Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.
Calls to improve undergraduate STEM education have resulted in initiatives that seek to bolster student learning outcomes by promoting changes in teaching practices. Written by participants in a series of ground-breaking social network analysis (SNA) workshops, Researching and Enacting Change in Postsecondary Education argues that the academic department is a highly productive focus for the spread of new, network-based teaching ideas. By clarifying methodological issues related to SNA data collection and articulating relevant theoretical approaches to the topic, this book leverages current knowledge about social network theory and SNA techniques for understanding instructional improvement in higher education.
Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.
Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.
An optimistic and nuanced portrait of a generation that has much to teach us about how to live and collaborate in our digital world. Born since the mid-1990s, members of Generation Z comprise the first generation never to know the world without the internet, and the most diverse generation yet. As Gen Z starts to emerge into adulthood and enter the workforce, what do we really know about them? And what can we learn from them? Gen Z, Explained is the authoritative portrait of this significant generation. It draws on extensive interviews that display this generation's candor, surveys that explore their views and attitudes, and a vast database of their astonishingly inventive lexicon to build a comprehensive picture of their values, daily lives, and outlook. Gen Z emerges here as an extraordinarily thoughtful, promising, and perceptive generation that is sounding a warning to their elders about the world around them-a warning of a complexity and depth the "OK Boomer" phenomenon can only suggest. Much of the existing literature about Gen Z has been highly judgmental. In contrast, this book provides a deep and nuanced understanding of a generation facing a future of enormous challenges, from climate change to civil unrest. What's more, they are facing this future head-on, relying on themselves and their peers to work collaboratively to solve these problems. As Gen Z, Explained shows, this group of young people is as compassionate and imaginative as any that has come before, and understanding the way they tackle problems may enable us to envision new kinds of solutions. This portrait of Gen Z is ultimately an optimistic one, suggesting they have something to teach all of us about how to live and thrive in this digital world.
Make friends and sell things to people through social media Social media technology is restlessly inventive, providing thousands of awesome ways for you to market your business inexpensively and on a large scale--often directly into the pockets of consumers. But in the proliferating, ever-changing world of tweets, influencers, handles, and alerts, it can be hard to know where to begin and then to evaluate what's actually working for you. In the new edition of Social Media Marketing for Dummies, leading SMM voices Shiv Singh and Stephanie Diamond clear away the confusion and show you the smartest, most effective ways to plan, launch, manage, and assess your campaigns--and then iterate and optimize for increased success. Incorporating the latest trends and presented in a friendly, easily digestible step-by-step style, you'll find the ultimate blueprint for developing your best SMM strategy. In no time, you'll find out how to line up with Facebook, Twitter, Tumblr, and Google, develop a unique and compelling voice, and influence your key audience all the way to the bank. Choose the best SMM combination for you Avoid common mistakes and pitfalls Track your customers from awareness to retention Try out the latest stuff that really works Whether your organization is large or small, it simply doesn't pay to be shy. Find your voice, get social, and chat your way to attracting and keeping new customers today!
Computer software and its structures, devices and processes are woven into our everyday life. Their significance is not just technical: the algorithms, programming languages, abstractions and metadata that millions of people rely on every day have far-reaching implications for the way we understand the underlying dynamics of contemporary societies. In this innovative new book, software studies theorist Matthew Fuller examines how the introduction and expansion of computational systems into areas ranging from urban planning and state surveillance to games and voting systems are transforming our understanding of politics, culture and aesthetics in the twenty-first century. Combining historical insight and a deep understanding of the technology powering modern software systems with a powerful critical perspective, this book opens up new ways of understanding the fundamental infrastructures of contemporary life, economies, entertainment and warfare. In so doing Fuller shows that everyone must learn how to be a geek , as the seemingly opaque processes and structures of modern computer and software technology have a significance that no-one can afford to ignore. This powerful and engaging book will be of interest to everyone interested in a critical understanding of the political and cultural ramifications of digital media and computing in the modern world.
The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.
Putting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape. Technology not only disrupts the traditional idea of what it is 'to think like a lawyer,' as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules - thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in shaping both legal doctrine and our regulatory thinking. This is a book for those studying, or about to study, law - as well as others with interests in the legal, political, and social impact of technology.
This book facilitates a systematic comprehension of internal workings of corporate governance in practice. Facets of this multidisciplinary, constantly evolving field are discussed and interrelationships among them are explained to provide insights on how certain precepts come into play for various roles in governance. This book pragmatically explains and illustrates with a view to integrate. To keep the scope achievable, the emphasis is placed on the U.S.-based companies; where possible, differences in governance around the world are identified. Three rich sources of knowledge help shape the message of this book: existing paradigms, personal experience in governance, and research on issues and challenges of governance. Features: Permits a holistic view of the complex corporate governance landscape. Discusses and generously illustrates the practice of corporate governance. Aids understanding of issues and challenges of corporate governance. Identifies ways to advance the value of one's role in corporate governance. Teaches how to avoid crucial mistakes that compromise the value of one's contribution in the governance process. If you are a professional accountant, securities lawyer, economist, financial analyst, auditor, executive, entrepreneur, or an investor, you will find the book helpful in understanding the entire landscape of governance fairly quickly. Those already involved in the governance arena may find the book refreshing, and may use it to coach others. This book can serve as a reference book in any offering of a course at any academic level.
Born since the mid-1990s, Generation Z is the first generation never to know the world without the internet, and it is the most diverse generation yet. As Gen Z starts to emerge into adulthood and enter the workforce, what do we really know about them? And what can we learn from them? Gen Z, Explained is the authoritative portrait of this significant generation. It draws on extensive interviews that display this generation's candor, surveys that explore their views and attitudes, and a vast database of their astonishingly inventive lexicon to build a comprehensive picture of their values, daily lives, and outlook. Gen Z emerges here as an extraordinarily thoughtful, promising, and perceptive generation-one that is sounding a warning to their elders about the world around them of a complexity and depth the "OK, Boomer" phenomenon could only suggest. Much of the existing literature about Gen Z has been highly judgmental. In contrast, this book provides a deep and nuanced understanding of a generation facing a future of enormous challenges, from climate change to civil unrest. What's more, they are facing this future head-on, relying on themselves and their peers to work collaboratively to solve these problems. As Gen Z, Explained shows, this group of young people is as compassionate and imaginative as any that has come before, and understanding the way they tackle issues may enable us to envision new kinds of solutions. This portrait of Gen Z is ultimately an optimistic one, suggesting they have something to teach all of us about how to live and thrive in this digital world.
This book highlights the multiple ways that digital technologies are being used in everyday contexts at home and school, in communities, and across diverse activities, from play to web searching, to talking to family members who are far away. The book helps readers understand the diverse practices employed as children make connections with digital technologies in their everyday experiences. In addition, the book employs a framework that helps readers easily access major themes at a glance, and also showcases the diversity of ideas and theorisations that underpin the respective chapters. In this way, each chapter stands alone in making a specific contribution and, at the same time, makes explicit its connections to the broader themes of digital technologies in children's everyday lives. The concept of digital childhood presented here goes beyond a sociological reading of the everyday lives of children and their families, and reflects the various contexts in which children engage, such as preschools and childcare centres.
accessible for readers unfamiliar with both SDGs and ESG concepts; it will enable leaders and businesses to assess deployment and development of AI more easily
This book investigates how various scientific communities - e.g. legal scientists, political scientists, sociologists, mathematicians, and computer scientists - study law and public policies, which are portrayed here as complex systems. Today, research on law and public policies is rapidly developing at the international level, relying heavily on modeling that employs innovative methods for concrete implementation. Among the subject matter discussed, law as a network of evolving and interactive norms is now a prominent sphere of study. Similarly, public policies are now a topic in their own right, as policy can no longer be examined as a linear process; rather, its study should reflect the complexity of the networks of actors, norms and resources involved, as well as the uncertainty or weak predictability of their direct or indirect impacts. The book is divided into three maain parts: complexity faced by jurists, complexity in action and public policies, and complexity and networks. The main themes examined concern codification, governance, climate change, normative networks, health, water management, use-related conflicts, legal regime conflicts, and the use of indicators.
A 2021 'BOOK TO LOOK OUT FOR' - THE INDEPENDENT 'A mouthpiece for our anxieties and a tonic for our hearts.' Charly Cox 'Funny and honest.' Pandora Sykes 'Offers readers of all stripes and ages a great overview of relationships in the digital era'. Matt Haig Have you ever been ghosted? Found yourself stalking your partner's ex for days on Instagram? Spent hours swiping right (or left) to no avail? Yep, us too. Finding love today is overwhelming. Thanks to apps, social media, and even reality TV, the way we date is constantly changing. But how is it possible that, despite having so much technology designed to aid connection, it feels harder to meet someone now than ever before? In Millennial Love, journalist Olivia Petter expertly investigates this question, providing a reassuring and relatable exploration of modern dating.
This ground-breaking and timely book explores how big data, artificial intelligence and algorithms are creating new types of agency, and the impact that this is having on our lives and the rule of law. Addressing the issues in a thoughtful, cross-disciplinary manner, the authors examine the ways in which data-driven agency is transforming democratic practices and the meaning of individual choice. Leading scholars in law, philosophy, computer science and politics analyse the latest innovations in data science and machine learning, assessing the actual and potential implications of these technologies. They investigate how this affects our understanding of such concepts as agency, epistemology, justice, transparency and democracy, and advocate a precautionary approach that takes the effects of data-driven agency seriously without taking it for granted. Scholars and students of law, ethics and philosophy, in particular legal, political and democratic theory, will find this book a compelling and invaluable read, as will computer scientists interested in the implications of their own work. It will also prove insightful for academics and activists working on privacy, fairness and anti-discrimination. Contributors include: J.E. Cohen, G. de Vries, S. Delacroix, P. Dumouchel, C. Ess, M. Garnett, E.H. Gerding, R. Gomer, C. Graber, M. Hildebrandt, C. Maple, K. O'Hara, P. Ohm, m.c. schraefel, D. Stevens, N. van Dijk, M. Veale
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.
Entertain Me! features the most popular influencers and celebrities from Schoen! magazine, a biannual English language publication and online platform with a cutting-edge aesthetic. This book presents a visual explosion of talent in film, music, TV, fashion and art from its debut as an online forum in 2009 to 2020. Stunning photographs from the worlds of culture, fashion, and beauty showcase the biggest names and rising stars who entertain and lead the world in high-octane creativity. It will appeal to the visionary, the collector, and the fashion-conscious, and is intended not only for the magazine's established and loyal readership, but also for a broader demographic of readers around the globe who monitor the pulse of the latest in creative talent.
The Social Media Journalist Handbook teaches readers how to be a real-world social media journalist, tracing the evolution of the field to its current-day practice. This book establishes social media journalism as the latest and one of the most effective ways to practice journalism in the 21st century. It features insights from top recruiters, editors, and senior producers working in the field, as well exercises that aid readers in developing the practical skills necessary to work successfully with social media. Readers will come away from the book with the knowledge to build strong social media strategies across different budgets, employing evergreen principles that work for different, ever-changing platforms. They'll learn how to reach and engage with the maximum number of people, as well as find sources, raise one's profile, conduct research, and produce stories.
Examining Internet culture in the People's Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
The bestselling PC reference on the planet now available in its 13th edition Completely updated to cover the latest technology and software, the 13th edition of PCs For Dummies tackles using a computer in friendly, human terms. Focusing on the needs of the beginning computer user, while also targeting those who are familiar with PCs, but need to get up to speed on the latest version of Windows. This hands-on guide takes the dread out of working with a personal computer. Leaving painful jargon and confusing terminology behind, it covers Windows 10 OS, connecting to and using services and data in the cloud, and so much more. Written by Dan Gookin, the original For Dummies author, it tells you how to make a PC purchase, what to look for in a new PC, how to work with the latest operating system, ways to protect your files, what you can do online, media management tips, and even basic topics you're probably too shy to ask a friend about. * Determine what you need in a PC and how to set it up * Configure your PC, hook up a printer, and connect to the Internet * Find your way around Windows 10 OS with ease and confidence * Play movies and music, view photos, and explore social media If you're a first-time PC user at home or at work or just need to brush up on the latest technological advancements, the new edition of this bestselling guide gets you up and running fast. |
You may like...
Legal Challenges of Big Data
Joe Cannataci, Valeria Falce, …
Hardcover
R3,655
Discovery Miles 36 550
Handbook on Tourism and Social Media
Dogan Gursoy, Rahul P.S. Kaurav
Hardcover
R6,386
Discovery Miles 63 860
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,151
Discovery Miles 31 510
|