Social and ethical aspects Books
Taylor & Francis Ltd Ergonomics Mw Vol 1 HistScop
Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.
£285.00
Taylor & Francis Ltd Ergonomics Mw Vol 2 SkillDis
Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.
£285.00
Taylor & Francis Ltd Ergonomics Mw Vol 3Psych Mech
Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.
£403.75
Taylor & Francis Ltd Ergonomics Mw Vol 4 Manu Cont
Book SynopsisFirst published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.
£356.74
John Wiley & Sons Inc Customer Intelligence
Book SynopsisDeveloped from the authors'' experience working with firms seeking to build better business intelligence, The Customer Information Wars is concerned with who will own and control information about customers and who will develop the best skills and capabilities to exploit it for competitive advantage. At its core, it attempts to explain why the age of information has failed to live up to its own hype of specialization, personalization over homogenization, and consistently satisfying customers.Trade Review"Kelly's elegant, jargon-free style and compelling arguments make the work read like a whodunnit..." (Journal of Direct, Data and Digital Marketing Practice, March 2006) "... this book is indispensable" (The Marketer, April 2006) "it should still prove equally inspiring [as his previous book, Data Warehousing]" (Information Age, April 2006) "... succeeds in crystallising a radical change in marketing...." (Journal of Direct Data & Digital Marketing Practise, June 2006)Table of ContentsForeword by Malcolm McDonald xi Acknowledgements xiii Introduction xv Part I The Decade of Customer Information Exploitation: 1990–2000 1 Chapter 1 The Concept of Customer Intelligence: From Product to Customer 3 Chapter 2 Achieving an Intelligence Capability: From Data to Knowledge 37 Chapter 3 The Eclipse of Mass Marketing: From Many to One 77 Chapter 4 Achieving Segmentation and Differentiation: From Fuzzy to Focused 105 Part II The Decade of Customer Information Exchange: 2000–2010 129 Chapter 5 The Collapse of Time: From Lapsed to Real 131 Chapter 6 Customer Privacy and Confidentiality: From Surveillance to Permission 155 Chapter 7 Closing the Loop: From Monologue to Dialogue 185 Chapter 8 The New Practice of Marketing: From Selling to Buying 203 Notes 229 Index 237
£45.59
John Wiley & Sons Inc Pandoras Box
Book SynopsisComputing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society it is embedded in, and affects, all aspects of life, from education to healthcare to war. Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct. Using case studies and discussion topics drawn from entertaining real world examples, Pandora's Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers. Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, pirTrade Review'I.T. has triggered complex social, political, economic and ethical issues that need urgent action if we are to survive the coming decades of unprecedented technological change. This book is a must-read for all those who want to understand the issues or, more important, want to help in their resolution.' -James Burke 'This book provides a breath of fresh air in the subject... with numerous examples. Further, it provides a nice link between ethical behaviour, professionalism and the law' -Karl Jones, Liverpool John Moores University 'I found this an excellent read, covering a wide range of essential social and professional issues for computer scientists. There is a good balance between ethical material and technical material, and it would be suitable for a layperson. An entertaining and thought-provoking book' -Dr. Carron Shankland of the University of StirlingTable of ContentsForeword xxi Preface xxv 1 Introduction 1 Lessig’s Four Modalities Analysis 6 Prophet and Loss: Failing to Foresee the Future 7 Information System Partition 8 The Law is an Ass 10 Globalization 12 The Digital Divide 13 Servant or Master: Computers Making Decisions 15 Discussion Topics 17 Can Laws Be Immoral? 17 Genetically Modified Food, Technologically Modified Humans 17 The Haves and the Have-nots 18 Related Reading 19 2 Emergence and Convergence of Technologies 21 Introduction 21 Emergence 23 The Rise of Print Media 23 The Rise of the Telegraph and the Telephone 24 The Rise of Broadcast Media 28 The Rise of the Computing Industry 31 The Rise of the Content Industry 33 The Rise of the Internet 35 Convergence 39 Content Producers and Distributors 39 Platform Producers and Content Producers or Publishers 41 Corporate Production vs Individual Creativity 43 Market Sector Integration 44 Digitization 48 The Big Challenges Ahead 55 Discussion Topics 56 Fit for Purpose? 56 E-Tax 56 Competing with Free Beer 58 Related Reading 60 3 Digital Entertainment 61 Introduction 61 The Effects of Digital Entertainment Technology 64 Digital Entertainment—Friend or Foe? 64 The Toy Town Divide 64 Boys and Girls Come out to Play: Stereotyping 66 Health-Related Issues 69 Curse of the Couch-Potato Children 69 Physical Problems 71 Digital Equipment—Part of the Modern Family 72 Does Television Cause Adverse Social Behaviour? 74 Creating Monsters—Do Computer Games Make People Violent? 76 Do Computer Games Fuel Addiction and Gambling? 80 Power to the Player—Benefits of Computer Games 84 Harnessing the Power of the Brain 84 Education and Learning 86 The Silver Gamers 88 Game Development Grows up—the Hidden Agenda 88 Discussion Points 91 Should Computer Games Be Regulated? Rated? Censored? 91 Couch-Potato Syndrome 92 Online Gambling: Menace or Natural Progression? 93 Related Reading 95 4 Censorship and Freedom of Speech 97 Introduction 97 Reasons for Censorship 100 Censorship by States 101 Censorship of Speakers by Governments 107 Censorship of Listeners by Governments 109 Censorship by Private Actors 111 Censorship of Speakers by Private Actors 111 Censorship of Listeners by Private Actors 113 Technology for Expression 114 Technological Developments with Expressive Power 114 Censoring Internet Content 115 Client–Server and Peer-to-Peer Architectures 124 Conclusion 125 Discussion Topics 126 Yahoo! France Nazi Memorabilia 126 ISP Liability for Content 127 BT and the IWF 129 Related Reading 130 5 Sex and Technology 131 Introduction 131 The Nature of Sexual Material 132 One Man’s Art. . . 132 The Medium and the Message 133 Use of Technology to (Re)Produce Sexual Material 133 Techno-Sex 134 Anonymity: Reality and Illusion 144 Anon Servers 146 Online Sex and Real Relationships 147 The Future of Online Sex: TeleDildonics? 148 Regulating Sex in Cyberspace 149 Not in Front of the Children: Protecting Children from Sex Online 152 Restricting Access to Broadcast Media 153 Surfing to a Naked Beach 154 ‘Satisfy Her in Bed’: Sex Spam to Minors 157 Online Friendships 159 Child Pornography 161 Types of Material 162 Prohibition, Harm, Possession and Distribution 166 Jurisdictional Anomalies and Conflicts 168 Discovery, Defence and Mitigation 169 Discussion Topics 171 Freedom of Speech vs Censorship of Sexual Material 171 The Toby Studabaker Case 172 Related Reading 173 6 Governance of the Internet 175 Introduction 175 The Internet Protocols 176 The Origins of the Internet 178 Early Arguments 181 The Root of All Evil 185 Commercialization 185 Internet Corporation for Assigned Names and Numbers 186 ccTLDs 188 Alternative Root Servers 188 Commercialization, Ownership and Corporate Identity 189 Trade Marks 189 Trade Marks in Domain Names 191 The Uniform Dispute Resolution Process 196 The Nominet Dispute Resolution Process 198 Criticisms of Dispute Resolution 199 Do Trade Marks Matter in Domain Names or in URLs? 203 The Future of Internet Governance 204 ICANN, DoC, EU and ccTLDs 204 Wiring the World: Who Really Owns ‘The Internet’? 205 Discussion Topics 206 Should Trade Marks Be Valid in Domain Names? 206 What Governance Should ICANN Have? 207 How Many Top-Level Domains Should There Be? 208 7 Privacy and Surveillance 211 Introduction 211 Cryptography and Steganography 212 Definition of Privacy 214 Communication Technology and Eavesdropping 215 Ways to Eavesdrop 215 Identity of Eavesdropper 217 Legality of Eavesdropping 218 The Whole Is Greater than the Sum of its Parts 220 Data Protection 222 Data Protection Issues in EU Law 223 Data Protection Issues in US Regulation 227 International Movement of Data 229 Data Protection, not an Impediment to Life 230 Big Brother is Watching You: Automated CCTV Processing 231 Privacy After 9/11 234 Technological Privacy and Surveillance 235 Discussion Topics 237 Leaving Little Trace: Anonymity in the Digital World? 237 Availability of Cryptography and Steganography 238 Data Retention by ISPs 239 Related Reading 241 8 Information Age Warfare 243 Introduction 243 History of Warfare 245 The Technology of War 248 War News 249 Cyber-Wars 250 Satellites—the View from Space 253 Star Wars Technology 254 Network-centric Warfare 255 The Battlefield 258 Robo-Soldier 258 Man or Machine? 259 The Unseen Enemy 260 Mobile Phones as Weapons 261 War Games 261 Information Dominance 263 Intelligence Gathering and Surveillance 265 Discussion Topics 267 Working for Arms Manufacturers 267 Cyberterrorism: Real Threat or Virtual Bogeyman? 268 Overall Benefit or Drain on Resources? 269 9 Technology and the Human Body 273 Introduction 273 Health Information Systems 275 Treatment 276 Electronic Patient Records 276 E-booking 278 E-prescribing 279 Intranets, the Internet and Call Centres 280 Factors for Success 281 Power to the Patient 283 The Internet and CDs 284 Television Programmes 286 Digital Television 287 Self-Diagnosis Kits 288 Online Pharmacies 290 Online Body Trafficking 291 Techno-Medicine 292 Telemedicine 293 Training and Supporting Nurses and Doctors 294 Virtual Therapy 297 Robots in Hospitals 298 Smart Monitoring 301 Computer Modelling 305 Assistive Technology and Rehabilitation 308 New Medical Technologies 309 Implants for Diagnosis and Healing 310 Implants and Prosthetics for Replacement and Reconstruction 311 Digital Flesh and Cyborgs 315 Discussion Topics 318 The Longevity and Social Justice Debate 318 Suggested Positions 319 Owning the Code of Life 319 What Is a Human? 320 Related Reading 321 10 Professionalism in IT 323 Introduction 323 Conduct 327 Practice 333 Whistleblowing 334 Vulnerability of E-mail 335 ‘Illegal’ espionage 337 Consequences of ‘Whistleblowing’ 337 Due Diligence 338 Personal Responsibility 340 Discussion Topics 340 Self-Incrimination 340 Responsibility for DDoS Attacks 341 Whistleblowing Insecurity 343 11 Online Crime and Real Punishment 345 Introduction 345 A Brief History of Crime and Computers 347 Computer Fraud 348 Malware 351 A Taxonomy of Malware 351 Problems Caused by Malware 352 Malware Authors: Who, How and Why? 359 Hoaxes and Life Imitating Art 362 Computer Security: Cops and Robbers, Poachers and Gamekeepers 363 Historical Roots of Cracking 364 Who are the Crackers? 366 Vulnerability, Risk and Threat 370 Closed vs Open Security 373 Walking the Tightrope: Social Pressures on Security 379 How Much Security Is Necessary? 382 Poachers and Gamekeepers 386 Laws Against Computer Misuse 387 UK Computer Misuse Act 388 US Sequence of Laws 391 Council of Europe Convention on Cybercrime 393 The Growing Problem of Computer Crime 395 Discussion Topics 396 Grey Hat Cracking Should Be Legalized 396 Web Scrapers and Robot Denial Files 397 An Immune System for the Internet 399 Related Reading 400 12 Patents and Copyright 401 Introduction 401 Intellectual Property? 402 Trade mark 402 Patent 403 Copyright 404 The Philosophical Basis of Patents and Copyright 404 Patents 406 A Brief History of Patents 406 Modern Patent Systems 407 Business Methods and Software Patents 411 General Criticisms of Patents 414 Patent-Licensing Companies 417 Copyright 419 Origins and Development of Copyright 420 The Main Provisions of Modern Copyright Statutes 424 US Case Law for Copyright 428 The Current State of Play 434 The Music Industry and Higher Education 435 The Originator’s Rights 436 Software Copyright 437 Copyright and the Architecture of Cyberspace 449 Free Culture 449 Discussion Topics 450 Is Copyright the Correct Way to Reward Artists? Does It Promote Artistic Activity? 450 Lack of Legitimate Downloads Caused the Rise of Peer-to-Peer File-Sharing 452 A New Basis for Copyright Law Is Required 453 Control and the Copyright Bargain 454 Related Reading 455 13 Unwanted Electronic Attentions 457 Introduction 457 Types of Unsolicited Communication 459 Static Visual Communication 459 Audio Communication 460 Types of Communication Media 461 Public Displays 461 Broadcast Non-Interactive Media 461 Broadcast Interactive Media 462 Telephonic Services 463 Internet Services 465 The Economics of Unsolicited Contacts 470 Sender Economics 470 Junk mail 471 Cold calling 472 Receiver Economics 474 Referral Economics 477 Social, Legal and Technological Discouragement 481 Malicious Unwanted Attentions 494 Online and Telephone Fraud 495 Electronic Stalking 496 Online Grooming 499 Discussion Topics 500 Tackling Spam at the Transport Layer 500 Opt-In, Opt-Out, Shake It All About 501 Freedom of Speech or Online Stalking 502 Related Reading 503 14 Education and Online Learning 505 Introduction 505 From the Chalkboard to the Virtual Classroom 507 Technology through the Years 507 Visual Aids to Learning 508 Audio Aids to Learning 510 Audio–Visual Aids to Learning 511 Developing E-Learning Environments 513 ICT and e-Learning in Further Education Colleges in England 515 e-Portfolio 516 Videoconferencing 517 Online Encyclopedia 518 Mobile Education (PDAs and Mobile Devices) 519 Electronic Books 521 Electronic Whiteboards 521 Online Marketing 522 Electronic Application and Admission Systems 523 Digital Library 523 Second Life 524 Web 2.0 525 Developing and Embracing e-Learning Resources 526 The Learner Perspective 527 The Teacher Perspective 529 Accessibility of Education in a Wired World 533 Cheating the System 535 Bogus Degrees 538 Discussion Topics 539 One Person’s Plagiarism Is Another’s Research 539 Overseas Education vs Distance Education 540 The Net of a Million Lies 542 Related Reading 543 15 Living and Working in a Wired World 545 Introduction 545 The Digital Lifestyle 547 Work, Skills and Roles 547 Teleworking 548 The Mobile Office: the ‘Non-Office’ Office Job 551 The New Role of the Office 552 Smarter Travel 552 Smarter Homes 555 Shopping 556 Buying Entertainment 561 The Sporting Life 562 Technology and the Individual 563 Education 563 Health 563 Crime 564 Religion 564 Communication 565 The Changing Face of Communication 565 The Global Village 573 The Digital Divide 574 The Digital Divide in the Industrialized World 577 E-Government 578 The Digital Divide Between the Nations 579 Discussion Topics 580 The Language of the Digital Age 580 Digital Relationships 581 Digital Divides 581 Related Reading 582 Appendix—Ethical Analysis 583 Introduction 583 Traditional Western Moral Philosophy 584 Rationalism 584 Locke vs Hobbes 585 Hume and Human Passion 587 Kant and the Categorical Imperative 587 Legality and Morality 587 Modern Ethical Theory 589 Utilitarian Ethics 589 Relativistic vs Universal Utiliarianism 590 New Utilitarianism: Singer 591 Computer Ethics 591 Metaphysical Foundations for Computer Ethics 593 Informed Consent Theory in Information Technology 594 Ethical Decisions: Using the Back of the Envelope 594 Information Ethics: ICT Professional Responsibility in the Information Environment 595 The Good Computer Professional Does not Cheat at Cards 596 Conclusion 596 Discussion Topics 597 General: The Death Penalty 597 ICT: Artificial Sentience Rights and Wrongs 598 General: Is Religion an Excuse for Discrimination? 599 ICT: Search Ethics 600 General: Lying to Tell the Truth? 601 ICT: Gender Presentation Online 601 General: Fair Fines 602 ICT: Should Internet Access be a Human Right? 603 General: Prediction of Harm 604 ICT: Programmer Responsibility 605 Related Reading 607 Index 609
£45.86
John Wiley & Sons Inc ServiceOriented Modeling
Book SynopsisAnswers to your most pressing SOA development questions How do we start with service modeling? How do we analyze services for better reusability? Who should be involved? How do we create the best architecture model for our organization? This must-read for all enterprise leaders gives you all the answers and tools needed to develop a sound service-oriented architecture in your organization. Praise for Service-Oriented Modeling Service Analysis, Design, and Architecture Michael Bell has done it again with a book that will be remembered as a key facilitator of the global shift to Service-Oriented Architecture. . . . With this book, Michael Bell provides that foundation and more-an essential bible for the next generation of enterprise IT. -Eric Pulier, Executive Chairman, SOA Software Michael Bell''s insightful book provides common language and techniques for business and technology organizations to take advantage of thTable of ContentsPreface. Chapter 1. Introduction. Service-Oriented Modeling: What Is It About? Driving Principles Of Service-Oriented Modeling. Organizational Service-Oriented Software Assets. Service-Oriented Modeling Process Stakeholders. Modeling Services Introduction: A Metamorphosis Embodiment. Service-Oriented Modeling Disciplines: Introduction. Modeling Environments. Service-Oriented Modeling Framework. Summary. Part One. Service-Oriented Life Cycle. Chapter 2. Service-Oriented Life Cycle Model. Service-Oriented Life Cycle Model Principles. Service-Oriented Life Cycle Model Structure. Service-Oriented Life Cycle Disciplines. Summary. Chapter 3. Service-Oriented Life Cycle Perspectives. Service-Oriented Life Cycle Workflows: Introduction. Planning Service-Life Cycle Workflows. Service Life Cycle Progress View. Service Life Cycle Iteration View. Service Life Cycle Touch-Points View. Summary. Part Two. Service-Oriented Conceptualization. Chapter 4. Attribution Analysis. Establishing Core Attributes. Establishing An Attribution Model. Attribution Analysis. Attribute Selection. Deliverables. Summary. Chapter 5. Conceptual Service Identification. Service Conceptualization Toolbox. Conceptual Service Identification And Categorization. Conceptual Service Association Process. Conceptual Service Structure. Deliverables. Summary. Part Three. Service-Oriented Discovery And Analysis. Chapter 6. Service-Oriented Typing And Profiling Model. Service-Oriented Typing. Service-Oriented Profiling. Service Typing Namespaces. Service Typing And Profiling Deliverables. Summary. Chapter 7. Service-Oriented Discovery And Analysis: Implementation Mechanisms. Service-Oriented Assets And Analysis Activites. Service Discovery And Analysis Toolbox. Granularity Analysis. Aggregation Analysis. Decomposition Analysis. Unification Analysis. Intersection Analysis. Subtraction Analysis. Combining Service Analysis Methods. Service-Oriented Discovery And Analysis Deliverables Model. Summary. Chapter 8. Service-Oriented Analysis Modeling. Analysis Modeling Guiding Principles. Analysis Proposition Diagrams. Analysis Notation. Analysis Modeling Rules. Analysis Modeling Process. Service-Oriented Analysis Modeling Operations. Deliverables. Summary. Part Four. Service-Oriented Business Integration. Chapter 9. Business Architecture Contextual Perspectives. Business Model Perspectives. Problem-Solving Perspectives. Deliverables. Summary. Chapter 10. Business Architecture Structural Perspectives. Business Architecture Structural Integration Model. Business Domain Integration Structures. Business Domain Geographic Boundaries. Business Domain Distribution Formations. Business Domain Control Structures. Deliverables. Summary. Chapter 11. Service-Oriented Business Integration Modeling. Service-Oriented Business Integration Modeling Principles. Service-Oriented Business Integration Diagram. Modeling Process. Business Architecture Deliverables Model. Summary. Part Five. Service-Oriented Design Model. Chapter 12. Service-Oriented Logical Design Relationship. Design Logical Relationship Major Influences. A Formal Service Logical Relationship Notation. Roles In The Service-Oriented Design Context. Service Design Visibility Aspects. Service Cardinality. Synchronization. Service-Oriented Logical Design Relationship Diagram. Deliverables Model. Summary. Chapter 13. Service-Oriented Logical Design Composition. What Is A Service-Oriented Logical Design Composition? Service-Oriented Design Composition Components Service-Oriented Design Composition Styles. Logical Design Composition Strategies. Deliverables. Summary. Chapter 14. Service-Oriented Transaction Model. Service-Oriented Transaction Planning Success Criteria. Logical Design View: Service-Oriented Transaction Diagram. Conveying Functionality In The Activity Section. Planning Service-Oriented Transactions. Deliverables. Summary. Part Six. Service-Oriented Software Architecture Principles. Chapter 15. Service-Oriented Conceptual Architecture Principles. Conceptual Architecture Elements. Architectural Concepts As Machines. Modeling Conceptual Architecture. Deliverables. Summary. Chapter 16. Service-Oriented Logical Architecture Principles. Logical Architecture Building Blocks. Logical Architecture Perspectives. Asset Utilization Diagram. Reusability Perspective. Discoverability Perspective. Behavioral Perspective. Loose-Coupling Perspective. Interoperability Perspective. Deliverables. Summary. Index.
£37.50
Wiley Green Home Computing For Dummies
Book SynopsisMake your computer a green machine and live greener at home and at work Get on board the green machine! Green home computing means making the right technology choice for the environment, whether it be a Windows-based or Mac-based computer and all the peripherals.Table of ContentsIntroduction. Part I: Getting a Little Green Behind the Ears. Chapter 1: What Is Green Computing? Chapter 2: Checking Out Your Carbon Footprint. Chapter 3: The Straight Scoop on Power. Part II: Choosing Your Green PC Path. Chapter 4: Assessing What You've Got. Chapter 5: Giving Your Computer a Green Makeover. Chapter 6: Buying a Green Computer. Chapter 7: Choosing Earth-Friendly Peripherals. Chapter 8: Recycling Your Computer. Part III: Greener Under the Hood. Chapter 9: Optimize Your Computer Power Management. Chapter 10: Greening Mobile Devices. Chapter 11: Print Less, Breathe More. Chapter 12: Seamless Sharing across Systems. Part IV: Telecommuting, Teleconferencing, and Teleporting. Chapter 13: Making the Case for Telecommuting. Chapter 14: Telecomm Central: The Green Home Office. Chapter 15: Collaborating and Cloud Computing. Chapter 16: Making the Connection: Virtual Presence. Chapter 17: Your Green Small Business. Part V: The Part of Tens. Chapter 18: Ten Best Ways to Make Your Computer Greener. Chapter 19: Ten (Plus) Online Resources for Green Info, Action, and Products...351 Index.
£15.29
John Wiley & Sons Inc SOA Modeling Patterns for ServiceOriented
Book SynopsisLearn the essential tools for developing a sound service-oriented architecture SOA Modeling Patterns for Service-Oriented Discovery and Analysis introduces a universal, easy-to-use, and nimble SOA modeling language to facilitate the service identification and examination life cycle stage. This business and technological vocabulary will benefit your service development endeavors and foster organizational software asset reuse and consolidation, and reduction of expenditure. Whether you are a developer, business architect, technical architect, modeler, business analyst, team leader, or manager, this essential guide-introducing an elaborate set of more than 100 patterns and anti-patterns-will help you successfully discover and analyze services, and model a superior solution for your project,. Explores how to discover services Explains how to analyze services for construction and production How to assess service feasibility for deploymeTable of ContentsPreface xix Foreword xxi CHAPTER 1 Introduction 1 What is Service-Oriented Discovery and Analysis? 2 Service-Oriented Analysis Endeavor 2 Service-Oriented Discovery Endeavor 7 Service-Oriented Discovery and Analysis Proposition 11 Driving Principles of Service-Oriented Discovery and Analysis 13 Service-Oriented Discovery and Analysis Modeling 15 Service-Oriented Discovery and Analysis Patterns 17 Summary 20 PART ONE Service-Oriented Discovery and Analysis Road Map Patterns 21 CHAPTER 2 Vertical Service Discovery and Analysis: Pursuing Inward and Downward Road Map Patterns 25 Service Discovery and Analysis Inward Road Map Pattern 25 Service Discovery and Analysis Downward Road Map Pattern 32 Deliverables 38 Summary 39 CHAPTER 3 Horizontal Service Discovery and Analysis: Pursuing Upward and Outward Road Map Patterns 41 Service-Oriented Discovery and Analysis Upward Road Map Pattern 42 Service Discovery and Analysis Outward Road Map Pattern 46 Deliverables 56 Summary 56 CHAPTER 4 Service-Oriented Discovery and Analysis Best Practices Model: Striving for Balanced Solutions 59 Meet-in-the-Middle Service Discovery: Balancing the Identification Venture 59 Structural and Contextual Analysis and Modeling: Balanced Solutions 61 Focus on Service Discovery and Analysis Cross-Cutting Activities 62 Categorization of Services: Reality Check 64 Service-Oriented Discovery and Analysis Best Practices Model 64 Deliverables 68 Summary 68 PART TWO Service-Oriented Discovery Patterns 69 CHAPTER 5 Top-Down Business Process-Driven Service Discovery Pattern 71 Is Business Process Top-Down Service Discovery Practical? 71 Documenting Business Processes: Industry Standards 72 Understand Business Processes 72 Define Business Process Analysis Maturity Level 76 Study Documented Business Processes 77 Establish Service-Oriented Business Process Model 78 Discover Analysis Services 82 Deliverables 87 Summary 88 CHAPTER 6 Top-Down Attribute-Driven Service Discovery Pattern 89 Study Business and Technology Discovery Sources 89 Attend to the Service Discovery Process 90 Institute Core Attributes 91 Establish Attribution Model 93 Select Attributes for Service Discovery 95 Found Decision Model 97 Discover Analysis Services 100 Establish Service Taxonomy 102 Deliverables 104 Summary 104 CHAPTER 7 Front-to-Back Service Discovery Pattern 105 Front-to-Back Service Discovery Model 105 User Interface Control Services 106 User Interface Content Delivery Services 111 User Interface Content Rendering Services 114 User Interface Value Services 117 Front-to-Back Service Discovery Process 118 Deliverables 122 Summary 122 CHAPTER 8 Back-to-Front Service Discovery Pattern 123 Conceptual Data Model Perspective 123 Logical Data Model Perspective 127 Physical Data Model Perspective 139 Back-to-Front Service Discovery Process 139 Deliverables 144 Summary 144 CHAPTER 9 Bottom-Up Service Discovery Pattern 145 Bottom-Up Business Functionality–Driven Service Discovery 145 Bottom-Up Technology-Driven Service Discovery 152 Bottom-Up Reference Architecture–Driven Service Discovery 157 Deliverables 163 Summary 163 CHAPTER 10 Meet-in-the-Middle Service Discovery Pattern 165 Integration-Oriented Services 165 Common Business Services 172 Infrastructure-Oriented Services 175 Deliverables 179 Summary 180 PART THREE Service-Oriented Categorization Patterns 181 CHAPTER 11 Service Source Categorization Patterns 183 Service Ideas and Concepts 183 Service Abstractions 185 Legacy Entities: Road-Tested Executables 188 Service Portfolio 189 Virtual Entities 191 Deliverables 191 Summary 192 CHAPTER 12 Service Structure Categorization Patterns 193 Service Structure Model 193 Environmental Influences on Service Structure 194 Service Structure Categorization Driving Principles 195 Atomic Service Structure: Indivisible Pattern 195 Composite Service Structure: Hierarchical Pattern 196 Service Cluster: Distributed and Federated Pattern 200 Deliverables 203 Summary 204 CHAPTER 13 Service Contextual Categorization Patterns 205 Contextual Classification Model: Patterns for ServiceContextual Categorization 205 Establishing Leading Service Categories 207 Service Subcategories Establishment Process 211 Deliverables 219 Summary 219 PART FOUR Service-Oriented Contextual Analysis Process and Modeling Patterns 221 CHAPTER 14 Contextual Generalization Analysis Process and Modeling Patterns 225 Contextual Generalization Process 225 Contextual Generalization Patterns 232 Contextual Generalization Anti-Patterns 240 Deliverables 243 Summary 243 CHAPTER 15 Contextual Specification Analysis Process and Modeling Patterns 245 Contextual Specification Process 245 Contextual Specification Patterns 250 Service Specification Anti-Patterns 258 Deliverables 261 Summary 261 CHAPTER 16 Contextual Expansion Analysis Process and Modeling Patterns 263 Contextual Expansion Process 264 Contextual Expansion Levels: Organizational Zones for Distribution of Services 265 Contextual Expansion Patterns 270 Service Contextual Expansion Anti-Patterns 278 Deliverables 281 Summary 281 CHAPTER 17 Contextual Contraction Analysis Process and Modeling Patterns 283 Accommodating Demand for Contextual Contraction 283 Service Contextual Contraction Benefits 284 Service Contextual Contraction Example 285 Contextual Contraction Process 286 Contextual Contraction Patterns 290 Contextual Contraction Anti-Patterns 299 Deliverables 301 Summary 301 PART FIVE Service-Oriented Structural Analysis Process and Modeling Patterns 303 CHAPTER 18 Structural Analysis and Modeling Principles: Introduction to Service Structural Notation and Modeling 305 Structural Analysis Modeling Principles 305 Structural Modeling Notation Introduction 306 Aggregation 310 Decomposition 311 Subtraction 312 Coupling and Decoupling 313 Compounding 315 Unification 316 Transformation 318 Intersection 319 Exclusion 321 Clipping 323 Binding and Unbinding 324 Cloning and Decloning 326 Deliverables 328 Summary 329 CHAPTER 19 Structural Generalization Analysis Process and Modeling Patterns 331 Aggregation Analysis: Patterns and Implementation 332 Unification Analysis: Patterns and Implementation 339 Structural Compounding Analysis: Patterns and Implementation 345 Contract Analysis: Patterns and Implementation 351 Deliverables 357 Summary 357 CHAPTER 20 Structural Specification Analysis Process and Modeling Patterns 359 Decomposition Analysis: Patterns and Implementation 359 Subtraction Analysis: Patterns and Implementation 368 Refactoring Analysis: Patterns and Implementation 375 Contract Analysis: Patterns and Implementation 382 Deliverables 388 Summary 388 CHAPTER 21 Structural Expansion Analysis Process and Modeling Patterns 389 Distribution Analysis: Patterns and Implementation 390 Mediation Analysis: Patterns and Implementation 405 Contract Analysis: Patterns and Implementation 414 Deliverables 420 Summary 420 CHAPTER 22 Structural Contraction Analysis Process and Modeling Patterns 423 Distribution Reduction Analysis: Patterns and Implementation 424 Mediation Rollback Analysis: Patterns and Implementation 435 Contract Analysis: Patterns and Implementation 444 Deliverables 450 Summary 450 Index 451
£37.50
John Wiley & Sons Inc Changing Software Development
Book SynopsisChanging Software Development explains why software development is an exercise in change management and organizational intelligence. An underlying belief is that change is learning and learning creates knowledge. By blending the theory of knowledge management, developers and managers will gain the tools to enhance learning and change to accommodate new innovative approaches such as agile and lean computing. Changing Software Development is peppered with practical advice and case studies to explain how and why knowledge, learning and change are important in the development process. Today, managers are pre-occupied with knowledge management, organization learning and change management; while software developers are often ignorant of the bigger issues embedded in their work. This innovative book bridges this divide by linking the software world of technology and processes to the business world of knowledge, learning and change.Table of ContentsPreface. Acknowledgements. 1 Introduction. 1.1 Why read this book? 1.2 Who are software developers? 1.3 Software developers are knowledge workers. 1.4 Drucker’s challenge. 1.5 Prototype of future knowledge workers. 1.6 Software: embedded knowledge. 1.7 Authority and leadership. 1.8 Practical theory. 1.9 Begin with yourself. 1.10 Book organisation. 2 Understanding Agile. 2.1 Roots of Agile thinking. 2.2 Positioning Agile. 2.3 Common practices of Agile teams. 2.4 Applicability outside of software development. 2.5 Conclusion. 3 Knowledge. 3.1 The difference between Knowledge and Information. 3.2 Knowledge into action. 3.3 Explicit and Tacit knowledge. 3.4 Sticky knowledge. 3.5 Problems with knowledge. 3.6 Where is knowledge in software development? 3.7 Knowledge creations. 3.8 Conclusion. 4 Learning. 4.1 Three knowledge domains. 4.2 Developing software is learning. 4.3 Learning benefits your business. 4.4 Learning theories. 4.5 Learning, change, innovation, problem solving. 4.6 The role of leaders. 4.7 Seed learning. 4.8 Conclusion. 5 The learning organisation. 5.1 Defining the learning organisation. 5.2 The infinite and the finite game. 5.3 Layers of the organisations. 5.4 Learning in practice: Senge’s view. 5.5 Blocks to learning. 5.6 Conclusion. 6 Information Technology – the bringer of change. 6.1 Change. 6.2 Benefits of technology change. 6.3 Change is what IT people do to other people. 6.4 Software projects fail: why are we surprised? 6.5 Change starts with business requirements. 6.6 Conclusion. 7 Understanding change. 7.1 Defining change. 7.2 Change spectrum. 7.3 Radical change. 7.4 Routine change in software development. 7.5 Continuous improvement. 7.6 Charting a course. 7.7 Internal and External forces for change. 7.8 Conclusion. 8 Change models. 8.1 Learning and Change. 8.2 Lewin’s change theory. 8.3 Satir’s theory of change. 8.4 Kotter. 8.5 Theory E and Theory O of change. 8.6 Appreciative inquiry. 8.7 Models, models, models. 8.8 Motivating change. 8.9 When not to change. 8.10 Conclusion. 9 Making change happen. 9.1 Build a case for change. 9.2 Slack in action: make time and space for learning and change. 9.3 Leading the change. 9.4 Create feedback loops. 9.5 Remove barriers. 9.6 Conclusion. 10. Individuals and empowerment. 10.1 Involve people. 10.2 Coaching. 10.3 Empowerment. 10.4 That difficult individual. 10.5 Developing the next leaders. 10.6 Time to go. 10.7 Conclusion. 11. Rehearsing tomorrow. 11.1 Future memories. 11.2 Planning. 11.3 Change events. 11.4 Outsiders. 11.5 Conclusion. 12 New beginnings. 12.1 The change problem. 12.2 Bottom-up over top-down. 12.3 Begin with yourself. 12.4 Making learning happen. 12.5 Create a vision, draw up a plan. 12.6 Three interlocking ideas. 12.7 Change never ends. 12.8 Conclusion. Further reading. Agile and Lean software development. Business. Knowledge. Learning and Change. Futher Reading. References. Index.
£23.99
John Wiley & Sons Inc Executives Guide to Cloud Computing
Book SynopsisYour organization can save and thrive in the cloud with this first non-technical guide to cloud computing for business leaders In less than a decade Google, Amazon, and Salesforce.com went from unknown ideas to powerhouse fixtures in the economic landscape; in even less time offerings such as Linkedin, Youtube, Facebook, Twitter and many others also carved out important roles; in less than five years Apple''s iTunes became the largest music retailer in North America. They all share one key strategic decision each of these organizations chose to harness the power of cloud computing to power their drives to dominance. With roots in supercomputing and many other technical disciplines, cloud computing is ushering in an entirely new economic reality technology-enabled enterprises built on low cost, flexible, and limitless technical infrastructures. The Executive''s Guide to Cloud Computing reveals how you can apply the power of cloud computing throughout yoTrade Review“A very timely and invaluable resource for CIOs, CTOs, and Enterprise Architects ... extremely relevant information that will serve readers well now and far into the future.” —Bob Flores, President & CEO Applicology Inc., Former CTO of the Central Intelligence Agency “The authors have done a great job in explaining the cloud concepts. They give historical and technical background to show that cloud computing is really an evolution of numerous technologies and business strategies. It is the combination of these that enables cloud and these new business strategies to happen. This makes the fuzziness of the concept come into focus. The “technical” chapters show the CIO and Technical Architect a model for building your own strategy within the business and a path from concept to deployment with governance and business models thrown in. Darn, I keep hoping for ‘the answer’. Now my questions can dig into the real value for our enterprise and a strategy for moving forward. Great book!!!” —Dave Ploch, CIO, Novus International “‘Executive’s Guide’ is not a code-phrase for an introductory text, but a comprehensive guide for the CIO, IT decision-maker, or project leader. The authors, two entrepreneurs and pioneers in the field, speak from substantial real-world project experience. They introduce the topic and related technologies, highlight cloud drivers and strategy, address relationships to existing initiatives such as Service-Oriented Architectures, detail project phases in the implementation of and evolution to cloud-based enterprise architectures, and offer many reasoned insights along the way.” —Joe Weinman, Strategy and Business Development, AT&T Business Solutions “Executive’s Guide to Cloud Computing is a crystal ball into the future of business. Not a technical treatise but an insightful explanation of how cloud computing can quickly deliver real business value. This book is an instruction manual on how to win business in this ‘born on the web’ world.” —Kevin L. Jackson, Vice President, Dataline LLC and author of Cloud Musings, http://kevinljackson.blogspot.comTable of ContentsPreface xi CHAPTER 1 THE SOUND OF INEVITABILITY 1 A Persistent Vision 5 A Little History 6 Three Ages of Computing 6 Broad Enablers 15 Big Contributions 20 Limitations 21 I Want One of Those 22 Back to the Future? 22 Notes 23 CHAPTER 2 CONCEPTS, TERMINOLOGY,AND STANDARDS 25 Basic Concepts: The Big Stuff 27 Major Layers 34 Where They Live (Deployment Models) 36 Geographic Location 39 Datacenter Innovation 39 The Quest for Green 40 Standards 41 Much Sound and Fury . . . 42 Parting Thoughts 42 Notes 43 CHAPTER 3 CLOUD COMPUTING AND EVERYTHING ELSE 45 The Neighborhood 45 Parting Thoughts 66 Notes 67 CHAPTER 4 STRATEGIC IMPLICATIONS OF CLOUD COMPUTING 69 A Survey of Cloud Implications 70 Business Benefits of Cloud Computing 78 Cloud-Based Business Models 82 Cloud-Enabled Business Models 83 Strategic Implications of Cloud Computing 86 Evolving from SOA into the Cloud 91 When to Do SOA versus Cloud? 98 Cloud Computing Adoption Obstacles 107 Parting Thoughts: Things to Do Tomorrow 109 Notes 110 CHAPTER 5 CLOUD ADOPTION LIFECYCLE 111 Cloud Adoption Lifecycle and Cloud Modeling Framework: Two Necessary Tools for Cloud Success 112 Cloud Adoption Lifecycle 114 Cloud Adoption Lifecycle Summary 144 Parting Thoughts 145 CHAPTER 6 CLOUD ARCHITECTURE, MODELING, AND DESIGN 147 Cloud Adoption Lifecycle Model: Role of Cloud Modeling and Architecture 147 Cloud Industry Standards 149 Standards Monitoring Framework 154 A Cloud Computing Reference Model 155 Exploring the Cloud Computing Logical Architecture 157 Developing a Holistic Cloud Computing Reference Model 162 Cloud Deployment Model 170 Cloud Governance and Operations Model 174 Cloud Ecosystem Model (Supporting the Cloud Reference Model) 179 Consumption of Cloud-Enabled and Cloud Enablement Resources 184 Cloud Computing Reference Model Summary 187 Cloud Computing Technical Reference Architecture 188 Parting Thoughts 192 Notes 193 CHAPTER 7 WHERE TO BEGIN WITH CLOUD COMPUTING 195 Cloud Adoption Lifecycle 195 Where to Begin with Cloud: Using the Cloud Adoption Lifecycle 199 Where to Begin with Cloud: Deployment Model Scenarios 200 Cloud Business Adoption Patterns 204 Where to Begin with Cloud: Consumers and Internal Cloud Providers 209 Cloud Patterns Mapped to Common Cloud Use Cases 213 Parting Thoughts 224 CHAPTER 8 ALL THINGS DATA 227 The Status Quo 228 Cracks in the Monolith 230 Cloud Scale 232 The Core Issues 234 Lessons Learned 237 Solutions and Technologies: A Few Examples 239 A Look Below: Need for Combined Computation/Storage 242 Parting Thoughts 243 Notes 243 CHAPTER 9 WHY INEVITABILITY IS INEVITABLE 245 Driving Scale 27 Objections and Concerns 248 Overwhelming Rationality 253 A Natural Evolution 257 Parting Thoughts 259 Notes 260 Appendix The Cloud Computing Vendor Landscape 263 Infrastructure as a Service (IaaS) 264 Platforms as a Service (PaaS) 264 Software as a Service (SaaS) 265 Systems Integrators 265 Analysts and Services Providers 266 Parting Thoughts 266 Note 266 About the Authors 267 Index 269
£28.49
John Wiley & Sons Inc Making a World of Difference
Book SynopsisExplores the social aspects of computerisation, using a range of case studies, analysed from a variety of conceptual viewpoints. This book is structured to be of use for academics and business audience - Part 1 is holistic and reflexive, while Parts 2 and 3 are written for the busy manager who can consider the key issues independently.Trade Review" ... an extremely stimulating, thoughtful, and engaging contribution ..." (Scandinavian Journal of Management, Vol.18 2002) "…considerable strength…main value if the book lies in the numerous and wide-ranging case studies…" (Organization Studies, Vol.24, No.2.) "…a rich source of inspiration for further studies…" (Knowledge Management, July 2003)Table of ContentsSeries Preface. Preface. IT IN SOCIETY. Introduction. Contemporary Society. Computers at Work. CHANGING WAYS OF WORKING. Shifting Identity. Teaming Up. Reorganizing the Enterprise. Trust in Networks. DIFFERENT WORLDS. Culture as Context. Working Across Cultures. CONCLUSIONS. Designing for Diversity. References. Author Index. Subject Index.
£60.26
John Wiley & Sons Inc Information Technology and Organizational
Book SynopsisOrganizations should look different in the next century as a direct result of the ability to process information. This book argues for a holistic approach to organizations and the integration of IT considerations into this treatment.Table of ContentsInformation Technology and Organizational Transformation: The Holy Grail of IT? (B. Galliers & W. Baets). STARTING AFRESH. Linking Strategy and IT-based Innovation: The Importance of the "Management of Expertise" (H. Scarbrough). Computer Supported Collaborative Working: Challenging Perspectives on Work and Technology (L. Bannon). The Metamorphosis of Oticon (N. Bjoørn-Andersen & J. Turner). IT AND THE LEARNING ORGANIZATION. Organizational Learning and Core Capabilities Development: The Role of IT (R. Andreu & Claudio Ciborra). The Corporate Mind Set as a Precursor for Business Process Change: About Knowledge, Perceptions and Learning (W. Baets). The Role of Learning in Information Systems Planning and Implementation (T. Reponen). INNOVATION, NETWORKS AND CORPORATE IDENTITY. Innovations as Precursors of Organizational Performance (J. Pennings). EDI, Organizational Change and Flexibility Strategies (R. O'Callaghan). An IT Architecture to Support Organizational Transformation (W. Baets & V. Venugopal). IT AND ORGANIZATIONAL CHANGE. Reflections of BPR, IT and Organizational Change (B. Galliers). The Role of IT in Organizational Transformation (J. Turner). LUCIA Accelerates Service Delivery: A Case Study of Business Process Re-engineering (P. Meester & J. Post). AFTERWORD. Success and Failure in Corporate Transformation Initiatives (A. Pettigrew). Postscript (B. Galliers & W. Baets). Index.
£60.26
John Wiley & Sons Inc Digital Nomad
Book SynopsisDigital Nomad tells us how current and future technological possibilities, combined with our natural urge to travel, will once again allow mankind to live, work, and exist on the move. This is what just some of the world s major company leaders and thinkers are saying about Digital Nomad.Table of ContentsThe Nomadic Opportunity. The Trigger. The Nomadic Urge. The Incredible Shrinking Transistor. The Communications Revolution. The Mighty Micro. The Tools of Nomadism. Merger Frenzy. Nomadic World. Silicon Senses. Index.
£44.10
John Wiley & Sons Inc Information Tectonics Space Place and Technology
Book SynopsisThis text maps out new networks of information and power, and presents an overview of one of the strongest growing areas in geography, namely technology. It is covered in three parts: conceptualizing electronic space; global electronic commerce; and urban, regional and national development.Table of ContentsSpace, Place and Technology in an Electronic Age (M. Wilson & K. Corey). CONCEPTUALIZING ELECTRONIC SPACE. The End of Geography or the Explosion of Place? Conceptualizing Space, Place and Information Technology (S. Graham). Telecom Tectonics and the Meaning of Electronic Space (M. Wilson & C. Arrowsmith). Human Rights and Welfare in the Electronic State (S. Brunn). GLOBAL ELECTRONIC COMMERCE. Telecommunications and Governance in Multinational Enterprises (E. Roche & M. Blaine). Telecommunications and 24-Hour Trading in the International Securities Industry (J. Langdale). Japanese Information Services in the Late Twentieth Century (B. Warf). URBAN, REGIONAL AND NATIONAL DEVELOPMENT. Cyberstructure and Social Forces - The Japanese Experience (T. Morris-Suzuki & P. Rimmer). Electronic Space - Creating Cyber Communities in Southeast Asia (K. Corey). Neighbours - Australian and Indonesian Telecommunications Connections (P. Rimmer). The Economic Development of Peripheral Rural Areas in the Information Age (R. Richardson & A. Gillespie). Telematics, Geography, and Economic Development - Can Local Initiatives Provide a Strategic Response? (D. Gibbs, et al). References and Bibliography. List of Contributors. Index.
£172.76
The University of Michigan Press The Hyperlinked Society
Book SynopsisExplores the nature of hyperlinks and their consequences for commerce, communication, and civic discourse in the world of digital media. This book focuses on ""links"" as one of the most basic features of online life. It addresses questions about the ways in which hyperlinks organize behavior online.
£30.43
The University of Michigan Press Big Digital Humanities
Book SynopsisThis collection has its origins in a series of seminal articles Patrik Svensson published in the Digital Humanities Quarterly. Svensson’s articles were informative and knowledgeable and tended to foreground reportage and explanation rather than utopianism or territorial contentiousness. In revising his original work, he has responded to both subsequent feedback and new developments.Trade Review“Big Digital Humanities proposes a comprehensive model of digital humanities that will propel the field forward.”—Tanya Clement, University of Texas–Austin“Drawing on his decade-long experience directing HUMlab at Umeå and the lessons learned through digital humanities projects, infrastructure-building, and interactions with the global DH community, Svensson’s Big Digital Humanities will have a critically important place in the scholarly conversations about what DH is and what it might become.”—Todd Presner, University of California–Los Angeles
£52.95
University of California Press Chokepoints
Book SynopsisIn January 2012, millions participated in the now-infamous Internet blackout against the Stop Online Piracy Act. This book details the emergence of a global regime in which large Internet firms act as regulators for powerful intellectual property owners, challenging fundamental notions of democratic accountability.Trade Review"A timely, necessary intervention. ... Chokepoints offers a compelling interrogation into regulatory systems that intersect with issues of state and private surveillance and the digital rights of users online." * Surveillance and Society *Table of ContentsList of Tables Preface Acknowledgments Abbreviations 1. Secret Handshake Deals 2. Internet Firms Become Global Regulators 3. Revenue Chokepoints 4. Access Chokepoints 5. Marketplace Chokepoints 6. Changing the Enforcement Paradigm 7. A Future for Digital Rights Notes References Index
£72.00
University of California Press Chokepoints
Book SynopsisIn January 2012, millions participated in the now-infamous Internet blackout against the Stop Online Piracy. Drawing on extensive interviews, the author details the emergence of a global regime in which large Internet firms act as regulators for powerful intellectual property owners, challenging fundamental notions of democratic accountability.Trade Review"A timely, necessary intervention. ... Chokepoints offers a compelling interrogation into regulatory systems that intersect with issues of state and private surveillance and the digital rights of users online." * Surveillance and Society *Table of ContentsList of Tables Preface Acknowledgments Abbreviations 1. Secret Handshake Deals 2. Internet Firms Become Global Regulators 3. Revenue Chokepoints 4. Access Chokepoints 5. Marketplace Chokepoints 6. Changing the Enforcement Paradigm 7. A Future for Digital Rights Notes References Index
£21.25
University of California Press Uberland
Book SynopsisTrade Review“A timely, accessible analysis of a Silicon Valley innovator that disrupted an industry.” * GeekWire *“This jargon-free and intriguing exposé offers food for thought for anyone interested in worker protections or societal changes driven by technology.” * Publishers Weekly *"Functions as an examination of both how Uber’s algorithms are changing the way companies operate and exert control over their workers and how those workers are experiencing these changes.” * Slate *"A timely look at the tensions between technology and the future of employment, and how ambitious startups might be changing the way we see and value work.” * Mother Jones *“If you care about the future of work, read Uberland by Alex Rosenblat.” -- Theodore Kinni, Strategy + Business“Rosenblat’s book is a combination of sociological analysis, excerpts from Uber-driver online forums, communications with Uber executives and employees, and an avalanche of in-person interviews with drivers from all over the United States and Canada. Her analysis isn’t a polemic; it is balanced and measured.” * Los Angeles Review of Books *“A fine work of technology ethnography. . . As someone who believes that technology is a positive force for driving change, I’ll admit to being deeply disturbed by reading Uberland." * Inside Higher Education *"The most important recent book written about Uber is undoubtedly Alex Rosenblat’s Uberland: How Algorithms Are Rewriting the Rules of Work, which unflinchingly exposes how Uber takes ruthless advantage of its drivers.” * Medium/The Startup *"Uberland will be of interest for anyone who cares about the future of work, the realities of working in the ‘gig’ economy and the consequences of decoupling work from existing employment relations systems." * Journal of Industrial Relations *"The book paints a complicated picture of the uneven realities of the gig economy set against the glossy sales pitch of Uber as the future of work." * Allegra Lab *"Uberland is a timely book as technology increasingly intensifies in our daily lives. It reads like book‐length investigative journalism, refreshingly jargon‐free. It stays truthful to the stories that drivers tell and is readable and engaging. It is suitable for undergraduate classes in sociology of work; science, technology, and society; and consumption." * Sociological Forum *Table of ContentsIntroduction: Using an App to Go to Work—Uber as a Symbol of the New Economy 1. Driving as Glamorous Labor: How Uber Uses the Myths of the Sharing Economy 2. Motivations to Drive: How Uber’s System Rewards Full-Time and Recreational Drivers Differently 3. The Technology Pitch: How Uber Creates Entrepreneurship for the Masses 4. The Shady Middleman: How Uber Manages Money 5. Behind the Curtain: How Uber Manages Drivers with Algorithms 6. In the Big Leagues: How Uber Plays Ball Conclusion: The New Age of Uber—How Technology Consumption Rewrote the Rules of Work Appendix 1. Methodology: How I Studied Uber Appendix 2. Ridehailing beyond Uber: Meet Lyft, the Younger Twin Notes Index
£20.70
University of California Press Uberland
Book SynopsisTrade Review“A timely, accessible analysis of a Silicon Valley innovator that disrupted an industry.” * GeekWire *“This jargon-free and intriguing exposé offers food for thought for anyone interested in worker protections or societal changes driven by technology.” * Publishers Weekly *"Functions as an examination of both how Uber’s algorithms are changing the way companies operate and exert control over their workers and how those workers are experiencing these changes.” * Slate *"A timely look at the tensions between technology and the future of employment, and how ambitious startups might be changing the way we see and value work.” * Mother Jones *“If you care about the future of work, read Uberland by Alex Rosenblat.” -- Theodore Kinni, Strategy + Business“Rosenblat’s book is a combination of sociological analysis, excerpts from Uber-driver online forums, communications with Uber executives and employees, and an avalanche of in-person interviews with drivers from all over the United States and Canada. Her analysis isn’t a polemic; it is balanced and measured.” * Los Angeles Review of Books *“A fine work of technology ethnography. . . As someone who believes that technology is a positive force for driving change, I’ll admit to being deeply disturbed by reading Uberland." * Inside Higher Education *"The most important recent book written about Uber is undoubtedly Alex Rosenblat’s Uberland: How Algorithms Are Rewriting the Rules of Work, which unflinchingly exposes how Uber takes ruthless advantage of its drivers.” * Medium/The Startup *"Uberland will be of interest for anyone who cares about the future of work, the realities of working in the ‘gig’ economy and the consequences of decoupling work from existing employment relations systems." * Journal of Industrial Relations *"The book paints a complicated picture of the uneven realities of the gig economy set against the glossy sales pitch of Uber as the future of work." * Allegra Lab *"Uberland is a timely book as technology increasingly intensifies in our daily lives. It reads like book‐length investigative journalism, refreshingly jargon‐free. It stays truthful to the stories that drivers tell and is readable and engaging. It is suitable for undergraduate classes in sociology of work; science, technology, and society; and consumption." * Sociological Forum *Table of ContentsIntroduction: Using an App to Go to Work—Uber as a Symbol of the New Economy 1. Driving as Glamorous Labor: How Uber Uses the Myths of the Sharing Economy 2. Motivations to Drive: How Uber’s System Rewards Full-Time and Recreational Drivers Differently 3. The Technology Pitch: How Uber Creates Entrepreneurship for the Masses 4. The Shady Middleman: How Uber Manages Money 5. Behind the Curtain: How Uber Manages Drivers with Algorithms 6. In the Big Leagues: How Uber Plays Ball Conclusion: The New Age of Uber—How Technology Consumption Rewrote the Rules of Work Appendix 1. Methodology: How I Studied Uber Appendix 2. Ridehailing beyond Uber: Meet Lyft, the Younger Twin Notes Index
£15.29
O'Reilly Media Database Nation
Book SynopsisThis journalistic summary of the current state of privacy rights and violations at the beginning of the 21st century is a call to arms, pleading the case for privacy in the same way as Rachel Carson's 1962 text "Silent Spring".Table of Contents1 Privacy Under Attack 2 Database Nation 3 Absolute Identification 4 What Did You Do Today? 5 The View from Above 6 To Know Your Future 7 Buy Now! 8 Who Owns Your Information? 9 Kooks and Terrorists 10 Excuse Me, but Are You Human? 11 Privacy Now! Annotated Bibliography and Notes Acknowledgments
£12.15
O'Reilly Media Beautiful Security
Book SynopsisAn anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations regarding security; security as a design requirement; evolution and new projects in Web of Trust; and, legal sanctions to enforce security precautions.
£23.99
John Wiley and Sons Ltd The Informational City
Book SynopsisThe cities and the regions of the world are being transformed under the combined impact of a restructuring of the capitalist system and a technological revolution. This is the thesis of this book, now in paperback. Castells not only brings together an impressive array of evidence to support it but puts forward a new body of theory to explain it.Trade Review"The Informational City is a major achievement, a real tour-de-force. Although many other social scientists have been groping their way towards an understanding of the new economy and society, Castells has leap-frogged them all to produce the definitive analysis that will surely stand for years to come." Peter Hall, Times Higher Education Supplement "Castells provides a careful and closely-argued exposition. This is the book to read to find out ... how the space economy of the United States is being reshaped. Castells describes in compelling detail a burgeoning sphere of communication flows which is transforming organisations, work, and individual lives." Nigel Thrift, New Statesman and Society "The Informational City is one of [Castells] most important works. In it he presents an impressive synthesis drawing on the results of a large number of research studies ... Castells has managed simultaneously to provide the best available summary of the best studies on the new regional industrial structure of the USA, and a set of thought-provoking essays about the deep structure of the information technology revolution and neo-conservative economic policies. The book will be of use to teachers and researchers alike." Ian Miles, University of Sussex "This book is provocative and relatively easy to read. The author presents a convincing case for the dawn of an informational age that promises to complicate capitalist social organization." Growth and ChangeTable of ContentsAcknowledgements. Introduction. 1. The Informational Mode of Development and the Restructuring of Capitalism. 2. The New Industrial Space. The Locational Pattern of Information Technology Manufacturing and its effects of Spacial Dynamics. 3. The Space Flows. The Use of New Technologies in the Information Economy and the Dialectics between Centralization and Decentralization of Services. 4. Information Technology, The Restructuring of Capital-Labour Relationships, and the Rise of the Dual City. 5. High Technology and the Transition from the Urban Welfare State to the Suburban Warfare State. 6. The Internationalization of the Economy, New Technologies, and the Variable Geometry of Spatial Structure. Conclusion. Appendix to Chapter 2. Index.
£36.86
John Wiley and Sons Ltd The Simulation of Human Intelligence
Book SynopsisThe contributions to this volume examine the implications of recent advances in artificial intelligence and ask whether machines with artificial intelligence can develop artifical minds.Table of ContentsAcknowledgements List of Contributors Introduction (Donald Broadbent, University of Oxford) 1. Setting the Scene: the Claim and the Issues (Roger Penrose, University of Oxford) 2. The Approach Through Symbols (Allen Newell, Carnegie Mellon University; Richard Young, MRC Applied Psychology Unit, Cambridge; Thad Polk, Carnegie Mellon University) 3. Sub-Symbolic Modeling of Hand-Eye Coordination (Dana H Ballard, University of Oxford) 4. Networks in the Brain (Edmund Rolls, University of Oxford) 5. Computational Vision (Mike Brady, University of Oxford) 6. The Handling of Natural Language (Gerald Gazdar, University of Sussex) 7. The Impact on Philosophy (Margaret A Boden, University of Sussex).
£31.46
John Wiley and Sons Ltd Reading Digital Culture
Book SynopsisThis text addresses the changes brought about by the growth of digital communication technologies and the way we think about them. The volume addresses topics ranging from virtual reality, internet commerce, and computer art, to the effects of new technology on work, leisure, and community.Trade Review"Reading Digital Culture reminds its readers that technology cannot be analyzed outside of the realms of power, politics, the social, and democracy. This is a breakthrough book for anyone who wants to understand and critically engage, rather than merely praise, those pedagogical, technological, and communicative forces that are shaping the twenty-first century. A must read." Henry Giroux, Pennsylvania State University. "This is an absorbing and fascinating anthology that is sure to become a classic. It should be required reading for anyone hopeful of understanding, at a deep and profound level, the essences of contemporary digital thought from its leading thinkers. This compilation provokes fresh insights that make it a major contribution to the field." Lynn Hershman, University of California, Davis. "Anyone teaching classes in subjects that intersect with digital culture will be grateful to Trend for this compilation. It contains many classic texts essential for those pursuing digital art production or critique of our technological world. Reading these texts will help raise awareness that creative work with digital media generates many issues and responsibilities." Victoria Vesna, University of California, Los Angeles. "This collection of some 35 essays and excerpts, edited by David Trend, comprises significant writings on digital culture. The material is an important resource for cultural studies. Trend's selection and structuring along with his introductory notes for each section make this a valuable and unique assemblage." Times Higher Education SupplementTable of ContentsIntroduction. Part I: The Machine in the Garden. 1. As We May Think. (Vannevar Bush). 2. Ada. (Sadie Plant). 3. From Virtual Reality to the Virtualization of Reality. (Slavotj Zizek). 4. Speed and Information: cyberspace Alarm! (Paul Virilio). 5. A Manifesto for Cyborgs. (Donna Haraway). 6. Machinic Heterogenesis. (Felix Guattari). Part II: Knowledge and Communication in a Digital Age. 7. Johnny Mnemonic. (William Gibson). 8. The Erotic Ontology of Cyberspace. (Michael Heim). 9. Virtually Female: Body and Code. (Margaret Morse). 10. Hypertext and Critical Theory. (George Landdow). 11. Computers as Theatre. (Brenda Laurel). 12. The Information War. (Hakim Bey). Part III: Living in the Immaterial World. 13. Dilemmas of Transformation in the Age of the Smart Machine. (Shoshana Zuboff). 14. Technology and the Future of Work. (Stanley Aronowitz). 15. The Theory of the Virtual Class. (Arthur Kroker and Michael A. Weinsteing). 16. The Informational Economy. (Manuel Castells). 17. The Global Information Highway: Project for an Ungovernable World. (Herbert Schiller). 18. The Coming Age of the Flesh Machine. Critical Art Ensemble. Part IV: Performing Identity in Cyberspace. 19. Will the Real Body Please Stand Up? Boundary Stories about Virtual Encounters. (Allucquere Rosanne (Sandy) Stone). 20. A Rape in Cyberspace; or, How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database into a Society. (Julian Dibbell). 21. Women & Children First: Gender and the Settling of the Electronic Frontier. (Laura Miller). 22. We're Teen, We're Queer and We've Got E-mail. (Steve Silberman). 23. Race In/ For Cyberspace: Identity Tourism and Racial Passing on the Internet. (Lisa Nakamura). 24. Who Am We? (Sherry Turkle). Part V: Searching for Community Online. 25. Collective Intelligence. (Pierre Levy). 26. Cyber Democracy: The Internet and the Public Sphere. (Mark Poster). 27. The Virtual Community. (Howard Rheingold). 28. The Virtual Barrio @ the Other Frontier. (Guillermo Gomez-Pena). 29. A Disappearance of Community. (Avital Ronell). Part VI: Reading Digital Culture. 30. History, Theory and Virtual Reality. (Robert Markley). 31. The Seductions of Cyberspace. (N. Katherine Hayles). 32. New Age Mutant Ninja Hackers: Reading MONDO 2000. (Vivian Sobchack). 33. Virtual Skin: Articulating Race in Cyberspace. (Cameron Bailey). 34. Towards a New Media Aesthetic. (Timothy Allen Jackson). 35. The New Smartness. (Andrew Ross). Index.
£107.06
John Wiley and Sons Ltd Reading Digital Culture
Book SynopsisThis text addresses the changes brought about by the growth of digital communication technologies and the way we think about them. The volume addresses topics ranging from virtual reality, internet commerce, and computer art, to the effects of new technology on work, leisure, and community.Trade Review"Reading Digital Culture reminds its readers that technology cannot be analyzed outside of the realms of power, politics, the social, and democracy. This is a breakthrough book for anyone who wants to understand and critically engage, rather than merely praise, those pedagogical, technological, and communicative forces that are shaping the twenty-first century. A must read." Henry Giroux, Pennsylvania State University. "This is an absorbing and fascinating anthology that is sure to become a classic. It should be required reading for anyone hopeful of understanding, at a deep and profound level, the essences of contemporary digital thought from its leading thinkers. This compilation provokes fresh insights that make it a major contribution to the field." Lynn Hershman, University of California, Davis. "Anyone teaching classes in subjects that intersect with digital culture will be grateful to Trend for this compilation. It contains many classic texts essential for those pursuing digital art production or critique of our technological world. Reading these texts will help raise awareness that creative work with digital media generates many issues and responsibilities." Victoria Vesna, University of California, Los Angeles. "This collection of some 35 essays and excerpts, edited by David Trend, comprises significant writings on digital culture. The material is an important resource for cultural studies. Trend's selection and structuring along with his introductory notes for each section make this a valuable and unique assemblage." Times Higher Education SupplementTable of ContentsIntroduction. Part I: The Machine in the Garden. 1. As We May Think. (Vannevar Bush). 2. Ada. (Sadie Plant). 3. From Virtual Reality to the Virtualization of Reality. (Slavotj Zizek). 4. Speed and Information: cyberspace Alarm! (Paul Virilio). 5. A Manifesto for Cyborgs. (Donna Haraway). 6. Machinic Heterogenesis. (Felix Guattari). Part II: Knowledge and Communication in a Digital Age. 7. Johnny Mnemonic. (William Gibson). 8. The Erotic Ontology of Cyberspace. (Michael Heim). 9. Virtually Female: Body and Code. (Margaret Morse). 10. Hypertext and Critical Theory. (George Landdow). 11. Computers as Theatre. (Brenda Laurel). 12. The Information War. (Hakim Bey). Part III: Living in the Immaterial World. 13. Dilemmas of Transformation in the Age of the Smart Machine. (Shoshana Zuboff). 14. Technology and the Future of Work. (Stanley Aronowitz). 15. The Theory of the Virtual Class. (Arthur Kroker and Michael A. Weinsteing). 16. The Informational Economy. (Manuel Castells). 17. The Global Information Highway: Project for an Ungovernable World. (Herbert Schiller). 18. The Coming Age of the Flesh Machine. Critical Art Ensemble. Part IV: Performing Identity in Cyberspace. 19. Will the Real Body Please Stand Up? Boundary Stories about Virtual Encounters. (Allucquere Rosanne (Sandy) Stone). 20. A Rape in Cyberspace; or, How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database into a Society. (Julian Dibbell). 21. Women & Children First: Gender and the Settling of the Electronic Frontier. (Laura Miller). 22. We're Teen, We're Queer and We've Got E-mail. (Steve Silberman). 23. Race In/ For Cyberspace: Identity Tourism and Racial Passing on the Internet. (Lisa Nakamura). 24. Who Am We? (Sherry Turkle). Part V: Searching for Community Online. 25. Collective Intelligence. (Pierre Levy). 26. Cyber Democracy: The Internet and the Public Sphere. (Mark Poster). 27. The Virtual Community. (Howard Rheingold). 28. The Virtual Barrio @ the Other Frontier. (Guillermo Gomez-Pena). 29. A Disappearance of Community. (Avital Ronell). Part VI: Reading Digital Culture. 30. History, Theory and Virtual Reality. (Robert Markley). 31. The Seductions of Cyberspace. (N. Katherine Hayles). 32. New Age Mutant Ninja Hackers: Reading MONDO 2000. (Vivian Sobchack). 33. Virtual Skin: Articulating Race in Cyberspace. (Cameron Bailey). 34. Towards a New Media Aesthetic. (Timothy Allen Jackson). 35. The New Smartness. (Andrew Ross). Index.
£42.26
John Wiley and Sons Ltd Bridging the Digital Divide
Book SynopsisBridging the Digital Divide investigates problems of unequal access to information technology. The author redefines this problem, examines its severity, and lays out what the future implications might be if the digital divide continues to exist. Examines unequal access to information technology in the United States. Analyses the success or failure of policies designed to address the digital divide. Draws on extensive fieldwork in several US cities. Makes recommendations for future public policy. Series editor: Manuel Castells. Trade Review‘Bridging the Digital Divide makes it clear that the digital divide is only one symptom of persistent poverty -- a problem that touches us all. Fortunately, this is a case in which treating the symptom may help cure the disease. Servon’s book shows us that programs aimed at closing the divide are creating pathways out of poverty for many low-income technology users, who are acquiring career skills, educational advantages, and new knowledge that can lead to living-wage jobs’. Laura Breeden, Director, America Connects Consortium This book is very dry, but in a good way, laying out where exactly the digital divide falls and assessing how programs across the country have tried to answer the question: Why cant Johnny surf? A must-read for serious technology activists. City Limits This interesting and valuable addition to the literature on urban poverty and access to computers linked to the Internet is an empirical study that concludes with some sensible and thoughtful policy recommendations. Highly recommended. E. Lewis, New College of FloridaTable of ContentsSpecial Recognition. List of Figures. List of Tables. Acknowledgments. Foreword. Preface. 1. Redefining the Digital Divide. 2. The Dimensions of the Digital Divide. 3. The Role of CTCs within the Community Technology Movement: Marla K. Nelson, Rutgers University. 4. Support for Bridging the Gap. 5. Community Technology and Youth. 6. Training Disadvantaged Workers for IT Jobs. 7. The Organizational Divide: Josh Kirschenbaum and Radhika Kunamneni, PolicyLink. 8. Building the Bridge: Learning from Seattle. 9. Toward a New Agenda. Bibliography. Appendix 1: Research Strategy and Methodology. Appendix 2: Community Technology Survey. Appendix 3: Analysis of Survey Results. Appendix 4: World Wide Web References. Bibliography. Index.
£36.86
Harvard University Press PrivacyS Blueprint
Book SynopsisWoodrow Hartzog develops the underpinning of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. Rather than permit exploitation, it would demand encryption, prohibit malicious interfaces that deceive users and leave them vulnerable, and require safeguards against abuses of biometric surveillance.Trade Review[A] smart new book… [W]ill repay the attention of designers, privacy professionals, and anyone who wants to learn how design guided by strengthened laws and regulations might help us emerge from today’s swirl of privacy problems. -- James Barszcz * The Privacy Advisor (International Association of Privacy Professionals website) *Deceptive design nudges, tricks, and goads you into sharing more than you might intend to online, Hartzog argues in his new book… And when you think you’re in control of your own data, you rarely are. -- Ariel Bogle * ABC News (Australia) *Privacy’s Blueprint is a real tour de force, introducing a rigorous structure for multiple dimensions of privacy protections. -- Frank Pasquale, author of The Black Box Society: The Secret Algorithms That Control Money and InformationFilled with fascinating examples and written in a lively and accessible way, Privacy’s Blueprint is the definitive chronicle of Privacy by Design. This is one of the most important books about privacy in our times. -- Daniel J. Solove, author of Understanding PrivacyA bold and innovative privacy agenda and a beautifully written book. Hartzog demonstrates how and why privacy design is about power and politics. -- Paul M. Schwartz, author of Information Privacy LawWith deep insight, passion, and humor, Woodrow Hartzog demands that we see what has been in front us all along yet never meaningfully reckoned with. As Hartzog makes clear, we can design apps, social media, and networked clothing (underwear!) with privacy in mind but we need a plan and this book provides it in spades. This is a defining book for our information age and a must read. -- Danielle Keats Citron, author of Hate Crimes in Cyberspace
£28.86
Harvard University Press The End of Forgetting
Book SynopsisThanks to Facebook and Instagram, our younger selves have been captured and preserved online. But what happens, Kate Eichhorn asks, when we can't leave our most embarrassing moments behind? Rather than a childhood cut short by a loss of innocence, the real crisis of the digital age may be the specter of a childhood that can never be forgotten.Trade ReviewWell-written, well-researched, and insightful. The End of Forgetting will contribute to our growing discussion on the role and place of social media in everyday life, and the impact that new media practices have on our understanding of identity, childhood, and the process of becoming an adult. -- Mark Nunes, author of Cyberspaces of Everyday LifeAn elegantly written book on a timely and very important topic. Eichhorn blends stories, facts, and research to portray the role digital and social media play in young people’s self-conceptions, identity development, and public image, and reveals why it is important to protect young people’s ability to forget parts of the past. -- Simon Nørby, Aarhus UniversityA necessary, original, and unexpected perspective on the impact of digital technologies on children today. -- Marcus Boon, York UniversityGrowing up online, Eichhorn worries, might impede our ability to edit memories, cull what needs to be culled, and move on. * New Yorker *An important manual for anyone who regularly posts on social media. It outlines the dangers that platforms pose, makes a great case for more cautious posting, and advocates for increasing pressure on the tech companies that hold our data. -- Sarah Manavis * New Statesman *Eichhorn’s work needs to be included in public discourse about how we make meaning of self and others in digital spaces. We are still in the midst of making sense of the impact of social media on how we record our lives and, by so doing, how we unavoidably carry our digital history forward. The End of Forgetting reminds readers that sampling experiences and trying out different personalities, sometimes in error, is part of the human condition. The degree to which we should forgive others, or hold them responsible, remains a pressing but unacknowledged ethical concern. -- Linda Levitt * PopMatters *
£17.95
Harvard University Press Passwords Philology Security Authentication
Book SynopsisCryptology, the science of ciphers and codes, and philology, the study of languages, are typically understood as separate domains. But Brian Lennon contends that computing’s humanistic applications, no less than its technical ones, are marked by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.Trade ReviewPasswords is a fascinating book. What is especially impressive is the author’s deft and knowing engagements with both the long histories of computational text processing and the many discourses that make up literary philology. This is just the sort of work that the present mania for the digital demands, and yet books that actually live up to those demands are few and far between. Lennon is one of the few scholars who is even capable of managing that feat, and he does so here with style and erudition. -- David Golumbia, Virginia Commonwealth UniversityA stunning intervention, Passwords rivets our attention to the long history of our present fascination with the digital humanities. Through a series of close, contextual readings, from ninth-century Arabic philology and medieval European debates on language to twentieth-century stylometry and machine translation, this book recalls us to a series of engagements with language about which ‘all of us—we scholars, we philologists,’ as Lennon puts it, ought to know more. Passwords is eloquent and timely, and it offers a form of deep, institutional-lexical study, which schools us in a refusal to subordinate scholarship in the humanities to the identitarian and stabilizing imperatives of the national-security state. -- Jeffrey Sacks, University of California, Riverside
£33.11
Harvard University Press Automation and Utopia
Book SynopsisAutomating technologies threaten to usher in a workless future, but John Danaher argues that this can be a good thing. A world without work may be a kind of utopia, free of the misery of the job and full of opportunities for creativity and exploration. If we play our cards right, automation could be the path to idealized forms of human flourishing.Trade ReviewJohn Danaher proposes a novel claim: The end of work is a good thing and may lead to better alternatives for human flourishing. This line of argument and the method by which Danaher pursues and achieves it is both new and exciting. A very welcome and original contribution. -- David Gunkel, Northern Illinois UniversityThis is philosophy of technology at its best! Exquisitely clear, unflinchingly fair, and refreshingly original, Automation and Utopia is especially timely and important. -- Evan Selinger, Rochester Institute of TechnologyArmed with an astonishing breadth of knowledge, John Danaher engages with pressing public policy issues in order to lay out a fearless exposition of the radical opportunities that technology will soon enable. With the precision of analytical philosophy and accessible, confident prose, Automation and Utopia demonstrates yet again why Danaher is one of our most important pathfinders to a flourishing future. -- James Hughes, Institute for Ethics and Emerging Technologies[Danaher] is well versed in the opportunities and problems of a more automated future and his new book provides one of the most wide-ranging discussions of what might be in store…A stimulating and thought-provoking book, fizzing with ideas on a subject that will assume greater importance in the future. -- John Fanning * Dublin Review of Books *With the timeliness and significance of his well-crafted discussions, Danaher’s book will be of great interest to scholars across disciplines, tech developers and lawmakers, and concerned laypersons…One that we must take seriously in order to make the best of our future in a world increasingly dominated by technologies that have likely already outsmarted us. -- Daniel W. Tigard * Journal of Applied Philosophy *
£30.56
Princeton University Press Digital Formations
Book SynopsisExplores how "digital formations" emerge from the ever-changing intersection of computer-centered technologies and the broad range of social contexts that underlie much of what happens in cyberspace. This book emphasizes the importance of recognizing the specific technical capacities of digital technologies.Trade Review"A valuable contribution to scholarship, and one that I enjoyed reading, Digital Formations takes a unique approach to the subject of information technology. In seeking to build new conceptual frameworks and develop new perspectives, it provides a solid foundation for the elaboration of future empirical and theoretical work on IT and globalization." - Michel S. Laguerre, University of California, Berkeley, author of The Informal City and The Global Ethnopolis "Comprehensive and insightful, Digital Formations will be greeted warmly in the fields that over-lap its concerns. It addresses a most important set of questions concerning the relationship of information technologies to globalization. And this is an urgent topic for social science." - Mark Poster, University of California, Irvine, author of The Mode of Information and What's the Matter with the Internet?"Table of ContentsList of Illustrations vii Acknowledgments ix Introduction Digital Formations: Constructing an Object of Study by Robert Latham and Saskia Sassen 1 SPACES OF KNOWLEDGE 35 Recombinant Technology and New Geographies of Association by Jonathan Bach and David Stark 37 Electronic Markets and Activist Networks: The Weight of Social Logics in Digital Formations by Saskia Sassen 54 The New Mobility of Knowledge: Digital Information Systems and Global Flagship Networks by Dieter Ernst 89 NETWORKS OF COOPERATION 115 Cooperative Networks and the Rural-Urban Divide by D. Linda Garcia 117 Networks, Information, and the Rise of the Global Internet by Robert Latham 146 The Political Economy of Open Source Software and Why It Matters by Steven Weber 178 DESIGNS AND INSTITUTIONS 213 Designing Information Resources for Transboundary Conflict Early Warning Networks by Hayward R. Alker 215 Discourse Architecture and Very Large-scale Conversation by Warren Sack 242 Transnational Communication and the European Demos by Lars-Erik Cederman and Peter A. Kraus 283 Information Technology and State Capacity in China by Doug Guthrie 312 List of Contributors 339 Index 341
£42.50
Princeton University Press Bitcoin and Cryptocurrency Technologies
Book SynopsisTrade ReviewHonorable Mention for the 2017 PROSE Award in Computing and Information Sciences, Association of American Publishers "For people interested in the inner workings of Bitcoin and other crypto-currencies, this is an excellent book."--ChoiceTable of ContentsPREFACE vii FOREWORD The Long Road to Bitcoin ix Jeremy clark 1 Introduction to Cryptography and Cryptocurrencies 1 2 How Bitcoin Achieves Decentralization 27 3 Mechanics of Bitcoin 51 4 How to Store and Use Bitcoins 76 5 Bitcoin Mining 104 6 Bitcoin and Anonymity 138 7 Community, Politics, and Regulation 168 8 Alternative Mining Puzzles 190 9 Bitcoin as a Platform 213 10 Altcoins and the Cryptocurrency Ecosystem 242 11 Decentralized Institutions: The Future of Bitcoin? 272 CONCLUSION 286 ACKNOWLEDGMENTS 287 ABOUT THE AUTHORS 289 INDEX 291
£46.75
Princeton University Press Data Driven
Book SynopsisTrade Review"Winner of the Best Information Science Book Award, Association for Information Science and Technology""Winner of the McGannon Book Award, McGannon Center at Fordham University""Winner of the Labor Tech Book Award, Labor Tech Research Network""Splendid. . . . A rigorous and surprisingly entertaining ethnographic portrait of a profession in transition."---Gideon Lewis-Kraus, The New Yorker"Provocative. . . . [Levy’s] concise and lively book will interest anyone concerned with the complicated business of regulation."---Marc Levinson, Wall Street Journal"Data Driven does not disappoint. It is an exceptional exploration of how new rules and AI are transforming modern long-haul trucking, and how almost everyone who talks about the future of robots and work is getting it wrong."---Zephyr Teachout, American Prospect"“Breezily written; a quick and informative read.”"---Peter Hoskin, Prospect
£25.20
Princeton University Press Breaking the Social Media Prism
Book SynopsisTrade Review"Winner of the Science Breakthrough of the Year in Social Science, Falling Walls Foundation""A Behavioral Scientist's Notable Book""A FiveBooks Best Nonfiction Books of the Year""A Next Big Idea Club Selection""Masterful. . . . Immediately relevant. . . . Breaking the Social Media Prism answers important questions about the origins of our current political environment and suggests how existing platforms and reward systems might be redesigned to make things better. Bail’s scientific conclusions are refreshing in a space dominated by informed speculation, and the book offers hope that data-driven solutions can bring us back from the brink."---Jennifer Golbeck, Science"Smartly and engagingly challenges assumptions about how [ideological and cultural echo] chambers work."---Frank Bruni, New York Times"[Bail] draws on extensive interviews with social media users to explore the profound differences between people’s online and real-life personas, and lucidly details his own efforts to develop a new social media platform that cultivates more civil discourse. This is a persuasive and well-informed look at one of today’s most pressing social issues." * Publishers Weekly *"Every one of Bail's chapters threads together multiple lines of thought — some dating back decades or centuries — interweaving the frontiers of online social science research with the traditions they emerge from. . . . Bail's analysis of the problem of online polarization is clarifying and compelling."---Paul Rosenberg, Salon"[A] brilliant case . . . for social science research." * Library Journal *"Surprising. . . . Bail’s findings point to an interesting conclusion for the building of society: when it comes to bridging differences, in-person contact really helps."---Nathan Heller, New Yorker"Provides useful pointers for understanding online (mis)behavior." * Kirkus Reviews *"Wonderful. . . . Bail has provided social scientists, concerned citizens, and policymakers with an invaluable piece of work for understanding how social media is exacerbating our political divisions, and how we might forge a better future both online and off."---Thomas Koenig, Merion West"A really, really important book and really educational."---Sophie Roell, Five Books"Bail offers needed insights into the distortions that result when human persons are reduced to a set of data points."---Jeffrey Bilbro, New Atlantis"Bail delivers an efficient, engaging treatise on the polarizing effects of social media in the USA. . . . He expertly marshals evidence from his own research and modern computational social science to demonstrate how common narratives of social media miss the mark. . . . A thoughtful, compelling story of polarization on social media. . . .[Breaking the Social Media Prism] adds admirably to the dialog on political polarization. It synthesizes a body of research—both seminal and emerging—into a coherent picture, while making its own contributions. The prose is playfully conversational, accessible to a lay audience, and at fewer than 150 pages in the main text, refreshingly concise."---Jason Jeffrey Jones, Social Forces"Breaking The Social Media Prism challenges the accepted wisdom of echo chambers and algorithms and suggests that if we really want to solve political tribalism online the solution isn’t just some isolated thing called technology but also inside ourselves."---Samira Shackle, With Reason Podcast"A compelling story of both why social media is so addictive and how that addictiveness reverberates in the political process. . . . A fascinating book that, especially by dint of being accessible to a wide audience, has the potential to play an incredibly important role in starting to reset a lot of what has come to be accepted as received wisdom—especially around the complicated relationship between social media and political polarization—in line with what rigorous scholarly analysis has actually learned."---Joshua Tucker, American Journal of Sociology"Essential reading for many of us who are concerned with the impact of social media on civility and democracy."---Andrew Keen, Keen On podcast"Every once in a while, something comes along and causes a paradigm shift in its respective field or medium, a breakthrough that challenges prevailing narratives for explaining the world. Sometimes those breakthroughs are few and far between. For fields marked by rapid change and development, those breakthroughs can occur more frequently. In the rapidly changing field of social media and its impact on society, Chris Bail’s Breaking the Social Media Prism stands to become one of those paradigm shifts."---Austin Gravley, FaithTech"There is something for everyone in this book. . . . Drawing from rich interview data with people who use social media every day, Bail vividly depicts people’s lives and motives that result in political polarization on social media. Through engaging storytelling that puts a human face on political extremists and silent moderates on social media platforms, the book highlights the responsibility and agency of individual users to reduce political polarization on social media. Bail empowers readers and holds them accountable by shining a light on their instincts and motives that contribute to the social media’s prismatic effect."---Elizabeth Baik, New Media & Society"This misperception of reality that we see through the networks is what Bail calls 'prism' in the title of the book. 'The people who exaggerate the extremism of the other side are significantly higher among those who use the networks for information,' he explains. This causes a wrong idea of society for those who are there a lot and for those who use Twitter as an opinion thermometer. 'More pernicious is when the media uses Twitter as a display of public opinion, because it amplifies this misperception.'"---Jordi Pérez Colomé, El País"Shattering popular myths and in the process, uncovering some extraordinary revelations, Chris Bail’s enormously influential book, Breaking the Social Media Prism is a much needed antidote in, and, for bewildering times where fake news proliferates and political polarization runs amok on various social media platforms." * Blogternator *"Innovative. . . .this book will challenge many of your beliefs about the online world including that the solution is to completely disengage. . . . We suggest you read Breaking the Social Media Prism and evaluate your own online behavior and those you bump into." * Purple Principle podcast *"A very thought-provoking book, full of rich empirical evidence, a well-articulated narrative on the social media prism and it introduces potential solutions for the problems it discusses."---Xiuhua Wang, Sociology"Fascinating."---Michael Jensen, Eternity"Terrific book." * Democracy Works podcast *
£18.00
Princeton University Press Breaking the Social Media Prism
Book SynopsisTrade Review"Masterful. . . . Immediately relevant. . . . Breaking the Social Media Prism answers important questions about the origins of our current political environment and suggests how existing platforms and reward systems might be redesigned to make things better. Bail’s scientific conclusions are refreshing in a space dominated by informed speculation, and the book offers hope that data-driven solutions can bring us back from the brink."---Jennifer Golbeck, Science"Smartly and engagingly challenges assumptions about how [ideological and cultural echo] chambers work."---Frank Bruni, New York Times"[Bail] draws on extensive interviews with social media users to explore the profound differences between people’s online and real-life personas, and lucidly details his own efforts to develop a new social media platform that cultivates more civil discourse. This is a persuasive and well-informed look at one of today’s most pressing social issues." * Publishers Weekly *"Every one of Bail's chapters threads together multiple lines of thought — some dating back decades or centuries — interweaving the frontiers of online social science research with the traditions they emerge from. . . . Bail's analysis of the problem of online polarization is clarifying and compelling."---Paul Rosenberg, Salon"[A] brilliant case . . . for social science research." * Library Journal *"Surprising. . . . Bail’s findings point to an interesting conclusion for the building of society: when it comes to bridging differences, in-person contact really helps."---Nathan Heller, New Yorker"Provides useful pointers for understanding online (mis)behavior." * Kirkus Reviews *"Wonderful. . . . Bail has provided social scientists, concerned citizens, and policymakers with an invaluable piece of work for understanding how social media is exacerbating our political divisions, and how we might forge a better future both online and off."---Thomas Koenig, Merion West"A really, really important book and really educational."---Sophie Roell, Five Books"Bail offers needed insights into the distortions that result when human persons are reduced to a set of data points."---Jeffrey Bilbro, New Atlantis"Bail delivers an efficient, engaging treatise on the polarizing effects of social media in the USA. . . . He expertly marshals evidence from his own research and modern computational social science to demonstrate how common narratives of social media miss the mark. . . . A thoughtful, compelling story of polarization on social media. . . .[Breaking the Social Media Prism] adds admirably to the dialog on political polarization. It synthesizes a body of research—both seminal and emerging—into a coherent picture, while making its own contributions. The prose is playfully conversational, accessible to a lay audience, and at fewer than 150 pages in the main text, refreshingly concise."---Jason Jeffrey Jones, Social Forces"Breaking The Social Media Prism challenges the accepted wisdom of echo chambers and algorithms and suggests that if we really want to solve political tribalism online the solution isn’t just some isolated thing called technology but also inside ourselves."---Samira Shackle, With Reason Podcast"Essential reading for many of us who are concerned with the impact of social media on civility and democracy."---Andrew Keen, Keen On podcast"Every once in a while, something comes along and causes a paradigm shift in its respective field or medium, a breakthrough that challenges prevailing narratives for explaining the world. Sometimes those breakthroughs are few and far between. For fields marked by rapid change and development, those breakthroughs can occur more frequently. In the rapidly changing field of social media and its impact on society, Chris Bail’s Breaking the Social Media Prism stands to become one of those paradigm shifts."---Austin Gravley, FaithTech"There is something for everyone in this book. . . . Drawing from rich interview data with people who use social media every day, Bail vividly depicts people’s lives and motives that result in political polarization on social media. Through engaging storytelling that puts a human face on political extremists and silent moderates on social media platforms, the book highlights the responsibility and agency of individual users to reduce political polarization on social media. Bail empowers readers and holds them accountable by shining a light on their instincts and motives that contribute to the social media’s prismatic effect."---Elizabeth Baik, New Media & Society"This misperception of reality that we see through the networks is what Bail calls 'prism' in the title of the book. 'The people who exaggerate the extremism of the other side are significantly higher among those who use the networks for information,' he explains. This causes a wrong idea of society for those who are there a lot and for those who use Twitter as an opinion thermometer. 'More pernicious is when the media uses Twitter as a display of public opinion, because it amplifies this misperception.'"---Jordi Pérez Colomé, El País"Shattering popular myths and in the process, uncovering some extraordinary revelations, Chris Bail’s enormously influential book, Breaking the Social Media Prism is a much needed antidote in, and, for bewildering times where fake news proliferates and political polarization runs amok on various social media platforms." * Blogternator *"Innovative. . . .this book will challenge many of your beliefs about the online world including that the solution is to completely disengage. . . . We suggest you read Breaking the Social Media Prism and evaluate your own online behavior and those you bump into." * Purple Principle podcast *"A very thought-provoking book, full of rich empirical evidence, a well-articulated narrative on the social media prism and it introduces potential solutions for the problems it discusses."---Xiuhua Wang, Sociology"Fascinating."---Michael Jensen, Eternity"Terrific book." * Democracy Works podcast *
£14.39
University of Wales Press Information Age
Book SynopsisThis text considers how it is possible for a small country to have a distinct information technology strategy in an increasingly globalized economy.Trade Review'... inspiring and challenging ... I found the clear and distinct thinking that has gone into this analysis quite refreshing.' (Education, Communication & Information) '...This is a very good book...well-researched.' The Information Age '...a carefully argued, empirically substantiated appraisal of digital Wales. It deserves to be widely read, not just in the country which is its focus of attention, but elsewhere as well, for the lessons that can be carried into similar nations with newly devolved powers of governance.' European Journal of Communication.Table of ContentsPart 1 Sexual/textual consumption - response to papers by Nicholas Watson: consuming passions - gender and sexuality in book VIII of John Gower's "Confessio Amantis", Diane Watt; consuming the body of the working man in the later Middle Ages, Isabel Davis; reproductive rites - Anne Askew and the female body as witness in the "Acts and Monuments", Kimberly Anne Coles; "such stowage as these trinkets" - trading and tasting women in Fletcher and Massinger's "The Sea Voyage" (1622), Teresa Walters; antipodean tricks - travel, gender and monstrousness in Richard Brome's "The Antipodes", Claire Jowitt. Part 2 Monstrous bodies - response to papers by Margo Hendricks: Sheela's voracity and Victorian veracity, Emma L.E. Rees; bloodsuckers - the construction of female sexuality in medieval science and fiction, Bettina Bildhauer; "ant nes he him seolf reclus i maries somebe?" - the anchorhold and the redemption of the monstrous female body, Liz Herbert McAvoy; fountains and strange women in the bower of bliss - Eastern contexts for Acrasia and her community, Marion Hollings; monstrous tyrannical appetite - "and what wonderful monsters have there now lately ben borne in Englande?", Margaret Healy. Part 3 Consuming genders, races, ractions - response to papers by Andrew Hadfield: the monstrous appetites of Albina and her sisters, Ruth Evans; monstrous (m)othering - the representation of the Sowdanesse in Chaucer's "Man of Law's Tale", Sue Niebrzydowski; monstrous generation - witchcraft and generation in "Othello", Kirstie Gulick Rosenfield; an Ethiopian history - reading race and skin-colour in early modern versions of Heliodorus's "Aithiopika", Sujata Iyengar.
£9.49
Manchester University Press Digital contention in a divided society Social
Book SynopsisRepresenting the first in-depth qualitative study of how social media such as Facebook, Twitter, and YouTube are used to mediate contentious public parades and protests in Northern Ireland, this book explores the implications of mis-and dis-information spread via online platforms for peacebuilding in societies transitioning out of conflict.Trade Review'Much that is written about the politics of Northern Ireland is based on highly selective accounts of the available evidence. Reilly eschews this approach, subjecting the political use of social media to sustained critique in this empirically rich study. In so doing, he makes a very valuable contribution to scholarship.'Phil Ramsey, Lecturer in the School of Communication and Media, Ulster University'A timely historical account cataloguing a rich collection of the author's empirical research, the book evinces continuity in polarisation among Northern Irish communities online. Showing how the use of social media adds further complexity to community relations, for instance through the pointed concept of 'silly citizenship', Reilly meticulously dispels earlier techno-optimism while further contextualising the algorithmic power of social media.'Dan Mercea, Reader in Media and Communication, City, University of London'While the darkest days of Northern Ireland’s "troubles" are over, the divisions have left lasting scars and in the twenty-first century the competing interpretations of the conflict and the country’s constitutional status remain entrenched. Reilly’s work explores the contribution of digital citizenship to peacebuilding within this complex context. The comprehensive and engaging analysis explores how a society beset with deeply held prejudices form online communities, share content and can be misled by misinformation so contributing to a range of wider debates on the role of digital media. As with many studies Reilly identifies positives, such as Citizen Assemblies and accounts that scrutinize decision making, as well as the acts of ‘silly citizenship’ which satires sectarianism and can exacerbate divide. Reilly’s work is an important contribution to our understanding of digital politics, how platforms can be a force for good or ill depending on the motivations and behaviour of users, and how forms of digital citizenship can support or disrupt societal healing processes. Reilly’s study is a must read for scholars and students seeking to understand the complex roles which digital technologies play in socio-political life as well as for those seeking to understand the dynamics of present day Northern Ireland and how it might face the challenges of a post-Brexit world.'Darren Lilleker, Professor of Political Communication, Bournemouth University 'An important addition to research on digital disinformation and misinformation in a society were conflict and division remain worryingly close to the surface.'Una Murphy (View Magazine)'A perfect academic study for identifying public engagement in the times of the dysfunctional politics searching for reconciliation through new conceptual tools like silly citizenship in post-Brexit Irish border that will remain disputed in the years to come.'Murat Akser, Journal of Communication'Reilly's book makes an invaluable contribution to the debate on the potential of citizen activity on online platforms to contribute to peacebuilding in Northern Ireland. It deserves attention.' Kathryn Johnston, The Peace Journalist'As Reilly explains, social media can be considered as vital during the mobilisation of social movements. This view can be seen as a critique to clicktivism because even though there are ‘dangers’ that online platforms may increase division and tension between groups, Reilly argues that there is a chance and hope that, by looking at the Northern Irish case, one can argue that there would be more engagement and interactions between opponent groups in the future.''Reilly’s study is very useful to discuss how politics and digital citizenship take place in contentious times in divided societies. Whether social media are a part of the "problem" or encourage dialogue between opposing groups, he uses mixed research methods to strengthen his study.'Hakan Karahasan, Arkin University of Creative Arts and Design (ARUCAD) 'His work is very rich not only in terms of its literature but also its research methods and techniques and the way he elaborates such a complex situation in a clear way without simplifying the issue. Even though the book uses Northern Ireland as a case study, it is very useful for any kind of study that focuses on digital citizenship and activism as well as digital democracy and how divided societies and groups use social media in the age of digital world.'Digital Contention -- .Table of ContentsIntroduction1 Social media, contentious politics, and social movements2 Too many cyber warriors? The case of Loyalist Peaceful Protest Updater3 “You can’t eat a flag” Northern Ireland Twitter responds to the flag protests4 PSNIRA vs. peaceful protesters? YouTube, sousveillance and the policing of the flag protests5 Parody of Esteem? LAD and the rise of ‘silly citizenship’6 Twitter, affective publics and public demonstrations: The 2014 and 2015 Ardoyne parade disputesConclusionAppendix 1 Content Analysis of newspaper coverage of flag protestsAppendix 2 Content analysis of newspaper coverage of Ardoyne parade disputeBibliographyIndex
£76.50
Lexington Books Hegemony in the Digital Age The ArabIsraeli
Book SynopsisInternet technology has arguably changed the rules by which individuals, social movements, and institutions compete for political and cultural influence in technologically advanced societies. The author considers this reality through reference to the concept of hegemony; looking to the ways in which diverse actors in American civil society compete with one another while simultaneously challenging dominant sources of authority. The Arab/Israeli conflict is drawn upon as a boundary object holding direct interest to a wide range of state-aligned lobbies, broadly-based social movements, and marginalized ''extremist'' groups, each of which hopes to affect the course of U.S. Mid-East policy. While various dimensions of internet use and activism are explored, Stephen Marmura directs particular attention to the importance and limitations of the World Wide Web as a mass medium. Examining phenomena ranging from mainstream news dissemination to the propaganda warfare visible online amongst racist, religious fundamentalist, and ultra-nationalist organizations, he argues the Net''s greatest advantages are ultimately accrued by those most vested in the political status quo. Marmura argues further that widespread use of the Web is likely contributing to processes of social fragmentation, even as it reinforces ideological discourses favorable to state power.Trade ReviewStephen Marmura has made a signification contribution in this careful examination of the political contest being conducted on the Internet between Arab and Jewish sources. -- Karim H. Karim, award-winning author of Islamic Peril: Media and Global ViolenceMarmura successfully transcends the commonplace binary observations about the Internet either facilitating social fragmentation or ideological hegemony in this book by introducing an altogether more nuanced reading of web-based political activism. -- Brian D. Loader, editor, Information, Communication & SocietyMarmura's book is a pathbreaking work on how the World Wide Web is used in the Middle East propaganda war. It deploys innovative analysis of web content emanating from Moslem, Christian and Jewish fundamentalist groups in their efforts to mobilize support for their causes particularly in the U.S arena. His main finding is that in spite of wide access to various sources of information through the internet, dominant discourse on the Middle East retains its support of the status quo. -- Elia Zureik, Emeritus Professor of Sociology, Queen's UniversityTable of ContentsChapter 1 Table of Contents Chapter 2 Acknowledgments Chapter 3 1 Introduction: Identity and Authority in the Age of Networks Chapter 4 2 Net-Based Activism and American Mid-East Policy, Part I: Grassroots Mobilization and Political Opportunity Chapter 5 3 Net-Based Activism and Mid-East Policy, Part II: Public Opinion Chapter 6 4 The Voice of Legitimacy:CNN.com and the Arab/Israeli Conflict Chapter 7 5 Hate and Holy War on the WWW, Part I: Confronting the Other Chapter 8 6 Hate and Holy War on the WWW, Part II: The Struggle for Influence Chapter 9 7 Hegemony Reconsidered: The Internet, Civil Society, and Social Fragmentation Chapter 10 Works Cited Chapter 11 Index
£82.80
Lexington Books Hegemony in the Digital Age The ArabIsraeli
Book SynopsisInternet technology has arguably changed the rules by which individuals, social movements, and institutions compete for political and cultural influence in technologically advanced societies. The author considers this reality through reference to the concept of hegemony; looking to the ways in which diverse actors in American civil society compete with one another while simultaneously challenging dominant sources of authority. The Arab/Israeli conflict is drawn upon as a boundary object holding direct interest to a wide range of state-aligned lobbies, broadly-based social movements, and marginalized ''extremist'' groups, each of which hopes to affect the course of U.S. Mid-East policy. While various dimensions of internet use and activism are explored, Stephen Marmura directs particular attention to the importance and limitations of the World Wide Web as a mass medium. Examining phenomena ranging from mainstream news dissemination to the propaganda warfare visible online amongst racist, religious fundamentalist, and ultra-nationalist organizations, he argues the Net''s greatest advantages are ultimately accrued by those most vested in the political status quo. Marmura argues further that widespread use of the Web is likely contributing to processes of social fragmentation, even as it reinforces ideological discourses favorable to state power.Trade ReviewStephen Marmura has made a signification contribution in this careful examination of the political contest being conducted on the Internet between Arab and Jewish sources. -- Karim H. Karim, award-winning author of Islamic Peril: Media and Global ViolenceMarmura successfully transcends the commonplace binary observations about the Internet either facilitating social fragmentation or ideological hegemony in this book by introducing an altogether more nuanced reading of web-based political activism. -- Brian D. Loader, editor, Information, Communication & SocietyMarmura's book is a pathbreaking work on how the World Wide Web is used in the Middle East propaganda war. It deploys innovative analysis of web content emanating from Moslem, Christian and Jewish fundamentalist groups in their efforts to mobilize support for their causes particularly in the U.S arena. His main finding is that in spite of wide access to various sources of information through the internet, dominant discourse on the Middle East retains its support of the status quo. -- Elia Zureik, Emeritus Professor of Sociology, Queen's UniversityTable of ContentsChapter 1 Table of Contents Chapter 2 Acknowledgments Chapter 3 1 Introduction: Identity and Authority in the Age of Networks Chapter 4 2 Net-Based Activism and American Mid-East Policy, Part I: Grassroots Mobilization and Political Opportunity Chapter 5 3 Net-Based Activism and Mid-East Policy, Part II: Public Opinion Chapter 6 4 The Voice of Legitimacy:CNN.com and the Arab/Israeli Conflict Chapter 7 5 Hate and Holy War on the WWW, Part I: Confronting the Other Chapter 8 6 Hate and Holy War on the WWW, Part II: The Struggle for Influence Chapter 9 7 Hegemony Reconsidered: The Internet, Civil Society, and Social Fragmentation Chapter 10 Works Cited Chapter 11 Index
£40.50
Rlpg/Galleys Social Networking and Impression Management
Book SynopsisThis book provides original research on key issues in the field of identity management and social networking sites. The contributors to this volume draw on current research in the field and offer new theoretical frameworks and research methods, making the book useful for both students and scholars of social media.Trade ReviewAn extremely useful collection of meticulous and well-chosen cases, encompassing a range of theoretical and practical issues. -- David J. Phillips, University of TorontoTable of ContentsIntroduction, Carolyn Cunningham Part 1. Impression Management Strategies Chapter 1. Comparing Identity Management Strategies Across Social Media Platforms, Jeffrey H. Kuznekoff Chapter 2. "Looking the Part" and "Staying True": Balancing Impression Managment on Facebook, Judith Rosenbaum, Benjamin Johnson, Peter Stepman, and Koos Nuijten Chapter 3. Face-Off: Different Ways Identity is Privileged Through Facebook, Daniel C. Davis, Jessica A. Tougas, Margaeux B. Lippman, and Timothy W. Morris Part 2. Identity in Professional Contexts Chapter 4. Compressed Crystals: A Metaphor for Mediated Identity Expression, Bree McEwan and Jennifer J. Mease Chapter 5. Branding as Social Discourse: Identity Construction on Social and Professional Networking Sites, Corey Jay Liberman Chapter 6. Like Us on Facebook and Follow Us on Twitter: Corporate Identity Management Across Social Media Platforms, Binod Sundararajan and Malavika Sundararajan Part 3. Managing Intersectionality Chapter 7. Virtual Closets: Strategic Identity Construction and Social Media, Bruce E. Drushel Chapter 8. The Performative Possibilities of Social Media: Antoine Johnson, Amber Johnson Chapter 9. Using Social Media to Develop a Transgender Identity in a Virtual Community, Sara Green-Hamann and John C. Sherblom Part 4. The Light and Dark Side of Impression Management Chapter 10. Face Threatening Messages and Attraction in Social Networking Sites: Reconciling Strategic Self-Presentation with Negative Online Perceptions, Nicholas Brody and Jorge Peña Chapter 11. Psychological Benefits and Costs: A Self-Affirmation Framework for Understanding the Effects of Facebook Self-Presentation, Catalina Toma Chapter 12. What You Can Really Know about Someone from Their Facebook Profile (And Where You Should Look to Find Out), Jeffrey A. Hall and Natalie Pennington
£101.70
Lexington Books Social Networking and Impression Management
Book SynopsisSocial Networking and Impression Management: Self-Presentation in the Digital Age, edited by Carolyn Cunningham, offers critical inquiry into how identity is constructed, deconstructed, performed, and perceived on social networking sites (SNSs), such as Facebook, and LinkedIn. The presentation of identity is key to success or failure in the Information Age, especially because SNSs are becoming the dominant form of communication among Internet users. The architecture of SNSs provide opportunities to ask questions such as who am I; what matters to me; and, how do I want others to perceive me? Original research studies in this collection utilize both quantitative and qualitative methods to study a range of issues related to identity management on SNSs including authenticity, professional uses of SNSs, LGBTQ identities, and psychological and cultural impacts. Together, the contributors to this volume draw on current research in the field and offer new theoretical frameworks and research methods to further the conversation on impression management and SNSs, making this text essential for both students and scholars of social media.Trade ReviewAn extremely useful collection of meticulous and well-chosen cases, encompassing a range of theoretical and practical issues. -- David J. Phillips, University of TorontoTable of ContentsIntroduction, Carolyn Cunningham Part 1. Impression Management Strategies Chapter 1. Comparing Identity Management Strategies Across Social Media Platforms, Jeffrey H. Kuznekoff Chapter 2. "Looking the Part" and "Staying True": Balancing Impression Managment on Facebook, Judith Rosenbaum, Benjamin Johnson, Peter Stepman, and Koos Nuijten Chapter 3. Face-Off: Different Ways Identity is Privileged Through Facebook, Daniel C. Davis, Jessica A. Tougas, Margaeux B. Lippman, and Timothy W. Morris Part 2. Identity in Professional Contexts Chapter 4. Compressed Crystals: A Metaphor for Mediated Identity Expression, Bree McEwan and Jennifer J. Mease Chapter 5. Branding as Social Discourse: Identity Construction on Social and Professional Networking Sites, Corey Jay Liberman Chapter 6. Like Us on Facebook and Follow Us on Twitter: Corporate Identity Management Across Social Media Platforms, Binod Sundararajan and Malavika Sundararajan Part 3. Managing Intersectionality Chapter 7. Virtual Closets: Strategic Identity Construction and Social Media, Bruce E. Drushel Chapter 8. The Performative Possibilities of Social Media: Antoine Johnson, Amber Johnson Chapter 9. Using Social Media to Develop a Transgender Identity in a Virtual Community, Sara Green-Hamann and John C. Sherblom Part 4. The Light and Dark Side of Impression Management Chapter 10. Face Threatening Messages and Attraction in Social Networking Sites: Reconciling Strategic Self-Presentation with Negative Online Perceptions, Nicholas Brody and Jorge Peña Chapter 11. Psychological Benefits and Costs: A Self-Affirmation Framework for Understanding the Effects of Facebook Self-Presentation, Catalina Toma Chapter 12. What You Can Really Know about Someone from Their Facebook Profile (And Where You Should Look to Find Out), Jeffrey A. Hall and Natalie Pennington
£47.70
Pluto Press Information Politics
Book SynopsisA critical look into how far our lives are controlled by modern digital systems, and how digital information is used by the powerful.Trade Review'A must read for those seeking to understand the impact of digital culture and their attendant communication technologies on our quest for liberty and equality' -- Hector Postigo, Associate Professor of Media Studies and Production, Temple University'A determined philosophical inquiry into the nature of information politics, from the abstraction of the cloud to the battlegrounds of hactivists, to identify the forms of exploitation and liberation endemic to the recursive movement of information. This book offers rich philosophical grounding for current and future studies of new media' -- Tarleton Gillespie, Associate Professor, Department of Communication, Cornell University'A compelling and incisive account of fundamental developments in our increasingly digital world. His sophisticated theoretical analysis is clearly articulated and is based on a thorough grasp of both the technical and the social. He brilliantly avoids both cultural pessimism and techno-utopianism in his presentation of 'political antagonisms'' -- Sally Wyatt, Professor of Digital Cultures in Development, Maastricht University'This is an academic book of the highest quality that tackles what is sure to be the defining struggle of the 21st century: the struggle for control over access to information' -- Nathalie Maréchal, International Journal of CommunicationTable of ContentsSeries Preface Acknowledgements Introduction: Information as a Politics Part I: Theory of Information Power 1. Recursion 2. Technologies' Embrace 3. Network and Protocol Theory: Dis/Organising Information Power Part II: Platforms 4. Clouds 5. Securitisation of the Internet 6. Social Media Networks Part III: Battlegrounds 7. Battlegrounds and the iPad 8. Death and Gaming 9. Hacktivism: Operation Tunisia, Modular Tactics and Information Activism Conclusion: Information Exploitation and Information Liberation Bibliography Index
£22.49
Pluto Press Let Them Eat Crypto
Book SynopsisA shocking exposé of the huge social, political and environmental costs of cryptocurrenciesTrade Review'A methodical and essential resource. Howson strikes not just at cryptocurrency, but the frauds who promote blockchain technology as a solution to any social problem - when they only exploit the vulnerable to pump their coins.' -- David Gerard, author of 'Attack of the 50 Foot Blockchain'Table of ContentsPreface Introduction 1. Banking the Unbanked 2. The Crypto Colonists 3. Green Wash Trading 4. Bad Samaritans 5. Bloke Chains 6. For Betterverse or Metaworse 7. A World Without Web3 Notes Index
£13.49
John Wiley and Sons Ltd Mode of Information Poststructuralism and Social
Book SynopsisThis book is a major new contribution to debates about modernity and post-modernity, emphasising the influence of electronic communication. Poster highlights the emergence of a new communication order, an interaction between humankind and a new kind of reality.Trade Review'Poster has begun to theorize a very significant topic.' SociologyTable of ContentsIntroduction: Words Without Things. 1. The Concept of Postindustrial Society. 2. Baudrillard and TV Ads. 3. Foucault and Data Bases. 4. Derrida and Electronic Writing. 5. Lyotard and Computer Science. Notes. Index.
£16.14
John Wiley and Sons Ltd Computer Games and the Social Imaginary
Book SynopsisComputer games have fundamentally altered the relation of self and society in the digital age. Analysing topics such as technology and power, the formation of gaming culture and the subjective impact of play with computer games, this text will be of great interest to students and scholars of digital media, games studies and the information society.Trade Review"It is well researched, well argued, and one of the finest books to date on the subject of digital games." New Media and Society "The classic studies of games argue that play mirrors social life. But what kind of story must theory tell when society begins to resemble a game? This is the argument of Graeme Kirkpatrick's brilliant new book, Computer Games and the Social Imaginary. Drawing on recent social theory and an original analysis of the social role of aesthetics, Kirkpatrick makes a major contribution to our understanding of both games and society." Andrew Feenberg, Simon Fraser University "A rich and ambitious attempt to situate computer games relative to the transformation of capitalism over the last four decades. Kirkpatrick's thesis - which effortlessly combines sophisticated readings of the history of microcomputing and games with social and cultural theory - is nuanced, fresh and powerful. When I finished, I wanted to begin all over again." Melanie Swalwell, Flinders University "Kirkpatrick’s discussion of the social significance of computer games is very thought provoking, and provides a valuable inclusion to the field of media and game studies." Christian Dewar, University of South AustraliaTable of ContentsContents Acknowledgements Introduction Chapter one: Computer games in social theory 1. Gaming and the social imaginary 2. The gamer as a ‘streamlined self’ 3. Social theory and critique Chapter two: Lineages of the computer game 1. The revival of play 2. Technology and the dialectic of invention 3. Artistic critique and the transformation of computing Chapter three: The formation of gaming culture 1. From games as technology to the discovery of ‘gameplay’ 2. The ‘authentic’ gamer 3. Gaming’s constitutive ambivalence Chapter four: Technology and power 1. Organising an industry 2. Globalisation and cultures of production 3. Technology, power and resistance Chapter five: The phenakisticon 1. MMPGs in recognition-theoretic perspective 2. The limitations of engineered sociability 3. Gamification and the diminution of gameplay Chapter six: Aesthetics and politics 1. The aesthetic dimension 2. Art, play and critique 3. Critical gaming? Notes References Index
£40.50
John Wiley and Sons Ltd Computer Games and the Social Imaginary
Book SynopsisComputer games have fundamentally altered the relation of self and society in the digital age. Analysing topics such as technology and power, the formation of gaming culture and the subjective impact of play with computer games, this text will be of great interest to students and scholars of digital media, games studies and the information society.Trade Review"It is well researched, well argued, and one of the finest books to date on the subject of digital games." New Media and Society "The classic studies of games argue that play mirrors social life. But what kind of story must theory tell when society begins to resemble a game? This is the argument of Graeme Kirkpatrick's brilliant new book, Computer Games and the Social Imaginary. Drawing on recent social theory and an original analysis of the social role of aesthetics, Kirkpatrick makes a major contribution to our understanding of both games and society." Andrew Feenberg, Simon Fraser University "A rich and ambitious attempt to situate computer games relative to the transformation of capitalism over the last four decades. Kirkpatrick's thesis - which effortlessly combines sophisticated readings of the history of microcomputing and games with social and cultural theory - is nuanced, fresh and powerful. When I finished, I wanted to begin all over again." Melanie Swalwell, Flinders University "Kirkpatrick’s discussion of the social significance of computer games is very thought provoking, and provides a valuable inclusion to the field of media and game studies." Christian Dewar, University of South AustraliaTable of ContentsContents Acknowledgements Introduction Chapter one: Computer games in social theory 1. Gaming and the social imaginary 2. The gamer as a ‘streamlined self’ 3. Social theory and critique Chapter two: Lineages of the computer game 1. The revival of play 2. Technology and the dialectic of invention 3. Artistic critique and the transformation of computing Chapter three: The formation of gaming culture 1. From games as technology to the discovery of ‘gameplay’ 2. The ‘authentic’ gamer 3. Gaming’s constitutive ambivalence Chapter four: Technology and power 1. Organising an industry 2. Globalisation and cultures of production 3. Technology, power and resistance Chapter five: The phenakisticon 1. MMPGs in recognition-theoretic perspective 2. The limitations of engineered sociability 3. Gamification and the diminution of gameplay Chapter six: Aesthetics and politics 1. The aesthetic dimension 2. Art, play and critique 3. Critical gaming? Notes References Index
£14.24