![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
The author first introduces the basic framework for cultural algorithms and he then explains the social structure of a cultural system as a mechanism for the distribution of problem-solving information throughout a population. Three different models for social organizations are presented: the homogeneous (nuclear family), heterogeneous (expanded family), and subculture (descent groups) social models. The chapters that follow compare the learning capabilities of these social organizations relative to problems of varying complexity. The book concludes with a discussion of how the results can impact our understanding of social evolution.
This book constitutes the refereed proceedings of the 13th International Conference on Persuasive Technology, PERSUASIVE 2018, held in Waterloo, ON, Canada, in April 2018. The 21 revised full papers and 4 short papers presented were carefully reviewed and selected from 59 submissions. The papers demonstrate how persuasive technologies can help solve societal issues. They explore new frontiers for persuasive technology, such as personalized persuasion, new sensor usage, uses of big data, and new ways of creating engagement through gaming or social connection, focusing on a variety of technologies (e.g., web, wearables, AI, and smart environments). The papers are organized in the following topical sections: social means to persuasion; nudging and just-in-time interventions; design principles and practices; persuasive games; personalization and tailoring; and theoretical reflections.
New technologies are radically changing the way that families connect with one another: we can text our teenagers from work, eat dinner with far-away parents via video link, and instantly upload and share photos after a family day out. Whether we are bridging time or distance, and whether we are enhancing our closest relationships or strengthening the bonds of extended family, as computer technologies alter the communication landscape, they in turn are changing the way we conduct and experience family life. This state of the art volume explores the impact of new communication systems on how families interact how they share their lives and routines, engage in social touch, and negotiate being together or being apart by considering a range of different family relationships that shape the nature of communication. Composed of three sections, the first looks at what is often the core of a family, the couple, to understand the impact of technology on couple relationships, communication, and feelings of closeness. The second section studies immediate families that have expanded beyond just the individual or couple to include children. Here, the emphasis is on connection for communication, coordination, and play. The third section moves beyond the immediate family to explore connections between extended, distributed family members. This includes connections between adult children and their parents, grandparents and grandchildren, and adult siblings. Here family members have grown older, moved away from home, and forged new families. Researchers, designers and developers of new communication technologies will find this volume invaluable. "Connecting Families: The Impact of New Communication Technologies on Domestic Life "brings together the most up-to-date studies to help in understanding how new communication technologies shape and are shaped by family life, and offers inspiration and guidance for design by making clear what families need and value from technological systems."
This book constitutes the refereed proceedings of the Third International Conference on Love and Sex with Robots, LSR 2017, held in December 2017, in London, UK. The 12 revised papers presented together with 2 keynotes were carefully reviewed and selected from a total of 83 submissions. One of the biggest challenges of the Love and Sex with Robots conference is to engage a wider scientific community in the discussions of the multifaceted topic, which has only recently established itself as an academic research topic within, but not limited to, the disciplines of artificial intelligence, human-computer interaction, robotics, biomedical science and robot ethics etc.
This book discusses key ethical and deontological problems concerning the use of the most common information and communication devices. It focuses on the challenges of the new environments we now find ourselves in thanks to these technologies, and the issues arising from the newly established relationship between the virtual sphere and the real world. Each aspect is analysed by starting from a very specific example or a case study presenting a dilemma that can only be resolved by making a reasoned ethical choice. Rather than thematically addressing only one of the many aspects mentioned above (for example, computer ethics or social network ethics), the book presents a comprehensive introduction to, and a co-ordinated overview of, the various deontological and ethical issues regarding the spread of the most common information and communication technologies.
Eats, Shoots & Leaves for the internet age As language evolves faster than ever before, what is the future of `correct' writing? When Emmy Favilla was tasked with creating a styleguide for BuzzFeed, she opted for spelling, grammar and punctuation guidelines that would reflect how readers actually use language IRL. With wry humour and an uncanny intuition for the possibilities of internet-age expression, Favilla makes a case for breaking the stuffy rules that have hitherto defined our relationship with language. Featuring priceless emoji strings, sidebars, quizzes and style debates among the most lovable word nerds of the digital media world - of which Favilla is the go-to style guru - A World Without "Whom" is essential for readers and writers of posts, tweets, texts, emails and whatever comes next.
This two volume set (CCIS 858 and CCIS 859) constitutes the refereed proceedings of the Third International Conference on Digital Transformation and Global Society, DTGS 2018, held in St. Petersburg, Russia, in May/June 2018. The 75 revised full papers and the one short paper presented in the two volumes were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on e-polity: smart governance and e-participation, politics and activism in the cyberspace, law and regulation; e-city: smart cities and urban planning; e-economy: IT and new markets; e-society: social informatics, digital divides; e-communication: discussions and perceptions on the social media; e-humanities: arts and culture; International Workshop on Internet Psychology; International Workshop on Computational Linguistics.
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.The 29 full papers presented in this volume were carefully reviewed and selected from 81 submissions. They are organized in topical sections named: privacy; cryptography; network and cloud security; cyber security and malware; and security for software and software development.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity. This book contains four chapters 1. Cyber Immunity Concept of the Industry 4.0; 2. Mathematical Framework for Immune Protection of Industry 4.0; 3. Trends and prospects of the development of Immune Protection of Industry 4.0; 4. From detecting cyber-attacks to self-healing Industry 4.0;
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018. The 25 full papers presented in this volume were carefully reviewed and selected from 79 submissions. The papers focus on cybersecurity; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications.
This book constitutes the refereed proceedings of the 13th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2018, held in Guilin, China, in August 2018. The 33 revised full papers presented along with the 13 short papers were carefully reviewed and selected from 150 submissions. The papers of this volume are organized in topical sections on: collaborative models, approaches, algorithms, and systems, social computing, data analysis and machine learning for CSCW and social computing.
This book constitutes the refereed proceedings of the Second International Conference on Digital Transformation and Global Society, DTGS 2017, held in St. Petersburg, Russia, in June 2017. The 34 revised full papers and three revised short papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on eSociety: social media analysis; eSociety: ICTs in education and science; eSociety: legal, security and usability issues; ePolity: electronic governance and electronic participation; ePolity: politics of cyberspace; eCity: urban planning and smart cities; eHealth: ICTs in public health management; eEconomy and eFinance: finance and knowledge management.
- The author is one of the most influential AI reseachers of recent decades. - Written in an accessible language, the book provides a probing account of AI today and proposes a new narrative to connect and make sense of events that happened in the recent tumultuous past and enable us to think soberly about the road ahead. - The book is divided into ten carefully crafted and easily-digestible chapters, each grapples with an important question for AI, ranging from the scientific concepts that underpin the technology to wider implications for society, using real examples wherever possible.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.
Controversies in Digital Ethics explores ethical frameworks within digital culture. Through a combination of theoretical examination and specific case studies, the essays in this volume provide a vigorous examination of ethics in a highly individualistic and mediated world. Focusing on specific controversies-privacy, surveillance, identity politics, participatory culture-the authors in this volume provide a roadmap for navigating the thorny ethical issues in new media. Paul Booth and Amber Davisson bring together multiple writers working from different theoretical traditions to represent the multiplicity of ethics in the 21st century. Each essay has been chosen to focus on a particular issue in contemporary ethical thinking in order to both facilitate classroom discussion and further scholarship in digital media ethics. Accessible for students, but with a robust analysis providing contemporary scholarship in media ethics, this collection unites theory, case studies, and practice within one volume.
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2016, held in Ouagadougou, Burkina Faso, in December 2016. The 44 papers were carefully selected from 57 submissions and cover topics such as: mobile and social networks; cloud, VPN and overlays; IoT, water, land, agriculture; networks, TVWS; learning; crypto and services.
This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present the most recent innovations, trends, results, experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from small-scale cyber-physical systems security via information infrastructures and their interaction with national and international infrastructures.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
How best can we understand why the application of information and communication technology in organizations succeeds or fails? Calling on technical, organisational, social, psychological and economic perspectives, this book provides a fresh and comprehensive framework for answering this question. Consideration is given to how ICT is adopted, implemented and used within organizations. Throughout special features will help readers clarify their understanding. These features include: - Case studies and vignettes that chart the opportunities and pitfalls created by ICT - Useful chapter introductions - An up to date glossary of concepts and abbreviations
This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.
This book constitutes the proceedings of the 15th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2018, held in Mallorca, Spain, in October 2018.The 24 papers presented in this volume were carefully reviewed and selected from 43 submissions. The book also contains one invited talk in full paper length. The papers were organized in topical sections named: aggregation operators, fuzzy measures and integrals; decision making; clustering and classification; and data privacy and security.
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.
Information Tectonics spatial organization in the electronic age The rapid development and diffusion of information technologies telecommunications, computers, the Internet is profoundly changing the character, and structure of interaction at the local, national and international level. Information technology is usually viewed as a technical issue, with analysis focusing on hardware, software and engineering concerns for efficient management and operation. Lost from much of the debate and discussion over information technology is the role of geography and the spatial context of information technology. To further understanding and knowledge of the spatial character and geographic impact of information technology, this volume addresses three key aspects of the phenomenon.
This book constitutes the refereed conference proceedings of the 2nd International Workshop on Cryprocurrencies and Blockchain Technology, CBT 2018, and the 13thInternational Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. From the CBT Workshop 7 full and 8 short papers out of 39 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing. The DPM Workshop received 36 submissions from which 11 full and 5 short papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering. |
You may like...
Global Health Informatics - How…
Heimar Marin, Eduardo Massad, …
Paperback
R1,872
Discovery Miles 18 720
|