![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
An optimistic and nuanced portrait of a generation that has much to teach us about how to live and collaborate in our digital world. Born since the mid-1990s, members of Generation Z comprise the first generation never to know the world without the internet, and the most diverse generation yet. As Gen Z starts to emerge into adulthood and enter the workforce, what do we really know about them? And what can we learn from them? Gen Z, Explained is the authoritative portrait of this significant generation. It draws on extensive interviews that display this generation's candor, surveys that explore their views and attitudes, and a vast database of their astonishingly inventive lexicon to build a comprehensive picture of their values, daily lives, and outlook. Gen Z emerges here as an extraordinarily thoughtful, promising, and perceptive generation that is sounding a warning to their elders about the world around them-a warning of a complexity and depth the "OK Boomer" phenomenon can only suggest. Much of the existing literature about Gen Z has been highly judgmental. In contrast, this book provides a deep and nuanced understanding of a generation facing a future of enormous challenges, from climate change to civil unrest. What's more, they are facing this future head-on, relying on themselves and their peers to work collaboratively to solve these problems. As Gen Z, Explained shows, this group of young people is as compassionate and imaginative as any that has come before, and understanding the way they tackle problems may enable us to envision new kinds of solutions. This portrait of Gen Z is ultimately an optimistic one, suggesting they have something to teach all of us about how to live and thrive in this digital world.
This book is a thorough treatise concerned with coherence and its significance in legal reasoning. The individual chapters present the topic from the general philosophical perspective, the perspective of legal-theory as well as the viewpoint of cognitive sciences and the research on artificial intelligence and law. As it has turned out the interchange of knowledge among these disciplines is very fruitful for each of them, providing mutual inspiration and increasing understanding of a given topic. This book is a unique resource for anyone interested in the concept of coherence and the role it plays in reasoning. As this book captures important contemporary issues concerning the ongoing discussion on coherence and law, those interested in legal reasoning should find it particularly helpful. By presenting such a broad scope of views and methods on approaching the issue of coherence we hope to promote the general interest in the topic as well as the academic research that centers around coherence and law.
The book deals with data protection issues from practical viewpoints. 40% of the content focus on the Malaysian Personal Data Protection Act (PDPA) 2010 progress, whilst 60% of the content focus on leading comparative practical guidance from Europe. Part of the PDPA provisions is mirrored from European approaches and practices. The approach of this book is straightforward, handy and readable and is supplemented by practical applications, illustrations, tables and diagrams. Practical examples highlighted in this book range from cloud computing, radio frequency identification technology, social media networks and information security to basic related aspects of data protection issues covering strategic leadership, management, governance and audit in businesses, organisations and local authorities. Recommended best practices have been outlined for practical guidance accompanied with future challenges and opportunities for Malaysia and ASEAN. The book is equally suitable for academics, practitioners, governmental officials and regulators dealing with data protection within their sector-specific legislation.
The Internet's rapid diffusion and digitization of economic activities have led to the emergence of a new breed of criminals. Economic, political, and social impacts impacts of these cyber-criminals' activities have received considerable attention in recent years. Individuals, businesses, and governments rightfully worry about the security of their systems, networks, and IT infrastructures. Looking at the patterns of cybercrimes, it is apparent that many underlying assumptions about crimes are ?awed, unrealistic, and implausible to explain this new form of criminality. The empirical records regarding crime patterns and stra- gies to avoid and ?ght crimes run counter to the functioning of the cyberworld. The ?elds of hacking and cybercrime have also undergone political, social, and psychological metamorphosis. The cybercrime industry is a comparatively young area of inquiry. While there has been an agreement that the global cybercrime industry is tremendously huge, little is known about its exact size and structure. Very few published studies have examined economic and institutional factors that in?uence strategies and behaviors of various actors associated with the cybercrime industry. Theorists are also debating as to the best way to comprehend the actions of cyber criminals and hackers and the symbiotic relationships they have with various players.
The emergence of new communication technologies (such as the Internet and social media networking sites and platforms) has strongly affected social movement activism. In this compelling and timely book, Victoria Carty examines these movements and their uses of digital technologies within the context of social movement theory and history. With an accessible and unique mix of theory and real-world examples, Social Movements and New Technology takes readers on a tour through MoveOn and Tea Party e-mail campaigns, the hacktavist tactics of Anonymous, global online protests against rapists and rape culture, and the tweets and Facebook pages that accompanied uprisings across the Arab world, Europe, and the United States. In each case study, the reader is invited to examine the movement, organization, or protest and their use of digital tools through the lens of social movement theory. Discussion questions at the end of each chapter invite critical thinking, further reflection, and debate.
This book analyzes the emerging asset class of digital assets. When a new asset class originates, researchers try to understand some basic questions: Can digital assets, with the flagship asset bitcoin, really be considered a serious asset class? Since it is possible to trade digital assets, does it make sense to trade or to invest in these assets? How do digital assets compare to traditional asset classes like equities or bonds? After describing basic financial theory and breaking down the digital asset universe, this book provides fundamental knowledge with respect to this young and rising asset class. It focuses on special issues like the application of technical indicators, investment styles, asset pricing and portfolio construction. Furthermore, it offers remarks and links to other traditional asset classes and describes and warns of data issues in digital asset data.
Meetings allow us to bring people together to inspire each other, solve problems and make a difference. Yet, we all spend too much time in dull, frustrating meetings where little is achieved and even less is followed up on afterwards. In Hold Successful Meetings, executive coach and former Google leader Caterina Kostoula will change all this. Her unique framework will: - Equip you to hold fewer, more purposeful meetings - Create a creative and inclusive environment - Leave participants inspired and ready to take action Whether virtual or in-person, people will leave your meetings inspired by the value you created together and ready to make an impact. 'I bought this for my whole team at Google!' Reader review
This book starts with an exercise, proposing a theoretical reflection on the technological path that, over time, has transformed the ways we produce, consume and manage intellectual content subject to copyright protection. This lays the groundwork for a further analysis of the main legal aspects of the new European Directive, its improvements, its tendencies and its points of controversy, with special and more concrete attention to how it proposes to address the issues of competition, transparency and multi-territorial licensing. Digital technologies, networks and communication have boosted the production and distribution of intellectual content. These activities are based on a renewable and infinite resource - creativity - which turns this content into strategic artistic, cultural, social, economic and informational assets. Managing the rights and obligations that emerge in this system has never been an easy task; managing them collectively, which is more often than not the case, adds even more complexity. The European Directive on collective management of copyright and related rights and multi-territorial licensing of rights in musical works for online use in the internal market is a policy initiative that seeks to establish an adequate legal framework for the collective management of authors' rights in a digital environment, recognizing this goal as crucial to achieving a fully integrated Single Market. Part of the Digital Agenda for Europe, it is an effort to promote simplification and to enhance the efficiency of collective rights management by tackling three of the main issues that are currently undermining the business model of collecting societies: competition, transparency and multi-territorial licensing. The book is intended to support students, academics and practitioners by enhancing their general and legal grasp of these phenomena, while also encouraging their collaboration with policymakers and other interested parties in the ongoing task of transposing the Directive into concrete national legislation.
Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken. Although there is still tension between those who feel strongly about the subject, a middle ground of responsible disclosure seems to have emerged. Unfortunately, just as we've moved into an era with more responsible disclosure, it would seem that a market has emerged for security vulnerabilities and zero day exploits. Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.
Social Media: Enduring Principles offers a comprehensive overview of topics in social media, from interpersonal communication to the role of social media in culture and society. It covers not only cultural issues like online identity and community, but also tackles more analytical topics like social media measurement, network analysis, and social media economics at an introductory level. Each chapter is based on a set of core social science theories and concepts rather than platform-specific frameworks and findings. Rather than providing the final word or predictions, it aims to open a well-structured, well-grounded conversation about media transition and its effects. Filling the need for a standard academic text in the field, Social Media: Enduring Principles summarizes both foundational and state-of-the-art research and also presents a coherent framework for future research. It draws from longstanding theories in communication, journalism, sociology, and marketing, but also includes a number of contemporary case examples, making it a foundational text in the area.
Are you new to the Macintosh experience and iLife? Or are you someone who wants to know the ins and outs of Apple's powerful media creation tools? Either way, you have come to right place iLife '11 Made Simple will guide you through the iLife apps and help you become a power user in no time. iLife '11 Made Simple lets you be creative with iPhoto, iDVD, iMovie, iWeb, and GarageBandfrom the initial welcome screen to the last menu item. Even though iTunes is not part of the retail package, it is an important part of the creation or sharing process and is coveredin this bookas well. You'll also learn how iLife apps work on iOS devices as well as how they work with iCloud. So, if you just want to learn how to create a basic movie, song or website, iLife '11 Made Simple is perfect for you. Want to become a media mogul in any of the covered applications? After reading this manual, you'll be swept into the creative process and be well on your way to creating or enhancing your next iLife masterpiece You already own the most powerful and easy-to-use computer in the known universe. With this guide in hand, you'll see how Apple appliesits magic to incredible software packages as well. What you'll learn Edit and share photos with iPhoto In-depth features of iDVD Simplify the arcane magic behind video editing with iMovie Easy web publishing with iWeb Make music or even get started learning an instrument with GarageBand Make the most of all the featuresof iTunes Who this book is for Mac and iDevice users, whether new or experienced, who want to get the most out of their iLife '11 applications. Table of Contents Getting Around Your Digital Darkroom Setting Your Sights on iPhoto's Menus Getting Your Memories intothe Digital Darkroom Creating and Sharing Personalized Photo Keepsakes Faces and Places And Now...A slideshow Beginner DVD creation via iDVD iDVD workspace: The Widescreen Edition Burning Questions About iDVD Menus Welcome to Web Creation the iWeb Way When in Doubt in iWeb, Go to the Inspector Bookmark This Chapter on iWeb Menus Lights...Camera...Themes...iMovie Workspaces iMovie Advanced Features: The Inspector, Ken Burns Effect, andMore Calling the Shots on the iMovie Menus Rockin' Around the GarageBand Sidebar Fiddlin' with the Functions Around theGarageBand Workspace Help Composing YourSongs with Notes on GarageBand Menus Navigating iTunes viaIts Sidebar andWorkspace Views Getting media into and out ofiTunes iTunesEverything about the Workspace Except the Kitchen "Sync" How to Become an Efficient Media Mogul by Using the iTunes Menus iLife on the iPad A Glimpse into iCloud
Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime on the dark web. The book further explores how dark web crimes are conducted on the surface web in new mediums, such as the Internet of Things (IoT) and peer-to-peer file sharing systems as well as dark web forensics and mitigating techniques. This book starts with the fundamentals of the dark web along with explaining its threat landscape. The book then introduces the Tor browser, which is used to access the dark web ecosystem. The book continues to take a deep dive into cybersecurity criminal activities in the dark net and analyzes the malpractices used to secure your system. Furthermore, the book digs deeper into the forensics of dark web, web content analysis, threat intelligence, IoT, crypto market, and cryptocurrencies. This book is a comprehensive guide for those who want to understand the dark web quickly. After reading Inside the Dark Web, you'll understand The core concepts of the dark web. The different theoretical and cross-disciplinary approaches of the dark web and its evolution in the context of emerging crime threats. The forms of cybercriminal activity through the dark web and the technological and "social engineering" methods used to undertake such crimes. The behavior and role of offenders and victims in the dark web and analyze and assess the impact of cybercrime and the effectiveness of their mitigating techniques on the various domains. How to mitigate cyberattacks happening through the dark web. The dark web ecosystem with cutting edge areas like IoT, forensics, and threat intelligence and so on. The dark web-related research and applications and up-to-date on the latest technologies and research findings in this area. For all present and aspiring cybersecurity professionals who want to upgrade their skills by understanding the concepts of the dark web, Inside the Dark Web is their one-stop guide to understanding the dark web and building a cybersecurity plan.
The area of Virtual Organizations as a main component of the new discipline of Collaborative Networks has been the focus of research globally. The fast evolution of the information and communication technologies and in particular the so-called Internet technologies, also represents an important motivator for the emergence of new forms of collaboration. However, the research in many of these cases is highly fragmented, considering that each project is focused on solving specific problems. As such, there is no effective consolidation/harmonization among them in order to have an effective impact and facilitate the interaction among the involved experts. This book represents a contribution to the consolidation of the already vast amount of empirical knowledge and practical experience. A synthesis of results collected from the analysis of numerous projects and industry case studies is presented, with focus on: Principles and models, ICT infrastructures and tools, Implementation issues, and Case studies.
Windows Live Movie Maker is a small but powerful movie editing application from Microsoft. It is a complete rewrite of the old Movie Maker software with a new audience in mind. The focus of this new edition is on giving you the power to quickly create movies and slideshows to share with your friends and family. The movies can be a combination of your favorite pictures and home movies set to your own soundtrack. You can add cool effects to transition between scenes, and captions to add a narrative to your movie. With Movie Maker, users can: * Edit digital video and photos, including adding music and narration * Apply animation effects to videos and photos * Create DVDs for personal use, including menu systems for navigation What you'll learn* Learn what's new and different with the Live version of Movie Maker; find out where to download it and view an installation walkthrough.* Discover the basics of importing pictures and video, how to use AutoMovie and perform some easy tweaks on it, and how to save projects.*Experiment with trimming, splitting, and rotating video, fading-in/out, using the View menu to zoom in/out and switch between aspect ratios, arranging storyboard items, and previewing movies. * Learn how to import, trim, and fade music in/out; use start/end points; control volume; and edit audio in a movie clip.* Use formatting, color, size, transparency, and start/end times to add text animation, titles, captions, and credits to your movies.* Learn about DVD formats, creating menu systems, HD (720 and 1080) vs. standard formats, portable devices, e-mail attachments, and IM formats.* Learn tips for enhancing movie and sound quality, file management, menu organization, and creating interesting DVD movies to share.Who this book is for Most digital video editing applications have a steep learning curve and a thick manual. Windows Live Movie Maker is not difficult to learn, but it does not come with a manual. This book is for readers who want to quickly and easily edit their digital movies and create DVDs for viewing, but doni' t want to sift through a lot of technical mumbo jumbo.
What the heck is Facebook? Twitter? Blogging? This book answers these questions and explains how to use a variety of social networking sites to keep in touch, stay in business, and have fun. This book covers the main social networking spaces, and introduces some of the ways people are enjoying them within a family or business context. It includes information on posting pictures, using add-ons, and working with Facebook and LinkedIn groups. It also covers the phenomenon of Twitter, including how it has grown and the road ahead. This book also covers how you can use the various networks together, such as sending a Twitter message that updates your Facebook status, or exporting your LinkedIn contact list and using it to invite people to Facebook. It also includes discussion of how to use social networks for both personal and business use, and how to keep them separate.How to use Facebook, Twitter, and other social networking sites for family, friends, and business How to make your sites talk to each other How to make the most of social networking and stay out of trouble What you'll learn Learn why people have been flocking to these social media sites. Discover how these sites can help you communicate with friends and family. Put that digital camera to use with Facebook and Flickr photo albums and Twitpics. Learn how you can use these sites to promote your business. Learn how to keep your business and personal life separate online. Learn how you can do all this while staying safe online. Who this book is for Social Networking Spaces is for anyone wondering how social networking works, and how to use it to stay in touch, make friends and business contacts, and build an online presence. Table of Contents Carpe Diem Capture, Preserve, and Share Your Adventures on Social Networks What the Heck Is Facebook? Getting Started with Facebook Capturing Your Story on Facebook Branching Out: Facebook Pages and Facebook Advertising What the Heck Is Twitter? Making the Most of Your Tweets What the Heck Is a Blog? Designing and Sharing Your Blog Using Flickr to Share Pictures Watching and Sharing Video on YouTube What the Heck Is LinkedIn? Using LinkedIn to Strengthen Your Career Support Network What the Heck Is MySpace? Meetup: The Original Social Network What the Heck Is Ning? Exploring 3D Virtual Worlds: Second Life Going Global: Connecting with People in Other Countries and Languages, with Google Translate and Google Multilingual Chat
The dramatic acceleration of digital technologies and their integration into physical products is transforming everyday objects. Our domestic appliances, furniture, clothing, are growing in intelligence. Smart objects are increasingly capable of interacting with humans in a purposeful manner with intentionality. This collection of essays, descriptions of empirical work, and design case studies brings together perspectives from interaction design, the humanities, science and technology studies, and engineering, to map, explore and interrogate ways in which our relationships with everyday smart objects might expand and be re-imagined. By offering a critical assessment on the growing place of smart technology in everyday environments, this book outlines a transdisciplinary research agenda for the future of 'smartness' to help define, envision, and inspire future collaborative design practices. These essays propose an understanding and design of smart objects that embrace their hybrid nature as shifting and blending tools, agents, machines, or even 'creatures'. Authors argue that smart objects have the potential to enter into multiple kinds of relationships with humans, and form complex human-nonhuman ecologies that are both meaningful and empowering in the context of everyday life. This book also shines a light on the hidden infrastructures behind the functioning of smart objects with stirring debates tackling questions of technology, human values, and economic and ecological impact. Whether you are a design scholar, design practitioner or design activist this book will inspire through offering theoretical insights, design concepts and practical ways on how to engage in this research agenda for future smartness.
Written by two of the best and brightest podcasting pioneers, Podcast Solutions: The Complete Guide to Audio and Video Podcasting, Second Edition is a comprehensive and perceptive guide to all things podcasting. From downloading podcasts to producing your own for fun or profit, Podcast Solutions covers the entire world of podcasting with insight, humor, and the unmatched wisdom of experience. Big-name companies and podcasters throughout the United States and thousands of faithful listeners around the world will tell you that Michael W. Geoghegan ("Reel Reviews-Films Worth Watching" and GigaVox Media) and Dan Klass ("The Bitterest Pill" and JacketMedia.com) know how to put together compelling and engaging shows that people come backfor week after week. These two pros will guide you through everything, from developing your raw podcast ideas to selecting equipment, creating your podcast (including incorporating music, professional production techniques, and audio- and video-editing secrets), and mobilizing and growing an audience. Plenty has changed since the best-selling first edition of this book, and Michael and Dan bring you all the latest and greatest information on production, distribution, and marketing from the world of audio and video podcasting. Nearly 50 pages of new material and hundreds of updates make this the most complete and up-to-date book on podcasting imaginable. Between Michael's uncanny business and marketing sense and Dan's nearly two decades in the entertainment industry, these authors have the experience to back up their advice on what it takes to elevate your podcast to a professional level. Podcast Solutions gives you not only what youll need to know about podcasting, but also the insider's view on the business of new media production and marketing. Whether you want to use podcasting to inform, educate, entertain, or inspire, whether you are a complete novice or an experienced professional, Podcast Solutions is the guide you need.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
Dieses Buch liefert eine rechtswissenschaftliche Analyse der Chancen und Gefahren algorithmenbasierter Verfahren. Algorithmen, die im Maschinenraum moderner Softwareanwendungen werkeln, sind zu zentralen Steuerungsinstanzen der digitalen Gesellschaft avanciert. Immer nachhaltiger beeinflussen sie unser Leben. Ihre Funktionsweise gleicht aber teilweise einer Blackbox. Die in ihr schlummernden Risiken zu bandigen, fordert die Rechtsordnung heraus. Das Buch beleuchtet die gesellschaftlichen Gefahren einer zunehmenden gesellschaftlichen Steuerung durch Algorithmen und entwickelt erste Regulierungsideen, mit deren Hilfe sich die Wertschoepfungspotenziale automatisierter digitaler Prozesse mit den Grundwerten der Rechtsordnung versoehnen lassen. |
You may like...
Research Anthology on Applying Social…
Information R Management Association
Hardcover
R8,997
Discovery Miles 89 970
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|