Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.
Recent years have seen digital advertising grow to the point where it will soon overtake television as the no. 1 advertising medium. In the online environment, consumers interact and share their thoughts on brands and their experiences using them. These electronic word-of-mouth (eWOM) communications have become a very important to the success of products. In today's cluttered environment, it is especially important to study how the practice of eWOM advertising operates, and how marketers can influence eWOM in social media and other online sites. This volume starts with a chapter on the current state of knowledge on eWOM and then turns its attention to current research articles on a variety of eWOM formats. These include the posting of selfies on social media, the influence of review types on consumer perception and purchase intention, the effects of preannouncement messages, and how user-generated content can be used to induce effectiveness of eWOM on social media. The relationship of eWOM to brand building is emphasized in several of the chapters. This book was originally published as a special issue of the International Journal of Advertising.
Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.
Calls to improve undergraduate STEM education have resulted in initiatives that seek to bolster student learning outcomes by promoting changes in teaching practices. Written by participants in a series of ground-breaking social network analysis (SNA) workshops, Researching and Enacting Change in Postsecondary Education argues that the academic department is a highly productive focus for the spread of new, network-based teaching ideas. By clarifying methodological issues related to SNA data collection and articulating relevant theoretical approaches to the topic, this book leverages current knowledge about social network theory and SNA techniques for understanding instructional improvement in higher education.
Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.
We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.
The book provides copyright protection approaches for videos using watermarking. The various watermarking techniques using various transforms such as discrete cosine transform (DCT), discrete wavelet transform (DWT) and singular value decomposition (SVD) for videos are presented. The book also provides video watermarking approach using compressive sensing (CS) theory. The presented watermarking techniques are designed and implemented using color digital videos. The performance of the presented techniques is evaluated using Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC).
As digital transformations continue to accelerate in the world, discourses of big data have come to dominate in a number of fields, from politics and economics, to media and education. But how can we really understand the digital world when so much of the writing through which we grapple with it remains deeply problematic? In a compelling new work of feminist critical theory, Bassett, Kember and O'Riordan scrutinise many of the assumptions of a masculinist digital world, highlighting the tendency of digital humanities scholarship to venerate and essentialise technical forms, and to adopt gendered writing and citation practices. Contesting these writings, practices and politics, the authors foreground feminist traditions and contributions to the field, offering alternative modes of knowledge production, and a radically different, poetic writing style. Through this prism, Furious brings into focus themes including the automation of home and domestic work, the Anthropocene, and intersectional feminist technofutures.
This book facilitates a systematic comprehension of internal workings of corporate governance in practice. Facets of this multidisciplinary, constantly evolving field are discussed and interrelationships among them are explained to provide insights on how certain precepts come into play for various roles in governance. This book pragmatically explains and illustrates with a view to integrate. To keep the scope achievable, the emphasis is placed on the U.S.-based companies; where possible, differences in governance around the world are identified. Three rich sources of knowledge help shape the message of this book: existing paradigms, personal experience in governance, and research on issues and challenges of governance. Features: Permits a holistic view of the complex corporate governance landscape. Discusses and generously illustrates the practice of corporate governance. Aids understanding of issues and challenges of corporate governance. Identifies ways to advance the value of one's role in corporate governance. Teaches how to avoid crucial mistakes that compromise the value of one's contribution in the governance process. If you are a professional accountant, securities lawyer, economist, financial analyst, auditor, executive, entrepreneur, or an investor, you will find the book helpful in understanding the entire landscape of governance fairly quickly. Those already involved in the governance arena may find the book refreshing, and may use it to coach others. This book can serve as a reference book in any offering of a course at any academic level.
The 'end of history' has not taken place. Ideological and economic crisis and the status quo of neoliberal capitalism since 2008 demand a renewed engagement with Marx. But if we are to effectively resist capitalism we must truly understand Marx: Marxism today must theorise how communication technologies, media representation and digitalisation have come to define contemporary capitalism. There is an urgent need for critical, Marxian-inspired knowledge as a foundation for changing the world and the way we communicate from digital capitalism towards communicative socialism and digital communism. Rereading Marx in the Age of Digital Capitalism does exactly this. Delving into Marx's most influential works, such as Capital, The Grundrisse, Economic and Philosophic Manuscripts, The German Ideology and The Communist Manifesto, Christian Fuchs draws out Marx's concepts of machinery, technology, communication and ideology, all of which anticipate major themes of the digital age. A concise and coherent work of Marxist media and communication theory, the book ultimately demonstrates the relevance of Marx to an age of digital and communicative capitalism.
This book examines central aspects of the new technologies and the legal questions raised by them from both an international and an inter-disciplinary perspective. The technology revolution and the global networking of IT systems pose enormous challenges for the law. Current areas of discussion relate to autonomous systems, big data and issues surrounding legal tech. Ensuring data protection and IT security as well as the creation of a legal framework for the new technology as a whole can only be achieved through international and inter-disciplinary co-operation. The team of authors is made up of experienced, internationally renowned experts as well as young researchers and professionals who give valuable insights from numerous different jurisdictions. This book is written for jurists and those responsible for technology in public authorities and companies as well as practising lawyers and researchers.
This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.
This ground-breaking and timely book explores how big data, artificial intelligence and algorithms are creating new types of agency, and the impact that this is having on our lives and the rule of law. Addressing the issues in a thoughtful, cross-disciplinary manner, the authors examine the ways in which data-driven agency is transforming democratic practices and the meaning of individual choice. Leading scholars in law, philosophy, computer science and politics analyse the latest innovations in data science and machine learning, assessing the actual and potential implications of these technologies. They investigate how this affects our understanding of such concepts as agency, epistemology, justice, transparency and democracy, and advocate a precautionary approach that takes the effects of data-driven agency seriously without taking it for granted. Scholars and students of law, ethics and philosophy, in particular legal, political and democratic theory, will find this book a compelling and invaluable read, as will computer scientists interested in the implications of their own work. It will also prove insightful for academics and activists working on privacy, fairness and anti-discrimination. Contributors include: J.E. Cohen, G. de Vries, S. Delacroix, P. Dumouchel, C. Ess, M. Garnett, E.H. Gerding, R. Gomer, C. Graber, M. Hildebrandt, C. Maple, K. O'Hara, P. Ohm, m.c. schraefel, D. Stevens, N. van Dijk, M. Veale
In today's digital world our social interactions often take place in the form of written comments. We chat, disagree, worship, vent, confess, and even attack in written form in public digital spaces. Drawing on scholarly literature from media and cultural studies, psychology and sociology, Uncovering Commenting Culture charts this commenting territory and outlines why we behave in these ways online. In this timely book, Renee Barnes provides a participatory model for understanding commenting culture that is based on the premise that our behaviours online-including those that cause us most the concern-are not so much an internet problem as a social problem. By looking at a wide variety of online commenting habitats, from the comment threads following news stories, through to specialist forums and social media platforms, the volume provides a comprehensive understanding of the role of online commenting in society and provides suggestions for how we might mitigate bad behaviours.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.
The Social Media Journalist Handbook teaches readers how to be a real-world social media journalist, tracing the evolution of the field to its current-day practice. This book establishes social media journalism as the latest and one of the most effective ways to practice journalism in the 21st century. It features insights from top recruiters, editors, and senior producers working in the field, as well exercises that aid readers in developing the practical skills necessary to work successfully with social media. Readers will come away from the book with the knowledge to build strong social media strategies across different budgets, employing evergreen principles that work for different, ever-changing platforms. They'll learn how to reach and engage with the maximum number of people, as well as find sources, raise one's profile, conduct research, and produce stories.
The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.
Blockchain and Bitcoin have become household names. BLOCKCHAIN, BITCOIN AND YOU explains the technical concepts that make up the blockchain and what they mean for the future of personal finance, as well as their role in business-relevant applications. Scotcoin's CEO Temple Melville lifts the complex key principles of blockchain technology out of the preserve of academia and tech and delivers it to a new audience the people. Find out what the blockchain is; why it is needed and the problems it solves; why there is so much excitement about the blockchain and its potential; major components and their purpose; major application scenarios and what it means for you. "This book is a treasure trove of information for anyone with a curiosity about this new technology and what it means for them in their day to day lives, it helpfully explains the intricacies of blockchain technology in a refreshingly user-friendly and entertaining way." Stephen Ingledew, Chief Executive of Fintech Scotland
This book is open access and available on www.bloomsburycollections.com. It is funded by Knowledge Unlatched. In The Digital Logic of Death, Steven Pustay skillfully makes visible the immensely important but often overlooked role that moving images play in shaping our understanding of mortality. This relationship, he argues, is made all the more urgent by the technologies of the digital age, which have profoundly altered our ability to represent and contemplate death through moving images, resulting in an entirely new cultural logic of death. To draw out this new logic, Pustay presents accessible readings of otherwise dense and difficult philosophical approaches to death - such as those found in existentialism, psychoanalysis, and critical theory - by reading them through the lens of contemporary media. From art-house films like Irreversible and The Fountain to blockbusters like the Matrix trilogy, from television commercials for M&M's to pay-cable dramas like The Sopranos and Breaking Bad, from first-person shooters like Bioshock to indie-games like LIMBO, Pustay shows how moving images have shifted our understanding of death in general and our recognition of our own finiteness in particular.
Examining Internet culture in the People's Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally.
This collection is the first of its kind on the topic of media development. It brings together luminary thinkers in the field-both researchers and practitioners-to reflect on how advocacy groups, researchers, the international community and others can work to ensure that media can continue to serve as a force of democracy and development. But that mission faces considerable challenges. Media development paradigms are still too frequently associated with Western prejudices, or out of touch with the digital age. As we move past Western blueprints and into an uncertain digital future, what does media development mean? If we are to act meaningfully to shape the future of our increasingly mediated societies, we must answer this question. |
You may like...
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley
Hardcover
R3,015
Discovery Miles 30 150
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus
Hardcover
R6,078
Discovery Miles 60 780
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
|