0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (24)
  • R250 - R500 (190)
  • R500+ (2,628)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Computers, Privacy and Data Protection: an Element of Choice (Paperback, 2011 ed.): Serge Gutwirth, Yves Poullet, Paul De Hert,... Computers, Privacy and Data Protection: an Element of Choice (Paperback, 2011 ed.)
Serge Gutwirth, Yves Poullet, Paul De Hert, Ronald Leenes
R5,194 Discovery Miles 51 940 Ships in 18 - 22 working days

This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.

(Re)Searching the Digital Bauhaus (Paperback, 2009 ed.): Thomas Binder, Jonas Loewgren, Lone Malmborg (Re)Searching the Digital Bauhaus (Paperback, 2009 ed.)
Thomas Binder, Jonas Loewgren, Lone Malmborg
R4,035 Discovery Miles 40 350 Ships in 18 - 22 working days

The intent of this chapter is to outline a distinctive way of thinking about issues of technology and society that has characterized many Nordic approaches to the topic. One of the characteristics of this approach has been the recognition of the worth of human labour. Technology is not seen as an alien force, but something which is itself a product of human labour, and it can be designed and utilized in ways which augment human skills and expertise, rather than degrading them. What is particularly striking, at least to this author, in this approach is that we are presented not simply with a vision of how things could be better in our society, but with concrete exemplars of how we can build such a better world. It is in recognition of this fact that I have chosen the title of this chapter, as it emphasizes that, while the tradition of Utopian literature is the - lineation of a supposedly idea world which exists no-place (u-topos, in Greek), these visions can be an inspiration for quite practical activities on the ground, as steps towards their realization. As Wilde notes (in the quote above) this is a never-ending quest, as with each achievement, we recognize that there are further bridges to cross and places to be visited.

Legal Programming - Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond... Legal Programming - Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond (Paperback, 2005 ed.)
Brian Subirana, Malcolm Bain
R2,890 Discovery Miles 28 900 Ships in 18 - 22 working days

Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides a process-oriented discussion of the legal concerns presented by agent-based technologies, processes and programming. It offers a general outline of the potential legal difficulties that could arise in relation to them, focusing on the programming of negotiation and contracting processes in a privacy, consumer and commercial context. The authors will elucidate how it is possible to create form of legal framework and design methodology for transaction agents, applicable in any environment and not just in a specific proprietary framework, that provides the right level of compliance and trust. Key elements considered include the design and programming of legally compliant methods, the determination of rights in respect of objects and variables, and ontologies and programming frameworks for agent interactions. Examples are used to illustrate the points made and provide a practical perspective.

Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (Paperback,... Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu
R2,344 Discovery Miles 23 440 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.

A Journey Through Cultures - Metaphors for Guiding the Design of Cross-Cultural Interactive Systems (Paperback, 2013 ed.):... A Journey Through Cultures - Metaphors for Guiding the Design of Cross-Cultural Interactive Systems (Paperback, 2013 ed.)
Luciana Cardoso De Castro Salgado, Carla Faria Leitao, Clarisse Sieckenius de Souza
R2,986 Discovery Miles 29 860 Ships in 18 - 22 working days

A Journey Through Cultures addresses one of the hottest topics in contemporary HCI: cultural diversity amongst users. For a number of years the HCI community has been investigating alternatives to enhance the design of cross-cultural systems. Most contributions to date have followed either a 'design for each' or a 'design for all' strategy. A Journey Through Cultures takes a very different approach. Proponents of CVM - the Cultural Viewpoint Metaphors perspective - the authors invite HCI practitioners to think of how to expose and communicate the idea of cultural diversity. A detailed case study is included which assesses the metaphors' potential in cross-cultural design and evaluation. The results show that cultural viewpoint metaphors have strong epistemic power, leveraged by a combination of theoretic foundations coming from Anthropology, Semiotics and the authors' own work in HCI and Semiotic Engineering. Luciana Salgado, Carla Leitao and Clarisse de Souza are members of SERG, the Semiotic Engineering Research Group at the Departamento de Informatica of Rio de Janeiro's Pontifical Catholic University (PUC-Rio).

Computational Social Networks - Mining and Visualization (Paperback, 2012 ed.): Ajith Abraham Computational Social Networks - Mining and Visualization (Paperback, 2012 ed.)
Ajith Abraham
R2,681 Discovery Miles 26 810 Ships in 18 - 22 working days

This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the other two volumes review Tools, Perspectives, and Applications, and Security and Privacy in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage from a better understanding of complex social networks; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, highlighting methods for the data mining of CSNs; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Advances in Social Computing and Multiagent Systems - 6th International Workshop on Collaborative Agents Research and... Advances in Social Computing and Multiagent Systems - 6th International Workshop on Collaborative Agents Research and Development, CARE 2015 and Second International Workshop on Multiagent Foundations of Social Computing, MFSC 2015, Istanbul, Turkey, May 4, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Fernando Koch, Christian Guttmann, Didac Busquets
R1,931 Discovery Miles 19 310 Ships in 18 - 22 working days

This book constitutes thoroughly revised, selected papers of the proceedings of the 6th International Workshop on Collaborative Agents Research and Development, CARE 2015 and the Second International Workshop on Multi-agent Foundations of Social Computing, MFSC 2015, held in Istanbul, Turkey, on May 4, 2015. Both Workshops were held in conjunction with AAMAS 2015. The 5 revised full papers of CARE and the 7 full papers of MFSC presented were carefully selected from 14 CARE and 10 MFSC submissions. Both workshop address issues in relevant areas of social computing such as smart societies, social applications, urban intelligence, intelligent mobile services, models of teamwork and collaboration.

Tools of Transport Telematics - 15th International Conference on Transport  Systems Telematics, TST 2015, Wroclaw, Poland,... Tools of Transport Telematics - 15th International Conference on Transport Systems Telematics, TST 2015, Wroclaw, Poland, April 15-17, 2015. Selected Papers (Paperback, 1st ed. 2015)
Jerzy Mikulski
R2,396 Discovery Miles 23 960 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Conference on Transport Systems Telematics, TST 2015, held in Wroclaw, Poland, in April 2015. The 35 revised full papers and two short papers included in this volume were carefully reviewed and selected from 115 submissions. The papers provide an overview of solutions being developed in the fields of transport telematics and intelligent transport systems.

Informatics in SchoolsTeaching and Learning Perspectives - 7th International Conference on Informatics in Schools: Situation,... Informatics in SchoolsTeaching and Learning Perspectives - 7th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2014, Istanbul, Turkey, September 22-25, 2014. Proceedings (Paperback, 2014 ed.)
Yasemin Gulbahar, Erinc Karatas
R1,641 Discovery Miles 16 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2014, held in Istanbul, Turkey, in September 2014. The 13 full papers presented together with 2 keynotes were carefully reviewed and selected from 33 submissions. The focus of the conference was on following topics: Competence Science Education, Competence Measurement for Informatics, Emerging Technologies and Tools for Informatics, Teacher Education in Informatics, and Curriculum Issues.

Smart Grid Security - Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected... Smart Grid Security - Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Jorge Cuellar
R1,673 Discovery Miles 16 730 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.

Computational Social Networks - Security and Privacy (Paperback, 2012 ed.): Ajith Abraham Computational Social Networks - Security and Privacy (Paperback, 2012 ed.)
Ajith Abraham
R2,672 Discovery Miles 26 720 Ships in 18 - 22 working days

This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Connecting Families - The Impact of New Communication Technologies on Domestic Life (Paperback, 2013 ed.): Carman Neustaedter,... Connecting Families - The Impact of New Communication Technologies on Domestic Life (Paperback, 2013 ed.)
Carman Neustaedter, Steve Harrison, Abigail Sellen
R1,910 Discovery Miles 19 100 Ships in 18 - 22 working days

New technologies are radically changing the way that families connect with one another: we can text our teenagers from work, eat dinner with far-away parents via video link, and instantly upload and share photos after a family day out. Whether we are bridging time or distance, and whether we are enhancing our closest relationships or strengthening the bonds of extended family, as computer technologies alter the communication landscape, they in turn are changing the way we conduct and experience family life. This state of the art volume explores the impact of new communication systems on how families interact - how they share their lives and routines, engage in social touch, and negotiate being together or being apart - by considering a range of different family relationships that shape the nature of communication. Composed of three sections, the first looks at what is often the core of a 'family', the couple, to understand the impact of technology on couple relationships, communication, and feelings of closeness. The second section studies immediate families that have expanded beyond just the individual or couple to include children. Here, the emphasis is on connection for communication, coordination, and play. The third section moves beyond the immediate family to explore connections between extended, distributed family members. This includes connections between adult children and their parents, grandparents and grandchildren, and adult siblings. Here family members have grown older, moved away from 'home', and forged new families. Researchers, designers and developers of new communication technologies will find this volume invaluable. Connecting Families: The Impact of New Communication Technologies on Domestic Life brings together the most up-to-date studies to help in understanding how new communication technologies shape - and are shaped by - family life, and offers inspiration and guidance for design by making clear what families need and value from technological systems.

Privacy vs. Security (Paperback, 2014 ed.): Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan Privacy vs. Security (Paperback, 2014 ed.)
Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Securing privacy in the current environment is one of the great challenges of today s democracies. "Privacy vs. Security" explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today s attacks on privacy by the simple use of today s technology, like web services and e-payment technologies and by State-level surveillance activities."

Multiple Access Communications - 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014, Proceedings... Multiple Access Communications - 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014, Proceedings (Paperback, 2014 ed.)
Magnus Jonsson, Alexey Vinel, Boris Bellalta, Evgeny Belyaev
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Multiple Access Communications, MACOM 2014, held in Halmstad, Sweden, in August 2014. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They describe the latest advancements in the field of multiple access communications with an emphasis on reliability issues, physical layer techniques, cognitive radio, medium access control protocols, and video coding.

Virtual, Augmented and Mixed Reality: Designing and Developing Augmented and Virtual Environments - 6th International... Virtual, Augmented and Mixed Reality: Designing and Developing Augmented and Virtual Environments - 6th International Conference, VAMR 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Randall Shumaker, Lackey Stephanie
R2,576 Discovery Miles 25 760 Ships in 18 - 22 working days

The two-volume set LNCS 8525-8526 constitutes the refereed proceedings of the 6th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI 2014, in Heraklion, Crete, Greece, in June 2014, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 82 contributions included in the VAMR proceedings were carefully reviewed and selected for inclusion in this two-volume set. The 39 papers included in this volume are organized in the following topical sections: interaction devices, displays and techniques in VAMR; designing virtual and augmented environments; avatars and virtual characters; developing virtual and augmented environments.

Distributed, Ambient, and Pervasive Interactions - Second International Conference, DAPI 2014, Held as Part of HCI... Distributed, Ambient, and Pervasive Interactions - Second International Conference, DAPI 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings (Paperback, 2014 ed.)
Norbert Streitz, Panos Markopoulos
R3,126 Discovery Miles 31 260 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Distributed, Ambient, and Pervasive Interactions, DAPI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 13 other thematically conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 58 papers included in this volume are organized in topical sections on design frameworks and models for intelligent interactive environments; natural interaction; cognitive, perceptual and emotional issues in ambient intelligence; user experience in intelligent environments; developing distributed, pervasive and intelligent environments; smart cities.

Networked Publics and Digital Contention - The Politics of Everyday Life in Tunisia (Paperback): Mohamed Zayani Networked Publics and Digital Contention - The Politics of Everyday Life in Tunisia (Paperback)
Mohamed Zayani
R1,086 Discovery Miles 10 860 Ships in 18 - 22 working days

How is the adoption of digital media in the Arab world affecting the relationship between the state and its subjects? What new forms of online engagement and strategies of resistance have emerged from the aspirations of digitally empowered citizens? Networked Publics and Digital Contention: The Politics of Everyday Life in Tunisia tells the compelling story of the concurrent evolution of technology and society in the Middle East. It brings into focus the intricate relationship between Internet development, youth activism, cyber resistance, and political participation. Taking Tunisia - the birthplace of the Arab uprisings - as a case study, it offers an ethnographically nuanced and theoretically grounded analysis of the digital culture of contention that developed in an authoritarian context. It broadens the focus from narrow debates about the role that social media played in the Arab uprisings toward a fresh understanding of how changes in media affect existing power relations. Based on extensive fieldwork, in-depth interviews with Internet activists, and immersive analyses of online communication, this book redirects our attention from institutional politics to the informal politics of everyday life. An original contribution to the political sociology of Arab media, Networked Publics and Digital Contention provides a unique perspective on how networked Arab publics negotiate agency, reconfigure political action, and reimagine citizenship.

The Philosophy of Computer Games (Paperback, 2012 ed.): John Richard Sageng, Hallvard J. Fossheim, Tarjei Mandt Larsen The Philosophy of Computer Games (Paperback, 2012 ed.)
John Richard Sageng, Hallvard J. Fossheim, Tarjei Mandt Larsen
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

Computer games have become a major cultural and economic force, and a subject of extensive academic interest. Up until now, however, computer games have received relatively little attention from philosophy. Seeking to remedy this, the present collection of newly written papers by philosophers and media researchers addresses a range of philosophical questions related to three issues of crucial importance for understanding the phenomenon of computer games: the nature of gameplay and player experience, the moral evaluability of player and avatar actions, and the reality status of the gaming environment. By doing so, the book aims to establish the philosophy of computer games as an important strand of computer games research, and as a separate field of philosophical inquiry. The book is required reading for anyone with an academic or professional interest in computer games, and will also be of value to readers curious about the philosophical issues raised by contemporary digital culture.

Managing Global Supply Chains - Compliance, Security, and Dealing with Terrorism (Hardcover): Thomas A. Cook Managing Global Supply Chains - Compliance, Security, and Dealing with Terrorism (Hardcover)
Thomas A. Cook
R3,381 Discovery Miles 33 810 Ships in 10 - 15 working days

September 11, 2001 had a profound impact upon individuals, institutions, and governments, but also upon the world of global trade. Years later, the reverberations of this deliberate and focused act of terrorism are manifest in much more stringent logistics, documentary requirements, and regulations. A single source on compliance and security, written from a supply chain managera (TM)s perspective, Managing Global Supply Chains sorts out all the issues and frames a comprehensive strategy for supply chain executives in the post 9/11 world.

Design, User Experience, and Usability: User Experience Design Practice - Third International Conference, DUXU 2014, Held as... Design, User Experience, and Usability: User Experience Design Practice - Third International Conference, DUXU 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part IV (Paperback, 2014 ed.)
Aaron Marcus
R2,714 Discovery Miles 27 140 Ships in 18 - 22 working days

The four-volume set LNCS 8517, 8518, 8519 and 8520 constitutes the proceedings of the Third International Conference on Design, User Experience, and Usability, DUXU 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 256 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in this four-volume set. The 45 papers included in this volume are organized in topical sections on DUXU in the enterprise, design for diverse target users, emotional and persuasion design, user experience case studies.

Nordic Contributions in IS Research - 5th Scandinavian Conference on Information Systems, SCIS 2014, Ringsted, Denmark, August... Nordic Contributions in IS Research - 5th Scandinavian Conference on Information Systems, SCIS 2014, Ringsted, Denmark, August 10-13, 2014, Proceedings (Paperback, 2014 ed.)
Trine Hald Commisso, Jacob Norbjerg, Jan Pries-Heje
R1,514 Discovery Miles 15 140 Ships in 18 - 22 working days

This book contains the refereed proceedings of the 5th Scandinavian Conference on Information Systems, SCIS 2014, held in Ringsted, Denmark, in August 2014. The theme for this book as well as for the conference is "Designing Human Technologies." The theme combines the interplay of people with technology-a classic theme in Scandinavian information systems research-with a growing interest within the IS research field in design and design science research. The nine papers accepted for SCIS 2014 were selected from 22 submissions.

Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014,... Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings (Paperback, 2014 ed.)
Thorsten Holz, Sotiris Ioannidis
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.

Virtual, Augmented and Mixed Reality: Applications of Virtual and Augmented Reality - 6th International Conference, VAMR 2014,... Virtual, Augmented and Mixed Reality: Applications of Virtual and Augmented Reality - 6th International Conference, VAMR 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part II (Paperback, 2014 ed.)
Randall Shumaker, Lackey Stephanie
R2,703 Discovery Miles 27 030 Ships in 18 - 22 working days

The two-volume set LNCS 8525-8526 constitutes the refereed proceedings of the 6th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI 2014, in Heraklion, Crete, Greece, in June 2014, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 82 contributions included in the VAMR proceedings were carefully reviewed and selected for inclusion in this two-volume set. The 43 papers included in this volume are organized in the following topical sections: VAMR in education and cultural heritage; games and entertainment; medical, health and rehabilitation applications; industrial, safety and military applications.

Emerging Pervasive Information and Communication Technologies (PICT) - Ethical Challenges, Opportunities and Safeguards... Emerging Pervasive Information and Communication Technologies (PICT) - Ethical Challenges, Opportunities and Safeguards (Paperback, Softcover reprint of the original 1st ed. 2014)
Kenneth D. Pimple
R2,058 Discovery Miles 20 580 Ships in 18 - 22 working days

This book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) - small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of "big data," and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation. PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities. Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care. Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics - "ethical analysis aimed at influencing the development of new technologies" (Deborah Johnson 2010). The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities - if only to "do no harm" - before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.

Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings... Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R1,899 Discovery Miles 18 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Alignment Problem - Machine Learning…
Brian Christian Paperback R474 R445 Discovery Miles 4 450
Handbook on Crime and Technology
Don Hummer, James M. Byrne Hardcover R7,104 Discovery Miles 71 040
Misbelief - What Makes Rational People…
Dan Ariely Paperback R350 R317 Discovery Miles 3 170
Using Computational Intelligence for the…
Romil Rawat, Upinder Kaur, … Hardcover R6,212 Discovery Miles 62 120
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen Hardcover R4,152 Discovery Miles 41 520
Global Health Informatics - How…
Heimar Marin, Eduardo Massad, … Paperback R1,872 Discovery Miles 18 720
Extremely Hardcore - Inside Elon Musk's…
Zoë Schiffer Hardcover R680 R585 Discovery Miles 5 850
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R348 Discovery Miles 3 480
Digital Identity, Virtual Borders and…
Emre E. Korkmaz Hardcover R2,807 Discovery Miles 28 070
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R3,245 Discovery Miles 32 450

 

Partners