0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (118)
  • R250 - R500 (426)
  • R500+ (1,346)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Paperback): Michael Anthony C. Dizon A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Paperback)
Michael Anthony C. Dizon
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.

Psychoanalysis and Digital Culture - Audiences, Social Media, and Big Data (Hardcover): Jacob Johanssen Psychoanalysis and Digital Culture - Audiences, Social Media, and Big Data (Hardcover)
Jacob Johanssen
R4,486 Discovery Miles 44 860 Ships in 10 - 15 working days

Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.

Law, Technology and Dispute Resolution - The Privatisation of Coercion (Hardcover): Riikka Koulu Law, Technology and Dispute Resolution - The Privatisation of Coercion (Hardcover)
Riikka Koulu
R4,490 Discovery Miles 44 900 Ships in 10 - 15 working days

The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely undiscussed. In this book, assistant professor of law and digitalisation Riikka Koulu examines the multifaceted phenomenon of dispute resolution technology, focusing specifically on private enforcement, which modern technology enables on an unforeseen scale. The increase in private enforcement confounds legal structures and challenges the nation-state's monopoly on violence. And, in this respect, the author argues that the technology-driven privatisation of enforcement - from direct enforcement of e-commerce platforms to self-executing smart contracts in the blockchain - brings the ethics of law's coercive nature out into the open. This development constitutes a new, and dangerous, grey area of conflict management, which calls for transparency and public debate on the ethical implications of dispute resolution technology.

ICT for Dialogue and Inclusive Decision-Making (Hardcover, New edition): Anna Przybylska ICT for Dialogue and Inclusive Decision-Making (Hardcover, New edition)
Anna Przybylska
R1,138 Discovery Miles 11 380 Ships in 10 - 15 working days

Public consultations are a weak but institutionally embedded form of civic participation in political decision-making. Their input and output are often a cause for concern. This has motivated the authors to design the inDialogue platform to help transmit knowledge about the methodology of public consultations. It follows the deliberative public consultation model, and recognizes the value of social inclusion in knowledge-sharing and argument exchange in building an open political community. In this book, researchers as well as practitioners, in their respective fields, discuss various aspects of the inDialogue software's development and implementation. They document the complexity of the work that was carried out in an applied interdisciplinary project in the area of democratic innovation. "The value of this volume is not only in its presentation of inDialogue as an innovative application enabling those with disabilities to access public debate and consultation, but also in raising important questions about the introduction of ICT for debate and consultation. These questions are answered from both the perspective of the technical and social sciences." Jerzy Bartkowski, Professor at the Institute of Sociology, Warsaw University "ICT for Dialogue and Inclusive Decision-Making is a splendid contribution to the literature concerning online deliberation and civic engagement. It usefully bridges the academic world of theory and empirical studies, and the practice of citizen deliberation, carefully documenting both the design and experiences of the In Dialogue project in Poland." Todd Davies, Associate Director and lecturer, Symbolic Systems Program, Stanford University

Multilevel Security for Relational Databases (Paperback): Osama S Faragallah, El-Sayed M.  El-Rabaie, Fathi E. Abd El-Samie,... Multilevel Security for Relational Databases (Paperback)
Osama S Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I Sallam, Hala S El-Sayed
R1,871 Discovery Miles 18 710 Ships in 10 - 15 working days

Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.

Researching and Enacting Change in Postsecondary Education - Leveraging Instructors' Social Networks (Hardcover): Charles... Researching and Enacting Change in Postsecondary Education - Leveraging Instructors' Social Networks (Hardcover)
Charles Henderson, Chris Rasmussen, Naneh Apkarian, Alexis Knaub, Alan James Daly, …
R4,485 Discovery Miles 44 850 Ships in 10 - 15 working days

Calls to improve undergraduate STEM education have resulted in initiatives that seek to bolster student learning outcomes by promoting changes in teaching practices. Written by participants in a series of ground-breaking social network analysis (SNA) workshops, Researching and Enacting Change in Postsecondary Education argues that the academic department is a highly productive focus for the spread of new, network-based teaching ideas. By clarifying methodological issues related to SNA data collection and articulating relevant theoretical approaches to the topic, this book leverages current knowledge about social network theory and SNA techniques for understanding instructional improvement in higher education.

How To Make Your Dog #Famous - A Guide to Social Media and Beyond (Paperback): Loni Edwards How To Make Your Dog #Famous - A Guide to Social Media and Beyond (Paperback)
Loni Edwards
R375 R341 Discovery Miles 3 410 Save R34 (9%) Ships in 9 - 17 working days

You know your dog is the cutest but does everyone else know it too? In this book, Loni Edwards, the human behind the world's most influential pets, breaks down the path to fame. Discover insights into the success of social media's top pups and follow the essential steps on the road to fame - from crafting your brand to advocating for your pup on set. With expert guidance on how to be a good dog parent and make sure your pup is happy and healthy every step of the way, this is your one-stop guide to helping your dog win over hearts, one adorable post at a time. Featuring the stories of more than 40 of the most successful pet influencers: 157 of Gemma, Amazing Graciedoodle, Barkley Sir Charles, Bertie Bert the Pom, Bronson the Bully, Brussels Sprout, Bully Baloo, Charlie the Black Shepherd, Chloe the Mini Frenchie (& Emma Bear), Coco the Maltese Dog (Coco & Cici), Cookie Malibu, Crusoe the Celebrity Dachshund, Daily Dougie, Dog named Stella, Ducky the Yorkie, Frame the Weim, Gone to the Snow Dogs, Harlow and Sage, Hi Wiley, Kelly Bove, Lilybug, Lizzie Bear, Louboutina the Hugging Dog, Maya Polar Bear, Mervin the Chihuahua, Milo and Noah, MJ the Beagle, Mr. Biggie, Popeye the Foodie, Puggy Smalls, Reagandoodle, Remix the Dog, Rocco Roni, Super Corgi Jojo, Super Scooty, Tatum, That Goldendoodle, The Bike Dog, Tika the Iggy, Tuna Melts my Heart, Tupey the Borzoi, Verpinscht, Winnie the Cocker, Wolfgang 2242

The Changing Face of Problematic Internet Use - An Interpersonal Approach (Paperback, New edition): Scott E Caplan The Changing Face of Problematic Internet Use - An Interpersonal Approach (Paperback, New edition)
Scott E Caplan
R1,134 Discovery Miles 11 340 Ships in 10 - 15 working days

Since the advent of the Internet and increasingly mobile devices, we have witnessed dramatic changes in computer-mediated technologies and their roles in our lives. In the late 1990s, researchers began to identify problematic forms of Internet use, such as difficulty controlling the amount of time spent online. Today, people live in a perpetually digital and permanently connected world that presents many serious types of problematic Internet use besides deficient self-regulation. Thousands of studies have been published on interpersonal problems such as cyberbullying, cyberstalking, relationship conflicts about online behavior, and the increasingly problematic use of mobile devices during in-person interactions. The Changing Face of Problematic Internet Use: An Interpersonal Approach also examines future trends, including the recent development of being constantly connected to mobile devices and social networks. Research in these areas is fraught with controversy, inconsistencies, and findings that are difficult to compare and summarize. This book offers students and researchers an organized, theory-based, synthesis of research on these problems and explains how interpersonal theory and research help us better understand the problems that online behavior plays in our personal lives and social interactions.

The Joy of Missing Out - Finding Balance in a Wired World (Paperback): Christina Crook The Joy of Missing Out - Finding Balance in a Wired World (Paperback)
Christina Crook
R415 Discovery Miles 4 150 Ships in 10 - 15 working days

There's no doubt that technology has overrun our lives. Over the past few decades, the world has embraced "progress" and we're living with the resultant clicking, beeping, anxiety-inducing frenzy. But a creative backlash is gathering steam, helping us cope with the avalanche of data that threatens to overwhelm us daily through our computers, tablets, and smartphones.

"Digital Detox" considers the technologically focused life, with its impacts on our children, relationships, communities, health, work, and more, and suggests opportunities for those of us longing to cultivate a richer on- and off-line existence. By examining the connected world through the lens of her own internet fast, Christina Crook creates a convincing case for increasing intentionality in our day-to-day lives. Using historical data, typewritten letters, chapter challenges, and personal accounts, she invites us to explore a new way of living, beyond our steady state of distracted connectedness.

Most of us can't throw away our smartphone or cut ourselves off from the internet. But we can all rethink our relationship with the digital world, discovering new ways of introducing balance and discipline to the role of technology in our lives. This book is a must-read for anyone wishing to rediscover quietness of mind and seeking a sense of peace amidst the cacophony of the modern world.

Christina Crook is a wordsmith and communications professional and instigator of the project "Letters from a Luddite," which chronicled her thirty-one day internet fast and fueled her passion for exploring the intersection of technology, relationships, and joy.

Security and Privacy in Smart Grids (Paperback): Yang Xiao Security and Privacy in Smart Grids (Paperback)
Yang Xiao
R1,822 Discovery Miles 18 220 Ships in 10 - 15 working days

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today's smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book's chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.

Managing Trust in Cyberspace (Paperback): Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Managing Trust in Cyberspace (Paperback)
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
R1,898 Discovery Miles 18 980 Ships in 10 - 15 working days

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.

Spiritual News - Reporting Religion Around the World (Paperback, New edition): Yoel Cohen Spiritual News - Reporting Religion Around the World (Paperback, New edition)
Yoel Cohen
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

The media's coverage of religion is an important question for academic researchers, given the central role which news media play in ensuring that people are up-to-date with religion news developments. Not only is there a lack of treatment of the subject in other countries, but there is also the absence of comparative study on news and religion. A key question is how the media, the political system, the religions themselves, the culture, and the economy influence how religion is reported in different countries. Spiritual News: Reporting Religion Around the World is intended to fill this gap. The book is divided into six parts: an introductory section; the newsgathering process; religion reporting in different regions; media events concerning religion; political and social change and the role of religion news; future trends.

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,807 Discovery Miles 18 070 Ships in 10 - 15 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Valuing Data - An Open Framework (Hardcover): Dewey Ray Valuing Data - An Open Framework (Hardcover)
Dewey Ray
R2,569 Discovery Miles 25 690 Ships in 10 - 15 working days

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.

Fundraising - How to Raise Money for Your Library Using Social Media (Paperback): Joyce V. Garczynski Fundraising - How to Raise Money for Your Library Using Social Media (Paperback)
Joyce V. Garczynski
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

Fundraising: How to Raise Money for Your Library Using Social Media introduces the phenomena that many members, supporters and fundraisers are not using social media to fundraise for their libraries, and may not be aware of its strengths and pitfalls. The book discusses why social media should be used to fundraise and how to successfully employ social media campaigns, also providing examples from library funding initiatives that libraries can follow. Since social media changes relatively quickly, library staff members, supporters and fundraisers need up-to-date information on how to craft messages for the platforms that they use. This book presents less on best practices for specific social media platform, focusing more on library social media fundraising strategies that have been found to be effective (for example, how libraries have successfully created fundraising campaigns with hashtags).

Videogames and Horror - From Amnesia to Zombies, Run! (Paperback): Dawn Stobbart Videogames and Horror - From Amnesia to Zombies, Run! (Paperback)
Dawn Stobbart
R1,243 R712 Discovery Miles 7 120 Save R531 (43%) Ships in 10 - 15 working days

Videogames are full of horrors - and of horror, a facet of the media that has been largely overlooked by the academic community in terms of lengthy studies in the fast-growing field of videogame scholarship. This book engages with the research of prominent scholars across the humanities to explore the presence, role and function of horror in videogames, and in doing so it demonstrates how videogames enter discussion on horror and offer a unique, radical space that horror is particularly suited to fill. The topics covered include the construction of stories in videogames, the role of the monster and, of course, how death is treated as a learning tool and as a facet of horror.

Digital Sports Journalism (Paperback): Charles Lambert Digital Sports Journalism (Paperback)
Charles Lambert
R1,239 Discovery Miles 12 390 Ships in 10 - 15 working days

Digital Sports Journalism gives detailed guidance on a range of digital practices for producing content for smartphones and websites. Each chapter discusses a skill that has become essential for sports journalists today, with student-friendly features throughout to support learning. These include case studies, examples of sports journalism from leading global publications, as well as top tips and practical exercises. The book also presents interviews with leading sport and club journalists with wide-ranging experience at the BBC, Copa90, Wimbledon Tennis, the Guardian and BT Sport, who discuss working with new technologies to cover sports stories and events. Chapters cover: live blogging; making and disseminating short videos; working for a sports club or governing body; finding and transmitting stories on social media; podcasting; longform online journalism. The job of a sports journalist has altered dramatically over the first two decades of the 21st century, with scope to write content across a new variety of digital platforms and mediums. Digital Sports Journalism will help students of journalism and professionals unlock the potential of these new media technologies.

Social Networks in China (Paperback): Xianhui Che, Barry Ip Social Networks in China (Paperback)
Xianhui Che, Barry Ip
R1,650 Discovery Miles 16 500 Ships in 10 - 15 working days

Social Networks in China provides an in-depth guide to Chinese social networks, covering behaviors, usage, key issues, and future developments. Chinese scholarship and cultural idiosyncrasies in technology remain a relatively under-researched area. While such issues may be sporadically reported in popular media, it is often difficult to obtain a true understanding of authentic Chinese behaviors and practices. One such study area delves into whether Chinese users utilize technology to socialize in the same ways as people from western societies. As no book currently exists to address issues concerning Chinese social networks, this book takes on that shortage and opportunity.

Marketing in the Digital Era (Hardcover, New edition): Zuzana Bacikova Marketing in the Digital Era (Hardcover, New edition)
Zuzana Bacikova
R1,368 Discovery Miles 13 680 Ships in 10 - 15 working days

With the digitalisation of society, marketing is experiencing a renaissance. Digital marketing has introduced a compactness absent in traditional marketing, even after the integration of the holistic marketing approach. Consumers nowadays make choices - between purchasing online and visiting a store. They pay attention to certain ads and decide to support a person or product on social media channels. This book presents the theoretical principles of digital marketing established to serve research plans, educational purposes and practical applications. It aims to support the terminological demarcation and to further the professional discussion.

Law and Technology in a Global Digital Society - Autonomous Systems, Big Data, IT Security and Legal Tech (Hardcover, 1st ed.... Law and Technology in a Global Digital Society - Autonomous Systems, Big Data, IT Security and Legal Tech (Hardcover, 1st ed. 2022)
Georg Borges, Christoph Sorge
R4,005 Discovery Miles 40 050 Ships in 10 - 15 working days

This book examines central aspects of the new technologies and the legal questions raised by them from both an international and an inter-disciplinary perspective. The technology revolution and the global networking of IT systems pose enormous challenges for the law. Current areas of discussion relate to autonomous systems, big data and issues surrounding legal tech. Ensuring data protection and IT security as well as the creation of a legal framework for the new technology as a whole can only be achieved through international and inter-disciplinary co-operation. The team of authors is made up of experienced, internationally renowned experts as well as young researchers and professionals who give valuable insights from numerous different jurisdictions. This book is written for jurists and those responsible for technology in public authorities and companies as well as practising lawyers and researchers.

Avatar, Assembled - The Social and Technical Anatomy of Digital Bodies (Paperback, New edition): Jaime Banks Avatar, Assembled - The Social and Technical Anatomy of Digital Bodies (Paperback, New edition)
Jaime Banks
R1,401 Discovery Miles 14 010 Ships in 10 - 15 working days

Avatar, Assembled is a curated volume that unpacks videogame and virtual world avatars-not as a monolithic phenomenon (as they are usually framed) but as sociotechnical assemblages, pieced together from social (human-like) features like voice and gesture to technical (machine-like) features like graphics and glitches. Each chapter accounts for the empirical, theoretical, technical, and popular understandings of these avatar "components"-60 in total-altogether offering a nuanced explication of avatars-as-assemblages as they matter in contemporary society and in individual experience. The volume is a "crossover" piece in that, while it delves into complex ideas, it is written in a way that will be accessible and interesting to students, researchers, designers, and practitioners alike.

Networked Selves - Trajectories of Blogging in the United States and France (Hardcover, New edition): Ignacio Siles Networked Selves - Trajectories of Blogging in the United States and France (Hardcover, New edition)
Ignacio Siles
R2,347 Discovery Miles 23 470 Ships in 10 - 15 working days

Networked Selves is an original analysis of one of the most defining cultural features of our time: how people turn to the Web to construct a public self. It examines the trajectory of a practice that embodies this sociocultural shift in fundamental ways: blogging. The book traces the evolution of the Web as a means to publicly perform a self through an analysis of the emergence, development, and transformation of blogging from the mid-1990s to the early years of the 2010s. It discusses processes that have shaped practices of subjectivity on the Web over two decades in two countries: the United States and France. Through this comparative analysis, the book shows that the cultural identity of blogging as a practice of subjectivity in these countries is neither inevitable nor neutral. Instead, it demonstrates that the development of the Web required the forging of various articulations between specific conceptions of self, publicness, and technology. These articulations were responses to both transformations in the daily life of actors and larger economic, political, and cultural processes-notably neoliberalization. The book also explains how the cultural imaginary around blogs came into being in the United States and how it has also functioned as a model for actors in other countries, such as France. Networked Selves discusses how and why actors in the technology field in France have gradually abandoned traditional makers of exceptionalism that were key in the development of the country's national identity and favored notions that characterize the United States instead.

A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Hardcover): Michael Anthony C. Dizon A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Hardcover)
Michael Anthony C. Dizon
R4,638 Discovery Miles 46 380 Ships in 10 - 15 working days

The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.

Beyond the Internet - Unplugging the Protest Movement Wave (Paperback): Rita Figueiras, Paula do Espirito Santo Beyond the Internet - Unplugging the Protest Movement Wave (Paperback)
Rita Figueiras, Paula do Espirito Santo
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

The western economic and financial crisis began with the collapse of Lehman Brothers in 2008 and led the European Union countries into recession. After this, governments started to implement austerity measures, such as cuts in public spending, including public subsidies and jobs, and rising prices. In this context, Europe started to experience a wave of protest movements. Individuals started to use the manifold interactive digital media environment to both fight against the austerity measures and find alternative ways of claiming their democratic rights. Inspired by the 2011 Arab Spring and the Occupy Wall Street movement in New York (USA), the Occupy LSX encampment in Central London (UK), The Outraged (Los Indignados)/ 15M encampment in Central Madrid (Spain), the Syntagma Square's Outraged movement in Athens (Greece) and the March 12th Movement in Lisbon (Portugal), although short-lived, epitomize an emerging alternative politics and participation via the media. This wave has promoted a debate on how the realm of politics is changing, as citizens broaden their ideas of what political issues and participation mean. Beyond the Internet examines the technological dimension of the recent wave of protest movements in the United Kingdom, Spain, Portugal, Greece, and Ireland. Offering an opportunity to achieve a better understanding of the dynamics between society, politics and technology, this volume questions the essentialist attributes of the Internet that fuel the techno-centric discourse. The contributors illustrate how all these protest movements were active in the social media and garnered high levels of media attention and public visibility, in spite of their failure to achieve their political goals. As intra-elite dissent was pivotal in understanding the Arab uprisings, the coalition of national ruling elites with European institutions in terms of austerity strategy is essential in understanding the limits of media/technology power and, therefore, the dissociation between communication and representative power.

Conditions of Mediation - Phenomenological Perspectives on Media (Hardcover, New edition): Scott Rodgers Conditions of Mediation - Phenomenological Perspectives on Media (Hardcover, New edition)
Scott Rodgers
R2,228 Discovery Miles 22 280 Ships in 10 - 15 working days

Phenomenology has become one of the most important philosophical traditions underpinning recent theory and research on new media, whether or not the word is used explicitly. Conditions of Mediation brings together, for the first time in a single publication, the diversity of phenomenological media research-from social platforms and wearable media to diasporic identity formation and the ethics of consumer technologies. The new orthodoxy in media studies emphasizes the experience of media-whether as forms, texts, technics or protocols-marking a departure from traditional approaches preoccupied with media content or its structural contexts. But phenomenologically informed approaches go beyond merely asking what people do with media. They ask a more profound question: what constitutes the conditions of mediated experience in the first place? Beginning with an accessible introduction, this book invites readers to explore a wide range of phenomenological perspectives on media via two critical dialogues involving key thinkers alongside a series of theoretically sophisticated and empirically grounded chapters. In so doing, interdisciplinary media studies is brought into conversation with the work of philosophers such as Edmund Husserl, Martin Heidegger and Maurice Merleau-Ponty, as well as phenomenologically-inspired thinkers such as Erving Goffman, Pierre Bourdieu, Tim Ingold, Henri Lefebvre, Friedrich Kittler, Marshall McLuhan and Bernard Stiegler.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi Paperback R664 R612 Discovery Miles 6 120
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R380 R357 Discovery Miles 3 570
Dropshipping E-commerce Business Model…
Steven Sparrow Hardcover R613 Discovery Miles 6 130
Apple - The First 50 Years
David Pogue Hardcover R1,050 R789 Discovery Miles 7 890
Coaching Manual, The
Julie Starr Paperback R461 Discovery Miles 4 610
Social Media Marketing - A Quickstudy…
Edwards Poster R232 Discovery Miles 2 320
The Honest Guide to Becoming A Digital…
Elizabeth Benton Paperback R221 Discovery Miles 2 210
Facebook
Dana Kilroy Fold-out book or chart R229 Discovery Miles 2 290
Technology, Media Literacy, and the…
Richard S Lewis Hardcover R1,286 Discovery Miles 12 860
Social Media Marketing - A Comprehensive…
Jason Lazar Hardcover R554 R509 Discovery Miles 5 090

 

Partners