0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (389)
  • R250 - R500 (1,136)
  • R500+ (11,253)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Teach Yourself Making Money in the Second Life World (Paperback): Irie Tsure Teach Yourself Making Money in the Second Life World (Paperback)
Irie Tsure
R91 Discovery Miles 910 Ships in 12 - 17 working days

Written by successful Second Life resort owner Irie Tsure, this comprehensive guide will accompany you on the tricky journey from Newbie to practising expert in the virtual world of Second Life. Teach Yourself Making Money in the Second Life World is intended to cover every skill required to enjoy and prosper within this virtual world but in particular focuses on those entrepreneurial activities, strategies and skills which can help you get ahead in business in Second Life. This book is packed with advice for virtual entrepreneurs looking to develop independent businesses within SL, perfect for individuals or small companies interested in entering SL and succeeding there. Authored by an established, popular business savvy and creative SL character, areas covered include: The Second Life economy Intellectual property rights Creating retail objects Creating fashion items including clothing, hair and footwear Scripting Creating animations including QAvimator and how to upload an animation Putting it all together including the creative process Retail outlets and venues including how,to rent or to buy space,store design and layout, selling your products in-world,opening a resort or nightclub, streaming music into Second Life,including your own music, developing the business,minimising lag, community and staff Land management including: finding, buying and selling land in Second Life, obtaining a private island, making money from virtual land, managing a Shopping Mall, checking and improving a region's performance Real-world brands in Second Life - examining the opportunities etc Marketing in second life including: branding, Second Life groups, promoting your business Appendices: A Irie's summary of success; B My past, our present and the future; C: Useful keyboard shortcuts Most other books are written by techies or tourists, not by an author who has actually made the SL experience work for themselves. This is the real McCoy.

Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Hardcover): Uwe Engel, Anabel Quan-Haase,... Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Hardcover)
Uwe Engel, Anabel Quan-Haase, Sunny Liu, Lars E. Lyberg
R5,360 Discovery Miles 53 600 Ships in 12 - 17 working days

1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.

The Right to be Forgotten - A Canadian and Comparative Perspective (Paperback): Ignacio Cofone The Right to be Forgotten - A Canadian and Comparative Perspective (Paperback)
Ignacio Cofone
R678 Discovery Miles 6 780 Ships in 12 - 17 working days

Exploring the evolution of the right to be forgotten, its challenges, and impacts on privacy, reputation, and online expression, this book lays out the current state of the law on the right to be forgotten in Canada and in the international context while addressing the broader theoretical tensions at the core of the right to be forgotten.

Development of a Remote Laboratory for Engineering Education (Paperback): Ning Wang, Qianlong Lan, Xuemin Chen, Gangbing Song,... Development of a Remote Laboratory for Engineering Education (Paperback)
Ning Wang, Qianlong Lan, Xuemin Chen, Gangbing Song, Hamid Parsaei
R645 Discovery Miles 6 450 Ships in 12 - 17 working days

The field of information technology continues to advance at a brisk pace, including the use of Remote Laboratory (RL) systems in education and research. To address the needs of remote laboratory development for such purposes, the authors present a new state-of-the-art unified framework for RL system development. Included are solutions to commonly encountered RL implementation issues such as third-party plugin, traversing firewalls, cross platform running, and scalability, etc. Additionally, the book introduces a new application architecture of remote lab for mobile-optimized RL application development for Mobile Learning (M-Learning). It also shows how to design and organize the remote experiments at different universities and make available a framework source code. The book is intended to serve as a complete guide for remote lab system design and implementation for an audience comprised of researchers, practitioners and students to enable them to rapidly and flexibly implement RL systems for a range of fields.

Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Paperback): Sara Smyth Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Paperback)
Sara Smyth
R1,291 Discovery Miles 12 910 Ships in 12 - 17 working days

The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.

The Patentability of Software - Software as Mathematics (Paperback): Anton Hughes The Patentability of Software - Software as Mathematics (Paperback)
Anton Hughes
R1,293 Discovery Miles 12 930 Ships in 12 - 17 working days

This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.

Robots, Healthcare, and the Law - Regulating Automation in Personal Care (Paperback): Eduard Fosch Villaronga Robots, Healthcare, and the Law - Regulating Automation in Personal Care (Paperback)
Eduard Fosch Villaronga
R1,303 Discovery Miles 13 030 Ships in 12 - 17 working days

First book to look at legal and regulatory aspects of personal care robots

The Effects of Technology and Institutions on E-Participation - A Cross-National Analysis (Hardcover): Pragati Rawat, John C.... The Effects of Technology and Institutions on E-Participation - A Cross-National Analysis (Hardcover)
Pragati Rawat, John C. Morris
R1,558 Discovery Miles 15 580 Ships in 12 - 17 working days

In this book Pragati Rawat and John C. Morris identify and evaluate the impact of factors that can help explain the difference in e-participation, public participation using information and communication technology, in different countries. While cross-sectional studies have been covered, few have taken an in-depth look at cross-national studies. This book attempts to fill the gap using quantitative panel data to explore the influence of technology and institutions, and the impact of their complex relationships in a mediation and moderation analysis, on e-participation. The current study reviews the scholarly work in the field of "offline" and "online participation" to identify a set of antecedents that influence e-participation. A conceptual framework is developed, supported by the theories from the public policy and socio-technical premise. The authors utilize secondary data, primarily from the UN and World Economic Forum, for 143 countries from three waves of surveys to measure the dependent and explanatory variables. The panel data is statistically analyzed and findings reveal the role of technology as a mediator as well as a moderator for institutions' impact on e-participation. The Effects of Technology and Institutions on E-Participation provides a groundbreaking country-level analysis that will appeal to academics and students of e-government and Digital Government, Public Policy, Public Administration, Public Sector Innovation, and Public Participation.

Understanding Reddit (Hardcover): Elliot T. Panek Understanding Reddit (Hardcover)
Elliot T. Panek
R1,577 Discovery Miles 15 770 Ships in 12 - 17 working days

This book offers a comprehensive scholarly overview of Reddit, one of the most popular and least studied social platforms of the early 21st century. The book inspires new ways of thinking about Reddit, considering it from multiple perspectives: through a historical lens, as a site where identity is forged, as a democracy, as a community, and as a news aggregator and distributor. By bringing theories from computer-mediated communication, communication studies, and sociology to bear on original, large-scale observational analyses of Reddit's communities, this book provides a uniquely comprehensive overview of the platform's first 15 years. Understanding Reddit will help us make sense of how rapidly growing communities function in an era of mass online anonymity. Serving both as a primer on how social behavior on Reddit plays out, and as a way of locating it within multiple theoretical traditions, the book will offer important insights to scholars and students in the disciplines of communication, media studies, information science, internet and emerging media studies, and sociology.

Advanced Smart Computing Technologies in Cybersecurity and Forensics (Hardcover): Keshav Kaushik, Shubham Tayal, Akashdeep... Advanced Smart Computing Technologies in Cybersecurity and Forensics (Hardcover)
Keshav Kaushik, Shubham Tayal, Akashdeep Bhardwaj, Manoj Kumar
R2,850 Discovery Miles 28 500 Ships in 12 - 17 working days

Includes detailed applications of cybersecurity and forensics for real life problems Addresses the challenges and solutions related to implementation of cybersecurity in multiple domains of smart computational technologies Includes the latest trends and area of research in cybersecurity and forensics Offers both quantitative and qualitative assesmnet of the topics Includes case studies that will be helpful for the researchers

Digital Afterlife and the Spiritual Realm (Hardcover): Maggi Savin-Baden Digital Afterlife and the Spiritual Realm (Hardcover)
Maggi Savin-Baden
R3,997 Discovery Miles 39 970 Ships in 12 - 17 working days

Examines how digital media and the creation of digital immortals may affect religious understandings of death and the afterlife; Understands the impact of digital media on those living and those working with the bereaved; Explores the impact of digital memorialisation post death; Looks at the ways in which digital media may be changing conceptions and theologies of death

Handbook of Computer Crime Investigation - Forensic Tools and Technology (Paperback): Eoghan Casey Handbook of Computer Crime Investigation - Forensic Tools and Technology (Paperback)
Eoghan Casey
R1,761 R1,635 Discovery Miles 16 350 Save R126 (7%) Ships in 12 - 17 working days

Following on the success of his introductory text, "Digital Evidence and Computer Crime," Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies.
The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool.
The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.
The Tools section provides details of leading hardware and software
-
The main Technology section provides the technical "how to" information
-for collecting and analysing digital evidence in common situations
Case Examples give readers a sense of the technical, legal, and practical
-challenges that arise in real computer investigations

The UX Careers Handbook (Hardcover, 2nd edition): Cory Lebson The UX Careers Handbook (Hardcover, 2nd edition)
Cory Lebson
R3,858 Discovery Miles 38 580 Ships in 12 - 17 working days

Features interviews and personal stories from a range of industry-leading UX professionals to show readers how they broke into the industry, stayed with it, and evolved with it. Accompanied by a companion website that provides readers with featured articles and updated resources covering new and changing information to help them stay on top of this fast-paced industry. Provides worksheets and activities to help readers make decisions for their careers and build their soft business skills and portfolios

Who Can You Trust? - How Technology Brought Us Together and Why It Might Drive Us Apart (Paperback): Rachel Botsman Who Can You Trust? - How Technology Brought Us Together and Why It Might Drive Us Apart (Paperback)
Rachel Botsman
R464 R387 Discovery Miles 3 870 Save R77 (17%) Ships in 10 - 15 working days
Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R3,994 Discovery Miles 39 940 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Theories of Terrorism - Contemporary Perspectives (Hardcover): Murat Haner, Melissa M. Sloan Theories of Terrorism - Contemporary Perspectives (Hardcover)
Murat Haner, Melissa M. Sloan
R4,168 Discovery Miles 41 680 Ships in 12 - 17 working days

The key feature of the text is its concise, scholarly depth, and accessible format, which enable readers to gain a clear understanding of the theory that they may use in future research. Current texts on the market include redundant, lengthy presentations of theories that fail to distinguish among key theoretical contributions. Terrorism is an area of urgent global concern. The number of terrorism and homeland security-focused academic programs, think tanks, and research centers has dramatically increased over the past two decades. Many universities now offer courses on issues related to terrorism at both the undergraduate and graduate levels within the social science disciplines as well as interdisciplinary centers. Yet, there is only one text and a few book chapters on theories of terrorism. The approach that we will use in the book will make it attractive to academics, students, and policy makers who seek to develop theoretically-driven approaches to policy making. Considering the current number of programs on terrorism and homeland security within the United States alone, the growing emphasis on terrorism studies across the world, and the absence of a clear text on theories of terrorism, the demand should be quite high. This will be the only text that offers chapter-length descriptions of each stage of the radicalization process covering pressing issues in the field of terrorism.

Blockchain for Information Security and Privacy (Hardcover): Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar... Blockchain for Information Security and Privacy (Hardcover)
Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar Shukla, Zelalem Sintayehu Shibeshi
R3,089 Discovery Miles 30 890 Ships in 12 - 17 working days

Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

Advanced Cybersecurity Technologies (Hardcover): Ralph Moseley Advanced Cybersecurity Technologies (Hardcover)
Ralph Moseley
R3,983 Discovery Miles 39 830 Ships in 12 - 17 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover): Chinmay Chakraborty, Sree Ranjani... Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover)
Chinmay Chakraborty, Sree Ranjani Rajendran, Muhammad Habibur Rehman
R4,606 Discovery Miles 46 060 Ships in 12 - 17 working days

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

Bioinformation Worlds and Futures (Hardcover): EJ Gonzalez-Polledo, Silvia Posocco Bioinformation Worlds and Futures (Hardcover)
EJ Gonzalez-Polledo, Silvia Posocco
R4,141 Discovery Miles 41 410 Ships in 12 - 17 working days

This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.

The GDPR Challenge - Privacy, Technology, and Compliance in an Age of Accelerating Change (Hardcover): Amie Taal The GDPR Challenge - Privacy, Technology, and Compliance in an Age of Accelerating Change (Hardcover)
Amie Taal
R2,633 Discovery Miles 26 330 Ships in 12 - 17 working days

A must have book on how GDPR is actively working in the privacy, compliance and technology space. Gain a clear understanding of GDPR requirements and recognise opportunities to reshape your data privacy compliance programs. Learn unique techniques to avoid GDPR non-compliance in the third and fourth industrial revolution era. A practical guide to providing great insights on data privacy challenges and compliance with invaluable practical approaches. Demonstrates data privacy legislation differences and similarities in multi-jurisdictions and how to man oeuvre the minefield of privacy successfully.

Cyberspace, Data Analytics, and Policing (Hardcover): David Skillicorn Cyberspace, Data Analytics, and Policing (Hardcover)
David Skillicorn
R2,120 Discovery Miles 21 200 Ships in 12 - 17 working days

Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.

Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Paperback): Uwe Engel, Anabel Quan-Haase,... Handbook of Computational Social Science, Volume 1 - Theory, Case Studies and Ethics (Paperback)
Uwe Engel, Anabel Quan-Haase, Sunny Liu, Lars E. Lyberg
R1,771 Discovery Miles 17 710 Ships in 12 - 17 working days

1. Very comprehensive and extensive coverage (stresses the relevance of the entire research cycle, from design to data collection to analysis to interpretation). 2. Highlights the multidisciplinary nature of CSS, drawing from research in computer science, statistics, and the social and behavioural sciences. 3. Takes a holistic approach to CSS methods. Instead of focusing on simply harvesting data, the editors emphasise the importance of a carefully crafted research design containing key milestone checks.

Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover): Ari Ezra Waldman Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover)
Ari Ezra Waldman
R636 Discovery Miles 6 360 Ships in 12 - 17 working days

In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be read by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.

Children, Technology and Healthy Development - How to Help Kids be Safe and Thrive Online (Hardcover): Catherine Knibbs Children, Technology and Healthy Development - How to Help Kids be Safe and Thrive Online (Hardcover)
Catherine Knibbs
R4,140 Discovery Miles 41 400 Ships in 12 - 17 working days

Offers parents, and training and practising professionals in psychology, psychotherapy, education and social work insight into what the evidence says about human behaviour online, what this means for how children develop and how we can best support children to be safe and healthy online now and in future. Accessibly presents the key research from psychology, sociology and biology to reveal how and why humans interact with platforms, apps and software. Covers essential topics including social media, gaming and harmful effects of technology and social media.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Handover - How We Gave Control Of…
David Runciman Hardcover R630 R504 Discovery Miles 5 040
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R449 Discovery Miles 4 490
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R273 Discovery Miles 2 730
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R312 Discovery Miles 3 120
Extremely Hardcore - Inside Elon Musk's…
Zoë Schiffer Hardcover R718 R472 Discovery Miles 4 720
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R175 Discovery Miles 1 750
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,181 Discovery Miles 11 810

 

Partners