![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Make friends and sell things to people through social media Social media technology is restlessly inventive, providing thousands of awesome ways for you to market your business inexpensively and on a large scale--often directly into the pockets of consumers. But in the proliferating, ever-changing world of tweets, influencers, handles, and alerts, it can be hard to know where to begin and then to evaluate what's actually working for you. In the new edition of Social Media Marketing for Dummies, leading SMM voices Shiv Singh and Stephanie Diamond clear away the confusion and show you the smartest, most effective ways to plan, launch, manage, and assess your campaigns--and then iterate and optimize for increased success. Incorporating the latest trends and presented in a friendly, easily digestible step-by-step style, you'll find the ultimate blueprint for developing your best SMM strategy. In no time, you'll find out how to line up with Facebook, Twitter, Tumblr, and Google, develop a unique and compelling voice, and influence your key audience all the way to the bank. Choose the best SMM combination for you Avoid common mistakes and pitfalls Track your customers from awareness to retention Try out the latest stuff that really works Whether your organization is large or small, it simply doesn't pay to be shy. Find your voice, get social, and chat your way to attracting and keeping new customers today!
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.
What role does social media play in the lives of Chinese youths as they adapt to the rapid economic and social changes in modern China? This book examines the social media experiences and practices of young middle class Chinese who moved to Beijing to study and with the hope of work and participation in the possibilities of social and professional life. Through an analysis of their use of WeChat we explore their enthusiasm for self-expression online, their mediated social relations (guanxi) with family, friends, classmates and colleagues and their engagement with questions of online civility. The authors argue that sustaining personal and social relationships in the context of China's modernity, including its soft regulation of internet and social media, demands new norms of positivity and online civility. This is framed by several tensions: between emerging opportunities for freedom of expression and long-standing traditions of social identity and reputation such as face (lian and mianzi); between traditional obligations to parents (xiaoshun) and the desire for personal autonomy; and the pressure to constitute and govern the internet as a space of positive energy and civility in support of national Chinese sovereignty. The social media practices and deliberations of the participants reveal a fascinating amalgam of traditional Chinese culture and philosophy and reflections on tradition and collectivism combined with an embrace of Western-influenced ideas of positive psychology, self-expression, social networks and pragmatic social relations.
THIS ISN'T AN EPISODE OF BLACK MIRROR. THIS. IS. THE. FUTURE. The problem of online disinformation is only getting worse. Social media may well play a role in the the US 2020 presidential election and other major political events. But that doesn't even begin to describe what future propaganda will look like. As Samuel Woolley shows, we will soon be navigating new technologies such as human-like automated voice systems, machine learning, 'deep-fake' AI-edited videos and images, interactive memes, virtual reality and augmented reality. In stories both deeply researched and compellingly written, Woolley describes this future, and explains how the technology can be manipulated, who might control it and its impact on political strategy. Finally, Woolley proposes strategic responses to this threat with the ultimate goal of empowering activists and pushing technology builders to design for democracy. We may not be able to alter how the internet was used to challenge democracy in years past but we can follow the signals to prevent manipulation in the future - and to use these powerful new tools not to control people but to empower them.
How do people avoid the stresses of the digital age? Urban dwellers must now turn to nature to recover, restore and rebalance after the stresses brought on by relentless digital connectivity. It is easy to task nature as the cure, with technology as the ailment. In Network Nature, Richard Coyne challenges the definitions of both the natural and the artificial that support this time-worn narrative of nature's benefits. In the process, he attacks the counter-claim that nature must succumb to the sovereignty of digital data. Covering a spectrum of issues and concepts, from big data and biohacking to animality, numinous spaces and the post-digital, he draws on the rich field of semiotics as applied to natural systems and human communication, to enhance our understanding of place, landscape and architecture in a digital world.
Are you considering a career in social media? Are you an entrepreneur or freelancer looking to boost your online content marketing? Maybe you're looking for your next career pivot, or you're simply seeking skills to give your CV that competitive edge? Wherever you are in your career, Confident Digital Content can help. Covering the essentials of online content, this book takes you through everything you need to know - from how to write effectively for online platforms, through to video, audio, graphic design and photography. Featuring inspiring case studies from individuals at companies including CNN International, Mumsnet, Bunster's Hot Sauce and HuffPost UK, this practical beginner's guide includes guidance on content marketing strategy, metrics and community management. This updated second edition features advice on the latest trends, including fake news, the importance of stories and social listening analysis. Though trends, fads and hashtags change, the principles of great online content remain the same - let Confident Digital Content give you the grounding you need to ace your social channels and supercharge your career. About the Confident series... From coding and web design to data, digital content and cyber security, the Confident books are the perfect beginner's resource for enhancing your professional life, whatever your career path.
Indexing and information retrieval work properly only if language and interpretation are shared by creator and user. This is more complex for non-verbal media. The authors of Indexing Multimedia and Creative Works explore these challenges against a background of different theories of language and communication, particularly semiotics, questioning the possibility of ideal multimedia indexing. After surveying traditional approaches to information retrieval (IR) and organization in relation to issues of meaning, particularly Panofsky's 'levels of meaning', Pauline Rafferty and Rob Hidderley weigh up the effectiveness of major IR tools (cataloguing, classification and indexing) and computerised IR, highlighting key questions raised by state-of-the-art computer language processing systems. of Saussure, Peirce and Sonesson, they make the case for this as the basis for successful multimedia information retrieval. The authors then describe specific multimedia information retrieval tools: namely the Art and Architecture Thesaurus, Iconclass and the Library of Congress Thesaurus of General Materials I and II. A selection of multimedia objects including photographic images, abstract images, music, the spoken word and film are read using analytical and descriptive categories derived from the literature of semiotics. Multimedia information retrieval tools are also used to index the multimedia objects, an exercise which demonstrates the richness of the semiotic approach and the limitations of controlled vocabulary systems. In the final chapter the authors reflect on the issues thrown up by this comparison and explore alternatives such as democratic, user-generated indexing as an alternative. studies students, the breadth and depth of Indexing Multimedia and Creative Works will also make it relevant and fascinating reading for information professionals working with multimedia and digital archives, and for multimedia developers, computer scientists and electronic publishing specialists.
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
Traditional media is over. The internet reigns. And in the attention
economy, influencers are royalty. But who are they … and how do you
become one?
Our current legal system is to a great extent the product of an earlier period of social and economic transformation. From the late nineteenth century through the mid-twentieth century, as accountability for industrial-age harms became a pervasive source of conflict, the U.S. legal system underwent profound, tectonic shifts. Today, ownership of information-age resources and accountability for information-age harms have become pervasive sources of conflict, and different kinds of change are emerging. In Between Truth and Power, Julie E. Cohen explores the relationships between legal institutions and political and economic transformation. Systematically examining struggles over the conditions of information flow and the design of information architectures and business models, she argues that as law is enlisted to help produce the profound economic and sociotechnical shifts that have accompanied the emergence of the informational economy, it is too is transforming in fundamental ways. Drawing on elements from legal theory, science and technology studies, information studies, communication studies and organization studies to develop a complex theory of institutional change, Cohen develops an account of the gradual emergence of legal institutions adapted to the information age and of the power relationships that such institutions reflect and reproduce. A tour de force of ambitious interdisciplinary scholarship, Between Truth and Power will transform our thinking about the possible futures of law and legal institutions in the networked information era.
Facebook and Conversation Analysis investigates the structure and organization of comments on a major social media platform, Facebook, using applied conversation analysis methods. Providing previously undocumented insights into the structure of comment threads, this book demonstrates that they have a meaningful organization, rather than casually following one another. Although normally used to explore the structure of spoken conversations, in recent years conversation analysis approaches have been successfully applied to examine online interactions on Twitter, discussion forums and email exchanges. By turning this approach towards Facebook comments, Matteo Farina provides clear and important insights into the organization of this type of social interaction. Supported by a large sample of data, with findings based on a corpus of 213 comment threads, with over 1,200 comments exchanged by 266 contributors, this book makes an important contribution to our understanding of the way people communicate on Facebook.
Mass communication theories were largely built when we had mass media audiences. The number of television, print, film or other forms of media audiences were largely finite, concentrating people on many of the same core content offerings, whether that be the nightly news or a popular television show. What happens when those audiences splinter? The Rise and Fall of Mass Communication surveys the aftermath of exactly that, noting that very few modern media products have audiences above 1-2% of the population at any one time. Advancing a new media balkanization theory, Benoit and Billings neither lament nor embrace the new media landscape, opting instead to pinpoint how we must consider mass communication theories and applications in an era of ubiquitous choice.
'Being an adult is like trying to fold a fitted sheet.' 'I'm just a girl, standing in front of a salad, asking it to be a donut.' 'I was hot until my photoshop free-trial expired.' From Instagram to Twitter, we all want to be a social media star these days. But behind your phone screen are those perfectly filtered lives all they're really cracked up to be? For millennials everywhere comes a book that says what we're all really thinking. Whether it's stuffing your face with pizza while scrolling through Gigi Hadid's feed or experiencing life at the speed of fifteen WTF's per hour, this is the real life struggle of getting that double tap and achieving #goals.
This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader.
In Digital Data Collection and Information Privacy Law, Mark Burdon argues for the reformulation of information privacy law to regulate new power consequences of ubiquitous data collection. Examining developing business models, based on collections of sensor data - with a focus on the 'smart home' - Burdon demonstrates the challenges that are arising for information privacy's control-model and its application of principled protections of personal information exchange. By reformulating information privacy's primary role of individual control as an interrupter of modulated power, Burdon provides a foundation for future law reform and calls for stronger information privacy law protections. This book should be read by anyone interested in the role of privacy in a world of ubiquitous and pervasive data collection.
In today's digital world our social interactions often take place in the form of written comments. We chat, disagree, worship, vent, confess, and even attack in written form in public digital spaces. Drawing on scholarly literature from media and cultural studies, psychology and sociology, Uncovering Commenting Culture charts this commenting territory and outlines why we behave in these ways online. In this timely book, Renee Barnes provides a participatory model for understanding commenting culture that is based on the premise that our behaviours online-including those that cause us most the concern-are not so much an internet problem as a social problem. By looking at a wide variety of online commenting habitats, from the comment threads following news stories, through to specialist forums and social media platforms, the volume provides a comprehensive understanding of the role of online commenting in society and provides suggestions for how we might mitigate bad behaviours.
Micronesia, Hawaii, Polynesia, Bora Bora, Seychelles, Maldives, Australia - where does the mind go when imagining such places. Drawn from the best travel blogs and Instagram images, this book brings together the most beautiful locations near, on, or under water. From eco resorts to remote, pristine islands; from sailing on ultra-blue oceans to diving in translucent waters; in aerial and underwater photography, the focus is on finding paradise. Whether thinking about a trip or longing for sun and sand, this book is where those daydreams begin.
Continuing the explorations begun in the first two Produsing Theory volumes, this book investigates some of the tensions generated in the spaces enabled by the confluence of the formerly disparate activities of producing and consuming media. Multiple and varied theories-some still emerging-are invoked in attempts to illuminate the spaces between what previously had been neatly-separated components of media systems. This book is useful in a number of courses such as media culture and theory, introduction to new media, the Internet and the audience, new media theory and research, mass communication theory, emerging media, critical analysis and new media, concepts of new media, new media participants, new media in a democratic society, critical studies in new media, new media and social media, digital media studies, participatory media, media audiences in a digital world, digital cultures and social media, Web culture and new media studies, introduction to new media, new media and society, and more.
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says "knows all of Anonymous' deepest, darkest secrets." Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book. The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters-such as Topiary, tflow, Anachaos, and Sabu-emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of "trolling," the ethics and metaphysics of hacking, and the origins and manifold meanings of "the lulz." |
You may like...
Ratels Aan Die Lomba - Die Storie Van…
Leopold Scholtz
Paperback
(4)
Avatar - 3-Disc Extended Collector's…
James Cameron
Blu-ray disc
(1)
|