![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
'Inclusive Designing' presents the proceedings of the seventh Cambridge Workshop on Universal Access and Assistive Technology (CWUAAT '14). It represents a unique multi-disciplinary workshop for the Inclusive Design Research community where designers, computer scientists, engineers, architects, ergonomists, policymakers and user communities can exchange ideas. The research presented at CWUAAT '14 develops methods, technologies, tools and guidance that support product designers and architects to design for the widest possible population for a given range of capabilities, within a contemporary social and economic context. In the context of developing demographic changes leading to greater numbers of older people and people with disabilities, the general field of Inclusive Design Research strives to relate the capabilities of the population to the design of products. Inclusive populations of older people contain a greater variation in sensory, cognitive and physical user capabilities. These variations may be co-occurring and rapidly changing leading to a demanding design environment. Recent research developments have addressed these issues in the context of: governance and policy; daily living activities; the workplace; the built environment, Interactive Digital TV and Mobile communications. Increasingly, a need has been identified for a multidisciplinary approach that reconciles the diverse and sometimes conflicting demands of Design for Ageing and Impairment, Usability and Accessibility and Universal Access. CWUAAT provides a platform for such a need. This book is intended for researchers, postgraduates, design practitioners, clinical practitioners, and design teachers.
This book describes pragmatic instruments and methods that enable business experts and software engineers to develop a common understanding of the software to be created, to determine their key requirements, and to manage the project in a way that fosters trust, encourages innovation and distributes risk fairly between clients and contractors. After an introduction to the fundamentals of agile software development in Part I, Part II describes the Interaction Room, an actual room where digitalization and mobilization strategies are developed, where technology potentials are evaluated, where software projects are planned and managed, and where business and technical stakeholders can communicate face to face, visualize complex relationships intuitively, and highlight value, effort and risk drivers that are keys to the project's success. After addressing these constructive aspects, the book focuses on the commercial aspects of software development: The adVANTAGE contract model described in Part III ensures that the insight-driven innovation process of software development does not just function, but is allowed to flourish in a trusted client-contractor relationship. Even though software contracting and construction may be grounded in two different academic disciplines, they are inseparable in practice, and how they interact is illustrated in the case study of developing a private health insurance benefit system in Part IV. Ultimately though, the success of every software project depends on the skills of the stakeholders. Part V therefore describes the qualification profile that software engineers and domain experts have to satisfy today. This book is aimed at CIOs, project managers and software engineers in industrial software development practice who want to learn how to effectively deal with the inevitable uncertainty of complex projects, who want to achieve higher levels of understanding and cooperation in their relationships with clients and contractors, and who want to run lower-risk software projects despite their inherent uncertainties.
This book proposes a combination of cognitive modeling with model-based user interface development to tackle the problem of maintaining the usability of applications that target several device types at once (e.g., desktop PC, smart phone, smart TV). Model-based applications provide interesting meta-information about the elements of the user interface (UI) that are accessible through computational introspection. Cognitive user models can capitalize on this meta-information to provide improved predictions of the interaction behavior of future human users of applications under development. In order to achieve this, cognitive processes that link UI properties to usability aspects like effectiveness (user error) and efficiency (task completion time) are established empirically, are explained through cognitive modeling, and are validated in the course of this treatise. In the case of user error, the book develops an extended model of sequential action control based on the Memory for Goals theory and it is confirmed in different behavioral domains and experimental paradigms. This new model of user cognition and behavior is implemented using the MeMo workbench and integrated with the model-based application framework MASP in order to provide automated usability predictions from early software development stages on. Finally, the validity of the resulting integrated system is confirmed by empirical data from a new application, eliciting unexpected behavioral patterns.
This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.
During the last few years, software evolution research has explored new domains such as the study of socio-technical aspects and collaboration between different individuals contributing to a software system, the use of search-based techniques and meta-heuristics, the mining of unstructured software repositories, the evolution of software requirements, and the dynamic adaptation of software systems at runtime. Also more and more attention is being paid to the evolution of collections of inter-related and inter-dependent software projects, be it in the form of web systems, software product families, software ecosystems or systems of systems. With this book, the editors present insightful contributions on these and other domains currently being intensively explored, written by renowned researchers in the respective fields of software evolution. Each chapter presents the state of the art in a particular topic, as well as the current research, available tool support and remaining challenges. The book is complemented by a glossary of important terms used in the community, a reference list of nearly 1,000 papers and books and tips on additional resources that may be useful to the reader (reference books, journals, standards and major scientific events in the domain of software evolution and datasets).This book is intended for all those interested in software engineering, and more particularly, software maintenance and evolution. Researchers and software practitioners alike will find in the contributed chapters an overview of the most recent findings, covering a broad spectrum of software evolution topics. In addition, it can also serve as the basis of graduate or postgraduate courses on e.g., software evolution, requirements engineering, model-driven software development or social informatics.
Brain-computer interface (BCI) technology provides a means of communication that allows individuals with severely impaired movement to communicate with assistive devices using the electroencephalogram (EEG) or other brain signals. The practicality of a BCI has been possible due to advances in multi-disciplinary areas of research related to cognitive neuroscience, brain-imaging techniques and human-computer interfaces. However, two major challenges remain in making BCI for assistive robotics practical for day-to-day use: the inherent lower bandwidth of BCI, and how to best handle the unknown embedded noise within the raw EEG. Brain-Computer Interfacing for Assistive Robotics is a result of research focusing on these important aspects of BCI for real-time assistive robotic application. It details the fundamental issues related to non-stationary EEG signal processing (filtering) and the need of an alternative approach for the same. Additionally, the book also discusses techniques for overcoming lower bandwidth of BCIs by designing novel use-centric graphical user interfaces. A detailed investigation into both these approaches is discussed.
With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.
The book presents research that contributes to the development of intelligent dialog systems to simplify diverse aspects of everyday life, such as medical diagnosis and entertainment. Covering major thematic areas: machine learning and artificial neural networks; algorithms and models; and social and biometric data for applications in human-computer interfaces, it discusses processing of audio-visual signals for the detection of user-perceived states, the latest scientific discoveries in processing verbal (lexicon, syntax, and pragmatics), auditory (voice, intonation, vocal expressions) and visual signals (gestures, body language, facial expressions), as well as algorithms for detecting communication disorders, remote health-status monitoring, sentiment and affect analysis, social behaviors and engagement. Further, it examines neural and machine learning algorithms for the implementation of advanced telecommunication systems, communication with people with special needs, emotion modulation by computer contents, advanced sensors for tracking changes in real-life and automatic systems, as well as the development of advanced human-computer interfaces. The book does not focus on solving a particular problem, but instead describes the results of research that has positive effects in different fields and applications.
Mobile devices allow users to remain connected with each other anytime and anywhere, but flaws and limitations in the design of mobile interfaces have often constituted frustrating obstacles to usability. Research and Design Innovations for Mobile User Experience offers innovative design solutions for mobile human-computer interfaces, addressing both challenges and opportunities in the field to pragmatically improve the accessibility of mobile technologies. Through cutting-edge empirical studies and investigative cases, this reference book will enable designers, developers, managers, and experts of mobile computer interfaces with the most up-to-date tools and techniques for providing their users with an outstanding mobile experience.
Through use of networked embedded devices, pervasive computing leaves the concept of personal computers far behind and are offers new opportunities for businesses to avail and to offer to their customers. Strategic Pervasive Computing Applications: Emerging Trends combines the views and opinions of leading experts and practitioners in the field of pervasive computing technologies and infrastructure, considering trends and developments in pervasive applications. This innovative publication provides a significant reference source for professionals, managers, risk assessment practitioners, policy makers, and academicians throughout the world.
Information technologies play a significant role in modern information-driven societies, making a comprehensive understanding of digital media a fundamental requisite to success. Cases on Usability Engineering: Design and Development of Digital Products provides readers with case studies and real-life examples on usability methods and techniques to test the design and development of digital products, such as web pages, video games, and mobile computer applications. Students, lecturers, and academics concentrating in computer science can use these cases to investigate how and why usability can improve the design of digital technology, offering diverse technological solutions that many academics have largely failed to disseminate. This book is part of the Advances in Human and Social Aspects of Technology series collection.
The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users' information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients' medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts' panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.
A new product can be easy or difficult to use, it can be efficient or cumbersome, engaging or dispiriting, it can support the way we work and think - or not. What options are available for systematically addressing such parameters and provide users with an appropriate functionality, usability and experience? In the last decades, several fields have evolved that encompass a user-centred approach to create better products for the people who use them. This book provides a comprehensible introduction to the subject. It is aimed first and foremost at people involved in software and product development - product managers, project managers, consultants and analysts, who face the major challenge of developing highly useful and usable products. Topics include: The most important user-centred techniques and their alignment in the development process Planning examples of user-centred activities for projects User-oriented approaches for organisations Real-life case studies Checklists, tips and a lot of background information provide help for practitioners
Future technical systems will be companion systems, competent assistants that provide their functionality in a completely individualized way, adapting to a user's capabilities, preferences, requirements, and current needs, and taking into account both the emotional state and the situation of the individual user. This book presents the enabling technology for such systems. It introduces a variety of methods and techniques to implement an individualized, adaptive, flexible, and robust behavior for technical systems by means of cognitive processes, including perception, cognition, interaction, planning, and reasoning. The technological developments are complemented by empirical studies from psychological and neurobiological perspectives.
This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society.
As technology continues to play a vital role in our everyday lives, advancements in human-computer interaction studies embrace ubiquitous computing as a tool for information processing to evolve into the human environment. Global Applications of Pervasive and Ubiquitous Computing provides the global applications and efforts in building and applying pervasive and ubiquitous computer technology. This book provides an essential collection of research on information technology for educators, researchers, and practitioners aiming to advance the practice and understanding of pervasive and ubiquitous applications.
This research contributes to the growing body of knowledge as well as offers significant theoretical contributions and policy implications. As far as the researcher's knowledge, this is the first research of its type that investigates the relationship between digital enabled transformation of government and citizens' trust & confidence in government. The proposed conceptual model also makes a novel contribution at a conceptual level, which can be used as a frame of reference by researchers as well as practitioners when planning ICT-enabled transformation projects in government. The context of the research is the Kingdom of Bahrain, the top-ranked country in ICT adoption in the Gulf Cooperation Council (GCC) region.
This book presents the edited proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), which was held on May 24-26, 2017 in Wuhan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science, share their experiences and exchange new ideas and information. The research results included relate to all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted to solve them. The work selected represents 17 of the most promising papers from the conference, written by authors who are certain to make further significant contributions to the field of computer and information science.
This edited collection will provide an overview of the field of physiological computing, i.e. the use of physiological signals as input for computer control. It will cover a breadth of current research, from brain-computer interfaces to telemedicine.
In recent years, searching for source code on the web has become increasingly common among professional software developers and is emerging as an area of academic research. This volume surveys past research and presents the state of the art in the area of "code retrieval on the web." This work is concerned with the algorithms, systems, and tools to allow programmers to search for source code on the web and the empirical studies of these inventions and practices. It is a label that we apply to a set of related research from software engineering, information retrieval, human-computer interaction, management, as well as commercial products. The division of code retrieval on the web into snippet remixing and component reuse is driven both by empirical data, and analysis of existing search engines and tools. Contributors include leading researchers from human-computer interaction, software engineering, programming languages, and management. "Finding Source Code on the Web for Remix and Reuse" consists of five parts. Part I is titled "Programmers and Practices," and consists of a retrospective chapter and two empirical studies on how programmers search the web for source code. Part II is titled "From Data Structures to Infrastructures," and covers the creation of ground-breaking search engines for code retrieval required ingenuity in the adaptation of existing technology and in the creation of new algorithms and data structures. Part III focuses on "Reuse: Components and Projects," which are reused with minimal modification. Part IV is on "Remix: Snippets and Answers," which examines how source code from the web can also be used as solutions to problems and answers to questions. The book concludes with Part V, "Looking Ahead," that looks at future programming and the legalities of software reuse and remix and the implications of current intellectual property law on the future of software development. The story, "Richie Boss: Private Investigator Manager," was selected as the winner of a crowdfunded short story contest."
This book is about the field of brain-computer interfaces (BCI) and the unique and special environment of active implants that electrically interface with the brain, spinal cord, peripheral nerves, and organs. At the heart of the book is the matter of repairing and rehabilitating patients suffering from severe neurologic impairments, from paralysis to movement disorders and epilepsy, that often requires an invasive solution based on an implanted device. Past achievements, current work, and future perspectives of BCI and other interactions between medical devices and the human nervous system are described in detail from a pragmatic point of view. Reviews the Active Implantable Medical Devices (AIMDs) industry and how it is moving from cardiac to neuro applications Clear, easy to read, presentation of the field of neuro-technologies for human benefit Provides easy to understand explanations about the technical limitations, the physics of implants in the human body, and realistic long terms perspectives
This edited book discusses the exciting field of Digital Creativity. Through exploring the current state of the creative industries, the authors show how technologies are reshaping our creative processes and how they are affecting the innovative creation of new products. Readers will discover how creative production processes are dominated by digital data transmission which makes the connection between people, ideas and creative processes easy to achieve within collaborative and co-creative environments. Since we rely on our senses to understand our world, perhaps of more significance is that technologies through 3D printing are returning from the digital to the physical world. Written by an interdisciplinary group of researchers this thought provoking book will appeal to academics and students from a wide range of backgrounds working or interested in the technologies that are shaping our experiences of the future.
Next Generation Mobile Networks and Ubiquitous Computing provides a comprehensive and unified view of the latest and most innovative research findings for university professors, researchers, students, and industry professionals alike. Presenting chapters by experts from across the globe, this reference offers a single body of knowledge to show the many existing interactions between mobile networking, wireless communications, and ubiquitous computing.
Large corporations like IBM and Oracle are using Excel dashboards and reports as a Business Intelligence tool, and many other smaller businesses are looking to these tools in order to cut costs for budgetary reasons. An effective analyst not only has to have the technical skills to use Excel in a productive manner but must be able to synthesize data into a story, and then present that story in the most impactful way. Microsoft shows its recognition of this with Excel. In Excel, there is a major focus on business intelligence and visualization. Data Visualization with Excel Dashboards and Reports fills the gap between handling data and synthesizing data into meaningful reports. This title will show readers how to think about their data in ways other than columns and rows. Most Excel books do a nice job discussing the individual functions and tools that can be used to create an "Excel Report". Titles on Excel charts, Excel pivot tables, and other books that focus on "Tips and Tricks" are useful in their own right; however they don't hit the mark for most data analysts. The primary reason these titles miss the mark is they are too focused on the mechanical aspects of building a chart, creating a pivot table, or other functionality. They don't offer these topics in the broader picture by showing how to present and report data in the most effective way. What are the most meaningful ways to show trending? How do you show relationships in data? When is showing variances more valuable than showing actual data values? How do you deal with outliers? How do you bucket data in the most meaningful way? How do you show impossible amounts of data without inundating your audience? In Data Visualization with Excel Reports and Dashboards, readers will get answers to all of these questions. Part technical manual, part analytical guidebook; this title will help Excel users go from reporting data with simple tables full of dull numbers, to creating hi-impact reports and dashboards that will wow management both visually and substantively. This book offers a comprehensive review of a wide array of technical and analytical concepts that will help users create meaningful reports and dashboards. After reading this book, the reader will be able to: Analyze large amounts of data and report their data in a meaningful way Get better visibility into data from different perspectives Quickly slice data into various views on the fly Automate redundant reporting and analyses Create impressive dashboards and What-If analyses Understand the fundamentals of effective visualization Visualize performance comparisons Visualize changes and trends over time
This book offers practical advice on managing enterprise modeling (EM) projects and facilitating participatory EM sessions. Modeling activities often involve groups of people, and models are created in a participatory way. Ensuring that this is done efficiently requires dedicated individuals who know how to organize modeling projects and sessions, how to manage discussions during these sessions, and what aspects influence the success and efficiency of modeling in practice. The book also includes a summary of the theoretical background to EM, although participatory modeling can also be used in conjunction with other methods that are not made for EM, such as those made for goal-oriented requirements engineering and information systems analysis. The first four chapters present an overview of enterprise modeling from various viewpoints (including methods, processes and organizational challenges), providing a background for those that need to refresh their basic knowledge. The next six chapters form the core of the book and detail the roles and competences needed in an EM project, typical stakeholder behaviors and how to handle them, tools and methods for managing participatory modeling and facilitation, and how to train modeling experts for these social aspects of modeling. Lastly, a concluding chapter presents a summary and an outlook on current research in participatory EM. This book is intended for anybody who wants to learn more about how to facilitate participatory modeling in practice and how to set up and carry out EM projects. It does not require any in-depth knowledge about specific EM methods and tools, and can be used by students and lecturers for courses on participatory modeling, and by practitioners wanting to extend their knowledge of social and organizational topics to become an experienced facilitator and EM project manager. |
You may like...
The Handbook of Multimodal-Multisensor…
Sharon Oviatt, Bjoern Schuller, …
Hardcover
Renewable Energy Systems - Modelling…
Ahmad Taher Azar, Nashwa Ahmad Kamal
Paperback
R3,687
Discovery Miles 36 870
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter
Paperback
Predictive Filtering for Microsatellite…
Lu Cao, Xiaoqian Chen, …
Paperback
R2,819
Discovery Miles 28 190
|