![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Advice involves recommendations on what to think; through thought, on what to choose; and via choices, on how to act. Advice is information that moves by communication, from advisors to the recipient of advice. Ivan Jureta offers a general way to analyze advice. The analysis applies regardless of what the advice is about and from whom it comes or to whom it needs to be given, and it concentrates on the production and consumption of advice independent of the field of application. It is made up of two intertwined parts, a conceptual analysis and an analysis of the rationale of advice. He premises that giving advice is a design problem and he treats advice as an artifact designed and used to influence decisions. What is unusual is the theoretical backdrop against which the author's discussions are set: ontology engineering, conceptual analysis, and artificial intelligence. While classical decision theory would be expected to play a key role, this is not the case here for one principal reason: the difficulty of having relevant numerical, quantitative estimates of probability and utility in most practical situations. Instead conceptual models and mathematical logic are the author's tools of choice. The book is primarily intended for graduate students and researchers of management science. They are offered a general method of analysis that applies to giving and receiving advice when the decision problems are not well structured, and when there is imprecise, unclear, incomplete, or conflicting qualitative information.
Wikipedia, Flickr, You Tube, Facebook, LinkedIn are all examples of large community-built databases, although with quite diverse purposes and collaboration patterns. Their usage and dissemination will further grow introducing e.g. new semantics, personalization, or interactive media. Pardede delivers the first comprehensive research reference on community-built databases. The contributions discuss various technical and social aspects of research in and development in areas like in Web science, social networks, and collaborative information systems. Pardede delivers the first comprehensive research reference on community-built databases. The contributions discuss various technical and social aspects of research in and development in areas like in Web science, social networks, and collaborative information systems.
This book is concerned with the associated issues between the differing paradigms of academic and organizational computing infrastructures. Driven by the increasing impact Information Communication Technology (ICT) has on our working and social lives, researchers within the Computer Supported Cooperative Work (CSCW) field try and find ways to situate new hardware and software in rapidly changing socio-digital ecologies. Adopting a design-orientated research perspective, researchers from the European Society for Socially Embedded Technologies (EUSSET) elaborate on the challenges and opportunities we face through the increasing permeation of society by ICT from commercial, academic, design and organizational perspectives. Designing Socially Embedded Technologies in the Real-World is directed at researchers, industry practitioners and will be of great interest to any other societal actors who are involved with the design of IT systems.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies.
A Journey Through Cultures addresses one of the hottest topics in contemporary HCI: cultural diversity amongst users. For a number of years the HCI community has been investigating alternatives to enhance the design of cross-cultural systems. Most contributions to date have followed either a 'design for each' or a 'design for all' strategy. A Journey Through Cultures takes a very different approach. Proponents of CVM - the Cultural Viewpoint Metaphors perspective - the authors invite HCI practitioners to think of how to expose and communicate the idea of cultural diversity. A detailed case study is included which assesses the metaphors' potential in cross-cultural design and evaluation. The results show that cultural viewpoint metaphors have strong epistemic power, leveraged by a combination of theoretic foundations coming from Anthropology, Semiotics and the authors' own work in HCI and Semiotic Engineering. Luciana Salgado, Carla Leitao and Clarisse de Souza are members of SERG, the Semiotic Engineering Research Group at the Departamento de Informatica of Rio de Janeiro's Pontifical Catholic University (PUC-Rio).
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as matching theory, game dynamics, games of coordination, networks and social choice, markets and auctions, price of anarchy, computational aspects of games, mechanism design and auctions.
This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the other two volumes review Tools, Perspectives, and Applications, and Security and Privacy in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage from a better understanding of complex social networks; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, highlighting methods for the data mining of CSNs; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
New technologies are radically changing the way that families connect with one another: we can text our teenagers from work, eat dinner with far-away parents via video link, and instantly upload and share photos after a family day out. Whether we are bridging time or distance, and whether we are enhancing our closest relationships or strengthening the bonds of extended family, as computer technologies alter the communication landscape, they in turn are changing the way we conduct and experience family life. This state of the art volume explores the impact of new communication systems on how families interact - how they share their lives and routines, engage in social touch, and negotiate being together or being apart - by considering a range of different family relationships that shape the nature of communication. Composed of three sections, the first looks at what is often the core of a 'family', the couple, to understand the impact of technology on couple relationships, communication, and feelings of closeness. The second section studies immediate families that have expanded beyond just the individual or couple to include children. Here, the emphasis is on connection for communication, coordination, and play. The third section moves beyond the immediate family to explore connections between extended, distributed family members. This includes connections between adult children and their parents, grandparents and grandchildren, and adult siblings. Here family members have grown older, moved away from 'home', and forged new families. Researchers, designers and developers of new communication technologies will find this volume invaluable. Connecting Families: The Impact of New Communication Technologies on Domestic Life brings together the most up-to-date studies to help in understanding how new communication technologies shape - and are shaped by - family life, and offers inspiration and guidance for design by making clear what families need and value from technological systems.
This book constitutes the proceedings of the 12th German Conference on Multiagent System Technologies, MATES 2014, held in Stuttgart, Germany, in September 2014. The 9 full papers and 7 short papers included in this volume were carefully reviewed and selected from 31 submissions. The book also contains 2 invited talks. The papers are organized in topical sections named: mechanisms, negotiation, and game theory; multiagent planning, learning, and control; and multiagent systems engineering, modeling and simulation.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013. The 20 revised full papers presented were carefully selected from numerous submissions. The papers are organized in topical sections on security, privacy; e-governance; e-government applications, virtualizations; politics, legislation: European initiatives.
This volume presents a collection of carefully selected contributions in the area of social media analysis. Each chapter opens up a number of research directions that have the potential to be taken on further in this rapidly growing area of research. The chapters are diverse enough to serve a number of directions of research with Sentiment Analysis as the dominant topic in the book. The authors have provided a broad range of research achievements from multimodal sentiment identification to emotion detection in a Chinese microblogging website. The book will be useful to research students, academics and practitioners in the area of social media analysis.
The study of cyberbullying has exploded since its first appearance in a peer-reviewed journal article in 2005. Cyberbullying: From theory to intervention aims to make clear and practical sense of this proliferation of coverage by defining the problem of cyberbullying and examining its unique features. The volume provides a thorough overview of state-of-the-art research into the phenomenon, and discusses the development and evaluation of interventions to prevent and combat it. Whereas most research papers offer limited space to describe actual intervention methods, this book provides tremendous insight into the different theoretical methods and practical strategies available to combat cyberbullying. Part One provides readers with a critical review of the existing research literature and collects insights from international researchers involved in bullying and cyberbullying research, tackling key questions such as: how is cyberbullying defined, what is the overlap with traditional bullying, and what are the negative consequences of cyberbullying? Part Two gives an overview of the development and content of evidence-based ICT interventions aimed at preventing and combating bullying and cyberbullying. In addition, some of the important outcomes of the effect evaluations will be described. The book's final chapter integrates the information from Part One with advice regarding practical applications from Part Two. Cyberbullying: From theory to intervention is essential reading for academics and researchers concerned with both cyberbullying and traditional bullying. It can be used in graduate seminars or advanced undergraduate courses in cyberbullying and will also be of interest to teachers, field experts and organisations involved and disseminating cyberbullying solutions.
This book constitutes the refereed proceedings of the 6th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2014, held in Dublin, Ireland, in September 2014. The 11 revised full papers presented were carefully reviewed and selected from 20 submissions. The papers have been organized in the following topical sections: social media; review and analysis; engaging citizens online; and software platforms and evaluation.
Securing privacy in the current environment is one of the great challenges of today s democracies. "Privacy vs. Security" explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today s attacks on privacy by the simple use of today s technology, like web services and e-payment technologies and by State-level surveillance activities."
Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users' virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users' concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.
From Snapshots to Social Media describes the history and future of domestic photography as mediated by technological change. Domestic photography refers to the culture of ordinary people capturing, sharing and using photographs, and is in a particular state of flux today as photos go digital. The book argues that this digital era is the third major chapter in the 170 year history of the area; following the portrait and Kodak eras of the past. History shows that despite huge changes in photographic technology and the way it has been sold, people continue to use photographs to improve memory, support communication and reinforce identity. The future will involve a shift in the balance of these core activities and a replacement of the family album with various multimedia archives for individuals, families and communities. This raises a number of issues that should be taken into account when designing new technologies and business services in this area, including: the ownership and privacy of content, multimedia standards, home ICT infrastructure, and younger and older users of images. The book is a must for designers and engineers of imaging technology and social media who want a better understanding of the history of domestic photography in order to shape its future. It will also be of value to students and researchers in science and technology studies and visual culture, as a fascinating case study of the evolving use of photographs and photographic technology in Western society.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
The explosive growth in data, computational power, and social media creates new opportunities for innovating the processes and solutions of Information and communications technology (ICT) based policy-making and research. To take advantage of these developments in the digital world, new approaches, concepts, instruments and methods are needed to navigate the societal and computational complexity. This requires extensive interdisciplinary knowledge of public administration, policy analyses, information systems, complex systems and computer science. This book provides the foundation for this new interdisciplinary field, in which various traditional disciplines are blending. Both policy makers, executors and those in charge of policy implementations acknowledge that ICT is becoming more important and is changing the policy-making process, resulting in a next generation policy-making based on ICT support. Web 2.0 and even Web 3.0 point to the specific applications of social networks, semantically enriched and linked data, whereas policy-making has also to do with the use of the vast amount of data, predictions and forecasts, and improving the outcomes of policy-making, which is confronted with an increasing complexity and uncertainty of the outcomes. The field of policy-making is changing and driven by developments like open data, computational methods for processing data, opining mining, simulation and visualization of rich data sets, all combined with public engagement, social media and participatory tools.
This book constitutes the refereed proceedings of the 7th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2014, held in Istanbul, Turkey, in September 2014. The 13 full papers presented together with 2 keynotes were carefully reviewed and selected from 33 submissions. The focus of the conference was on following topics: Competence Science Education, Competence Measurement for Informatics, Emerging Technologies and Tools for Informatics, Teacher Education in Informatics, and Curriculum Issues.
This book constitutes the refereed proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE 2014, held in Paderborn, Germany, in September 2014. The 13 full papers and 10 short papers presented together with one keynote were carefully reviewed and selected from 35 submissions. The papers cover various topics such as integration of software engineering and user-centered design; HCI models and model-driven engineering; incorporating guidelines and principles for designing usable products in the development process; usability engineering; methods for user interface design; patterns in HCI and HCSE; software architectures for user interfaces; user interfaces for special environments; representations for design in the development process; working with iterative and agile process models in HCSE; social and organizational aspects in the software development lifecycle; human-centric software development tools; user profiles and mental models; user requirements and design constraints; and user experience and software design.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.
This book constitutes the refereed proceedings of the 5th International Conference on Serious Games Development and Applications, SGDA 2014, held in Berlin, Germany, in October 2014. The 14 revised full papers presented together with 4 short papers were carefully reviewed and selected from 31 submissions. The focus of the papers was on the following: games for health, games for medical training, serious games for children, music and sound effects, games for other purposes, and game design and theories.
Spracklen explores the impact of the internet on leisure and leisure studies, examining the ways in which digital leisure spaces and activities have become part of everyday leisure. Covering a range of issues from social media and file-sharing to romance on the Internet, this book presents new theoretical directions for digital leisure.
Handbook of Usability and User Experience: Methods and Techniques is concerned with emerging usability and user experience in design concepts, theories and applications of human factors knowledge focusing on the discovery, design and understanding of human interaction and usability issues with products and systems for their improvement. This volume presents methods and techniques to design products, systems and environments with good usability, accessibility and user satisfaction. It introduces the concepts of usability and its association with user experience, and discusses methods and models for usability and UX. It also introduces relevant cognitive, cultural, social and experiential individual differences, which are essential for understanding, measuring and utilizing these differences in the study of usability and interaction design. In addition, the book discusses the use of usability assessment to improve healthcare, the relationship between usability and user experience in the built environment, the state-of-the-art review of usability and UX in the digital world, usability and UX in the current context, and emerging technologies. We hope that this first of two volumes will be helpful to a large number of professionals, students and practitioners who strive to incorporate usability and user experience principles and knowledge in a variety of applications. We trust that the knowledge presented in this volume will ultimately lead to an increased appreciation of the benefits of usability and incorporate the principles of usability and user experience knowledge to improve the quality, effectiveness and efficiency of consumer products, systems and environments in which we live.
Today's complex, information-intensive problems often require people to work together. Mostly these tasks go far beyond simply searching together; they include information lookup, sharing, synthesis, and decision-making. In addition, they all have an end-goal that is mutually beneficial to all parties involved. Such "collaborative information seeking" (CIS) projects typically last several sessions and the participants all share an intention to contribute and benefit. Not surprisingly, these processes are highly interactive. Shah focuses on two individually well-understood notions: collaboration and information seeking, with the goal of bringing them together to show how it is a natural tendency for humans to work together on complex tasks. The first part of his book introduces the general notions of collaboration and information seeking, as well as related concepts, terminology, and frameworks; and thus provides the reader with a comprehensive treatment of the concepts underlying CIS. The second part of the book details CIS as a standalone domain. A series of frameworks, theories, and models are introduced to provide a conceptual basis for CIS. The final part describes several systems and applications of CIS, along with their broader implications on other fields such as computer-supported cooperative work (CSCW) and human-computer interaction (HCI). With this first comprehensive overview of an exciting new research field, Shah delivers to graduate students and researchers in academia and industry an encompassing description of the technologies involved, state-of-the-art results, and open challenges as well as research opportunities. |
![]() ![]() You may like...
The Business Model Navigator - The…
Oliver Gassmann, Karolin Frankenberger, …
Paperback
![]()
High-Performance Coaching for Managers…
William J Rothwell, Behnam Bakhshandeh
Hardcover
R3,485
Discovery Miles 34 850
|