![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
This book explores a society currently being transformed by the influence of advanced information technology, and provides insights into the main technological and human issues and a holistic approach to inclusion, security, safety and, last but not least, privacy and freedom of expression. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services offered by governments, private institutions, and commercial companies. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflow, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. The purpose of this book is to help in outlining and understanding a realistic scenario of what we can term e-Citizenry. It identifies today's citizen, who is surrounded by an abundance of digital services, as an "e-Citizen" and explores the transition from their traditional role and behaviour to new ones. The respective chapters presented here will lay the foundation of the technological and social environment in which this societal transition takes place. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.
This book offers a clear, yet comprehensive guide to how to structure a design project, focusing in particular on the key questions designers, architects, policy makers and health professionals should consider when working towards inclusion through design. The book is based on a series of lessons held by the author and his colleague Avril Accolla, whose aim was to train technicians at all levels to be capable of catering for the needs of the elderly. It clearly draws the outline of their "Ask the Right Question" approach, whose purpose is to help convey the notions in question appropriately to people with such widely different backgrounds, curricula, interests and cultures. Using a minimalist approach, based mainly on the discussion of eye-catching real-life examples placed in logical order and a crystal clear, engaging style, this book is a must-have for designers, technicians, customers and health practitioners, as well as social scientists and policy makers who deal with inclusive design at different levels and anyone interested in topics related to technological evolution and social integration.
Collaboration among individuals - from users to developers - is central to modern software engineering. It takes many forms: joint activity to solve common problems, negotiation to resolve conflicts, creation of shared definitions, and both social and technical perspectives impacting all software development activity. The difficulties of collaboration are also well documented. The grand challenge is not only to ensure that developers in a team deliver effectively as individuals, but that the whole team delivers more than just the sum of its parts. The editors of this book have assembled an impressive selection of authors, who have contributed to an authoritative body of work tackling a wide range of issues in the field of collaborative software engineering. The resulting volume is divided into four parts, preceded by a general editorial chapter providing a more detailed review of the domain of collaborative software engineering. Part 1 is on "Characterizing Collaborative Software Engineering," Part 2 examines various "Tools and Techniques," Part 3 addresses organizational issues, and finally Part 4 contains four examples of "Emerging Issues in Collaborative Software Engineering." As a result, this book delivers a comprehensive state-of-the-art overview and empirical results for researchers in academia and industry in areas like software process management, empirical software engineering, and global software development. Practitioners working in this area will also appreciate the detailed descriptions and reports which can often be used as guidelines to improve their daily work.
The ability to harness Information Communication Technologies
(ICTs) is increasingly at the heart of competitiveness and
sustainable growth. As countries engage in an increasingly
competitive global economy, they are trying to weave ICT into their
development strategies, in the same way enterprises have learned to
use ICT to transform their business models and strategies. This
integration offers a new path to development that is responsive to
the challenges of our times. In National Strategies to Harness Information Technology, Nagy
Hanna and Peter Knight provide a framework for assessing the
opportunities, challenges, and prospects for "e-transformation"and
for analyzing the options and innovations adopted to manage the
e-transformation process. They ask hard questions: what does it
take to harness ICT to transform an economy? Why some countries
accelerate their development journey with ICT while others fail?
How did successful countries balance the need for strategic
leadership with bottom up innovation? Can countries reduce the
risks of digital divide? What have been the roles of government and
private sectors? What lessons can be learned for countries at
different levels of development? Featuring contributions from country experts, the editors and
authors provide in-depth case studies of ICT deployment in
Singapore, Finland, the Philippines, and South Africa, and asses
the progress of such efforts. The result is an essential resource
for academic researchers, policy analysts, policymakers, and
industry leaders interested in the role of ICT in national
development, innovation, and economic growth.In National Strategies
to Harness Information Technology, Nagy Hanna and Peter Knight
provide a framework for assessing the opportunities, challenges,
and prospects for "e-transformation"and for analyzing the options
and innovations adopted to manage the e-transformation process.
They ask hard questions: what does it take to harness ICT to
transform an economy? Why some countries accelerate their
development journey with ICT while others fail? How did successful
countries balance the need for strategic leadership with bottom up
innovation? Can countries reduce the risks of digital divide? What
have been the roles of government and private sectors? What lessons
can be learned for countries at different levels of
development? Featuring contributions from country experts, the editors and authors provide in-depth case studies of ICT deployment in Singapore, Finland, the Philippines, and South Africa, and asses the progress of such efforts. The result is an essential resource for academic researchers, policy analysts, policymakers, and industry leaders interested in the role of ICT in national development, innovation, and economic growth."
Focuses on the process by which manually crafting interactive, hypertextual maps clarifies one's own understanding, communicates it to others, and enables collective intelligence. The authors see mapping software as visual tools for reading and writing in a networked age. In an information ocean, the challenge is to find meaningful patterns around which we can weave plausible narratives. Maps of concepts, discussions and arguments make the connections between ideas tangible - and critically, disputable. With 22 chapters from leading researchers and practitioners (5 of them new for this edition), the reader will find the current state-of-the-art in the field. Part 1 focuses on knowledge maps for learning and teaching in schools and universities, before Part 2 turns to knowledge maps for information analysis and knowledge management in professional communities, but with many cross-cutting themes: * reflective practitioners documenting the most effective ways to map * conceptual frameworks for evaluating representations * real world case studies showing added value for professionals * more experimental case studies from research and education * visual languages, many of which work on both paper and with software * knowledge cartography software, much of it freely available and open source * visit the companion website for extra resources: books.kmi.open.ac.uk/knowledge-cartography Knowledge Cartography will be of interest to learners, educators, and researchers in all disciplines, as well as policy analysts, scenario planners, knowledge managers and team facilitators. Practitioners will find new perspectives and tools to expand their repertoire, while researchers will find rich enough conceptual grounding for further scholarship.
Usability testing and user experience research typically take
place in a controlled lab with small groups. While this type of
testing is essential to user experience design, more companies are
also looking to test large sample sizes to be able compare data
according to specific user populations and see how their
experiences differ across user groups. But few usability
professionals have experience in setting up these studies,
analyzing the data, and presenting it in effective ways. Online
usability testing offers the solution by allowing testers to elicit
feedback simultaneously from 1,000s of users. "Beyond the Usability
Lab" offers tried and tested methodologies for conducting online
usability studies. It gives practitioners the guidance they need to
collect a wealth of data through cost-effective, efficient, and
reliable practices. The reader will develop a solid understanding
of the capabilities of online usability testing, when it s
appropriate to use and not use, and will learn about the various
types of online usability testing techniques. *The first guide for conducting large-scale user experience research using the internet *Presents how-to conduct online tests with 1000s of participants from start to finish *Outlines essential tips for online studies to ensure cost-efficient and reliable results "
Pervasive computing enables users to interact with information resources in their everyday lives. The development of computational technologies that can exist in ever smaller devices while simultaneously increasing processing power allows such devices to blend seamlessly into tangible environments. Intelligent Technologies and Techniques for Pervasive Computing provides an extensive discussion of such technologies, theories and practices in an attempt to shed light on current trends and issues in the adaption of pervasive systems. Within its pages, students and practitioners of computer science will find both recent developments and practical applications an overview of the field and how intelligent techniques can help to improve user experience in the distribution and consumption of pertinent, timely information. This book is part of the Advances in Computational Intelligence and Robotics series collection.
At first sight, the concept of web personalization looks deceivingly simple. A web personalization system is a software component that collects information on visitors to a web site and leverages this knowledge to deliver them the right content, tailoring presentation to the user's needs. All over the world, web designers and web content managers rely on web personalization solutions to improve the effectiveness and - ability of their web-based applications. Still, the scientific foundation of web personalization remains a controversial issue. Practitioners know very well that when properly implemented, personalization del- ers a much better user experience; but when it is poorly implemented, personalization may backfire and even distract the user's attention away from some useful (and co- ly-to-develop) enriched content. In other words, tailoring content, and varying it routinely, may make a site more attractive; but an unstable site look can have a negative impact on the overall m- sage. Everybody seems to agree that this is a real danger; but there are specific qu- tions that are much harder to answer convincingly.
This book introduces state-of-the-art research on simulation and serious games for education. Based partially on work presented at the 3rd Asia-Europe Symposium on Simulation and Serious Games (3rd AESSSG) held in Zhuhai, China as part of the 2016 ACM SIGGRAPH International Conference on Virtual-Reality Consortium and Applications in Industry (VRACI 2016), it includes a selection of the best papers from both. The book is divided into three major domains of education applications that use simulation and serious games: science, technology, engineering and mathematics (STEM) education; special needs education; and humanity and social science education. A valuable resource for researchers and developers in simulation and serious games for education benefit from this book, it also offers educators and professionals involved in training insights into the possible applications of simulation and serious games in various areas.
Assistive and augmentive communication is an emerging research area receiving much support from the disabled community. It enables communication for those with impairments or restrictions on the production or comprehension of spoken or written language. Assistive and Augmentive Communication for the Disabled: Intelligent Technologies for Communication, Learning and Teaching provides benefits to the professionals and researchers working in various disciplines in the field, such as special education, healthcare, computational intelligence and information technology. Moreover, this book provides insights and support to individuals who are concerned with the development of children and adults with disabilities. It covers recently completed studies, as well as ongoing research, to provide a cutting-edge window into this area of promising, new applications.
End users have become increasingly integrated into computing environments, necessitating continued inquiry into successful models for end user design and development and the impact that these models have on performance and productivity. End-User Computing, Development and Software Engineering: New Challenges explores the implementation of organizational and end user computing initiatives and provides foundational research to further the understanding of this discipline and its related fields. This book reviews the factors and barriers to ICT adoption in organizations, opportunities and benefits of communities of practice, and impact that end user computing can have on overall firm performance.
What Is BCI2000? BCI2000 is a general-purpose software platform for brain-computer interface (BCI) research. It can also be used for a wide variety of data acquisition, stimulus p- sentation, and brain monitoring applications. BCI2000 has been in development since 2000 in a project led by the Brain-Computer Interface R&D Program at the Wadsworth Center of the New York State Department of Health in Albany, New York, USA, with substantial contributions by the Institute of Medical Psychology and Behavioral Neurobiology at the University of Tubingen, Germany. In addition, many laboratories around the world, most notably the BrainLab at Georgia State University in Atlanta, Georgia, and Fondazione Santa Lucia in Rome, Italy, have also played an important role in the project's development. Mission The mission of the BCI2000 project is to facilitate research and the development of applications in all areas that depend on real-time acquisition, processing, and feedback of biosignals. Vision Our vision is that BCI2000 will become a widely used software tool for diverse areas of research and development.
Computer-Aided Innovation (CAI) is emerging as a strategic domain of research and application to support enterprises throughout the overall innovation process. The 5.4 Working Group of IFIP aims at defining the scientific foundation of Computer Aided Innovation systems and at identifying state of the art and trends of CAI tools and methods. These Proceedings derive from the second Topical Session on Computer- Aided Innovation organized within the 20th World Computer Congress of IFIP. The goal of the Topical Session is to provide a survey of existing technologies and research activities in the field and to identify opportunities of integration of CAI with other PLM systems. According to the heterogeneous needs of innovation-related activities, the papers published in this volume are characterized by multidisciplinary contents and complementary perspectives and scopes. Such a richness of topics and disciplines will certainly contribute to the promotion of fruitful new collaborations and synergies within the IFIP community. Gaetano Cascini th Florence, April 30 20 08 CAI Topical Session Organization The IFIP Topical Session on Computer-Aided Innovation (CAI) is a co-located conference organized under the auspices of the IFIP World Computer Congress (WCC) 2008 in Milano, Italy Gaetano Cascini CAI Program Committee Chair [email protected]
MUSIC 2013 will be the most comprehensive text focused on the various aspects of Mobile, Ubiquitous and Intelligent computing. MUSIC 2013 provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of intelligent technologies in mobile and ubiquitous computing environment. MUSIC 2013 is the next edition of the 3rd International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC-12, Vancouver, Canada, 2012) which was the next event in a series of highly successful International Workshop on Multimedia, Communication and Convergence technologies MCC-11 (Crete, Greece, June 2011), MCC-10 (Cebu, Philippines, August 2010).
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion
Human-in-the-Loop Simulations is a compilation of articles from experts in the design, development, and use of human-in-the-loop simulations. The first section of the handbook consists of papers on fundamental concepts in human-in-the-loop simulations, such as object-oriented simulation development, interface design and development, and performance measurement. The second section includes papers from researchers who utilized HITL simulations to inform models of cognitive processes to include decision making and metacognition. The last section describes human-in-the-loop processes for complex simulation models in trade space exploration and epidemiological analyses. Human-in-the-Loop Simulations is a useful tool for multiple audiences, including graduate students and researchers in engineering and computer science.
To solve performance problems in modern computing infrastructures, often comprising thousands of servers running hundreds of applications, spanning multiple tiers, you need tools that go beyond mere reporting. You need tools that enable performance analysis of application workflow across the entire enterprise. That's what PDQ (Pretty Damn Quick) provides. PDQ is an open-source performance analyzer based on the paradigm of queues. Queues are ubiquitous in every computing environment as buffers, and since any application architecture can be represented as a circuit of queueing delays, PDQ is a natural fit for analyzing system performance. Building on the success of the first edition, this considerably expanded second edition now comprises four parts. Part I contains the foundational concepts, as well as a new first chapter that explains the central role of queues in successful performance analysis. Part II provides the basics of queueing theory in a highly intelligible style for the non-mathematician; little more than high-school algebra being required. Part III presents many practical examples of how PDQ can be applied. The PDQ manual has been relegated to an appendix in Part IV, along with solutions to the exercises contained in each chapter. Throughout, the Perl code listings have been newly formatted to improve readability. The PDQ code and updates to the PDQ manual are available from the author's web site at www.perfdynamics.com
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the benefits of previous research efforts. In this context, the IFIP Working Group 11.6 on Identity Management has been founded in August 2006. The intention of the Working Group is to offer a broad forum for the exchange of knowledge and for the tracking and discussion of issues and new developments. In this, we take an interdisciplinary approach. Scientists as well as practitioners, from government and business, who are involved in the field of identity management are welcome to participate. The IDMAN 2007 Conference on Policies and Research in Identity Management was the very first conference organized by this Working Group. We aim to organize conferences bi-annually. The IDMAN 2007 Conference has been centered around the theme of National Identity Management or, in other words, identity management in the public sector.
In this book, the capability map, a novel general representation of the kinematic capabilities of a robot arm, is introduced. The capability map allows to determine how well regions of the workspace are reachable for the end effector in different orientations. It is a representation that can be machine processed as well as intuitively visualized for the human. The capability map and the derived algorithms are a valuable source of information for high- and low-level planning processes. The versatile applicability of the capability map is shown by examples from several distinct application domains. In human-robot interaction, a bi-manual interface for tele-operation is objectively evaluated. In low-level geometric planning, more human-like motion is planned for a humanoid robot while also reducing the computation time. And in high-level task reasoning, the suitability of a robot for a task is evaluated.
Quality is not a fixed or universal property of software; it depends on the context and goals of its stakeholders. Hence, when you want to develop a high-quality software system, the first step must be a clear and precise specification of quality. Yet even if you get it right and complete, you can be sure that it will become invalid over time. So the only solution is continuous quality control: the steady and explicit evaluation of a product's properties with respect to its updated quality goals. This book guides you in setting up and running continuous quality control in your environment. Starting with a general introduction on the notion of quality, it elaborates what the differences between process and product quality are and provides definitions for quality-related terms often used without the required level of precision. On this basis, the work then discusses quality models as the foundation of quality control, explaining how to plan desired product qualities and how to ensure they are delivered throughout the entire lifecycle. Next it presents the main concepts and techniques of continuous quality control, discussing the quality control loop and its main techniques such as reviews or testing. In addition to sample scenarios in all chapters, the book is rounded out by a dedicated chapter highlighting several applications of different subsets of the presented quality control techniques in an industrial setting. The book is primarily intended for practitioners working in software engineering or quality assurance, who will benefit by learning how to improve their current processes, how to plan for quality, and how to apply state-of-the-art quality control techniques. Students and lecturers in computer science and specializing in software engineering will also profit from this book, which they can use in practice-oriented courses on software quality, software maintenance and quality assurance.
This book examines agile approaches from a management perspective by focusing on matters of strategy, implementation, organization and people. It examines the turbulence of the marketplace and business environment in order to identify what role agile management has to play in coping with such change and uncertainty. Based on observations, personal experience and extensive research, it clearly identifies the fabric of the agile organization, helping managers to become agile leaders in an uncertain world. The book opens with a broad survey of agile strategies, comparing and contrasting some of the major methodologies selected on the basis of where they lie on a continuum of ceremony and formality, ranging from the minimalist technique-driven and software engineering focused XP, to the pragmatic product-project paradigm that is Scrum and its scaled counterpart SAFe (R), to the comparatively project-centric DSDM. Subsequently, the core of the book focuses on DSDM, owing to the method's comprehensive elaboration of program and project management practices. This work will chiefly be of interest to all those with decision-making authority within their organizations (e.g., senior managers, line managers, program, project and risk managers) and for whom topics such as strategy, finance, quality, governance and risk management constitute a daily aspect of their work. It will, however, also be of interest to those readers in advanced management or business administration courses (e.g., MBA, MSc), who wish to engage in the management of agile organizations and thus need to adapt their skills and knowledge accordingly. |
You may like...
Brain Machine Interfaces for Space…
Luca Rossini, Dario Izzo
Hardcover
R4,841
Discovery Miles 48 410
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter
Paperback
Usability Testing for Survey Research
Emily Geisen, Jennifer Romano Bergstrom
Paperback
|