0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (409)
  • R250 - R500 (1,171)
  • R500+ (11,379)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Ethics for People Who Work in Tech (Hardcover): Marc Steen Ethics for People Who Work in Tech (Hardcover)
Marc Steen
R3,037 Discovery Miles 30 370 Ships in 12 - 17 working days

This book is for people who work in the tech industry-computer and data scientists, software developers and engineers, designers, and people in business, marketing or management roles. It is also for people who are involved in the procurement and deployment of advanced applications, algorithms, and AI systems, and in policy making. Together, they create the digital products, services, and systems that shape our societies and daily lives. The book's aim is to empower people to take responsibility, to 'upgrade' their skills for ethical reflection, inquiry, and deliberation. It introduces ethics in an accessible manner with practical examples, outlines of different ethical traditions, and practice-oriented methods. Additional online resources are available at: ethicsforpeoplewhoworkintech.com.

Hidden and Devalued Feminized Labour in the Digital Humanities - On the Index Thomisticus Project 1954-67 (Hardcover): Julianne... Hidden and Devalued Feminized Labour in the Digital Humanities - On the Index Thomisticus Project 1954-67 (Hardcover)
Julianne Nyhan
R3,774 Discovery Miles 37 740 Ships in 12 - 17 working days

Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.

Technology - New Trajectories in Law (Paperback): Penny Crofts, Honni Van Rijswijk Technology - New Trajectories in Law (Paperback)
Penny Crofts, Honni Van Rijswijk
R599 Discovery Miles 5 990 Ships in 12 - 17 working days

Placing contemporary technological developments in their historical context, this book argues for the importance of law in their regulation. Technological developments are focused upon overcoming physical and human constraints. There are no normative constraints inherent in the quest for ongoing and future technological development. In contrast, law proffers an essential normative constraint. Just because we can do something, does not mean that we should. Through the application of critical legal theory and jurisprudence to pro-actively engage with technology, this book demonstrates why legal thinking should be prioritised in emerging technological futures. This book articulates classic skills and values such as ethics and justice to ensure that future and ongoing legal engagements with socio-technological developments are tempered by legal normative constraints. Encouraging them to foreground questions of justice and critique when thinking about law and technology, the book addresses law students and teachers, lawyers and critical thinkers concerned with the proliferation of technology in our lives.

Studying and Designing Technology for Domestic Life - Lessons from Home (Paperback): Tejinder Judge, Carman Neustaedter Studying and Designing Technology for Domestic Life - Lessons from Home (Paperback)
Tejinder Judge, Carman Neustaedter
R1,470 R1,332 Discovery Miles 13 320 Save R138 (9%) Ships in 12 - 17 working days

Conducting research and technology design for domestic life is by no means easy. Methods commonly used in the field of Human-Computer Interaction in settings like the workplace may not easily translate to the richness and complexity of domestic life. This book documents new ways in which researchers are studying domestic life, as well as designing and evaluating technology in the home. Each chapter is a candid discussion about methods that were successfully used for research studies with a focus on the challenges that the researchers faced and the best practices they learned.

Unconscious Networks - Philosophy, Psychoanalysis, and Artificial Intelligence (Hardcover): Luca M Possati Unconscious Networks - Philosophy, Psychoanalysis, and Artificial Intelligence (Hardcover)
Luca M Possati
R3,778 Discovery Miles 37 780 Ships in 12 - 17 working days

This book develops an original theoretical framework for understanding human-technology relations. The author's approach, which he calls technoanalysis, analyzes artificial intelligence based on Freudian psychoanalysis, biosemiotics, and Latour's actor-network theory. How can we communicate with AI to determine shared values and objectives? And what, ultimately, do we want from machines? These are crucial questions in our world, where the influence of AI-based technologies is rapidly growing. Unconscious dynamics influence AI and digital technology and understanding them is essential to better controlling AI systems. This book's unique methodology- which combines psychoanalysis, biosemiotics, and actor-network theory-reveals a radical reformulation of the problem of the human mind. Technoanalysis views the mind as a hybrid network of humans and nonhuman actants in constant interaction with one another. The author argues that human unconscious dynamics influence and shape technology, just as technology influences and shapes human unconscious dynamics. He proceeds to show how this conception of the relationship between the unconscious and technology can be applied to social robotics and AI. Unconscious Networks will appeal to scholars and advanced students interested in philosophy of technology, philosophy of artificial intelligence, psychoanalysis, and science and technology studies.

AI for Behavioural Science (Hardcover): Stuart Mills AI for Behavioural Science (Hardcover)
Stuart Mills
R1,411 Discovery Miles 14 110 Ships in 12 - 17 working days

Novel perspectives on machine behaviour as it relates to behavioural science. A framework of terminology to empower discussion of AI within behavioural science. A compelling definition of hypernudging developed from AI and behavioural science principles.

The Evolution of Law against Payment Frauds (Hardcover): Christopher Chen The Evolution of Law against Payment Frauds (Hardcover)
Christopher Chen
R3,770 Discovery Miles 37 700 Ships in 12 - 17 working days

This book examines the evolution of legal institutions in containing and tackling fraudulent activities plaguing payment systems ('payment fraud', e.g. forged cheques, wrongful payment instructions, etc.) in Asia, focusing on laws in Greater China and Singapore. In the past century, the payment system has invited much innovation, changing the modes of payments from exchanging cash and coins to the use of cards, wire transfers and other new types of payment instruments or services (e.g. bitcoins or QR code payments). As the nature of payment services is to move money from one place to another, it naturally attracts fraudsters. Even with advanced computer technology, payment fraud is still rampant in the market, causing billions of dollars in losses globally per annum. Through an examination of payment instruments and associated frauds over time, the book illustrates a shifting trend of legal solutions from criminal sanctions and civil compensation to a gradual focus on regulations of payment intermediaries. This trend reflects the complexity of payment systems and the challenge of protecting them. The book also identifies the underlying actors and institutional characteristics driving the evolution of legal institutions to deal with payment fraud and illustrates how the arrival of new technology may affect the market and thus the evolution of legal institutions. The book will help readers to better understand the interaction between technology, the market and law and help regulators, financial institutions, practitioners and end users, as well as about payment fraud and corresponding legal responses.

Blockchain for Industry 4.0 - Blockchain for Industry 4.0: Emergence, Challenges, and Opportunities (Hardcover): Asharaf S,... Blockchain for Industry 4.0 - Blockchain for Industry 4.0: Emergence, Challenges, and Opportunities (Hardcover)
Asharaf S, Justin Goldston, Samson Williams, Anoop V.S.
R3,713 Discovery Miles 37 130 Ships in 9 - 15 working days

This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain. It explains Blockchain concepts related to Industry 4.0, Smart Healthcare, and the Internet of Things (IoT) and explores Smart Contracts and Consensus algorithms. This book will serve as an ideal reference text for graduate students and academic researchers in electrical engineering, electronics and communication engineering, computer engineering, and information technology. This book * Discusses applications of blockchain technology in diverse sectors such as industry 4.0, education, finance, and supply chain. * Provides theoretical concepts, applications, and research advancements in the field of blockchain. * Covers industry 4.0 digitization platform and blockchain for data management in industry 4.0 in a comprehensive manner. * Emphasizes analysis and design of consensus algorithms, fault tolerance, and strategy to choose the correct consensus algorithm. * Introduces security issues in the industrial internet of things, internet of things, blockchain integration, and blockchain-based applications. The text presents in-depth coverage of theoretical concepts, applications and advances in the field of blockchain technology. This book will be an ideal reference for graduate students and academic researchers in diverse engineering fields such as electrical, electronics and communication, computer, and information technology.

The Art of Screen Time - How Your Family Can Balance Digital Media and Real Life (Paperback): Anya Kamenetz The Art of Screen Time - How Your Family Can Balance Digital Media and Real Life (Paperback)
Anya Kamenetz
R441 R365 Discovery Miles 3 650 Save R76 (17%) Ships in 10 - 15 working days

The newest generation of children is exposed to ubiquitous technology, more than any generation that preceded them. They are photographed with smartphones from the moment they're born, and begin interacting with screens at around four months old. Is this good news or bad news? A wonderful opportunity to connect around the world? Or the first step in creating a generation of addled screen zombies? The truth is, there's no road map for navigating this territory. But while many have been quick to declare this the dawn of a neurological and emotional crisis, solid science on the subject is surprisingly hard to come by. In this book, Anya Kamenetz--an expert on both education and technology, as well as a mother of two young children--takes a refreshingly practical look at the subject. Surveying hundreds of fellow parents on their practices and ideas, and cutting through a thicket of inconclusive studies and overblown claims, she hones a simple message, a riff on Michael Pollan's well-known "food rules": Enjoy Screens. Not too much. Mostly with others. This brief but powerful dictum forms the backbone of a philosophy that will help parents survive the ubiquity of technology in their children's lives, curb their panic, and create room for a happy, healthy family life. Kamenetz's sophisticated yet practical thinking is a necessary cure for an age of anxiety.

What Every Engineer Should Know About Cyber Security and Digital Forensics (Hardcover, 2nd edition): Joanna F Defranco, Bob... What Every Engineer Should Know About Cyber Security and Digital Forensics (Hardcover, 2nd edition)
Joanna F Defranco, Bob Maley
R3,473 Discovery Miles 34 730 Ships in 12 - 17 working days

Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R3,053 Discovery Miles 30 530 Ships in 12 - 17 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Advances in Cyber Security and Intelligent Analytics (Hardcover): Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra... Advances in Cyber Security and Intelligent Analytics (Hardcover)
Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas
R3,049 Discovery Miles 30 490 Ships in 12 - 17 working days

The proposed title intends to provide a comprehensive view of emerging paradigms of computer science. The initial chapters will introduce various emerging paradigms and discuss research challenges related to them. Then some of the chapters will focus on the research solutions to address the identified challenges. The last few chapters will provide a discussion on future research directions.

Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition): Thomas J. Holt, Adam M Bossler, Kathryn C... Cybercrime and Digital Forensics - An Introduction (Paperback, 3rd edition)
Thomas J. Holt, Adam M Bossler, Kathryn C Seigfried-Spellar
R1,221 Discovery Miles 12 210 Ships in 9 - 15 working days

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: * key theoretical and methodological perspectives; * computer hacking and malicious software; * digital piracy and intellectual theft; * economic crime and online fraud; * pornography and online sex crime; * cyber-bullying and cyber-stalking; * cyber-terrorism and extremism; * the rise of the Dark Web; * digital forensic investigation and its legal context around the world; * the law enforcement response to cybercrime transnationally; * cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

Social Media in Legal Practice (Hardcover): Girolamo Tessuto, Vijay Bhatia Social Media in Legal Practice (Hardcover)
Girolamo Tessuto, Vijay Bhatia
R3,491 R2,041 Discovery Miles 20 410 Save R1,450 (42%) Ships in 9 - 15 working days

There are multiple aspects of electronically-mediated communication that influence and have strong implications for legal practice. This volume focuses on three major aspects of mediated communication through social media. Part I examines social media and the legal community. It explores how this has influenced professional legal discourse and practice, contributing to the popularity of internet-based legal research, counselling and assistance through online services offering explanations of law, preparing documents, providing evidence, and even encouraging electronically mediated alternative dispute resolution. Part II looks at the use of social media for client empowerment. It examines how it has taken legal practice from a formal and distinct business to one that is publicly informative and accessible. Part III discusses the way forward, exploring the opportunities and challenges. Based on cases from legal practice in diverse jurisdictions, the book highlights key issues as well as implications for legal practitioners on the one hand, and clients on the other. The book will be a valuable reference for international scholars in law and other socio-legal studies, discourse analysis, and practitioners in legal and alternative dispute resolution contexts.

Resisting AI - An Anti-fascist Approach to Artificial Intelligence (Hardcover): Dan McQuillan Resisting AI - An Anti-fascist Approach to Artificial Intelligence (Hardcover)
Dan McQuillan
R2,218 Discovery Miles 22 180 Ships in 12 - 17 working days

Artificial Intelligence (AI) is everywhere, yet it causes damage to society in ways that can't be fixed. Instead of helping to address our current crises, AI causes divisions that limit people's life chances, and even suggests fascistic solutions to social problems. This book provides an analysis of AI's deep learning technology and its political effects and traces the ways that it resonates with contemporary political and social currents, from global austerity to the rise of the far right. Dan McQuillan calls for us to resist AI as we know it and restructure it by prioritising the common good over algorithmic optimisation. He sets out an anti-fascist approach to AI that replaces exclusions with caring, proposes people's councils as a way to restructure AI through mutual aid and outlines new mechanisms that would adapt to changing times by supporting collective freedom. Academically rigorous, yet accessible to a socially engaged readership, this unique book will be of interest to all who wish to challenge the social logic of AI by reasserting the importance of the common good.

Cyber Security Applications for Industry 4.0 (Hardcover): R. Sujatha, G. Prakash, Noor Zaman Jhanjhi Cyber Security Applications for Industry 4.0 (Hardcover)
R. Sujatha, G. Prakash, Noor Zaman Jhanjhi
R3,629 Discovery Miles 36 290 Ships in 12 - 17 working days

Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide accurate, real-time monitoring and control for smart applications and services. With better access to information from real-time manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve efficiency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulnerabilities in an organization's technology, including limited security mechanisms and logs, make the move to smart systems particularly challenging. Features: Proposes a conceptual framework for Industry 4.0-based Cyber Security Applications concerning the implementation aspect Creates new business models for Industrialists on Control Systems and provides productive workforce transformation Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and planning to work in the new area of Industry 4.0 Addresses the protection of plants from the frost and insects, automatic hydroponic irrigation techniques, smart industrial farming and crop management in agriculture relating to data security initiatives The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0 enabled connected systems and their limitations

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover)
Gulizar Haciyakupoglu, Yasmine Wong
R3,767 Discovery Miles 37 670 Ships in 12 - 17 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

A Haunted Road Atlas - Sinister Stops, Dangerous Destinations, and True Crime Tales (Paperback): Christine Schiefer, Em Schulz A Haunted Road Atlas - Sinister Stops, Dangerous Destinations, and True Crime Tales (Paperback)
Christine Schiefer, Em Schulz
R744 R641 Discovery Miles 6 410 Save R103 (14%) Ships in 10 - 15 working days
How to Find a Needle in a Haystack - From the Insider Threat to Solo Perpetrators (Hardcover): Yair Neuman How to Find a Needle in a Haystack - From the Insider Threat to Solo Perpetrators (Hardcover)
Yair Neuman
R1,517 Discovery Miles 15 170 Ships in 12 - 17 working days

By the end of this book, the reader will understand: the difficulties of finding a needle in a haystack; creative solutions to address the problem; unique ways of engineering features and solving the problem of the lack of data (e.g. synthetic data). Additionally, the reader will be able to: avoid mistakes resulting from a lack of understanding; search for appropriate methods of feature engineering; locate the relevant technological solutions within the general context of decision-making.

Zero Trust Journey Across the Digital Estate (Hardcover): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Hardcover)
Abbas Kudrati, Binil A. Pillai
R3,185 Discovery Miles 31 850 Ships in 12 - 17 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Paperback)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R1,280 Discovery Miles 12 800 Ships in 12 - 17 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

Digital Mediascapes of Transnational Korean Youth Culture (Paperback): Kyong Yoon Digital Mediascapes of Transnational Korean Youth Culture (Paperback)
Kyong Yoon
R1,228 Discovery Miles 12 280 Ships in 12 - 17 working days

Drawing on vivid ethnographic field studies of youth on the transnational move, across Seoul, Toronto, and Vancouver, this book examines transnational flows of Korean youth and their digital media practices. This book explores how digital media are integrated into various forms of transnational life and imagination, focusing on young Koreans and their digital media practices. By combining theoretical discussion and in depth empirical analysis, the book provides engaging narratives of transnational media fans, sojourners, and migrants. Each chapter illustrates a form of mediascape, in which transnational Korean youth culture and digital media are uniquely articulated. This perceptive research offers new insights into the transnationalization of youth cultural practices, from K-pop fandom to smartphone-driven storytelling. A transnational and ethnographic focus makes this book the first of its kind, with an interdisciplinary approach that goes beyond the scope of existing digital media studies, youth culture studies, and Asian studies. It will be essential reading for scholars and students in media studies, migration studies, popular culture studies, and Asian studies.

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback)
Gulizar Haciyakupoglu, Yasmine Wong
R1,145 Discovery Miles 11 450 Ships in 12 - 17 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Security in the Digital World (Paperback): IT Governance Security in the Digital World (Paperback)
IT Governance
R481 Discovery Miles 4 810 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R440 Discovery Miles 4 400
At Any Cost - The South African…
Stephen Timm Paperback R365 R314 Discovery Miles 3 140
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Financial Regulation and Technology - A…
Iain Sheridan Hardcover R3,909 Discovery Miles 39 090
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,696 Discovery Miles 56 960
The Secret History of Mac Gaming…
Bitmap Books Hardcover R934 Discovery Miles 9 340
Slenderman - Online Obsession, Mental…
Kathleen Hale Hardcover R733 R614 Discovery Miles 6 140
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000

 

Partners