Author: Perry Carpenter
Publisher: John Wiley & Sons
ISBN: 1119566371
Category : Computers
Languages : en
Pages : 368
Book Description
Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.
8 Steps to Better Security
Author: Kim Crawley
Publisher: John Wiley & Sons
ISBN: 1119811244
Category : Computers
Languages : en
Pages : 155
Book Description
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.
Publisher: John Wiley & Sons
ISBN: 1119811244
Category : Computers
Languages : en
Pages : 155
Book Description
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.
Rational Cybersecurity for Business
Author: Dan Blum
Publisher: Apress
ISBN: 9781484259511
Category : Computers
Languages : en
Pages : 330
Book Description
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business
Publisher: Apress
ISBN: 9781484259511
Category : Computers
Languages : en
Pages : 330
Book Description
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business
Proving the Value of Soft Skills
Author: Patricia Pulliam Phillips
Publisher: Association for Talent Development
ISBN: 1950496643
Category : Business & Economics
Languages : en
Pages : 328
Book Description
A Step-by-Step Guide to Showing the Value of Soft Skill Programs As organizations rise to meet the challenges of technological innovation, globalization, changing customer needs and perspectives, demographic shifts, and new work arrangements, their mastery of soft skills will likely be the defining difference between thriving and merely surviving. Yet few executives champion the expenditure of resources to develop these critical skills. Why is that and what can be done to change this thinking? For years, managers convinced executives that soft skills could not be measured and that the value of these programs should be taken on faith. Executives no longer buy that argument but demand the same financial impact and accountability from these functions as they do from all other areas of the organization. In Proving the Value of Soft Skills, measurement and evaluation experts Patti Phillips, Jack Phillips, and Rebecca Ray contend that efforts can and should be made to demonstrate the effect of soft skills. They also claim that a proven methodology exists to help practitioners articulate those effects so that stakeholders’ hearts and minds are shifted toward securing support for future efforts. This book reveals how to use the ROI Methodology to clearly show the impact and ROI of soft skills programs. The authors guide readers through an easy-to-apply process that includes: business alignment design evaluation data collection isolation of the program effects cost capture ROI calculations results communication. Use this book to align your programs with organizational strategy, justify or enhance budgets, and build productive business partnerships. Included are job aids, sample plans, and detailed case studies.
Publisher: Association for Talent Development
ISBN: 1950496643
Category : Business & Economics
Languages : en
Pages : 328
Book Description
A Step-by-Step Guide to Showing the Value of Soft Skill Programs As organizations rise to meet the challenges of technological innovation, globalization, changing customer needs and perspectives, demographic shifts, and new work arrangements, their mastery of soft skills will likely be the defining difference between thriving and merely surviving. Yet few executives champion the expenditure of resources to develop these critical skills. Why is that and what can be done to change this thinking? For years, managers convinced executives that soft skills could not be measured and that the value of these programs should be taken on faith. Executives no longer buy that argument but demand the same financial impact and accountability from these functions as they do from all other areas of the organization. In Proving the Value of Soft Skills, measurement and evaluation experts Patti Phillips, Jack Phillips, and Rebecca Ray contend that efforts can and should be made to demonstrate the effect of soft skills. They also claim that a proven methodology exists to help practitioners articulate those effects so that stakeholders’ hearts and minds are shifted toward securing support for future efforts. This book reveals how to use the ROI Methodology to clearly show the impact and ROI of soft skills programs. The authors guide readers through an easy-to-apply process that includes: business alignment design evaluation data collection isolation of the program effects cost capture ROI calculations results communication. Use this book to align your programs with organizational strategy, justify or enhance budgets, and build productive business partnerships. Included are job aids, sample plans, and detailed case studies.
Five Stars
Author: Carmine Gallo
Publisher: St. Martin's Press
ISBN: 1250183472
Category : Business & Economics
Languages : en
Pages : 255
Book Description
“As technology threatens to displace countless jobs and skills, the ability to communicate is becoming more important than ever. This book is full of examples to help you get better at transporting your thoughts and emotions into the minds of other people.” —Adam Grant, New York Times bestselling author of Give and Take, Originals, and Option B with Sheryl Sandberg How to master the art of persuasion—from the bestselling author of Talk Like TED. Ideas don’t sell themselves. As the forces of globalization, automation, and artificial intelligence combine to disrupt every field, having a good idea isn’t good enough. Mastering the ancient art of persuasion is the key to standing out, getting ahead, and achieving greatness in the modern world. Communication is no longer a “soft” skill—it is the human edge that will make you unstoppable, irresistible, and irreplaceable—earning you that perfect rating, that fifth star. In Five Stars, Carmine Gallo, bestselling author of Talk Like TED, breaks down how to apply Aristotle’s formula of persuasion to inspire contemporary audiences. As the nature of work changes, and technology carries things across the globe in a moment, communication skills become more valuable—not less. Gallo interviews neuroscientists, economists, historians, billionaires, and business leaders of companies like Google, Nike, and Airbnb to show first-hand how they use their words to captivate your imagination and ignite your dreams. In the knowledge age—the information economy—you are only as valuable as your ideas. Five Stars is a book to help you bridge the gap between mediocrity and exceptionality, and gain your competitive edge in the age of automation. In Five Stars, you will also learn: -The one skill billionaire Warren Buffett says will raise your value by 50 percent. -Why your job might fall into a category where 75 percent or more of your income relies on your ability to sell your idea. -How Airbnb’s founders follow a classic 3-part formula shared by successful Hollywood movies. -Why you should speak in third-grade language to persuade adult listeners. -The one brain hack Steve Jobs, Leonardo da Vinci, and Picasso used to unlock their best ideas.
Publisher: St. Martin's Press
ISBN: 1250183472
Category : Business & Economics
Languages : en
Pages : 255
Book Description
“As technology threatens to displace countless jobs and skills, the ability to communicate is becoming more important than ever. This book is full of examples to help you get better at transporting your thoughts and emotions into the minds of other people.” —Adam Grant, New York Times bestselling author of Give and Take, Originals, and Option B with Sheryl Sandberg How to master the art of persuasion—from the bestselling author of Talk Like TED. Ideas don’t sell themselves. As the forces of globalization, automation, and artificial intelligence combine to disrupt every field, having a good idea isn’t good enough. Mastering the ancient art of persuasion is the key to standing out, getting ahead, and achieving greatness in the modern world. Communication is no longer a “soft” skill—it is the human edge that will make you unstoppable, irresistible, and irreplaceable—earning you that perfect rating, that fifth star. In Five Stars, Carmine Gallo, bestselling author of Talk Like TED, breaks down how to apply Aristotle’s formula of persuasion to inspire contemporary audiences. As the nature of work changes, and technology carries things across the globe in a moment, communication skills become more valuable—not less. Gallo interviews neuroscientists, economists, historians, billionaires, and business leaders of companies like Google, Nike, and Airbnb to show first-hand how they use their words to captivate your imagination and ignite your dreams. In the knowledge age—the information economy—you are only as valuable as your ideas. Five Stars is a book to help you bridge the gap between mediocrity and exceptionality, and gain your competitive edge in the age of automation. In Five Stars, you will also learn: -The one skill billionaire Warren Buffett says will raise your value by 50 percent. -Why your job might fall into a category where 75 percent or more of your income relies on your ability to sell your idea. -How Airbnb’s founders follow a classic 3-part formula shared by successful Hollywood movies. -Why you should speak in third-grade language to persuade adult listeners. -The one brain hack Steve Jobs, Leonardo da Vinci, and Picasso used to unlock their best ideas.
Reality Is Broken
Author: Jane McGonigal
Publisher: Penguin
ISBN: 1101475498
Category : Psychology
Languages : en
Pages : 334
Book Description
“McGonigal is a clear, methodical writer, and her ideas are well argued. Assertions are backed by countless psychological studies.” —The Boston Globe “Powerful and provocative . . . McGonigal makes a persuasive case that games have a lot to teach us about how to make our lives, and the world, better.” —San Jose Mercury News “Jane McGonigal's insights have the elegant, compact, deadly simplicity of plutonium, and the same explosive force.” —Cory Doctorow, author of Little Brother A visionary game designer reveals how we can harness the power of games to boost global happiness. With 174 million gamers in the United States alone, we now live in a world where every generation will be a gamer generation. But why, Jane McGonigal asks, should games be used for escapist entertainment alone? In this groundbreaking book, she shows how we can leverage the power of games to fix what is wrong with the real world-from social problems like depression and obesity to global issues like poverty and climate change-and introduces us to cutting-edge games that are already changing the business, education, and nonprofit worlds. Written for gamers and non-gamers alike, Reality Is Broken shows that the future will belong to those who can understand, design, and play games. Jane McGonigal is also the author of SuperBetter: A Revolutionary Approach to Getting Stronger, Happier, Braver and More Resilient.
Publisher: Penguin
ISBN: 1101475498
Category : Psychology
Languages : en
Pages : 334
Book Description
“McGonigal is a clear, methodical writer, and her ideas are well argued. Assertions are backed by countless psychological studies.” —The Boston Globe “Powerful and provocative . . . McGonigal makes a persuasive case that games have a lot to teach us about how to make our lives, and the world, better.” —San Jose Mercury News “Jane McGonigal's insights have the elegant, compact, deadly simplicity of plutonium, and the same explosive force.” —Cory Doctorow, author of Little Brother A visionary game designer reveals how we can harness the power of games to boost global happiness. With 174 million gamers in the United States alone, we now live in a world where every generation will be a gamer generation. But why, Jane McGonigal asks, should games be used for escapist entertainment alone? In this groundbreaking book, she shows how we can leverage the power of games to fix what is wrong with the real world-from social problems like depression and obesity to global issues like poverty and climate change-and introduces us to cutting-edge games that are already changing the business, education, and nonprofit worlds. Written for gamers and non-gamers alike, Reality Is Broken shows that the future will belong to those who can understand, design, and play games. Jane McGonigal is also the author of SuperBetter: A Revolutionary Approach to Getting Stronger, Happier, Braver and More Resilient.
Hacking Multifactor Authentication
Author: Roger A. Grimes
Publisher: John Wiley & Sons
ISBN: 1119650801
Category : Computers
Languages : en
Pages : 576
Book Description
Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.
Publisher: John Wiley & Sons
ISBN: 1119650801
Category : Computers
Languages : en
Pages : 576
Book Description
Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.
Trojan Horse
Author: Mark Russinovich
Publisher: Macmillan
ISBN: 1250010497
Category : Fiction
Languages : en
Pages : 309
Book Description
It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team. But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace---more sophisticated than any virus seen before---has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance. A thrilling suspense story and a sober warning from one of the world's leading experts on cyber-security, Trojan Horse exposes the already widespread use of international cyber-espionage as a powerful and dangerous weapon, and the lengths to which one man will go to stop it.
Publisher: Macmillan
ISBN: 1250010497
Category : Fiction
Languages : en
Pages : 309
Book Description
It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team. But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace---more sophisticated than any virus seen before---has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance. A thrilling suspense story and a sober warning from one of the world's leading experts on cyber-security, Trojan Horse exposes the already widespread use of international cyber-espionage as a powerful and dangerous weapon, and the lengths to which one man will go to stop it.
Transmedia Storytelling and the New Era of Media Convergence in Higher Education
Author: Stavroula Kalogeras
Publisher: Springer
ISBN: 1137388374
Category : Social Science
Languages : en
Pages : 272
Book Description
Stories, whether they are fact or fiction, popular or not, are a proven method of pedagogy. In the age of media convergence and with the advancement of technology, stories have morphed into new forms; however, their core purpose remains the same, which is to pass on knowledge and information. The internet, with its inherent interactivity, and story, with its inherent capacity to engage, can lead to innovative and transformative learning experiences in media-rich environments. This book focuses on web-based Transmedia Storytelling Edutainment (TmSE) as an andragogical practice in higher education. Story is at the forefront of this investigation because narrative is the basis for developing entertainment media franchise that can be incorporated into pedagogical practice. The propulsion of this analysis consists of practice-based research through narrative inquiry and an e-module case study presented on multimedia storytelling in the classroom. A Transmedia Storytelling Framework is provided for creating screenplays for cross-media projects and for analyzing their appropriateness in education. Additionally, a hypertext screenplay, which allowed students to dig deeper into the story word and to build more knowledge, is evaluated for its use in higher education. Since screenplays are by nature writing for the screen, it is believed that the more visual the input, the more likely it is to be memorized and recalled. A link to The Goddess Within screenplay is available for download on the right hand side of this page.
Publisher: Springer
ISBN: 1137388374
Category : Social Science
Languages : en
Pages : 272
Book Description
Stories, whether they are fact or fiction, popular or not, are a proven method of pedagogy. In the age of media convergence and with the advancement of technology, stories have morphed into new forms; however, their core purpose remains the same, which is to pass on knowledge and information. The internet, with its inherent interactivity, and story, with its inherent capacity to engage, can lead to innovative and transformative learning experiences in media-rich environments. This book focuses on web-based Transmedia Storytelling Edutainment (TmSE) as an andragogical practice in higher education. Story is at the forefront of this investigation because narrative is the basis for developing entertainment media franchise that can be incorporated into pedagogical practice. The propulsion of this analysis consists of practice-based research through narrative inquiry and an e-module case study presented on multimedia storytelling in the classroom. A Transmedia Storytelling Framework is provided for creating screenplays for cross-media projects and for analyzing their appropriateness in education. Additionally, a hypertext screenplay, which allowed students to dig deeper into the story word and to build more knowledge, is evaluated for its use in higher education. Since screenplays are by nature writing for the screen, it is believed that the more visual the input, the more likely it is to be memorized and recalled. A link to The Goddess Within screenplay is available for download on the right hand side of this page.
The Social Media Reader
Author: Michael Mandiberg
Publisher: NYU Press
ISBN: 0814764053
Category : Computers
Languages : en
Pages : 300
Book Description
The first collection to address the collective transformation happening in response to the rise of social media With the rise of web 2.0 and social media platforms taking over vast tracts of territory on the internet, the media landscape has shifted drastically in the past 20 years, transforming previously stable relationships between media creators and consumers. The Social Media Reader is the first collection to address the collective transformation with pieces on social media, peer production, copyright politics, and other aspects of contemporary internet culture from all the major thinkers in the field. Culling a broad range and incorporating different styles of scholarship from foundational pieces and published articles to unpublished pieces, journalistic accounts, personal narratives from blogs, and whitepapers, The Social Media Reader promises to be an essential text, with contributions from Lawrence Lessig, Henry Jenkins, Clay Shirky, Tim O'Reilly, Chris Anderson, Yochai Benkler, danah boyd, and Fred von Loehmann, to name a few. It covers a wide-ranging topical terrain, much like the internet itself, with particular emphasis on collaboration and sharing, the politics of social media and social networking, Free Culture and copyright politics, and labor and ownership. Theorizing new models of collaboration, identity, commerce, copyright, ownership, and labor, these essays outline possibilities for cultural democracy that arise when the formerly passive audience becomes active cultural creators, while warning of the dystopian potential of new forms of surveillance and control.
Publisher: NYU Press
ISBN: 0814764053
Category : Computers
Languages : en
Pages : 300
Book Description
The first collection to address the collective transformation happening in response to the rise of social media With the rise of web 2.0 and social media platforms taking over vast tracts of territory on the internet, the media landscape has shifted drastically in the past 20 years, transforming previously stable relationships between media creators and consumers. The Social Media Reader is the first collection to address the collective transformation with pieces on social media, peer production, copyright politics, and other aspects of contemporary internet culture from all the major thinkers in the field. Culling a broad range and incorporating different styles of scholarship from foundational pieces and published articles to unpublished pieces, journalistic accounts, personal narratives from blogs, and whitepapers, The Social Media Reader promises to be an essential text, with contributions from Lawrence Lessig, Henry Jenkins, Clay Shirky, Tim O'Reilly, Chris Anderson, Yochai Benkler, danah boyd, and Fred von Loehmann, to name a few. It covers a wide-ranging topical terrain, much like the internet itself, with particular emphasis on collaboration and sharing, the politics of social media and social networking, Free Culture and copyright politics, and labor and ownership. Theorizing new models of collaboration, identity, commerce, copyright, ownership, and labor, these essays outline possibilities for cultural democracy that arise when the formerly passive audience becomes active cultural creators, while warning of the dystopian potential of new forms of surveillance and control.