Compromised Data : (Record no. 892104)

001 - CONTROL NUMBER
control field EBL2077089
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
additional material characteristics m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr -n---------
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150719s2015||||||| s|||||||||||eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781501306525
Terms of availability 89 (NL)
035 ## - SYSTEM CONTROL NUMBER
System control number (AU-PeEL)2077089
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)912277790
040 ## - CATALOGING SOURCE
Original cataloging agency AU-PeEL
Language of cataloging eng
Transcribing agency AU-PeEL
Modifying agency AU-PeEL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9 .D343 C4785 2015
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
-- 006.312
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9 .D343 C4785 2015
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Elmer, Greg.
245 10 - TITLE STATEMENT
Title Compromised Data :
Remainder of title From Social Media to Big Data
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Bloomsbury Publishing,
Date of publication, distribution, etc 2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (297 p.)
490 0# - SERIES STATEMENT
Series statement eBooks on Demand
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Title Page; Copyright Page; Contents; Notes on Contributors; Chapter 1 Introduction: Compromised Data-From Social Media to Big Data; The mineable social; Big social data and governance; Compromised data; Rebuilding the social; References; Part One: Data, Power, and Politics; Chapter 2 Big Data as System of Knowledge: Investigating Canadian Governance; Introduction; Method; Findings; Conclusion; References; Chapter 3 Data Mining Research and the Disintegration of Society: The "Project X" Haren Riots; Understanding the "Accidental" Haren riots
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note The mediated suppression of social despair and disintegrationThe rioters as technocratic "war machines"; Fatalities: The ghostly return of the humanist spirit; References; Chapter 4 Look at the Man Behind the Curtain: Computational Management in "Spontaneous" Citizen Political Campaigning; Introduction; Change.org to the rescue: Trayvon Martin and "GOTP" campaign techniques; MoveOn.org effect 2, electric boogaloo; We The People's neutral administrative logic; Comparative affordances; A week in the life of a distributed petition site; Stability; Signature growth; Additional trends
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Conclusion: Divergent logics and escaping the warehouse metaphorReferences; Part Two: Data Limit(ed); Chapter 5 Easy Data, Hard Data: The Politics and Pragmatics of Twitter Research After the Computational Turn; The implications of the computational turn; Platform politics and regimes of access; The changing scientific affordances of twitter data; Conclusions; References; Chapter 6 Scraping the First Person; Scraper analytics; Screen and interface scraping; Crawler scraping-index and content; API scraping; Conclusions; References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 7 Openness Compromised? Questioning the Role of Openness in Digital Methods and Contemporary Critical PraxisIntroduction; Digital methods and the value of opening; Digital methods and the exploit; Opening up the black box of the Web: Web archiving and its praxis; The convenience of open data for the digital enclosure; Platform studies and me-centricity; Is openness still relevant?; References; Chapter 8 Critical Reverse Engineering: The Case of Twitter and TalkOpen; Introduction; Reverse engineering and the humanities; The pragmatic orientation; The genealogical orientation
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note The legal orientationThe normative orientation; Reverse engineering twitter: The case of TalkOpen; Pragmatic; Genealogical; Legal; Normative; What went wrong with TalkOpen?; Conclusion: Critical reverse engineering as a bridge between engineering and humanities; References; Part Three: Alt-Data; Chapter 9 Mapping Movements-Social Movement Research and Big Data: Critiques and Alternatives; Introduction; Big data and social movements; The ethics of social movement research; New biases in data collection and analysis; Mapping big data methodologies for social movement research?
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Concluding thoughts and directions forward
520 ## - SUMMARY, ETC.
Summary, etc There has been a data rush in the past decade brought about by online communication and, in particular, social media (Facebook, Twitter, Youtube, among others), which promises a new age of digital enlightenment. But social data is compromised: it is being seized by specific economic interests, it leads to a fundamental shift in the relationship between research and the public good, and it fosters new forms of control and surveillance. Compromised Data: From Social Media to Big Data explores how we perform critical research within a compromised social data framework. The expert, international
588 ## -
-- Description based upon print version of record.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Big data.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data mining -- Social aspects.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Online social networks.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Social media.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Langlois, Ganaele.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Redden, Joanna.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Elmer, Greg
Title Compromised Data : From Social Media to Big Data
Place, publisher, and date of publication New York : Bloomsbury Publishing,c2015
International Standard Book Number 9781501306501
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://uttyler.eblib.com/patron/FullRecord.aspx?p=2077089">http://uttyler.eblib.com/patron/FullRecord.aspx?p=2077089</a>
Link text Click here to view this ebook.
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
Platform EBL
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book
Source of classification or shelving scheme
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
          UT Tyler Online UT Tyler Online Online 2015-07-20 QA76.9 .D343 C4785 2015 EBL2077089 2015-07-20 http://uttyler.eblib.com/patron/FullRecord.aspx?p=2077089 2015-07-20 Electronic Book