You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Teen Computer Interaction is concerned with the design, evaluation and implementation of technologies for teenagers and with the study of major phenomena surrounding them. It aims to give special consideration to the unique development issues and diversity of this particular user group. Teenagers are possibly the most diverse, dynamic and technologically-aware user group. Working with teenagers can enable researchers to gather valuable insights and opportunities to inform the design and implementation of new technologies. Researchers have now begun to acknowledge that Teen Computer Interaction is a specialised area of HCI and this book brings together some of the best work in this field to-d...
To the Collector Belong the Spoils rethinks collecting as an artistic, revolutionary, and appropriative modernist practice, which flourishes beyond institutions like museums or archives. Through a constellation of three author-collectors—Henry James, Walter Benjamin, and Carl Einstein—Annie Pfeifer examines the relationship between literary modernism and twentieth-century practices of collecting objects. From James's paper hoarding to Einstein's mania for African art and Benjamin's obsession with old Russian toys, she shows how these authors' literary techniques of compiling, gleaning, and reassembling constitute a modernist style of collecting which that reimagines the relationship betw...
Teenagers, Sexual Health Information and the Digital Age examines the online resources available on teenagers, including games and digital interventions. In addition, it highlights current issues such as sexting and pornography. Information needs and provisions are examined, and existing sexual health interventions and digital interventions are discussed, gathering both teenagers' and sexual health professionals' views on these services. In addition to a review of the current literature on sexual health and teenagers, the book examines groups of teenagers, particularly those vulnerable to risky sex and asks what are the predictors of these behaviors and what can be done to address the behaviors. Finally, the book will also provide reflections and practical advice on the ethical issues associated with research in this context. - Provides guidance on the ethical issues with research associated with this topic - Covers both teenagers' information needs as well as their existing levels of knowledge - Assesses how teenagers engage with, and evaluate, sexual health information - Addresses the challenges inherent in the online environment, such as unreliable and misleading information
Warning! Creating Images on Fabric Can Be Addictive. Includes 13 Quilt Projects & Exhibition Gallery. 13 innovative projects with step-by-step instructions and inspiring digital techniques. Getting-started chapter on equipment, supplies, printing on fabric, and image-editing software. Gallery of more than 40 entries selected for the Innovative Fabric Imagery special exhibit in Houston. This book is filled with inspiration for fabric artists, from projects that show step by step how to make art quilts using your own photos and images, to galleries of stunning art made by some of today's most innovative quilters. Have fun creating artistic effects with image-editing software such as Photoshop® Elements and Kaleidoscope Kreator 2, then printing your images on fabric and turning them into fabulous quilts.
In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Cyber Influence and Cognitive Threats...
None
A new data-driven approach to building customer relationships that fuel sustainable business growth Igniting Customer Connections explores how organizations of all sizes can build powerful and profitable customer relationships in a today's increasingly complex, fast-paced, and fragmented marketplace. Written by the president of one of the world's largest marketing firms, the book provides expert insights about connecting with customers effectively across all channels and over time. The central premise is a refreshingly different, evidence-based approach called Return On Experience and Engagement, or ROE2, which delivers a new way to inspire and measure customer connections—and improve busi...
Indigenous cultures are not terra nullius — nobody’s land, free to be taken. True Tracks is a groundbreaking work that paves the way for respectful and ethical engagement with Indigenous cultures. Using real-world cases and personal stories, award-winning Meriam/Wuthathi lawyer Dr Terri Janke draws on twenty years of professional experience to inform and inspire people working across many industries – from art and architecture, to film and publishing, dance, science and tourism. What Indigenous materials and knowledge are you using? How will your project affect and involve Indigenous communities? Are you sharing your profits with those communities? True Tracks helps answer these questi...
Tony Benn's final instalment of diaries centres on a decade which saw the disintegration of Eastern Europe, an unprecedented assault on the labour movement at home, the fall of Margaret Thatcher and the tragic war in the Gulf. It is a period which marks the peak of Tony Benn's reputation as a brilliant parliamentarian. This final volume of diaries gives us insight into an era of extraordinary international and domestic political life making it one of the most important political writings of our time.
None