Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > General
Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.
Recent years have seen digital advertising grow to the point where it will soon overtake television as the no. 1 advertising medium. In the online environment, consumers interact and share their thoughts on brands and their experiences using them. These electronic word-of-mouth (eWOM) communications have become a very important to the success of products. In today's cluttered environment, it is especially important to study how the practice of eWOM advertising operates, and how marketers can influence eWOM in social media and other online sites. This volume starts with a chapter on the current state of knowledge on eWOM and then turns its attention to current research articles on a variety of eWOM formats. These include the posting of selfies on social media, the influence of review types on consumer perception and purchase intention, the effects of preannouncement messages, and how user-generated content can be used to induce effectiveness of eWOM on social media. The relationship of eWOM to brand building is emphasized in several of the chapters. This book was originally published as a special issue of the International Journal of Advertising.
The concept of immersive multimedia, which is closely related to concepts of augmented reality, brings opportunities in art, education, entertainment, and technology. As such, it is vital to explore the connections between consumers of media content and information parts that come from multimedia platforms. Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality is a critical scholarly resource that offers solutions to the problems that appear in both theoretical and practical dimensions of immersive multimedia experiences on an interdisciplinary platform. Featuring coverage on a broad range of topics such as cyber behavior, human-computer interaction, and transmedia, this book is geared towards digital artists, media professionals, developers, academicians, researchers, and upper-level graduate students seeking current research on the exploration of immersive multimedia through the perspectives of technology, communications, and art.
Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.
3D printing poses many challenges to the traditional law of intellectual property (IP). This book develops a technical method to help overcome some of these legal challenges and difficulties. This is a collection of materials from empirical interviews, workshops and publications that have been carried out in one of the world's leading research projects into the legal impact of 3D printing. The project was designed to establish what legal challenges 3D printing companies thought they faced, and having done that, to establish a technical framework for a solution.
Our world and the people within it are increasingly interpreted and classified by automated systems. At the same time, automated classifications influence what happens in the physical world. These entanglements change what it means to interact with governance, and shift what elements of our identity are knowable and meaningful. In this cyber-physical world, or 'world state', what is the role for law? Specifically, how should law address the claim that computational systems know us better than we know ourselves? Monitoring Laws traces the history of government profiling from the invention of photography through to emerging applications of computer vision for personality and behavioral analysis. It asks what dimensions of profiling have provoked legal intervention in the past, and what is different about contemporary profiling that requires updating our legal tools. This work should be read by anyone interested in how computation is changing society and governance, and what it is about people that law should protect in a computational world.
Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.
Mothers have been looking for the middle ground for more than half a century. Staying at home and raising the kids full-time isn't it. Working full-time and rushing home to tuck the kids in at 7 p.m. sharp ain't it either. Even part-time work outside the house can be a scramble for most women, as they try to 'have it all' between 9 am and 5 pm. To work or not to work? That seems to be the bottom-line question for most women today. But, Audrey McClelland and Colleen Padilla are proving that the equation is changing. Both of them left behind the corporate ladder and Ivy League degrees to stay home with their children; but, instead of assigning them permanent stay-at-home status, this choice was the catalyst to their reinvention. Miles apart, they each sat down at their computers one day and began to blog. Slowly but surely, their audiences grew. The portability of computers and smart-phones, the connective powers of social networks, and an overwhelming desire to happily mix work and family enabled them to move past the Mommy Wars (i.e. stay at home mom vs. working mom) into a territory all their own. Audrey and Colleen literally blogged, tweeted, skyped, vlogged, and facebooked their ways to the top. In "The Digital Mom Handbook", they will show other moms how to find middle ground - via the frontier of the Internet - too. Do you want to be a booming six-figure eBay saleswoman? A 20-hour-a-week brand consultant? A local Twitter correspondent? The terms are yours to define. Money, hours-per-week, title - these don't dictate your Digital Mom success. Personal satisfaction does. According to Audrey and Colleen, finding middle-ground requires 7 basic steps that moms can start using now to achieve the kind of success they desire: find your passion (look around, stake out your turf); hang a digital 'shingle' and start typing; find your tribe and forge alliances; let karma breed opportunity (carefully make the most of your network); don't forget the children! (define your version of success and make sure you're truly on middle ground); manage the Benjamins (a.k.a. 'the money'); and, live happily ever after (live your values).
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.
Multimedia, which may be defined as interactive digital media, is a synthesis of traditional forms of art and communication with the rapidly-evolving fields of computing and networking. A variety of technical and social/cultural disciplines are involved: audio, graphic, hardware, human factors, networking, software, telecommunications, and video. A large and often incomprehensible vocabulary has resulted from the convergence of these diverse disciplines. Comprehensive, concise and clearly written, The Dictionary of Multimedia presents and defines the "language" that has resulted from this convergence -- from A: B: C notation to z-sorting. Industry-standard acronyms are also spelled out and defined. Extended definitions of important concepts such as MIDI Fire Wire, and MPEG are included. Features of the new Second Edition include: more than 4,000 terms (50% more than in the 1998 edition); additional illustrations and graphic examples; in-depth treatment of Internet technologies: XML, HTML 4.0, JavaScript; new standards: MPEG-2 and other video codecs, DVD, VRML, Dolby Audio; new bus architectures and operating systems; updated treatment of the latest hardware; JAVA programming references; etc.
Social media pervades people's awareness and everyday lives while also influencing societal and cultural patterns. In response to the social media age, advertising agents are creating new strategies that best suit changing consumer relationships. The Handbook of Research on Effective Advertising Strategies in the Social Media Age focuses on the radically evolving field of advertising within the new media environment. Covering new strategies, structural transformation of media, and changing advertising ethics, this book is a timely publication for policymakers, government officials, academicians, researchers, and school practitioners interested in furthering their research exposure and analyzing the rapidly evolving advertising sector and its reflection on social media.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
From Style Rookie to Style Bubble, personal style blogs exploded onto the scene in the mid-2000s giving voice to young and stylish writers who had their own unique take on the seasonal fashion cycle and how to curate an individual style within the shifting swirl of trends. Personal Style Blogs examines the history and rise of style blogging and looks closely at the relationship between bloggers and their (often anonymous) readers as well as the response of the fashion industry to style bloggers' amateur and often unauthorized fashion reportage. The book charts the development of the style blogosphere and its transformation from an alternative, experimental space to one dominated by the fashion industry. Complete with examples of several famous fashion bloggers, such as Susie Lau, Rumi Neely and Tavi Gevinson, the author explores notions of individuality, aesthetics and performance on both sides of the digital platform. Findlay asks: what can style blogging teach us about women's writing and the performance of a private self online? And what drives style bloggers to carve a space for themselves online?
This book provides a comprehensive guide to procuring, utilizing and monetizing intellectual property rights, tailored for readers in the high-tech consumer electronics and software industries, as well as technology startups. Numerous, real examples, case studies and scenarios are incorporated throughout the book to illustrate the topics discussed. Readers will learn what to consider throughout the various creative phases of a product's lifespan from initial research and development initiatives through post-production. Readers will gain an understanding of the intellectual property protections afforded to U.S. corporations, methods to pro-actively reduce potential problems, and guidelines for future considerations to reduce legal spending, prevent IP theft, and allow for greater profitability from corporate innovation and inventiveness.
Grab your phone and your friends and start making fame-worthy content today! Get TikTok Famous Fast is a bite-sized guide to building your own empire on TikTok and using it as a launchpad for your personal brand and media career. Top TikTok stars and industry insiders provide their tips on how be a hit, how to make your content the best possible, how to tap into the latest memes and trends, how to edit and - most importantly - how to grow your following.
Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.
7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.
Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist theory, social learning theory, and postmodernism, this text paves the way for those who seek to tackle the most pertinent areas in technocrime. Technocrime and Criminological Theory challenges readers to confront the conflicts, gaps, and questions faced by both scholars and practitioners in the field. This book serves as an ideal primer for scholars beginning to study technocrime or as a companion for graduate level courses in technocrime or deviance studies.
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam. The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.
Alright guys? It's me, Arron. Or as some people call me, 'that guy with the phone, the skinny jeans and the really fat head on Facebook'. In a world that seems to be freefalling without a parachute towards utter chaos, I'm here to remind you that when life gives you lemons, make lemonade. No, in fact, when life gives you lemons, make a fool out of yourself in the lemonade aisle.* Because there's more to life than Brexit, Bake Off and banging on about being vegan. Yes, with this book - which is my take on the world - you will learn how to survive a proper lads' holiday, become a master in the art of takeaway ordering and find out about the pitfalls of seriously inappropriate tattoos. So do yourself a favour: turn off the news, cancel that juice cleanse, open your eyes to the brilliant, hilarious world we live in and most importantly . . . buy this book. SEE YA LATER! Arron x *Actually, don't do exactly that, that's my thing. |
You may like...
|