You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"Drawing on academic and practical expertise, Phippen and Street offer a much needed youth-centered and evidence-based approach to safeguarding young people online. Constructive and accessible, but upfront and unapologetic about the need to rethink taken-for-granted assumptions about youth, digital media and risk, this book is required reading for those working in the field. The book deftly builds a case for reform to policy and practice, and presents a workable and practical model for doing so." - - Dr Emily Setty, University of Surrey, UK. Author of Risk and Harm in Youth Sexting Culture: Young People's Perspectives This book explores online resilience and safety from a new perspective, by...
Incorporating HC 508-i-iv, session 2006-07. For Volume 1, see (ISBN 9780215520807)
Addressing citizens' perceptions of information systems, this book seeks to deliver relevant overviews and recommendations and how security can be consequentially enabled in order to allow its integration into technological services.
Truly international in scope, this Handbook focuses on approaches to discipline, surveillance and social control from around the world, critically examining the strategies and practices schools employ to monitor students and control their behavior. Bringing together leading scholars from a range of disciplinary backgrounds, the chapters scrutinize, analyze and compare schools' practices across the globe, providing a critical review of existing evidence, debates and understandings, while looking forward to address emerging important questions and key policy issues. The chapters are divided into four sections. Part 1 offers accounts of international trends in school discipline, surveillance an...
Social media are changing the way businesses interact in technology-mediated ways with most of their stakeholders. Conventional wisdom is being challenged and virtual workspaces that had never been conceptualized are opening at blistering speed. This volume identifies and demystifies this set of exciting new family of user-generated content technol
Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world. New technologies are generating both privacy and security issues involving anonymity, cross-border transactions, virtual communications, and assets, among others.This book is a collection of works by experts on cyber matters and legal considerations that need addressing in a timely manner. It comprises cross-disciplinary knowledge that is pooled to this end. Risk mitigation tools, including cyber risk management, data pro...
Personal internet Security : 5th report of session 2006-07, Vol. 2: Evidence
The intricate fields of information systems and information technology consist of innumerable interrelated facets from hardware to software and creators to end users. All systems inevitably encounter errors or problems, and as new solutions are found and created in today's complex world of technology, it is essential to look at systems as complete entities when searching for solutions and answers.Systems Approach Applications for Developments in Information Technology addresses the essential need to look at systems as a complete unit through using systems approach in the field of IT. This complete reference is designed for all information technology professionals to better understand their current jobs and future goals through the pivotal idea of systems approach as applied in software engineering, systems engineering, and complex systems.