![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.
Calls to improve undergraduate STEM education have resulted in initiatives that seek to bolster student learning outcomes by promoting changes in teaching practices. Written by participants in a series of ground-breaking social network analysis (SNA) workshops, Researching and Enacting Change in Postsecondary Education argues that the academic department is a highly productive focus for the spread of new, network-based teaching ideas. By clarifying methodological issues related to SNA data collection and articulating relevant theoretical approaches to the topic, this book leverages current knowledge about social network theory and SNA techniques for understanding instructional improvement in higher education.
Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.
We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.
Recent years have seen digital advertising grow to the point where it will soon overtake television as the no. 1 advertising medium. In the online environment, consumers interact and share their thoughts on brands and their experiences using them. These electronic word-of-mouth (eWOM) communications have become a very important to the success of products. In today's cluttered environment, it is especially important to study how the practice of eWOM advertising operates, and how marketers can influence eWOM in social media and other online sites. This volume starts with a chapter on the current state of knowledge on eWOM and then turns its attention to current research articles on a variety of eWOM formats. These include the posting of selfies on social media, the influence of review types on consumer perception and purchase intention, the effects of preannouncement messages, and how user-generated content can be used to induce effectiveness of eWOM on social media. The relationship of eWOM to brand building is emphasized in several of the chapters. This book was originally published as a special issue of the International Journal of Advertising.
"Bullying in the Internet Age: The State of Cyberbullying among Teens in Turkey" specifically addresses cyberbullying as an issue to be discussed in the field of media and communication for uses and literacy. Cyberbullying has become and is still a fragile problem with the enhancement of contemporary technologies. To determine why young individuals are engaged in these behaviors is in its infancy because of ever-changing technology uses in Turkey, and its theoretical underpinnings are still researched. To put a finer point on these experiences turning into cyberbullying acts is in need of knowing the social media uses of young individuals, addressing a necessity in defining what cyberbullying is within Turkey's context, and examining the types of cyberbullying which young individuals are confronted with in detail.
Balkan Cinema is a result of a common cultural space shared by different nations. While operating under a blanket and negative perspective on the region, Balkan filmmakers produced diverse yet comparable narratives creatively responding to their situation. Featuring selected and edited presentations from the Third International Conference on Balkan Cinema 8-10 May 2018 in Bucharest, this volume features how films entangled these issues including wars, national identity, myths, travels, and cultural exchanges. While we share a common Balkan heritage and celebrate peace and coexistence, we are also aware of the fact that our stories are written amidst and through multiple conflicts and wars. The wars and the peace, regardless of when and how they are happening, are ours to share.
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.
Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.
Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.
The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.
This book facilitates a systematic comprehension of internal workings of corporate governance in practice. Facets of this multidisciplinary, constantly evolving field are discussed and interrelationships among them are explained to provide insights on how certain precepts come into play for various roles in governance. This book pragmatically explains and illustrates with a view to integrate. To keep the scope achievable, the emphasis is placed on the U.S.-based companies; where possible, differences in governance around the world are identified. Three rich sources of knowledge help shape the message of this book: existing paradigms, personal experience in governance, and research on issues and challenges of governance. Features: Permits a holistic view of the complex corporate governance landscape. Discusses and generously illustrates the practice of corporate governance. Aids understanding of issues and challenges of corporate governance. Identifies ways to advance the value of one's role in corporate governance. Teaches how to avoid crucial mistakes that compromise the value of one's contribution in the governance process. If you are a professional accountant, securities lawyer, economist, financial analyst, auditor, executive, entrepreneur, or an investor, you will find the book helpful in understanding the entire landscape of governance fairly quickly. Those already involved in the governance arena may find the book refreshing, and may use it to coach others. This book can serve as a reference book in any offering of a course at any academic level.
This work is an assessment of how to manage risk in property transactions in the context of the move from paper-based to electronic conveyancing (eConveyancing). In particular the focus is on risks that impact on title registration, and the security, protection or lack thereof that this registration offers to land owners, third parties and property claimants. The impact is the extent to which a change in the transactional process may unintentionally affect risk (being the consequence of change and the likelihood of that consequence having a negative effect). The risks are identified, analysed and evaluated against the backdrop of title registration and the development of eConveyancing through a comparative analysis of the systems in Ireland and Ontario, while also referencing other developing electronic systems around the globe.
The U.S., and countries around the globe, are facing an ever-evolving series of health issues, including obesity, food deserts, child hunger, poor maternal health outcomes, and the resurgence of communicable diseases. Traditionally, health communicators and marketers have talked about these issues in a vacuum, in which related information is only visible when people are specifically seeking it out. If we are to give global health the attention it deserves, we need to weave it into our everyday conversations and experiences. Ultimately, we need to normalize the conversation around health. The emergence of everyday online opinion leaders has created a whole new market for shifting consumer perceptions and behaviors. In fact, many of these everyday online opinion leaders, called influencers, have built such large-scale social media presences that they now have the voice, the platform, and the following to reach millions of people with personal points of view on any number of topics. There are great opportunities for engaging with online influencers to support health promotion programs. However, navigating this online community is new to many people. Understanding how this online community works, the opportunities for paid and unpaid engagements, and the value that health programs specifically have with this community, is paramount to successfully working with influencers. This book draws from research with over 400 online influencers, the latest industry data, and practical, real-world experiences working with influencers over the past ten years. An easy-to-read guidebook for marketers and health communicators alike, this book leverages storytelling as a means for sharing lessons-learned and providing readers with practical knowledge about the online marketing industry and influencer community, as they relate to health.
There have been significant changes in the last decade in the fields of education and marketing. Both have been transformed by technology and globalization. Attention spans have been shortened due to accelerated delivery of entertainment. A new global cyber culture has emerged. Social networking sites have changed the way we get information. The web and mobile apps have emerged as major players in both education and marketing. Prominent educator Dr. Sabra Brock has examined the foundations of these transformations and written about emerging trends in marketing and post-secondary education. This book is a collection of pieces she has authored and co-authored. These articles may provide insights for educators and educational administrators, as well as business practitioners, especially marketers.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.
Communication defines political representation. At the core of the representational relationship lies the interaction between principal and agent; the quality of this relationship is predicated upon the accessibility of effective channels of communication between the constituent and representative. Over the past decade, congressional websites have become the primary way constituents communicate with their members and a prominent place for members to communicate with constituents. Yet, as we move toward the third decade of the 21st century, little work has systematically analyzed this forum as a distinct representational space. In this book, Jocelyn Evans and Jessica Hayden offer a fresh, timely, and mixed-methods approach for understanding how the emergence of virtual offices has changed the representational relationship between constituents and members of Congress. Utilizing strong theoretical foundations, a broad historical perspective, elite interviews, and rich original datasets, Evans and Hayden present evidence that virtual offices operate as a distinct representational space, and they demonstrate that their use has resulted in unprecedented and ill-understood changes in representational behavior. Congressional Communication in the Digital Age contributes to the scholarship on representation theory and its application to the contemporary Congress. It is valuable reading for students and researchers interested in American politics, political communication, and legislative politics.
This collection is the first of its kind on the topic of media development. It brings together luminary thinkers in the field-both researchers and practitioners-to reflect on how advocacy groups, researchers, the international community and others can work to ensure that media can continue to serve as a force of democracy and development. But that mission faces considerable challenges. Media development paradigms are still too frequently associated with Western prejudices, or out of touch with the digital age. As we move past Western blueprints and into an uncertain digital future, what does media development mean? If we are to act meaningfully to shape the future of our increasingly mediated societies, we must answer this question.
This collection is the first of its kind on the topic of media development. It brings together luminary thinkers in the field-both researchers and practitioners-to reflect on how advocacy groups, researchers, the international community and others can work to ensure that media can continue to serve as a force of democracy and development. But that mission faces considerable challenges. Media development paradigms are still too frequently associated with Western prejudices, or out of touch with the digital age. As we move past Western blueprints and into an uncertain digital future, what does media development mean? If we are to act meaningfully to shape the future of our increasingly mediated societies, we must answer this question.
This volume offers unique insights into the mutually constitutive nature of social media practices and religious change. Part 1 examines how social media operate in conjunction with mass media in the construction of discourses of religion and spirituality. It includes: a longitudinal study of British news media coverage of Christianity, secularism and religious diversity (Knott et al.); an analysis of responses to two documentaries 'The Monastery' and 'The Convent' (Thomas); an evaluation of theories of the sacred in studies of religion and media within the 'strong program' in cultural sociology in the US (Lynch); and a study of the consequences of mass and social media synergies for public perceptions of Islam in the Netherlands (Herbert). Part 2 examines the role of social media in the construction of contemporary martyrs and media celebrities (e.g., Michael Jackson) using mixed and mobile methods to analyse fan sites (Bennett & Campbell) and jihadi websites and YouTube (Nauta). Part 3 examines how certain bounded religious communities negotiate the challenges of social media: Judaism in Second Life (Abrams & Baker); Bah'ai regulation of web use among members (Campbell & Fulton); YouTube evangelists (Pihlaja); and public expressions of bereavement (Greenhill & Fletcher). The book provides theoretically informed empirical case studies and presents an intriguing, complex picture of the aesthetic and ethical, demographic and discursive aspects of new spaces of communication and their implications for religious institutions, beliefs and practices.
The Social Media Journalist Handbook teaches readers how to be a real-world social media journalist, tracing the evolution of the field to its current-day practice. This book establishes social media journalism as the latest and one of the most effective ways to practice journalism in the 21st century. It features insights from top recruiters, editors, and senior producers working in the field, as well exercises that aid readers in developing the practical skills necessary to work successfully with social media. Readers will come away from the book with the knowledge to build strong social media strategies across different budgets, employing evergreen principles that work for different, ever-changing platforms. They'll learn how to reach and engage with the maximum number of people, as well as find sources, raise one's profile, conduct research, and produce stories.
Social Networks and the Semantic Web offers valuable information to practitioners developing social-semantic software for the Web. It provides two major case studies. The first case study shows the possibilities of tracking a research community over the Web. It reveals how social network mining from the web plays an important role for obtaining large scale, dynamic network data beyond the possibilities of survey methods. The second case study highlights the role of the social context in user-generated classifications in content, such as the tagging systems known as folksonomies.
Examining Internet culture in the People's Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally. |
You may like...
Geometry and Statistics, Volume 46
Frank Nielsen, Arni S.R. Srinivasa Rao, …
Hardcover
R6,194
Discovery Miles 61 940
A Manifesto For Social Change - How To…
Moeletsi Mbeki, Nobantu Mbeki
Paperback
(4)
Southern Identity and Southern…
Ping Wang, Nicholas Williams
Hardcover
R1,631
Discovery Miles 16 310
Extremisms In Africa
Alain Tschudin, Stephen Buchanan-Clarke, …
Paperback
(1)
|