0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (113)
  • R250 - R500 (449)
  • R500+ (1,390)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Web 25 - Histories from the First 25 Years of the World Wide Web (Paperback, New edition): Niels Brugger Web 25 - Histories from the First 25 Years of the World Wide Web (Paperback, New edition)
Niels Brugger
R1,325 Discovery Miles 13 250 Ships in 10 - 15 working days

Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.

Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression... Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression (Hardcover, New edition)
Arthur S. Hayes
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.

7 Steps to Sharing Your School's Story on Social Media (Paperback): Jason Kotch, Edward Cosentino 7 Steps to Sharing Your School's Story on Social Media (Paperback)
Jason Kotch, Edward Cosentino
R1,002 Discovery Miles 10 020 Ships in 10 - 15 working days

7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.

7 Steps to Sharing Your School's Story on Social Media (Hardcover): Jason Kotch, Edward Cosentino 7 Steps to Sharing Your School's Story on Social Media (Hardcover)
Jason Kotch, Edward Cosentino
R2,790 Discovery Miles 27 900 Ships in 10 - 15 working days

7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.

Collective Action 2.0 - The Impact of Social Media on Collective Action (Paperback): Shaked Spier Collective Action 2.0 - The Impact of Social Media on Collective Action (Paperback)
Shaked Spier
R1,463 Discovery Miles 14 630 Ships in 10 - 15 working days

Collective Action 2.0 explores the issues related to information and communication technologies (ICTs) in detail, providing a balanced insight into how ICTs leverage and interact with collective action, which will have an impact on the current discourse. Recent events in different authoritarian regimes, such as Iran and Egypt, have drawn global attention to a developing phenomenon in collective action: People tend to organize through different social media platforms for political protest and resistance. This phenomenon describes a change in social structure and behavior tied to ICT. Social media platforms have been used to leverage collective action, which has in some cases arguably lead, to political revolution. The phenomenon also indicates that the way information is organized affects the organization of social structures with which it interoperates. The phenomenon also has another side, which is the use of social media for activist suppression, state and corporate surveillance, commodifi cation of social processes, demobilization, or for the mobilization of collective action toward undesirable ends.

Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression... Sympathy for the Cyberbully - How the Crusade to Censor Hostile and Offensive Online Speech Abuses Freedom of Expression (Paperback, New edition)
Arthur S. Hayes
R1,324 Discovery Miles 13 240 Ships in 10 - 15 working days

In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.

An Introduction to Visual Communication - From Cave Art to Second Life (2nd edition) (Paperback, New edition): Susan B. Barnes An Introduction to Visual Communication - From Cave Art to Second Life (2nd edition) (Paperback, New edition)
Susan B. Barnes
R1,338 Discovery Miles 13 380 Ships in 10 - 15 working days

Technological changes have radically altered the ways in which people use visual images. Since the invention of photography, imagery has increasingly been used for entertainment, journalism, information, medical diagnostics, instruction, branding and communication. These functions move the image beyond aesthetic issues associated with art and into the realm of communication studies. This introductory textbook introduces students to the terminology of visual literacy, methods for analyzing visual media, and theories on the relationship between visual communication and culture. Exploring the meanings associated with visual symbols and the relationship of visual communication to culture, this book provides students with a better understanding of the visually oriented world in which they live. From cave art to virtual reality, all visual media are discussed with methods for evaluation. Student-friendly features such as boxed topics, key terms, web resources, and suggestions for exercises are provided throughout.

Formative Research in Social Marketing - Innovative Methods to Gain Consumer Insights (Hardcover, 1st ed. 2017): Krzysztof... Formative Research in Social Marketing - Innovative Methods to Gain Consumer Insights (Hardcover, 1st ed. 2017)
Krzysztof Kubacki, Sharyn Rundle-Thiele
R4,047 Discovery Miles 40 470 Ships in 10 - 15 working days

This book brings together the state of the art and current debates in the field of formative research, and examines many of the innovative methods largely overlooked in the available literature. This book will help social marketing to move beyond surveys and focus groups. The book addresses the needs of social marketing academics and practitioners alike by providing a robust and critical academic discussion of cutting-edge research methods, while demonstrating at the same time how each respective method can help us arrive at a deeper understanding of the issues that social marketing interventions are seeking to remedy. Each chapter includes a scholarly discussion of key formative research methods, a list of relevant internet resources, and three key readings for those interested in extending their understanding of the method. Most chapters also feature a short case study demonstrating how the methods are used.

Likewar the Weaponization of Social Media (Paperback): P.W. Singer, Emerson Brooking Likewar the Weaponization of Social Media (Paperback)
P.W. Singer, Emerson Brooking 1
R465 R438 Discovery Miles 4 380 Save R27 (6%) Ships in 18 - 22 working days

Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer and Emerson Brooking tackle the mind-bending questions that arise when war goes online and the online world goes to war. They explore how ISIS copies the Instagram tactics of Taylor Swift, a former World of Warcraft addict foils war crimes thousands of miles away, internet trolls shape elections, and China uses a smartphone app to police the thoughts of 1.4 billion citizens. What can be kept secret in a world of networks? Does social media expose the truth or bury it? And what role do ordinary people now play in international conflicts? Delving into the web's darkest corners, we meet the unexpected warriors of social media, such as the rapper turned jihadist PR czar and the Russian hipsters who wage unceasing infowars against the West. Finally, looking to the crucial years ahead, LikeWar outlines a radical new paradigm for understanding and defending against the unprecedented threats of our networked world.

Internet Research Ethics for the Social Age - New Challenges, Cases, and Contexts (Paperback, New edition): Katharina... Internet Research Ethics for the Social Age - New Challenges, Cases, and Contexts (Paperback, New edition)
Katharina Kinder-Kurlanda, Michael Zimmer
R1,332 Discovery Miles 13 320 Ships in 10 - 15 working days

The continuous evolution of internet and related social media technologies and platforms have opened up vast new means for communication, socialization, expression, and collaboration. They also have provided new resources for researchers seeking to explore, observe, and measure human opinions, activities, and interactions. However, those using the internet and social media for research - and those tasked with facilitating and monitoring ethical research such as ethical review boards - are confronted with a continuously expanding set of ethical dilemmas. Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts directly engages with these discussions and debates, and stimulates new ways to think about - and work towards resolving - the novel ethical dilemmas we face as internet and social media-based research continues to evolve. The chapters in this book - from an esteemed collection of global scholars and researchers - offer extensive reflection about current internet research ethics and suggest some important reframings of well-known concepts such as justice, privacy, consent, and research validity, as well as providing concrete case studies and emerging research contexts to learn from.

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,351 Discovery Miles 53 510 Ships in 10 - 15 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R5,068 Discovery Miles 50 680 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R5,130 Discovery Miles 51 300 Ships in 10 - 15 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Building A Global Information Assurance Program (Hardcover): Douglas E. Campbell, Raymond J. Curts Building A Global Information Assurance Program (Hardcover)
Douglas E. Campbell, Raymond J. Curts
R5,088 Discovery Miles 50 880 Ships in 10 - 15 working days

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R5,078 Discovery Miles 50 780 Ships in 10 - 15 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Conditions of Mediation - Phenomenological Perspectives on Media (Paperback, New edition): Tim Markham, Scott Rodgers Conditions of Mediation - Phenomenological Perspectives on Media (Paperback, New edition)
Tim Markham, Scott Rodgers
R1,324 Discovery Miles 13 240 Ships in 10 - 15 working days

Phenomenology has become one of the most important philosophical traditions underpinning recent theory and research on new media, whether or not the word is used explicitly. Conditions of Mediation brings together, for the first time in a single publication, the diversity of phenomenological media research-from social platforms and wearable media to diasporic identity formation and the ethics of consumer technologies. The new orthodoxy in media studies emphasizes the experience of media-whether as forms, texts, technics or protocols-marking a departure from traditional approaches preoccupied with media content or its structural contexts. But phenomenologically informed approaches go beyond merely asking what people do with media. They ask a more profound question: what constitutes the conditions of mediated experience in the first place? Beginning with an accessible introduction, this book invites readers to explore a wide range of phenomenological perspectives on media via two critical dialogues involving key thinkers alongside a series of theoretically sophisticated and empirically grounded chapters. In so doing, interdisciplinary media studies is brought into conversation with the work of philosophers such as Edmund Husserl, Martin Heidegger and Maurice Merleau-Ponty, as well as phenomenologically-inspired thinkers such as Erving Goffman, Pierre Bourdieu, Tim Ingold, Henri Lefebvre, Friedrich Kittler, Marshall McLuhan and Bernard Stiegler.

Ethical Hacking and Penetration Testing Guide (Hardcover): Rafay Baloch Ethical Hacking and Penetration Testing Guide (Hardcover)
Rafay Baloch
R5,353 Discovery Miles 53 530 Ships in 10 - 15 working days

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R1,101 Discovery Miles 11 010 Ships in 10 - 15 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Multimedia Security - Watermarking, Steganography, and Forensics (Paperback): Frank Y. Shih Multimedia Security - Watermarking, Steganography, and Forensics (Paperback)
Frank Y. Shih
R2,677 Discovery Miles 26 770 Ships in 10 - 15 working days

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.

Complex Worlds - Digital Culture, Rhetoric and Professional Communication (Paperback): Andrienne Lamberti Complex Worlds - Digital Culture, Rhetoric and Professional Communication (Paperback)
Andrienne Lamberti; Series edited by Charles Sides; Edited by Anne Richards
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

'Complex Worlds: Digital Culture, Rhetoric, and Professional Communication' is a collection of thought-provoking scholarly essays by teachers and industry practitioners in professional communication and technology-oriented fields. Scrupulously edited for a range of readers, the collection aims to help familiarize advanced students, teachers, and researchers in professional communication, computers and writing, literacy, and sister disciplines with key issues in digital theory and practice. An emphasis on the situations of and audiences for digital communication identifies 'Complex Worlds' as a rhetorical approach. In an era when globalizing markets and digital technologies are transforming culture around the world, readers should find the collection both engaging and timely. The collections' twelve essays constitute a diverse and thematically coherent set of inquiries. Included are explorations of topics such as cyber activism, digital 'dispositio', citizen and open-source journalism, broadband affordances, XML, digital resumes, avant garde performance art, best pedagogical practices, and intercultural communication between East and West, North and South. The text is especially well suited for advanced courses in professional and applied writing, contemporary rhetorics, and digital culture. The complexity highlighted in the collection's title is brought into relief by authors who address how the digital is daily unmaking our assumptions about the boundaries between work and school, the global and the local, the private and the public. 'Complex Worlds' offers readers an opportunity to build on their rhetorical awareness by expanding their understanding of the means, aims, and strategies of effective communication--today and in the future.

Information Society and its Manifestations: Economy, Politics, Culture (Hardcover, New edition): Borut Roncevic, Matevz Tomsic Information Society and its Manifestations: Economy, Politics, Culture (Hardcover, New edition)
Borut Roncevic, Matevz Tomsic
R1,604 Discovery Miles 16 040 Ships in 10 - 15 working days

The book provides a compilation of idiosyncratic manifestations of information society in techno-economic, political and cultural spheres. The contributors focus on the increasing complexity within information societies. To manage this complexity, societies develop constantly evolving context-specific modes of meta-governance. The contributions allow a better understanding of well-known conceptualizations and definitions of information society and related concepts such as post-industrial society, post-modernity, as well as network society, and knowledge society.

New Technologies and the Law of Armed Conflict (Hardcover, 2014 ed.): Hitoshi Nasu, Robert McLaughlin New Technologies and the Law of Armed Conflict (Hardcover, 2014 ed.)
Hitoshi Nasu, Robert McLaughlin
R4,671 Discovery Miles 46 710 Ships in 10 - 15 working days

Modern technological development has been both rapid and fundamentally transformative of the means and methods of warfare, and of the broader environment in which warfare is conducted. In many cases, technological development has been stimulated by, and dedicated to, addressing military requirements. On other occasions, technological developments outside the military sphere affect or inform the conduct of warfare and military expectations. The introduction of new technologies such as information technology, space technologies, nanotechnology and robotic technologies into our civil life, and into warfare, is expected to influence the application and interpretation of the existing rules of the law of armed conflict. In this book, scholars and practitioners working in the fields critically examine the potential legal challenges arising from the use of new technologies and future directions of legal development in light of the specific characteristics and challenges each technology presents with regard to foreseeable humanitarian impacts upon the battlespace.

Conceptualizing Deviance - A Cross-Cultural Social Network Approach to Comparing Relational and Attribute Data (Hardcover):... Conceptualizing Deviance - A Cross-Cultural Social Network Approach to Comparing Relational and Attribute Data (Hardcover)
Candace Forbes Bright
R2,646 Discovery Miles 26 460 Ships in 18 - 22 working days

Deviance is both socially defined and influenced. While it is widely accepted that deviance is a social construction, this research revisits the conceptualization of deviance and advances the methods used to study deviance and social construction. This book presents and compares three methods for conceptualizing deviance within and across cultures. Comparing the United States to South Korea, perceptions of deviance are presented as how individuals define deviance and what acts are cited as deviant. Next, attribute data are used to assess differences in of conceptualizations of deviance by demographic factors. Finally, social network analysis is used to understand the social influences at work in how one perceives deviance. This book is unique in its reconceptualization of deviance and the application of social network analysis as a new tool for studying social influence and perceptions.

Camp Zero (Paperback): Michelle Min Sterling Camp Zero (Paperback)
Michelle Min Sterling
R434 R396 Discovery Miles 3 960 Save R38 (9%) Ships in 9 - 17 working days

'A cold, hungry adventure story about the power of choice and the strength of solidarity' SEAN MICHAELS America, 2049: Summer temperatures are intolerably high, the fossil fuel industry has shut down, and humans are implanted with a 'Flick' at birth, which allows them to remain perpetually online. The wealthy live in the newly created Floating City off the coast, while people on the mainland struggle to get by. For Rose, a job as a hostess in the city's elite club feels like her best hope for a better future. At a Cold War-era research station, a group of highly trained women with the code name White Alice are engaged in climate surveillance. But the terms of their employment become increasingly uncertain. And in a former oil town in northern Canada called Dominion Lake, a camp is being built-Camp Zero. A rare source of fresh, clean air and cooler temperatures, it will be the beginning of a new community and a new way of life. Grant believes it will be the perfect place to atone for his family's dark legacy. Everyone has an agenda. So who can you trust? Could falling in love be most the radical act of all? Thrilling, immersive and disturbingly prescient, Camp Zero is about the world we've built and where we go from here.

The Useful Book of Gadgets - Solving Life's Little Problems, One Gadget at a TIme (Paperback, 2nd New edition): Martin... The Useful Book of Gadgets - Solving Life's Little Problems, One Gadget at a TIme (Paperback, 2nd New edition)
Martin Bailey
R402 Discovery Miles 4 020 Ships in 10 - 15 working days

Does it sometimes seem that everyone else is doing 'smarter' things on their smartphones than you? Do you feel you're not taking full advantage of some of the amazing technology available today, or perhaps just don't know that it even exists? Martin Bailey's latest book aims to solve life's little problems, one gadget at a time. Including hardware tech, PC/Mac software and mobile apps, it's laid out in an easy-to-read, concise format with each item covering two pages. It's written in plain English too, with illustrations and links to where you can find out more information. Covering over 100 gadgets, whether you're looking to improve your golf game, fix your PC and fill it with free software, measure a room using your phone or even alter your state of mind without drink or drugs, The Useful Book of Gadgets, Gizmos & Apps has something for everyone.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
VLSI-SoC: Technologies for Systems…
Jurgen Becker, Marcelo De Oliveira Johann, … Hardcover R1,414 Discovery Miles 14 140
Nonlinear Editing
Patrick Morris Paperback R1,651 Discovery Miles 16 510
Computer Basics Absolute Beginner's…
Mike Miller Paperback R515 Discovery Miles 5 150
GCSE Computer Science Exam Practice Book…
While Do Team Paperback R261 Discovery Miles 2 610
Digital Production, Design and…
Sonia Stuart, Maureen Everett Paperback R1,269 Discovery Miles 12 690
Data Security in Cloud Computing, Volume…
Giulio D'Agostino Paperback R1,040 R869 Discovery Miles 8 690
Co-creating for Context in the Transfer…
Amany Elbanna, Shane McLoughlin, … Hardcover R2,703 Discovery Miles 27 030
Re-imagining Diffusion and Adoption of…
Sujeet K. Sharma, Yogesh K. Dwivedi, … Hardcover R4,157 Discovery Miles 41 570
Advances in Information Systems…
David Avison, George M. Kasper, … Hardcover R2,774 Discovery Miles 27 740
Video Shooter - Mastering Storytelling…
Barry Braverman Hardcover R6,040 Discovery Miles 60 400

 

Partners