![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Indexing and information retrieval work properly only if language and interpretation are shared by creator and user. This is more complex for non-verbal media. The authors of Indexing Multimedia and Creative Works explore these challenges against a background of different theories of language and communication, particularly semiotics, questioning the possibility of ideal multimedia indexing. After surveying traditional approaches to information retrieval (IR) and organization in relation to issues of meaning, particularly Panofsky's 'levels of meaning', Pauline Rafferty and Rob Hidderley weigh up the effectiveness of major IR tools (cataloguing, classification and indexing) and computerised IR, highlighting key questions raised by state-of-the-art computer language processing systems. of Saussure, Peirce and Sonesson, they make the case for this as the basis for successful multimedia information retrieval. The authors then describe specific multimedia information retrieval tools: namely the Art and Architecture Thesaurus, Iconclass and the Library of Congress Thesaurus of General Materials I and II. A selection of multimedia objects including photographic images, abstract images, music, the spoken word and film are read using analytical and descriptive categories derived from the literature of semiotics. Multimedia information retrieval tools are also used to index the multimedia objects, an exercise which demonstrates the richness of the semiotic approach and the limitations of controlled vocabulary systems. In the final chapter the authors reflect on the issues thrown up by this comparison and explore alternatives such as democratic, user-generated indexing as an alternative. studies students, the breadth and depth of Indexing Multimedia and Creative Works will also make it relevant and fascinating reading for information professionals working with multimedia and digital archives, and for multimedia developers, computer scientists and electronic publishing specialists.
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
Traditional media is over. The internet reigns. And in the attention
economy, influencers are royalty. But who are they … and how do you
become one?
Our current legal system is to a great extent the product of an earlier period of social and economic transformation. From the late nineteenth century through the mid-twentieth century, as accountability for industrial-age harms became a pervasive source of conflict, the U.S. legal system underwent profound, tectonic shifts. Today, ownership of information-age resources and accountability for information-age harms have become pervasive sources of conflict, and different kinds of change are emerging. In Between Truth and Power, Julie E. Cohen explores the relationships between legal institutions and political and economic transformation. Systematically examining struggles over the conditions of information flow and the design of information architectures and business models, she argues that as law is enlisted to help produce the profound economic and sociotechnical shifts that have accompanied the emergence of the informational economy, it is too is transforming in fundamental ways. Drawing on elements from legal theory, science and technology studies, information studies, communication studies and organization studies to develop a complex theory of institutional change, Cohen develops an account of the gradual emergence of legal institutions adapted to the information age and of the power relationships that such institutions reflect and reproduce. A tour de force of ambitious interdisciplinary scholarship, Between Truth and Power will transform our thinking about the possible futures of law and legal institutions in the networked information era.
Facebook and Conversation Analysis investigates the structure and organization of comments on a major social media platform, Facebook, using applied conversation analysis methods. Providing previously undocumented insights into the structure of comment threads, this book demonstrates that they have a meaningful organization, rather than casually following one another. Although normally used to explore the structure of spoken conversations, in recent years conversation analysis approaches have been successfully applied to examine online interactions on Twitter, discussion forums and email exchanges. By turning this approach towards Facebook comments, Matteo Farina provides clear and important insights into the organization of this type of social interaction. Supported by a large sample of data, with findings based on a corpus of 213 comment threads, with over 1,200 comments exchanged by 266 contributors, this book makes an important contribution to our understanding of the way people communicate on Facebook.
Mass communication theories were largely built when we had mass media audiences. The number of television, print, film or other forms of media audiences were largely finite, concentrating people on many of the same core content offerings, whether that be the nightly news or a popular television show. What happens when those audiences splinter? The Rise and Fall of Mass Communication surveys the aftermath of exactly that, noting that very few modern media products have audiences above 1-2% of the population at any one time. Advancing a new media balkanization theory, Benoit and Billings neither lament nor embrace the new media landscape, opting instead to pinpoint how we must consider mass communication theories and applications in an era of ubiquitous choice.
'Being an adult is like trying to fold a fitted sheet.' 'I'm just a girl, standing in front of a salad, asking it to be a donut.' 'I was hot until my photoshop free-trial expired.' From Instagram to Twitter, we all want to be a social media star these days. But behind your phone screen are those perfectly filtered lives all they're really cracked up to be? For millennials everywhere comes a book that says what we're all really thinking. Whether it's stuffing your face with pizza while scrolling through Gigi Hadid's feed or experiencing life at the speed of fifteen WTF's per hour, this is the real life struggle of getting that double tap and achieving #goals.
This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader.
In Digital Data Collection and Information Privacy Law, Mark Burdon argues for the reformulation of information privacy law to regulate new power consequences of ubiquitous data collection. Examining developing business models, based on collections of sensor data - with a focus on the 'smart home' - Burdon demonstrates the challenges that are arising for information privacy's control-model and its application of principled protections of personal information exchange. By reformulating information privacy's primary role of individual control as an interrupter of modulated power, Burdon provides a foundation for future law reform and calls for stronger information privacy law protections. This book should be read by anyone interested in the role of privacy in a world of ubiquitous and pervasive data collection.
In today's digital world our social interactions often take place in the form of written comments. We chat, disagree, worship, vent, confess, and even attack in written form in public digital spaces. Drawing on scholarly literature from media and cultural studies, psychology and sociology, Uncovering Commenting Culture charts this commenting territory and outlines why we behave in these ways online. In this timely book, Renee Barnes provides a participatory model for understanding commenting culture that is based on the premise that our behaviours online-including those that cause us most the concern-are not so much an internet problem as a social problem. By looking at a wide variety of online commenting habitats, from the comment threads following news stories, through to specialist forums and social media platforms, the volume provides a comprehensive understanding of the role of online commenting in society and provides suggestions for how we might mitigate bad behaviours.
Micronesia, Hawaii, Polynesia, Bora Bora, Seychelles, Maldives, Australia - where does the mind go when imagining such places. Drawn from the best travel blogs and Instagram images, this book brings together the most beautiful locations near, on, or under water. From eco resorts to remote, pristine islands; from sailing on ultra-blue oceans to diving in translucent waters; in aerial and underwater photography, the focus is on finding paradise. Whether thinking about a trip or longing for sun and sand, this book is where those daydreams begin.
Continuing the explorations begun in the first two Produsing Theory volumes, this book investigates some of the tensions generated in the spaces enabled by the confluence of the formerly disparate activities of producing and consuming media. Multiple and varied theories-some still emerging-are invoked in attempts to illuminate the spaces between what previously had been neatly-separated components of media systems. This book is useful in a number of courses such as media culture and theory, introduction to new media, the Internet and the audience, new media theory and research, mass communication theory, emerging media, critical analysis and new media, concepts of new media, new media participants, new media in a democratic society, critical studies in new media, new media and social media, digital media studies, participatory media, media audiences in a digital world, digital cultures and social media, Web culture and new media studies, introduction to new media, new media and society, and more.
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says "knows all of Anonymous' deepest, darkest secrets." Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book. The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters-such as Topiary, tflow, Anachaos, and Sabu-emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of "trolling," the ethics and metaphysics of hacking, and the origins and manifold meanings of "the lulz."
This academic analysis explores social media, specifically examining its influence on the cultural, political, and economic organization of our society and the role capitalism plays within its domain. In this examination of society and technology, author and educator Derek Hrynyshyn explores the ways in which social media shapes popular culture and how social power is expressed within it. He debunks the misperception of the medium as a social equalizer-a theory drawn from the fact that content is created by its users-and compares it to mass media, identifying the capitalist-driven mechanisms that drive both social media and mass media. The work captures his assessment that social media legitimizes the inequities among the social classes rather than challenging them. The book scrutinizes the difference between social media and mass media, the relationship between technologies and social change, and the role of popular culture in the structure of political and economic power. A careful look at social media networks such as Facebook, Twitter, and Google suggests that these tools are systems of surveillance, monitoring everyday activities for the benefit of advertisers and the networks themselves. Topics covered within the book's 10 detailed chapters include privacy online, freedom of expression, piracy, the digital divide, fragmentation, and social cohesion. Explores the use of blogs, Facebook, and Twitter in revolutionary political action and the effects of "viral" campaigns on political culture Uncovers the truth behind piracy infringements on popular cultural industries Reveals the hidden factors driving the rapid expansion of social media Discusses how capitalism affects the development of social media Examines how social media shares characteristics with and differs from mass media
Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.
AN FT BUSINESS BOOK OF THE MONTH 'An essential read' Diane Coyle, University of Cambridge 'We are currently living in a moment of extreme pessimism about data. This book will change your mind.' It's impossible to escape digital technology. And with that comes fear. But whatever the news has told you about data and technology, think again. Data expert and tech insider turned Cambridge researcher Sam Gilbert shows that, actually, this data revolution could be the best thing that ever happened to us. Good Data examines the incredible new ways this information explosion is already helping us - whether that's combating inequality, creating jobs, advancing the frontiers of knowledge or protecting us from coronavirus. We are standing on the edge of greatness, we just need to know how to get there. 'A great read and really thought-provoking ... Challenges the surveillance capitalism narrative' Rory Cellan-Jones, BBC 'Good Data weaves some thorny issues into a story that is positive, interesting, easy to read and provides valuable insight' Peter Turner, Chief Commercial Officer, Avast
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
Although hip hop culture has widely been acknowledged as a global cultural movement, little attention has been given to women's participation in hip hop culture in various parts of the world or how this participation interacts with and impacts the lives of other women. Hip Hop Harem is the first book solely dedicated to female rap artists in the Middle East and North Africa region. Throughout the book, Angela S. Williams explores the work of seven prominent rappers from the region. Through the lens of hip hop feminism, she seeks to express how the artists' work affects female audience members who relate to themes of self-determination and liberation within their own lives. The popular imagery of the harem is flipped, turned on its head in likely hip hop fashion, as the artists speak back to voices of male dominance and a power structure that has sought to define them and the region.
The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.
The question of governance of the Internet is increasing in
significance. The United Nations' World Summit on the Information
Society, held in two phases in 2003 and 2005, provoked heated
debate, and the resultant meetings of the Internet Governance Forum
that followed this have been the subject of growing public and
media interest. Yet governance of the Internet is multifaceted,
complex, and far from transparent, and there has been little
written about the subject which is detailed, systematic, and
non-polemical. |
You may like...
Cultural Tourism in the Wake of Web…
J. Scott McDonald, John R Bennett Jr, …
Hardcover
R4,080
Discovery Miles 40 800
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,711
Discovery Miles 137 110
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
|