![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.
In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.
7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.
7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.
Collective Action 2.0 explores the issues related to information and communication technologies (ICTs) in detail, providing a balanced insight into how ICTs leverage and interact with collective action, which will have an impact on the current discourse. Recent events in different authoritarian regimes, such as Iran and Egypt, have drawn global attention to a developing phenomenon in collective action: People tend to organize through different social media platforms for political protest and resistance. This phenomenon describes a change in social structure and behavior tied to ICT. Social media platforms have been used to leverage collective action, which has in some cases arguably lead, to political revolution. The phenomenon also indicates that the way information is organized affects the organization of social structures with which it interoperates. The phenomenon also has another side, which is the use of social media for activist suppression, state and corporate surveillance, commodifi cation of social processes, demobilization, or for the mobilization of collective action toward undesirable ends.
In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.
Technological changes have radically altered the ways in which people use visual images. Since the invention of photography, imagery has increasingly been used for entertainment, journalism, information, medical diagnostics, instruction, branding and communication. These functions move the image beyond aesthetic issues associated with art and into the realm of communication studies. This introductory textbook introduces students to the terminology of visual literacy, methods for analyzing visual media, and theories on the relationship between visual communication and culture. Exploring the meanings associated with visual symbols and the relationship of visual communication to culture, this book provides students with a better understanding of the visually oriented world in which they live. From cave art to virtual reality, all visual media are discussed with methods for evaluation. Student-friendly features such as boxed topics, key terms, web resources, and suggestions for exercises are provided throughout.
This book brings together the state of the art and current debates in the field of formative research, and examines many of the innovative methods largely overlooked in the available literature. This book will help social marketing to move beyond surveys and focus groups. The book addresses the needs of social marketing academics and practitioners alike by providing a robust and critical academic discussion of cutting-edge research methods, while demonstrating at the same time how each respective method can help us arrive at a deeper understanding of the issues that social marketing interventions are seeking to remedy. Each chapter includes a scholarly discussion of key formative research methods, a list of relevant internet resources, and three key readings for those interested in extending their understanding of the method. Most chapters also feature a short case study demonstrating how the methods are used.
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer and Emerson Brooking tackle the mind-bending questions that arise when war goes online and the online world goes to war. They explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts? Delving into the web's darkest corners, we meet the unexpected warriors of social media, such as the rapper turned jihadist PR czar and the Russian hipsters who wage unceasing infowars against the West. Finally, looking to the crucial years ahead, LikeWar outlines a radical new paradigm for understanding and defending against the unprecedented threats of our networked world.
The continuous evolution of internet and related social media technologies and platforms have opened up vast new means for communication, socialization, expression, and collaboration. They also have provided new resources for researchers seeking to explore, observe, and measure human opinions, activities, and interactions. However, those using the internet and social media for research - and those tasked with facilitating and monitoring ethical research such as ethical review boards - are confronted with a continuously expanding set of ethical dilemmas. Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts directly engages with these discussions and debates, and stimulates new ways to think about - and work towards resolving - the novel ethical dilemmas we face as internet and social media-based research continues to evolve. The chapters in this book - from an esteemed collection of global scholars and researchers - offer extensive reflection about current internet research ethics and suggest some important reframings of well-known concepts such as justice, privacy, consent, and research validity, as well as providing concrete case studies and emerging research contexts to learn from.
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
Phenomenology has become one of the most important philosophical traditions underpinning recent theory and research on new media, whether or not the word is used explicitly. Conditions of Mediation brings together, for the first time in a single publication, the diversity of phenomenological media research-from social platforms and wearable media to diasporic identity formation and the ethics of consumer technologies. The new orthodoxy in media studies emphasizes the experience of media-whether as forms, texts, technics or protocols-marking a departure from traditional approaches preoccupied with media content or its structural contexts. But phenomenologically informed approaches go beyond merely asking what people do with media. They ask a more profound question: what constitutes the conditions of mediated experience in the first place? Beginning with an accessible introduction, this book invites readers to explore a wide range of phenomenological perspectives on media via two critical dialogues involving key thinkers alongside a series of theoretically sophisticated and empirically grounded chapters. In so doing, interdisciplinary media studies is brought into conversation with the work of philosophers such as Edmund Husserl, Martin Heidegger and Maurice Merleau-Ponty, as well as phenomenologically-inspired thinkers such as Erving Goffman, Pierre Bourdieu, Tim Ingold, Henri Lefebvre, Friedrich Kittler, Marshall McLuhan and Bernard Stiegler.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.
'Complex Worlds: Digital Culture, Rhetoric, and Professional Communication' is a collection of thought-provoking scholarly essays by teachers and industry practitioners in professional communication and technology-oriented fields. Scrupulously edited for a range of readers, the collection aims to help familiarize advanced students, teachers, and researchers in professional communication, computers and writing, literacy, and sister disciplines with key issues in digital theory and practice. An emphasis on the situations of and audiences for digital communication identifies 'Complex Worlds' as a rhetorical approach. In an era when globalizing markets and digital technologies are transforming culture around the world, readers should find the collection both engaging and timely. The collections' twelve essays constitute a diverse and thematically coherent set of inquiries. Included are explorations of topics such as cyber activism, digital 'dispositio', citizen and open-source journalism, broadband affordances, XML, digital resumes, avant garde performance art, best pedagogical practices, and intercultural communication between East and West, North and South. The text is especially well suited for advanced courses in professional and applied writing, contemporary rhetorics, and digital culture. The complexity highlighted in the collection's title is brought into relief by authors who address how the digital is daily unmaking our assumptions about the boundaries between work and school, the global and the local, the private and the public. 'Complex Worlds' offers readers an opportunity to build on their rhetorical awareness by expanding their understanding of the means, aims, and strategies of effective communication--today and in the future.
The book provides a compilation of idiosyncratic manifestations of information society in techno-economic, political and cultural spheres. The contributors focus on the increasing complexity within information societies. To manage this complexity, societies develop constantly evolving context-specific modes of meta-governance. The contributions allow a better understanding of well-known conceptualizations and definitions of information society and related concepts such as post-industrial society, post-modernity, as well as network society, and knowledge society.
Modern technological development has been both rapid and fundamentally transformative of the means and methods of warfare, and of the broader environment in which warfare is conducted. In many cases, technological development has been stimulated by, and dedicated to, addressing military requirements. On other occasions, technological developments outside the military sphere affect or inform the conduct of warfare and military expectations. The introduction of new technologies such as information technology, space technologies, nanotechnology and robotic technologies into our civil life, and into warfare, is expected to influence the application and interpretation of the existing rules of the law of armed conflict. In this book, scholars and practitioners working in the fields critically examine the potential legal challenges arising from the use of new technologies and future directions of legal development in light of the specific characteristics and challenges each technology presents with regard to foreseeable humanitarian impacts upon the battlespace.
Deviance is both socially defined and influenced. While it is widely accepted that deviance is a social construction, this research revisits the conceptualization of deviance and advances the methods used to study deviance and social construction. This book presents and compares three methods for conceptualizing deviance within and across cultures. Comparing the United States to South Korea, perceptions of deviance are presented as how individuals define deviance and what acts are cited as deviant. Next, attribute data are used to assess differences in of conceptualizations of deviance by demographic factors. Finally, social network analysis is used to understand the social influences at work in how one perceives deviance. This book is unique in its reconceptualization of deviance and the application of social network analysis as a new tool for studying social influence and perceptions.
'A cold, hungry adventure story about the power of choice and the strength of solidarity' SEAN MICHAELS America, 2049: Summer temperatures are intolerably high, the fossil fuel industry has shut down, and humans are implanted with a 'Flick' at birth, which allows them to remain perpetually online. The wealthy live in the newly created Floating City off the coast, while people on the mainland struggle to get by. For Rose, a job as a hostess in the city's elite club feels like her best hope for a better future. At a Cold War-era research station, a group of highly trained women with the code name White Alice are engaged in climate surveillance. But the terms of their employment become increasingly uncertain. And in a former oil town in northern Canada called Dominion Lake, a camp is being built-Camp Zero. A rare source of fresh, clean air and cooler temperatures, it will be the beginning of a new community and a new way of life. Grant believes it will be the perfect place to atone for his family's dark legacy. Everyone has an agenda. So who can you trust? Could falling in love be most the radical act of all? Thrilling, immersive and disturbingly prescient, Camp Zero is about the world we've built and where we go from here.
Does it sometimes seem that everyone else is doing 'smarter' things on their smartphones than you? Do you feel you're not taking full advantage of some of the amazing technology available today, or perhaps just don't know that it even exists? Martin Bailey's latest book aims to solve life's little problems, one gadget at a time. Including hardware tech, PC/Mac software and mobile apps, it's laid out in an easy-to-read, concise format with each item covering two pages. It's written in plain English too, with illustrations and links to where you can find out more information. Covering over 100 gadgets, whether you're looking to improve your golf game, fix your PC and fill it with free software, measure a room using your phone or even alter your state of mind without drink or drugs, The Useful Book of Gadgets, Gizmos & Apps has something for everyone. |
You may like...
VLSI-SoC: Technologies for Systems…
Jurgen Becker, Marcelo De Oliveira Johann, …
Hardcover
R1,414
Discovery Miles 14 140
Digital Production, Design and…
Sonia Stuart, Maureen Everett
Paperback
R1,269
Discovery Miles 12 690
Data Security in Cloud Computing, Volume…
Giulio D'Agostino
Paperback
Co-creating for Context in the Transfer…
Amany Elbanna, Shane McLoughlin, …
Hardcover
R2,703
Discovery Miles 27 030
Re-imagining Diffusion and Adoption of…
Sujeet K. Sharma, Yogesh K. Dwivedi, …
Hardcover
R4,157
Discovery Miles 41 570
Advances in Information Systems…
David Avison, George M. Kasper, …
Hardcover
R2,774
Discovery Miles 27 740
|