Go to A-Z Databases: Books & eBooks to search for more eBooks. Must access on campus or login with your COM account for off campus access.
Want more on finding books or eBooks? Try our How to Use Books & eBooks guides.
Automating the News - How Algorithms Are Rewriting the Media
From hidden connections in big data to bots spreading fake news, journalism is increasingly computer-generated. An expert in computer science and media explains the present and future of a world in which news is created by algorithm. Amid the push for self-driving cars and the roboticization of industrial economies, automation has proven one of the biggest news stories of our time. Yet the wide-scale automation of the news itself has largely escaped attention. In this lively exposé of that rapidly shifting terrain, Nicholas Diakopoulos focuses on the people who tell the stories--increasingly with the help of computer algorithms that are fundamentally changing the creation, dissemination, and reception of the news. Diakopoulos reveals how machine learning and data mining have transformed investigative journalism. Newsbots converse with social media audiences, distributing stories and receiving feedback. Online media has become a platform for A/B testing of content, helping journalists to better understand what moves audiences. Algorithms can even draft certain kinds of stories. These techniques enable media organizations to take advantage of experiments and economies of scale, enhancing the sustainability of the fourth estate. But they also place pressure on editorial decision-making, because they allow journalists to produce more stories, sometimes better ones, but rarely both. Automating the News responds to hype and fears surrounding journalistic algorithms by exploring the human influence embedded in automation. Though the effects of automation are deep, Diakopoulos shows that journalists are at little risk of being displaced. With algorithms at their fingertips, they may work differently and tell different stories than they otherwise would, but their values remain the driving force behind the news. The human-algorithm hybrid thus emerges as the latest embodiment of an age-old tension between commercial imperatives and journalistic principles.
Hacktivism
Hacktivism—from the terms “hacking” and “activism”—has been around since the beginning of the internet. Groups such as WikiLeaks and Anonymous believe that they are promoting freedom of information and transparency, but hacktivism can have unintended consequences and affect innocent individuals. Although frequently lauded for taking up social justice causes, hacktivism is still a form of cybercrime, and hacktivists are the ones who decide what individuals or entities should be targeted based on their own political and moral leanings, operating outside the bounds of societal or legal scrutiny. Techniques can include website defacement and mirroring, denial-of-service attacks designed to take websites offline, and exposing private or confidential information through doxing. This volume of The Reference Shelf explores recent events and controversies in the world of hacktivism, from cyberattacks by Anonymous on Russian computer systems after the invasion of Ukraine to the doxing of Supreme Court justices by pro-choice group Ruth Sent Us.
Also available in print: HM851 .H235 2023
The Identity Trade : Selling Privacy and Reputation Online
The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity--a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.
Internet of Things and Data Analytics Handbook
This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view. Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing for IoT projects. It provides readers with knowledge in planning, designing, and implementing IoT projects. The book is written by experts on the subject matter, including international experts from nine countries in the consumer and enterprise fields of IoT. The text starts with an overview and anatomy of IoT, ecosystem of IoT, communication protocols, networking, and available hardware, both present and future applications and transformations, and business models. The text also addresses big data analytics, machine learning, cloud computing, and consideration of sustainability that are essential to be both socially responsible and successful. Design and implementation processes are illustrated with best practices and case studies in action. In addition, the book: Examines cloud computing, data analytics, and sustainability and how they relate to IoT overs the scope of consumer, government, and enterprise applications Includes best practices, business model, and real-world case studies Hwaiyu Geng, P.E., is a consultant with Amica Research (www.AmicaResearch.org, Palo Alto, California), promoting green planning, design, and construction projects. He has had over 40 years of manufacturing and management experience, working with Westinghouse, Applied Materials, Hewlett Packard, and Intel on multi-million high-tech projects. He has written and presented numerous technical papers at international conferences.
IoT Security Issues
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.
Numb: How the Information Age Dulls Our Senses and How We Can Get Them Back
Discover how to manage this noisy world without it managing you. In Numb, distinguished author Dr. Charles R. Chaffin delivers a fun and evidence-based exploration of how you can devote more attention on what you believe is important while ignoring the distractions that increasingly permeate your life. Using research from cognitive, education, positive, and clinical psychology, the book identifies the sources of noise and distraction in this information age and how we can manage it in all aspects of our lives. You'll learn about: How experiences in technology, from social media to selfies to porn, impact our ability to engage and connect with others The news we consume and the impact of confirmation bias, filter bubbles, and tribalism How FOMO and choice overload impact our decision-making The power of our attention in all aspects of our daily lives Perfect for anyone interested in the expanding impact of the information age on our collective psyche, ;Numb helps empower you to use technology and information not as a destination, but as a tool towards authenticity and empowerment.
Privacy Rights in the Digital Age
This new encyclopedia discusses the practical, political, psychological, and philosphical challenges we face as technological advances have changed the landscape of traditional notions of privacy.
Security and Privacy in the Digital Era
"The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties." --Mireille Delmas Marty, Libertés et sûreté dans un monde dangereux, 2010 This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to be less freedom in terms of security to the point that some scholars have wondered whether privacy should be redefined in this era. The actors involved (the Western states, digital firms, human rights organizations etc.) have seen their roles impact the legal and political science fields.
Tech Giants, Artificial Intelligence, and the Future of Journalism
This book examines the impact of the "Big Five" technology companies - Apple, Alphabet/Google, Amazon, Facebook and Microsoft - on journalism and the media industries. It looks at the current role of algorithms and artificial intelligence in curating how we consume media and their increasing influence on the production of the news. Exploring the changes that the technology industry and automation have made in the past decade to the production, distribution and consumption of news globally, the book considers what happens to journalism once it is produced and enters the media ecosystems of the internet tech giants - and the impact of social media and AI on such things as fake news in the post-truth age. The audience for this book are students and researchers working in the field of digital media, and journalism studies or media studies more generally. It will also be useful to those who are looking for extended case studies of the role taken by tech giants such as Facebook and Google in the fake news scandal, or the role of Jeff Bezos in transforming The Washington Post. The Open Access version of this book, available at https://doi.org/10.4324/9781351013758, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
This Is Why We Can't Have Nice Things : Mapping the Relationship Between Online Trolling and Mainstream Culture
Why the troll problem is actually a culture problem: how online trolling fits comfortably within today's media landscape. Internet trolls live to upset as many people as possible, using all the technical and psychological tools at their disposal. They gleefully whip the media into a frenzy over a fake teen drug crisis; they post offensive messages on Facebook memorial pages, traumatizing grief-stricken friends and family; they use unabashedly racist language and images. They take pleasure in ruining a complete stranger's day and find amusement in their victim's anguish. In short, trolling is the obstacle to a kinder, gentler Internet. To quote a famous Internet meme, trolling is why we can't have nice things online. Or at least that's what we have been led to believe. In this provocative book, Whitney Phillips argues that trolling, widely condemned as obscene and deviant, actually fits comfortably within the contemporary media landscape. Trolling may be obscene, but, Phillips argues, it isn't all that deviant. Trolls' actions are born of and fueled by culturally sanctioned impulses -- which are just as damaging as the trolls' most disruptive behaviors. Phillips describes, for example, the relationship between trolling and sensationalist corporate media -- pointing out that for trolls, exploitation is a leisure activity; for media, it's a business strategy. She shows how trolls, "the grimacing poster children for a socially networked world," align with social media. And she documents how trolls, in addition to parroting media tropes, also offer a grotesque pantomime of dominant cultural tropes, including gendered notions of dominance and success and an ideology of entitlement. We don't just have a trolling problem, Phillips argues; we have a culture problem. This Is Why We Can't Have Nice Things isn't only about trolls; it's about a culture in which trolls thrive.
Weaponizing Cyberspace: Inside Russia's Hostile Activities
The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals. Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin. Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed. Explains how the legacy of Soviet information operations and the modern examples of Russian information operations are similar but not identical to one another Explores the development of Russian domestic information operations techniques that can now be applied against foreign powers Describes the relationships between technical attacks and disinformation often used in confrontations with countries along Russia's borders Examines the role of Russian information operations in U.S. social and political discourse Considers the implications of other countries' reactions that attempt to eliminate the Russian information operation's ability to influence society