Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
This collection is the first of its kind on the topic of media development. It brings together luminary thinkers in the field-both researchers and practitioners-to reflect on how advocacy groups, researchers, the international community and others can work to ensure that media can continue to serve as a force of democracy and development. But that mission faces considerable challenges. Media development paradigms are still too frequently associated with Western prejudices, or out of touch with the digital age. As we move past Western blueprints and into an uncertain digital future, what does media development mean? If we are to act meaningfully to shape the future of our increasingly mediated societies, we must answer this question.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
Explains smart city ecosystem and AI-centric solutions Presents the application of design principles and computer vision models for operating smart cities and security systems Discusses how to integrate the AI-based controls systems to make the IoT devices smarter Explains data engineering and visualization patterns for monitoring smart city systems Discusses self-driving car models and transportation infrastructures
Maps the landscape of contemporary informational interests. Of considerable interest to those working at the intersection of law and technology, as well as others concerned with the legal, political, and social aspects of our information society.
There have been significant changes in the last decade in the fields of education and marketing. Both have been transformed by technology and globalization. Attention spans have been shortened due to accelerated delivery of entertainment. A new global cyber culture has emerged. Social networking sites have changed the way we get information. The web and mobile apps have emerged as major players in both education and marketing. Prominent educator Dr. Sabra Brock has examined the foundations of these transformations and written about emerging trends in marketing and post-secondary education. This book is a collection of pieces she has authored and co-authored. These articles may provide insights for educators and educational administrators, as well as business practitioners, especially marketers.
In higher education, professional online identities have become increasingly important. A rightly worded tweet can cause an academic blog post to go viral. A wrongly worded tweet can get a professor fired. Regular news items in The Chronicle of Higher Education and Inside Higher Ed provide evidence that reputations are both built and crushed via online platforms. Ironically, given the importance of digital identities to job searches, the promotion and distribution of scholarly work, pedagogical innovation, and many other components of an academic life, higher education professionals receive little to no training about how to best represent themselves in a digital space. Managing Your Professional Identity Online: A Guide for Higher Education fills this gap by offering higher education professionals the information and guidance they need to: craft strong online biographical statements for a range of platforms; prioritize where and how they want to represent themselves online in a professional capacity; intentionally and purposefully create an effective brand for their professional identity online; develop online profiles that are consistent, professional, accurate, organized, of good quality, and representative of their academic lives; regularly update and maintain an online presence; post appropriately in a range of online platforms and environments; and< successfully promote their professional accomplishments. Managing Your Professional Identity Online is practical and action-oriented. In addition to offering a range of case studies demonstrating concrete examples of effective practices, the book is built around activities, templates, worksheets, rubrics, and bonus materials that walk readers through a step-by-step guide of how to design, build, and maintain professional online identities.
This work is an assessment of how to manage risk in property transactions in the context of the move from paper-based to electronic conveyancing (eConveyancing). In particular the focus is on risks that impact on title registration, and the security, protection or lack thereof that this registration offers to land owners, third parties and property claimants. The impact is the extent to which a change in the transactional process may unintentionally affect risk (being the consequence of change and the likelihood of that consequence having a negative effect). The risks are identified, analysed and evaluated against the backdrop of title registration and the development of eConveyancing through a comparative analysis of the systems in Ireland and Ontario, while also referencing other developing electronic systems around the globe.
The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely undiscussed. In this book, assistant professor of law and digitalisation Riikka Koulu examines the multifaceted phenomenon of dispute resolution technology, focusing specifically on private enforcement, which modern technology enables on an unforeseen scale. The increase in private enforcement confounds legal structures and challenges the nation-state's monopoly on violence. And, in this respect, the author argues that the technology-driven privatisation of enforcement - from direct enforcement of e-commerce platforms to self-executing smart contracts in the blockchain - brings the ethics of law's coercive nature out into the open. This development constitutes a new, and dangerous, grey area of conflict management, which calls for transparency and public debate on the ethical implications of dispute resolution technology.
Our world and the people within it are increasingly interpreted and classified by automated systems. At the same time, automated classifications influence what happens in the physical world. These entanglements change what it means to interact with governance, and shift what elements of our identity are knowable and meaningful. In this cyber-physical world, or 'world state', what is the role for law? Specifically, how should law address the claim that computational systems know us better than we know ourselves? Monitoring Laws traces the history of government profiling from the invention of photography through to emerging applications of computer vision for personality and behavioral analysis. It asks what dimensions of profiling have provoked legal intervention in the past, and what is different about contemporary profiling that requires updating our legal tools. This work should be read by anyone interested in how computation is changing society and governance, and what it is about people that law should protect in a computational world.
Explores new perspectives on social media entertainment There is a new class of cultural producers-YouTube vloggers, Twitch gameplayers, Instagram influencers, TikTokers, Chinese wanghong, and others-who are part of a rapidly emerging and highly disruptive industry of monetized "user-generated" content. As this new wave of native social media entrepreneurs emerge, so do new formations of culture and the ways they are studied. In this volume, contributors draw on scholarship in media and communication studies, science and technology studies, and social media, Internet, and platform studies, in order to define this new field of study and the emergence of creator culture. Creator Culture introduces readers to new paradigms of social media entertainment from critical perspectives, demonstrating both relations to and differentiations from the well-established media forms and institutions traditionally within the scope of media studies. This volume does not seek to impose a uniform perspective; rather, the goal is to stimulate in-depth, globally-focused engagement with this burgeoning industry and establish a dynamic research agenda for scholars, teachers, and students, as well as creators and professionals across the media, communication, creative, and social media industries. Contributors include: Jean Burgess, Zoe Glatt, Sarah Banet-Weiser, Brent Luvaas, Carlos A. Scolari, Damian Fraticelli, Jose M. Tomasena, Junyi Lv, Hector Postigo, Brooke Erin Duffy, Megan Sawey, Jarrod Walzcer, Sangeet Kumar, Sriram Mohan, Aswin Punathambekar, Mohamed El Marzouki, Elaine Jing Zhao, Arturo Arriagada, Jeremy Shtern, Stephanie Hill
Key Selling Points The first book to showcase physical representations of data, and the first to discuss the creative process behind them. Approaches the topic from a multidisciplinary perspective, showcasing a range of creative approaches from computer science, data science, graphic design, art, craft, and architecture. The book is heavily visual and illustrates each project and the process of creating it via rich photos and sketches, which are accessible and inspiring for both enthusiasts and experts.
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today's smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book's chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.
Calls to improve undergraduate STEM education have resulted in initiatives that seek to bolster student learning outcomes by promoting changes in teaching practices. Written by participants in a series of ground-breaking social network analysis (SNA) workshops, Researching and Enacting Change in Postsecondary Education argues that the academic department is a highly productive focus for the spread of new, network-based teaching ideas. By clarifying methodological issues related to SNA data collection and articulating relevant theoretical approaches to the topic, this book leverages current knowledge about social network theory and SNA techniques for understanding instructional improvement in higher education.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.
Innovative examination of augmentation technologies in terms of technical, social, and ethical considerations Usable as a supplemental text for a variety of courses, and also of interest to researchers and professionals in fields including: technical communication, digital communication, UX design, information technology, informatics, human factors, artificial intelligence, ethics, philosophy of technology, and sociology of technology First major work to combine technological, ethical, social, and rhetorical perspectives on human augmentation Additional cases and research material available at the authors' Fabric of Digital Life research database at https://fabricofdigitallife.com/
Digital Sports Journalism gives detailed guidance on a range of digital practices for producing content for smartphones and websites. Each chapter discusses a skill that has become essential for sports journalists today, with student-friendly features throughout to support learning. These include case studies, examples of sports journalism from leading global publications, as well as top tips and practical exercises. The book also presents interviews with leading sport and club journalists with wide-ranging experience at the BBC, Copa90, Wimbledon Tennis, the Guardian and BT Sport, who discuss working with new technologies to cover sports stories and events. Chapters cover: live blogging; making and disseminating short videos; working for a sports club or governing body; finding and transmitting stories on social media; podcasting; longform online journalism. The job of a sports journalist has altered dramatically over the first two decades of the 21st century, with scope to write content across a new variety of digital platforms and mediums. Digital Sports Journalism will help students of journalism and professionals unlock the potential of these new media technologies.
Since the advent of the Internet and increasingly mobile devices, we have witnessed dramatic changes in computer-mediated technologies and their roles in our lives. In the late 1990s, researchers began to identify problematic forms of Internet use, such as difficulty controlling the amount of time spent online. Today, people live in a perpetually digital and permanently connected world that presents many serious types of problematic Internet use besides deficient self-regulation. Thousands of studies have been published on interpersonal problems such as cyberbullying, cyberstalking, relationship conflicts about online behavior, and the increasingly problematic use of mobile devices during in-person interactions. The Changing Face of Problematic Internet Use: An Interpersonal Approach also examines future trends, including the recent development of being constantly connected to mobile devices and social networks. Research in these areas is fraught with controversy, inconsistencies, and findings that are difficult to compare and summarize. This book offers students and researchers an organized, theory-based, synthesis of research on these problems and explains how interpersonal theory and research help us better understand the problems that online behavior plays in our personal lives and social interactions.
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.
The media's coverage of religion is an important question for academic researchers, given the central role which news media play in ensuring that people are up-to-date with religion news developments. Not only is there a lack of treatment of the subject in other countries, but there is also the absence of comparative study on news and religion. A key question is how the media, the political system, the religions themselves, the culture, and the economy influence how religion is reported in different countries. Spiritual News: Reporting Religion Around the World is intended to fill this gap. The book is divided into six parts: an introductory section; the newsgathering process; religion reporting in different regions; media events concerning religion; political and social change and the role of religion news; future trends.
Social Networks and the Semantic Web offers valuable information to practitioners developing social-semantic software for the Web. It provides two major case studies. The first case study shows the possibilities of tracking a research community over the Web. It reveals how social network mining from the web plays an important role for obtaining large scale, dynamic network data beyond the possibilities of survey methods. The second case study highlights the role of the social context in user-generated classifications in content, such as the tagging systems known as folksonomies.
Using a lens of mindfulness, this book explores how digital dependencies can displace attention and undermine attentional control, leading to experiences of stress and mindless involvement with digital technology. Using qualitative interviews with teachers and students of mindfulness programmes, the book explores the challenges and opportunities for reconciling digital interactions with mindful practice. A phenomenological analysis of participants' digital experiences shows three different imperatives (relating to digital capabilities, hyper-reality and algorithms), that can drive unconscious forms of interaction and encourage a delegation of attentional control that draws users away from the present moment. The book concludes by exploring the implications of these (extra-conscious) imperatives for understanding digital addiction. It also provides a set of guidelines for a digital approach to mindfulness practice that can encourage beneficial relationships with digital technology into the future.
Avatar, Assembled is a curated volume that unpacks videogame and virtual world avatars-not as a monolithic phenomenon (as they are usually framed) but as sociotechnical assemblages, pieced together from social (human-like) features like voice and gesture to technical (machine-like) features like graphics and glitches. Each chapter accounts for the empirical, theoretical, technical, and popular understandings of these avatar "components"-60 in total-altogether offering a nuanced explication of avatars-as-assemblages as they matter in contemporary society and in individual experience. The volume is a "crossover" piece in that, while it delves into complex ideas, it is written in a way that will be accessible and interesting to students, researchers, designers, and practitioners alike.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society. |
You may like...
Handbook on Tourism and Social Media
Dogan Gursoy, Rahul P.S. Kaurav
Hardcover
R6,107
Discovery Miles 61 070
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R639
Discovery Miles 6 390
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,447
Discovery Miles 54 470
|