![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
There have been significant changes in the last decade in the fields of education and marketing. Both have been transformed by technology and globalization. Attention spans have been shortened due to accelerated delivery of entertainment. A new global cyber culture has emerged. Social networking sites have changed the way we get information. The web and mobile apps have emerged as major players in both education and marketing. Prominent educator Dr. Sabra Brock has examined the foundations of these transformations and written about emerging trends in marketing and post-secondary education. This book is a collection of pieces she has authored and co-authored. These articles may provide insights for educators and educational administrators, as well as business practitioners, especially marketers.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.
This volume offers unique insights into the mutually constitutive nature of social media practices and religious change. Part 1 examines how social media operate in conjunction with mass media in the construction of discourses of religion and spirituality. It includes: a longitudinal study of British news media coverage of Christianity, secularism and religious diversity (Knott et al.); an analysis of responses to two documentaries 'The Monastery' and 'The Convent' (Thomas); an evaluation of theories of the sacred in studies of religion and media within the 'strong program' in cultural sociology in the US (Lynch); and a study of the consequences of mass and social media synergies for public perceptions of Islam in the Netherlands (Herbert). Part 2 examines the role of social media in the construction of contemporary martyrs and media celebrities (e.g., Michael Jackson) using mixed and mobile methods to analyse fan sites (Bennett & Campbell) and jihadi websites and YouTube (Nauta). Part 3 examines how certain bounded religious communities negotiate the challenges of social media: Judaism in Second Life (Abrams & Baker); Bah'ai regulation of web use among members (Campbell & Fulton); YouTube evangelists (Pihlaja); and public expressions of bereavement (Greenhill & Fletcher). The book provides theoretically informed empirical case studies and presents an intriguing, complex picture of the aesthetic and ethical, demographic and discursive aspects of new spaces of communication and their implications for religious institutions, beliefs and practices.
Communication defines political representation. At the core of the representational relationship lies the interaction between principal and agent; the quality of this relationship is predicated upon the accessibility of effective channels of communication between the constituent and representative. Over the past decade, congressional websites have become the primary way constituents communicate with their members and a prominent place for members to communicate with constituents. Yet, as we move toward the third decade of the 21st century, little work has systematically analyzed this forum as a distinct representational space. In this book, Jocelyn Evans and Jessica Hayden offer a fresh, timely, and mixed-methods approach for understanding how the emergence of virtual offices has changed the representational relationship between constituents and members of Congress. Utilizing strong theoretical foundations, a broad historical perspective, elite interviews, and rich original datasets, Evans and Hayden present evidence that virtual offices operate as a distinct representational space, and they demonstrate that their use has resulted in unprecedented and ill-understood changes in representational behavior. Congressional Communication in the Digital Age contributes to the scholarship on representation theory and its application to the contemporary Congress. It is valuable reading for students and researchers interested in American politics, political communication, and legislative politics.
This collection is the first of its kind on the topic of media development. It brings together luminary thinkers in the field-both researchers and practitioners-to reflect on how advocacy groups, researchers, the international community and others can work to ensure that media can continue to serve as a force of democracy and development. But that mission faces considerable challenges. Media development paradigms are still too frequently associated with Western prejudices, or out of touch with the digital age. As we move past Western blueprints and into an uncertain digital future, what does media development mean? If we are to act meaningfully to shape the future of our increasingly mediated societies, we must answer this question.
This collection is the first of its kind on the topic of media development. It brings together luminary thinkers in the field-both researchers and practitioners-to reflect on how advocacy groups, researchers, the international community and others can work to ensure that media can continue to serve as a force of democracy and development. But that mission faces considerable challenges. Media development paradigms are still too frequently associated with Western prejudices, or out of touch with the digital age. As we move past Western blueprints and into an uncertain digital future, what does media development mean? If we are to act meaningfully to shape the future of our increasingly mediated societies, we must answer this question.
The Social Media Journalist Handbook teaches readers how to be a real-world social media journalist, tracing the evolution of the field to its current-day practice. This book establishes social media journalism as the latest and one of the most effective ways to practice journalism in the 21st century. It features insights from top recruiters, editors, and senior producers working in the field, as well exercises that aid readers in developing the practical skills necessary to work successfully with social media. Readers will come away from the book with the knowledge to build strong social media strategies across different budgets, employing evergreen principles that work for different, ever-changing platforms. They'll learn how to reach and engage with the maximum number of people, as well as find sources, raise one's profile, conduct research, and produce stories.
Social Networks and the Semantic Web offers valuable information to practitioners developing social-semantic software for the Web. It provides two major case studies. The first case study shows the possibilities of tracking a research community over the Web. It reveals how social network mining from the web plays an important role for obtaining large scale, dynamic network data beyond the possibilities of survey methods. The second case study highlights the role of the social context in user-generated classifications in content, such as the tagging systems known as folksonomies.
Examining Internet culture in the People's Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally.
This book examines central aspects of the new technologies and the legal questions raised by them from both an international and an inter-disciplinary perspective. The technology revolution and the global networking of IT systems pose enormous challenges for the law. Current areas of discussion relate to autonomous systems, big data and issues surrounding legal tech. Ensuring data protection and IT security as well as the creation of a legal framework for the new technology as a whole can only be achieved through international and inter-disciplinary co-operation. The team of authors is made up of experienced, internationally renowned experts as well as young researchers and professionals who give valuable insights from numerous different jurisdictions. This book is written for jurists and those responsible for technology in public authorities and companies as well as practising lawyers and researchers.
This collected volume gathers a broad spectrum of social science and information science articles about Facebook. It looks into facets of users, such as age, sex, and culture, and into facets of use, e.g. privacy behavior after the Snowden affair, unfriending on Facebook, or Facebook addiction, as well as into quality perceptions. Written by leading scholars investigating the impact of Web 2.0., this volume is highly relevant for social media researchers, information scientists, and social scientists, and, not least, for everyone interested in Facebook-related topics.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer and Emerson Brooking tackle the mind-bending questions that arise when war goes online and the online world goes to war. They explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts? Delving into the web's darkest corners, we meet the unexpected warriors of social media, such as the rapper turned jihadist PR czar and the Russian hipsters who wage unceasing infowars against the West. Finally, looking to the crucial years ahead, LikeWar outlines a radical new paradigm for understanding and defending against the unprecedented threats of our networked world.
Digital marketing is now essential to making products and services a success and digital marketers are more and more in demand. This book is your guide to becoming an efficient and effective digital marketer, covering the expertise and array of skills you will need; how to stay current and future-proof your career; useful digital marketing tools, channels, frameworks and procedures; how to measure campaign success, and how to take the next steps to advance your digital marketing career.
Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.
The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely undiscussed. In this book, assistant professor of law and digitalisation Riikka Koulu examines the multifaceted phenomenon of dispute resolution technology, focusing specifically on private enforcement, which modern technology enables on an unforeseen scale. The increase in private enforcement confounds legal structures and challenges the nation-state's monopoly on violence. And, in this respect, the author argues that the technology-driven privatisation of enforcement - from direct enforcement of e-commerce platforms to self-executing smart contracts in the blockchain - brings the ethics of law's coercive nature out into the open. This development constitutes a new, and dangerous, grey area of conflict management, which calls for transparency and public debate on the ethical implications of dispute resolution technology.
Public consultations are a weak but institutionally embedded form of civic participation in political decision-making. Their input and output are often a cause for concern. This has motivated the authors to design the inDialogue platform to help transmit knowledge about the methodology of public consultations. It follows the deliberative public consultation model, and recognizes the value of social inclusion in knowledge-sharing and argument exchange in building an open political community. In this book, researchers as well as practitioners, in their respective fields, discuss various aspects of the inDialogue software's development and implementation. They document the complexity of the work that was carried out in an applied interdisciplinary project in the area of democratic innovation. "The value of this volume is not only in its presentation of inDialogue as an innovative application enabling those with disabilities to access public debate and consultation, but also in raising important questions about the introduction of ICT for debate and consultation. These questions are answered from both the perspective of the technical and social sciences." Jerzy Bartkowski, Professor at the Institute of Sociology, Warsaw University "ICT for Dialogue and Inclusive Decision-Making is a splendid contribution to the literature concerning online deliberation and civic engagement. It usefully bridges the academic world of theory and empirical studies, and the practice of citizen deliberation, carefully documenting both the design and experiences of the In Dialogue project in Poland." Todd Davies, Associate Director and lecturer, Symbolic Systems Program, Stanford University
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.
Calls to improve undergraduate STEM education have resulted in initiatives that seek to bolster student learning outcomes by promoting changes in teaching practices. Written by participants in a series of ground-breaking social network analysis (SNA) workshops, Researching and Enacting Change in Postsecondary Education argues that the academic department is a highly productive focus for the spread of new, network-based teaching ideas. By clarifying methodological issues related to SNA data collection and articulating relevant theoretical approaches to the topic, this book leverages current knowledge about social network theory and SNA techniques for understanding instructional improvement in higher education.
There's no doubt that technology has overrun our lives. Over the past few decades, the world has embraced "progress" and we're living with the resultant clicking, beeping, anxiety-inducing frenzy. But a creative backlash is gathering steam, helping us cope with the avalanche of data that threatens to overwhelm us daily through our computers, tablets, and smartphones. "Digital Detox" considers the technologically focused life, with its impacts on our children, relationships, communities, health, work, and more, and suggests opportunities for those of us longing to cultivate a richer on- and off-line existence. By examining the connected world through the lens of her own internet fast, Christina Crook creates a convincing case for increasing intentionality in our day-to-day lives. Using historical data, typewritten letters, chapter challenges, and personal accounts, she invites us to explore a new way of living, beyond our steady state of distracted connectedness. Most of us can't throw away our smartphone or cut ourselves off from the internet. But we can all rethink our relationship with the digital world, discovering new ways of introducing balance and discipline to the role of technology in our lives. This book is a must-read for anyone wishing to rediscover quietness of mind and seeking a sense of peace amidst the cacophony of the modern world. Christina Crook is a wordsmith and communications professional
and instigator of the project "Letters from a Luddite," which
chronicled her thirty-one day internet fast and fueled her passion
for exploring the intersection of technology, relationships, and
joy.
Since the advent of the Internet and increasingly mobile devices, we have witnessed dramatic changes in computer-mediated technologies and their roles in our lives. In the late 1990s, researchers began to identify problematic forms of Internet use, such as difficulty controlling the amount of time spent online. Today, people live in a perpetually digital and permanently connected world that presents many serious types of problematic Internet use besides deficient self-regulation. Thousands of studies have been published on interpersonal problems such as cyberbullying, cyberstalking, relationship conflicts about online behavior, and the increasingly problematic use of mobile devices during in-person interactions. The Changing Face of Problematic Internet Use: An Interpersonal Approach also examines future trends, including the recent development of being constantly connected to mobile devices and social networks. Research in these areas is fraught with controversy, inconsistencies, and findings that are difficult to compare and summarize. This book offers students and researchers an organized, theory-based, synthesis of research on these problems and explains how interpersonal theory and research help us better understand the problems that online behavior plays in our personal lives and social interactions.
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.
The media's coverage of religion is an important question for academic researchers, given the central role which news media play in ensuring that people are up-to-date with religion news developments. Not only is there a lack of treatment of the subject in other countries, but there is also the absence of comparative study on news and religion. A key question is how the media, the political system, the religions themselves, the culture, and the economy influence how religion is reported in different countries. Spiritual News: Reporting Religion Around the World is intended to fill this gap. The book is divided into six parts: an introductory section; the newsgathering process; religion reporting in different regions; media events concerning religion; political and social change and the role of religion news; future trends.
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.
Fundraising: How to Raise Money for Your Library Using Social Media introduces the phenomena that many members, supporters and fundraisers are not using social media to fundraise for their libraries, and may not be aware of its strengths and pitfalls. The book discusses why social media should be used to fundraise and how to successfully employ social media campaigns, also providing examples from library funding initiatives that libraries can follow. Since social media changes relatively quickly, library staff members, supporters and fundraisers need up-to-date information on how to craft messages for the platforms that they use. This book presents less on best practices for specific social media platform, focusing more on library social media fundraising strategies that have been found to be effective (for example, how libraries have successfully created fundraising campaigns with hashtags). |
You may like...
Greek, Indian and Arabic Logic, Volume 1
Dov M. Gabbay, John Woods
Hardcover
R4,892
Discovery Miles 48 920
Theory and Applications of…
Florentin Smarandache, Madeline Al-Tahan
Hardcover
R6,648
Discovery Miles 66 480
|