![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
In today's digital world our social interactions often take place in the form of written comments. We chat, disagree, worship, vent, confess, and even attack in written form in public digital spaces. Drawing on scholarly literature from media and cultural studies, psychology and sociology, Uncovering Commenting Culture charts this commenting territory and outlines why we behave in these ways online. In this timely book, Renee Barnes provides a participatory model for understanding commenting culture that is based on the premise that our behaviours online-including those that cause us most the concern-are not so much an internet problem as a social problem. By looking at a wide variety of online commenting habitats, from the comment threads following news stories, through to specialist forums and social media platforms, the volume provides a comprehensive understanding of the role of online commenting in society and provides suggestions for how we might mitigate bad behaviours.
Continuing the explorations begun in the first two Produsing Theory volumes, this book investigates some of the tensions generated in the spaces enabled by the confluence of the formerly disparate activities of producing and consuming media. Multiple and varied theories-some still emerging-are invoked in attempts to illuminate the spaces between what previously had been neatly-separated components of media systems. This book is useful in a number of courses such as media culture and theory, introduction to new media, the Internet and the audience, new media theory and research, mass communication theory, emerging media, critical analysis and new media, concepts of new media, new media participants, new media in a democratic society, critical studies in new media, new media and social media, digital media studies, participatory media, media audiences in a digital world, digital cultures and social media, Web culture and new media studies, introduction to new media, new media and society, and more.
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says "knows all of Anonymous' deepest, darkest secrets." Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book. The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters-such as Topiary, tflow, Anachaos, and Sabu-emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of "trolling," the ethics and metaphysics of hacking, and the origins and manifold meanings of "the lulz."
This academic analysis explores social media, specifically examining its influence on the cultural, political, and economic organization of our society and the role capitalism plays within its domain. In this examination of society and technology, author and educator Derek Hrynyshyn explores the ways in which social media shapes popular culture and how social power is expressed within it. He debunks the misperception of the medium as a social equalizer-a theory drawn from the fact that content is created by its users-and compares it to mass media, identifying the capitalist-driven mechanisms that drive both social media and mass media. The work captures his assessment that social media legitimizes the inequities among the social classes rather than challenging them. The book scrutinizes the difference between social media and mass media, the relationship between technologies and social change, and the role of popular culture in the structure of political and economic power. A careful look at social media networks such as Facebook, Twitter, and Google suggests that these tools are systems of surveillance, monitoring everyday activities for the benefit of advertisers and the networks themselves. Topics covered within the book's 10 detailed chapters include privacy online, freedom of expression, piracy, the digital divide, fragmentation, and social cohesion. Explores the use of blogs, Facebook, and Twitter in revolutionary political action and the effects of "viral" campaigns on political culture Uncovers the truth behind piracy infringements on popular cultural industries Reveals the hidden factors driving the rapid expansion of social media Discusses how capitalism affects the development of social media Examines how social media shares characteristics with and differs from mass media
As technology continues to rapidly advance, individuals and society are profoundly changed. So too are the tools used to measure this universe and, therefore, our understanding of reality improves. Boundaries of Self and Reality Online examines the idea that technological advances associated with the Internet are moving us in multiple domains toward various "edges." These edges range from self, to society, to relationships, and even to the very nature of reality. Boundaries are dissolving and we are redefining the elements of identity. The book begins with explorations of the digitally constructed self and the relationship between the individual and technological reality. Then, the focus shifts to society at large and includes a contribution from Chinese researchers about the isolated Chinese Internet. The later chapters of the book explore digital reality at large, including discussions on virtual reality, Web consciousness, and digital physics.
Although hip hop culture has widely been acknowledged as a global cultural movement, little attention has been given to women's participation in hip hop culture in various parts of the world or how this participation interacts with and impacts the lives of other women. Hip Hop Harem is the first book solely dedicated to female rap artists in the Middle East and North Africa region. Throughout the book, Angela S. Williams explores the work of seven prominent rappers from the region. Through the lens of hip hop feminism, she seeks to express how the artists' work affects female audience members who relate to themes of self-determination and liberation within their own lives. The popular imagery of the harem is flipped, turned on its head in likely hip hop fashion, as the artists speak back to voices of male dominance and a power structure that has sought to define them and the region.
AN FT BUSINESS BOOK OF THE MONTH 'An essential read' Diane Coyle, University of Cambridge 'We are currently living in a moment of extreme pessimism about data. This book will change your mind.' It's impossible to escape digital technology. And with that comes fear. But whatever the news has told you about data and technology, think again. Data expert and tech insider turned Cambridge researcher Sam Gilbert shows that, actually, this data revolution could be the best thing that ever happened to us. Good Data examines the incredible new ways this information explosion is already helping us - whether that's combating inequality, creating jobs, advancing the frontiers of knowledge or protecting us from coronavirus. We are standing on the edge of greatness, we just need to know how to get there. 'A great read and really thought-provoking ... Challenges the surveillance capitalism narrative' Rory Cellan-Jones, BBC 'Good Data weaves some thorny issues into a story that is positive, interesting, easy to read and provides valuable insight' Peter Turner, Chief Commercial Officer, Avast
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems. The Data-Driven Blockchain Ecosystem: Fundamentals, Applications, and Emerging Technologies discusses how to implement and manage processes for releasing and delivering blockchain applications. It presents the core of blockchain technology, IoT-based and AI-based blockchain systems, and various manufacturing areas related to Industry 4.0. The book illustrates how to apply design principles to develop and manage blockchain networks, and also covers the role that cloud computing plays in blockchain applications. All major technologies involved in blockchain-embedded applications are included in this book, which makes it useful to engineering students, researchers, academicians, and professionals interested in the core of blockchain technology.
STRUGGLING TO STAY IN TOUCH WITH ELDERLY PARENTS DURING THE LOCKDOWN? WANTING TO HELP ISOLATED RELATIVES WITH ONLINE ORDERING? THIS IS THE PERFECT GUIDE FOR ANYONE GRAPPLING FOR THE FIRST TIME WITH FACETIME, GOOGLE HANGOUTS OR ANY OTHER ASPECT OF THE MODERN WORLD. A handy guide for anyone who says, 'The Facebook' or 'The Google' or who asks, 'Do they deliver emails on Sunday?' This is a book for the elderly and not-so-elderly who are bamboozled not just by the technology of the contemporary world, but also various modern concepts and conceits that the more youthful take for granted. It explains a host of modern concepts and technologies that have entered everyday use and parlance but which are alien (and possibly frightening) not just to the elderly - but probably also to anyone over 45. These concepts are universal and should therefore appeal to readers in the UK, Australia, US and Europe. The definitions are all real, but entertaining, making use of easy-to-understand 'real world' references or examples to explain them.
The days of wooing your love with embarrassing poetry or rambling love letters are over. Here begins the new dawn in the evolution the language of love: emoji. With a wealth of emojis on offer to convey your adoration, from kissy faces and hearts-for-eyes, to saucier combinations like the lock and key, there is no end to the ways you can declare your love. And this book will guide you through each stage of your relationship with phrases for every occasion. Step back Shakespeare: wherefore are thou, aubergine? Sections include: pick-up lines, what not to say on a first date, how to say 'I love you', living together, the proposal, breaking up, love songs and romantic films (sure you can translate 'Ghost', but how would you do 'Fifty Shades of Grey'?). A perfect gift for Valentine's Day, you'll never just send a boring row of hearts again.
The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.
The question of governance of the Internet is increasing in
significance. The United Nations' World Summit on the Information
Society, held in two phases in 2003 and 2005, provoked heated
debate, and the resultant meetings of the Internet Governance Forum
that followed this have been the subject of growing public and
media interest. Yet governance of the Internet is multifaceted,
complex, and far from transparent, and there has been little
written about the subject which is detailed, systematic, and
non-polemical.
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
This volume presents examples of how digital technologies are being used by people of African descent in South America and the Caribbean, a topic that has been overlooked within the field of digital humanities. These case studies show that in the last few decades, Black Latinx communities have been making themselves visible and asserting longstanding claims and rights through digital tools and platforms, which have been essential for enacting discussions and creating new connections between diverse groups.Afro-Latinx Digital Connections includes both research articles and interviews with practitioners who are working to create opportunities for marginalized communities. Projects discussed in this volume range from an Afrodescendant digital archive in Argentina, blog networks in Cuba, an NGO dedicated to democratizing technology in Brazilian favelas, and the recruitment of digital media to fight racism in Peru. Contributors demonstrate that these tools need not be state-of-the-art to be effective and that they are often most useful when employed to sustain a resilience that is deep and historically grounded. Digital connections are shown here as a means to achieve social justice and to create complex self-representations that challenge racist images of Afrodescendant peoples and monolithic conceptions of humanity. This volume expands the scope of digital humanities and challenges views of the field as a predominantly white discipline.
Organize your life, your likes, and more with Pinterest and this fun how-to guide Now you can organize your digital life with Pinterest, a hot new site that lets you create visual bookmarks of your favorite things and "pin" them on virtual pinboards. Want to save something from a blog? Have a favorite retail website? Want to pin a quick photo you took with your phone? Organize them all with Pinterest and this fast, friendly guide that shows you just how to do it. You'll see how to set up an account and your boards, how to pin and re-pin, where to use hashtags, find ways to share pins with your other social networks, and more.Helps you get the most out of Pinterest, a visual collection of bookmarks that you can organize into virtual pinboards Shows you how to set up an account and boards, how to pin and re-pin, use hashtags and like pins, and even share pins with your other social networks Also discusses Power Pinners, using search, and finding people to follow Offers tips, trick, and techniques to make the process easy and enjoyable Pinterest is fun and easy, and even more so with "Pinterest for Dummies"
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand on its own, making researching wireless technologies, security, crime, or forensics easy. With a problem space as big and complex as wireless, proactive measures must be put in place, and put in place immediately. To protect your organization, you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology, but also provides the information required for conducting a forensic analysis in a wireless environment.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
Governing Privacy in Knowledge Commons explores how privacy impacts knowledge production, community formation, and collaborative governance in diverse contexts, ranging from academia and IoT, to social media and mental health. Using nine new case studies and a meta-analysis of previous knowledge commons literature, the book integrates the Governing Knowledge Commons framework with Helen Nissenbaum's Contextual Integrity framework. The multidisciplinary case studies show that personal information is often a key component of the resources created by knowledge commons. Moreover, even when it is not the focus of the commons, personal information governance may require community participation and boundaries. Taken together, the chapters illustrate the importance of exit and voice in constructing and sustaining knowledge commons through appropriate personal information flows. They also shed light on the shortcomings of current notice-and-consent style regulation of social media platforms. This title is also available as Open Access on Cambridge Core.
Life Mode On is the revolutionary approach to living a better life with technology and our personal devices, from digital lifestyle expert Dr Joanne Orlando. These are no quick fixes; these are real, practical solutions for long-term fulfilment in our increasingly digital world. If you somehow find yourself sending emails from the dinner table, staying up late to online shop while binge-watching another series, waking up during the night to scroll social media, and always pressing 'ignore' on your screen time app, you are not alone. Technology is no longer something we simply possess or use; it's part of who we are. And that is not something that we necessarily can - or want to - change. But our transition into living with computers, smartphones and other devices has been fast, messy and unplanned. The exact technology that can make us smarter, happier, more organised and more connected is instead causing us stress and distraction, and highly competent people are struggling to feel in control. Dr Jo helps people all over the world to understand their technology use and make it better. From showing how we can better set up our devices (like we'd set up our kitchens) to revealing the 'dark patterns' that websites use to keep us clicking, Dr Jo helps us to understand and reset our digital habits, whether they be in our homes, workplaces or relationships.Life Mode On is just not a technology book - it's a life book.
As a Facebook moderator, Chris Gray made a living looking at graphically violent images and reviewing some of the internet's most toxic debates. Following a short training induction, he was responsible for deciding what material could remain online and what needed to be removed. Years later, the psychological trauma of the things he had seen hit him like a ton of bricks. He was eventually diagnosed with PTSD. In this eye-opening book, Chris recounts his quest to hold the behemoth Facebook to account for his PTSD - a journey that would ultimately lead him to take legal action against one of the world's most powerful corporations. The Moderator is both a story of the mental health fallout from this very new type of job and an exploration of some of the most important questions in the 21st century: when everybody has a direct communications channel with everybody else in the world, what should people be allowed to say, when is it okay to silence them - and who decides?
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.
This book explores the gamer's dilemma, which lies at the heart of theorising about the morality of certain video game content. The dilemma is as follows: given that gaming content involves virtual characters within a virtual environment, the moral permission of virtual murder would also appear to morally permit virtual paedophilia. Yet most gamers and members of wider society would not want to play, endorse, or find in any way morally acceptable the enactment of virtual paedophilia within a video game. Yet by accepting the moral permissibility of virtual murder they leave themselves vulnerable to having to accept the moral permissibility of virtual paedophilia. This book provides an incredibly thorough and systematic analysis and evaluation of the gamer's dilemma, by considering the origins of the intuitions around the dilemma, and exploring whether they find support from traditional or contemporary moral theory and psychological research. The book will be great interest to academics and students of philosophy and psychology, as well as members of the wider public interested in video game violence and taboo enactments more generally.
Blockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community of computer scientists and cryptologists, to mainstream phenomena that are now considered powerful game changers for many industries. This book explores and assesses real-world use cases and case studies on blockchain and related technologies. The studies describe the respective applications and address how these technologies have been deployed, the rationale behind their application, and finally, their outcomes. The book shares a wealth of experiences and lessons learned regarding financial markets, energy, SCM, healthcare, law and compliance. Given its scope, it is chiefly intended for academics and practitioners who want to learn more about blockchain applications. |
You may like...
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,711
Discovery Miles 137 110
Security in IoT Social Networks
Fadi Al-Turjman, B.D. Deebak
Paperback
R2,634
Discovery Miles 26 340
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
|