![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
This open access monograph argues established democratic norms for freedom of expression should be implemented on the internet. Moderating policies of tech companies as Facebook, Twitter and Google have resulted in posts being removed on an industrial scale. While this moderation is often encouraged by governments - on the pretext that terrorism, bullying, pornography, "hate speech" and "fake news" will slowly disappear from the internet - it enables tech companies to censure our society. It is the social media companies who define what is blacklisted in their community standards. And given the dominance of social media in our information society, we run the risk of outsourcing the definition of our principles for discussion in the public domain to private companies. Instead of leaving it to social media companies only to take action, the authors argue democratic institutions should take an active role in moderating criminal content on the internet. To make this possible, tech companies should be analyzed whether they are approaching a monopoly. Antitrust legislation should be applied to bring those monopolies within democratic governmental oversight. Despite being in different stages in their lives, Anne Mette is in the startup phase of her research career, while Frederik is one of the most prolific philosophers in Denmark, the authors found each other in their concern about Free Speech on the internet. The book was originally published in Danish as Dit opslag er blevet fjernet - techgiganter & ytringsfrihed. Praise for 'Your Post has been Removed' "From my perspective both as a politician and as private book collector, this is the most important non-fiction book of the 21st Century. It should be disseminated to all European citizens. The learnings of this book and the use we make of them today are crucial for every man, woman and child on earth. Now and in the future." Jens Rohde, member of the European Parliament for the Alliance of Liberals and Democrats for Europe "This timely book compellingly presents an impressive array of information and analysis about the urgent threats the tech giants pose to the robust freedom of speech and access to information that are essential for individual liberty and democratic self-government. It constructively explores potential strategies for restoring individual control over information flows to and about us. Policymakers worldwide should take heed!" Nadine Strossen, Professor, New York Law School. Author, HATE: Why We Should Resist It with Free Speech, Not Censorship
This book constitutes the refereed post-proceedings of the 4th IFIP WG 9.7 Conference on the History of Nordic Computing, HiNC 4, held in Copenhagen, Denmark, in August 2014. The 37 revised full papers were carefully reviewed and selected for inclusion in this volume. The papers focus on innovative ICT milestones that transformed the nordic societies and on the new ideas, systems and solutions that helped creating the welfare societies of today, in particular solutions and systems for public services, e.g., tax, social benefits, health care and education; solutions and systems for the infrastructure of the society, e.g., banking, insurance, telephones, transport and energy supply; and technologies and IT policies behind the major IT milestones, e.g., user centric innovation, programming techniques and IT ethics. They are organized in topical sections on IT policy, infrastructure, public services, private services, telesystems, health care, IT in banking, transport and IT technology.
What has made Silicon Valley so productive of new technologies and
new firms? How did its pioneering achievements begin--in computer
networking, semiconductors, personal computing, and the
Internet--and what forces have propelled its unprecedented growth?
This collection of nine chapters by contributors from varied
disciplines--business, geography, history, regional planning, and
sociology--examines the history, development, and entrepreneurial
dynamics of Silicon Valley.
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.
Blockchain technology has the potential to disrupt and transform the social media business space, but the existing literature uses complex technical jargon that prevents practitioners from taking advantage of its full potential. Nitin Upadhyay overcomes this barrier and offers a uniquely accessible discussion of how blockchain can revolutionise social media business models. His book offers an up-to-date analysis of the real benefits, usage and operationalisation aspects of blockchain and provides a systematic framework for social media business transformation through blockchain technology, all while using a simple, practical terminology. Readers learn about the utility of the blockchain ecosystem, about the innovation value proposition available to social media platforms through blockchain and about how to develop, assess and evaluate change in social media business models. Ultimately, they learn how to utilise blockchain innovation to develop a decentralised, autonomous and distributed ecosystem within the social-media space. Transforming Social Media Business Models Through Blockchain is essential reading for stakeholders associated with social media, blockchain and management, including practitioners, leaders, and scholars working with industry partners.
Second Edition presents updated version of the practical aspects of process assessment Helps readers understand the power and benefits of a process approach and process assessment Guides the reader through the various parts of the standard in an understandable and practical manner
Social media is fundamentally changing the way travellers and tourists search, find, read and trust, as well as collaboratively produce information about tourism suppliers and tourism destinations. Presenting cutting-edge theory, research and case studies investigating Web 2.0 applications and tools that transform the role and behaviour of the new generation of travellers, this book also examines the ways in which tourism organisations reengineer and implement their business models and operations, such as new service development, marketing, networking and knowledge management. Written by an international group of researchers widely known for their expertise in the field of the Internet and tourism, chapters include applications and case studies in various travel, tourism and leisure sectors.
Teaches the basic, yet all-important, data skills required by today's media professionals The authors of Data Skills for Media Professionals have assembled a book that teaches key aspects of data analysis, interactive data visualization and online map-making through an introduction to Google Drive, Google Sheets, and Google My Maps, all free, highly intuitive, platform-agnostic tools available to any reader with a computer and a web connection. Delegating the math and design work to these apps leaves readers free to do the kinds of thinking that media professionals do most often: considering what questions to ask, how to ask them, and how to evaluate and communicate the answers. Although focused on Google apps, the book draws upon complementary aspects of the free QGIS geographic information system, the free XLMiner Analysis ToolPak Add-on for Google Sheets, and the ubiquitous Microsoft Excel spreadsheet application. Worked examples rely on frequently updated data from the U.S. Bureau of Labor Statistics, the Federal Election Commission, the National Bridge Inventory of structurally deficient bridges, and other federal sources, giving readers the option of immediately applying what they learn to current data they can localize to any area in the United States. The book offers chapters covering: basic data analysis; data visualization; making online maps; Microsoft Excel and pivot tables; matching records with Excel's VLOOKUP function; basic descriptive and inferential statistics; and other functions, tools and techniques. Serves as an excellent supplemental text for easily adding data skills instruction to courses in beginning or advanced writing and reporting Features computer screen captures that illustrate each step of each procedure Offers downloadable datasets from a companion web page to help students implement the techniques themselves Shows realistic examples that illustrate how to perform each technique and how to use it on the job Data Skills of Media Professionals is an excellent book for students taking skills courses in the more than 100 ACEJMC-accredited journalism and mass communication programs across the United States. It would also greatly benefit those enrolled in advanced or specialized reporting courses, including courses dedicated solely to teaching data skills.
“Jam packed with insights from women in the field,†this is an invaluable career guide for the aspiring or experienced female tech professional (Forbes) As the CEO of a startup, Tarah Wheeler is all too familiar with the challenges female tech professionals face on a daily basis. That’s why she’s teamed up with other high-achieving women within the field—from entrepreneurs and analysts to elite hackers and gamers—to provide a roadmap for women looking to jump-start, or further develop, their tech career. In an effort to dismantle the unconscious social bias against women in the industry, Wheeler interviews professionals like Brianna Wu (founder, Giant Spacekat), Angie Chang (founder, Women 2.0), Keren Elazari (TED speaker and cybersecurity expert), Katie Cunningham (Python educator and developer), and Miah Johnson (senior systems administrator) about the obstacles they have overcome to do what they love. Their inspiring personal stories are interspersed with tech-focused career advice. Readers will learn: • The secrets of salary negotiation • The best format for tech resumes • How to ace a tech interview • The perks of both contracting (W-9) and salaried full-time work • The secrets of mentorship • How to start your own company • And much more BONUS CONTENT: Perfect for its audience of hackers and coders, Women in Tech also contains puzzles and codes throughout—created by Mike Selinker (Lone Shark Games), Gabby Weidling (Lone Shark Games), and cryptographer Ryan “LostboY†Clarke—that are love letters to women in the industry. A distinguished anonymous contributor created the Python code for the cover of the book, which references the mother of computer science, Ada Lovelace. Run the code to see what it does!
From bestselling author Walter Isaacson comes the landmark biography of Apple co-founder Steve Jobs. In Steve Jobs: The Exclusive Biography, Isaacson provides an extraordinary account of Jobs' professional and personal life. Drawn from three years of exclusive and unprecedented interviews Isaacson has conducted with Jobs as well as extensive interviews with Jobs' family members, key colleagues from Apple and its competitors. Steve Jobs: The Exclusive Biography is the definitive portrait of the greatest innovator of his generation.
Driven by maturing Web service technologies and the wide acceptance of the service-oriented architecture paradigm, the software industry s traditional business models and strategies have begun to change: software vendors are turning into service providers. In addition, in the Web service market, a multitude of small and highly specialized providers offer modular services of almost any kind and economic value is created through the interplay of various distributed service providers that jointly contribute to form individualized and integrated solutions. This trend can be optimally catalyzed by universally accessible service orchestration platforms service value networks (SVNs) which are the underlying organizational form of the coordination mechanisms presented in this book. Here, the authors focus on providing comprehensive business-oriented insights into today s trends and challenges that stem from the transition to a service-led economy. They investigate current and future Web service business models and provide a framework for Web service value networks. Pricing mechanism basics are introduced and applied to the specific area of SVNs. Strategies for platform providers are analyzed from the viewpoint of a single provider, and so are pricing mechanisms in service value networks which are optimal from a network perspective. The extended concept of pricing Web service derivatives is also illustrated. The presentation concludes with a vision of how Web service markets in the future could be structured and what further developments can be expected to happen. This book will be of interest to researchers in business development and practitioners such as managers of SMEs in the service sector, as well as computer scientists familiar with Web technologies. The book s comprehensive content provides readers with a thorough understanding of the organizational, economic and technical implications of dealing with Web services as the nucleus of modern business models, which can be applied to Web services in general and Web service value networks specifically.."
The concept of usability has become an increasingly important consideration in the design of all kinds of technology. As more products are aimed at global markets and developed through internationally distributed teams, usability design needs to be addressed in global terms. Interest in usability as a design issue and specialist area of research and education has developed steadily in North America and Europe since the 1980's. However, it is only over the last ten years that it has emerged as a global concern. Global Usability provides an introduction to the important issues in globalizing design and an insight into the development of usability expertise around the world. The book is divided into two sections. The first section deals with the general issues in cross-cultural design and the methods for conducting usability design and evaluation across geographical boundaries. The second section describes the state of usability development in fifteen countries. The descriptions include a history and review of activities and include some unique perspectives that have developed in relation to usability work. Researchers and practitioners from a variety of design-related disciplines will find the book a useful guide for understanding the issues and an excellent reference source for working in any of the countries covered.
Future Internet and Internet of Things set out a new vision for connectivity, real-time applications and services. Data procured from the use of a large number of heterogeneous physical and virtual devices must be real-time processed and analyzed for the goal of effective resource management and control while maintaining the required performance and quality of service. In addition, the development of the communication networks towards heterogeneous and new generation broadband connectivity brings up new requirements towards the way of managing and controlling of the available resources. Thus for the effective resource management in future internet novel approaches must be proposed and developed. It could be seen that recently a considerable amount of effort has been devoted on behalf of industry and academia, towards the research and design of methods for effective management of resources in internet and multimedia communications. The book reviews some specific topics in the field of future internet and internet technologies that are closely related to the issue of finding effective solutions for the management of resources and performance. Technical topics discussed in the book include: * Future Internet Technologies; * Internet of things; * Multimedia Networks; * Wireless Access Networks; * Software Communications; * Positioning and Localization in Communications; * Resource Management. Resource Management in future Internet is recommended for specialists working in the field of information and communication industries as well as academic staff and researchers working in the field of multimedia communications and telecommunication networks.
Managers are increasingly concerned with the typical methods available for organizational performance measurement and control. Research into performance measurement, within the field of innovation management, has been variously approached through frameworks for performance measurement in general (for example, the Balanced Scorecard by Norton and Kaplan), R&D performance management, and surveys on in-use Key Performance Indicators (KPIs). It is striking, however, that almost no research has focused explicitly on the performance measurement of research activities, or indeed tried to develop a systematic approach to setting KPIs for specific research goals. This work, in co-operation with ABB Research, Deutsche Telekom AG Laboratories, EMC2 Advanced Technology Solutions, IBM Research, Intel Research, Microsoft Research, Philips Research, and SAP Research, develops a systematic approach to performance measurement for industrial research organizations in innovation-driven companies. The following questions are addressed: (1) Which research goals do research departments have? (2) Which KPIs do they use to monitor the achievement of these goals? (3) Is there a systematic best-practice approach to selecting KPIs for performance goals? The outcome is a complete set of eleven performance clusters, such as the transfer of research results to the development or other organizational departments, and each cluster has its own set of KPIs. The eleven clusters are: Technology Transfer, Future Business Opportunities, Technical Achievements, Intellectual Property, Operational Excellence, Talent Pool, Image, Publications, Presence in Scientific Community, Collaboration with Academia, Collaboration with Partners and Customers. This work led to the creation of the Institute for Industrial Research Performance Management that provides ongoing research and insights for managers of industrial research organizations.
Innovation and IT are intertwined. In order to understand how, this book takes an interdisciplinary view of innovation in an international and digital world. It addresses strategic and operational aspects of R and D and new product development, emphasizing knowledge management, configurational design, distance and diversity.
From addiction expert Dr. Nicholas Kardaras, a startling argument that technology has profoundly affected the brains of children--and not for the better. We've all seen them: kids hypnotically staring at glowing screens in restaurants, in playgrounds and in friends' houses--and the numbers are growing. Like a virtual scourge, the illuminated glowing faces--the Glow Kids--are multiplying. But at what cost? Is this just a harmless indulgence or fad like some sort of digital hula-hoop? Some say that glowing screens might even be good for kids--a form of interactive educational tool. Don't believe it. In Glow Kids, Dr. Nicholas Kardaras will examine how technology--more specifically, age-inappropriate screen tech, with all of its glowing ubiquity--has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain's pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis. Most shocking of all, recent brain imaging studies conclusively show that excessive screen exposure can neurologically damage a young person's developing brain in the same way that cocaine addiction can. Kardaras will dive into the sociological, psychological, cultural, and economic factors involved in the global tech epidemic with one major goal: to explore the effect all of our wonderful shiny new technology is having on kids. Glow Kids also includes an opt-out letter and a quiz for parents in the back of the book.
The First Conference on the History of Nordic Computing (HiNC1) was organized in Trondheim, in June 2003. The HiNC1 event focused on the early years of computing, that is the years from the 1940s through the 1960s, although it formally extended to year 1985. In the preface of the proceedings of HiNC1, Janis Bubenko, Jr. , John Impagliazzo, and Arne Solvberg describe well the peculiarities of early Nordic c- puting [1]. While developing hardware was a necessity for the first professionals, quite soon the computer became an industrial product. Computer scientists, among others, grew increasingly interested in programming and application software. P- gress in these areas from the 1960s to the 1980s was experienced as astonishing. The developments during these decades were taken as the focus of HiNC2. During those decades computers arrived to every branch of large and medium-sized businesses and the users of the computer systems were no longer only computer s- cialists but also people with other main duties. Compared to the early years of comp- ing before 1960, where the number of computer projects and applications was small, capturing a holistic view of the history between the 1960s and the 1980s is conside- bly more difficult. The HiNC2 conference attempted to help in this endeavor.
This book contains the refereed proceedings of the 4th International Conference on Software Business (ICSOB) held in Potsdam, Germany, in June 2013. The theme of the event was "From Physical Products to Software Services and Solutions."The 15 full papers, seven short papers, and six doctoral symposium papers accepted for ICSOB were selected from 44 submissions and are organized in sections on: software business models and business process modeling; IT markets and software industry; IT within organizations; software product management; cloud computing; entrepreneurship and startup companies; software platforms and software ecosystems; and doctoral symposium.
In an age when the United Nations has declared access to the
Internet a human right, and universal access to high-speed
broadband is a national goal, urban areas have been largely ignored
by federal policy. The cost of that neglect may well be the failure
to realize the social benefits of broadband and a broadly-connected
digital society.
In recent years, IT application scenarios have evolved in very innovative ways. Highly distributed networks have now become a common platform for large-scale distributed programming, high bandwidth communications are inexpensive and widespread, and most of our work tools are equipped with processors enabling us to perform a multitude of tasks. In addition, mobile computing (referring specifically to wireless devices and, more broadly, to dynamically configured systems) has made it possible to exploit interaction in novel ways. To harness the flexibility and power of these rapidly evolving, interactive systems, there is need of radically new foundational ideas and principles; there is need to develop the theoretical foundations required to design these systems and to cope with the many complex issues involved in their construction; and there is need to develop effective principles for building and analyzing such systems. Reflecting the diverse and wide spectrum of topics and interests within the theoretical computer science community, Exploring New Frontiers of Theoretical Informatics, is presented in two distinct but interrelated tracks: -Algorithms, Complexity and Models of Computation, Exploring New Frontiers of Theoretical Informatics contains 46 original and significant contributions addressing these foundational questions, as well as 4 papers by outstanding invited speakers. These papers were presented at the 3rd IFIP International Conference on Theoretical Computer Science (TCS 2004), which was held in conjunction with the 18th World Computer Congress in Toulouse, France in August 2004 and sponsored by the International Federation for Information Processing (IFIP).
The Dynamic Internet: How Technology, Users, and Businesses are Changing the Network offers a comprehensive history of the Internet and efforts to regulate its use. University of Pennsylvania law professor Christopher S. Yoo contends that rather than engaging in prescriptive regulatory oversight, the government should promote competition in other ways, such as reducing costs for consumers, lowering entry barriers for new producers, and increasing transparency. These reforms would benefit consumers while permitting the industry to develop new solutions for emerging problems. It is fruitless for government to attempt to lock the burgeoning online industry into any particular architecture; rather, policymakers should act with the knowledge that no one actor can foresee how the network is likely to evolve in the future.
No technology seems to have spread so fast around the world in such
a short period of time as computers. It was a phenomenon that
predated the arrival of the Internet and that began to change how
businesses, governments, and whole societies functioned. The
diffusion of information technologies occurred in dozens of
countries all over the world with fascinating similarities and
differences.
This book provides a game theoretic model of interaction among VoIP telecommunications providers regarding their willingness to enter peering agreements with one another. The author shows that the incentive to peer is generally based on savings from otherwise payable long distance fees. At the same time, termination fees can have a countering and dominant effect, resulting in an environment in which VoIP firms decide against peering. Various scenarios of peering and rules for allocation of the savings are considered. The first part covers the relevant aspects of game theory and network theory, trying to give an overview of the concepts required in the subsequent application. The second part of the book introduces first a model of how the savings from peering can be calculated and then turns to the actual formation of peering relationships between VoIP firms. The conditions under which firms are willing to peer are then described, considering the possible influence of a regulatory body. |
You may like...
Circadian Rhythms for Future Resilient…
Xinfei Guo, Mircea R Stan
Hardcover
R2,663
Discovery Miles 26 630
Code Generation, Analysis Tools, and…
Ricardo Alexandre Peixoto de Queiros, Alberto Simoes, …
Hardcover
R5,120
Discovery Miles 51 200
Ion Implantation into Semiconductors…
B.G. Svensson, H. A Atwater, …
Hardcover
R4,422
Discovery Miles 44 220
Transactions on Intelligent Welding…
Shan-Ben Chen, YuMing Zhang, …
Hardcover
R4,011
Discovery Miles 40 110
|