Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 7 of 7 matches in All Departments
Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.
This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.
Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.
This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.
This book constitutes the refereed proceedings of the joint 6th International Semantic Web Conference, ISWC 2007, and the 2nd Asian Semantic Web Conference, ASWC 2007, held in Busan, Korea, in November 2007. The 50 revised full academic papers and 12 revised application papers presented together with 5 Semantic Web Challenge papers and 12 selected doctoral consortium articles were carefully reviewed and selected from a total of 257 submitted papers to the academic track and 29 to the applications track. The papers address all current issues in the field of the semantic Web, ranging from theoretical and foundational aspects to various applied topics such as management of semantic Web data, ontologies, semantic Web architecture, social semantic Web, as well as applications of the semantic Web. Short descriptions of the top five winning applications submitted to the Semantic Web Challenge competition conclude the volume.
" Analyzing the Social Web "provides a framework for the analysis
of public data currently available and being generated by social
networks and social media, like Facebook, Twitter, and Foursquare.
Access and analysis of this public data about people and their
connections to one another allows for new applications of
traditional social network analysis techniques that let us identify
things like who are the most important or influential people in a
network, how things will spread through the network, and the nature
of peoples' relationships. Analyzing the Social Web introduces you
to these techniques, shows you their application to many different
types of social media, and discusses how social media can be used
as a tool for interacting with the online public.
If you're interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources. Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses special skills and techniques to use when conducting investigations. The book features hands-on tutorials and case studies and offers additional data-gathering techniques.
|
You may like...
|