![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
Welcome to the world of 2051 through the eyes of digital marketing pioneers from around the world: engineers, developers, designers, writers and analysts who closely follow tech trends. With their finely honed intuition for user experience and a passion for technology, the authors boldly predict life 30 years from now through a collection of fascinating, futuristic, stories.
"OK. I've got my Twitter account...now what can I do with it?" Sound familiar? "#tweetsmart" provides the answer with 25 creative projects to help your business, cause, or organization grow. But this isn't just another social media marketing book--it's the anti-marketing how-to community-engagement book. Twitter is not a marketing channel (and should never be used as such) but it is a community of interested, engaged, and influential people. Meeting and getting to know these people can help you build your own community. In this useful guide, you'll find projects to help you approach your Twitter audience in ways that are strategic, measurable, and fun. Put a new wrinkle on an old contest: "be the 10th person to tweet" Create a hashtag game around your company or products Instead of polling, ask your followers to help you make a product decision Make MadLibs out of your marketing copy or mission statement Hold a scavenger hunt, and relay clues via Twitter Organize a weekly Twitter chat on various subjects Solicit funny product shots, using Twitter's photo-sharing utility Spontaneously tweet from a store location: "Meet me now and win "
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.
While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to balance the requirements of the IPPF with management expectations. The true challenge for any internal auditor is to appropriately apply the Standards while exerting adequate independence and objectivity in the face of management pressure. In Leading the Internal Audit Function, Lynn Fountain presents lessons learned from her extensive experience as an internal auditor, internal audit manager, and CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book identifies more than 50 challenges for auditors and discusses potential alternative actions the auditor can take when they experience a similar challenge. The book explains how to: Build a value-oriented function that abides by the standards and supports the objectives and goals of the organization. Execute the many aspects of the internal audit, including assurance and consulting work. Build a risk-based audit process. Develop and sustain the internal audit team. Develop and manage relationships with management and the audit committee. Manage internal audit's role in corporate governance, compliance, and fraud. Leading the Internal Audit Function includes real-life examples, scenarios, and lessons learned from internal auditors and CAEs to emphasize the importance of carefully managing all aspects of the internal audit. The author summarizes her many lessons learned into ten "commandments" for both CAEs and internal auditors. By following the guidelines in this book, you should be well-equipped to gain management support, perform effective and ethical audits, and uphold IIA Standards.
An eye-opening look at the invisible workers who protect us from seeing humanity's worst on today's commercial internet Social media on the internet can be a nightmarish place. A primary shield against hateful language, violent videos, and online cruelty uploaded by users is not an algorithm. It is people. Mostly invisible by design, more than 100,000 commercial content moderators evaluate posts on mainstream social media platforms: enforcing internal policies, training artificial intelligence systems, and actively screening and removing offensive material-sometimes thousands of items per day. Sarah T. Roberts, an award-winning social media scholar, offers the first extensive ethnographic study of the commercial content moderation industry. Based on interviews with workers from Silicon Valley to the Philippines, at boutique firms and at major social media companies, she contextualizes this hidden industry and examines the emotional toll it takes on its workers. This revealing investigation of the people "behind the screen" offers insights into not only the reality of our commercial internet but the future of globalized labor in the digital age.
'Everything you love about romantic comedy - hilarious, sharply observed, smart, and sexy as hell. I adored this book!' RACHEL HAWKINS 'Smart, sexy, and feminist, I Love You, I Hate You is a delightful love letter to internet friends and Nora Ephron. Elizabeth Davis just became an auto-buy author for me' ANNETTE CHRISTIE 'Complete You've Got Mail magic! Davis's humor made this steamy, feisty rom-com a delight to read . . . a must read for fans of Nora Ephron rom-coms!' DENISE WILLIAMS All's fair in love and law . . . You've Got Mail meets Dating You/Hating You by Christina Lauren and The Hating Game by Sally Thorne in this sizzling rom-com - readers love it! 'A five-star read . . . the best read of the year, if you like your rom coms witty and sweet then you need this story in your life' reader review 'Elizabeth Davis's way of writing romance is perfect . . . Amazing characters and writing, 5/5 stars!' reader review 'Everything I wanted and more! Their chemistry was perfect . . . If only I could go back in time and read this book for the first time again' reader review .......................................... Victoria and Owen are bitter rivals. Nora and Luke are friends online. Who would believe these two couples have anything in common? Of all the decisions brilliant lawyer Victoria Clemenceaux has made in her life, an unforgettable one-night stand with her opposing counsel Owen Pohl is either the worst...or the best. One thing is certain: these long-standing rivals aren't going to let their searing attraction stop them from winning the biggest case of their careers. Thankfully Victoria and Owen have someone to vent to about their nemeses. But they have no idea that their online 'friends', Nora and Luke, are the very people they hate in real life. As Nora and Luke grow closer online, and Victoria and Owen find their undeniable attraction harder to resist, the lines between love and hate blur. When the truth comes out, will their online chemistry work in the real world, or will their constant rivalry sever their connection? .......................................... Raves for I Love You, I Hate You! 'This book made my heart sing . . . There's such tenderness and passion and LIFE . . . Go buy this book immediately' 'So good that I devoured the whole book in one sitting' 'You know when you find a book you love so much you accidentally stay up until well after 2am to finish it in one sitting? . . . That's this book! . . . A fun, fast-paced debut romance that I could read again and again' Two can play at this game . . . Look out for The Player Next Door, the smart and sexy new fake-dating rom-com from Elizabeth Davis, available to preorder now!
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.
Digital development not only marked today's world in terms of technology, but also transformed our social life into different forms, and it has moved our social practices to a different media.With the development of technology, one of the many aspects of the digital representation that penetrates all areas of life is created by new technology's impacts on human health and behavior. Digital technology that penetrates all areas of life has some impacts on human health and behavior. Some of them are due to virtual reality, and some are due to overuse of new media. These include the following diseases such as cyber disease, digital addiction, binge watching, ego surfing, and many more. The book tackles the abovementioned diseases specifically and includes a wide spectrum of both literature reviews and original studies regarding the diseases of the digital era for a better comprehension of today's world. The studies help to deal with these diseases and develop defense mechanisms against them.
ESPN and the Changing Sports Media Landscape considers the ways the network is reinventing itself as it enters its fifth decade. In their previous book, The ESPN Effect (2015), the editors made the observation that ESPN was a pervasive branded-content provider across multiple media platforms, delivering programs and information 24 hours a day, 365 days a year, to influence how sports fans think and feel about the people who play and control these games. ESPN and the Changing Sports Media Landscape asks whether that will hold true in the 2020s and beyond. The past decade has seen momentous changes in the sports media landscape, among them the massive proliferation of mobile platforms as a major source of sports content, astronomical growth in fantasy sport and esport industries, and the increasing entanglement of sports media in contentious sociopolitical debates. The contributors to this book analyze how ESPN has navigated the shifting playing field and speculate on what the next decade might bring for ESPN and the global sports media industry.
ESPN and the Changing Sports Media Landscape considers the ways the network is reinventing itself as it enters its fifth decade. In their previous book, The ESPN Effect (2015), the editors made the observation that ESPN was a pervasive branded-content provider across multiple media platforms, delivering programs and information 24 hours a day, 365 days a year, to influence how sports fans think and feel about the people who play and control these games. ESPN and the Changing Sports Media Landscape asks whether that will hold true in the 2020s and beyond. The past decade has seen momentous changes in the sports media landscape, among them the massive proliferation of mobile platforms as a major source of sports content, astronomical growth in fantasy sport and esport industries, and the increasing entanglement of sports media in contentious sociopolitical debates. The contributors to this book analyze how ESPN has navigated the shifting playing field and speculate on what the next decade might bring for ESPN and the global sports media industry.
Turn Up the Volume equips journalism students, professionals, and others interested in producing audio content with the know-how necessary to launch a podcast for the first time. It addresses the unique challenges beginner podcasters face in producing professional level audio for online distribution. Beginners can learn how to handle the technical and conceptual challenges of launching, editing, and posting a podcast. This book exposes readers to various techniques and formats available in podcasting. It includes the voices of industry experts as they recount their experiences producing their own podcasts and podcast content. It also examines how data analytics can help grow an audience and provide strategies for marketing and monetization. Written accessibly, Turn Up the Volume gives you a clear and detailed path to launching your first podcast.
The new edition of Digital Learning: The Key Concepts is the perfect reference for anyone seeking to navigate the myriad of named concepts, approaches, issues and technologies associated with digital learning. Key terms are explained succinctly, making this book ideal to dip into for a quick answer, or to read from cover-to-cover, in order to gain a mastery of how digital concepts fit within the world of education. Fully updated to include important developments in digital practice and technology in education over the last ten years, this book takes the reader from A to Z through a range of relevant topics including: * Course design * Digital scholarship * Learning design * Open education * Personal learning environments * Social media and social networking. Ideal as an introductory guide, or as a reference book for ongoing referral, this quick-to-use and comprehensive guide is fully crossreferenced and complete with suggestions for further reading and exploration, making it an essential resource for anyone looking to extend their understanding of digital practices, techniques and pedagogic concepts.
The new edition of Digital Learning: The Key Concepts is the perfect reference for anyone seeking to navigate the myriad of named concepts, approaches, issues and technologies associated with digital learning.
US society has controversially debated civil-military relationships and war trauma since the Vietnam War. Civic activists today promote Indigenous warrior traditions as role models for non-Native veteran reintegration and health care. They particularly stress the role of ritual and narrative for civil-military negotiations of war experience and for trauma therapy. Applying a cultural-comparative lens, this book reads non-Native soldiers' and veterans' life writing from post-9/11 wars as "ceremonial storytelling." It analyzes activist academic texts, "milblogs" written in the war zone, as well as "homecoming scenarios." Soldiers' and veterans' interactions with civilians constitute jointly constructed, narrative civic rituals that discuss the meaning of war experience and homecoming.
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 - 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.
Trope Publishing Company's new Mobile Edition Series identifies fine art photographers shooting in a new way, using mobile devices as their primary tool to capture images, in a category still defining itself. Among the millions of images posted to social media every day, the work of these photographers stands out for its discipline and mastery. Beijing native Cocu Liu's work emphasizes its simplicity, ordered composition, and mastery of light and shadow. An early adopter of the iPhone, Cocu has built his work around the idea that the best camera is the one you have with you. His ability to notice, compose, and capture an image with such spontaneity, so simply, is a true sign of his artistry. Cocu Liu introduces a wider audience to the talent that has won him multiple awards, notice from mobile phone makers, and the admiration of fellow photographers and his over 130K social media followers.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
A landmark history that traces the creation, management, and sharing of information through six centuries Thanks to modern technological advances, we now enjoy seemingly unlimited access to information. Yet how did information become so central to our everyday lives, and how did its processing and storage make our data-driven era possible? This volume is the first to consider these questions in comprehensive detail, tracing the global emergence of information practices, technologies, and more, from the premodern era to the present. With entries spanning archivists to algorithms and scribes to surveilling, this is the ultimate reference on how information has shaped and been shaped by societies. Written by an international team of experts, the book's inspired and original long- and short-form contributions reconstruct the rise of human approaches to creating, managing, and sharing facts and knowledge. Thirteen full-length chapters discuss the role of information in pivotal epochs and regions, with chief emphasis on Europe and North America, but also substantive treatment of other parts of the world as well as current global interconnections. More than 100 alphabetical entries follow, focusing on specific tools, methods, and concepts-from ancient coins to the office memo, and censorship to plagiarism. The result is a wide-ranging, deeply immersive collection that will appeal to anyone drawn to the story behind our modern mania for an informed existence. Tells the story of information's rise from 1450 through to today Covers a range of eras and regions, including the medieval Islamic world, late imperial East Asia, early modern and modern Europe, and modern North America Includes 100 concise articles on wide-ranging topics: Concepts: data, intellectual property, privacy Formats and genres: books, databases, maps, newspapers, scrolls and rolls, social media People: archivists, diplomats and spies, readers, secretaries, teachers Practices: censorship, forecasting, learning, political reporting, translating Processes: digitization, quantification, storage and search Systems: bureaucracy, platforms, telecommunications Technologies: cameras, computers, lithography Provides an informative glossary, suggested further reading (a short bibliography accompanies each entry), and a detailed index Written by an international team of notable contributors, including Jeremy Adelman, Lorraine Daston, Devin Fitzgerald, John-Paul Ghobrial, Lisa Gitelman, Earle Havens, Randolph C. Head, Niv Horesh, Sarah Igo, Richard R. John, Lauren Kassell, Pamela Long, Erin McGuirl, David McKitterick, Elias Muhanna, Thomas S. Mullaney, Carla Nappi, Craig Robertson, Daniel Rosenberg, Neil Safier, Haun Saussy, Will Slauter, Jacob Soll, Heidi Tworek, Siva Vaidhyanathan, Alexandra Walsham, and many more.
In recent years, the process and outlet for public speaking has grown with digital progressions such as TED talks and Facebook Live. Purposeful Communication in a Digital Age, 2nd Edition, provides a practical, step-by-step approach to developing and delivering effective speeches. Offering supplementary articles, case studies, and interviews with key leaders within the text and online, this is an all-in-one resource for the traditional, online, or hybrid classroom. The new edition devotes focus to presenting in the digital world, addressing both traditional and contemporary forms of presentation, and specifically directs students on seeking out credible sources when conducting research. Its eResource features video speech examples, classroom exercises, an instructor manual, and a quiz bank.
Today almost everyone in the developed world spends time online and anyone involved in strategic communication must think digitally. The magnitude of change may be up for debate but the trend is unstoppable, dramatically reconfiguring business models, organisational structures and even the practice of democracy. Strategic Communication, Social Media and Democracy provides a wholly new framework for understanding this reality, a reality that is transforming the way both practitioners and theoreticians navigate this fast-moving environment. Firmly rooted in empirical research, and resisting the lure of over-optimistic communication dreams, it explores both the potential that social media offers for changing the relationships between organisations and stakeholders, and critically analyses what has been achieved so far. This innovative text will be of great interest to researchers, educators and advanced students in strategic communications, public relations, corporate communication, new media, social media and communication management. |
You may like...
Recent Advances in Algorithmic…
Shaun Forth, Paul Hovland, …
Hardcover
R2,704
Discovery Miles 27 040
Networks of Learning Automata…
M.A.L. Thathachar, P.S. Sastry
Hardcover
R2,679
Discovery Miles 26 790
The Mathematical Principles of Natural…
Isaac Newton, Andrew D 1734 Motte
Hardcover
R888
Discovery Miles 8 880
A Geometric Analysis of the Platonic…
Kenneth J. M. MacLean
Hardcover
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,065
Discovery Miles 40 650
Mathematical Devices for Optical…
Sibel Başkal, Young S. Kim, …
Paperback
R765
Discovery Miles 7 650
Lectures on the Nearest Neighbor Method
Gerard Biau, Luc Devroye
Hardcover
|