|
|
Books > Computing & IT > Social & legal aspects of computing > General
Explaining new and innovative methods of promoting music and
products for entertainment, distance teaching, valorizing archives,
and commercial and non-commercial purposes, this reference profiles
new services for those connected via personal computers, mobile,
and other devices, for both sighted and print-impaired customers.
In recent decades there has been incredible growth in the use of
various internet applications by individuals and organizations who
store sensitive information online on different servers. This
greater reliance of organizations and individuals on internet
technologies and applications increases the threat space and poses
several challenges for implementing and maintaining cybersecurity
practices. Constructing an Ethical Hacking Knowledge Base for
Threat Awareness and Prevention provides innovative insights into
how an ethical hacking knowledge base can be used for testing and
improving the network and system security posture of an
organization. It is critical for each individual and institute to
learn hacking tools and techniques that are used by dangerous
hackers in tandem with forming a team of ethical hacking
professionals to test their systems effectively. Highlighting
topics including cyber operations, server security, and network
statistics, this publication is designed for technical experts,
students, academicians, government officials, and industry
professionals.
Each consumer now has the power to be a journalist, reviewer, and
whistle blower. The prevalence of social media has made it possible
to alter a brand's reputation with a single viral post, or spark a
political movement with a hashtag. This new landscape requires a
strategic plasticity and careful consideration of how the public
will react to an organization's actions. Participation in social
media is mandatory for a brand's success in this highly competitive
online era. Managing Public Relations and Brand Image through
Social Media provides the latest research and theoretical framework
necessary to find ease in the shifting public relations and
reputation management worlds. It provides an overview of the tools
and skills necessary to deftly sidestep public affronts and to
effectively use online outlets to enhance an organization's
visibility and reputation. This publication targets policy makers,
website developers, students and educators of public relations, PR
and advertising professionals, and organizations who wish to better
understand the effects of social media.
New digital technologies have fostered much debate about the nature
of social relationships, institutions and structures in a new
information age. An amorphous and interdisciplinary field of
research has emerged, concerning itself with the complexities and
contradictions involved in the fundamental shifts and radical
transformations which information and communication technologies
(ICTs) are purportedly bringing about across cultural, political
and economic practices. From cyberselves to cyber communities, from
media wars to the digital divide, sociology confronts a new digital
landscape. This text takes stock of how the discipline has
addressed the challenge of the digital providing a uniquely
sociological framework with which to critically re-evaluate
fundamental social concerns: from digital intimacies and online
relationships to new forms of mediated inequality and network
structures, from digitally mediated media practices to education
and health 2.0, this text provides a comprehensive introduction to
the transformations wrought by digital technologies to contemporary
societies and a critical reflection on how the digital is
reconfiguring the tools, concepts and precepts of the discipline.
Social networks and online communities are reshaping the way
people communicate, both in their personal and professional lives.
What makes some succeed and others fail? What draws a user in? What
makes them join? What keeps them coming back? Entrepreneurs and
businesses are turning to user experience practitioners to figure
this out. Though they are well-equipped to evaluate and create a
variety of interfaces, social networks require a different set of
design principles and ways of thinking about the user in order to
be successful.
Design to Thrive presents tried and tested design methodologies,
based on the author s decades of research, to ensure successful and
sustainable online communities -- whether a wiki for employees to
share procedures and best practices or for the next Facebook. The
book describes four criteria, called"RIBS," which are necessary to
the design of a successful and sustainable online community. These
concepts provide designers with the tools they need to generate
informed creative and productive design ideas, to think proactively
about the communities they are building or maintaining, and to
design communities that encourage users to actively
contribute.
Provides essential tools to create thriving social networks,
helping designers to avoid common pitfalls, avoid costly mistakes,
and to ensure that communities meet client needs
Contains real world stories from popular, well known communities
to illustrate how the concepts work
Features a companion online network that employs the techniques
outlined in the book "
The prominence of social media, especially in the lives of
teenagers and young adults, has long been regarded as a significant
distraction from studies. However, the integration of these forms
of media into the teaching experience can improve the engagement of
students. Global Perspectives on Social Media in Tertiary Learning
and Teaching: Emerging Research and Opportunities is an essential
scholarly publication that embeds innovative, current pedagogical
practices into new and redeveloped courses and introduces digital
and online learning tools to best support teaching practices.
Featuring coverage on a wide range of topics including
collaborative learning, innovative learning environments, and
blended teaching, this book provides essential research for
educators, educational administrators, education stakeholders,
academicians, researchers, and professionals within the realm of
higher education.
This volume focuses on the responsibilities of online service
providers (OSPs) in contemporary societies. It examines the
complexity and global dimensions of the rapidly evolving and
serious challenges posed by the exponential development of Internet
services and resources. It looks at the major actors - such as
Facebook, Google, Twitter, and Yahoo! - and their significant
influence on the informational environment and users' interactions
within it, as well as the responsibilities and liabilities such
influence entails. It discusses the position of OSPs as information
gatekeepers and how they have gone from offering connecting and
information-sharing services to paying members to providing open,
free infrastructure and applications that facilitate digital
expression and the communication of information. The book seeks
consensus on the principles that should shape OSPs'
responsibilities and practices, taking into account business ethics
and policies. Finally, it discusses the rights of users and
international regulations that are in place or currently lacking.
In Intersectional Tech: Black Users in Digital Gaming, Kishonna L.
Gray interrogates blackness in gaming at the intersections of race,
gender, sexuality, and (dis)ability. Situating her argument within
the context of the concurrent, seemingly unrelated events of
Gamergate and the Black Lives Matter movement, Gray highlights the
inescapable chains that bind marginalized populations to
stereotypical frames and limited narratives in video games.
Intersectional Tech explores the ways that the multiple identities
of black gamers some obvious within the context of games, some more
easily concealed affect their experiences of gaming. The
normalization of whiteness and masculinity in digital culture
inevitably leads to isolation, exclusion, and punishment of
marginalized people. Yet, Gray argues, we must also examine the
individual struggles of prejudice, discrimination, and
microaggressions within larger institutional practices that sustain
the oppression. These ""new"" racisms and a complementary
colorblind ideology are a kind of digital Jim Crow, a new mode of
the same strategies of oppression that have targeted black
communities throughout American history. Drawing on extensive
interviews that engage critically with identity development and
justice issues in gaming, Gray explores the capacity for gaming
culture to foster critical consciousness, aid in participatory
democracy, and effect social change. Intersectional Tech is rooted
in concrete situations of marginalized members within gaming
culture. It reveals that despite the truths articulated by those
who expose the sexism, racism, misogyny, and homophobia that are
commonplace within gaming communities, hegemonic narratives
continue to be privileged. This text, in contrast, centers the
perspectives that are often ignored and provides a critical
corrective to notions of gaming as a predominantly white and male
space.
In 1967, Justice John Marshall Harlan introduced the litmus test of
'a reasonable expectation of privacy' in his concurring opinion in
the US Supreme Court case of Katz v. United States. Privacy,
regulations to protect privacy, and data protection have been legal
and social issues in many Western countries for a number of
decades. However, recent measures to combat terrorism, to fight
crime, and to increase security, together with the growing social
acceptance of privacy-invasive technologies can be considered a
serious threat to the fundamental right to privacy. What is the
purport of 'reasonable expectations of privacy'? Reasonable
expectations of privacy and the reality of data protection is the
title of a research project being carried out by TILT, the Tilburg
Institute for Law, Technology, and Society at Tilburg University,
The Netherlands. The project is aimed at developing an
international research network of privacy experts (professionals,
academics, policymakers) and to carry out research on the practice,
meaning, and legal performance of privacy and data protection in an
international perspective. Part of the research project was to
analyse the concept of privacy and the reality of data protection
in case law, with video surveillance and workplace privacy as two
focal points. The eleven country reports regarding case law on
video surveillance and workplace privacy are the core of the
present book. The conclusions drawn by the editors are intended to
trigger and stimulate an international debate on the use and
possible drawbacks of the 'reasonable expectations of privacy'
concept. The editors are all affiliated to TILT - Tilburg Institute
for Law, Technology, and Society, Tilburg University, The
Netherlands. This is Volume 7 in the Information Technology and Law
(IT&Law) Series
Patent laws are different in many countries, and inventors are
sometimes at a loss to understand which basic requirements should
be satisfied if an invention is to be granted a patent. This is
particularly true for inventions implemented on a computer. While
roughly a third of all applications (and granted patents) relate,
in one way or another, to a computer, applications where the
innovation mainly resides in software or in a business method are
treated differently by the major patent offices in the US (USPTO),
Japan (JPO), and Europe (EPO).
The authors start with a thorough introduction into patent laws
and practices, as well as in related intellectual property rights,
which also explains the procedures at the USPTO, JPO and EPO and,
in particular, the peculiarities in the treatment of applications
centering on software or computers. Based on this theoretical
description, next they present in a very structured way a huge set
of case studies from different areas like business methods,
databases, graphical user interfaces, digital rights management,
and many more. Each set starts with a rather short description and
claim of the "invention," then explains the arguments a legal
examiner will probably have, and eventually refines the description
step by step, until all the reservations are resolved. All of these
case studies are based on real-world examples, and will thus give
an inexperienced developer an idea about the required level of
detail and description he will have to provide.
Together, Closa, Gardiner, Giemsa and Machek have more than 70
years experience in the patent business. With their academic
background in physics, electronic engineering, and computer
science, they know about both the legal and the subject-based
subtleties of computer-based inventions. With this book, they
provide a guide to a patent examiner's way of thinking in a clear
and systematic manner, helping to prepare the first steps towards a
successful patent application.
Information technology for intellectual property protection has
become an increasingly important issue due to the expansion of
ubiquitous network connectivity, which allows people to use digital
content and programs that are susceptible to unauthorized electric
duplication or copyright and patent infringement. Information
Technology for Intellectual Property Protection: Interdisciplinary
Advancements contains multidisciplinary knowledge and analysis by
leading researchers and practitioners with technical backgrounds in
information engineering and institutional experience in
intellectual property practice. Through its discussions of both
engineering solutions and the social impact of institutional
protection, this book fills a gap in the existing literature and
provides methods and applications for both practitioners and IT
engineers.
This book explains aspects of social networks, varying from
development and application of new artificial intelligence and
computational intelligence techniques for social networks to
understanding the impact of social networks. Chapters 1 and 2 deal
with the basic strategies towards social networks such as mining
text from such networks and applying social network metrics using a
hybrid approach; Chaps. 3 to 8 focus on the prime research areas in
social networks: community detection, influence maximization and
opinion mining. Chapter 9 to 13 concentrate on studying the impact
and use of social networks in society, primarily in education,
commerce, and crowd sourcing. The contributions provide a
multidimensional approach, and the book will serve graduate
students and researchers as a reference in computer science,
electronics engineering, communications, and information
technology.
Sometimes real life is stranger than fiction. That certainly is the
case when considering the things that happen to Khaya Dlanga
in the course of his everyday life. Khaya often shares these
stories in brief via Instagram or his other social media
platforms. He is finally succumbing to the pressure from the
many people who read his posts and want more details, and is
telling all of these stories and more in These Things Really Do
Happen To Me.
Always entertaining, and often containing astute
observations regarding various social practices and situations,
Khaya tells wide-ranging stories – his lunch with William
Shatner; how he fell asleep next to President Thabo Mbeki; how
he got hit on by a deaf girl; how his dreadlocks didn’t get the
expected reaction from his mom; the greatest pick-up line ever
used on him; awkward encounters with exes; what happens
when you parallel park in Parkhurst; and what he has learnt in
the course of his eventful life – that are guaranteed to entertain
and enlighten readers.
Social Media in the Digital Age: History, Ethics, and Professional
Uses details how the growth and development of social media has
influenced how people interact with one another, receive news, and
form social bonds. Part I of the book focuses on the history and
study of social media, addressing the rise of social media,
theories used to study social media, the widespread impacts of
user-generated content, and more. Part II examines the legal and
ethical implications of social media with chapters covering the
legalities of social and digital media use, user policies, and
image and brand management. Part III addresses the professional
uses of social media within the disciplines of public relations,
advertising, marketing, journalism, mass media, nonprofit work, and
U.S. politics, as well as the role of social media in national and
global movements. The second edition features new content on fake
news, disinformation, conspiracy theories, bots and trolls, social
media influencers, the growth of Instagram and TikTok, the
Communications Decency Act, podcasts, and the confluence of social
media and the 2020 United States presidential election. Social
Media in the Digital Age is ideal for undergraduate courses in mass
communication, broadcasting, history, and popular culture. It is
also a valuable resource for communication professionals.
In the information society, technology has become ubiquitous, but
its intrinsic vulnerabilities and the complexity of managing
mission-critical systems create an attractive target for potential
attackers. Law, Policy, and Technology: Cyberterorrism, Information
Warfare, and Internet Immobilization provides relevant frameworks
and best practices as well as current empirical research findings
in the area. It is aimed at professionals who want to improve their
understanding of the impact of cyber-attacks on critical
infrastructures and other information systems essential to the
smooth running of society, how such attacks are carried out, what
measures should be taken to mitigate their impact and what lessons
can be learned from the attacks and simulations of the last few
years.
|
|