Listing 1 - 10 of 49 | << page >> |
Sort by
|
Choose an application
Choose an application
This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form.
Choose an application
Choose an application
Choose an application
Computers --- Hackers. --- Spam (Electronic mail) --- Access control.
Choose an application
Choose an application
Spam (Electronic mail) --- Internet marketing --- Corrupt practices.
Choose an application
Computers --- Hackers. --- Spam (Electronic mail) --- Access control.
Choose an application
"Forget everything you know about spam. Now, let's talk about spam. Digital Distortions is about the power behind producing deviant media categories. This book explores the politics behind categories we take for granted such as spam and noise, and what this power means for our broader understanding of media. Despite being an inseparable part of our lives, we know very little about these media categories. The book synthesizes approaches such as media theory, sound studies, feminist technoscience and software studies into a new composition to explore media power. Through the concepts of processed listening and rhythmedia, Digital Distortions draws on sound and sound's ability to cross boundaries as a conceptual framework to think and examine media power more productively. Drawing on repositories of legal, technical and archival sources, Digital Distortions amplifies three stories about media distortions. The book shows that spam received different names in different periods; it is part of a larger project to influence the way people think, understand, and engage with media. The book starts in the early 20th century with Bell Telephone's production of noise. The next story jumps several decades to the web metric standardization in the European Union and the production of spam. The final story focuses on the 2010s and the way Facebook constructs unwanted behaviours. These stories show how deviant categories re-draw boundaries between human and non-human, public and private spaces, and, importantly, social and antisocial"--
Information technology --- Mass media --- Spam (Electronic mail) --- Noise --- Social aspects.
Choose an application
Spam (Electronic mail) --- Internet advertising --- Electronic commerce --- Corrupt practices
Listing 1 - 10 of 49 | << page >> |
Sort by
|