![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Avatar, Assembled is a curated volume that unpacks videogame and virtual world avatars-not as a monolithic phenomenon (as they are usually framed) but as sociotechnical assemblages, pieced together from social (human-like) features like voice and gesture to technical (machine-like) features like graphics and glitches. Each chapter accounts for the empirical, theoretical, technical, and popular understandings of these avatar "components"-60 in total-altogether offering a nuanced explication of avatars-as-assemblages as they matter in contemporary society and in individual experience. The volume is a "crossover" piece in that, while it delves into complex ideas, it is written in a way that will be accessible and interesting to students, researchers, designers, and practitioners alike.
7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.
7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.
Networked Selves is an original analysis of one of the most defining cultural features of our time: how people turn to the Web to construct a public self. It examines the trajectory of a practice that embodies this sociocultural shift in fundamental ways: blogging. The book traces the evolution of the Web as a means to publicly perform a self through an analysis of the emergence, development, and transformation of blogging from the mid-1990s to the early years of the 2010s. It discusses processes that have shaped practices of subjectivity on the Web over two decades in two countries: the United States and France. Through this comparative analysis, the book shows that the cultural identity of blogging as a practice of subjectivity in these countries is neither inevitable nor neutral. Instead, it demonstrates that the development of the Web required the forging of various articulations between specific conceptions of self, publicness, and technology. These articulations were responses to both transformations in the daily life of actors and larger economic, political, and cultural processes-notably neoliberalization. The book also explains how the cultural imaginary around blogs came into being in the United States and how it has also functioned as a model for actors in other countries, such as France. Networked Selves discusses how and why actors in the technology field in France have gradually abandoned traditional makers of exceptionalism that were key in the development of the country's national identity and favored notions that characterize the United States instead.
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
Mind your online P's and Q's with this expert digital manners guide Conducting yourself online can be challenging. It sometimes seems like the web and social media is tailor-made to cause upset and anger. But, with the right guide, anyone can learn how to be a beacon of civility and politeness online. In Digital Etiquette For Dummies, a team of online communication experts share their combined insights into improving your presence on social media, writing emails that exude positivity and clarity, behaving correctly in virtual meetings, and much more. You'll become a paragon of politeness as you learn to apply the timeless rules of etiquette to the unique environment of the web, social media, email, Zoom, and smartphones. In this book, you'll also: Learn near-universal etiquette rules for email, social media, cellphones, and more Discover ways to make sure that your polite attitude isn't being lost in the text-only context of a business email Avoid common social media pitfalls and digital faux pas that can trip up even the most careful communicators A great handbook for anyone who uses digital communication in business or in their personal life (so, pretty much everyone), Digital Etiquette For Dummies also belongs on the reading lists of those trying to improve their online interactions on social media.
Phenomenology has become one of the most important philosophical traditions underpinning recent theory and research on new media, whether or not the word is used explicitly. Conditions of Mediation brings together, for the first time in a single publication, the diversity of phenomenological media research-from social platforms and wearable media to diasporic identity formation and the ethics of consumer technologies. The new orthodoxy in media studies emphasizes the experience of media-whether as forms, texts, technics or protocols-marking a departure from traditional approaches preoccupied with media content or its structural contexts. But phenomenologically informed approaches go beyond merely asking what people do with media. They ask a more profound question: what constitutes the conditions of mediated experience in the first place? Beginning with an accessible introduction, this book invites readers to explore a wide range of phenomenological perspectives on media via two critical dialogues involving key thinkers alongside a series of theoretically sophisticated and empirically grounded chapters. In so doing, interdisciplinary media studies is brought into conversation with the work of philosophers such as Edmund Husserl, Martin Heidegger and Maurice Merleau-Ponty, as well as phenomenologically-inspired thinkers such as Erving Goffman, Pierre Bourdieu, Tim Ingold, Henri Lefebvre, Friedrich Kittler, Marshall McLuhan and Bernard Stiegler.
Prominent media scholars have argued that the dissemination of propaganda is an important function of the news media. Yet, despite public controversies about 'fake news' and 'misinformation', there has been very little discussion on techniques of propaganda. Building on critical theory, most notably Herman and Chomsky's Propaganda Model, Florian Zollmann's pioneering study brings propaganda back to the forefront of the debate. On the basis of a forensic examination of 1,911 newspaper articles, Zollmann investigates US, UK and German media reporting of the military operations in Kosovo, Iraq, Libya, Syria and Egypt. The book demonstrates how 'humanitarian intervention' and 'R2P' are only evoked in the news media if so called 'enemy' countries of Western states are the perpetrators of human rights violations. Zollmann's work evidences that the news media plays a crucial propaganda role in facilitating a selective process of shaming during the build-up towards military interventions. This process has led to an erosion of internationally agreed norms of non-intervention, as enshrined in the UN Charter.
As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.
Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.
Web 25: Histories from the First 25 Years of the World Wide Web celebrates the 25th anniversary of the Web. Since the beginning of the 1990s, the Web has played an important role in the development of the Internet as well as in the development of most societies at large, from its early grey and blue webpages introducing the hyperlink for a wider public, to today's multifacted uses of the Web as an integrated part of our daily lives. This is the first book to look back at 25 years of Web evolution, and it tells some of the histories about how the Web was born and has developed. It takes the reader on an exciting time travel journey to learn more about the prehistory of the hyperlink, the birth of the Web, the spread of the early Web, and the Web's introduction to the general public in mainstream media. Furthermore, case studies of blogs, literature, and traditional media going online are presented alongside methodological reflections on how the past Web can be studied, as well as accounts of how one of the most important source types of our time is provided, namely the archived Web. Web 25: Histories from the First 25 Years of the World Wide Web is a must-read for anyone interested in how our online present has been shaped by the past.
The continuous evolution of internet and related social media technologies and platforms have opened up vast new means for communication, socialization, expression, and collaboration. They also have provided new resources for researchers seeking to explore, observe, and measure human opinions, activities, and interactions. However, those using the internet and social media for research - and those tasked with facilitating and monitoring ethical research such as ethical review boards - are confronted with a continuously expanding set of ethical dilemmas. Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts directly engages with these discussions and debates, and stimulates new ways to think about - and work towards resolving - the novel ethical dilemmas we face as internet and social media-based research continues to evolve. The chapters in this book - from an esteemed collection of global scholars and researchers - offer extensive reflection about current internet research ethics and suggest some important reframings of well-known concepts such as justice, privacy, consent, and research validity, as well as providing concrete case studies and emerging research contexts to learn from.
In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.
In the first systematic account of judicial rulings striking down cyberbullying laws in the United States and Canada, Sympathy for the Cyberbully offers an unapologetic defense of online acid-tongued disparagers and youthful and adult sexters. In the first decade of the 21st century, legitimate concerns about the harmful effects of cyberbullying degenerated into a moral panic. The most troubling aspect of the panic has been a spate of censorship-the enactment of laws which breach long-standing constitutional principles, by authorizing police to arrest and juries to convict, and schools to suspend, individuals for engaging in online expression that would be constitutionally protected had it been communicated offline. These hastily drawn statutes victimize harsh critics of elected officials, scholars, school officials and faculty, distributors of constitutionally protected pornography, adolescents "talking smack," and teens who engage in the consensual exchange of nude images, even in states where teens of a certain age enjoy the right to engage in sexual relations. The victims' stories are told here. Sympathy for the Cyberbully is suitable for undergraduate, graduate and law school courses in media law, First Amendment law and free expression.
'Complex Worlds: Digital Culture, Rhetoric, and Professional Communication' is a collection of thought-provoking scholarly essays by teachers and industry practitioners in professional communication and technology-oriented fields. Scrupulously edited for a range of readers, the collection aims to help familiarize advanced students, teachers, and researchers in professional communication, computers and writing, literacy, and sister disciplines with key issues in digital theory and practice. An emphasis on the situations of and audiences for digital communication identifies 'Complex Worlds' as a rhetorical approach. In an era when globalizing markets and digital technologies are transforming culture around the world, readers should find the collection both engaging and timely. The collections' twelve essays constitute a diverse and thematically coherent set of inquiries. Included are explorations of topics such as cyber activism, digital 'dispositio', citizen and open-source journalism, broadband affordances, XML, digital resumes, avant garde performance art, best pedagogical practices, and intercultural communication between East and West, North and South. The text is especially well suited for advanced courses in professional and applied writing, contemporary rhetorics, and digital culture. The complexity highlighted in the collection's title is brought into relief by authors who address how the digital is daily unmaking our assumptions about the boundaries between work and school, the global and the local, the private and the public. 'Complex Worlds' offers readers an opportunity to build on their rhetorical awareness by expanding their understanding of the means, aims, and strategies of effective communication--today and in the future.
Technological changes have radically altered the ways in which people use visual images. Since the invention of photography, imagery has increasingly been used for entertainment, journalism, information, medical diagnostics, instruction, branding and communication. These functions move the image beyond aesthetic issues associated with art and into the realm of communication studies. This introductory textbook introduces students to the terminology of visual literacy, methods for analyzing visual media, and theories on the relationship between visual communication and culture. Exploring the meanings associated with visual symbols and the relationship of visual communication to culture, this book provides students with a better understanding of the visually oriented world in which they live. From cave art to virtual reality, all visual media are discussed with methods for evaluation. Student-friendly features such as boxed topics, key terms, web resources, and suggestions for exercises are provided throughout.
This book brings together the state of the art and current debates in the field of formative research, and examines many of the innovative methods largely overlooked in the available literature. This book will help social marketing to move beyond surveys and focus groups. The book addresses the needs of social marketing academics and practitioners alike by providing a robust and critical academic discussion of cutting-edge research methods, while demonstrating at the same time how each respective method can help us arrive at a deeper understanding of the issues that social marketing interventions are seeking to remedy. Each chapter includes a scholarly discussion of key formative research methods, a list of relevant internet resources, and three key readings for those interested in extending their understanding of the method. Most chapters also feature a short case study demonstrating how the methods are used.
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.
Collective Action 2.0 explores the issues related to information and communication technologies (ICTs) in detail, providing a balanced insight into how ICTs leverage and interact with collective action, which will have an impact on the current discourse. Recent events in different authoritarian regimes, such as Iran and Egypt, have drawn global attention to a developing phenomenon in collective action: People tend to organize through different social media platforms for political protest and resistance. This phenomenon describes a change in social structure and behavior tied to ICT. Social media platforms have been used to leverage collective action, which has in some cases arguably lead, to political revolution. The phenomenon also indicates that the way information is organized affects the organization of social structures with which it interoperates. The phenomenon also has another side, which is the use of social media for activist suppression, state and corporate surveillance, commodifi cation of social processes, demobilization, or for the mobilization of collective action toward undesirable ends. |
You may like...
Research Anthology on Agile Software…
Information R Management Association
Hardcover
R14,523
Discovery Miles 145 230
Iberia, Land of Glaciers - How The…
Marc Oliva, David Palacios, …
Paperback
R3,342
Discovery Miles 33 420
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Active Geophysical Monitoring
Hitoshi Mikada, Michael S. Zhdanov, …
Paperback
R3,867
Discovery Miles 38 670
|