Finalist for the Erving Goffman Award for Outstanding Scholarship in the Ecology of Social Interaction 2023Images of faces, bodies, selves and digital subjectivities abound on new media platforms like Snapchat, Instagram, YouTube, and others-these images represent our new way of being online and of becoming socially mediated.
The harrowing true story of a high-school senior, her parents, her secret online relationship with a handsome, manipulative stranger, and her well-laid plan to leave home and country to marry a man in Kosovo she thought she loved.
The approach will be to give visual aid (illustrated) and written reference to young designers who are either launching their careers or taking their first stab at designing letterforms for a logo, lettermark, signage, advertising or an alphabet.
Visual Experiences: A Concise Guide to Digital Interface Design provides step-by-step examples to enable readers to create an interface, guiding them from sketching an idea to creating an interactive prototype.
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.
Taking off at the height of China's socio-economic reforms in the mid-1990s, the Internet developed alongside the twists and turns of the country's rapid transformation.
Taking off at the height of China's socio-economic reforms in the mid-1990s, the Internet developed alongside the twists and turns of the country's rapid transformation.
Museum Studies for a Post-Pandemic World demonstrates that digital literacy, creativity, and resilience, as the COVID-19 pandemic has so vividly illustrated, are now vital components of the classroom and of the curator's toolbox.
In less than a decade, the Internet went from being a series of loosely connected networks used by universities and the military to the powerful commercial engine it is today.
Cloud computing is becoming the next revolution in the IT industry; providing central storage for internet data and services that have the potential to bring data transmission performance, security and privacy, data deluge, and inefficient architecture to the next level.
Recent technology trends involving the combination of mobile networks and cloud computing have offered new chances for mobile network providers to use specific carrier-cloud services.
With this book, the promise of the Semantic Web -- in which machines can find, share, and combine data on the Web -- is not just a technical possibility, but a practical reality Programming the Semantic Web demonstrates several ways to implement semantic web applications, using current and emerging standards and technologies.
Whether you need full-text search or real-time analytics of structured dataor boththe Elasticsearch distributed search engine is an ideal way to put your data to work.
Whether you need full-text search or real-time analytics of structured dataor boththe Elasticsearch distributed search engine is an ideal way to put your data to work.
A Guide to Conducting Online Research is designed to support students, academics and research practitioners in using technology to conduct their research.
A Guide to Conducting Online Research is designed to support students, academics and research practitioners in using technology to conduct their research.
Digital Playgrounds explores the key developments, trends, debates, and controversies that have shaped children's commercial digital play spaces over the past two decades.
This easy-to-use guide covers the history, development, and current workings of cryptocurrencies and the underground economy, both in the United States and around the world.
Keep personal information safe from people who have malicious intent to steal, change or destroy it, prevent large-scale attacks on businesses and keep your computer running smoothly with the help of this handy guide that explains how ';hackers' will attack and what you can do to protect yourself and your business.