All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice.
This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy.
This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building.
In the first book of its kind, art information expert Lois Swan Jones discusses how to locate visual and textual information on the Internet and how to evaluate and supplement that information with material from other formats--print sources, CD-ROMS, documentary videos, and microfiche sets--to produce excellent research results.
In the first book of its kind, art information expert Lois Swan Jones discusses how to locate visual and textual information on the Internet and how to evaluate and supplement that information with material from other formats--print sources, CD-ROMS, documentary videos, and microfiche sets--to produce excellent research results.
This interdisciplinary collection of essays focuses on critical and theoretical responses to the apocalypse of the late twentieth- and early twenty-first-century cultural production.
This interdisciplinary collection of essays focuses on critical and theoretical responses to the apocalypse of the late twentieth- and early twenty-first-century cultural production.
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more.
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more.
Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner.
Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner.
"e;In what is certain to be a seminal work on metadata, John Horodyski masterfully affirms the value of metadata while providing practical examples of its role in our personal and professional lives.
"e;In what is certain to be a seminal work on metadata, John Horodyski masterfully affirms the value of metadata while providing practical examples of its role in our personal and professional lives.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI.
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
Applied User Data Collection and Analysis Using JavaScript and PHP is designed to provide the technical skills and competency to gather a wide range of user data from web applications in both active and passive methods.
Applied User Data Collection and Analysis Using JavaScript and PHP is designed to provide the technical skills and competency to gather a wide range of user data from web applications in both active and passive methods.
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool.