0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (27)
  • R250 - R500 (203)
  • R500+ (2,783)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

An Integrated Approach to Home Security and Safety Systems (Hardcover): Sonali Goyal, Neera Batra, N. K. Batra An Integrated Approach to Home Security and Safety Systems (Hardcover)
Sonali Goyal, Neera Batra, N. K. Batra
R3,381 Discovery Miles 33 810 Ships in 12 - 17 working days

This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.

The Cybersecurity Self-Help Guide (Hardcover): Arun Soni The Cybersecurity Self-Help Guide (Hardcover)
Arun Soni
R3,247 Discovery Miles 32 470 Ships in 12 - 17 working days

Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

The Cybersecurity Self-Help Guide (Paperback): Arun Soni The Cybersecurity Self-Help Guide (Paperback)
Arun Soni
R1,459 Discovery Miles 14 590 Ships in 12 - 17 working days

Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

The Impact of Information Technology - Evidence from the Healthcare Industry (Paperback): Nirup M. Menon The Impact of Information Technology - Evidence from the Healthcare Industry (Paperback)
Nirup M. Menon
R1,065 Discovery Miles 10 650 Ships in 12 - 17 working days

First published in 2000. Routledge is an imprint of Taylor & Francis, an informa company.

Bioinformation Worlds and Futures (Hardcover): EJ Gonzalez-Polledo, Silvia Posocco Bioinformation Worlds and Futures (Hardcover)
EJ Gonzalez-Polledo, Silvia Posocco
R4,141 Discovery Miles 41 410 Ships in 12 - 17 working days

This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.

Functional Reverse Engineering of Machine Tools (Paperback): Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain,... Functional Reverse Engineering of Machine Tools (Paperback)
Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain, Cedric Aimal Edwin
R1,446 Discovery Miles 14 460 Ships in 12 - 17 working days

The purpose of this book is to develop capacity building in strategic and non-strategic machine tool technology. The book contains chapters on how to functionally reverse engineer strategic and non-strategic computer numerical control machinery. Numerous engineering areas, such as mechanical engineering, electrical engineering, control engineering, and computer hardware and software engineering, are covered. The book offers guidelines and covers design for machine tools, prototyping, augmented reality for machine tools, modern communication strategies, and enterprises of functional reverse engineering, along with case studies. Features Presents capacity building in machine tool development Discusses engineering design for machine tools Covers prototyping of strategic and non-strategic machine tools Illustrates augmented reality for machine tools Includes Internet of Things (IoT) for machine tools

Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Paperback): Adrian T. H. Kuah,... Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Paperback)
Adrian T. H. Kuah, Roberto Dillon
R1,579 Discovery Miles 15 790 Ships in 12 - 17 working days

Considers how different fields across technology and business have been affected by the Covid-19 pandemic Explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape technology Offers a wealth of perspectives from international contributors working in a variety of contexts.

Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Hardcover): Adrian T. H. Kuah,... Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Hardcover)
Adrian T. H. Kuah, Roberto Dillon
R4,014 Discovery Miles 40 140 Ships in 12 - 17 working days

Considers how different fields across technology and business have been affected by the Covid-19 pandemic Explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape technology Offers a wealth of perspectives from international contributors working in a variety of contexts.

Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Paperback): Uwe Engel, Anabel Quan-Haase,... Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Paperback)
Uwe Engel, Anabel Quan-Haase, Sunny Liu, Lars E. Lyberg
R1,771 Discovery Miles 17 710 Ships in 12 - 17 working days

1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.

Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Hardcover): Uwe Engel, Anabel Quan-Haase,... Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Hardcover)
Uwe Engel, Anabel Quan-Haase, Sunny Liu, Lars E. Lyberg
R5,360 Discovery Miles 53 600 Ships in 12 - 17 working days

1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.

Development of a Remote Laboratory for Engineering Education (Paperback): Ning Wang, Qianlong Lan, Xuemin Chen, Gangbing Song,... Development of a Remote Laboratory for Engineering Education (Paperback)
Ning Wang, Qianlong Lan, Xuemin Chen, Gangbing Song, Hamid Parsaei
R645 Discovery Miles 6 450 Ships in 12 - 17 working days

The field of information technology continues to advance at a brisk pace, including the use of Remote Laboratory (RL) systems in education and research. To address the needs of remote laboratory development for such purposes, the authors present a new state-of-the-art unified framework for RL system development. Included are solutions to commonly encountered RL implementation issues such as third-party plugin, traversing firewalls, cross platform running, and scalability, etc. Additionally, the book introduces a new application architecture of remote lab for mobile-optimized RL application development for Mobile Learning (M-Learning). It also shows how to design and organize the remote experiments at different universities and make available a framework source code. The book is intended to serve as a complete guide for remote lab system design and implementation for an audience comprised of researchers, practitioners and students to enable them to rapidly and flexibly implement RL systems for a range of fields.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,578 Discovery Miles 15 780 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

It's Your Digital Life (Paperback): Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan It's Your Digital Life (Paperback)
Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan
R1,461 Discovery Miles 14 610 Ships in 12 - 17 working days

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

Ruling Roman Britain - Kings, Queens, Governors and Emperors from Julius Caesar to Agricola (Paperback): David Braund Ruling Roman Britain - Kings, Queens, Governors and Emperors from Julius Caesar to Agricola (Paperback)
David Braund
R1,355 Discovery Miles 13 550 Ships in 9 - 15 working days

In this book, David Braund offers a significantly different perspective upon the history of Roman Britain. He concentrates upon the literary evidence, which has been studied to a lesser extent than archaeology in recent years. Close attention to the Greek and Roman sources enables the construction of a new approach to Roman Britain, its history and its archaeology. For the first time, monarchy is identified as a key issue in the history of Roman Britain.

It's Your Digital Life (Hardcover): Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan It's Your Digital Life (Hardcover)
Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan
R3,250 Discovery Miles 32 500 Ships in 12 - 17 working days

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R3,994 Discovery Miles 39 940 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Public Policy Analytics - Code and Context for Data Science in Government (Paperback): Ken Steif Public Policy Analytics - Code and Context for Data Science in Government (Paperback)
Ken Steif
R1,458 Discovery Miles 14 580 Ships in 12 - 17 working days

Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R. Each of the eight chapters provides a detailed case study, showing readers: how to develop exploratory indicators; understand 'spatial process' and develop spatial analytics; how to develop 'useful' predictive analytics; how to convey these outputs to non-technical decision-makers through the medium of data visualization; and why, ultimately, data science and 'Planning' are one and the same. A graduate-level introduction to data science, this book will appeal to researchers and data scientists at the intersection of data analytics and public policy, as well as readers who wish to understand how algorithms will affect the future of government.

Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover): Ari Ezra Waldman Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover)
Ari Ezra Waldman
R636 Discovery Miles 6 360 Ships in 12 - 17 working days

In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be read by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.

Children, Technology and Healthy Development - How to Help Kids be Safe and Thrive Online (Hardcover): Catherine Knibbs Children, Technology and Healthy Development - How to Help Kids be Safe and Thrive Online (Hardcover)
Catherine Knibbs
R4,140 Discovery Miles 41 400 Ships in 12 - 17 working days

Offers parents, and training and practising professionals in psychology, psychotherapy, education and social work insight into what the evidence says about human behaviour online, what this means for how children develop and how we can best support children to be safe and healthy online now and in future. Accessibly presents the key research from psychology, sociology and biology to reveal how and why humans interact with platforms, apps and software. Covers essential topics including social media, gaming and harmful effects of technology and social media.

Cyber Victimology - Decoding Cyber-Crime Victimisation (Paperback): Debarati Halder Cyber Victimology - Decoding Cyber-Crime Victimisation (Paperback)
Debarati Halder
R1,185 Discovery Miles 11 850 Ships in 12 - 17 working days

Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem

Digital Learning and Collaborative Practices - Lessons from Inclusive and Empowering Participation with Emerging Technologies... Digital Learning and Collaborative Practices - Lessons from Inclusive and Empowering Participation with Emerging Technologies (Paperback)
Eva Brooks, Susanne Dau, Staffan Selander
R1,254 Discovery Miles 12 540 Ships in 12 - 17 working days

* Outlines a holistic, evidence-based mindset shift for designing and implementing technology-rich learning experiences that are attentive to social concerns such as equity, ethics, play, diversity, and democratic participation. * Driven by a balance of theoretical and methodological chapters with grounded empirical bases. * Concludes with a future-focused discussion about upcoming digital competencies and the implications of applying design-oriented approaches to digital learning practices.

Immersion, Narrative, and Gender Crisis in Survival Horror Video Games (Hardcover): Andrei Nae Immersion, Narrative, and Gender Crisis in Survival Horror Video Games (Hardcover)
Andrei Nae
R4,134 Discovery Miles 41 340 Ships in 12 - 17 working days

This book investigates the narrativity of some of the most popular survival horror video games and the gender politics implicit in their storyworlds. In a thorough analysis of the genre that draws upon detailed comparisons with the mainstream action genre, Andrei Nae places his analysis firmly within a political and social context. In comparing survival horror games to the dominant game design norms of the action genre, the author differentiates between classical and postclassical survival horror games to show how the former reject the norms of the action genre and deliver a critique of the conservative gender politics of action games, while the latter are more heterogeneous in terms of their game design and, implicitly, gender politics. This book will appeal not only to scholars working in game studies, but also to scholars of horror, gender studies, popular culture, visual arts, genre studies and narratology.

Humans at Work in the Digital Age - Forms of Digital Textual Labor (Paperback): Shawna Ross, Andrew Pilsch Humans at Work in the Digital Age - Forms of Digital Textual Labor (Paperback)
Shawna Ross, Andrew Pilsch
R1,285 Discovery Miles 12 850 Ships in 12 - 17 working days

Humans at Work in the Digital Age explores the roots of twenty-first-century cultures of digital textual labor, mapping the diverse physical and cognitive acts involved, and recovering the invisible workers and work that support digital technologies. Drawing on 14 case studies organized around four sites of work, this book shows how definitions of labor have been influenced by the digital technologies that employees use to produce, interpret, or process text. Incorporating methodology and theory from a range of disciplines and highlighting labor issues related to topics as diverse as census tabulation, market research, electronic games, digital archives, and 3D modeling, contributors uncover the roles played by race, class, gender, sexuality, and national politics in determining how narratives of digital labor are constructed and erased. Because each chapter is centered on the human cost of digital technologies, however, it is individual people immersed in cultures of technology who are the focus of the volume, rather than the technologies themselves. Humans at Work in the Digital Age shows how humanistic inquiry can be a valuable tool in the emerging conversation surrounding digital textual labor. As such, this book will be essential reading for academics and postgraduate students engaged in the study of digital humanities; human-computer interaction; digital culture and social justice; race, class, gender, and sexuality in digital realms; the economics of the internet; and technology in higher education.

Feminist War Games? - Mechanisms of War, Feminist Values, and Interventional Games (Paperback): Jon Saklofske, Alyssa Arbuckle,... Feminist War Games? - Mechanisms of War, Feminist Values, and Interventional Games (Paperback)
Jon Saklofske, Alyssa Arbuckle, Jon Bath
R1,290 Discovery Miles 12 900 Ships in 12 - 17 working days

Feminist War Games? explores the critical intersections and collisions between feminist values and perceptions of war, by asking whether feminist values can be asserted as interventional approaches to the design, play, and analysis of games that focus on armed conflict and economies of violence. Focusing on the ways that games, both digital and table-top, can function as narratives, arguments, methods, and instruments of research, the volume demonstrates the impact of computing technologies on our perceptions, ideologies, and actions. Exploring the compatibility between feminist values and systems of war through games is a unique way to pose destabilizing questions, solutions, and approaches; to prototype alternative narratives; and to challenge current idealizations and assumptions. Positing that feminist values can be asserted as a critical method of design, as an ideological design influence, and as a lens that determines how designers and players interact with and within arenas of war, the book addresses the persistence and brutality of war and issues surrounding violence in games, whilst also considering the place and purpose of video games in our cultural moment. Feminist War Games? is a timely volume that questions the often-toxic nature of online and gaming cultures. As such, the book will appeal to a broad variety of disciplinary interests, including sociology, education, psychology, literature, history, politics, game studies, digital humanities, media and cultural studies, and gender studies, as well as those interested in playing, or designing, socially engaged games.

Who Can You Trust? - How Technology Brought Us Together and Why It Might Drive Us Apart (Paperback): Rachel Botsman Who Can You Trust? - How Technology Brought Us Together and Why It Might Drive Us Apart (Paperback)
Rachel Botsman
R464 R387 Discovery Miles 3 870 Save R77 (17%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
A World Without Work - Technology…
Daniel Susskind Paperback R538 R460 Discovery Miles 4 600
The Handover - How We Gave Control Of…
David Runciman Hardcover R630 R504 Discovery Miles 5 040
The Global Politics of Artificial…
Maurizio Tinnirello Hardcover R3,930 Discovery Miles 39 300
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen Hardcover R3,722 Discovery Miles 37 220
Digital Media Ethics
Charles Ess Paperback R511 Discovery Miles 5 110
Research Handbook on International…
Marie McAuliffe Hardcover R6,341 Discovery Miles 63 410
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R449 Discovery Miles 4 490
Extremely Hardcore - Inside Elon Musk's…
Zoë Schiffer Hardcover R718 R472 Discovery Miles 4 720

 

Partners