![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > General
The Social Media Journalist Handbook teaches readers how to be a real-world social media journalist, tracing the evolution of the field to its current-day practice. This book establishes social media journalism as the latest and one of the most effective ways to practice journalism in the 21st century. It features insights from top recruiters, editors, and senior producers working in the field, as well exercises that aid readers in developing the practical skills necessary to work successfully with social media. Readers will come away from the book with the knowledge to build strong social media strategies across different budgets, employing evergreen principles that work for different, ever-changing platforms. They'll learn how to reach and engage with the maximum number of people, as well as find sources, raise one's profile, conduct research, and produce stories.
Web of Lies is a fascinating and far-reaching examination of the rising threat of far-right extremist thought in Ireland and internationally, and looks at how these movements utilise the online world to spread disinformation, polarising society in the process. From the Illuminati to the Red Scare, Save the Children to QAnon, research analyst Aoife Gallagher shows that there are many pathways to radicalisation - most of them benign and unassuming - and demonstrates that we are all susceptible to conspiratorial thinking and at risk of falling down the rabbit hole. In an accessible and entertaining style, Web of Lies presents a history of conspiracy theories and their roots in anti-Semitism, xenophobia and white supremacy; the role social media plays in spreading these theories; how they can proliferate during times of crises; and what we can do to protect ourselves and others from falling victim to these messages. 'Ever wondered how good people get trapped in their worst nightmares? Web of Lies is an unforgettable journey through the upside-down world of conspiratorial thinking. Aoife Gallagher has written the definitive account of how global lies have changed Irish lives, in a book full of personal empathy, unrivalled expertise and captivating storytelling. It shines a light on the real-world harm of our darkest online fantasies and it shows how each of us can fight back.' Mark Little 'At a time of fractious discord in discourse, Gallagher provides a vital context to and education in the strange and alarming world of conspiracy theories. Anyone interested in truth and facts should read this book.' Una Mullally 'Aoife Gallagher can plumb the depths of the internet and come up to the surface to explain what she's found with levity, empathy and humour. Wise without lecturing; sharp but always maintaining compassion for those caught up in misinformation. A fantastic global overview of trends while having one eye on how these things have come to Ireland.' Brianna Parkins
Following the implementation of the new General Data Protect Regulation on 25 May 2018, organizations should now be fully compliant with their national interpretation of this far-reaching data protection standard. The reality is that most are not; whether through their inappropriate use of online cookies or ineffective physical data security, businesses continue to struggle with the increasing pressure from regulators to apply the Regulation. Non-compliance is widely due to misinterpretation, lack of real-world thinking, and challenges in balancing costs against business practicalities. This book provides insight into how to achieve effective compliance in a realistic, no-nonsense and efficient way. The authors have over 100 years' collective international experience in security, compliance and business disciplines and know what it takes to keep companies secure and in-line with regulators' demands. Whether your organization needs to swiftly adopt GDPR standards or apply them in "Business as Usual" this book provides a wide range of recommendations and explicit examples. With the likelihood of high-profile penalties causing major reputational damage, this book explains how to reduce risk, run a remedial project, and take immediate steps towards mitigating gaps. Written in plain English, it provides an invaluable international reference for effective GDPR adoption.
The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats. The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics.
Friendship is regarded as crucial to living a good life. But how does friendship make our lives better? Do all friendships make our lives better? What sorts of interactions are necessary for maintaining valuable friendships? This book answers these questions via a philosophical exploration of friendship and the ways that it contributes value to our lives. Diane Jeske uses this philosophical analysis to assess the impact of our ever-growing use of social media: Do interactions via social media interfere with our ability to maintain genuine friendships? Do such interactions undermine the contribution of friendship to the value of our lives? In addressing these topics, Jeske examines the contemporary notion of a 'frenemy,' the ways in which we deliberately craft our social media personas, the role of the physical body in friendship, and the ways in which social media's exacerbation of our fear of being left out and of comparison-based envy can impact our relationships. Written in a clear and engaging style, Friendship and Social Media brings philosophical rigor and clarity to the task of determining how we can responsibly use social media in our own lives. It is essential reading for anyone interested in the ethics of interpersonal relationships and the social impact of technology.
The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber attacks against states showing a dramatic increase in recent times, this book investigates the traditional concepts of 'use of force', 'armed attack', and 'armed conflict' and asks whether existing laws created for analogue technologies can be applied to new digital developments. The book provides a comprehensive analysis of primary documents and surrounding literature, to investigate whether and how existing rules on the use of force in international law apply to a relatively new phenomenon such as cyberspace operations. It assesses the rules of jus ad bellum and jus in bello, whether based on treaty or custom, and analyses why each rule applies or does not apply to cyber operations. Those rules which can be seen to apply are then discussed in the context of each specific type of cyber operation. The book addresses the key questions of whether a cyber operation amounts to the use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law when they are not accompanied by traditional hostilities; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities. The book is essential reading for everyone wanting a better understanding of how international law regulates cyber combat.
Ninety-five percent of American kids have Internet access by age 11; the average number of texts a teenager sends each month is well over 3,000. More families report that technology makes life with children more challenging, not less, as parents today struggle with questions previous generations never faced: Is my thirteen-year-old responsible enough for a Facebook page? What will happen if I give my nine year-old a cell phone? In The Parent App, Lynn Schofield Clark provides what families have been sorely lacking: smart, sensitive, and effective strategies for coping with the dilemmas of digital and mobile media in modern life. Clark set about interviewing scores of mothers and fathers, identifying not only their various approaches, but how they differ according to family income. Parents in upper-income families encourage their children to use media to enhance their education and self-development and to avoid use that might distract them from goals of high achievement. Lower income families, in contrast, encourage the use of digital and mobile media in ways that are respectful, compliant toward parents, and family-focused. Each approach has its own benefits and drawbacks, and whatever the parenting style or economic bracket, parents experience anxiety about how to manage new technology. With the understanding of a parent of teens and the rigor of a social scientist, Clark tackles a host of issues, such as family communication, online predators, cyber bullying, sexting, gamer drop-outs, helicopter parenting, technological monitoring, the effectiveness of strict controls, and much more. The Parent App is more than an advice manual. As Clark admits, technology changes too rapidly for that. Rather, she puts parenting in context, exploring the meaning of media challenges and the consequences of our responses-for our lives as family members and as members of society.
In its first and second editions, Tomorrow's Lawyers became an international bestseller, widely read and cited by practitioners and students. The third edition focuses on the law and lawyers in the 2020s. For Richard Susskind, the future of legal service is neither Grisham nor Rumpole. Instead, he predicts a world of online courts, AI-based global legal businesses, disruptive legal technologies, liberalized markets, commoditization, alternative sourcing, simulated practice on the metaverse, and many new legal jobs. This volume is a definitive and updated introduction to this future - for aspiring lawyers, and for all who want to modernize and upgrade our legal and justice systems. It offers practical guidance for everyone intending to build careers and businesses in law. Written in an era of greater technological advance than humanity has ever witnessed, this work is a call to arms: it challenges those who feel that the law and lawyers are somehow immune from technological advance; it draws attention to the unaffordability and inaccessibility of legal service, for businesses and citizens alike; it invites the next generation of lawyers to harness the power of technology in improving and even overhauling the way in which legal and court service is currently provided. Tomorrow's Lawyers identifies new opportunities for lawyers, new ways of helping clients and the community. It enjoins its readers to become involved in building the systems that will replace outmoded forms of legal work. It argues that it is both a privilege and an obligation for tomorrow's lawyers to embrace and bring about change. A must-read for legal undergraduates, aspiring and young lawyers, senior practitioners, leaders in law firms and legal businesses, law professors and law teachers.
The Insta Grammar series explores the best of the best in amateur photography, focussing on the immensely popular social media site, Instagram. After Cats, City and Nordic, Green is the fourth and latest title in this series, which closely follows online trends. The reason is obvious: green is the new black. Be inspired by photos of plants, trees and everything green, and enjoy the creativity of the selected photographers.
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assist fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes. The book also includes information about audit test red flags to watch out for, a list of recommended controls to help prevent future fraud related incidents, as well as step-by-step demonstrations of a number of common audit tests using IDEA (R) as a CAATT tool.
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture. Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC)2 (R) Guide to the ISSAP (R) CBK (R), Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations. Newly Enhanced Design - This Guide Has It All! Only guide endorsed by (ISC)2 Most up-to-date CISSP-ISSAP CBK Evolving terminology and changing requirements for security professionals Practical examples that illustrate how to apply concepts in real-life situations Chapter outlines and objectives Review questions and answers References to free study resources Read It. Study It. Refer to It Often. Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.
With the help of artificial intelligence, machine learning, and big data analytics, the internet of things (IoT) is creating partnerships within industry where machines, processes, and humans communicate with one another. As this radically changes traditional industrial operations, this results in the rapid design, cheap manufacture, and effective customization of products. Answering the growing demand of customers and their preferences has become a challenge for such partnerships. Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital is a collection of innovative research that discusses development, implementation, and business impacts of IoT technologies on sustainable societal development and improved life quality. Highlighting a wide range of topics such as green technologies, wireless networks, and IoT policy, this book is ideally designed for technology developers, entrepreneurs, industrialists, programmers, engineers, technicians, researchers, academicians, and students.
Personal health and fitness has joined the digital revolution. Using Microsoft HealthVault, people interested in monitoring their health have an unprecedented opportunity to research their own data. This concise book explains how HealthVault users can collect and analyze their data, and how application developers can help them with mobile or web-based applications. You'll learn how to use HealthVault's open API, flexibility, and connections with multiple health-care providers to develop health data applications, enable automatic updates from well-known fitness devices, and use programming libraries to create reports and investigate trends. Get a walkthrough of HealthVault functionality available to end users Use HealthVault to capture data from devices that measure a user's health Examine HealthVault's API for interacting with applications and devices, using .NET code samples Develop a Quantified Self application for consumers that can track more than 80 data types Learn how to build mobile apps for HealthVault by exploring an end-to-end example for Windows Phone 7 Use best practices for releasing, maintaining, and marketing HealthVault applications to end users
Soziale Netzwerke haben eine Fulle von Problemen in Bezug auf die Privatsphare und den Schutz personenbezogener Daten aufgeworfen. Die Nutzung sozialer Netzwerke ist zu einem zentralen Anliegen von Rechtswissenschaftlern, politischen Entscheidungstragern und den Betreibern sowie den Nutzern dieser sozialen Netzwerke geworden. Dieses bahnbrechende Buch beleuchtet die Bedeutung des Datenschutzes im Zusammenhang mit den neuen elektronischen Kommunikationstechnologien von heute, da es widerspruchliche Anspruche zum Schutz der nationalen und internationalen Sicherheit, der Freiheit des Internets und wirtschaftlicher UEberlegungen aufzeigt. Auf der Grundlage des intellektuellen Rahmens der New Haven School of Jurisprudence stellt der Autor das geltende Recht zum Schutz der Privatsphare und zu sozialen Medien in internationaler und vergleichender Perspektive dar und konzentriert sich dabei auf die Vereinigten Staaten, die Europaische Union und ihre Allgemeine Datenschutzverordnung von 2018 sowie auf Deutschland, das Vereinigte Koenigreich und Lateinamerika. Das Buch bewertet das geltende Recht, eroertert Alternativen und gibt Empfehlungen fur eine oeffentliche Ordnung der Menschenwurde. UEbersetzt mit www.DeepL.com/Translator (kostenlose Version)
Using Twitter to Build Communities looks at ways for libraries, archives, and museums to go far beyond Twitter as a "broadcasting" tool, and highlights innovative methods to use the service to spark communication and create ties within your institution's greater community. Appropriate for the social media beginner as well as the experienced user, it covers topics like: *Creating a Social Media Strategy/Policy *Choosing the Right Software *Gaining Followers *How to curate content *How and when to automate your feed *How and when to embed your feed *How to use cross-platform strategies *Using Analytics This book condenses years of research and expertise on using Twitter in an institutional setting into one handy reference for launching or reviving your organization's Twitter presence into an impactful medium in your community.
Social media and smartphones are criticised for being addictive, destroying personal relationships, undermining productivity, and invading privacy. In this book, Trine Syvertsen explores the phenomenon of digital detox: users taking a break from digital media or adopting measures to limit smartphone and social media use. Based on studies, documents, media texts and interviews with media users, Syvertsen discusses how media industries intensify the quest for attention, how companies and governments team up to get everybody online, and how the main responsibility for managing online risks and problems are placed on the users' shoulders. She provides a rich account of how users reduce their online engagement through time-limitations, restrictions on smartphone use, productivity apps, and use of analogue media. Syvertsen shows how digital detoxing has much in common with other forms of self-help such as mindfulness, decluttering and simple living and places digital detox within a culture of self-optimisation. But digital detox is also about sustaining face-to-face conversations, better work-life-balance, a deeper connection with nature and more meaningful interpersonal relationships. With a wealth of examples, analyses and stories, Digital Detox is a valuable guide to why digital detox and disconnection has become a topic, how it is practised, what it says about the state of media industries and how people express resistance in the 21st century.
Never before have the civil rights of people with disabilities aligned so well with developments in information and communication technology. The center of the technology revolution is the Internet, which fosters unprecedented opportunities for engagement in democratic society. The Americans with Disabilities Act likewise is helping to ensure equal participation in society by people with disabilities. Globally, the Convention on the Rights of Persons with Disabilities further affirms that persons with disabilities are entitled to the full and equal enjoyment of fundamental personal freedoms. This book is about the lived struggle for disability rights, with a focus on Web equality for people with cognitive disabilities, such as intellectual disabilities, autism, and print-related disabilities. The principles derived from the right to the Web - freedom of speech and individual dignity - are bound to lead toward full and meaningful involvement in society for persons with cognitive and other disabilities.
What is social media? Have you got a facebook page but are unsure how it can benefit your company? Or do you want to monitor your social media activity to see its effectiveness? Learn how to understand and utilize social media for business. From the basics to the most complex issues The Business of Being Social breaks down every aspect of social media and explains step-by-step how you can create a strategy for success. Social media exploded onto our screens but most businesses use traditional marketing methods and are confused how to harness the benefits. Make sure you're using social media to its full potential. Whether you're a business owner or need social media for marketing to set up new social media channels such as Pinterest or YouTube, build your community or find out how to use keywords and SEO, The Business of Being Social covers all these aspects and more. From helping you to build your brand and promote communication between yourself and your customers, to driving customers to your website and learning from companies who have made their social media campaigns a success, The Business of Being Social is your one-stop guide to the ins and outs of social media. Learn how to: Create a viable social media strategy Build and use channels such as Twitter, Facebook and LinkedIn Create customised apps, communities and use keywords Monitor any activity such as paid-for advertising Understand your audience and what content they want Integrate your social media activity into your marketing strategies Discover the secrets to social media for your business. "As a business owner, how can you ensure that your company's voice and message is heard loud and clear. Thankfully, online visibility experts, Michelle Carvill and David Taylor, have put their heads together and published The Business of Being Social." The Good Web Guide "Up-to-date, thorough, very interesting and informative, well-written, engaging, and highly practical. Michelle and David clearly know their stuff and they've done a great job of combining and presenting their expert knowledge in this book." Birds on the Blog
The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In "Linux Multimedia Hacks", author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment capabilities of your favorite OS. Included are tips and tricks for connecting to iPods, creating MP3s and Oggs, watching and making DVDs, turning your Linux box into a Tivo ala MythTV, and much more. You don't have to be a Linux server guru to make use of this book. "Linux Multimedia Hacks" takes the best of Linux's multimedia tools and with step-by-step instructions shows even novice users how to do cool and useful things with images, audio, and video. It includes entry level hacks that nearly all Linux users will want, such as installing codecs for audio and video playback and managing thousands of photographs. Later, you'll find hacks that cover a variety of advanced projects, from ripping and organizing media files with metatags, to editing video and audio tracks, to creating your own DVDs. Basic or advanced, each hack stands on its own, so you can feel free to jump around to only the sections that interest you. The book is divided into five easy-to-understand chapters: Images: tips range from basic image edits to automated image manipulation; Audio: hacks include audio format conversion and tweaking metadata within audio files; Video: learn how to covert between video formats, plus how to create your own VCDs and DVDs; Broadcast Media: tips include how to access and create you own web broadcasts as well as watch and record TV; and Web: learn how to make your multimedia creations available to the world. As one of the most powerful multimedia platforms around, Linux has far more capabilities and features than meets the eye. This latest Hacks book gives you the technical chops to enjoy them all. |
You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Research Anthology on Social Media's…
Information Resources Management Association
Hardcover
R9,426
Discovery Miles 94 260
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,719
Discovery Miles 137 190
Security in IoT Social Networks
Fadi Al-Turjman, B.D. Deebak
Paperback
R2,634
Discovery Miles 26 340
|