|
|
Books > Computing & IT > Social & legal aspects of computing > General
From virtual assistants to social robots, people are increasingly
interacting with intelligent and highly communicative technologies
throughout their daily lives. This shift from communicating with
people to communicating with people and machines challenges how
scholars have theorized and studied communication. Human-Machine
Communication: Rethinking Communication, Technology, and Ourselves
addresses this transition in how people communicate and who, or
what, they communicate with and the implications of this evolution
for communication research. Geared toward scholars interested in
people's interactions with technology, this book serves as an
introduction to human-machine communication (HMC) as a specific
area of study within communication (encompassing human-computer
interaction, human-robot interaction, and human-agent interaction)
and to the research possibilities of HMC. This collection includes
papers presented as part of a scholarly conference on HMC, along
with invited works from noted researchers. Topics include defining
HMC, theoretical approaches to HMC, applications of HMC, and the
larger implications of HMC for self and society. The research
presented here focuses on people's interactions with multiple
technologies (artificial intelligence, algorithms, and robots) used
within different contexts (home, workplace, education, journalism,
and healthcare) from a variety of epistemological and
methodological approaches (empirical, rhetorical, and
critical/cultural). Overall, Human-Machine Communication provides
readers with an understanding of HMC in a way that supports and
promotes further scholarly inquiry in a growing area of
communication research.
Avatar, Assembled is a curated volume that unpacks videogame and
virtual world avatars-not as a monolithic phenomenon (as they are
usually framed) but as sociotechnical assemblages, pieced together
from social (human-like) features like voice and gesture to
technical (machine-like) features like graphics and glitches. Each
chapter accounts for the empirical, theoretical, technical, and
popular understandings of these avatar "components"-60 in
total-altogether offering a nuanced explication of
avatars-as-assemblages as they matter in contemporary society and
in individual experience. The volume is a "crossover" piece in
that, while it delves into complex ideas, it is written in a way
that will be accessible and interesting to students, researchers,
designers, and practitioners alike.
An optimistic and nuanced portrait of a generation that has much to
teach us about how to live and collaborate in our digital world.
Born since the mid-1990s, members of Generation Z comprise the
first generation never to know the world without the internet, and
the most diverse generation yet. As Gen Z starts to emerge into
adulthood and enter the workforce, what do we really know about
them? And what can we learn from them? Gen Z, Explained is the
authoritative portrait of this significant generation. It draws on
extensive interviews that display this generation's candor, surveys
that explore their views and attitudes, and a vast database of
their astonishingly inventive lexicon to build a comprehensive
picture of their values, daily lives, and outlook. Gen Z emerges
here as an extraordinarily thoughtful, promising, and perceptive
generation that is sounding a warning to their elders about the
world around them-a warning of a complexity and depth the "OK
Boomer" phenomenon can only suggest. Much of the existing
literature about Gen Z has been highly judgmental. In contrast,
this book provides a deep and nuanced understanding of a generation
facing a future of enormous challenges, from climate change to
civil unrest. What's more, they are facing this future head-on,
relying on themselves and their peers to work collaboratively to
solve these problems. As Gen Z, Explained shows, this group of
young people is as compassionate and imaginative as any that has
come before, and understanding the way they tackle problems may
enable us to envision new kinds of solutions. This portrait of Gen
Z is ultimately an optimistic one, suggesting they have something
to teach all of us about how to live and thrive in this digital
world.
The volume explores the consequences of recent events in global
Internet policy and possible ways forward following the 2012 World
Conference on International Telecommunications (WCIT-12). It offers
expert views on transformations in governance, the future of
multistakeholderism and the salience of cybersecurity. Based on the
varied backgrounds of the contributors, the book provides an
interdisciplinary perspective drawing on international relations,
international law and communication studies. It addresses not only
researchers interested in the evolution of new forms of
transnational networked governance, but also practitioners who wish
to get a scholarly reflection on current regulatory developments.
It notably provides firsthand accounts on the role of the WCIT-12
in the future of Internet governance.
 |
Electronic Government
- 15th IFIP WG 8.5 International Conference, EGOV 2016, Guimaraes, Portugal, September 5-8, 2016, Proceedings
(Paperback, 1st ed. 2016)
Hans Jochen Scholl, Olivier Glassey, Marijn Janssen, Bram Klievink, Ida Lindgren, …
|
R2,238
Discovery Miles 22 380
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the 15th IFIP WG
8.5 International Conference on Electronic Government, EGOV 2016,
held in Guimaraes, Portugal, in September 2016, in conjunction with
the 8th International Conference on eParticipation, ePart 2016. The
24 revised full papers presented were carefully reviewed and
selected from 87 submissions. The papers are clustered under the
following topical sections: foundations; benchmarking and
evaluation; information integration and governance; services;
evaluation and public values; EGOV success and failure; governance;
social media; engagement; processes; policy-making; trust,
transparency and accountability; open government and big/open data;
smart government/governance/cities.
This book constitutes the refereed proceedings of the 5th
International Conference on Electronic Government and the
Information Systems Perspective, EGOVIS 2016, held in Porto,
Portugal, in September 2016, in conjunction with DEXA 2015. The 22
revised full papers presented together with three invited talk were
carefully reviewed and selected from 27 submissions. The papers are
organized in the following topical sections: e-government cases -
legal issues; e-government cases - technical issues; open data and
transparency; knowledge representation and modeling in
e-government; intelligent systems in e-government; e-government
research and intelligent systems; e-government data and knowledge
management; identity management in e-government.
This book discusses all critical privacy and data protection
aspects of biometric systems from a legal perspective. It contains
a systematic and complete analysis of the many issues raised by
these systems based on examples worldwide and provides several
recommendations for a transnational regulatory framework. An
appropriate legal framework is in most countries not yet in place.
Biometric systems use facial images, fingerprints, iris and/or
voice in an automated way to identify or to verify (identity)
claims of persons. The treatise which has an interdisciplinary
approach starts with explaining the functioning of biometric
systems in general terms for non-specialists. It continues with a
description of the legal nature of biometric data and makes a
comparison with DNA and biological material and the regulation
thereof. After describing the risks, the work further reviews the
opinions of data protection authorities in relation to biometric
systems and current and future (EU) law. A detailed legal
comparative analysis is made of the situation in Belgium, France
and the Netherlands. The author concludes with an evaluation of the
proportionality principle and the application of data protection
law to biometric data processing operations, mainly in the private
sector. Pleading for more safeguards in legislation, the author
makes several suggestions for a regulatory framework aiming at
reducing the risks of biometric systems. They include limitations
to the collection and storage of biometric data as well as
technical measures, which could influence the proportionality of
the processing. The text is supported by several figures and tables
providing a summary of particular points of the discussion. The
book also uses the 2012 biometric vocabulary adopted by ISO and
contains an extensive bibliography and literature sources.
This work is an assessment of how to manage risk in property
transactions in the context of the move from paper-based to
electronic conveyancing (eConveyancing). In particular the focus is
on risks that impact on title registration, and the security,
protection or lack thereof that this registration offers to land
owners, third parties and property claimants. The impact is the
extent to which a change in the transactional process may
unintentionally affect risk (being the consequence of change and
the likelihood of that consequence having a negative effect). The
risks are identified, analysed and evaluated against the backdrop
of title registration and the development of eConveyancing through
a comparative analysis of the systems in Ireland and Ontario, while
also referencing other developing electronic systems around the
globe.
The information infrastructure - comprising computers, embedded
devices, networks and software systems - is vital to operations in
every sector: chemicals, commercial facilities, communications,
critical manufacturing, dams, defense industrial base, emergency
services, energy, financial services, food and agriculture,
government facilities, healthcare and public health, information
technology, nuclear reactors, materials and waste, transportation
systems, and water and wastewater systems. Global business and
industry, governments, indeed society itself, cannot function if
major components of the critical information infrastructure are
degraded, disabled or destroyed.Critical Infrastructure Protection
XVI describes original research results and innovative applications
in the interdisciplinary field of critical infrastructure
protection. Also, it highlights the importance of weaving science,
technology and policy in crafting sophisticated, yet practical,
solutions that will help secure information, computer and network
assets in the various critical infrastructure sectors. Areas of
coverage include: Industrial Control Systems Security;
Telecommunications Systems Security; Infrastructure Security. This
book is the 16th volume in the annual series produced by the
International Federation for Information Processing (IFIP) Working
Group 11.10 on Critical Infrastructure Protection, an international
community of scientists, engineers, practitioners and policy makers
dedicated to advancing research, development and implementation
efforts focused on infrastructure protection. The book contains a
selection of 11 edited papers from the Fifteenth Annual IFIP WG
11.10 International Conference on Critical Infrastructure
Protection, held as a virtual event during March, 2022. Critical
Infrastructure Protection XVI is an important resource for
researchers, faculty members and graduate students, as well as for
policy makers, practitioners and other individuals with interests
in homeland security.
|
|