You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives. Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats. - Hot topics like cyber terrorism, Big Data, and Somali pirates, addressed in terms the layperson can understand, with solid research grounding - Fills a gap in existing literature on intelligence, technology, and national security
The present volume of essays examines women's communication as it has evolved historically across multiple mediums. Part I explores how women became "gossip girls" and the important role of gossip in the perception and practice of female communication. Essays in Part II cover the convergence of oral and written communication in women's literature. Gendered performance in such arenas as salsa dance, Dr. Phil and the Internet is examined in Part III, and essays in Part IV discuss women's communication in the technology-rich 21st century.
In Defence of Welfare 2 brings together nearly fifty short pieces from a diverse range of social policy academics and commentators, policy makers and journalists that focus on developments in ‘welfare’ over the last five years of Coalition Government. Following on from the successful publication In Defence of Welfare, (Social Policy Association 2011) published in response to the government's first Major Spending Review), this second volume reflects on the impact of recent welfare reforms and explores how inequalities in income, wealth and well-being have become firmly entrenched in society. It considers how welfare can and should develop going forward in order to promote a more equal society.
While "economic forces" are often cited as being a key cause of language loss, there is very little research that explores this link in detail. This work, based on policy analysis and ethnographic data, addresses this deficit. It examines how neoliberalism, the dominant economic orthodoxy of recent decades, has impacted the vitality of Irish in the Republic of Ireland since 2008. Drawing on concepts well established in public policy studies, but not prominent in the subfield of language policy, the neoliberalisation of Irish-language support measures is charted, including the disproportionately severe budget cuts they received. It is argued that neoliberalism’s antipathy towards social pla...
Once celebrated for connecting people and circulating ideas, social media are facing mounting criticisms about their anticompetitive reach, addictive design, and toxicity to democracy. Known cumulatively as the “techlash,” journalists, users, and politicians are asking social media platforms to account for being too big, too engaging, and too unruly. In the age of the techlash, strategies to regulate how platforms operate technically, economically, and legally, are often stacked against individual tactics to manage the effects of social media by disconnecting from them. These disconnection practices—from restricting screen time and detoxing from device use to deleting apps and accounts...
About the Book What is the bright sun without the night sky? Perhaps at first it would appear pleasant. Constant sun filled days is ideal. Is it not? But in all actuality it would be a turning point of an unconceivable event with an unexpected aftermath. A new world government is birth out of calamity and the greatest devastation the entire earth has ever succumb. Lordia, the young queen with no crown decked with gems nor a palace on high is the promise for a simple way of life. Along with an orphan born to be a king a purpose if fulfilled. But in the mist is a secret that holds the power to destroy the government. With the purpose fulfilled, the promise becomes ensnared with the secret. The...
How do people have relationships when they are apart, or develop them when they've never even met? From MySpace and weblogs to romance and sexuality, this book draws together a range of studies on «remote relationships», investigating the intricate, intimate ways that people forge connections online. The term 'remote' refers to the technologies that facilitate forms of communication, and also underlines the lack of physicality involved in these relationships, developed at a distance. Using empirical data, these collected essays explore a wide variety of relationships, examining the methodological and ethical issues that researchers face. Remote Relationships in a Small World, part of a new generation of online studies, responds to the need for research that focuses on social relationships.
Exploring the social implications of digital transformation, as well as demonstrating how we might use digital transformation to further sociological knowledge, this incisive Handbook provides an extensive overview of cutting-edge research on the digital turn of modern society. This title contains one or more Open Access chapters.
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. - Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures - Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks - Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
The Oxford Handbook of Digital Technology and Society will equip readers with the necessary starting points and provocations in the fields of social science and technology so that students, scholars, and policy makers can effectively assess future research, practice, and policy.