions of papers submitted to the workshops. They cover a wide range of topics organized in three main themes: communities and group structure in ubiquitous social media; ubiquitous modeling and aspects of social interactions and influence. |
You may like...
Emerging Technologies for Librarians - A…
Sharon Q. Yang, Lili Li
Paperback
R1,457
Discovery Miles 14 570
Research Anthology on Applying Social…
Information R Management Association
Hardcover
R9,000
Discovery Miles 90 000
Research Anthology on Applying Social…
Information R Management Association
Hardcover
R8,997
Discovery Miles 89 970
Vocabulary Control and Search Strategies…
Alice Yanosko Chamis
Hardcover
Culture, Creativity and Economy…
Brian J Hracs, Taylor Brydges, …
Hardcover
R1,655
Discovery Miles 16 550
|