![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Videogames are full of horrors - and of horror, a facet of the media that has been largely overlooked by the academic community in terms of lengthy studies in the fast-growing field of videogame scholarship. This book engages with the research of prominent scholars across the humanities to explore the presence, role and function of horror in videogames, and in doing so it demonstrates how videogames enter discussion on horror and offer a unique, radical space that horror is particularly suited to fill. The topics covered include the construction of stories in videogames, the role of the monster and, of course, how death is treated as a learning tool and as a facet of horror.
Social Networks in China provides an in-depth guide to Chinese social networks, covering behaviors, usage, key issues, and future developments. Chinese scholarship and cultural idiosyncrasies in technology remain a relatively under-researched area. While such issues may be sporadically reported in popular media, it is often difficult to obtain a true understanding of authentic Chinese behaviors and practices. One such study area delves into whether Chinese users utilize technology to socialize in the same ways as people from western societies. As no book currently exists to address issues concerning Chinese social networks, this book takes on that shortage and opportunity.
Avatar, Assembled is a curated volume that unpacks videogame and virtual world avatars-not as a monolithic phenomenon (as they are usually framed) but as sociotechnical assemblages, pieced together from social (human-like) features like voice and gesture to technical (machine-like) features like graphics and glitches. Each chapter accounts for the empirical, theoretical, technical, and popular understandings of these avatar "components"-60 in total-altogether offering a nuanced explication of avatars-as-assemblages as they matter in contemporary society and in individual experience. The volume is a "crossover" piece in that, while it delves into complex ideas, it is written in a way that will be accessible and interesting to students, researchers, designers, and practitioners alike.
This book places Indonesia at the forefront of the global debate about the impact of ""disruptive"" digital technologies. Digital technology is fast becoming the core of life, work, culture and identity. Yet, while the number of Indonesians using the internet has followed the upward global trend, some groups - the poor, the elderly, women, the less well-educated, people living in remote communities - are disadvantaged. This interdisciplinary collection of essays by leading researchers and scholars, as well as e-governance and e-commerce insiders, examines the impact of digitalisation on the media industry, governance, commerce, informal sector employment, education, cybercrime, terrorism, religion, artistic and cultural expression, and much more. It presents groundbreaking analysis of the impact of digitalisation in one of the worlds most diverse, geographically vast nations. In weighing arguments about the opportunities and challenges presented by digitalisation, it puts the very idea of a technological revolution into critical perspective.
Networked Selves is an original analysis of one of the most defining cultural features of our time: how people turn to the Web to construct a public self. It examines the trajectory of a practice that embodies this sociocultural shift in fundamental ways: blogging. The book traces the evolution of the Web as a means to publicly perform a self through an analysis of the emergence, development, and transformation of blogging from the mid-1990s to the early years of the 2010s. It discusses processes that have shaped practices of subjectivity on the Web over two decades in two countries: the United States and France. Through this comparative analysis, the book shows that the cultural identity of blogging as a practice of subjectivity in these countries is neither inevitable nor neutral. Instead, it demonstrates that the development of the Web required the forging of various articulations between specific conceptions of self, publicness, and technology. These articulations were responses to both transformations in the daily life of actors and larger economic, political, and cultural processes-notably neoliberalization. The book also explains how the cultural imaginary around blogs came into being in the United States and how it has also functioned as a model for actors in other countries, such as France. Networked Selves discusses how and why actors in the technology field in France have gradually abandoned traditional makers of exceptionalism that were key in the development of the country's national identity and favored notions that characterize the United States instead.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
The western economic and financial crisis began with the collapse of Lehman Brothers in 2008 and led the European Union countries into recession. After this, governments started to implement austerity measures, such as cuts in public spending, including public subsidies and jobs, and rising prices. In this context, Europe started to experience a wave of protest movements. Individuals started to use the manifold interactive digital media environment to both fight against the austerity measures and find alternative ways of claiming their democratic rights. Inspired by the 2011 Arab Spring and the Occupy Wall Street movement in New York (USA), the Occupy LSX encampment in Central London (UK), The Outraged (Los Indignados)/ 15M encampment in Central Madrid (Spain), the Syntagma Square's Outraged movement in Athens (Greece) and the March 12th Movement in Lisbon (Portugal), although short-lived, epitomize an emerging alternative politics and participation via the media. This wave has promoted a debate on how the realm of politics is changing, as citizens broaden their ideas of what political issues and participation mean. Beyond the Internet examines the technological dimension of the recent wave of protest movements in the United Kingdom, Spain, Portugal, Greece, and Ireland. Offering an opportunity to achieve a better understanding of the dynamics between society, politics and technology, this volume questions the essentialist attributes of the Internet that fuel the techno-centric discourse. The contributors illustrate how all these protest movements were active in the social media and garnered high levels of media attention and public visibility, in spite of their failure to achieve their political goals. As intra-elite dissent was pivotal in understanding the Arab uprisings, the coalition of national ruling elites with European institutions in terms of austerity strategy is essential in understanding the limits of media/technology power and, therefore, the dissociation between communication and representative power.
Phenomenology has become one of the most important philosophical traditions underpinning recent theory and research on new media, whether or not the word is used explicitly. Conditions of Mediation brings together, for the first time in a single publication, the diversity of phenomenological media research-from social platforms and wearable media to diasporic identity formation and the ethics of consumer technologies. The new orthodoxy in media studies emphasizes the experience of media-whether as forms, texts, technics or protocols-marking a departure from traditional approaches preoccupied with media content or its structural contexts. But phenomenologically informed approaches go beyond merely asking what people do with media. They ask a more profound question: what constitutes the conditions of mediated experience in the first place? Beginning with an accessible introduction, this book invites readers to explore a wide range of phenomenological perspectives on media via two critical dialogues involving key thinkers alongside a series of theoretically sophisticated and empirically grounded chapters. In so doing, interdisciplinary media studies is brought into conversation with the work of philosophers such as Edmund Husserl, Martin Heidegger and Maurice Merleau-Ponty, as well as phenomenologically-inspired thinkers such as Erving Goffman, Pierre Bourdieu, Tim Ingold, Henri Lefebvre, Friedrich Kittler, Marshall McLuhan and Bernard Stiegler.
Prominent media scholars have argued that the dissemination of propaganda is an important function of the news media. Yet, despite public controversies about 'fake news' and 'misinformation', there has been very little discussion on techniques of propaganda. Building on critical theory, most notably Herman and Chomsky's Propaganda Model, Florian Zollmann's pioneering study brings propaganda back to the forefront of the debate. On the basis of a forensic examination of 1,911 newspaper articles, Zollmann investigates US, UK and German media reporting of the military operations in Kosovo, Iraq, Libya, Syria and Egypt. The book demonstrates how 'humanitarian intervention' and 'R2P' are only evoked in the news media if so called 'enemy' countries of Western states are the perpetrators of human rights violations. Zollmann's work evidences that the news media plays a crucial propaganda role in facilitating a selective process of shaming during the build-up towards military interventions. This process has led to an erosion of internationally agreed norms of non-intervention, as enshrined in the UN Charter.
Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.
Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.
In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.
7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.
7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.
In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.
Technological changes have radically altered the ways in which people use visual images. Since the invention of photography, imagery has increasingly been used for entertainment, journalism, information, medical diagnostics, instruction, branding and communication. These functions move the image beyond aesthetic issues associated with art and into the realm of communication studies. This introductory textbook introduces students to the terminology of visual literacy, methods for analyzing visual media, and theories on the relationship between visual communication and culture. Exploring the meanings associated with visual symbols and the relationship of visual communication to culture, this book provides students with a better understanding of the visually oriented world in which they live. From cave art to virtual reality, all visual media are discussed with methods for evaluation. Student-friendly features such as boxed topics, key terms, web resources, and suggestions for exercises are provided throughout.
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer and Emerson Brooking tackle the mind-bending questions that arise when war goes online and the online world goes to war. They explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts? Delving into the web's darkest corners, we meet the unexpected warriors of social media, such as the rapper turned jihadist PR czar and the Russian hipsters who wage unceasing infowars against the West. Finally, looking to the crucial years ahead, LikeWar outlines a radical new paradigm for understanding and defending against the unprecedented threats of our networked world.
The continuous evolution of internet and related social media technologies and platforms have opened up vast new means for communication, socialization, expression, and collaboration. They also have provided new resources for researchers seeking to explore, observe, and measure human opinions, activities, and interactions. However, those using the internet and social media for research - and those tasked with facilitating and monitoring ethical research such as ethical review boards - are confronted with a continuously expanding set of ethical dilemmas. Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts directly engages with these discussions and debates, and stimulates new ways to think about - and work towards resolving - the novel ethical dilemmas we face as internet and social media-based research continues to evolve. The chapters in this book - from an esteemed collection of global scholars and researchers - offer extensive reflection about current internet research ethics and suggest some important reframings of well-known concepts such as justice, privacy, consent, and research validity, as well as providing concrete case studies and emerging research contexts to learn from.
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
This book brings together the state of the art and current debates in the field of formative research, and examines many of the innovative methods largely overlooked in the available literature. This book will help social marketing to move beyond surveys and focus groups. The book addresses the needs of social marketing academics and practitioners alike by providing a robust and critical academic discussion of cutting-edge research methods, while demonstrating at the same time how each respective method can help us arrive at a deeper understanding of the issues that social marketing interventions are seeking to remedy. Each chapter includes a scholarly discussion of key formative research methods, a list of relevant internet resources, and three key readings for those interested in extending their understanding of the method. Most chapters also feature a short case study demonstrating how the methods are used.
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon. |
You may like...
Purchasing And Supply Chain Management
Robert Handfield, Larry Giunipero, …
Hardcover
The Book Every Leader Needs To Read…
Abed Tau, Adriaan Groenewald, …
Paperback
|