![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
These are exciting times for business managers and marketing
professionals, yet the challenges imposed by ongoing social and
technological developments are daunting. In an age in which
marketers can reach their audiences with greater facility than ever
before, firms have never been less in control of their customer
targets.
In the age of digitalization, even the way we govern is adapting. Recently, with the successful implementation of e-governments, the way our systems are organized has changed. Here, Israel Patino Galvan suggests a specialized design structure as an alternative to the new, digital governments that are becoming increasingly more common. Through a thorough exploration of the history of these structures, and through field research in Mexico, serious deficiencies have been identified in the ways in which these e-governments have been implemented. Instead, Galvan offers a tri-phase solution to designing local governments, placing the direction and division of Information Technologies at the core to support the modernization and optimization process. For researchers and practitioners in public administration, information technologies, or information systems, this is a vital text providing a detailed case study as support for a new organizational system.
"Das Internet vergisst nicht." - Mit diesem Satz warnen Datenschutzrechtler vor der Permanenz online veroeffentlichter persoenlicher Informationen. Den Wunsch, das Internet das "Vergessen" zu lehren haben viele Personen im Laufe ihres Lebens. Seit dem 25. Mai 2018 gilt europaweit die Datenschutz-Grundverordnung, die in ihrem Artikel 17 das "Recht auf Loeschung" normiert. Die vorliegende Arbeit, die im privaten Datenschutzrecht mit internetrechtlicher Pragung angesiedelt ist, diskutiert das "Recht auf Vergessen" nach alter und neuer Rechtslage insbesondere im Falle selbst online gestellter Daten, im Falle identifizierender Berichte in journalistischen Online-Archiven sowie bei Direktanspruchen auf Loeschung gegenuber Internetsuchmaschinen wie Google.
App designers dream of creating a platform that users never want to leave, that keeps them glued forever - a platform that is "sticky". Over 846 million WeChat users leave text and voice messages, share life moments, play games, use stickers, purchase rail and flight tickets, shop online, pay utilities and bills, transfer money to friends, and even donate to charity without leaving WeChat, the super-sticky platform. The Economist called WeChat "one app to rule them all", and as it starts to gain global appeal, it is rewriting the rules for social media platforms. This book provides a balanced and nuanced study of how the super-sticky WeChat platform interweaves into the fabric of Chinese social, cultural, and political life. It keeps the wider global and national social media landscape in view and compares and contrasts WeChat with Weibo and QQ, two other popular social media platforms in China, and other Western social media platforms.
Use the Raspberry Pi and modern computing techniques to build industrial Internet of Things systems. Principles and theoretical aspects of IoT technologies combine with hands-on projects leading to detailed descriptions of several industrial IoT applications. This book presents real-life IoT applications based on the Raspberry Pi, beyond the relatively simplistic demos built for educational purposes or hobbyists. You'll make the transition from tinkering with a couple of sensors and simple devices to building fully developed products for commercial use and industrial systems. You'll also work with sensors and actuators, web technologies used for communications in IoT networks, and the large-scale deployment of IoT software solutions. And see how to design these systems as well as maintain them long term. See the Raspberry Pi in a new light that highlights the true industrial potential of the device. Move beyond connecting an LED to the Raspberry Pi and making it blink to actually managing a network of IoT devices. What You'll Learn Design industrial and large scale professional Internet of Things systems Extend your basic IoT knowledge by building advanced products Learn how large scale IoT systems are deployed and maintained Who This Book Is For Advanced hobbyists who want to stretch their abilities into the professional sector. Also professional industrial engineers looking for low-cost solutions to basic IoT needs.
This book constitutes the proceedings of the 13th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2018, held in June 2018 in Chennai, India. The 24 full papers presented in this volume were carefully reviewed and selected from 96 papers. The contributions are organized in topical sections named: HCI and Design, Design Foundations, Design Foundations, Design in Healthcare, Advances in Data Science and Analytics, ICT for Development, Designing Cybersecurity, and Design Applications.
This book is open access under a CC BY 4.0 license. This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ's Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking on the other. Addressing the interests of researchers and practitioners alike, it provides a comprehensive overview of and introduction to the emerging challenges regarding big data.All contributions are based on papers submitted in connection with ABIDA (Assessing Big Data), an interdisciplinary research project exploring the societal aspects of big data and funded by the German Federal Ministry of Education and Research.This volume was produced as a part of the ABIDA project (Assessing Big Data, 01IS15016A-F). ABIDA is a four-year collaborative project funded by the Federal Ministry of Education and Research. However the views and opinions expressed in this book reflect only the authors' point of view and not necessarily those of all members of the ABIDA project or the Federal Ministry of Education and Research.
Timely updates, increased citizen engagement, and more effective marketing are just a few of the reasons transportation agencies have already started to adopt social media networking tools. Best Practices for Transportation Agency Use of Social Media offers real-world advice for planning and implementing social media from leading government practitioners, academic researchers, and industry experts. The book provides an overview of the various social media platforms and tools, with examples of how transportation organizations use each platform. It contains a series of interviews that illustrate what creative agencies are doing to improve service, provide real-time updates, garner valuable information from their customers, and better serve their communities. It reveals powerful lessons learned from various transportation agencies, including a regional airport, city and state departments of transportation, and municipal transit agencies. Filled with examples from transportation organizations, the text provides ideas that can apply to all modes of transportation including mass transit, highways, aviation, ferries, bicycling, and walking. It describes how to measure the impact of your social media presence and also examines advanced uses of social media for obtaining information by involving customers and analyzing their social media use. The book outlines all the resources you will need to maintain a social media presence and describes how to use social media analytical tools to assess service strengths and weaknesses and customer sentiment. Explaining how to overcome the digital divide, language barriers, and accessibility challenges for patrons with disabilities, it provides you with the understanding of the various social media technologies along with the knowhow to determine which one is best for a specific situation and purpose.
Anonymous. WikiLeaks. The Syrian Electronic Army. Edward Snowden. Bitcoin. The Arab Spring. Five years ago, these terms were meaningless to the vast majority of people in the world. Today, they and many like them dominate the news and keep policymakers, security experts, and military and intelligence officials up at night. These groups and individuals are enabled and empowered by digital technology to confound and provoke the state in a way not possible before the Internet revolution. They are representative of a wide range of 21st century global actors and a new form of 21st century power: disruptive power. In Disruptive Power, Taylor Owen provides a sweeping look at the way that digital technologies are shaking up the workings of the institutions that have traditionally controlled international affairs: humanitarianism, diplomacy, war, journalism, activism, and finance. The traditional nation state system and the subsequent multinational system were founded on and have long functioned through a concentration of power in the state, through the military, currency controls, foreign policy, the rule of law, and so on. In this book, Owen argues that in every aspect of international affairs, the digitally enabled are changing the way the world works and disrupting the institutions that once held a monopoly on power. Each chapter of Owen's book looks at a different aspect of international affairs, profiling the disruptive innovators and demonstrating how they are challenging existing power structures for good and ill. Owen considers what constitutes successful online international action, what sorts of technologies are being used as well as what these technologies might look like a decade from now, and what new institutions will be needed to moderate the new power structures and ensure accountability. With cutting edge analysis of the fast-changing relationship between the declining state and increasingly powerful non-state actors, Disruptive Power is the essential road map for navigating a networked world.
Small and medium-sized enterprises (SMEs) are recognized as the backbone of today's world economy. However, SMEs are well known for having limitations and acceptance barriers in adopting new technology even though the internet and communications channel's revolution has changed the way people conduct business today. Further, the COVID-19 pandemic has disturbed the operations of SMEs and increased the burden on social media application globally. It is essential that SMEs utilize social media to strengthen their performance. Strengthening SME Performance Through Social Media Adoption and Usage explores experiences in different technological, managerial, organizational, and entrepreneurial environmental issues. It focuses on different conceptions of factors and consequences influencing social media usage and SME performance. Covering topics such as corporate social responsibility, marketing frameworks, and social media adoption, this premier reference source is a valuable resource for entrepreneurs, business leaders and managers, human resource managers, marketers, consultants, students and educators of higher education, librarians, researchers, and academicians.
Social media has come to deeply penetrate our lives: Facebook, YouTube, Twitter and many other platforms define many of our daily habits of communication and creative production. The Culture of Connectivity studies the rise of social media in the first decade of the twenty-first century up until 2012, providing both a historical and a critical analysis of the emergence of major platforms in the context of a rapidly changing ecosystem of connective media. Such history is needed to understand how these media have come to profoundly affect our experience of online sociality. The first stage of their development shows a fundamental shift. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Author and media scholar Jose van Dijck offers an analytical prism to examine techno-cultural as well as socio-economic aspects of this transformation. She dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecology of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, and filtering content rely on shared ideological principles. At the level of management and organization, we can also observe striking similarities between these platforms' shifting ownership status, governance strategies, and business models. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. "Sharing," "friending," "liking," "following," "trending," and "favoriting" have come to denote online practices imbued with specific technological and economic meanings. This process of normalization, the author argues, is part of a larger political and ideological battle over information control in an online world where everything is bound to become social. Crossing lines of technological, historical, sociological, and cultural inquiry, The Culture of Connectivity will reshape the way we think about interpersonal connection in the digital age.
The revolution in digital communications has altered the relationship between citizens and political elites, with important implications for democracy. As new information ecosystems have evolved, as unforeseen examples of their positive and negative consequences have emerged, and as theorizing, data, and research methods have expanded and improved, the central question has shifted from if the digital information environment is good or bad for democratic politics to how and in what contexts particular attributes of this environment are having an influence. It is only through the careful analysis of specific cases that we can begin to build a more comprehensive and nuanced understanding of the role of digital media in democratic theory and practice. The essays in Digital Media and Democratic Futures focus on a variety of information and communication technologies, politically relevant actors, substantive issues, and digital political practices, doing so from distinct theoretical perspectives and methodological approaches. Individually, each of these case studies provides deep insights into the complex and context-dependent relationship between media and democracy. Collectively, they show that there is no single outcome for democracy in the digital age, only a range of possible futures. Contributors: Rena Bivens, Michael X. Delli Carpini, Jennifer Earl, Thomas Elliott, Deen Freelon, Kelly Gates, Philip N. Howard, Daniel Kreiss, Ting Luo, Helen Nissenbaum, Beth Simone Noveck, Jennifer Pan, Lisa Poggiali, Daniela Stockmann.
Die Optimierung des Web-Auftritts ist fur Entscheider und Mediengestalter ein wesentliches Ziel ihrer Tatigkeit. Anhand von Erkenntnissen der Ergonomie und Arbeitswissenschaft erklart der Autor, was Besucher auf Internetseiten fesselt und zum Kauf anregt, aber auch, was abschreckt. Fur die Planung eines erfolgreichen E-Business-Auftritts vermittelt das Buch wichtige Grundsatze. Fur das Design einer Informationsseite werden Internet-spezifische Prasentationsregeln erlautert, deren Ziel ein Internet-Auftritt ist. Ein Uberblick uber die grundlegenden Internet-Konzepte rundet das Werk ab."
Das Internet stellt eine interessante und bedeutende Herausforderung an die Rechtswissenschaften dar. Die rasante technische Entwicklung dieses Mediums fiihrte zunachst zu der Erfahrung, daB es zu jeder Regel eine technische Umge hungsmOglichkeit zu geben schien, die diese ihrer Wirkung beraubte. Sowohl der Gesetzgeber als auch die mit der Thematik bescWiftigten Juristen haben Schwie rigkeiten, sich auf diese Situation einzustellen. Gleichwohl ist die Vorstellung von Rechtssicherheit im Internet zu einem entscheidenden Gesichtspunkt fUr dessen positive Fortentwickiung geworden. Der elektronische Geschliftsverkehr und die Bereitschaft von Unternehmen, neue Marketing-und Distributionswege zu bege hen, hangt ma6geblich von der zu erzielenden Rechtssicherheit abo Aber auch der in der Presse in den Vordergrund gespielte Mi6brauch des Mediums erfordert angemessene rechtliche MaBnalunen. Allerdings sind LOsungen fur derartige Pro blemlagen nicht mehr alleine durch Rechtsregeln zu erreichen, sondern miissen von technischen Rahmenbedingungen wie etwa die "Digitale Signatur," Sicher heitskonzepte etc. flankiert werden. Dieses Handbuch verfolgt das Ziel, dem Nutzer in der juristischen oder unter nehmerischen Praxis ebenso wie an Universitat oder Fachhochschule einen Weg durch dieses neue Rechtsgebiet zu schlagen. Obschon es fUr dieses junge Rechts gebiet noch keine festgelegten systematischen Strukturen gibt, wird ein vorsichti ger Versuch unternommen, eine Gliederung zu entwerfen, die sich an die Gege benheit der Materie anIehnt. Dazu ist das Werk in vier Abschnitte unterteilt. 1m ersten Abschnitt werden "Grund/agen" behandelt. Den Einstieg bildet ein Kapitel fiber "Europarechtliche und Internationalrechtliche Regelungen.""
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security.
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.
ThisLectureNotesinComputerScience(LNCS)volumecontainsthepapersp- sentedatthe ThirdInternationalWorkshoponComputationalForensics(IWCF 2009), held August 13-14, 2009 at The Netherlands Forensic Institute in The Hague, The Netherlands. Computational forensics is a research domain focusing on the investigation of forensic problems using computational methods. Its primary goal is the d- covery and advancement of forensic knowledge involving modeling, computer simulation, and computer-based analysis and recognition in studying and so- ing forensic problems. The Computational Forensics Workshop series is intended as a forum for researchers and practicioners in all areas of computational and forensic s- ences. This forum discusses current challenges in computer-assisted forensics and presents recent progress and advances. IWCF addressesa broadspectrum of forensicdisciplines fromcriminal inv- tigation. The NAS report "Strengthening Forensic Science in the United States: A Path Forward," published in 2009, already concluded that: "With the exc- tion of nuclear DNA analysis, no forensic method has been rigorously shown to havethecapacitytoconsistentlyandwithahighdegreeofcertaintydemonstrate aconnectionbetweenevidenceandspeci?cindividualorsource."Computational methods can assist with statistical methods using, for example, likelihood ratios to strengthen the di?erent ?elds of forensic science. The organization of such an event is not possible without the e?ort and the enthousiasm of everyone involved. We thank all the members of the P- gram Committee for the timely reviewing process and the adherence to high standards. June 2009 Zeno J.M.H. Geradts Katrin Y. Franke Cor J. Veenman IWCF2009 Organization IWCF2009 was jointly organized by The Netherlands Forensic Institute, The Hague, The Netherlands and the University of Amsterdam, Amsterdam, The Netherlands.
|
You may like...
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,719
Discovery Miles 137 190
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
Multisensory Experiences - Where the…
Carlos Velasco, Marianna Obrist
Hardcover
R1,169
Discovery Miles 11 690
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|