Listing 1 - 10 of 2403 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Collective Action 2.0 explores the issues related to information and communication technologies (ICTs) in detail, providing a balanced insight into how ICTs leverage and interact with collective action, which will have an impact on the current discourse. Recent events in different authoritarian regimes, such as Iran and Egypt, have drawn global attention to a developing phenomenon in collective action: People tend to organize through different social media platforms for political protest and resistance. This phenomenon describes a change in social structure and behavior tied to ICT. Social media platforms have been used to leverage collective action, which has in some cases arguably lead, to political revolution. The phenomenon also indicates that the way information is organized affects the organization of social structures with which it interoperates. The phenomenon also has another side, which is the use of social media for activist suppression, state and corporate surveillance, commodifi cation of social processes, demobilization, or for the mobilization of collective action toward undesirable ends. Analyzes social media and collective action in an in-depth and balanced manner Presents an account of avoiding technological determinism, utopianism, and fundamentalism Considers the underlying theory behind quick-paced social media Takes an interdisciplinary approach that will resonate with all those interested in social media and collective action, regardless of fi eld specialism
Choose an application
Choose an application
Choose an application
Choose an application
Quatrième de couverture : "Cet ouvrage est destiné à tous ceux qui souhaitent débuter ou renforcer leur présence sur les réseaux sociaux. Il couvre en particulier les différentes facettes du plus célèbre d'entre eux, Facebook, mais pas seulement : les principaux réseaux sociaux, généralistes et spécialisés, amicaux ou professionnels, y sont abordés, comme Twitter, Snapchat, LinkedIn, Instagram ou YouTube. Les questions de sécurité et de confidentialité sont également traitées, afin de protéger votre vie privée tout en profitant des réseaux sociaux. Découvrez comment : - les réseaux sociaux ont pris de l'importance dans notre quotidien - assurer votre confidentitalité et la sécurité de vos données - publier et partager du contenu sur Facebook - effectuer du microblogging avec Twitter - rejoindre et utiliser Snapchat - étoffer votre réseau profesionnel avec LinkedIn - Partager du contenu sur Intagram et YouTube"
Choose an application
"Social media users fracture into tribes, but social media ecosystems are globally interconnected technically, socially, culturally, and economically. At the crossroads, Huatong Sun, author of Cross-Cultural Technology Design, presents theory, method, and case studies to uncover the global interconnectedness of social media design and reorient universal design standards. Centering on the dynamics between structure and agency, Sun draws on practices theories and transnational fieldwork and articulates a critical design approach. The "CLUE2 (CLUE Squared)" framework extends from situated activity to social practice, and connects macro institutions with micro interactions to redress asymmetrical relations in everyday life. Why were Japanese users not crazed about Facebook? Would Twitter have had been more successful than its copycat Weibo in China if not banned? How did mobilities and value propositions play out in the competition of WhatsApp, WeChat, LINE, and KakaoTalk for global growth? Illustrating the cultural entanglement with a relational view of design, Sun provides three provocative accounts of cross-cultural social media design and use. Concepts such as affordance, genre, and uptake are demonstrated as design tools to bind the material with the discursive and leap from the critical to the generative for culturally sustaining design."--
Choose an application
Choose an application
This book examines how social media functions like a prism that distorts our identities, empowers status-seeking extremists, and renders moderates all but invisible. It challenges common myths about echo chambers, foreign misinformation campaigns, and radicalizing algorithms, revealing that the solution to political tribalism lies deep inside ourselves.
Listing 1 - 10 of 2403 | << page >> |
Sort by
|