0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (165)
  • R250 - R500 (520)
  • R500+ (1,485)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Resolving the Gamer's Dilemma - Examining the Moral and Psychological Differences between Virtual Murder and Virtual... Resolving the Gamer's Dilemma - Examining the Moral and Psychological Differences between Virtual Murder and Virtual Paedophilia (Hardcover, 1st ed. 2016)
Garry Young
R1,888 Discovery Miles 18 880 Ships in 12 - 17 working days

This book explores the gamer's dilemma, which lies at the heart of theorising about the morality of certain video game content. The dilemma is as follows: given that gaming content involves virtual characters within a virtual environment, the moral permission of virtual murder would also appear to morally permit virtual paedophilia. Yet most gamers and members of wider society would not want to play, endorse, or find in any way morally acceptable the enactment of virtual paedophilia within a video game. Yet by accepting the moral permissibility of virtual murder they leave themselves vulnerable to having to accept the moral permissibility of virtual paedophilia. This book provides an incredibly thorough and systematic analysis and evaluation of the gamer's dilemma, by considering the origins of the intuitions around the dilemma, and exploring whether they find support from traditional or contemporary moral theory and psychological research. The book will be great interest to academics and students of philosophy and psychology, as well as members of the wider public interested in video game violence and taboo enactments more generally.

Homo Digitalis - How digitalisation is making us more human (Paperback): Thierry Geerts Homo Digitalis - How digitalisation is making us more human (Paperback)
Thierry Geerts
R440 Discovery Miles 4 400 Ships in 12 - 17 working days

'All new technology is accompanied with great expectations on the one hand and great fear on the other. Thierry Geerts reduces the digital revolution to its true proportions and shows that we control the impact of technology ourselves: technology becomes what we make of it. Few are better placed than the author to clearly define the potential, the tasks, and the responsibility that awaits each and every one of us.' - Caroline Pauwels, rector of the VUB 'After Digitalis drew up the contours of the new digital world, Homo digitalis now describes how we can appropriate it so that digitalisation will benefit humanity. But instead of trying to convince at all costs, Thierry Geerts puts things in perspective. With great expertise, he guides us through numerous groundbreaking initiatives that start-ups and companies in Europe have often developed.'- Alain Gerlache, journalist 'This book couldn't have come out at a better time. Change can be scary for many, but above all, it brings many opportunities. Thierry Geerts fantastically explains how Digitalis can be an inclusive place where social mobility and equality are self-evident. Now it's up to our entrepreneurs, policymakers, and each of us as individuals to gear up and resolutely opt for the digital future.' - Yasmien Naciri, entrepreneur and marketer 'Think about the reasons for technology. That is the challenge that Thierry Geerts takes on with gusto and enthusiasm in this fascinating book.' - Laurent Hublet, co-founder and CEO of BeCentral, the largest digitalis campus in Europe In Homo digitalis, Thierry Geerts, CEO of Google Belgium and Luxembourg, looks at the dangers and opportunities of the digital revolution. Without taboos and with an eye to the future, he offers thoughtful examples of how digitalisation affects us as people and as a society. His conclusion is clear: technology is neutral, and it's up to people to use it consciously and confidently. If we do that, digitalisation will make us happier, with more time for creativity, personal development, healthcare, and the things that really matter. Then we'll become more human and we homo sapiens will turn into homo digitalis.

Generic Top-Level Domains - A Study of Transnational Private Regulation (Hardcover): Tobias Mahler Generic Top-Level Domains - A Study of Transnational Private Regulation (Hardcover)
Tobias Mahler
R3,019 Discovery Miles 30 190 Ships in 12 - 17 working days

This topical book critically examines the regulatory framework for generic Top-Level Domains (gTLDs) on the Internet. The regulation drawn up by the Internet Corporation for Assigned Names and Numbers (ICANN) applies at a global level, complementing national and international law. These rules form part of a growing body of transnational private regulation. Generic Top-Level Domains offers a clear and engaging analysis of how ICANN has tackled a diverse set of regulatory issues related to the introduction of new gTLDs, such as property rights, competition and consumer protection. Studying recent case law, the book argues for a stronger focus on procedural fairness for future introductions of new gTLDs. It also highlights how ICANN's contractual framework regulates the registration and use of domain names and argues that ICANN's regulatory authority ought to be clarified in order to avoid regulatory overreach. Uniquely comprehensive, this book will appeal to students and scholars with an interest in Internet governance, domain name law and transnational private regulation. Practitioners working in the domain name industry will also find this a valuable resource.

African Data Privacy Laws (Hardcover, 1st ed. 2016): Alex B. Makulilo African Data Privacy Laws (Hardcover, 1st ed. 2016)
Alex B. Makulilo
R4,758 R2,718 Discovery Miles 27 180 Save R2,040 (43%) Ships in 12 - 17 working days

This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws. In addition, it covers all sub-regional and regional data privacy policies in Africa. Apart from analysing data protection law, the book focuses on the socio-economic contexts, political settings and legal culture in which such laws developed and operate. It bases its analyses on the African legal culture and comparative international data privacy law. In Africa protection of personal data, the central preoccupation of data privacy laws, is on the policy agenda. The recently adopted African Union Cyber Security and Data Protection Convention 2014, which is the first and currently the only single treaty across the globe to address data protection outside Europe, serves as an illustration of such interest. In addition, there are data protection frameworks at sub-regional levels for West Africa, East Africa and Southern Africa. Similarly, laws on protection of personal data are increasingly being adopted at national plane. Yet despite these data privacy law reforms there is very little literature about data privacy law in Africa and its recent developments. This book fills that gap.

Security Risk Models for Cyber Insurance (Hardcover): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Hardcover)
Caroline Baylon, Jose Vila, David Rios Insua
R3,457 Discovery Miles 34 570 Ships in 12 - 17 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

AI for the Sustainable Development Goals (Paperback): Henrik Skaug Saetra AI for the Sustainable Development Goals (Paperback)
Henrik Skaug Saetra
R722 Discovery Miles 7 220 Ships in 12 - 17 working days

accessible for readers unfamiliar with both SDGs and ESG concepts; it will enable leaders and businesses to assess deployment and development of AI more easily

Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover): T. Ananth Kumar, T. S. Arun Samuel, R.... Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover)
T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy
R3,466 Discovery Miles 34 660 Ships in 12 - 17 working days

This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition): Rebecca Herold Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition)
Rebecca Herold
R3,773 Discovery Miles 37 730 Ships in 12 - 17 working days

Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:

  • Lists the laws and associated excerpts of the specific passages that require training and awareness
  • Contains a plethora of forms, examples, and samples in the book's 22 appendices
  • Highlights common mistakes that many organizations make
  • Directs readers to additional resources for more specialized information
  • Includes 250 awareness activities ideas and 42 helpful tips for trainers

Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.

Praise for:

The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly..
-NoticeBored.com

The Future of You - Can Your Identity Survive 21st-Century Techonology? (Hardcover): Tracey Follows The Future of You - Can Your Identity Survive 21st-Century Techonology? (Hardcover)
Tracey Follows
R329 Discovery Miles 3 290 Ships in 12 - 17 working days

In the future, how many identities will you have? How many do you want? Digital technology is causing us to think differently about who we are and who we could become, but with the right knowledge we can turn this incredible capacity to our advantage. 'Who am I?' is one of the most fundamental questions of all. But it is becoming increasingly difficult to answer as technology enables us to negotiate and create many different versions of ourselves. In our digital, data-driven world, Facebook gets a say in verifying who we are, science can alter our biology, and advances in AI are revolutionizing not only how we interact online but with the physical world around us. Understanding and defining ourselves is becoming confusing but, as this fascinating book argues, it is possible to embrace this new era of transformation while preserving our autonomy. In The Future of You, Professional futurist Tracey Follows shows how our personal freedoms and potential will be transformed over the coming decades. From health passports, bio-hacking and relationships with machines to mind clones, digital voting and virtual legacies beyond the grave, we need to understand these vital issues today so that we might design the future of our identity tomorrow. 'This fascinating book explores the way that emerging technologies such as AI might affect the nature of personal identity and personhood. It paints an intriguing, thought-provoking, and occasionally disturbing picture.' Michael Wooldridge, author of The Road to Conscious

Entertain me! by Schoen magazine - From music to film to fashion to art (Hardcover): Raoul Keil Entertain me! by Schoen magazine - From music to film to fashion to art (Hardcover)
Raoul Keil
R839 Discovery Miles 8 390 Ships in 12 - 17 working days

Entertain Me! features the most popular influencers and celebrities from Schoen! magazine, a biannual English language publication and online platform with a cutting-edge aesthetic. This book presents a visual explosion of talent in film, music, TV, fashion and art from its debut as an online forum in 2009 to 2020. Stunning photographs from the worlds of culture, fashion, and beauty showcase the biggest names and rising stars who entertain and lead the world in high-octane creativity. It will appeal to the visionary, the collector, and the fashion-conscious, and is intended not only for the magazine's established and loyal readership, but also for a broader demographic of readers around the globe who monitor the pulse of the latest in creative talent.

Cyberspace and Cybersecurity (Paperback, 2nd edition): George Kostopoulos Cyberspace and Cybersecurity (Paperback, 2nd edition)
George Kostopoulos
R1,309 Discovery Miles 13 090 Ships in 12 - 17 working days

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

Social Media Warfare - Equal Weapons for All (Paperback): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Paperback)
Michael Erbschloe
R1,312 Discovery Miles 13 120 Ships in 12 - 17 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback): William R. Simpson Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback)
William R. Simpson
R1,325 Discovery Miles 13 250 Ships in 12 - 17 working days

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.

Analyzing and Securing Social Networks (Paperback): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Paperback)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R1,350 Discovery Miles 13 500 Ships in 12 - 17 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback): Todd Fitzgerald Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback)
Todd Fitzgerald
R1,368 Discovery Miles 13 680 Ships in 12 - 17 working days

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.

Regulating Blockchain - Critical Perspectives in Law and Technology (Paperback): Robert Herian Regulating Blockchain - Critical Perspectives in Law and Technology (Paperback)
Robert Herian
R1,011 Discovery Miles 10 110 Ships in 12 - 17 working days

As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as 'revolutionary' and 'disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its 'ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.

A Unified Theory of Cats on the Internet (Paperback): E. J White A Unified Theory of Cats on the Internet (Paperback)
E. J White
R346 R290 Discovery Miles 2 900 Save R56 (16%) Ships in 10 - 15 working days

How cats became the undisputed mascot of the internet. The advertising slogan of the social news site Reddit is "Come for the cats. Stay for the empathy." Journalists and their readers seem to need no explanation for the line, "The internet is made of cats." Everyone understands the joke, but few know how it started. A Unified Theory of Cats on the Internet is the first book to explore the history of how the cat became the internet's best friend. Internet cats can differ in dramatic ways, from the goth cats of Twitter to the glamourpusses of Instagram to the giddy, nonsensical silliness of Nyan Cat. But they all share common traits and values. Bringing together fun anecdotes, thoughtful analyses, and hidden histories of the communities that built the internet, Elyse White shows how japonisme, punk culture, cute culture, and the battle among different communities for the soul of the internet informed the sensibility of online felines. Internet cats offer a playful-and useful-way to understand how culture shapes and is shaped by technology. Western culture has used cats for centuries as symbols of darkness, pathos, and alienation, and the communities that helped build the internet explicitly constructed themselves as outsiders, with snark and alienation at the core of their identity. Thus cats became the sine qua non of cultural literacy for the Extremely Online, not to mention an everyday medium of expression for the rest of us. Whatever direction the internet takes next, the "series of tubes" is likely to remain cat-shaped.

You're On Mute - 101 Tips to Add Zip to your Zoom (Paperback): Jo Hoare You're On Mute - 101 Tips to Add Zip to your Zoom (Paperback)
Jo Hoare
R205 R166 Discovery Miles 1 660 Save R39 (19%) Ships in 9 - 15 working days

With 101 tips explaining the dos and don'ts of virtual meetings, delivered with abundant humour, You're On Mute will help you master video calls in "the new normal." If life on Zoom is getting you down and you're dreading the next inevitable invite to a Teams meeting, don't panic, help is at hand. Whether you need to stop doing that weird wave at the end of meetings or want to break the habit of being transfixed by your own face in the corner of the screen, the fun advice inside this book has got you covered. Advice includes: Mastering online etiquette - from the right way to say hello to the right time to hang up How to make multi-generational family video calls workable for both grandparents and children ("You're still on mute, grandma!") Ensuring your next video quiz is an entertaining test of knowledge rather than a painful test of endurance Best practices for work-related video calls, from being sensitive to camera-shy coworkers to the ideal backdrop for a job interview Successfully navigating an online romance, covering first dates to long-term relationships Avoiding the "must not dos" of video calls, whether it's the serious matter of security or the shame of surprise screen sharing In no time you'll be living your best life online, bringing your A game to any virtual work meeting, catch-up with family, quiz with friends, online date and more.

Network Better - How to meet, connect & grow your business (Paperback): Jeremy Marchant Network Better - How to meet, connect & grow your business (Paperback)
Jeremy Marchant
R391 R279 Discovery Miles 2 790 Save R112 (29%) Ships in 9 - 15 working days

Most books and presentations on networking stick to its behavioural aspects. This approach is necessary but not sufficient. Successful networking is about the successful initiation and nurturing of relationships with other business people, which requires emotional intelligence and an understanding of how to apply it in order to sustain networking relationships. When networking is not going well (or at all), many businesspeople's response is 'OK, I'm doing what you told me. How come it isn't working?' The answer is that people don't so much need behavioural tips (though these are always useful and are included in this book), they need to understand why they are getting in their own way, and how to move aside. On the whole, people don't successfully change their behaviour without understanding why they should. Network Better provides the necessary insight into what's going on as well as many practical, tried-and-tested suggestions and encouragements to enable you to do just that.

Culture Warlords - My Journey Into the Dark Web of White Supremacy (Paperback): Talia Lavin Culture Warlords - My Journey Into the Dark Web of White Supremacy (Paperback)
Talia Lavin
R526 R474 Discovery Miles 4 740 Save R52 (10%) Ships in 9 - 15 working days
The Bloomsbury Handbook of Electronic Literature (Hardcover): Joseph Tabbi The Bloomsbury Handbook of Electronic Literature (Hardcover)
Joseph Tabbi
R4,934 Discovery Miles 49 340 Ships in 12 - 17 working days

Winner of the 2017 N. Katherine Hayles Award for Criticism of Electronic Literature A CHOICE Outstanding Academic Title 2018 The digital age has had a profound impact on literary culture, with new technologies opening up opportunities for new forms of literary art from hyperfiction to multi-media poetry and narrative-driven games. Bringing together leading scholars and artists from across the world, The Bloomsbury Handbook of Electronic Literature is the first authoritative reference handbook to the field. Crossing disciplinary boundaries, this book explores the foundational theories of the field, contemporary artistic practices, debates and controversies surrounding such key concepts as canonicity, world systems, narrative and the digital humanities, and historical developments and new media contexts of contemporary electronic literature. Including guides to major publications in the field, The Bloomsbury Handbook of Electronic Literature is an essential resource for scholars of contemporary culture in the digital era.

Feminism, Writing and the Media in Spain - Ana Maria Matute, Rosa Montero and Lucia Etxebarria (Paperback, New edition): Mazal... Feminism, Writing and the Media in Spain - Ana Maria Matute, Rosa Montero and Lucia Etxebarria (Paperback, New edition)
Mazal Oaknin
R1,407 Discovery Miles 14 070 Ships in 12 - 17 working days

This book explores the different treatment of writing by women and writing by men in twenty-first-century Spain. Focusing on contemporary Spanish authors Ana Maria Matute (1926-2014), Rosa Montero (1952-), and Lucia Etxebarria (1966-), the author examines how Spanish women writers are marketed in Spain and, in particular, how current marketing strategies reinforce traditional structures of femininity. Through an analysis of their work and lives in the context of the Franco Regime, the Transition to democracy and contemporary Spain, this book provides an innovative study of the construction of the public personae of these key female writers. As social media and the internet transform authors' relationship with their readers, the rapidly shifting publishing industry offers an important context for the difficult balance between high levels of reception and visibility and the persistence of traditional gender stereotypes.

Influencing Health - A Comprehensive Guide to Working with Online Influencers (Hardcover): Amelia Burke-Garcia Influencing Health - A Comprehensive Guide to Working with Online Influencers (Hardcover)
Amelia Burke-Garcia
R3,885 Discovery Miles 38 850 Ships in 12 - 17 working days

The U.S., and countries around the globe, are facing an ever-evolving series of health issues, including obesity, food deserts, child hunger, poor maternal health outcomes, and the resurgence of communicable diseases. Traditionally, health communicators and marketers have talked about these issues in a vacuum, in which related information is only visible when people are specifically seeking it out. If we are to give global health the attention it deserves, we need to weave it into our everyday conversations and experiences. Ultimately, we need to normalize the conversation around health. The emergence of everyday online opinion leaders has created a whole new market for shifting consumer perceptions and behaviors. In fact, many of these everyday online opinion leaders, called influencers, have built such large-scale social media presences that they now have the voice, the platform, and the following to reach millions of people with personal points of view on any number of topics. There are great opportunities for engaging with online influencers to support health promotion programs. However, navigating this online community is new to many people. Understanding how this online community works, the opportunities for paid and unpaid engagements, and the value that health programs specifically have with this community, is paramount to successfully working with influencers. This book draws from research with over 400 online influencers, the latest industry data, and practical, real-world experiences working with influencers over the past ten years. An easy-to-read guidebook for marketers and health communicators alike, this book leverages storytelling as a means for sharing lessons-learned and providing readers with practical knowledge about the online marketing industry and influencer community, as they relate to health.

Twitter For Dummies 3e (Paperback, 3rd Edition): L Fitton Twitter For Dummies 3e (Paperback, 3rd Edition)
L Fitton
R541 R410 Discovery Miles 4 100 Save R131 (24%) Ships in 12 - 17 working days

A fully updated new edition of the fun and easy guide to getting up and running on Twitter With more than half a billion registered users, Twitter continues to grow by leaps and bounds. This handy guide, from one of the first marketers to discover the power of Twitter, covers all the new features. It explains all the nuts and bolts, how to make good connections, and why and how Twitter can benefit you and your business. * Fully updated to cover all the latest features and changes to Twitter * Written by a Twitter pioneer who was one of the first marketers to fully tap into Twitter's business applications * Ideal for beginners, whether they want to use Twitter to stay in touch with friends or to market their products and services * Explains how to incorporate Twitter into other social media and how to use third-party tools to improve and simplify Twitter

The Right To Be Forgotten - A Comparative Study of the Emergent Right's Evolution and Application in Europe, the Americas,... The Right To Be Forgotten - A Comparative Study of the Emergent Right's Evolution and Application in Europe, the Americas, and Asia (Hardcover, 1st ed. 2020)
Franz Werro
R4,592 Discovery Miles 45 920 Ships in 12 - 17 working days

This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression. According to its traditional understanding, this right gives individuals the possibility to preclude the media from revealing personal facts that are no longer newsworthy, at least where no other interest prevails. Cases sanctioning this understanding still abound in a number of countries. In today's world, however, the right to be forgotten has evolved, and it appears in a more multi-faceted way. It can involve for instance also the right to access, control and even erase personal data. Of course, these prerogatives depend on various factors and competing interests, of both private and public nature, which again require careful balancing. Due to ongoing technological evolution, it is likely that the right to be forgotten in some of its new manifestations will become increasingly relevant in our societies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,078 Discovery Miles 60 780
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,447 Discovery Miles 54 470
Financial Regulation and Technology - A…
Iain Sheridan Paperback R2,560 Discovery Miles 25 600
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo Paperback R639 Discovery Miles 6 390
Artificial Intelligence and the Media…
Taina Pihlajarinne, Anette Alen-Savikko Hardcover R3,161 Discovery Miles 31 610
The Honest Guide to Becoming A Digital…
Elizabeth Benton Paperback R202 Discovery Miles 2 020
From Striving to Thriving - A New Model…
Cliff Walker Paperback R295 R231 Discovery Miles 2 310
Computational Legal Studies - The…
Ryan Whalen Hardcover R3,502 Discovery Miles 35 020
Social Media Marketing - A Quickstudy…
Edwards Poster R212 Discovery Miles 2 120
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770

 

Partners