![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
This academic analysis explores social media, specifically examining its influence on the cultural, political, and economic organization of our society and the role capitalism plays within its domain. In this examination of society and technology, author and educator Derek Hrynyshyn explores the ways in which social media shapes popular culture and how social power is expressed within it. He debunks the misperception of the medium as a social equalizer-a theory drawn from the fact that content is created by its users-and compares it to mass media, identifying the capitalist-driven mechanisms that drive both social media and mass media. The work captures his assessment that social media legitimizes the inequities among the social classes rather than challenging them. The book scrutinizes the difference between social media and mass media, the relationship between technologies and social change, and the role of popular culture in the structure of political and economic power. A careful look at social media networks such as Facebook, Twitter, and Google suggests that these tools are systems of surveillance, monitoring everyday activities for the benefit of advertisers and the networks themselves. Topics covered within the book's 10 detailed chapters include privacy online, freedom of expression, piracy, the digital divide, fragmentation, and social cohesion. Explores the use of blogs, Facebook, and Twitter in revolutionary political action and the effects of "viral" campaigns on political culture Uncovers the truth behind piracy infringements on popular cultural industries Reveals the hidden factors driving the rapid expansion of social media Discusses how capitalism affects the development of social media Examines how social media shares characteristics with and differs from mass media
In the estimating, planning and management of any project, large or small, an understanding of the impact of risk is critical. This book explains how the growing number of people choosing to or forced to organise their work as projects can make realistic assessments of the uncertainty affecting costs, timescale and revenue, before commitments are made. A clear analysis of the role of uncertainty is combined in this concise and practical handbook with simple, cost-effective techniques for measuring and modelling the overall risk to a project’s budget and schedule. There is advice and help here for the whole project team, including project managers; bid managers; project sales professionals; planners; estimators; managers running a project-based business; and consultants and auditors advising a projects business. Drawn from the author’s extensive experience on projects ranging in scale from a few man-months to hundreds of man-years, the book will beelevant to anyone involved in a project-based business. Examples are presented as simple models, built in spreadsheets using the @Risk software package. No more than basic knowledge of Lotus 1-2-3 or Excel will be required by the reader.
Is it time to become a manager? Nest and vest? Join that start-up? Tell your boss he's a liar? Or resign in disgust? As a software engineer, you'll face many important decisions such as these, and when you do, you realize there's much more to your career than dealing with code. Author Michael Lopp recalls his own make-or-break moments with Silicon Valley giants such as Apple, Borland, Netscape, and Symantec in Being Geek, the insightful and entertaining book that may help you manage your career better. Through a series of entertaining stories, Lopp walks through a complete job lifecycle, starting with the job search and finishing with the realization it might be time to look again. Plenty of books teach you how to interview for a job, or how to manage a project more successfully, but only "Being Geek" will help you handle all the baffling circumstances you experience at work, including how to: understand your boss with the chapter on 'Manager Management'; boost your career through networking with 'We Travel in Tribes'; deliver effective presentations, with 'How Not to Throw Up'; manage and actively participate in meetings, with 'What's On the Agenda'; and, realize when you should be looking for a new gig, with 'The Itch'.
Do conceptions of the Rule of Law reflect timeless truths, or are they in fact contingent on a particular information and communications infrastructure - one that we are fast leaving behind? Hildebrandt has engineered a provocative encounter between law and networked digital technologies that cuts to the heart of the dilemma confronting legal institutions in a networked world.' - Julie E. Cohen, Georgetown University, US'Many contemporary authors are wrestling with two technological developments which will change our society beyond recognition: big data analytics and smart technologies. Few though understand, or can explain, these developments in the way Mireille Hildebrandt does. In ambitiously bringing together legal theory, psychology, social ethnology and of course smart agency and ambient intelligence, Hildebrandt gives the most complete study of these vitally important developments. Books are often described as 'must read' though few actually are; this one genuinely is.' - Andrew Murray, London School of Economics, UK This timely book tells the story of the smart technologies that reconstruct our world, by provoking their most salient functionality: the prediction and preemption of our day-to-day activities, preferences, health and credit risks, criminal intent and spending capacity. Mireille Hildebrandt claims that we are in transit between an information society and a data-driven society, which has far reaching consequences for the world we depend on. She highlights how the pervasive employment of machine-learning technologies that inform so-called 'data-driven agency' threaten privacy, identity, autonomy, non-discrimination, due process and the presumption of innocence. The author argues how smart technologies undermine, reconfigure and overrule the ends of the law in a constitutional democracy, jeopardizing law as an instrument of justice, legal certainty and the public good. Nevertheless, the book calls on lawyers, computer scientists and civil society not to reject smart technologies, explaining how further engaging these technologies may help to reinvent the effective protection of the Rule of Law. Academics and researchers interested in the philosophy of law and technology will find this book both discerning and relevant. Practitioners and policy makers in the areas of law, computer science and engineering will benefit from the insight into smart technologies and their impact today.
Teaches visual literacy, theory, scholarly critique, and practical application of visuals in professional communication careers Visual Communication: Insights and Strategies explores visual imagery in advertising, news coverage, political discourse, popular culture, and digital and social media technologies. It is filled with insights into the role of visuals in our dynamic social environment and contains strategies on how to use them. The authors provide an overview of theoretically-informed literacy and critical analysis of visual communication and demonstrate the ways in which we can assess and apply this knowledge in the fields of advertising, public relations, journalism, organizational communication, and intercultural communication. This important book: Reveals how to analyze visual imagery Introduces a 3-step process, Research-Evaluate-Create, to apply the knowledge gained Combines research, theory, and professional practice of visual communication Designed for undergraduate and graduate courses in visual communication as well as visual rhetoric, visual literacy, and visual culture, Visual Communication: Insights and Strategies reveals how to apply rhetorical theories to visual imagery.
Imagine if you could see the playbook that returned a struggling tech empire to the top of the tech leaderboard. The Microsoft Story will help you understand and adopt the competitive strategies, workplace culture, and daily business practices that enabled the tech company to once again become a leading tech innovator. It wasn't so long ago that Microsoft and its Windows operating system dominated the tech industry so much so that they faced antitrust charges for what was perceived by many to be predatory, monopolistic practices. Less than a decade later, the tide had turned and Microsoft lost its dominance in the personal tech marketplace amidst the launch of the iPhone, the rise of Google, and the cloud computing phenomenon. But, now, Microsoft is back on top. The company's value is soaring and once again Microsoft is being recognized as a tech leader once again. What changed? Since Satya Nadella took over as CEO, the company has gone through significant changes. The company culture has become one of creativity and innovation, no longer requiring that all products revolve around Windows. The company has reevaluated their business lines, getting rid of underperforming initiatives such as smartphones, and focused on the area of growth where the company excelled:the cloud. Through the story of Microsoft, you'll learn: How to build a nimble company culture that supports innovation and growth. How to return a forgotten brand to the spotlight. How to recognize and build upon successful business lines, while letting go of underperforming initiatives. When to change the entire way you do business. And much, much more.
The banking and finance sectors are relevant shares of modern economies and indeed drivers of growth in emerging economies. The majority of existing economic and finance textbooks focus on concepts and theories with briefly exposited real-world examples for illustration. This book, which collects chapters that are the contributions of the acknowledged experts in their fields, fills this gap by featuring in-depth analyses on prominent real-world topics in banking and finance. The book's applications of econometrics present insightful perspectives on the recent development of banking issues, stock market contagion, the impact of internet technology (IT) on stock markets, financial innovation and technology firms, and an international perspective on the loan puzzle and interest rate adjustment in emerging markets. In addition to exhaustive case studies on banking and finance in India, Hong Kong, Japan, and other Asian emerging markets, the authors coherently contribute an intellectual advancement of contemporary issues in banking and finance literature. The authors offer an essential reading and source of reference for postgraduate and advanced undergraduate courses in economics and finance.
The internet has begun to develop into a much more immersive and multi-dimensional space. Three dimensional spaces and sites of interaction have not just gripped our attention but have begun to weave or be woven into the fabric of our professional and social lives. The Immersive Internet - including social media, augmented reality, virtual worlds, online games, 3D internet and beyond - is still nascent, but is moving towards a future where communications technologies and virtual spaces offer immersive experiences persuasive enough to blur the lines between the virtual and the physical. It is this emerging Immersive Internet that is the focus of this book of short thought pieces - postcards from the metaverse - by some of the leading thinkers in the field. The book questions what a more immersive and intimate internet might mean for society and for each of us.
The essential, intermediate and advanced topics of Simulink are covered in the book. The concept of multi-domain physical modeling concept and tools in Simulink are illustrated with examples for engineering systems and multimedia information. The combination of Simulink and numerical optimization methods provides new approaches for solving problems, where solutions are not known otherwise.
This book is the second part of Applications and Trends in Fintech, which serves as a comprehensive guide to the advanced topics in fintech, including the deep learning and natural language processing algorithms, blockchain design thinking, token economics, cybersecurity, cloud computing and quantum computing, compliance and risk management, and global fintech trends. Readers will gain knowledge about the applications of fintech in finance and its latest developments as well as trends.This fifth volume covers global fintech trends and emerging technologies such as cloud computing and quantum computing, as well as the compliance and risk management frameworks for fintech companies. Together with the first part in applications and trends (fourth volume), these two books will deepen readers' understanding of the fintech fundamentals covered in previous volumes through various applications and analysis of impacts and trends.Bundle set: Global Fintech Institute-Chartered Fintech Professional Set I
"In their 'deliberately short book' IT analysts, management consultants and technology practitioners Roehrig and Pring explore how big a beast technology has become, and how we can tame it to maintain our freedom and privacy while still realising its benefits. The pandemic has shown just how much we rely on technology and how addictive it has become...The authors address the important questions...[and] urge us not to slay the monster but rather to leverage its power and reorient technology as a tool for good." --Financial Times Monster explains how we can responsibly engage with technology, and avoid its darker tendencies, while accepting its necessary gifts. The authors, insiders at one of the world's largest tech consulting firms, give a unique take on: The addictive nature of tech and how to fight it The growing backlash against big tech--where it's right and what it misses Crucial steps for taming technology's role in your life and in your organization--without becoming a modern Luddite Written for managers, leaders, and employees at companies of all sizes and in all industries, Monster will help you understand and take control of technology's powerful role in your life and your organization. "You must read this book." --Michael Schrage, Research Fellow, MIT Sloan School Initiative on the Digital Economy "Pithy insights and recommendations on helping tech fulfill its potential as a force for good." --Erik Brynjolfsson, Director of the Stanford Digital Economy Lab and co-author of The Second Machine Age "Making technology serve--not subvert--the public interest requires better leaders, not more engineers and coders. Monster explains how to become one of those leaders." --Rosabeth Moss Kanter, Harvard Business School Professor and author of Think Outside the Building "A bracing new book about some of the most pressing questions of our time." --Carl Benedikt Frey, Oxford Martin Citi Fellow at Oxford University and author of The Technology Trap "Provocative and concise, Monster is an important book on rescuing ourselves from technology that now feels corrosive and overwhelming." --Daniel H. Pink, author of WHEN, DRIVE, and TO SELL IS HUMAN "Clarifies a complex web of issues and provides bold steps for a healthier economy, society, and future." --Francisco D'Souza, former CEO and Vice Chairman of Cognizant "Sheds light on how we can collectively use technology for the good of all." --Soumitra Dutta, Founding Dean, SC Johnson College of Business, Cornell University "A cornucopia of pragmatic, actionable, and bold ideas." --Gary J. Beach, Publisher Emeritus, CIO magazine and author of U.S. Technology Skills Gap
Territories of Profit compares Dell Computer, the dominant computer manufacturer of the late twentieth century, and G. F. Swift, the leading meatpacking firm of the late nineteenth century, to reveal how communications revolutions in different periods enabled businesses to innovate their operations, reorganize the structure of the firm, and reshape the geography of profit-making. By depicting the parallel experiences of Dell and Swift, which both deployed revolutionary communications technologies in their business systems and transformed patterns of development through their innovative advances, the book challenges simplified representations of the contemporary economy as historically unprecedented. Territories of Profit also incorporates information from interview sources within Dell to portray the "Dell Model" in ways never before revealed in existing studies of the PC maker.
"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot. It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read." --Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight Get answers to all your cybersecurity questions In 2016, we reached a tipping point--a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
Protect your information assets with effective risk management In today's information economy, the development, exploitation and protection of information and associated assets are key to the long-term competitiveness and survival of corporations and entire economies. The protection of information and associated assets - information security - is therefore overtaking physical asset protection as a fundamental corporate governance responsibility. Information security management system requirements ISO 27000, which provides an overview for the family of international standards for information security, states that "An organisation needs to undertake the following steps in establishing, monitoring, maintaining and improving its ISMS [...] assess information security risks and treat information security risks". The requirements for an ISMS are specified in ISO 27001. Under this standard, a risk assessment must be carried out to inform the selection of security controls, making risk assessment the core competence of information security management and a critical corporate discipline. Plan and carry out a risk assessment to protect your information Information Security Risk Management for ISO 27001 / ISO 27002 Provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO 27001. Draws on national and international best practice around risk assessment, including BS 7799-3:2017 (BS 7799-3). Covers key topics such as risk assessment methodologies, risk management objectives, information security policy and scoping, threats and vulnerabilities, risk treatment and selection of controls. Includes advice on choosing risk assessment software. Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits. Buy your copy today! About the authors Alan Calder is the Group CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications). Alan has consulted for clients in the UK and abroad, and is a regular media commentator and speaker. Steve G Watkins is an executive director at GRC International Group plc. He is a contracted technical assessor for UKAS - advising on its assessments of certification bodies offering ISMS/ISO 27001 and ITSMS/ISO 20000-1 accredited certification. He is a member of ISO/IEC JTC 1/SC 27, the international technical committee responsible for information security, cyber security and privacy standards, and chairs the UK National Standards Body's technical committee IST/33 (information security, cyber security and privacy protection) that mirrors it. Steve was an active member of IST/33/-/6, which developed BS 7799-3.
This open access book presents the foundations of the Big Data research and innovation ecosystem and the associated enablers that facilitate delivering value from data for business and society. It provides insights into the key elements for research and innovation, technical architectures, business models, skills, and best practices to support the creation of data-driven solutions and organizations. The book is a compilation of selected high-quality chapters covering best practices, technologies, experiences, and practical recommendations on research and innovation for big data. The contributions are grouped into four parts: * Part I: Ecosystem Elements of Big Data Value focuses on establishing the big data value ecosystem using a holistic approach to make it attractive and valuable to all stakeholders. * Part II: Research and Innovation Elements of Big Data Value details the key technical and capability challenges to be addressed for delivering big data value. * Part III: Business, Policy, and Societal Elements of Big Data Value investigates the need to make more efficient use of big data and understanding that data is an asset that has significant potential for the economy and society. * Part IV: Emerging Elements of Big Data Value explores the critical elements to maximizing the future potential of big data value. Overall, readers are provided with insights which can support them in creating data-driven solutions, organizations, and productive data ecosystems. The material represents the results of a collective effort undertaken by the European data community as part of the Big Data Value Public-Private Partnership (PPP) between the European Commission and the Big Data Value Association (BDVA) to boost data-driven digital transformation.
This practical text offers a research-based account of the technical communication profession and its practice, outlining emergent touchpoints of this fast-changing field while highlighting its diversity.
This book constitutes the refereed post-proceedings of the Third IFIP WG 9.7 Conference on the History of Nordic Computing, HiNC3, held in Stockholm, Sweden, in October 2010. The 50 revised full papers presented together with a keynote address and a panel discussion were carefully reviewed and selected from numerous submissions. The papers focus on the application and use of ICT and ways in which technical progress affected the conditions of the development and use of ICT systems in the Nordic countries covering a period from around 1970 until the beginning of the 1990s. They are organized in the following topical sections: computerizing public sector industries; computerizing management and financial industries; computerizing art, media, and schools; users and systems development; the making of a Nordic computing industry; Nordic networking; Nordic software development; Nordic research in software and systems development; teaching at Nordic universities; and new historiographical approaches and methodological reflections.
Concluding the Commodore trilogy, this book takes a look at Commodore's resurgence in the late 1980's and then ultimate demise. This was a period of immense creativity from engineers within the company, who began “moonshot” projects using emerging CD-ROM technology. Get to know the people behind Commodore's successes and failures as they battle to stay relevant amidst blistering competition from Nintendo, Apple, and the onslaught of IBM PC clones. Told through interviews with company insiders, this examination of the now defunct company traces the engineering breakthroughs and baffling decisions that led to the demise of Commodore.
The latest edition of this international edited book series, based on the formation and growth problems of High Technology Small Firms (HTSF), contains the best papers presented at the 2011 and 2013 conferences, both held at Manchester Business School. This volume remains true to the initial mission of the HTSF Conference, established in 1993, to advance our knowledge of high-technology entrepreneurship and to advocate the need for more and better designed policy to promote such entrepreneurship. The need is as great as ever it was, not least given the continued economic stagnation of the European economy in the wake of the Financial Crisis and the Euro crisis. These papers address key themes relating to improving our understanding of the processes involved in high-technology entrepreneurship and of the design of effective policy to promote this research. The first two groups of papers examine the start-up and commercialization processes and the internationalization processes, which are often important for new high-technology businesses. Other papers examine topics like entrepreneurship clusters, inter-firm collaboration, and growth strategy for high-technology small firms. |
You may like...
Communicative Figurations - Transforming…
Andreas Hepp, Andreas Breiter, …
Hardcover
R1,448
Discovery Miles 14 480
Connect: Writing For Online Audiences
Maritha Pritchard, Karabo Sitto
Paperback
(1)R460 Discovery Miles 4 600
|