![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The proceedings of each conference are allocated separate parts in this book each with their own editors. E-Government and E-Services (EGES) page 3 Marijn Janssen / Winfried Lamersdorf Global Information Systems Processes (GISP) page 183 Jan Pries-Heje / Michael Rosemann Organization E-Government and E-Services (EGES 2010) EGES Co-chairs Marijn Janssen Delft, The Netherlands Winfried Lamersdorf Hamburg, Germany Lalit Sawhney Bangalore, India Leon Strous Helmond, The Netherlands EGES Reviewers Agarwal Ashok ACS Technologies Ltd., Bhoopal, India Mark Borman University of Sydney, Australia Erwin Fielt Queensland University of Technology, Brisbane, Australia Ernest Foo Queensland University of Technology, Brisbane, Australia M.P. Gupta Indian Institute of Technology Delhi, India Paul Henman The University of Queensland, Australia Ralf Klischewski German University, Cairo, Egypt Christine Leitner Donau-Universit. at Krems, Austria Miriam Lips Victoria University of Wellington, New Zealand Zoran Milosevic Deontic, Brisbane, Australia Oystein Sabo University of Agder, Norway Jochen Scholl University of Washington, Seattle, USA Leif Skiftenes University of Agder, Norway Weerakoddy Vishanth Brunel University Business School, West London, UK Dirk Werth DFKI, Saarbruc . . ken, Germany Maria Wimmer University Koblenz-Landau, Germany EGES Subreviewers Alexandra Chapko, Andreas Emrich and Marc Graessle German Research Center for Arti?cial Intelligence, Saarbruc .. ken, Germany Kristof Hamann, Kai Jander, Ante Vilenica and Sonja Zaplata University of Hamburg, Germany Global Information Systems Processes (GISP 2010) GISP Co-chairs Jan Pries-Heje Roskilde University, Denmark
This book investigates the ways in which the mobile telephone has transformed societies around the world, bringing both opportunities and challenges. At a time when knowledge and truth are increasingly contested, the book asks how mobile technology has changed the ways in which people create, disseminate, and access knowledge. Worldwide, mobile internet access has surpassed desktop access, and it is estimated that by 2022 there will be AN excess of 6 billion mobile phone users in the world. This widespread proliferation raises all sorts of questions around who creates knowledge, how is that knowledge shared and proliferated, and what are the structural political, economic, and legal conditions in which knowledge is accessed. The practices and power dynamics around mobile technologies are location specific. They look different depending on whether one chooses to highlight the legal, social, political, or economic context. Bringing together scholars, journalists, activists and practitioners from around the world, this book embraces this complexity, providing a multifaceted picture that acknowledges the tensions and contradictions surrounding accessing knowledge through mobile technologies. With case studies from Hong Kong, South Korea, India, Syria, Egypt, Botswana, Brazil, and the US, this book provides an important account of the changing nature of our access to knowledge, and is key reading for students, researchers, activists and policy makers with an interest in technology and access to knowledge, communication, social transformation, and global development.
Our digital world is often described using terms such as immateriality and virtuality. The discourse of cloud computing is the latest in a long line of nebulous, dematerialising tropes which have come to dominate how we think about information and communication technologies. Digital Media Ecologies argues that such rhetoric is highly misleading, and that engaging with the key cultural, agential, ethical and political impacts of contemporary media requires that we do not just engage with the surface level of content encountered by the end users of digital media, but that we must additionally consider the affordances of software and hardware. Whilst numerous existing approaches explore content, software and hardware individually, Digital Media Ecologies provides a critical intervention by insisting that addressing contemporary technoculture requires a synthetic approach that traverses these three registers. Digital Media Ecologies re-envisions the methodological approach of media ecology to go beyond the metaphor of a symbolic information environment that exists alongside a material world of tantalum, turtles and tornados. It illustrates the social, cultural, political and environmental impacts of contemporary media assemblages through examples that include mining conflict-sustaining minerals, climate change blogging, iOS jailbreaking, and the ecological footprint of contemporary computing infrastructures. Alongside foregrounding the deleterious social and environmental impacts of digital technologies, the book considers numerous ways that these issues are being tackled by a heterogeneous array of activists, academics, hackers, scientists and citizens using the same technological assemblages that ostensibly cause these problems.
We like to think that we are in control of the future of "artificial" intelligence. The reality, though, is that we--the everyday people whose data powers AI--aren't actually in control of anything. When, for example, we speak with Alexa, we contribute that data to a system we can't see and have no input into--one largely free from regulation or oversight. The big nine corporations--Amazon, Google, Facebook, Tencent, Baidu, Alibaba, Microsoft, IBM and Apple--are the new gods of AI and are short-changing our futures to reap immediate financial gain. In this book, Amy Webb reveals the pervasive, invisible ways in which the foundations of AI - the people working on the system, their motivations, the technology itself - are broken. Within our lifetimes, AI will, by design, begin to behave unpredictably, thinking and acting in ways which defy human logic. The big nine corporations may be inadvertently building and enabling vast arrays of intelligent systems that don't share our motivations, desires, or hopes for the future of humanity. Much more than a passionate, human-centred call-to-arms, this book delivers a strategy for changing course and provides a path for liberating us from algorithmic decision-makers and powerful corporations.
Digital Playgrounds explores the key developments, trends, debates, and controversies that have shaped children's commercial digital play spaces over the past two decades. It argues that children's online playgrounds, virtual worlds, and connected games are much more than mere sources of fun and diversion - they serve as the sites of complex negotiations of power between children, parents, developers, politicians, and other actors with a stake in determining what, how, and where children's play unfolds. Through an innovative, transdisciplinary framework combining science and technology studies, critical communication studies, and children's cultural studies, Digital Playgrounds focuses on the contents and contexts of actual technological artefacts as a necessary entry point for understanding the meanings and politics of children's digital play. The discussion draws on several research studies on a wide range of digital playgrounds designed and marketed to children aged six to twelve years, revealing how various problematic tendencies prevent most digital play spaces from effectively supporting children's culture, rights, and - ironically - play. Digital Playgrounds lays the groundwork for a critical reconsideration of how existing approaches might be used in the development of new regulation, as well as best practices for the industries involved in making children's digital play spaces. In so doing, it argues that children's online play spaces be reimagined as a crucial new form of public sphere in which children's rights and digital citizenship must be prioritized.
Artificial Intelligence (AI) fascinates, challenges and disturbs us. There are many voices in society that predict drastic changes that may come as a consequence of AI - a possible apocalypse or Eden on earth. However, only a few people truly understand what AI is, what it can do and what its limitations are. Understanding Artificial Intelligence explains, through a straightforward narrative and amusing illustrations, how AI works. It is written for a non-specialist reader, adult or adolescent, who is interested in AI but is missing the key to understanding how it works. The author demystifies the creation of the so-called "intelligent" machine and explains the different methods that are used in AI. It presents new possibilities offered by algorithms and the difficulties that researchers, engineers and users face when building and using such algorithms. Each chapter allows the reader to discover a new aspect of AI and to become fully aware of the possibilities offered by this rich field.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.
In this accessible new book, Iain McLean explores the impact of information technology on democracy. Combining democratic theory, social choice theory and description of new technology at work in Europe and the USA, McLean explores democracy as it is and as it could be. The author begins in ancient Athens and moves through Pliny, Rousseau, Madison and J S Mill to modern representatives and direct democracy. Introducing the theory of social choice, he argues that democracy is about procedures, not results, and sets out some criteria for fair aggregation of individuals' preferences to society's. Exploring the impact of new technology on these procedures, McLean shows how it can save time, and increase accuracy and accessibility, but also how it can lead to manipulation and come up against Arrow's, Gibbards' and McKelvey's impossibility theorems. In conclusion, McLean asks whether new technology widens or narrows our democratic horizons, and points to the technical and logical boundaries of democracy. "Democracy and New Technology" will be of great interest to students and researchers in politics, sociology, and media and communications studies. It is one of very few books to explain social choice theory in totally non-technical language and to explore what it means for democracy.
This book constitutes the refereed post-proceedings of the 9th IFIP WG 3.7 Conference on Information Technology in Educational Management, ITEM 2010, held in Kasane, Botswana, in July 2010. The 22 revised full papers presented were carefully reviewed and selected. The papers cover a wide range of topics addressing the utilization of ICT at different levels of education from primary education to higher education, such as identifying and satisfying learning needs, strategical management, school management information systems, open source software, and the relationship between ICT and organizational performance.
This book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018. The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on attacks, mobile and Web security, privacy, security protocol practices, distributed systems, source code security, and malware.
This book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome, Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications.
This book makes an important contribution to the recent evolution in Information and Communication Technologies (ICT) that are human-centred and socially desirable, environmentally sustainable, and ethically acceptable. It introduces the concept of moral, equitable and environmental limits in the ICT domain and proposes a Slow Tech approach to face the challenges of these limits, laying out a set of principles that can be applied in real-life business settings. With the launch of the United Nations Sustainable Development Goals and the growing interest in the circular economy, Slow Tech and ICT - A Responsible, Sustainable and Ethical Approach is a timely tool for forward-thinking businesses.
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019. Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.
In this book, Steffen Lange and Tilman Santarius investigate how digitalization influences environmental and social sustainability. The information revolution is currently changing the daily lives of billions of people worldwide. At the same time, the current economic model and consumerist lifestyle needs to be radically transformed if society is to overcome the challenges humanity is facing on a finite planet. Can the much-discussed disruption potential of digitalization be harnessed for this purpose? Smart Green World? provides guiding principles for a sustainable digital society and develops numerous hands-on proposals for how digitalization can be shaped to become a driving force for social transformation. For instance, the authors explain why more digitalization is needed to realize the transition towards 100% renewable energy and show how this can be achieved without sacrificing privacy. They analyze how the information revolution can transform consumption patterns, mobility habits and industry structures - instead of fostering the consumption of unneeded stuff due to personalized commercials and the acceleration of life. The authors reveal how Artificial Intelligence and the Industrial Internet of Things pose novel environmental challenges and contribute to a polarization of income; but they also demonstrate how the internet can be restored to its status as a commons, with users taking priority and society at large reaping the benefits of technological change in a most democratic way. Providing a comprehensive and practical assessment of both social and environmental opportunities and challenges of digitalization, Smart Green World? Making Digitalization Work for Sustainability will be of great interest to all those studying the complex interrelationship of the twenty-first-century megatrends of digitalization and decarbonization.
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.
Parallelwelten (parallel worlds) are worlds invisible to anyone not part of them. More and more, our reality is defined through digital products, which afford us infinitely more freedom than in the analogue past. But increased choice has also heightened our susceptibility to manipulation. Filter bubbles, fake news and alternative facts are just data that can be easily and cheaply manipulated. We now live in multiple realities that are increasingly losing touch with each other. Reality has been turned into bits. Or is it the other way around? The digital world increasingly defines, controls and governs the analogue world. Tech companies buy and sell the raw data of human experience. Our human behaviour is turned into data, which is processed into information and then manipulated and fed back into our information diet to control our behaviour. Data is the raw material, and information - not content - is king. Information even defines reality. This book investigates these parallel worlds from different angles: technological, corporate, scientific, cultural, economic and political. It doesn't view tech as an end in itself and something the rest of the world simply must adapt to. Instead, it asks how tech can solve real problems and make the world not a worse place, but a better one.
This book will help researchers and engineers in the design of ethical systems for robots, addressing the philosophical questions that arise and exploring modern applications such as assistive robots and self-driving cars. The contributing authors are among the leading academic and industrial researchers on this topic and the book will be of value to researchers, graduate students and practitioners engaged with robot design, artificial intelligence and ethics.
The field of information technology continues to advance at a brisk pace, including the use of Remote Laboratory (RL) systems in education and research. To address the needs of remote laboratory development for such purposes, the authors present a new state-of-the-art unified framework for RL system development. Included are solutions to commonly encountered RL implementation issues such as third-party plugin, traversing firewalls, cross platform running, and scalability, etc. Additionally, the book introduces a new application architecture of remote lab for mobile-optimized RL application development for Mobile Learning (M-Learning). It also shows how to design and organize the remote experiments at different universities and make available a framework source code. The book is intended to serve as a complete guide for remote lab system design and implementation for an audience comprised of researchers, practitioners and students to enable them to rapidly and flexibly implement RL systems for a range of fields.
This is the second edition of the first ever book to explore the exciting new field of augmented reality art and its enabling technologies. The new edition has been thoroughly revised and updated, and contains 5 new chapters. As well as investigating augmented reality as a novel artistic medium the book covers cultural, social, spatial and cognitive facets of augmented reality art. Intended as a starting point for exploring this new fascinating area of research and creative practice it will be essential reading not only for artists, researchers and technology developers, but also for students (graduates and undergraduates) and all those interested in emerging augmented reality technology and its current and future applications in art.
This book constitutes the refereed proceedings of the 13th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2018, held in Guilin, China, in August 2018. The 33 revised full papers presented along with the 13 short papers were carefully reviewed and selected from 150 submissions. The papers of this volume are organized in topical sections on: collaborative models, approaches, algorithms, and systems, social computing, data analysis and machine learning for CSCW and social computing.
This book constitutes the thoroughly refereed proceedings of the 4th Iberoamerican Workshop on Human-Computer Interaction, HCI-Collab 2018, held in Popayan, Colombia, in April 2018. The 18 full papers presented in this volume were carefully reviewed and selected from 83 submissions. The papers are dealing with topics such as emotional interfaces, HCI and videogames, computational thinking, collaborative systems, software engineering and ICT in education.
A computer algebra system such as Mathematica (R) is able to do much more than just numerics: This text shows how to tackle real mathematical problems from basic analysis. The reader learns how Mathematica (R) represents domains, qualifiers and limits to implement actual proofs - a requirement to unlock the huge potential of Mathematica (R) for a variety of applications.
This book constitutes the refereed proceedings of the 12th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2018, held in Toronto, ON, Canada, in July 2018. The 7 revised full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers feature both theoretical research and real-world case studies and cover the following topical areas: trust in information technology; socio-technical, economic, and sociological trust; trust and reputation management systems; identity management and trust; secure, trustworthy and privacy-aware systems; trust building in large scale systems; and trustworthyness of adaptive systems. Also included is the 2018 William Winsborough commemorative address. |
![]() ![]() You may like...
Singularities, Mirror Symmetry, and the…
Tyler J. Jarvis, Nathan Priddis
Paperback
R3,121
Discovery Miles 31 210
Monitoring and Control of Electrical…
Emilio Barocio Espejo, Felix Rafael Segundo Sevilla, …
Paperback
FastSLAM - A Scalable Method for the…
Michael Montemerlo, Sebastian Thrun
Hardcover
R2,863
Discovery Miles 28 630
|