0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (26)
  • R250 - R500 (202)
  • R500+ (2,731)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems -... Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings (Paperback, 2012 ed.)
Ioannis Askoxylakis, Henrich C. Poehls, Joachim Posegga
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.

The Practical Handbook of Computerization for Distribution Managers (Paperback, Softcover reprint of the original 1st ed.... The Practical Handbook of Computerization for Distribution Managers (Paperback, Softcover reprint of the original 1st ed. 1987)
Colin Barrett
R1,565 Discovery Miles 15 650 Ships in 10 - 15 working days

Back in 1983 I was chatting with Dick Coleman, publisher of Traffic World magazine, when he unexpectedly proposed that I write a column for the magazine on computer applications in the transportation/physical distribution industry. "But, Dick, I don't know all that much about computers," I protested. "You use one, don't you?" he asked logically. Yes, I did; I'd been running my consulting business with it for two years. But that didn't, I explained, make me an expert. "Think about it," he said. That's typical Coleman; he drops these studiedly casual ideas and just lets them lay there until you pick them up and wind up doing just what he wanted you to do all along. Sure enough, the longer I pondered the notion the more it appealed to me. OK, I wasn't a computer expert (I'm still not). But I was a computer user, in the transportation/distribution field; maybe from that perspective I might have some useful things to say to other transportation/distribution users and would-be users of computers. Thus was born the "Computer Software for Transportation" column. The first one appeared in the April 11, 1983, issue of Traffic World, and it's been a once-a-month schedule ever since. And thus, too, was ultimately born this book.

Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings... Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Paperback, 2012 ed.)
Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, …
R1,575 Discovery Miles 15 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

Persuasive Technology: Design for Health and Safety - 7th International Conference on Persuasive Technology, PERSUASIVE 2012,... Persuasive Technology: Design for Health and Safety - 7th International Conference on Persuasive Technology, PERSUASIVE 2012, Linkoeping, Sweden, June 6-8, 2012. Proceedings (Paperback, 2012 ed.)
Magnus Bang, Eva L. Ragnemalm
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linkoping, Sweden, in June 2012. The 21 full papers presented together with 5 short papers were carefully reviewed and selected from numerous submissions. In addition three keynote papers are included in this volume. The papers cover the typical fields of persuasive technology, such as health, safety and education."

Product-Focused Software Process Improvement - 13th International Conference, PROFES 2012, Madrid, Spain, June 13-15, 2012,... Product-Focused Software Process Improvement - 13th International Conference, PROFES 2012, Madrid, Spain, June 13-15, 2012, Proceedings (Paperback, 2012 ed.)
Oscar Dieste, Andreas Jedlitschka, Natalia Juristo
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012. The 21 revised full papers presented together with 3 short papers and 4 workshop and tutorial papers were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on process focused software process improvement, open-source agile and lean practices, product and process measurements and estimation, distributed and global software development, quality assessment, and empirical studies.

Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16,... Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Svetla Petkova-Nikova, Andreas Pashalidis, Gunther Pernul
R1,939 Discovery Miles 19 390 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.

Computer Games and New Media Cultures - A Handbook of Digital Games Studies (Hardcover, 2012): Johannes Fromme, Alexander Unger Computer Games and New Media Cultures - A Handbook of Digital Games Studies (Hardcover, 2012)
Johannes Fromme, Alexander Unger
R4,651 Discovery Miles 46 510 Ships in 10 - 15 working days

Digital gaming is today a significant economic phenomenon as well as being an intrinsic part of a convergent media culture in postmodern societies. Its ubiquity, as well as the sheer volume of hours young people spend gaming, should make it ripe for urgent academic enquiry, yet the subject was a research backwater until the turn of the millennium. Even today, as tens of millions of young people spend their waking hours manipulating avatars and gaming characters on computer screens, the subject is still treated with scepticism in some academic circles. This handbook aims to reflect the relevance and value of studying digital games, now the subject of a growing number of studies, surveys, conferences and publications.

As an overview of the current state of research into digital gaming, the 42 papers included in this handbook focus on the social and cultural relevance of gaming. In doing so, they provide an alternative perspective to one-dimensional studies of gaming, whose agendas do not include cultural factors. The contributions, which range from theoretical approaches to empirical studies, cover various topics including analyses of games themselves, the player-game interaction, and the social context of gaming. In addition, the educational aspects of games and gaming are treated in a discrete section. With material on non-commercial gaming trends such as 'modding', and a multinational group of authors from eleven nations, the handbook is a vital publication demonstrating that new media cultures are far more complex and diverse than commonly assumed in a debate dominated by concerns over violent content.

Ethical and Social Issues in the Information Age (Paperback, Softcover reprint of hardcover 4th ed. 2010): Joseph Migga Kizza Ethical and Social Issues in the Information Age (Paperback, Softcover reprint of hardcover 4th ed. 2010)
Joseph Migga Kizza
R1,830 Discovery Miles 18 300 Ships in 10 - 15 working days

The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual's social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations' strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.

Second Generation Biometrics: The Ethical, Legal and Social Context (Hardcover, 2012): Emilio Mordini, Dimitros Tzovaras Second Generation Biometrics: The Ethical, Legal and Social Context (Hardcover, 2012)
Emilio Mordini, Dimitros Tzovaras
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

While a sharp debate is emerging about whether conventional biometric technology offers society any significant advantages over other forms of identification, and whether it constitutes a threat to privacy, technology is rapidly progressing. Politicians and the public are still discussing fingerprinting and iris scan, while scientists and engineers are already testing futuristic solutions. Second generation biometrics - which include multimodal biometrics, behavioural biometrics, dynamic face recognition, EEG and ECG biometrics, remote iris recognition, and other, still more astonishing, applications - is a reality which promises to overturn any current ethical standard about human identification. Robots which recognise their masters, CCTV which detects intentions, voice responders which analyse emotions: these are only a few applications in progress to be developed.

This book is the first ever published on ethical, social and privacy implications of second generation biometrics. Authors include both distinguished scientists in the biometric field and prominent ethical, privacy and social scholars. This makes this book an invaluable tool for policy makers, technologists, social scientists, privacy authorities involved in biometric policy setting. Moreover it is a precious instrument to update scholars from different disciplines who are interested in biometrics and itswider social, ethical and political implications.

Theory and Applications of Formal Argumentation - First International Workshop, TAFA 2011. Barcelona, Spain, July 16-17, 2011,... Theory and Applications of Formal Argumentation - First International Workshop, TAFA 2011. Barcelona, Spain, July 16-17, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Sanjay Modgil, Nir Oren, Francesca Toni
R1,939 Discovery Miles 19 390 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the First International Workshop on the Theory and Applications of Formal Argumentation, TAFA 2011, held in Barcelona, Spain, in Juli 2011, as a workshop at IJCAI 2011, the 22nd International Joint Conference on Artificial Intelligence. The 9 revised full papers presented together with 8 revised poster papers were carefully selected during two rounds of reviewing and improvement from 32 initial submissions. The workshop promotes and fosters uptake of argumentation as a viable AI paradigm with wide ranging application, and provides a forum for further development of ideas and the initiation of new and innovative collaborations. The papers cover the following topics: properties of formal models of argumentation; instantiations of abstract argumentation frameworks; relationships among different argumentation frameworks; practical applications of formal models of argumentation; argumentation and other artificial intelligence techniques; evaluation of formal models of argumentation; validation and evaluation of applications of argumentation.

Electronic Healthcare - 4th International Conference, eHealth 2011, Malaga, Spain, November 21-23, 2011, Revised Selected... Electronic Healthcare - 4th International Conference, eHealth 2011, Malaga, Spain, November 21-23, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Patty Kostkova, Martin Szomszor, David Fowler
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011. The 20 revised full papers presented along with 8 short papers were carefully reviewed and selected from numerous submissions in total and cover a wide range of topics including social media analysis, knowledge integration and EPR, personalisation and patient support systems, early warning systems and mobile monitoring, games and learning, security, privacy and prevention, online support for professionals and patients, agents in eHealth, online communities of practice, eHealth solutions, social media surveillance, and communication and data integration.

History of Nordic Computing 2 - Second IFIP WG 9.7 Conference, HiNC 2, Turku, Finland, August 21-23, 2007, Revised Selected... History of Nordic Computing 2 - Second IFIP WG 9.7 Conference, HiNC 2, Turku, Finland, August 21-23, 2007, Revised Selected Papers (Paperback, 2009 ed.)
John Impagliazzo, Timo Jarvi, Petri Paju
R2,972 Discovery Miles 29 720 Ships in 10 - 15 working days

The First Conference on the History of Nordic Computing (HiNC1) was organized in Trondheim, in June 2003. The HiNC1 event focused on the early years of computing, that is the years from the 1940s through the 1960s, although it formally extended to year 1985. In the preface of the proceedings of HiNC1, Janis Bubenko, Jr. , John Impagliazzo, and Arne Solvberg describe well the peculiarities of early Nordic c- puting [1]. While developing hardware was a necessity for the first professionals, quite soon the computer became an industrial product. Computer scientists, among others, grew increasingly interested in programming and application software. P- gress in these areas from the 1960s to the 1980s was experienced as astonishing. The developments during these decades were taken as the focus of HiNC2. During those decades computers arrived to every branch of large and medium-sized businesses and the users of the computer systems were no longer only computer s- cialists but also people with other main duties. Compared to the early years of comp- ing before 1960, where the number of computer projects and applications was small, capturing a holistic view of the history between the 1960s and the 1980s is conside- bly more difficult. The HiNC2 conference attempted to help in this endeavor.

Open Source Ecosystems: Diverse Communities Interacting - 5th IFIP WG 2.13 International Conference on Open Source Systems, OSS... Open Source Ecosystems: Diverse Communities Interacting - 5th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2009, Skoevde, Sweden, June 3-6, 2009, Proceedings (Paperback, 2009 ed.)
Cornelia Boldyreff, Kevin Crowston, Bjoern Lundell, Anthony I Wasserman
R2,981 Discovery Miles 29 810 Ships in 10 - 15 working days

Welcome to the 5th International Conference on Open Source Systems! It is quite an achievement to reach the five-year mark - that's the sign of a successful enterprise. This annual conference is now being recognized as the primary event for the open source research community, attracting not only high-quality papers, but also building a community around a technical program, a collection of workshops, and (starting this year) a Doctoral Consortium. Reaching this milestone reflects the efforts of many people, including the conference founders, as well as the organizers and participants in the previous conferences. My task has been easy, and has been greatly aided by the hard work of Kevin Crowston and Cornelia Boldyreff, the Program Committee, as well as the Organizing Team led by Bjoern Lundell. All of us are also grateful to our attendees, especially in the difficult economic climate of 2009. We hope the participants found the conference valuable both for its technical content and for its personal networking opportunities. To me, it is interesting to look back over the past five years, not just at this conference, but at the development and acceptance of open source software. Since 2004, the business and commercial side of open source has grown enormously. At that time, there were only a handful of open source businesses, led by RedHat and its Linux distribution. Companies such as MySQL and JBoss were still quite small.

Handbook of Digital Homecare (Paperback, 2010 ed.): Kanagasingam Yogesan, Peter Brett, Michael Christopher Gibbons Handbook of Digital Homecare (Paperback, 2010 ed.)
Kanagasingam Yogesan, Peter Brett, Michael Christopher Gibbons
R4,510 Discovery Miles 45 100 Ships in 10 - 15 working days

Digital Homecare is a collection of services to deliver, maintain and improve care in the home environment using the latest ICT technology and devices. It is important to recognize the wide range of issues that are covered by digital homecare. This book shows a good selection of related issues, be it experience, technologies, managerial issues or standardization. A very diverse "audience"; elderly, people with chronic conditions, disabled, to name the most important groups, benefits from digital homecare, within the comfort and protection of their own homes.

Empowering Open and Collaborative Governance - Technologies and Methods for Online Citizen Engagement in Public Policy Making... Empowering Open and Collaborative Governance - Technologies and Methods for Online Citizen Engagement in Public Policy Making (Hardcover, 2012 ed.)
Yannis Charalabidis, Sotirios Koussouris
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

The use of information and communication technologies to support public administrations, governments and decision makers has been recorded for more than 20 years and dubbed e-Government. Moving towards open governance roadmaps worldwide, electronic participation and citizen engagement stand out as a new domain, important both for decision makers and citizens; and over the last decade, there have been a variety of related pilot projects and innovative approaches.

With contributions from leading researchers, Charalabidis and Koussouris provide the latest research findings such as theoretical foundations, principles, methodologies, architectures, technical frameworks, cases and lessons learnt within the domain of open, collaborative governance and online citizen engagement. The book is divided into three sections: Section one, "Public Policy Debate Foundations," lays the foundations regarding processes and methods for scoping, planning, evaluating and transforming citizen engagement. The second section, "Information and Communication Technologies for Citizen Participation," details practical approaches to designing and creating collaborative governance infrastructures and citizen participation for businesses and administrations. Lastly, the third section on "Future Research Directions of Open, Collaborative ICT-enabled Governance" provides a constructive critique of the developments in the past and presents prospects regarding future challenges and research directions.

The book is mainly written for academic researchers and graduate students working in the computer, social, political and management sciences. Its audience includes researchers and practitioners in e-Governance, public administration officials, policy and decision makers at the local, national and international level engaged in the design and creation of policies and services, and ICT professionals engaged in e-Governance and policy modelling projects and solutions.

iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April... iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Jan Camenisch, Dogan Kesdogan
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand

Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on... Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings (Paperback, 2012)
Pierpaolo Degano, Joshua D. Guttman
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software. The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties.

Advances in User Modeling - UMAP 2011 Workshops, Girona, Spain, July 11-15, 2011, Revised Selected Papers (Paperback, 2012):... Advances in User Modeling - UMAP 2011 Workshops, Girona, Spain, July 11-15, 2011, Revised Selected Papers (Paperback, 2012)
Liliana Ardissono, Tsvi Kuflik
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book constitutes selected papers from the lectures given at the workshops held in conjunction with the User Modeling, Adaptation and Personalization Conference, UMAP 2011, Girona, Spain, in July 2011. The 40 papers presented were carefully reviewed and selected for inclusion in this book. For each workshop there is an overview paper summarizing the workshop themes, the accepted contributions and the future research trends. In addition the volume presents a selection of the best poster papers of UMAP 2011. The workshops included are: AST, adaptive support for team collaboration; AUM, augmenting user models with real worlds experiences to enhance personalization and adaptation; DEMRA, decision making and recommendation acceptance issues in recommender systems; PALE, personalization approaches in learning environments; SASWeb, semantic adaptive social web; TRUM, trust, reputation and user modeling; UMADR, user modeling and adaptation for daily routines: providing assistance to people with special and specific needs; UMMS, user models for motivational systems: the affective and the rational routes to persuasion.

Computational Social Network Analysis - Trends, Tools and Research Advances (Paperback, 2010 ed.): Ajith Abraham, Aboul Ella... Computational Social Network Analysis - Trends, Tools and Research Advances (Paperback, 2010 ed.)
Ajith Abraham, Aboul Ella Hassanien, Vaclav Snasel
R4,550 Discovery Miles 45 500 Ships in 10 - 15 working days

Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.

This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.

Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services.

This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.

Diving Into the Bitstream - Information Technology Meets Society in a Digital World (Paperback, New): Barry Dumas Diving Into the Bitstream - Information Technology Meets Society in a Digital World (Paperback, New)
Barry Dumas
R1,298 Discovery Miles 12 980 Ships in 12 - 17 working days

Nationwide, and indeed worldwide, there has been a growing awareness of the importance of access to information. Accordingly, information technology (IT), broadly defined and its role beyond the internal workings of businesses has leapt into the social consciousness.

Diving into the Bitstream distinguishes itself by weaving together the concepts and conditions of IT. What distinguishes these trends is their focus on the impacts of IT on societies, and the responsibilities of IT s creators and users. The author pulls together important, often complex issues in the relationships among information, information technologies, and societal constructs.

The text explores a synopsis of these issues that are foundations for further consideration.

Understanding Digital Humanities (Hardcover, New): D. Berry Understanding Digital Humanities (Hardcover, New)
D. Berry
R2,996 Discovery Miles 29 960 Ships in 10 - 15 working days

Confronting the digital revolution in academia, this book examines the application of new computational techniques and visualisation technologies in the Arts & Humanities. Uniting differing perspectives, leading and emerging scholars discuss the theoretical and practical challenges that computation raises for these disciplines.

Criminal Futures - Predictive Policing and Everyday Police Work (Hardcover): Simon Egbert, Matthias Leese Criminal Futures - Predictive Policing and Everyday Police Work (Hardcover)
Simon Egbert, Matthias Leese
R4,137 Discovery Miles 41 370 Ships in 12 - 17 working days

This book explores how predictive policing transforms police work. Police departments around the world have started to use data-driven applications to produce crime forecasts and intervene into the future through targeted prevention measures. Based on three years of field research in Germany and Switzerland, this book provides a theoretically sophisticated and empirically detailed account of how the police produce and act upon criminal futures as part of their everyday work practices. The authors argue that predictive policing must not be analyzed as an isolated technological artifact, but as part of a larger sociotechnical system that is embedded in organizational structures and occupational cultures. The book highlights how, for crime prediction software to come to matter and play a role in more efficient and targeted police work, several translation processes are needed to align human and nonhuman actors across different divisions of police work. Police work is a key function for the production and maintenance of public order, but it can also discriminate, exclude, and violate civil liberties and human rights. When criminal futures come into being in the form of algorithmically produced risk estimates, this can have wide-ranging consequences. Building on empirical findings, the book presents a number of practical recommendations for the prudent use of algorithmic analysis tools in police work that will speak to the protection of civil liberties and human rights as much as they will speak to the professional needs of police organizations. An accessible and compelling read, this book will appeal to students and scholars of criminology, sociology, and cultural studies as well as to police practitioners and civil liberties advocates, in addition to all those who are interested in how to implement reasonable forms of data-driven policing.

A Computer Science Reader - Selections from ABACUS (Paperback, Softcover reprint of the original 1st ed. 1988): Eric A. Weiss A Computer Science Reader - Selections from ABACUS (Paperback, Softcover reprint of the original 1st ed. 1988)
Eric A. Weiss
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

"A Computer Science Reader" covers the entire field of computing, from its technological status through its social, economic and political significance. The book's clearly written selections represent the best of what has been published in the first three-and-a-half years of "ABACUS," Springer-Verlag's internatioanl quarterly journal for computing professionals. Among the articles included are: - U.S. versus IBM: An Exercise in Futility? by Robert P. Bigelow - Programmers: The Amateur vs. the Professional by Henry Ledgard - The Composer and the Computer by Lejaren Hiller - SDI: A Violation of Professional Responsibility by David L. Parnas - Who Invented the First Electronic Digital Computer? by Nancy Stern - Foretelling the Future by Adaptive Modeling by Ian H. Witten and John G. Cleary - The Fifth Generation: Banzai or Pie-in-the-Sky? by Eric A. Weiss This volume contains more than 30 contributions by outstanding and authoritative authors grouped into the magazine's regular categories: Editorials, Articles, Departments, Reports from Correspondents, and Features. "A " "Computer Science Reader" will be interesting and important to any computing professional or student who wants to know about the status, trends, and controversies in computer science today.

The Connected Home: The Future of Domestic Life (Paperback, 2011): Richard Harper The Connected Home: The Future of Domestic Life (Paperback, 2011)
Richard Harper
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

The title of this new book: "The Connected Home" reflects the move away from the idea that smart homes would alter the lives of those living in them by providing technologies to take over tasks that were previously the responsibility of the householder, such as managing entertainment, education - and even eating Up until around 10 years ago this view was commonplace but time has shown that the technologies to support a smart home have not developed in such a way as to support this premise. Instead, what people do in their homes has moved the concept of a smart home into that of the 'connected home'. The rise of on-line games technologies, video connections via Skype, social networking, internet browsing etc are now an integral part of the home environment and have had a significant effect on the home.

The contributors to this exciting new book consider and discuss the effects and ramifications of the connected home from a variety of viewpoints: an examination of the take-up of personal computers and the Internet in domestic situations; an analysis of the changing intersection of technology and human habits in the connected home; the impact of gaming, texting, e-book readers, tablets and other devices and their effect on the social conditions of a household; the relationship between digital messaging applications and real geography; and an overview of how sensing technologies for the smart home might evolve (lightweight medical technologies for example). The book culminates by addressing unfinished ambitions from the smart home agenda, the factors that have prevented their realisation, and addresses the need for extending research into the area.

Building the e-World Ecosystem - 11th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2011, Kaunas,... Building the e-World Ecosystem - 11th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2011, Kaunas, Lithuania, October 12-14, 2011, Revised Selected Papers (Hardcover, 2011)
Tomas Skersys, Rimantas Butleris, Lina Nemuraite, Reima Suomi
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 11th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2011, held in Kaunas, Lithuania, in October 2011. The 25 revised papers presented were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: e-government and e-governance, e-services, digital goods and products, e-business process modeling and re-engineering, innovative e-business models and implementation, e-health and e-education, and innovative e-business models.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Full House - A Wild Cards Collection
George R. R. Martin Paperback R568 R480 Discovery Miles 4 800
The Life of Richard Wagner - Cambridge…
Ernest Newman Book R1,842 Discovery Miles 18 420
Percy Jackson And The Olympians - The…
Rick Riordan Paperback R320 R250 Discovery Miles 2 500
Telescopes for Kids - A Junior…
Vanessa Thomas Hardcover R478 R402 Discovery Miles 4 020
The Prisoner's Throne - The Stolen Heir…
Holly Black Paperback R370 R260 Discovery Miles 2 600
Adi Sorts with Variables
Caroline Karanja Paperback R245 R201 Discovery Miles 2 010
Katastrofe
De Wet Hugo Paperback R160 R138 Discovery Miles 1 380
By the Sea A5 Notebook
The Gifted Stationery Company Hardcover  (1)
R117 Discovery Miles 1 170
Shakespeare's Dramatic Art - Collected…
Wolfgang Clemen Hardcover R7,587 Discovery Miles 75 870
Restoring the Wild - Rewilding Our…
Roy Dennis Paperback R269 Discovery Miles 2 690

 

Partners