![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
In Intersectional Tech: Black Users in Digital Gaming, Kishonna L. Gray interrogates blackness in gaming at the intersections of race, gender, sexuality, and (dis)ability. Situating her argument within the context of the concurrent, seemingly unrelated events of Gamergate and the Black Lives Matter movement, Gray highlights the inescapable chains that bind marginalized populations to stereotypical frames and limited narratives in video games. Intersectional Tech explores the ways that the multiple identities of black gamers some obvious within the context of games, some more easily concealed affect their experiences of gaming. The normalization of whiteness and masculinity in digital culture inevitably leads to isolation, exclusion, and punishment of marginalized people. Yet, Gray argues, we must also examine the individual struggles of prejudice, discrimination, and microaggressions within larger institutional practices that sustain the oppression. These ""new"" racisms and a complementary colorblind ideology are a kind of digital Jim Crow, a new mode of the same strategies of oppression that have targeted black communities throughout American history. Drawing on extensive interviews that engage critically with identity development and justice issues in gaming, Gray explores the capacity for gaming culture to foster critical consciousness, aid in participatory democracy, and effect social change. Intersectional Tech is rooted in concrete situations of marginalized members within gaming culture. It reveals that despite the truths articulated by those who expose the sexism, racism, misogyny, and homophobia that are commonplace within gaming communities, hegemonic narratives continue to be privileged. This text, in contrast, centers the perspectives that are often ignored and provides a critical corrective to notions of gaming as a predominantly white and male space.
In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial and insurance services. Further, it identifies the differences in the data protection systems of EU member states and examines the development of common standards and principles of data protection that could help build a data protection model for Mercosur. Divided into four parts, the book starts out with a discussion of the evolution of the right to privacy, focusing on the last few decades, and taking into account the development of new technologies. The second part discusses the interaction between data protection and specific industries that serve as case studies: insurance, banking and credit reporting. The focus of this part is on generalization and discrimination, adverse selection and the processing of sensitive and genetic data. The third part of the book presents an analysis of the legislation of three EU Member States (France, Italy and UK). Specific elements of analysis that are compared are the concepts of personal and anonymous data, data protection principles, the role of the data protection authorities, the role of the data protection officer, data subjects' rights, the processing of sensitive data, the processing of genetic data and the experience of the case studies in processing data. The book concludes with the proposal of a model for data protection that could be adopted by Mercosur, taking into account the different levels of data protection that exist in its member states."
Explaining new and innovative methods of promoting music and products for entertainment, distance teaching, valorizing archives, and commercial and non-commercial purposes, this reference profiles new services for those connected via personal computers, mobile, and other devices, for both sighted and print-impaired customers.
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.
New digital technologies have fostered much debate about the nature of social relationships, institutions and structures in a new information age. An amorphous and interdisciplinary field of research has emerged, concerning itself with the complexities and contradictions involved in the fundamental shifts and radical transformations which information and communication technologies (ICTs) are purportedly bringing about across cultural, political and economic practices. From cyberselves to cyber communities, from media wars to the digital divide, sociology confronts a new digital landscape. This text takes stock of how the discipline has addressed the challenge of the digital providing a uniquely sociological framework with which to critically re-evaluate fundamental social concerns: from digital intimacies and online relationships to new forms of mediated inequality and network structures, from digitally mediated media practices to education and health 2.0, this text provides a comprehensive introduction to the transformations wrought by digital technologies to contemporary societies and a critical reflection on how the digital is reconfiguring the tools, concepts and precepts of the discipline.
Social networks and online communities are reshaping the way people communicate, both in their personal and professional lives. What makes some succeed and others fail? What draws a user in? What makes them join? What keeps them coming back? Entrepreneurs and businesses are turning to user experience practitioners to figure this out. Though they are well-equipped to evaluate and create a variety of interfaces, social networks require a different set of design principles and ways of thinking about the user in order to be successful. Design to Thrive presents tried and tested design methodologies,
based on the author s decades of research, to ensure successful and
sustainable online communities -- whether a wiki for employees to
share procedures and best practices or for the next Facebook. The
book describes four criteria, called"RIBS," which are necessary to
the design of a successful and sustainable online community. These
concepts provide designers with the tools they need to generate
informed creative and productive design ideas, to think proactively
about the communities they are building or maintaining, and to
design communities that encourage users to actively
contribute. Contains real world stories from popular, well known communities to illustrate how the concepts work Features a companion online network that employs the techniques outlined in the book "
The prominence of social media, especially in the lives of teenagers and young adults, has long been regarded as a significant distraction from studies. However, the integration of these forms of media into the teaching experience can improve the engagement of students. Global Perspectives on Social Media in Tertiary Learning and Teaching: Emerging Research and Opportunities is an essential scholarly publication that embeds innovative, current pedagogical practices into new and redeveloped courses and introduces digital and online learning tools to best support teaching practices. Featuring coverage on a wide range of topics including collaborative learning, innovative learning environments, and blended teaching, this book provides essential research for educators, educational administrators, education stakeholders, academicians, researchers, and professionals within the realm of higher education.
Each consumer now has the power to be a journalist, reviewer, and whistle blower. The prevalence of social media has made it possible to alter a brand's reputation with a single viral post, or spark a political movement with a hashtag. This new landscape requires a strategic plasticity and careful consideration of how the public will react to an organization's actions. Participation in social media is mandatory for a brand's success in this highly competitive online era. Managing Public Relations and Brand Image through Social Media provides the latest research and theoretical framework necessary to find ease in the shifting public relations and reputation management worlds. It provides an overview of the tools and skills necessary to deftly sidestep public affronts and to effectively use online outlets to enhance an organization's visibility and reputation. This publication targets policy makers, website developers, students and educators of public relations, PR and advertising professionals, and organizations who wish to better understand the effects of social media.
At home, work, and out in our ever-changing world, we're all just doing our best. In this modern parody, Frog and Toad are here to commiserate and lend some laughter. Full of wry humor and deep compassion for our modern vulnerabilities, the stories in Frog and Toad Are Doing Their Best perfectly capture the heartwarming authenticity of Lobel's famous amphibian friends while revealing razor-sharp truths about the world we live in today. Through Frog and Toad, we see the anxieties that are woven throughout our everyday existence, from our well-meaning but often-failed attempts at practicing self-care to our struggle to balance the gifts and burdens of technology. Toad ponders a variety of questionable schemes to pay off his credit cards, while Frog spends too much time scrolling through the newsfeed on his phone. But despite their daily frustrations and existential concerns, they know that having a friend to share life's burdens makes even the darkest days brighter. "I love children's literature, so of course I love Frog and Toad and I laughed out loud reading this spoof about the pair's new adventures." -GRETCHEN RUBIN, five time New York Times bestselling author
This volume focuses on the responsibilities of online service providers (OSPs) in contemporary societies. It examines the complexity and global dimensions of the rapidly evolving and serious challenges posed by the exponential development of Internet services and resources. It looks at the major actors - such as Facebook, Google, Twitter, and Yahoo! - and their significant influence on the informational environment and users' interactions within it, as well as the responsibilities and liabilities such influence entails. It discusses the position of OSPs as information gatekeepers and how they have gone from offering connecting and information-sharing services to paying members to providing open, free infrastructure and applications that facilitate digital expression and the communication of information. The book seeks consensus on the principles that should shape OSPs' responsibilities and practices, taking into account business ethics and policies. Finally, it discusses the rights of users and international regulations that are in place or currently lacking.
Sometimes real life is stranger than fiction. That certainly is the case when considering the things that happen to Khaya Dlanga in the course of his everyday life. Khaya often shares these stories in brief via Instagram or his other social media platforms. He is finally succumbing to the pressure from the many people who read his posts and want more details, and is telling all of these stories and more in These Things Really Do Happen To Me. Always entertaining, and often containing astute observations regarding various social practices and situations, Khaya tells wide-ranging stories – his lunch with William Shatner; how he fell asleep next to President Thabo Mbeki; how he got hit on by a deaf girl; how his dreadlocks didn’t get the expected reaction from his mom; the greatest pick-up line ever used on him; awkward encounters with exes; what happens when you parallel park in Parkhurst; and what he has learnt in the course of his eventful life – that are guaranteed to entertain and enlighten readers.
This insightful book presents a radical rethinking of the relationship between law, regulation, and technology. While in traditional legal thinking technology is neither of particular interest nor concern, this book treats modern technologies as doubly significant, both as major targets for regulation and as potential tools to be used for legal and regulatory purposes. It explores whether our institutions for engaging with new technologies are fit for purpose. Having depicted a legal landscape that includes legal rules and principles, regulatory frameworks, technical measures and technological governance, this thought-provoking book presents further exercises in rethinking. These exercises confront communities with a fundamental question about how they are to be governed-by humans using rules or by technical measures and technological management? Chapters rethink the traditional arguments relating to legality, the rule of law, legitimacy, regulatory practice, dispute resolution, crime and control, and authority and respect for law. Examining the role of lawyers and law schools in an age of governance by smart technologies, Rethinking Law, Regulation, and Technology will be a key resource for students and scholars of law and technology, digital innovation and regulation and the law.
In 1967, Justice John Marshall Harlan introduced the litmus test of 'a reasonable expectation of privacy' in his concurring opinion in the US Supreme Court case of Katz v. United States. Privacy, regulations to protect privacy, and data protection have been legal and social issues in many Western countries for a number of decades. However, recent measures to combat terrorism, to fight crime, and to increase security, together with the growing social acceptance of privacy-invasive technologies can be considered a serious threat to the fundamental right to privacy. What is the purport of 'reasonable expectations of privacy'? Reasonable expectations of privacy and the reality of data protection is the title of a research project being carried out by TILT, the Tilburg Institute for Law, Technology, and Society at Tilburg University, The Netherlands. The project is aimed at developing an international research network of privacy experts (professionals, academics, policymakers) and to carry out research on the practice, meaning, and legal performance of privacy and data protection in an international perspective. Part of the research project was to analyse the concept of privacy and the reality of data protection in case law, with video surveillance and workplace privacy as two focal points. The eleven country reports regarding case law on video surveillance and workplace privacy are the core of the present book. The conclusions drawn by the editors are intended to trigger and stimulate an international debate on the use and possible drawbacks of the 'reasonable expectations of privacy' concept. The editors are all affiliated to TILT - Tilburg Institute for Law, Technology, and Society, Tilburg University, The Netherlands. This is Volume 7 in the Information Technology and Law (IT&Law) Series
Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications where the innovation mainly resides in software or in a business method are treated differently by the major patent offices in the US (USPTO), Japan (JPO), and Europe (EPO). The authors start with a thorough introduction into patent laws and practices, as well as in related intellectual property rights, which also explains the procedures at the USPTO, JPO and EPO and, in particular, the peculiarities in the treatment of applications centering on software or computers. Based on this theoretical description, next they present in a very structured way a huge set of case studies from different areas like business methods, databases, graphical user interfaces, digital rights management, and many more. Each set starts with a rather short description and claim of the "invention," then explains the arguments a legal examiner will probably have, and eventually refines the description step by step, until all the reservations are resolved. All of these case studies are based on real-world examples, and will thus give an inexperienced developer an idea about the required level of detail and description he will have to provide. Together, Closa, Gardiner, Giemsa and Machek have more than 70 years experience in the patent business. With their academic background in physics, electronic engineering, and computer science, they know about both the legal and the subject-based subtleties of computer-based inventions. With this book, they provide a guide to a patent examiner's way of thinking in a clear and systematic manner, helping to prepare the first steps towards a successful patent application.
Information technology for intellectual property protection has become an increasingly important issue due to the expansion of ubiquitous network connectivity, which allows people to use digital content and programs that are susceptible to unauthorized electric duplication or copyright and patent infringement. Information Technology for Intellectual Property Protection: Interdisciplinary Advancements contains multidisciplinary knowledge and analysis by leading researchers and practitioners with technical backgrounds in information engineering and institutional experience in intellectual property practice. Through its discussions of both engineering solutions and the social impact of institutional protection, this book fills a gap in the existing literature and provides methods and applications for both practitioners and IT engineers.
This book explains aspects of social networks, varying from development and application of new artificial intelligence and computational intelligence techniques for social networks to understanding the impact of social networks. Chapters 1 and 2 deal with the basic strategies towards social networks such as mining text from such networks and applying social network metrics using a hybrid approach; Chaps. 3 to 8 focus on the prime research areas in social networks: community detection, influence maximization and opinion mining. Chapter 9 to 13 concentrate on studying the impact and use of social networks in society, primarily in education, commerce, and crowd sourcing. The contributions provide a multidimensional approach, and the book will serve graduate students and researchers as a reference in computer science, electronics engineering, communications, and information technology. |
You may like...
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R6,463
Discovery Miles 64 630
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R7,193
Discovery Miles 71 930
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,539
Discovery Miles 15 390
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R678
Discovery Miles 6 780
|