![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
We live in a "metric culture" where data, algorithms, and numbers play an unmistakably powerful role in defining, shaping and ruling the world we inhabit. Increasingly, governments across the globe are turning towards metric technologies to find solutions for managing various social domains such as healthcare and education. While private corporations are becoming more and more interested in the collection and analysis of data and metrics for profit generation and service optimisation. What is striking about this metric culture is that not only are governments and private companies the only actors interested in using metrics and data to control and manage individuals and populations, but individuals themselves are now choosing to voluntarily quantify themselves and their lives more than ever before, happily sharing the resulting data with others and actively turning themselves into projects of (self-) governance and surveillance. Metric Culture is also not only about data and numbers alone but links to issues of power and control, to questions of value and agency, and to expressions of self and identity. This book provides a critical investigation into these issues examining what is driving the agenda of metric culture and how it is manifested in the different spheres of everyday life through self-tracking practices. Authors engage with a broad range of topics, examples, geographical contexts, and sites of analysis in order to account for the diversity and hybridity of metric culture and explore its various social, political and ethical implications.
This book critically reviews existing digital divide research and challenges its core thesis, which posits unequal Internet access as a newly formed source of social disadvantage. The author begins by introducing the building blocks of the information society theory. The book goes on to present a systematic overview of digital divide research - its development, arguments attesting to the social gravity of the digital divide, and current findings on the uneven diffusion and use of the Internet. It evaluates the validity of the theories and concepts associated with digital divide research. The author offers an overview and re-examination of six presumptions and biases found in the prevailing approach to the digital divide. Given that Internet use has, in certain contexts, become an absolute necessity, an alternative approach is proposed, recognizing the indispensability of Internet use as context dependent. The book concludes with a consideration of the implications that this new perspective has for the information society theory and policies as well as for the role of social science in the informatization process.
Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
The main interest of this research has been in understanding and characterizing large networks of human interactions as continuously changing objects. In fact, although many real social networks are dynamic networks whose elements and properties continuously change over time, traditional approaches to social network analysis are essentially static, thus neglecting all temporal aspects. Specifically, we have investigated the role that temporal patterns of human interaction play in three main fields of social network analysis and data mining: characterization of time (or attention) allocation in social networks, prediction of link decay/persistence, and information spreading. In order to address this we analyzed large anonymized data sets of phone call communication traces over long periods of time. Access to these observations was granted by Telefonica Research, Spain. The findings that emerge from our research indicate that the observed heterogeneities and correlations of human temporal patterns of interaction significantly affect the traditional view of social networks, shifting from a very steady to a highly complex entity. Since structure and dynamics are tightly coupled, they cannot be disentangled in the analysis and modeling of human behavior, though traditional models seek to do so. Our results impact not only the way in which social network are traditionally characterized, but more importantly also the understanding and modeling phenomena such as group formation, spread of epidemics, and the dissemination of ideas, opinions and information.
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.
The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.
What happens when the internet is absorbed into everyday life? How do we make sense of something that is invisible but still so central? A group of digital culture experts address these questions in Metaphors of Internet: Ways of Being in the Age of Ubiquity. Twenty years ago, the internet was imagined as standing apart from humans. Metaphorically it was a frontier to explore, a virtual world to experiment in, an ultra-high-speed information superhighway. Many popular metaphors have fallen out of use, while new ones arise all the time. Today we speak of data lakes, clouds and AI. The essays and artwork in this book evoke the mundane, the visceral, and the transformative potential of the internet by exploring the currently dominant metaphors. Together they tell a story of kaleidoscopic diversity of how we experience the internet, offering a richly textured glimpse of how the internet has both disappeared and at the same time, has fundamentally transformed everyday social customs, work, and life, death, politics, and embodiment.
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.
Digital influencing is one of the most exciting and disruptive new media industries, forecast to be worth over GBP10bn by 2020. Influencers now dominate the digital world and, when it comes to growth, they are consistently outperforming traditional media and brand advertising. Despite their prominence, digital influencers continue to be misunderstood and undervalued by many people, as those charged with incorporating the influencer space into their digital strategy rarely comprehend how this extremely powerful industry works. As one of the leading authorities on the influencer space, Sara McCorquodale demystifies exactly how it operates, as she interrogates the phenomenon, analyses its problems and forecasts its future. Influence draws upon first-hand interviews with world-renowned influencers, providing an invaluable insight into the inner-workings of digital culture and how it can best be used as an effective marketing and branding platform. This compelling guide on how to effectively identify and utilise the power of influencers is a must-read for anyone who wants their business to succeed and prosper online.
How do highly-successful people like Elon Musk and Bill Gates get so much done? The answer is time blocking; a time-management method that Cal Newport, productivity expert and bestselling author of Digital Minimalism, has been using for fifteen years. For the first time, this game-changing system has been captured in a daily planner that makes it easy for you to prioritise tasks and focus on the things that really matter. Using the time-block method you'll no longer be distracted by your inbox, social media and other peoples' demands for your time. The Time-Block Planner will help you push aside distractions and focus on the work that will make the difference to you.
Continuing the explorations begun in the first two Produsing Theory volumes, this book investigates some of the tensions generated in the spaces enabled by the confluence of the formerly disparate activities of producing and consuming media. Multiple and varied theories-some still emerging-are invoked in attempts to illuminate the spaces between what previously had been neatly-separated components of media systems. This book is useful in a number of courses such as media culture and theory, introduction to new media, the Internet and the audience, new media theory and research, mass communication theory, emerging media, critical analysis and new media, concepts of new media, new media participants, new media in a democratic society, critical studies in new media, new media and social media, digital media studies, participatory media, media audiences in a digital world, digital cultures and social media, Web culture and new media studies, introduction to new media, new media and society, and more.
What do Charli D'Amelio, Zach King, Loren Gray and Addison Rae all have in common? They're all TikTok Famous! TikTok Famous - The Ultimate Fan Book is an accessible and informative map of the TikTok stars of today, and the viral icons of tomorrow. TikTok is the world's hottest social media phenomenon, and the video platform is ushering in a new age of Generation Z celebrities. The most popular of these stars have followings of more than 30 million, and hail from the United States, China, India and beyond, sharing their content with a truly global community. Featuring more than 60 full-colour photographs and engaging and entertaining words, TikTok Famous - The Ultimate Fan Book is the first book to shine a spotlight on TikTok's most talented and famous creators. Perfect for anyone who wants to know more about their favourite TikTok stars, it's packed with facts, stats and trivia.
New Media, Communication, and Society is a fast, straightforward examination of key topics which will be useful and engaging for both students and professors. It connects students to wide-ranging resources and challenges them to develop their own opinions. Moreover, it encourages students to develop media literacy so they can speak up and make a difference in the world. Short chapters with lots of illustrations encourage reading and provide a springboard for conversation inside and outside of the classroom. Wide-ranging topics spark interest. Chapters include suggestions for additional exploration, a media literacy exercise, and a point that is just for fun. Every chapter includes thought leaders, ranging from leading researchers to business leaders to entrepreneurs, from Socrates to Doug Rushkoff and Lance Strate to Bill Gates.
The book that every parent needs. Written by the expert child psychologist, Dr Elizabeth Kilbey, from Channel 4's The Secret Life of 4, 5 and 6 Year Olds. 'Children who get too much screen time are at risk of anxiety disorders' - BBC News This is the book that every parent with a child under the age of 11 (in the latency stage of brain development) needs in order to navigate the tricky pathway of how much screen time to allow on a daily basis. Play has gone from a physical, creative experience using toys and imagination to something that now involves sitting down alone for hours at a time. Parents are dealing with children who don't listen to them, who are unable to concentrate for very long, who refuse to do homework and who constantly battle against them for more screen time. In this book, Dr Elizabeth Kilbey will offer tangible, practical advice about how to 'unplug' your child from their device so their online time doesn't become all-consuming and how we, as parents, can plug in to connect with our children.
Despite 80% of business leaders thinking it important to make the most
of social media, 70% admitted that their efforts are currently
ineffective - CMI SURVEY.
The FT Guide to Social Media Strategy will help you understand how social media works, how to use it to build your networks and deliver business growth.
A practical and engaging guide to building a meaningful and successful career. Want to build a meaningful career that you love? Careers are changing; they are no longer linear and there's no such thing as a 'job for life'. Squiggly careers, where people jump constantly between roles, industries and locations, are becoming the new normal. Squiggly careers are filled with opportunity and excitement, but they can also be ambiguous and overwhelming if we don't know how to make the most of them. In The Squiggly Career, personal development experts Helen Tupper and Sarah Ellis will teach you how to:
Packed with insights about the changing-face of work, exercises to aid your growth, and tips and inspiration from highly successful people, this book will help you be happier, and ultimately more successful in your career.
Want to make money online? Then ignore social media at your own risk. Social media is vital if you want to your business to thrive, and though you can't control the conversations, you can influence them. This book will teach you how. If mismanaged, social media can create more noise than signal. It can be a time and energy suck - for you and your audience. Or worse still, it can become an echo chamber for negative PR. If done well, guerrilla social media marketing can help you persuade, command attention, establish dialogue, differentiate yourself, capture new markets, and outmaneuver the competition - all on a shoestring budget. Whether you're selling digital goods and services, physical goods, or local services, this book has the answers. Strategize and optimize your social presence in ways you didn't know were possible Drive more clicks and sales with better-performing Facebook ads Develop remarkable content with viral potential Manage your online reputation, instead of letting it manage you Integrate social media into your SEO strategy, and vice versa Leverage online influencers to promote your brand, and become an influencer yourself
This edited collection explores ways to better understand the rhetorical workings of political executives, especially the United States president. Scholars of the presidency, rhetorical theorists and critics, and various authors examine the ways in which presidents use the institution, the media, and popular culture to instantiate, expand, and wield executive power.
This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression. According to its traditional understanding, this right gives individuals the possibility to preclude the media from revealing personal facts that are no longer newsworthy, at least where no other interest prevails. Cases sanctioning this understanding still abound in a number of countries. In today's world, however, the right to be forgotten has evolved, and it appears in a more multi-faceted way. It can involve for instance also the right to access, control and even erase personal data. Of course, these prerogatives depend on various factors and competing interests, of both private and public nature, which again require careful balancing. Due to ongoing technological evolution, it is likely that the right to be forgotten in some of its new manifestations will become increasingly relevant in our societies.
Information and communication technology (ICT) has boosted economic development in China. To understand China's modernization, it is therefore necessary to consider the development of ICT. The book reflects how a catch-up country with a fast modernization process develops into a relatively modern country and the consequences of the fast development. It focuses on the development of media in China by examining the diffusion of ICT and providing a case study in an indigenous place to explore the modernization process. The book offers a new perspective to understand modernization and contributes knowledge to understand China's media, technology diffusion, indigenous culture transformation into modern culture and social changes.
Moving Sounds explores the unique animating symbiosis that develops whenever previously unrelated technologies become intertwined and form a mutually invigorating relationship. When "car" and "radio" became permanently inculcated, it changed how both cars and radio were designed and experienced. Moving Sounds is the first book-length study exploring the relationship between the car and the radio. While much scholarship has been devoted to the general history of radio, radio's unique relationship with the open road has been largely overlooked. The nascent interconnectivity between the early car and radio developers, and what they did to help each other, is another aspect of cultural history that is explored in Moving Sounds.
Moving Sounds explores the unique animating symbiosis that develops whenever previously unrelated technologies become intertwined and form a mutually invigorating relationship. When "car" and "radio" became permanently inculcated, it changed how both cars and radio were designed and experienced. Moving Sounds is the first book-length study exploring the relationship between the car and the radio. While much scholarship has been devoted to the general history of radio, radio's unique relationship with the open road has been largely overlooked. The nascent interconnectivity between the early car and radio developers, and what they did to help each other, is another aspect of cultural history that is explored in Moving Sounds. |
You may like...
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,711
Discovery Miles 137 110
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
|