LEADER 02610nam 2200613 a 450 001 9910138873803321 005 20200520144314.0 010 $a1-118-40487-4 010 $a1-119-20785-1 010 $a1-283-54264-1 010 $a9786613855091 010 $a1-118-40485-8 035 $a(CKB)2550000000107718 035 $a(EBL)968085 035 $a(OCoLC)799764312 035 $a(SSID)ssj0000693119 035 $a(PQKBManifestationID)11444036 035 $a(PQKBTitleCode)TC0000693119 035 $a(PQKBWorkID)10637805 035 $a(PQKB)11422046 035 $a(MiAaPQ)EBC968085 035 $a(Au-PeEL)EBL968085 035 $a(CaPaEBR)ebr10580160 035 $a(CaONFJC)MIL385509 035 $a(OCoLC)793503527 035 $a(EXLCZ)992550000000107718 100 $a20120511d2012 uy 0 101 0 $aeng 135 $aur|n#|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aShare this$b[electronic resource] $ethe social media handbook for PR professionals /$fChartered Institute of Public Relations (CIPR) ; edited by Stephen Waddington 210 $aChichester, West Sussex, U.K. $cJohn Wiley & Sons$d2012 215 $a1 online resource (246 pages) 300 $aIncludes index. 311 $a1-118-40484-X 327 $apt. 1. Changing media, changing PR -- pt. 2. Planning -- pt. 3. Networks -- pt. 4. Online media relations -- pt. 5. Monitoring and measurement -- pt. 6. Skills -- pt. 7. Industry change -- pt. 8. The future. 330 $aShare This is a practical handbook to the biggest changes taking place in the media and its professions by the Chartered Institute of Public Relations (CIPR) Social Media Panel. The book was conceived and written by more than 20 public relations practitioners representing a cross-section of public, private and voluntary sector expertise using many of the social tools and techniques that it addresses. The book is split into 26 chapters over eight topic areas covering the media and public relations industry, planning, social networks, online media relations, monitoring and measurement, skiiis 606 $aPublic relations 606 $aSocial media 608 $aElectronic books. 615 0$aPublic relations. 615 0$aSocial media. 676 $a659.20285/4678 701 $aWaddington$b Stephen$0906318 712 02$aChartered Institute of Public Relations. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910138873803321 996 $aShare this$92094012 997 $aUNINA LEADER 02997nam 22004575 450 001 996418289603316 005 20210210040325.0 010 $a3-030-66172-5 024 7 $a10.1007/978-3-030-66172-4 035 $a(CKB)4100000011689984 035 $a(DE-He213)978-3-030-66172-4 035 $a(MiAaPQ)EBC6447681 035 $a(PPN)25251484X 035 $a(EXLCZ)994100000011689984 100 $a20201228d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Privacy Management, Cryptocurrencies and Blockchain Technology$b[electronic resource] $eESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17?18, 2020, Revised Selected Papers /$fedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Jordi Herrera-Joancomarti 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XV, 460 p. 111 illus., 71 illus. in color.) 225 1 $aSecurity and Cryptology ;$v12484 311 $a3-030-66171-7 327 $aDPM Workshop Fairness, Differential Privacy and Scalability -- Utility, Diversity and Leakage Resistance -- Obfuscation, Contact Tracing and Engineering. CBT Workshop Transactions, Mining, Second Layer and Inter-bank Payments -- Signature Schemes, Formal Methods and Incentivization. 330 $aThis book constitutes the revised selected post conference proceedings of the 15th International Workshop on Data Privacy Management, DPM 2020, and the 4th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2020, held in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020, held in Guildford, UK in September 2020. For the CBT Workshop 8 full and 4 short papers were accepted out of 24 submissions. The selected papers are organized in the following topical headings: Transactions, Mining, Second Layer and Inter-bank Payments. The DPM Workshop received 38 submissions from which 12 full and 5 short papers were selected for presentation. The papers focus on Second Layer, Signature Schemes, Formal Methods, Privacy, SNARKs and Anonymity. 410 0$aSecurity and Cryptology ;$v12484 606 $aComputer security 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer security. 615 14$aSystems and Data Security. 676 $a005.8 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNavarro-Arribas$b Guillermo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHerrera-Joancomarti$b Jordi$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996418289603316 996 $aData Privacy Management, Cryptocurrencies and Blockchain Technology$92182305 997 $aUNISA