You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity—a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the r...
Frank Beck sexually and physically abused more than 200 looked after children while working as a residential care home manager for Leicestershire County Council. This book shows how he got away with it, after gulling social workers and council managers. It is a new edition of a paperback originally published in 1998, with an additional new chapter on Greville Janner MP. Janner, a lawyer, backbencher and influential figure in Labour, avoided prosecution for his involvement in the Leicestershire care scandal, despite being named as an abuser during the criminal case against Beck. In an epilogue to this new, enlarged edition of this acclaimed book on the scandal, Paul Gosling deals with Janner'...
The first detailed history of Code for America that examines how democratically designed government systems can collectively improve technology’s impact on society. For decades, tens of thousands of volunteers and employees of Code for America have taken a different path to institutional change: through designing and implementing infrastructure. In Politics Recoded, Aure Schrock employs a robust, organizational ethnography to analyze how Code for America’s infrastructural organizing changed how politics get exercised, showing how we citizens can work directly with the government on projects to improve our collective livelihoods. Drawing from theories of organizing, social infrastructure,...
A nuanced account from a user perspective of what it’s like to live in a datafied world. We live in a media-saturated society that increasingly transforms our experiences, relations, and identities into data others can analyze and monetize. Algorithms are key to this process, surveilling our most mundane practices, and to many, their control over our lives seems absolute. In Living with Algorithms, Ignacio Siles critically challenges this view by surveying user dynamics in the global south across three algorithmic platforms—Netflix, Spotify, and TikTok—and finds, surprisingly, a more balanced relationship. Drawing on a wealth of empirical evidence that privileges the user over the corp...
In a world increasingly run by algorithms and artificial intelligence, Hatim Rahman traces how organizations are using algorithms to control workers in an “invisible cage.” Inside the Invisible Cage uses unique longitudinal data to investigate how digital labor platforms use algorithms to dictate the actions of high-skilled workers by determining accepted behaviors, work opportunities, and even success. As Hatim Rahman explains, employers can use algorithms to shift rules and guidelines without notice, explanation, or recourse for workers. The invisible cage signals a profound shift in the way markets and organizations categorize and ultimately control people. Unlike previous forms of labor control, the invisible cage is ubiquitous, yet it is also opaque and shifting, which makes breaking free from it difficult for workers. This book traces how the invisible cage was developed over time and the implications it has for the spread of new technology, such as generative artificial intelligence. Inside the Invisible Cage also provides organizations, workers, and policymakers with insights on how to ensure the future of work has truly equitable, mutually beneficial outcomes.
A favorable reputation is an asset of importance that no public sector entity can afford to neglect because it gives power, autonomy, and access to critical resources. However, reputations must be built, maintained, and protected. As a result, public sector organizations in most OECD countries have increased their capacity for managing reputation. This edited volume seeks to describe, explain, and critically analyze the significance of organizational reputation and reputation management activities in the public sector. This book provides a comprehensive first look at how reputation management and branding efforts in public organizations play out, focusing on public agencies as formal organiz...
"Reinventing Discovery argues that we are in the early days of the most dramatic change in how science is done in more than 300 years. This change is being driven by new online tools, which are transforming and radically accelerating scientific discovery"--
Do new forms of connection need more regulation and control? These fascinating essays explore the question from technical, socio-philosophical and design perspectives.
An exploration of the Dark Web—websites accessible only with special routing software—that examines the history of three anonymizing networks, Freenet, Tor, and I2P. The term “Dark Web” conjures up drug markets, unregulated gun sales, stolen credit cards. But, as Robert Gehl points out in Weaving the Dark Web, for each of these illegitimate uses, there are other, legitimate ones: the New York Times's anonymous whistleblowing system, for example, and the use of encryption by political dissidents. Defining the Dark Web straightforwardly as websites that can be accessed only with special routing software, and noting the frequent use of “legitimate” and its variations by users, journ...
This text examines medical microbiology from the viewpoint of the biomedical scientist based in a microbiology laboratory. It explains the basis of key laboratory techniques as applied to medical microbiology - including bacteriology, mycology, and virology - how and why they work, and what they can tell us.