توضیحاتی در مورد کتاب Compromised Data: From Social Media to Big Data
نام کتاب : Compromised Data: From Social Media to Big Data
عنوان ترجمه شده به فارسی : داده های در معرض خطر: از رسانه های اجتماعی تا داده های بزرگ
سری :
نویسندگان : Ganaele Langlois, Joanna Redden, Greg Elmer (editors)
ناشر : Bloomsbury Academic
سال نشر : 2015
تعداد صفحات : 297
ISBN (شابک) : 9781501306501 , 9781501306525
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 6 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Title Page\nCopyright Page\nContents\nNotes on Contributors\nChapter 1 Introduction: Compromised Data—From Social Media to Big Data\n The mineable social\n Big social data and governance\n Compromised data\n Rebuilding the social\n References\nPart One: Data, Power, and Politics\n Chapter 2 Big Data as System of Knowledge: Investigating Canadian Governance\n Introduction\n Method\n Findings\n Conclusion\n References\n Chapter 3 Data Mining Research and the Disintegration of Society: The “Project X” Haren Riots\n Understanding the “Accidental” Haren riots\n The mediated suppression of social despair and disintegration\n The rioters as technocratic “war machines”\n Fatalities: The ghostly return of the humanist spirit\n References\n Chapter 4 Look at the Man Behind the Curtain: Computational Management in “Spontaneous” Citizen Political Campaigning\n Introduction\n Change.org to the rescue: Trayvon Martin and “GOTP” campaign techniques\n MoveOn.org effect 2, electric boogaloo\n We The People’s neutral administrative logic\n Comparative affordances\n A week in the life of a distributed petition site\n Stability\n Signature growth\n Additional trends\n Conclusion: Divergent logics and escaping the warehouse metaphor\n References\nPart Two: Data Limit(ed)\n Chapter 5 Easy Data, Hard Data: The Politics and Pragmatics of Twitter Research After the Computational Turn\n The implications of the computational turn\n Platform politics and regimes of access\n The changing scientific affordances of twitter data\n Conclusions\n References\n Chapter 6 Scraping the First Person\n Scraper analytics\n Screen and interface scraping\n Crawler scraping—index and content\n API scraping\n Conclusions\n References\n Chapter 7 Openness Compromised? Questioning the Role of Openness in Digital Methods and Contemporary Critical Praxis\n Introduction\n Digital methods and the value of opening\n Digital methods and the exploit\n Opening up the black box of the Web: Web archiving and its praxis\n The convenience of open data for the digital enclosure\n Platform studies and me-centricity\n Is openness still relevant?\n References\n Chapter 8 Critical Reverse Engineering: The Case of Twitter and TalkOpen\n Introduction\n Reverse engineering and the humanities\n The pragmatic orientation\n The genealogical orientation\n The legal orientation\n The normative orientation\n Reverse engineering twitter: The case of TalkOpen\n Pragmatic\n Genealogical\n Legal\n Normative\n What went wrong with TalkOpen?\n Conclusion: Critical reverse engineering as a bridge between engineering and humanities\n References\nPart Three: Alt-Data\n Chapter 9 Mapping Movements—Social Movement Research and Big Data: Critiques and Alternatives\n Introduction\n Big data and social movements\n The ethics of social movement research\n New biases in data collection and analysis\n Mapping big data methodologies for social movement research?\n Concluding thoughts and directions forward\n References\n Chapter 10 Data Activism\n Introduction\n Transindividuation and data activism: Socio-technical and political considerations\n Occupy Streams: Data and social media platform politics\n Occupy Data: Data visualization and knowledge production\n Creative data activism\n Conclusions\n References\n Chapter 11 A Contribution to the Political Economy of Personal Archives\n Introduction\n The archive after decentralization\n Archive and milieu\n Objects and care\n Conclusion\n References\n Chapter 12 The Haunted Life of Data\n Introduction: A case for small data\n The Bargh controversy\n Hans the horse: Scene 1—Refraction\n Bargh’s retort: Scene 2—Resurrection and the work of interference\n Letting the horse lie: Scene 3—Resurrecting ghosts and diffractive reading\n Denouement: Setting the record straight\n Acknowledgments\n References\nIndex