![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Innovative examination of augmentation technologies in terms of technical, social, and ethical considerations Usable as a supplemental text for a variety of courses, and also of interest to researchers and professionals in fields including: technical communication, digital communication, UX design, information technology, informatics, human factors, artificial intelligence, ethics, philosophy of technology, and sociology of technology First major work to combine technological, ethical, social, and rhetorical perspectives on human augmentation Additional cases and research material available at the authors' Fabric of Digital Life research database at https://fabricofdigitallife.com/
In today's digital world our social interactions often take place in the form of written comments. We chat, disagree, worship, vent, confess, and even attack in written form in public digital spaces. Drawing on scholarly literature from media and cultural studies, psychology and sociology, Uncovering Commenting Culture charts this commenting territory and outlines why we behave in these ways online. In this timely book, Renee Barnes provides a participatory model for understanding commenting culture that is based on the premise that our behaviours online-including those that cause us most the concern-are not so much an internet problem as a social problem. By looking at a wide variety of online commenting habitats, from the comment threads following news stories, through to specialist forums and social media platforms, the volume provides a comprehensive understanding of the role of online commenting in society and provides suggestions for how we might mitigate bad behaviours.
In Digital Data Collection and Information Privacy Law, Mark Burdon argues for the reformulation of information privacy law to regulate new power consequences of ubiquitous data collection. Examining developing business models, based on collections of sensor data - with a focus on the 'smart home' - Burdon demonstrates the challenges that are arising for information privacy's control-model and its application of principled protections of personal information exchange. By reformulating information privacy's primary role of individual control as an interrupter of modulated power, Burdon provides a foundation for future law reform and calls for stronger information privacy law protections. This book should be read by anyone interested in the role of privacy in a world of ubiquitous and pervasive data collection.
This academic analysis explores social media, specifically examining its influence on the cultural, political, and economic organization of our society and the role capitalism plays within its domain. In this examination of society and technology, author and educator Derek Hrynyshyn explores the ways in which social media shapes popular culture and how social power is expressed within it. He debunks the misperception of the medium as a social equalizer-a theory drawn from the fact that content is created by its users-and compares it to mass media, identifying the capitalist-driven mechanisms that drive both social media and mass media. The work captures his assessment that social media legitimizes the inequities among the social classes rather than challenging them. The book scrutinizes the difference between social media and mass media, the relationship between technologies and social change, and the role of popular culture in the structure of political and economic power. A careful look at social media networks such as Facebook, Twitter, and Google suggests that these tools are systems of surveillance, monitoring everyday activities for the benefit of advertisers and the networks themselves. Topics covered within the book's 10 detailed chapters include privacy online, freedom of expression, piracy, the digital divide, fragmentation, and social cohesion. Explores the use of blogs, Facebook, and Twitter in revolutionary political action and the effects of "viral" campaigns on political culture Uncovers the truth behind piracy infringements on popular cultural industries Reveals the hidden factors driving the rapid expansion of social media Discusses how capitalism affects the development of social media Examines how social media shares characteristics with and differs from mass media
Give your LinkedIn profile the makeover it deserves--and get the attention you deserve Look at your profile: you know it could be a little better. Too many LinkedIn users are just posting a basic resume and hoping for the offers to come flooding in, missing out on the incredible opportunity the platform offers to properly showcase their talents, products, and services to 610 million professionals in over 200 countries. LinkedIn is way more than a resume tool--to display your professional past and present--it's also your career future and personal brand. Used to its fullest extent, it helps you demonstrate the unique value and culture you provide, the skills and aspirations that make you different, to get the outcomes you truly want. But how's it done? Profile branding expert Donna Serdula pioneered the concept of LinkedIn Profile Optimization and through her Website, LinkedIn-Makever.com, has helped over 5000 professionals use LinkedIn to achieve increased success. In this guide she applies that experience to help you use all of LinkedIn's capabilities to meet your goals, whether they be job search, reputation management, or sales--including how to: Create a memorable, successful profile Optimize personal keywords Showcase your experience, accomplishments, and unique value Use LinkedIn features to grow your network and more You never get a second chance to make a first impression--and people are Googling you right now: Get a fresh online look and get results!
As technology continues to rapidly advance, individuals and society are profoundly changed. So too are the tools used to measure this universe and, therefore, our understanding of reality improves. Boundaries of Self and Reality Online examines the idea that technological advances associated with the Internet are moving us in multiple domains toward various "edges." These edges range from self, to society, to relationships, and even to the very nature of reality. Boundaries are dissolving and we are redefining the elements of identity. The book begins with explorations of the digitally constructed self and the relationship between the individual and technological reality. Then, the focus shifts to society at large and includes a contribution from Chinese researchers about the isolated Chinese Internet. The later chapters of the book explore digital reality at large, including discussions on virtual reality, Web consciousness, and digital physics.
Although hip hop culture has widely been acknowledged as a global cultural movement, little attention has been given to women's participation in hip hop culture in various parts of the world or how this participation interacts with and impacts the lives of other women. Hip Hop Harem is the first book solely dedicated to female rap artists in the Middle East and North Africa region. Throughout the book, Angela S. Williams explores the work of seven prominent rappers from the region. Through the lens of hip hop feminism, she seeks to express how the artists' work affects female audience members who relate to themes of self-determination and liberation within their own lives. The popular imagery of the harem is flipped, turned on its head in likely hip hop fashion, as the artists speak back to voices of male dominance and a power structure that has sought to define them and the region.
The A to Z Facebook guide for users, marketers, and developers alike Facebook has more than a billion users worldwide. Whether you enjoy spending time on Facebook every day, use it to advertise and market your product, or develop Facebook apps, this go-to guide has something you need. Its six minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps. It's fully updated to cover the latest Facebook changes, including Graph Search, mobile apps, Timeline enhancements, and news feed redesign. * Facebook has more than one billion active users who share more than 30 billion pieces of content each month * More than 37 million brands have Pages on Facebook * This complete guide has been fully updated to cover Facebook's latest changes, including Graph Search, mobile apps for both users and Page managers, a redesigned news feed, and enhancements to the Timeline * Minibooks cover creating a personal timeline, connecting with others, connecting Facebook to other social media, building a fan page, marketing a business on Facebook, and developing Facebook apps Facebook All-in-One For Dummies, 2nd Edition is packed with helpful information, great ideas, and ways to help you get even more out of Facebook.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill
AN FT BUSINESS BOOK OF THE MONTH 'An essential read' Diane Coyle, University of Cambridge 'We are currently living in a moment of extreme pessimism about data. This book will change your mind.' It's impossible to escape digital technology. And with that comes fear. But whatever the news has told you about data and technology, think again. Data expert and tech insider turned Cambridge researcher Sam Gilbert shows that, actually, this data revolution could be the best thing that ever happened to us. Good Data examines the incredible new ways this information explosion is already helping us - whether that's combating inequality, creating jobs, advancing the frontiers of knowledge or protecting us from coronavirus. We are standing on the edge of greatness, we just need to know how to get there. 'A great read and really thought-provoking ... Challenges the surveillance capitalism narrative' Rory Cellan-Jones, BBC 'Good Data weaves some thorny issues into a story that is positive, interesting, easy to read and provides valuable insight' Peter Turner, Chief Commercial Officer, Avast
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems. The Data-Driven Blockchain Ecosystem: Fundamentals, Applications, and Emerging Technologies discusses how to implement and manage processes for releasing and delivering blockchain applications. It presents the core of blockchain technology, IoT-based and AI-based blockchain systems, and various manufacturing areas related to Industry 4.0. The book illustrates how to apply design principles to develop and manage blockchain networks, and also covers the role that cloud computing plays in blockchain applications. All major technologies involved in blockchain-embedded applications are included in this book, which makes it useful to engineering students, researchers, academicians, and professionals interested in the core of blockchain technology.
STRUGGLING TO STAY IN TOUCH WITH ELDERLY PARENTS DURING THE LOCKDOWN? WANTING TO HELP ISOLATED RELATIVES WITH ONLINE ORDERING? THIS IS THE PERFECT GUIDE FOR ANYONE GRAPPLING FOR THE FIRST TIME WITH FACETIME, GOOGLE HANGOUTS OR ANY OTHER ASPECT OF THE MODERN WORLD. A handy guide for anyone who says, 'The Facebook' or 'The Google' or who asks, 'Do they deliver emails on Sunday?' This is a book for the elderly and not-so-elderly who are bamboozled not just by the technology of the contemporary world, but also various modern concepts and conceits that the more youthful take for granted. It explains a host of modern concepts and technologies that have entered everyday use and parlance but which are alien (and possibly frightening) not just to the elderly - but probably also to anyone over 45. These concepts are universal and should therefore appeal to readers in the UK, Australia, US and Europe. The definitions are all real, but entertaining, making use of easy-to-understand 'real world' references or examples to explain them.
The days of wooing your love with embarrassing poetry or rambling love letters are over. Here begins the new dawn in the evolution the language of love: emoji. With a wealth of emojis on offer to convey your adoration, from kissy faces and hearts-for-eyes, to saucier combinations like the lock and key, there is no end to the ways you can declare your love. And this book will guide you through each stage of your relationship with phrases for every occasion. Step back Shakespeare: wherefore are thou, aubergine? Sections include: pick-up lines, what not to say on a first date, how to say 'I love you', living together, the proposal, breaking up, love songs and romantic films (sure you can translate 'Ghost', but how would you do 'Fifty Shades of Grey'?). A perfect gift for Valentine's Day, you'll never just send a boring row of hearts again.
The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.
The question of governance of the Internet is increasing in
significance. The United Nations' World Summit on the Information
Society, held in two phases in 2003 and 2005, provoked heated
debate, and the resultant meetings of the Internet Governance Forum
that followed this have been the subject of growing public and
media interest. Yet governance of the Internet is multifaceted,
complex, and far from transparent, and there has been little
written about the subject which is detailed, systematic, and
non-polemical.
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand on its own, making researching wireless technologies, security, crime, or forensics easy. With a problem space as big and complex as wireless, proactive measures must be put in place, and put in place immediately. To protect your organization, you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology, but also provides the information required for conducting a forensic analysis in a wireless environment.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents. Only by establishing a sound technical understanding of what is and is not possible can a properly informed discussion take place, and political visions toward cyberspace accurately map and predict the future of cyber security. Combining research from the technical world that creates cyberspace with that of the political world, which seeks to understand the consequences and uses of cyberspace, Steed analyses and explains the circumstances that have led to current situations whereby IT-dependent societies are vulnerable to, and regularly victims of, hacking, terrorism, espionage, and cyberwar. Two fundamental questions are considered throughout the book: what circumstances led to this state of affairs? And what solutions exist for the future of cyberspace? In tackling these questions, Steed also analyses the emergent and increasingly competing political positions on offer to stabilise the landscape of cyberspace. This interdisciplinary work will appeal to researchers and students of Security Studies, Intelligence Studies, Strategic Studies and International Relations as well as cybersecurity practitioners charged with developing policy options.
*** "One of the marvels of this furious book is how insolent and funny Lavin is; she refuses to soft-pedal the monstrous views she encounters." - The New York Times "Shocking, angry, funny and wise... Talia Lavin takes no prisoners." - Danny Wallace, bestselling author of Yes Man "Lavin writes like her hands are on fire, forcing us to take a hard look at our ugliest truths." - Pamela Collof, The New York Times Magazine & Pro Publica White supremacists, Incels, White nationalists, National Socialists, Proud Boys, Christian extremists... In order to showcase their behaviour in their natural habitat, Talia Lavin goes undercover online as a blonde Nazi babe, a forlorn incel and a violent Aryan femme fatale. Lavin is every fascist's worst nightmare. She is loud, Jewish and unapologetically anti-racist, with the investigative skills to expose online hatemongers. While searching the dark web, she discovers a whites-only dating site, a popular extremist YouTube channel run by a teenager, the everyday heroes of the anti-fascist movement and much more. Lavin then turns the lens of anti-Semitism, racism, and white supremacy back on itself in an attempt to dismantle the online hate movement from the inside. Shocking, humorous, and merciless in equal measure, Culture Warlords explores some of the vilest subcultures on the Web - and shows us how we can fight back. Perfect for fans of Louis Theroux, Jon Ronson and Michael Moore, Lavin's debut book is a seamless balance of hard-hitting research, humour and shocking stories. It is a fascinating expose of the dark web and how it harbours the rage and views of far-right extremists today.
Life Mode On is the revolutionary approach to living a better life with technology and our personal devices, from digital lifestyle expert Dr Joanne Orlando. These are no quick fixes; these are real, practical solutions for long-term fulfilment in our increasingly digital world. If you somehow find yourself sending emails from the dinner table, staying up late to online shop while binge-watching another series, waking up during the night to scroll social media, and always pressing 'ignore' on your screen time app, you are not alone. Technology is no longer something we simply possess or use; it's part of who we are. And that is not something that we necessarily can - or want to - change. But our transition into living with computers, smartphones and other devices has been fast, messy and unplanned. The exact technology that can make us smarter, happier, more organised and more connected is instead causing us stress and distraction, and highly competent people are struggling to feel in control. Dr Jo helps people all over the world to understand their technology use and make it better. From showing how we can better set up our devices (like we'd set up our kitchens) to revealing the 'dark patterns' that websites use to keep us clicking, Dr Jo helps us to understand and reset our digital habits, whether they be in our homes, workplaces or relationships.Life Mode On is just not a technology book - it's a life book.
Twenty-first-century culture is obsessed with books. In a time when many voices have joined to predict the death of print, books continue to resurface in new and unexpected ways. From the proliferation of "shelfies" to Jane Austen-themed leggings and from decorative pillows printed with beloved book covers to bookwork sculptures exhibited in prestigious collections, books are everywhere and are not just for reading. Writers have caught up with this trend: many contemporary novels depict books as central characters or fetishize paper and print thematically and formally. In Bookishness, Jessica Pressman examines the new status of the book as object and symbol. She explores the rise of "bookishness" as an identity and an aesthetic strategy that proliferates from store-window decor to experimental writing. Ranging from literature to kitsch objects, stop-motion animation films to book design, Pressman considers the multivalent meanings of books in contemporary culture. Books can represent shelter from-or a weapon against-the dangers of the digital; they can act as memorials and express a sense of loss. Examining the works of writers such as Jonathan Safran Foer, Jennifer Egan, Mark Z. Danielewski, and Leanne Shapton, Pressman illuminates the status of the book as a fetish object and its significance for understanding contemporary fakery. Bringing together media studies, book history, and literary criticism, Bookishness explains how books still give meaning to our lives in a digital age.
Governing Privacy in Knowledge Commons explores how privacy impacts knowledge production, community formation, and collaborative governance in diverse contexts, ranging from academia and IoT, to social media and mental health. Using nine new case studies and a meta-analysis of previous knowledge commons literature, the book integrates the Governing Knowledge Commons framework with Helen Nissenbaum's Contextual Integrity framework. The multidisciplinary case studies show that personal information is often a key component of the resources created by knowledge commons. Moreover, even when it is not the focus of the commons, personal information governance may require community participation and boundaries. Taken together, the chapters illustrate the importance of exit and voice in constructing and sustaining knowledge commons through appropriate personal information flows. They also shed light on the shortcomings of current notice-and-consent style regulation of social media platforms. This title is also available as Open Access on Cambridge Core.
The field of artificial intelligence has made tremendous advances in the last few decades, but as smart as AI is now, it is getting exponentially smarter and becoming more autonomous in its actions. This raises a host of challenges to current legal doctrine, including whether the output of AI entities should count as 'speech', the extent to which AI should be regulated under antitrust and criminal law statutes, and whether AI should be considered an independent agent and responsible for its actions under the law of tort or agency. Containing chapters written by leading U.S., EU, and International law scholars, the Research Handbook presents current law, statutes, and regulations on the role of law in an age of increasingly smart AI, addressing issues of law that are critical to the evolution of AI and its role in society. To provide a broad coverage of the topic, the Research Handbook draws upon free speech doctrine, criminal law, issues of data protection and privacy, legal rights for increasingly smart AI systems, and a discussion of jurisdiction for AI entities that will not be 'content' to stay within the geographical boundaries of any nation state or be tied to a particular physical location. Using numerous examples and case studies, the chapter authors discuss the political and jurisdictional decisions that will have to be made as AI proliferates into society and transforms our government and social institutions. The Research Handbook will also introduce designers of artificially intelligent systems to the legal issues that apply to the make-up and use of AI from the technologies, algorithms, and analytical techniques. This essential guide to the U.S., EU, and other International law, regulations, and statutes which apply to the emerging field of 'law and AI' will be a valuable reference for scholars and students interested in information and intellectual property law, privacy, and data protection as well as to legal theorists and social scientists who write about the future direction and implications of AI. The Research Handbook will also serve as an important reference for legal practitioners in different jurisdictions who may litigate disputes involving AI, and to computer scientists and engineers actively involved in the design and use of the next generation of AI systems. Contributors include: W. Barfield, S. Bayern, S.J. Blodgett-Ford, R.G.A. Bone, T. Burri, A. Chin, J.A. Cubert, M. de Cock Buning, S. De Conca, S-.A. Elvy, A. Ezrachi, R. Leenes, Y. Lev-Aretz, A.R. Lodder, R.P. Loui, T.M. Massaro, L.T. McCarty, J.O. McGinnis, F. Moslein, H. Norton, N. Packin, U. Pagallo, S. Quattrocolo, W. Samore, F. Shimpo, M.E. Stucke, R. van den Hoven van Genderen, L. Vertinsky, A. von Ungern-Sternberg, J.F. Weaver, Y-.H. Weng, I. Wildhaber |
You may like...
Digital Communications - Courses and…
Pierre Jarry, Jacques N. Beneat
Hardcover
R1,900
Discovery Miles 19 000
Neurological Complications of Systemic…
Herbert B. Newton, Mark G Malkin
Hardcover
R5,027
Discovery Miles 50 270
Fundamental and Supportive Technologies…
Sherine Mohamed Abd El-Kader, Hanan Hussein
Hardcover
R6,218
Discovery Miles 62 180
Ubiquitous Intelligence and Computing
Braylen Stevenson
Hardcover
Mobile Devices and Smart Gadgets in…
Sajid Umair, Muhammad Yousaf Shah
Hardcover
R4,850
Discovery Miles 48 500
Sexual Identities - A Cognitive Literary…
Patrick Colm Hogan
Hardcover
R2,475
Discovery Miles 24 750
Emerging Perspectives on the Mobile…
Juan Miguel Aguado, Claudio Feijoo, …
Hardcover
R5,249
Discovery Miles 52 490
|