0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (36)
  • R250 - R500 (210)
  • R500+ (2,649)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

A Construction Manual for Robots' Ethical Systems - Requirements, Methods, Implementations (Paperback, Softcover reprint... A Construction Manual for Robots' Ethical Systems - Requirements, Methods, Implementations (Paperback, Softcover reprint of the original 1st ed. 2015)
Robert Trappl
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book will help researchers and engineers in the design of ethical systems for robots, addressing the philosophical questions that arise and exploring modern applications such as assistive robots and self-driving cars. The contributing authors are among the leading academic and industrial researchers on this topic and the book will be of value to researchers, graduate students and practitioners engaged with robot design, artificial intelligence and ethics.

Glow Kids - How Screen Addiction Is Hijacking Our Kids-and How to Break the Trance (Paperback): Nicholas Kardaras Glow Kids - How Screen Addiction Is Hijacking Our Kids-and How to Break the Trance (Paperback)
Nicholas Kardaras
R470 Discovery Miles 4 700 Ships in 12 - 17 working days

From addiction expert Dr. Nicholas Kardaras, a startling argument that technology has profoundly affected the brains of children--and not for the better. We've all seen them: kids hypnotically staring at glowing screens in restaurants, in playgrounds and in friends' houses--and the numbers are growing. Like a virtual scourge, the illuminated glowing faces--the Glow Kids--are multiplying. But at what cost? Is this just a harmless indulgence or fad like some sort of digital hula-hoop? Some say that glowing screens might even be good for kids--a form of interactive educational tool. Don't believe it. In Glow Kids, Dr. Nicholas Kardaras will examine how technology--more specifically, age-inappropriate screen tech, with all of its glowing ubiquity--has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain's pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis. Most shocking of all, recent brain imaging studies conclusively show that excessive screen exposure can neurologically damage a young person's developing brain in the same way that cocaine addiction can. Kardaras will dive into the sociological, psychological, cultural, and economic factors involved in the global tech epidemic with one major goal: to explore the effect all of our wonderful shiny new technology is having on kids. Glow Kids also includes an opt-out letter and a quiz for parents in the back of the book.

Augmented Reality Art - From an Emerging Technology to a Novel Creative Medium (Paperback, Softcover reprint of the original... Augmented Reality Art - From an Emerging Technology to a Novel Creative Medium (Paperback, Softcover reprint of the original 2nd ed. 2018)
Vladimir Geroimenko
R4,021 Discovery Miles 40 210 Ships in 10 - 15 working days

This is the second edition of the first ever book to explore the exciting new field of augmented reality art and its enabling technologies. The new edition has been thoroughly revised and updated, and contains 5 new chapters. As well as investigating augmented reality as a novel artistic medium the book covers cultural, social, spatial and cognitive facets of augmented reality art. Intended as a starting point for exploring this new fascinating area of research and creative practice it will be essential reading not only for artists, researchers and technology developers, but also for students (graduates and undergraduates) and all those interested in emerging augmented reality technology and its current and future applications in art.

Fiber to the Home - The New Empowerment (Hardcover): P.E. Green Fiber to the Home - The New Empowerment (Hardcover)
P.E. Green
R1,994 Discovery Miles 19 940 Ships in 10 - 15 working days

A compelling treatment of FTTH
Written by telecommunications pioneer Paul Green Jr., Fiber to the Home is a comprehensive examination of the technical and social implications of fiber to the home (FTTH), the technology that extends the current fiber optic backbone to optically connect it directly to homes and offices.
Fiber to the Home addresses the payoffs expected from this impending technological revolution; provides a detailed guide to the optoelectronic components and architectures of which the system is made; and includes an equally thorough guide to the mechanics of deploying the fiber paths, whether underground or elevated. Additionally, the book concludes with a recent country-by-country survey of the legalities and the state of play in this important new trend.
Green points out how completing the "last mile" between today's fiber network backbone and customer premises will not only unleash new usage modes for consumer computers, TVs, phones, and other terminal types, but will also empower both the computer and telecommunication industries toward new levels of investment and profitability.
Aimed at a general audience, Fiber to the Home uses essentially no mathematics, and all terms are carefully explained and reinforced with a vocabulary quiz at the end of each chapter. Because of the tutorial emphasis of the explanations, the wide spectrum of readers affected by this emerging and ever-accelerating revolution will gain a thorough understanding of the technical details of FTTH that will aid them in the practice of their professions. These readers include:
* Technicians, craftsmen, and engineers involved in installing fiber systems
* Telecommunication network planners
* Venture investors curious about the future of this dynamic industry sector
* Research and product engineers who need to know the detailed architecture, cost, and performance imperatives of this "post-bubble" optical networking business opportunity
* Students interested in a vibrant new industry with new jobs and new R & D challenges
* Telecommunication regulators and attorneys who need a quick fix on what the technology is and what it does
* Individuals concerned with international competitiveness in an age when the country's information infrastructure is such a key ingredient for future growth
With Fiber to the Home, readers are armed with all they need to fully understand and participate in the FTTH revolution.

Human-Computer Interaction - 4th Iberoamerican Workshop, HCI-Collab 2018, Popayan, Colombia, April 23-27, 2018, Revised... Human-Computer Interaction - 4th Iberoamerican Workshop, HCI-Collab 2018, Popayan, Colombia, April 23-27, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Vanessa Agredo-Delgado, Pablo H. Ruiz
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 4th Iberoamerican Workshop on Human-Computer Interaction, HCI-Collab 2018, held in Popayan, Colombia, in April 2018. The 18 full papers presented in this volume were carefully reviewed and selected from 83 submissions. The papers are dealing with topics such as emotional interfaces, HCI and videogames, computational thinking, collaborative systems, software engineering and ICT in education.

Trust Management XII - 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10-13, 2018,... Trust Management XII - 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10-13, 2018, Proceedings (Paperback, Softcover reprint of the original 1st ed. 2018)
Nurit Gal-Oz, Peter R. Lewis
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2018, held in Toronto, ON, Canada, in July 2018. The 7 revised full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers feature both theoretical research and real-world case studies and cover the following topical areas: trust in information technology; socio-technical, economic, and sociological trust; trust and reputation management systems; identity management and trust; secure, trustworthy and privacy-aware systems; trust building in large scale systems; and trustworthyness of adaptive systems. Also included is the 2018 William Winsborough commemorative address.

Computer Supported Cooperative Work and Social Computing - 13th CCF Conference, ChineseCSCW 2018, Guilin, China, August 18-19,... Computer Supported Cooperative Work and Social Computing - 13th CCF Conference, ChineseCSCW 2018, Guilin, China, August 18-19, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Yuqing Sun, Tun Lu, Xiaolan Xie, Liping Gao, Hongfei Fan
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2018, held in Guilin, China, in August 2018. The 33 revised full papers presented along with the 13 short papers were carefully reviewed and selected from 150 submissions. The papers of this volume are organized in topical sections on: collaborative models, approaches, algorithms, and systems, social computing, data analysis and machine learning for CSCW and social computing.

Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected... Privacy Technologies and Policy - 6th Annual Privacy Forum, APF 2018, Barcelona, Spain, June 13-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.

Developing a Cybersecurity Immune System for Industry 4.0 (Hardcover): Sergei Petrenko Developing a Cybersecurity Immune System for Industry 4.0 (Hardcover)
Sergei Petrenko
R2,838 Discovery Miles 28 380 Ships in 12 - 17 working days

Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity. This book contains four chapters 1. Cyber Immunity Concept of the Industry 4.0; 2. Mathematical Framework for Immune Protection of Industry 4.0; 3. Trends and prospects of the development of Immune Protection of Industry 4.0; 4. From detecting cyber-attacks to self-healing Industry 4.0;

Handbook of Research on Culturally-Aware Information Technology - Perspectives and Models (Hardcover, New): Emmanuel G... Handbook of Research on Culturally-Aware Information Technology - Perspectives and Models (Hardcover, New)
Emmanuel G Blanchard, Stefane M. Kabene
R6,992 Discovery Miles 69 920 Ships in 12 - 17 working days

The Handbook of Research on Culturally-Aware Information Technology: Perspectives and Models is the first publication of its kind to bring together research contributions from a wide range of IT disciplines, including human-computer interaction, information systems in business and leadership, computational modeling and cultural dynamics, semantic technology and cultural heritage, and e-learning and intelligent tutoring systems. The handbook provides researchers, professors, and students with an in-depth knowledge of the theoretical and technological research conducted in IT with relation to culture.

Handbook of Mobile Data Privacy (Paperback, Softcover reprint of the original 1st ed. 2018): Aris Gkoulalas-Divanis, Claudio... Handbook of Mobile Data Privacy (Paperback, Softcover reprint of the original 1st ed. 2018)
Aris Gkoulalas-Divanis, Claudio Bettini
R3,552 Discovery Miles 35 520 Ships in 10 - 15 working days

This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.

This Changes Everything - ICT and Climate Change: What Can We Do? - 13th IFIP TC 9 International Conference on Human Choice and... This Changes Everything - ICT and Climate Change: What Can We Do? - 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 19-21, 2018, Proceedings (Paperback, Softcover reprint of the original 1st ed. 2018)
David Kreps, Charles Ess, Louise Leenen, Kai Kimppa
R1,505 Discovery Miles 15 050 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 29 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are based on both academic research and the professional experience of information practitioners working in the field. They deal with multiple challenges society will be facing in the future and are organized in the following topical sections: history of computing: "this changed everything"; ICT4D and improvements of ICTs; ICTs and sustainability; gender; ethical and legal considerations; and philosophy.

Remembering and Forgetting in the Digital Age (Paperback, Softcover reprint of the original 1st ed. 2018): Florent Thouvenin,... Remembering and Forgetting in the Digital Age (Paperback, Softcover reprint of the original 1st ed. 2018)
Florent Thouvenin, Peter Hettich, Herbert Burkert, Urs Gasser
R4,228 Discovery Miles 42 280 Ships in 10 - 15 working days

This book examines the fundamental question of how legislators and other rule-makers should handle remembering and forgetting information (especially personally identifiable information) in the digital age. It encompasses such topics as privacy, data protection, individual and collective memory, and the right to be forgotten when considering data storage, processing and deletion. The authors argue in support of maintaining the new digital default, that (personally identifiable) information should be remembered rather than forgotten. The book offers guidelines for legislators as well as private and public organizations on how to make decisions on remembering and forgetting personally identifiable information in the digital age. It draws on three main perspectives: law, based on a comprehensive analysis of Swiss law that serves as an example; technology, specifically search engines, internet archives, social media and the mobile internet; and an interdisciplinary perspective with contributions from various disciplines such as philosophy, anthropology, sociology, psychology, and economics, amongst others.. Thanks to this multifaceted approach, readers will benefit from a holistic view of the informational phenomenon of "remembering and forgetting". This book will appeal to lawyers, philosophers, sociologists, historians, economists, anthropologists, and psychologists among many others. Such wide appeal is due to its rich and interdisciplinary approach to the challenges for individuals and society at large with regard to remembering and forgetting in the digital age.

The Consciousness' Drive - Information Need and the Search for Meaning (Paperback, Softcover reprint of the original 1st... The Consciousness' Drive - Information Need and the Search for Meaning (Paperback, Softcover reprint of the original 1st ed. 2018)
Charles Cole
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

What is the uniquely human factor in finding and using information to produce new knowledge? Is there an underlying aspect of our thinking that cannot be imitated by the AI-equipped machines that will increasingly dominate our lives? This book answers these questions, and tells us about our consciousness - its drive or intention in seeking information in the world around us, and how we are able to construct new knowledge from this information. The book is divided into three parts, each with an introduction and a conclusion that relate the theories and models presented to the real-world experience of someone using a search engine. First, Part I defines the exceptionality of human consciousness and its need for new information and how, uniquely among all other species, we frame our interactions with the world. Part II then investigates the problem of finding our real information need during information searches, and how our exceptional ability to frame our interactions with the world blocks us from finding the information we really need. Lastly, Part III details the solution to this framing problem and its operational implications for search engine design for everyone whose objective is the production of new knowledge. In this book, Charles Cole deliberately writes in a conversational style for a broader readership, keeping references to research material to the bare minimum. Replicating the structure of a detective novel, he builds his arguments towards a climax at the end of the book. For our video-game, video-on-demand times, he has visualized the ideas that form the book's thesis in over 90 original diagrams. And above all, he establishes a link between information need and knowledge production in evolutionary psychology, and thus bases his arguments in our origins as a species: how we humans naturally think, and how we naturally search for new information because our consciousness drives us to need it.

Computational Data and Social Networks - 7th International Conference, CSoNet 2018, Shanghai, China, December 18-20, 2018,... Computational Data and Social Networks - 7th International Conference, CSoNet 2018, Shanghai, China, December 18-20, 2018, Proceedings (Paperback, 1st ed. 2018)
Xuemin Chen, Arunabha Sen, Wei Wayne Li, My T. Thai
R1,545 Discovery Miles 15 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Computational Data and Social Networks, CSoNet 2018, held in Shanghai, China, in December 2018. The 44 revised full papers presented in this book toghether with 2 extended abstracts, were carefully reviewed and selected from 106 submissions. The topics cover the fundamental background, theoretical technology development, and real-world applications associated with complex and data network analysis, minimizing in uence of rumors on social networks, blockchain Markov modelling, fraud detection, data mining, internet of things (IoT), internet of vehicles (IoV), and others.

Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part II... Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Amos Beimel, Stefan Dziembowski
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Digital Transformation and Global Society - Third International Conference, DTGS 2018, St. Petersburg, Russia, May 30 - June 2,... Digital Transformation and Global Society - Third International Conference, DTGS 2018, St. Petersburg, Russia, May 30 - June 2, 2018, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Daniel A. Alexandrov, Alexander V. Boukhanovsky, Andrei V. Chugunov, Yury Kabanov, Olessia Koltsova
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

This two volume set (CCIS 858 and CCIS 859) constitutes the refereed proceedings of the Third International Conference on Digital Transformation and Global Society, DTGS 2018, held in St. Petersburg, Russia, in May/June 2018. The 75 revised full papers and the one short paper presented in the two volumes were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on e-polity: smart governance and e-participation, politics and activism in the cyberspace, law and regulation; e-city: smart cities and urban planning; e-economy: IT and new markets; e-society: social informatics, digital divides; e-communication: discussions and perceptions on the social media; e-humanities: arts and culture; International Workshop on Internet Psychology; International Workshop on Computational Linguistics.

Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part I... Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Amos Beimel, Stefan Dziembowski
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings (Paperback, 1st ed.... Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings (Paperback, 1st ed. 2018)
Nils Gruschka
R1,529 Discovery Miles 15 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.The 29 full papers presented in this volume were carefully reviewed and selected from 81 submissions. They are organized in topical sections named: privacy; cryptography; network and cloud security; cyber security and malware; and security for software and software development.

The Global Brain - The Awakening Earth in a New Century (Paperback, 3rd Revised edition): Peter Russell The Global Brain - The Awakening Earth in a New Century (Paperback, 3rd Revised edition)
Peter Russell
R662 R536 Discovery Miles 5 360 Save R126 (19%) Ships in 9 - 15 working days

We've seen the power of the internet to connect people around the world in ways never before known. This remarkable book argues that the billions of messages and pieces of information flying back and forth are linking the minds of humanity together into a single, global brain: a brain with astonishing potential for the Earth. Peter Russell, an acclaimed author and speaker, weaves together modern technology and ancient mysticism to present a startling vision of the world to come, where humanity is a fully conscious superorganism in an awakening universe. The human potential movement, he shows, is growing fast and influencing business, politics and medicine. This new edition is fully updated for the challenges we face in the twenty-first century.

Proceedings of International Ethical Hacking Conference 2018 - eHaCON 2018, Kolkata, India (Paperback, 1st ed. 2019): Mohuya... Proceedings of International Ethical Hacking Conference 2018 - eHaCON 2018, Kolkata, India (Paperback, 1st ed. 2019)
Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J K Mandal
R4,297 Discovery Miles 42 970 Ships in 10 - 15 working days

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

Digital Transformation and Global Society - Third International Conference, DTGS 2018, St. Petersburg, Russia, May 30 - June 2,... Digital Transformation and Global Society - Third International Conference, DTGS 2018, St. Petersburg, Russia, May 30 - June 2, 2018, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Daniel A. Alexandrov, Alexander V. Boukhanovsky, Andrei V. Chugunov, Yury Kabanov, Olessia Koltsova
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This two volume set (CCIS 858 and CCIS 859) constitutes the refereed proceedings of the Third International Conference on Digital Transformation and Global Society, DTGS 2018, held in St. Petersburg, Russia, in May/June 2018. The 75 revised full papers and the one short paper presented in the two volumes were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on e-polity: smart governance and e-participation, politics and activism in the cyberspace, law and regulation; e-city: smart cities and urban planning; e-economy: IT and new markets; e-society: social informatics, digital divides; e-communication: discussions and perceptions on the social media; e-humanities: arts and culture; International Workshop on Internet Psychology; International Workshop on Computational Linguistics.

Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings... Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
Arcangelo Castiglione, Florin Pop, Massimo Ficco, Francesco Palmieri
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018. The 25 full papers presented in this volume were carefully reviewed and selected from 79 submissions. The papers focus on cybersecurity; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications.

Modeling Decisions for Artificial Intelligence - 15th International Conference, MDAI 2018, Mallorca, Spain, October 15-18,... Modeling Decisions for Artificial Intelligence - 15th International Conference, MDAI 2018, Mallorca, Spain, October 15-18, 2018, Proceedings (Paperback, 1st ed. 2018)
Vicenc Torra, Yasuo Narukawa, Isabel Aguilo, Manuel Gonzalez Hidalgo
R1,485 Discovery Miles 14 850 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2018, held in Mallorca, Spain, in October 2018.The 24 papers presented in this volume were carefully reviewed and selected from 43 submissions. The book also contains one invited talk in full paper length. The papers were organized in topical sections named: aggregation operators, fuzzy measures and integrals; decision making; clustering and classification; and data privacy and security.

Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September... Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis
R2,675 Discovery Miles 26 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Feeding The Machine - The Hidden Human…
James Muldoon, Mark Graham, … Paperback R505 R340 Discovery Miles 3 400
Digital Identity, Virtual Borders and…
Emre E. Korkmaz Hardcover R2,375 Discovery Miles 23 750
Misbelief - What Makes Rational People…
Dan Ariely Paperback R350 R273 Discovery Miles 2 730
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R273 Discovery Miles 2 730
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R406 R189 Discovery Miles 1 890
E-Commerce In South Africa
Adheesh Budree Paperback R436 R384 Discovery Miles 3 840
Autonomous Vehicles - Tracing the Locus…
Atilla Kasap Hardcover R2,553 Discovery Miles 25 530
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen Hardcover R3,492 Discovery Miles 34 920
Bad Code - Overcoming Bad Mental Code…
Deborah Johnson Hardcover R719 Discovery Miles 7 190
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800

 

Partners