Compromised Data Book by Greg Elmer at Bookstore - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Society and Social Sciences > Society and culture: general > Cultural and media studies > Media studies > Compromised Data: From Social Media to Big Data
Compromised Data: From Social Media to Big Data

Compromised Data: From Social Media to Big Data


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

There has been a data rush in the past decade brought about by online communication and, in particular, social media (Facebook, Twitter, Youtube, among others), which promises a new age of digital enlightenment. But social data is compromised: it is being seized by specific economic interests, it leads to a fundamental shift in the relationship between research and the public good, and it fosters new forms of control and surveillance. Compromised Data: From Social Media to Big Data explores how we perform critical research within a compromised social data framework. The expert, international lineup of contributors explores the limits and challenges of social data research in order to invent and develop new modes of doing public research. At its core, this collection argues that we are witnessing a fundamental reshaping of the social through social data mining.

Table of Contents:
Notes on Contributors Introduction Ganaele Langlois, York University; Joanna Redden, University of Calgary and Greg Elmer, Toronto Metropolitan University, Canada Part 1: Data, Power and Politics Big Data as System of Knowledge: Investigating Canadian Governance Joanna Redden, University of Calgary, Canada Data Mining Research and the Disintegration of Society: the “Project X” Haren Riots Ingrid M. Hoofd, National University of Singapore, Singapore Look at the Man Behind the Curtain: Computational Management in “Spontaneous” Citizen Political Campaigning David Karpf, George Washington University, USA Part 2: Data Limit(ed) Easy Data, Hard Data: The politics and pragmatics of Twitter research after the computational turn Jean Burgess and Axel Bruns, Queensland University of Technology, Australia Scraping the First Person Greg Elmer, Toronto Metropolitan University, Canada Open Data and its Enemies? Digital Methods and Compromised Data Fenwick McKelvey, Concordia University, Canada Critical Reverse Engineering: The Case of Twitter and TalkOpen Robert Gehl, University of Utah, USA Part 3. Alt-Data Mapping Movements - Social Movement Research and Big Data: Critiques and Alternatives Sky Croeser and Tim Highfield, Curtin University, Australia Data Activism Alessandra Renzi, Northeastern University, USA, and Ganaele Langlois, York University, Canada A Contribution to the Political Economy of Personal Archives Yuk Hui, Leuphana University, Germany The Haunted Life of Data Lisa Blackman, Goldsmiths University, UK Index

About the Author :
Ganaele Langlois is Assistant Professor at York University, Canada, and Associate Director of the Infoscape Centre for the Study of Social Media, Toronto Metropolitan University, Canada. Her research focuses on new media theory, software studies and technoculture. Joanna Redden is Assistant Professor of Critical Media Studies at the University of Calgary, Canada. Her work investigates how digital technologies influence political, media, and protest practices specifically as related to poverty, inequality, and governance. Greg Elmer is Bell Globemedia Research Chair and Director of the Infoscape Centre for the Study of Social Media at Toronto Metropolitan University, Canada. His research and teaching focus on new media and politics, theories and methods in social media studies, surveillance theory, and media globalization.

Review :
Big data promise a more efficient understanding of citizen needs, wants, and desires and cast a wide net of harnessing these tendencies in the hope of bringing about more direct forms of democracy. At the same time, however, they do so at the cost of compromising personal data, in effect sacrificing the personal for the political. Compromised Data features contributions from leading scholars who examine the immediacy and complexity of data, big or small, and is a must read for all interested in these issues. Social theorists and champions of civil rights have long been concerned with the politics and practices of dataveillance, forms of surveillance accomplished through computation instead of by visual inspection. Yet, Compromised Data may be the first book that is so very clear about the threats and dangers of surveillance after the computational turn; after when, that is, the concern is not so much who sees whom, but whose data is captured by whom and what calculations are performed on that data. You have been instrumented -- through all your Internet-enabled devices -- to divulge where you are and when, what you say and write, with whom you associate, and what you are interested in. This book asks in very specific terms how we are compromised by big data. [CC] The digital age provides society with many advantages in the areas of communication and information on a personal, social, or political level. Here, more then ten international scholars who have examined the importance and complexity of social data and big data issues address the dangers that may occur in surveillance of online sites, including how and by whom this social data may be transformed and eventually controlled. Under the best scenario, data collection and analysis help society further the common good. However, the results of social data analysis can often be compromised. Avenues such as Facebook and Twitter allow users to share personal information, but often these sites are compromised by marketers who may use this information for profit. Clicking on a link frequently gives researchers worthwhile information, but even an innocuous click can be problematic. In addition, privacy is a major issue. Individuals innocently list information about their age, where they work and live, what their interests and concerns are, where they travel, etc., not realizing the potential adverse effects of their actions. Selected information from data collected online can lead to issues related to social profiling and guilt or innocence, as well as flag persons of interest. Overall, a thought-provoking book for all online users. Summing Up: Recommended. All readership levels.


Best Sellers


Product Details
  • ISBN-13: 9781501306532
  • Publisher: Bloomsbury Publishing PLC (Digital)
  • Publisher Imprint: Bloomsbury Academic USA
  • Language: English
  • Sub Title: From Social Media to Big Data
  • ISBN-10: 1501306537
  • Publisher Date: 30 Jul 2015
  • Binding: Digital (delivered electronically)
  • No of Pages: 296


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Compromised Data: From Social Media to Big Data
Bloomsbury Publishing PLC (Digital) -
Compromised Data: From Social Media to Big Data
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Compromised Data: From Social Media to Big Data

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!