![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the thoroughly refereed proceedings of the 4th Iberoamerican Workshop on Human-Computer Interaction, HCI-Collab 2018, held in Popayan, Colombia, in April 2018. The 18 full papers presented in this volume were carefully reviewed and selected from 83 submissions. The papers are dealing with topics such as emotional interfaces, HCI and videogames, computational thinking, collaborative systems, software engineering and ICT in education.
This book constitutes the refereed proceedings of the 12th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2018, held in Toronto, ON, Canada, in July 2018. The 7 revised full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers feature both theoretical research and real-world case studies and cover the following topical areas: trust in information technology; socio-technical, economic, and sociological trust; trust and reputation management systems; identity management and trust; secure, trustworthy and privacy-aware systems; trust building in large scale systems; and trustworthyness of adaptive systems. Also included is the 2018 William Winsborough commemorative address.
This book constitutes the refereed proceedings of the 13th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2018, held in Guilin, China, in August 2018. The 33 revised full papers presented along with the 13 short papers were carefully reviewed and selected from 150 submissions. The papers of this volume are organized in topical sections on: collaborative models, approaches, algorithms, and systems, social computing, data analysis and machine learning for CSCW and social computing.
A computer algebra system such as Mathematica (R) is able to do much more than just numerics: This text shows how to tackle real mathematical problems from basic analysis. The reader learns how Mathematica (R) represents domains, qualifiers and limits to implement actual proofs - a requirement to unlock the huge potential of Mathematica (R) for a variety of applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.
In recent years, computers have learned to diagnose diseases, drive cars, write clean prose and win game shows. Advances like these have created unprecedented economic bounty but in their wake median income has stagnated and employment levels have fallen. Erik Brynjolfsson and Andrew McAfee reveal the technological forces driving this reinvention of the economy and chart a path towards future prosperity. Businesses and individuals, they argue, must learn to race with machines. Drawing on years of research, Brynjolfsson and McAfee identify the best strategies and policies for doing so. A fundamentally optimistic book, The Second Machine Age will radically alter how we think about issues of technological, societal and economic progress.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
This book constitutes the refereed proceedings of the 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 29 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are based on both academic research and the professional experience of information practitioners working in the field. They deal with multiple challenges society will be facing in the future and are organized in the following topical sections: history of computing: "this changed everything"; ICT4D and improvements of ICTs; ICTs and sustainability; gender; ethical and legal considerations; and philosophy.
This book examines the fundamental question of how legislators and other rule-makers should handle remembering and forgetting information (especially personally identifiable information) in the digital age. It encompasses such topics as privacy, data protection, individual and collective memory, and the right to be forgotten when considering data storage, processing and deletion. The authors argue in support of maintaining the new digital default, that (personally identifiable) information should be remembered rather than forgotten. The book offers guidelines for legislators as well as private and public organizations on how to make decisions on remembering and forgetting personally identifiable information in the digital age. It draws on three main perspectives: law, based on a comprehensive analysis of Swiss law that serves as an example; technology, specifically search engines, internet archives, social media and the mobile internet; and an interdisciplinary perspective with contributions from various disciplines such as philosophy, anthropology, sociology, psychology, and economics, amongst others.. Thanks to this multifaceted approach, readers will benefit from a holistic view of the informational phenomenon of "remembering and forgetting". This book will appeal to lawyers, philosophers, sociologists, historians, economists, anthropologists, and psychologists among many others. Such wide appeal is due to its rich and interdisciplinary approach to the challenges for individuals and society at large with regard to remembering and forgetting in the digital age.
This is the second edition of the first ever book to explore the exciting new field of augmented reality art and its enabling technologies. The new edition has been thoroughly revised and updated, and contains 5 new chapters. As well as investigating augmented reality as a novel artistic medium the book covers cultural, social, spatial and cognitive facets of augmented reality art. Intended as a starting point for exploring this new fascinating area of research and creative practice it will be essential reading not only for artists, researchers and technology developers, but also for students (graduates and undergraduates) and all those interested in emerging augmented reality technology and its current and future applications in art.
This open access volume focuses on the development of a P5 eHealth, or better, a methodological resource for developing the health technologies of the future, based on patients' personal characteristics and needs as the fundamental guidelines for design. It provides practical guidelines and evidence based examples on how to design, implement, use and elevate new technologies for healthcare to support the management of incurable, chronic conditions. The volume further discusses the criticalities of eHealth, why it is difficult to employ eHealth from an organizational point of view or why patients do not always accept the technology, and how eHealth interventions can be improved in the future. By dealing with the state-of-the-art in eHealth technologies, this volume is of great interest to researchers in the field of physical and mental healthcare, psychologists, stakeholders and policymakers as well as technology developers working in the healthcare sector.
What is the uniquely human factor in finding and using information to produce new knowledge? Is there an underlying aspect of our thinking that cannot be imitated by the AI-equipped machines that will increasingly dominate our lives? This book answers these questions, and tells us about our consciousness - its drive or intention in seeking information in the world around us, and how we are able to construct new knowledge from this information. The book is divided into three parts, each with an introduction and a conclusion that relate the theories and models presented to the real-world experience of someone using a search engine. First, Part I defines the exceptionality of human consciousness and its need for new information and how, uniquely among all other species, we frame our interactions with the world. Part II then investigates the problem of finding our real information need during information searches, and how our exceptional ability to frame our interactions with the world blocks us from finding the information we really need. Lastly, Part III details the solution to this framing problem and its operational implications for search engine design for everyone whose objective is the production of new knowledge. In this book, Charles Cole deliberately writes in a conversational style for a broader readership, keeping references to research material to the bare minimum. Replicating the structure of a detective novel, he builds his arguments towards a climax at the end of the book. For our video-game, video-on-demand times, he has visualized the ideas that form the book's thesis in over 90 original diagrams. And above all, he establishes a link between information need and knowledge production in evolutionary psychology, and thus bases his arguments in our origins as a species: how we humans naturally think, and how we naturally search for new information because our consciousness drives us to need it.
As a social space, the web provides researchers both with a tool and an environment to explore the intricacies of everyday life. As a site of mediated interactions and interrelationships, the 'digital' has evolved from being a space of information to a space of creation, thus providing new opportunities regarding how, where and, why to conduct social research. Doing Research In and On the Digital aims to deliver on two fronts: first, by detailing how researchers are devising and applying innovative research methods for and within the digital sphere, and, secondly, by discussing the ethical challenges and issues implied and encountered in such approaches. In two core Parts, this collection explores: content collection: methods for harvesting digital data engaging research informants: digital participatory methods and data stories . With contributions from a diverse range of fields such as anthropology, sociology, education, healthcare and psychology, this volume will particularly appeal to post-graduate students and early career researchers who are navigating through new terrain in their digital-mediated research endeavours.
This book constitutes the refereed proceedings of the 7th International Conference on Computational Data and Social Networks, CSoNet 2018, held in Shanghai, China, in December 2018. The 44 revised full papers presented in this book toghether with 2 extended abstracts, were carefully reviewed and selected from 106 submissions. The topics cover the fundamental background, theoretical technology development, and real-world applications associated with complex and data network analysis, minimizing in uence of rumors on social networks, blockchain Markov modelling, fraud detection, data mining, internet of things (IoT), internet of vehicles (IoV), and others.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
The Handbook of Research on Culturally-Aware Information Technology: Perspectives and Models is the first publication of its kind to bring together research contributions from a wide range of IT disciplines, including human-computer interaction, information systems in business and leadership, computational modeling and cultural dynamics, semantic technology and cultural heritage, and e-learning and intelligent tutoring systems. The handbook provides researchers, professors, and students with an in-depth knowledge of the theoretical and technological research conducted in IT with relation to culture.
This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity. This book contains four chapters 1. Cyber Immunity Concept of the Industry 4.0; 2. Mathematical Framework for Immune Protection of Industry 4.0; 3. Trends and prospects of the development of Immune Protection of Industry 4.0; 4. From detecting cyber-attacks to self-healing Industry 4.0;
This two volume set (CCIS 858 and CCIS 859) constitutes the refereed proceedings of the Third International Conference on Digital Transformation and Global Society, DTGS 2018, held in St. Petersburg, Russia, in May/June 2018. The 75 revised full papers and the one short paper presented in the two volumes were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on e-polity: smart governance and e-participation, politics and activism in the cyberspace, law and regulation; e-city: smart cities and urban planning; e-economy: IT and new markets; e-society: social informatics, digital divides; e-communication: discussions and perceptions on the social media; e-humanities: arts and culture; International Workshop on Internet Psychology; International Workshop on Computational Linguistics.
This book constitutes the proceedings of the 15th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2018, held in Mallorca, Spain, in October 2018.The 24 papers presented in this volume were carefully reviewed and selected from 43 submissions. The book also contains one invited talk in full paper length. The papers were organized in topical sections named: aggregation operators, fuzzy measures and integrals; decision making; clustering and classification; and data privacy and security.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 2018, held in Krakow, Poland in March 2018. The 36 full papers presented in this volume were carefully reviewed and selected from 128 submissions. They present and organize the knowledge from within the field of telematics in road transport, in rail transport, in marine transport, in air transport, in logistics.
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2017, held in Lagos, Nigeria, in December 2017. The 19 full papers, 12 short papers and 5 workshop papers were carefully selected from 81 submissions. The papers were presented in eight sessions: e-government, network and load management, digital inclusion, knowledge extraction, representation and sharing, networks and communications, ICT applications for development, decision support, e-business and e-services, internet measurement. |
![]() ![]() You may like...
Information and Communication Technology…
Durgesh Kumar Mishra, Malaya Kumar Nayak, …
Hardcover
Immunology of Infection, Volume 25
Stefan H.E. Kaufmann, Dieter Kabelitz
Paperback
R4,186
Discovery Miles 41 860
Using Excel in the Classroom
Jennifer B. Summerville, Jean Morrow, …
Hardcover
R1,483
Discovery Miles 14 830
VBA and Macros for Microsoft Office…
Bill Jelen, Tracy Syrstad
Paperback
R1,265
Discovery Miles 12 650
Microeconomics using Excel - Integrating…
Gerald Schwarz, Kurt Jechlitschka, …
Hardcover
R5,834
Discovery Miles 58 340
Recent Development in Wireless Sensor…
Srikanta Patnaik, Xiaolong Li, …
Hardcover
R2,890
Discovery Miles 28 900
Extremal Optimization - Fundamentals…
Yongzai L u, Yu-Wang Chen, …
Paperback
R1,483
Discovery Miles 14 830
The Oxford Handbook of Material Culture…
Dan Hicks, Mary C. Beaudry
Hardcover
R4,832
Discovery Miles 48 320
|