![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
The five-volume set LNCS 8004--8008 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. This volume contains papers in the thematic area of human-computer Interaction, addressing the following major topics: HCI in healthcare; games and gamification; HCI in learning and education; in-vehicle Interaction.
The three-volume set LNCS 8009-8011 constitutes the refereed proceedings of the 7th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 230 contributions included in the UAHCI proceedings were carefully reviewed and selected for inclusion in this three-volume set. The 74 papers included in this volume are organized in the following topical sections: design for all methods, techniques and tools; eInclusion practice; universal access to the built environment; multi-sensory and multimodal interfaces; brain-computer interfaces.
This is the second part of the two-volume set (LNCS 8023-8024) that constitutes the refereed proceedings of the 5th International Conference on Cross-Cultural Design, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. This two-volume set contains 113 papers. The papers in this volume focus on the following topics: cultural issues in business and industry; culture, health and quality of life; cross-cultural and intercultural collaboration; culture and the smart city; cultural differences on the Web.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.
The four-volume set LNCS 8117-8120 constitutes the refereed proceedings of the 14th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2013, held in Cape Town, South Africa, in September 2013. The 55 papers included in the second volume are organized in topical sections on E-input/output devices (e-readers, whiteboards), facilitating social behaviour and collaboration, gaze-enabled interaction design, gesture and tactile user interfaces, gesture-based user interface design and interaction, health/medical devices, humans and robots, human-work interaction design, interface layout and data entry, learning and knowledge-sharing, learning tools, learning contexts, managing the UX, mobile interaction design, and mobile phone applications.
This book constitutes the refereed proceedings of the 12th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2013, held in Koblenz, Germany, in September 2013. The 27 revised full papers presented were carefully reviewed and selected for inclusion in this volume. The papers have been organized in the following topical sections: research foundations; open government data and transparency; service design and improvement; adoption and service evaluation; and social media and social network analysis.
This book constitutes the refereed proceedings of the 5th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2013, held in Koblenz, Germany, in September 2013. The 13 revised full papers presented were carefully reviewed and selected from 30 submissions. The papers cover a wide range of research in both social and technological scientific domains, seeking to demonstrate new theories, concepts, methods and styles of eParticipation with the support of innovative ICT. They have been organized in the following topical sections: research directions, social media and eParticipation, and online deliberation.
This book constitutes the refereed post-proceedings of the 7th International Workshop on Information Search, Integration and Personalization, ISIP 2012, held in Sapporo, Japan, in October 2012. The 14 revised full papers presented were carefully reviewed and selected from 29 presentations. The papers are organized in topical sections on knowledge federation and integration; social system support and visualization; social information search and discovery.
Mobile phones are the most ubiquitous communications technology in the world. Besides transforming the way in which we communicate, they can also be used as a powerful tool for conflict prevention and management. This book presents innovative uses of mobile technologies in the areas of early warning, disaster and humanitarian relief, governance, citizens' participation, etc. and cuts across different regions. The book brings together experts and practitioners from different fields-mobile technologies, information systems, computer sciences, online dispute resolution, law, etc.-to reflect on present experiences and to explore new areas for research on conflict management and online dispute resolution (ODR). It also reflects on the transition from present ODR to future mobile Dispute Resolution and discusses key privacy issues. The book is addressed to anyone involved in conflict prevention and dispute management aiming to learn how mobile technologies can play a disruptive role in the way we deal with conflict.
This is the first of a two-volume set (CCIS 373 and CCIS 374) that constitutes the extended abstracts of the posters presented during the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA, in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The extended abstracts were carefully reviewed and selected for inclusion in this two-volume set. The papers included in this volume are organized in the following topical sections: HCI design approaches, methods and techniques; usability methods, techniques and studies; universal access and eInclusion; multimodal and ambient interaction; cognitive and psychological aspects of interaction; perception and interaction; ergonomic and human modelling issues; capturing gaze, biosignals and brainwaves; development environments; product design, marketing and advertisement.
This book contains the refereed proceedings of the 4th Scandinavian Conference on Information Systems (SCIS), held in Oslo, Norway, in August 2013. Participants were invited to discuss experiences of "digital living" within a multitude of empirical settings, covering questions like e.g. "how do people relate to each other when interaction is mediated through social networks?" or "what are the societal effects of ICT becoming ubiquitous in everyday situations?". The 6 papers accepted for presentation at the conference were selected from 18 submissions and address "digital living" from different perspectives.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.
This book constitutes the refereed proceedings of the 13th
International Symposium on Privacy Enhancing Technologies, PET
2013, held in Bloomington, IN, USA, in July 2013.
The four-volume set LNCS 8012, 8013, 8014 and 8015 constitutes the proceedings of the Second International Conference on Design, User Experience, and Usability, DUXU 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 282 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in this four-volume set. The 67 papers included in this volume are organized in topical sections on design philosophy, usability methods and tools, and design processes, methods and tools.
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.
"Biometrics in the New World" takes a fresh look at biometrics and identity management within a fast-changing world. The concept of biometric identity verification is revisited, including identity intelligence, federation and the use of third party infrastructure. Furthermore, the book examines some of the fundamentals of the technology which are often overlooked. However, the dialogue extends beyond technical considerations, and explores some of the broader societal and philosophical aspects surrounding the use of biometric applications, bringing this whole area into a new focus at a time. Topics and features: presents a brief history of the development of biometrics, and describes some of the popularly held misconceptions surrounding the technology; investigates the challenges and possibilities of biometrics across third party infrastructures and on mobile computing devices; provides guidance on biometric systems design, stressing the importance of an end-to-end approach, together with the alignment with policy and operational procedures; explores the mechanisms necessary to enable identity intelligence, including logging mechanisms, data communications and data formats; discusses such usage issues as collaboration frameworks, and messaging and data translation; examines the impact of biometric technologies on society, for better and worse, covering issues of privacy and user factors; reviews the current situation in identity management and biometric technologies, and predicts where these trends may take us in the future. This accessible and thought-provoking work is an essential guide for biometric systems integrators, professional consultancies, government agencies and other consumers of biometric technology. Academics interested in biometrics will also find the book to be a source of valuable insights, as will the casual reader.
This book constitutes the refereed proceedings of the Fourth International Symposium on End-User Development, IS-EUD 2013, held in Copenhagen, Denmark, in June 2013. The 13 full papers (45% acceptance rate) and 11 short papers (50% acceptance rate) have been presented at the event. In addition the volume contains two keynote speeches, three doctoral consortia papers, and information on 2 workshops. The papers provide a broad overview of the current state of End-User Development research.
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
Co-editors of the volume are: Federico "Alvarez," Alessandro "Bassi," Michele "Bezzi," Laurent "Ciavaglia," Frances "Cleary," Petros "Daras," Hermann "De Meer," Panagiotis "Demestichas," John "Domingue," Theo G. "Kanter," Stamatis "Karnouskos," Srdjan "Kr"" ""o," Laurent "Lefevre," Jasper "Lentjes," Man-Sze "Li," Paul "Malone," Antonio "Manzalini," Volkmar "Lotz," Henning "Muller," Karsten "Oberle," Noel E. "O'Connor," Nick "Papanikolaou," Dana "Petcu," Rahim "Rahmani," Danny" Raz," Gael "Richards," Elio "Salvadori," Susana "Sargento," Hans "Schaffers," Joan" Serrat," Burkhard "Stiller," Antonio F. "Skarmeta," Kurt "Tutschku," Theodore "Zahariadis" The Internet is the most vital scientific, technical, economic and societal set of infrastructures in existence and in operation today serving 2.5 billion users. Continuing its developments would secure much of the upcoming innovation and prosperity and it would underpin the sustainable growth in economic values and volumes needed in the future. Future Internet infrastructures research is therefore a must. The Future Internet Assembly (FIA) is a successful conference that brings together participants of over 150 research projects from several distinct yet interrelated areas in the European Union Framework Programme 7 (FP7). The research projects are grouped as follows: the network of the future as infrastructure connecting and orchestrating the future Internet of people, computers, devices, content, clouds and things; cloud computing, Internet of Services and advanced software engineering; the public-private partnership projects on Future Internet; Future Internet Research and Experimentation (FIRE). The 26 full papers included in this volume were selected from 45 submissions. They are organized in topical sections named: software driven networks, virtualization, programmability and autonomic management; computing and networking clouds; internet of things; and enabling technologies and economic incentives."
This volume deals with the so-called new Information and Communication Technologies (ICT) and their interrelationship with Muslims and the interpretation of Islam. This volume taps into what has been labelled Media Studies 2.0, which has been characterized by an intensified focus on everyday meanings and 'lay' users - in contrast to earlier emphases on experts or self-acclaimed experts. This lay adoption of ICT and the subsequent digital 'literacy' is not least noticeable among Muslim communities. According to some global estimates, one in ten internet users is a Muslim. This volume offers an ethnography of ICT in Muslim communities. The contributors to this volume also demonstrate a new kind of moderation with regard to more sweeping and avant-gardistic claims, which have characterized the study of ICT previously. This moderation has been combined with a keen attention to the empirical material but also deliberations on new quantitative and qualitative approaches to ICT, Muslims and Islam, for instance the digital challenges and changes wrought on the Qur'an, Islam's sacred scripture. As such this volume will also be relevant for people interested in the study of ICT and the blooming field of digital humanities. Scholars of Islam and the Islamic world have always be engaged and entangled in their object of study. The developments within ICT have also affected how scholars take part in and influence public Islamic and academic discussions. This complicated issue provides basis for a number of meta-reflexive studies in this volume. It will be essential for students and scholars within Islamic studies but will also be of interest for anthropologists, sociologists and others with a humanistic interest in ICT, religion and Islam.
This book constitutes the refereed proceedings of the Workshops which complemented the 11th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2013, held in Salamanca, Spain, in May 2013. This volume presents the papers that have been accepted for the workshops: Workshop on Agent-based Approaches for the Transportation Modeling and Optimization, Workshop on Agent-Based Solutions for Manufacturing and Supply Chain, Workshop on User-Centric Technologies and Applications, Workshop on Conflict Resolution in Decision Making, Workshop on Multi-Agent System Based Learning Environments, Workshop on Multi-agent based Applications for Sustainable Energy Systems, Workshop on Agents and multi-agent Systems for AAL and e-Health
It is often argued that contemporary media homogenize our thoughts and actions, without us being fully aware of the restrictions they impose. But what if the problem is not that we are all synchronized to the same motions or moments, but rather dispersed into countless different emotional micro-experiences? What if the effect of so-called social media is to calibrate the interactive spectacle so that we never fully feel the same way as other potential allies at the same time? While one person is fuming about economic injustice or climate change denial, another is giggling at a cute cat video. And, two hours late, vice versa. The nebulous indignation which constitutes the very fuel of true social change can be redirected safely around the network, avoiding any dangerous surges of radical activity. In this short and provocative book, Dominic Pettman examines the deliberate deployment of what he calls 'hypermodulation,' as a key strategy encoded into the contemporary media environment. His account challenges the various narratives that portray social media as a sinister space of synchronized attention, in which we are busily clicking ourselves to death. This critical reflection on the unprecedented power of the Internet requires us to rethink the potential for infinite distraction that our latest technologies now allow.
This book constitutes the thoroughly refereed proceedings of the Second International Conference, GreeNets 2012, held in Gaudia, Spain, in October 2012. The 11 revised full papers presented were carefully selected and reviewed. These papers represent 23.68% of the submissions and cover topics such as communications and networking, energy-efficient network architecture and protocols, systems and technologies, and energy-efficient management.
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields. It covers aspects from educational and game theories, human-computer interaction, computer graphics, artificial intelligence, and systems design. This issue contains a special section on serious games with 8 outstanding contributions from the VS-Games 2011 conference; furthermore, there are 13 regular papers. These contributions clearly demonstrate the use of serious games and virtual worlds for edutainment applications and form a basis for further exploration and new ideas.
This volume constitutes the refereed proceedings of the 6th International Conference on Multimedia Communications, Services and Security, MCSS 2013, held in Krakow, Poland, in June 2013. The 27 full papers included in the volume were selected from numerous submissions. The papers cover various topics related to multimedia technology and its application to public safety problems. |
![]() ![]() You may like...
Engaging the Atom - The History of…
Arne Kaijser, Markku Lehtonen, …
Hardcover
R2,393
Discovery Miles 23 930
Research Handbook on Line Managers
Keith Townsend, Anna Bos-Nehles, …
Hardcover
R6,302
Discovery Miles 63 020
Positron Emission Particle Tracking - A…
Kit Windows-Yule, David Parker, …
Hardcover
R3,398
Discovery Miles 33 980
Evidence-Informed Nursing - A Guide for…
Pamela Abbott, Robert McSherry, …
Hardcover
|