Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
This book examines how identities associated with cycling are evoked, narrated and negotiated in a media context dominated by digital environments. Arguing that the nature of identity is being impacted by the changing nature of the material and semiotic resources available for making meaning, the author introduces an approach to exploring such identity positioning through the interrelated frameworks of Systemic Functional Linguistics and Multimodal Analysis, and illustrates how this happens in practice. The book is divided into three parts, each of which focuses on a different aspect of identity and media environment. Part I considers celebrity identities in the conventional media of print and television. Part II investigates community and leisure / sporting identity through an online cycling forum, while Part III examines corporate identity realised through corporate websites, consumer reviews and Youtube channels. This unique volume will appeal to students and scholars of discourse analysis, applied linguistics and the world of cycling.
Each consumer now has the power to be a journalist, reviewer, and whistle blower. The prevalence of social media has made it possible to alter a brand's reputation with a single viral post, or spark a political movement with a hashtag. This new landscape requires a strategic plasticity and careful consideration of how the public will react to an organization's actions. Participation in social media is mandatory for a brand's success in this highly competitive online era. Managing Public Relations and Brand Image through Social Media provides the latest research and theoretical framework necessary to find ease in the shifting public relations and reputation management worlds. It provides an overview of the tools and skills necessary to deftly sidestep public affronts and to effectively use online outlets to enhance an organization's visibility and reputation. This publication targets policy makers, website developers, students and educators of public relations, PR and advertising professionals, and organizations who wish to better understand the effects of social media.
The prominence of social media, especially in the lives of teenagers and young adults, has long been regarded as a significant distraction from studies. However, the integration of these forms of media into the teaching experience can improve the engagement of students. Global Perspectives on Social Media in Tertiary Learning and Teaching: Emerging Research and Opportunities is an essential scholarly publication that embeds innovative, current pedagogical practices into new and redeveloped courses and introduces digital and online learning tools to best support teaching practices. Featuring coverage on a wide range of topics including collaborative learning, innovative learning environments, and blended teaching, this book provides essential research for educators, educational administrators, education stakeholders, academicians, researchers, and professionals within the realm of higher education.
Twitter has become a household name, discussed both for its role in prominent national elections, natural disasters, and political movements, as well as for what some malign as narcissistic "chatter." This book takes a critical step back from popular discourse and media coverage of Twitter, to present the first balanced, scholarly engagement of this popular medium. In this timely and comprehensive introduction, Murthy not only discusses Twitter's role in our political, economic, and social lives, but also draws a historical line between the telegraph and Twitter to reflect on changes in social communication over time. The book thoughtfully examines Twitter as an emergent global communications medium and provides a theoretical framework for students, scholars, and tweeters to reflect critically on the impact of Twitter and the contemporary media environment. The book uses case studies including citizen journalism, health, and national disasters to provide empirically rich insights and to help decipher some of the ways in which Twitter and social media more broadly may be shaping contemporary life.
This volume focuses on the responsibilities of online service providers (OSPs) in contemporary societies. It examines the complexity and global dimensions of the rapidly evolving and serious challenges posed by the exponential development of Internet services and resources. It looks at the major actors - such as Facebook, Google, Twitter, and Yahoo! - and their significant influence on the informational environment and users' interactions within it, as well as the responsibilities and liabilities such influence entails. It discusses the position of OSPs as information gatekeepers and how they have gone from offering connecting and information-sharing services to paying members to providing open, free infrastructure and applications that facilitate digital expression and the communication of information. The book seeks consensus on the principles that should shape OSPs' responsibilities and practices, taking into account business ethics and policies. Finally, it discusses the rights of users and international regulations that are in place or currently lacking.
In 1967, Justice John Marshall Harlan introduced the litmus test of 'a reasonable expectation of privacy' in his concurring opinion in the US Supreme Court case of Katz v. United States. Privacy, regulations to protect privacy, and data protection have been legal and social issues in many Western countries for a number of decades. However, recent measures to combat terrorism, to fight crime, and to increase security, together with the growing social acceptance of privacy-invasive technologies can be considered a serious threat to the fundamental right to privacy. What is the purport of 'reasonable expectations of privacy'? Reasonable expectations of privacy and the reality of data protection is the title of a research project being carried out by TILT, the Tilburg Institute for Law, Technology, and Society at Tilburg University, The Netherlands. The project is aimed at developing an international research network of privacy experts (professionals, academics, policymakers) and to carry out research on the practice, meaning, and legal performance of privacy and data protection in an international perspective. Part of the research project was to analyse the concept of privacy and the reality of data protection in case law, with video surveillance and workplace privacy as two focal points. The eleven country reports regarding case law on video surveillance and workplace privacy are the core of the present book. The conclusions drawn by the editors are intended to trigger and stimulate an international debate on the use and possible drawbacks of the 'reasonable expectations of privacy' concept. The editors are all affiliated to TILT - Tilburg Institute for Law, Technology, and Society, Tilburg University, The Netherlands. This is Volume 7 in the Information Technology and Law (IT&Law) Series
Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications where the innovation mainly resides in software or in a business method are treated differently by the major patent offices in the US (USPTO), Japan (JPO), and Europe (EPO). The authors start with a thorough introduction into patent laws and practices, as well as in related intellectual property rights, which also explains the procedures at the USPTO, JPO and EPO and, in particular, the peculiarities in the treatment of applications centering on software or computers. Based on this theoretical description, next they present in a very structured way a huge set of case studies from different areas like business methods, databases, graphical user interfaces, digital rights management, and many more. Each set starts with a rather short description and claim of the "invention," then explains the arguments a legal examiner will probably have, and eventually refines the description step by step, until all the reservations are resolved. All of these case studies are based on real-world examples, and will thus give an inexperienced developer an idea about the required level of detail and description he will have to provide. Together, Closa, Gardiner, Giemsa and Machek have more than 70 years experience in the patent business. With their academic background in physics, electronic engineering, and computer science, they know about both the legal and the subject-based subtleties of computer-based inventions. With this book, they provide a guide to a patent examiner's way of thinking in a clear and systematic manner, helping to prepare the first steps towards a successful patent application.
Information technology for intellectual property protection has become an increasingly important issue due to the expansion of ubiquitous network connectivity, which allows people to use digital content and programs that are susceptible to unauthorized electric duplication or copyright and patent infringement. Information Technology for Intellectual Property Protection: Interdisciplinary Advancements contains multidisciplinary knowledge and analysis by leading researchers and practitioners with technical backgrounds in information engineering and institutional experience in intellectual property practice. Through its discussions of both engineering solutions and the social impact of institutional protection, this book fills a gap in the existing literature and provides methods and applications for both practitioners and IT engineers.
As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.
This book explains aspects of social networks, varying from development and application of new artificial intelligence and computational intelligence techniques for social networks to understanding the impact of social networks. Chapters 1 and 2 deal with the basic strategies towards social networks such as mining text from such networks and applying social network metrics using a hybrid approach; Chaps. 3 to 8 focus on the prime research areas in social networks: community detection, influence maximization and opinion mining. Chapter 9 to 13 concentrate on studying the impact and use of social networks in society, primarily in education, commerce, and crowd sourcing. The contributions provide a multidimensional approach, and the book will serve graduate students and researchers as a reference in computer science, electronics engineering, communications, and information technology.
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level. Topics Discussed: The Key Concepts of Cyber The Motivation and Utility for Covert Action Digital Power Anonymity and Attribution in Cyberspace Cyber and Conventional Operations: The Dynamics of Conflict Defining the Role of Intelligence in Cyberspace How actors decide to use cyber-a rational choice approach Cognitive Processes and Decision-Making in Cyberspace Finding meaning in the expected utility of international cyber conflict
|
You may like...
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R6,078
Discovery Miles 60 780
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R639
Discovery Miles 6 390
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
Handbook on Tourism and Social Media
Dogan Gursoy, Rahul P.S. Kaurav
Hardcover
R6,107
Discovery Miles 61 070
|