In the early 1990s, people predicted the death of privacy, an end to the current concept of 'property,' a paperless society, 500 channels of high-definition interactive television, world peace, and the extinction of the human race after a takeover engineered by intelligent machines. Imagining the Internet zeroes in on predictions about the Internet's future and revisits past predictions—and how they turned out. It gives the history of communications in a nutshell, illustrating the serious impact of pervasive networks and how they will change our lives over the next century.
Technology impacts every aspect of life and choices are endless. As a college student, you need to know how to evaluate devices, choose apps, maintain a compelling online reputation, and lock down digital security. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2018, INTRODUCTORY goes beyond the intuitive "how-to" of apps and social media to delve into the broad concepts that are guiding current technologies such as self-driving cars, virtual reality, file sharing torrents, encrypted communications, photo forensics, and the Internet of Things. Numerous illustrations and interactive features in this complete book make mastering technical topics a breeze with a learning path that is structured with you, today's busy student, in mind. This edition offers an insightful overview of what every college student should know about using technology to complete your education, launch a successful career, and engage in issues that shape today's world.
Part of our New Perspectives Series, this updated text offers a case-oriented, problem-solving approach for learning the basic to more advanced features of the Internet-from browsing, navigating, and searching on the Internet, to using e-mail, advanced communication tools and other Web topics.
Students learn how to validate a single document, combined from the contents of several XML files. XML documents are validated using the validation commands in XML Spy. This book provides extensive coverage of DTDs, namespaces, schemas, CSS and XSLT. Students gains hands-on experience in creating and applying a XSLT style sheet to a XML document. This book looks provides coverage of XPath to develop node-sets. Students are introduced to the W3C Document Object Model, and learn how to use JavaScript to modify the contents of an XML document and an XSLT style sheet. Students also learn how to use variables and parameters in XSLT templates and how to perform calculations using recursive templates.
Since its original articulation in the early 1970s, the 'spiral of silence' theory has become one of the most studied theories of communication and public opinion. It has been tested in varied sociopolitical contexts, with different issues and across communication systems around the world. Attracting the interest of scholars from communication, political science, sociology, public opinion and psychology, it has become both the subject of tempestuous academic debate as well as a mainstay in courses on communication theory globally. Reflecting substantial new thinking, this collection provides a comprehensive examination of the spiral of silence theory, offering a synthesis of prior research as well as a solid platform for future study. It addresses various ideological and methodological criticisms of the theory, links the theory with allied areas of scholarship, and provides analyses of empirical tests. Contributors join together to present a breadth of disciplinary and international perspectives. As a distinctive and innovative examination of this influential theory, this volume serves as a key resource for future research and scholarship in communicaiton, public opinion, and political science.
Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users’ virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users’ concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.
Scholarship on NATO is often preoccupied with key episodes in the development of the organisation and so, for the most part, has remained inattentive to theory. This book addresses that gap in the literature. It provides a comprehensive analysis of NATO through a range of theoretical perspectives that includes realism, liberalism and constructivism, and lesser-known approaches centred on learning, public goods, securitisation and risk. Focusing on NATO’s post-Cold War development, it considers the conceptualisation, purpose and future of the Alliance. This book will be of interest to students and scholars of international organisation, international relations, security and European Politics.
This book explores the interface between terrorism and the internet and presents contemporary approaches to understanding violent extremism online. The volume focuses on four issues in particular: terrorist propaganda on the internet; radicalisation and the internet; counter campaigns and approaches to disrupting internet radicalisation; and approaches to researching and understanding the role of the internet in radicalisation. The book brings together expertise from a wide range of disciplines and geographical regions including Europe, the US, Canada and Australia. These contributions explore the various roles played by the Internet in radicalisation; the reasons why terroristic propaganda may or may not influence others to engage in violence; the role of political conflict in online radicalisation; and the future of research into terrorism and the internet. By covering this broad range of topics, the volume will make an important and timely addition to the current collections on a growing and international subject. This book will be of much interest to students and researchers of cyber-security, internet politics, terrorism studies, media and communications studies, and International Relations.
Part of our New Perspectives Series, this text offers a case-oriented, problem-solving approach for learning the basic to more advanced features of the Internet -- from browsing, navigating, and searching on the Internet, to using e-mail, advanced communication tools and other Web topics.