0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (28)
  • R250 - R500 (203)
  • R500+ (2,620)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Bored, Lonely, Angry, Stupid - Changing Feelings about Technology, from the Telegraph to Twitter (Paperback): Luke Fernandez,... Bored, Lonely, Angry, Stupid - Changing Feelings about Technology, from the Telegraph to Twitter (Paperback)
Luke Fernandez, Susan J. Matt
R535 Discovery Miles 5 350 Ships in 12 - 17 working days

An Entrepreneur Best Book of the Year Facebook makes us lonely. Selfies breed narcissism. On Twitter, hostility reigns. Pundits and psychologists warn that digital technologies substantially alter our emotional states, but in this lively investigation of changing feelings about technology, we learn that the gadgets we use don't just affect how we feel-they can profoundly change our sense of self. When we say we're bored, we don't mean the same thing as a Victorian dandy. Could it be that political punditry has helped shape a new kind of anger? Luke Fernandez and Susan Matt take us back in time to consider how our feelings of loneliness, boredom, vanity, and anger have evolved in tandem with new technologies. "Technologies have been shaping [our] emotional culture for more than a century, argue computer scientist Luke Fernandez and historian Susan Matt in this original study. Marshalling archival sources and interviews, they trace how norms (say, around loneliness) have shifted with technological change." -Nature "A powerful story of how new forms of technology are continually integrated into the human experience." -Publishers Weekly

Social Computing, Behavioral-Cultural Modeling, and Prediction - 8th International Conference, SBP 2015, Washington, DC, USA,... Social Computing, Behavioral-Cultural Modeling, and Prediction - 8th International Conference, SBP 2015, Washington, DC, USA, March 31-April 3, 2015. Proceedings (Paperback, 2015 ed.)
Nitin Agarwal, Kevin Xu, Nathaniel Osgood
R2,936 Discovery Miles 29 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, SBP 2015, held in Washington, DC, USA, in March/April 2015. The 24 full papers presented together with 36 poster papers were carefully reviewed and selected from 118 submissions. The goal of the conference was to advance our understanding of human behavior through the development and application of mathematical, computational, statistical, simulation, predictive and other models that provide fundamental insights into factors contributing to human socio-cultural dynamics. The topical areas addressed by the papers are social and behavioral sciences, health sciences, engineering, computer and information science.

Utopia Is Creepy - And Other Provocations (Paperback): Nicholas Carr Utopia Is Creepy - And Other Provocations (Paperback)
Nicholas Carr
R443 R382 Discovery Miles 3 820 Save R61 (14%) Ships in 10 - 15 working days

Nicholas Carr has made his name as an incisive writer on our complicated relationship with technology. Utopia Is Creepy, a sharp and often funny indictment of our tech-besotted culture, collects essays drawn from Carr's popular blog Rough Type as well as seminal pieces that first appeared in The Atlantic, the MIT Technology Review and The Wall Street Journal, to provide an alternative history of our digital age over the last ten years. Carr lays bare the pitfalls alongside the benefits of the internet age, and dissects the philistinism and misanthropy that underlie Silicon Valley's "liberation mythology". With assessments of some of the crucial issues of the day, from online surveillance to the state of public discourse, Carr puts his finger on today's most pressing issues.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings (Paperback, 2015 ed.)
Michael Chau, G. Alan Wang, Hsinchun Chen
R1,287 Discovery Miles 12 870 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception and text mining.

Networked Publics and Digital Contention - The Politics of Everyday Life in Tunisia (Paperback): Mohamed Zayani Networked Publics and Digital Contention - The Politics of Everyday Life in Tunisia (Paperback)
Mohamed Zayani
R1,100 Discovery Miles 11 000 Ships in 12 - 17 working days

How is the adoption of digital media in the Arab world affecting the relationship between the state and its subjects? What new forms of online engagement and strategies of resistance have emerged from the aspirations of digitally empowered citizens? Networked Publics and Digital Contention: The Politics of Everyday Life in Tunisia tells the compelling story of the concurrent evolution of technology and society in the Middle East. It brings into focus the intricate relationship between Internet development, youth activism, cyber resistance, and political participation. Taking Tunisia - the birthplace of the Arab uprisings - as a case study, it offers an ethnographically nuanced and theoretically grounded analysis of the digital culture of contention that developed in an authoritarian context. It broadens the focus from narrow debates about the role that social media played in the Arab uprisings toward a fresh understanding of how changes in media affect existing power relations. Based on extensive fieldwork, in-depth interviews with Internet activists, and immersive analyses of online communication, this book redirects our attention from institutional politics to the informal politics of everyday life. An original contribution to the political sociology of Arab media, Networked Publics and Digital Contention provides a unique perspective on how networked Arab publics negotiate agency, reconfigure political action, and reimagine citizenship.

The Secure Information Society - Ethical, Legal and Political Challenges (Paperback, 2013 ed.): Joerg Kruger, Bertram Nickolay,... The Secure Information Society - Ethical, Legal and Political Challenges (Paperback, 2013 ed.)
Joerg Kruger, Bertram Nickolay, Sandro Gaycken
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.

Multimodal Pattern Recognition of Social Signals in Human-Computer-Interaction - Third IAPR TC3 Workshop, MPRSS 2014,... Multimodal Pattern Recognition of Social Signals in Human-Computer-Interaction - Third IAPR TC3 Workshop, MPRSS 2014, Stockholm, Sweden, August 24, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Friedhelm Schwenker, Stefan Scherer, Louis-Philippe Morency
R1,693 Discovery Miles 16 930 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the Third IAPR TC3 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction, MPRSS 2014, held in Stockholm, Sweden, in August 2014, as a satellite event of the International Conference on Pattern Recognition, ICPR 2014. The 14 revised papers presented focus on pattern recognition, machine learning and information fusion methods with applications in social signal processing, including multimodal emotion recognition, user identification, and recognition of human activities.

Managing Global Supply Chains - Compliance, Security, and Dealing with Terrorism (Hardcover): Thomas A. Cook Managing Global Supply Chains - Compliance, Security, and Dealing with Terrorism (Hardcover)
Thomas A. Cook
R3,354 Discovery Miles 33 540 Ships in 12 - 17 working days

September 11, 2001 had a profound impact upon individuals, institutions, and governments, but also upon the world of global trade. Years later, the reverberations of this deliberate and focused act of terrorism are manifest in much more stringent logistics, documentary requirements, and regulations. A single source on compliance and security, written from a supply chain managera (TM)s perspective, Managing Global Supply Chains sorts out all the issues and frames a comprehensive strategy for supply chain executives in the post 9/11 world.

Emotional Engineering - Service Development (Paperback, 2011 ed.): Shuichi Fukuda Emotional Engineering - Service Development (Paperback, 2011 ed.)
Shuichi Fukuda
R4,477 Discovery Miles 44 770 Ships in 10 - 15 working days

In an age of increasing complexity, diversification and change, customers expect services that cater to their needs and to their tastes. Emotional Engineering describes how their expectations can be satisfied and managed throughout the product life cycle, if producers focus their attention more on emotion. Emotion plays a crucial role in value recognition, but it is also important for team work, which extends beyond human-human to human-machine and human-environment to enable people to cope with frequently and extensively changing situations. Emotional Engineering proposes the development of services beyond product realization and the creation of value on a lifetime, not just a one-off, basis. As emotion is very much multidisciplinary, chapters cover a wide range of topics that can be applied to product development, including: * emotional design in the virtual environment; * shape design and modeling; * emotional robot competence; and * affective driving. Emotional Engineering is intended to provide readers with a holistic view of its research and applications, enabling them to make strategic decisions on how they can go further beyond product realization. It is recommended for all pioneers in industry, academia and government, who are trying to work with their customers to create value.

Intelligent Robotics and Applications - 7th International Conference, ICIRA 2014, Guangzhou, China, December 17-20, 2014,... Intelligent Robotics and Applications - 7th International Conference, ICIRA 2014, Guangzhou, China, December 17-20, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Xianmin Zhang, Honghai Liu, Zhong Chen, Nianfeng Wang
R3,065 Discovery Miles 30 650 Ships in 10 - 15 working days

This two volume set LNAI 8917 and 8918 constitutes the refereed proceedings of the 7th International Conference on Intelligent Robotics and Applications, ICIRA 2014, held in Guangzhou, China, in December 2014. The 109 revised full papers presented were carefully reviewed and selected from 159 submissions. The papers aim at enhancing the sharing of individual experiences and expertise in intelligent robotics with particular emphasis on technical challenges associated with varied applications such as biomedical applications, industrial automations, surveillance, and sustainable mobility.

Cyberbullying - From theory to intervention (Paperback): Trijntje Voellink, Francine Dehue, Conor McGuckin Cyberbullying - From theory to intervention (Paperback)
Trijntje Voellink, Francine Dehue, Conor McGuckin
R1,673 Discovery Miles 16 730 Ships in 12 - 17 working days

The study of cyberbullying has exploded since its first appearance in a peer-reviewed journal article in 2005. Cyberbullying: From theory to intervention aims to make clear and practical sense of this proliferation of coverage by defining the problem of cyberbullying and examining its unique features. The volume provides a thorough overview of state-of-the-art research into the phenomenon, and discusses the development and evaluation of interventions to prevent and combat it. Whereas most research papers offer limited space to describe actual intervention methods, this book provides tremendous insight into the different theoretical methods and practical strategies available to combat cyberbullying. Part One provides readers with a critical review of the existing research literature and collects insights from international researchers involved in bullying and cyberbullying research, tackling key questions such as: how is cyberbullying defined, what is the overlap with traditional bullying, and what are the negative consequences of cyberbullying? Part Two gives an overview of the development and content of evidence-based ICT interventions aimed at preventing and combating bullying and cyberbullying. In addition, some of the important outcomes of the effect evaluations will be described. The book's final chapter integrates the information from Part One with advice regarding practical applications from Part Two. Cyberbullying: From theory to intervention is essential reading for academics and researchers concerned with both cyberbullying and traditional bullying. It can be used in graduate seminars or advanced undergraduate courses in cyberbullying and will also be of interest to teachers, field experts and organisations involved and disseminating cyberbullying solutions.

Proceedings of COOP 2010 - Proceedings of the 9th International Conference on Designing Cooperative Systems, May, 18-21, 2010,... Proceedings of COOP 2010 - Proceedings of the 9th International Conference on Designing Cooperative Systems, May, 18-21, 2010, Aix-en-Provence (Paperback, 2010 ed.)
Myriam Lewkowicz, Parina Hassanaly, Markus Rohde, Volker Wulf
R4,463 Discovery Miles 44 630 Ships in 10 - 15 working days

COOP 2010 is the 9th edition of the International Conference on Designing Cooperative Systems, being the second European conference in the field of Computer Supported Cooperative Work after ECSCW. The conference brings together researchers who contribute to the analysis and design of cooperative systems and their integration in organizational community, public and other settings, and their implications for policy and decision making. Cooperative systems design requires a deep understanding of collective activities, involving both artifacts and social practices. Contributions are solicited from a wide range of domains contributing to the fields of cooperative systems design and evaluation: CSCW, HCI, Information Systems, Knowledge Engineering, Multi-agents, organizational and management sciences, sociology, psychology, anthropology, ergonomics, linguistics.

Product-Focused Software Process Improvement - 15th International Conference, PROFES 2014, Helsinki, Finland, December 10-12,... Product-Focused Software Process Improvement - 15th International Conference, PROFES 2014, Helsinki, Finland, December 10-12, 2014, Proceedings (Paperback, 2014 ed.)
Andreas Jedlitschka, Pasi Kuvaja, Marco Kuhrmann, Tomi Mannistoe, Jurgen Munch, …
R2,500 Discovery Miles 25 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Product-Focused Software Process Improvement, PROFES 2014, held in Helsinki, Finland, in December 2014. The 18 revised full papers presented together with 14 short papers were carefully reviewed and selected from 45 initial submissions. The papers are organized in topical sections on agile development, decision-making, development practices and issues, product planning, and project management.

Legal Programming - Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond... Legal Programming - Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond (Paperback, 2005 ed.)
Brian Subirana, Malcolm Bain
R3,192 Discovery Miles 31 920 Ships in 10 - 15 working days

Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides a process-oriented discussion of the legal concerns presented by agent-based technologies, processes and programming. It offers a general outline of the potential legal difficulties that could arise in relation to them, focusing on the programming of negotiation and contracting processes in a privacy, consumer and commercial context. The authors will elucidate how it is possible to create form of legal framework and design methodology for transaction agents, applicable in any environment and not just in a specific proprietary framework, that provides the right level of compliance and trust. Key elements considered include the design and programming of legally compliant methods, the determination of rights in respect of objects and variables, and ontologies and programming frameworks for agent interactions. Examples are used to illustrate the points made and provide a practical perspective.

Software Services for e-World - 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires,... Software Services for e-World - 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires, Argentina, November 3-5, 2010, Proceedings (Paperback, 2010 ed.)
Wojciech Cellary, Elsa Estevez
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.

History of Computing: Learning from the Past - IFIP WG 9.7 International Conference, HC 2010, Held as Part of WCC 2010,... History of Computing: Learning from the Past - IFIP WG 9.7 International Conference, HC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Paperback, 2010 ed.)
Arthur Tatnall
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

History of Computing: Learning from the Past Why is the history of computing important? Given that the computer, as we now know it, came into existence less than 70 years ago it might seem a little odd to some people that we are concerned with its history. Isn't history about 'old things'? Computing, of course, goes back much further than 70 years with many earlier - vices rightly being known as computers, and their history is, of course, important. It is only the history of electronic digital computers that is relatively recent. History is often justified by use of a quote from George Santayana who famously said that: 'Those who cannot remember the past are condemned to repeat it'. It is arguable whether there are particular mistakes in the history of computing that we should avoid in the future, but there is some circularity in this question, as the only way we will know the answer to this is to study our history. This book contains papers on a wide range of topics relating to the history of c- puting, written both by historians and also by those who were involved in creating this history. The papers are the result of an international conference on the History of Computing that was held as a part of the IFIP World Computer Congress in Brisbane in September 2010.

Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January... Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers (Paperback, 2010 ed.)
Kam-Pui Chow, Sujeet Shenoi
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.

Patent Law for Computer Scientists - Steps to Protect Computer-Implemented Inventions (Paperback, 2010 ed.): Daniel Closa, Alex... Patent Law for Computer Scientists - Steps to Protect Computer-Implemented Inventions (Paperback, 2010 ed.)
Daniel Closa, Alex Gardiner, Falk Giemsa, Joerg Machek
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications where the innovation mainly resides in software or in a business method are treated differently by the major patent offices in the US (USPTO), Japan (JPO), and Europe (EPO). The authors start with a thorough introduction into patent laws and practices, as well as in related intellectual property rights, which also explains the procedures at the USPTO, JPO and EPO and, in particular, the peculiarities in the treatment of applications centering on software or computers. Based on this theoretical description, next they present in a very structured way a huge set of case studies from different areas like business methods, databases, graphical user interfaces, digital rights management, and many more. Each set starts with a rather short description and claim of the "invention", then explains the arguments a legal examiner will probably have, and eventually refines the description step by step, until all the reservations are resolved. All of these case studies are based on real-world examples, and will thus give an inexperienced developer an idea about the required level of detail and description he will have to provide. Together, Closa, Gardiner, Giemsa and Machek have more than 70 years experience in the patent business. With their academic background in physics, electronic engineering, and computer science, they know about both the legal and the subject-based subtleties of computer-based inventions. With this book, they provide a guide to a patent examiner's way of thinking in a clear and systematic manner, helping to prepare the first steps towards a successful patent application.

The Taxobook - Principles and Practices of Building Taxonomies, Part 2 of a 3-Part Series (Paperback): Marjorie Hlava The Taxobook - Principles and Practices of Building Taxonomies, Part 2 of a 3-Part Series (Paperback)
Marjorie Hlava
R1,514 Discovery Miles 15 140 Ships in 10 - 15 working days

This book outlines the basic principles of creation and maintenance of taxonomies and thesauri. It also provides step by step instructions for building a taxonomy or thesaurus and discusses the various ways to get started on a taxonomy construction project. Often, the first step is to get management and budgetary approval, so I start this book with a discussion of reasons to embark on the taxonomy journey. From there I move on to a discussion of metadata and how taxonomies and metadata are related, and then consider how, where, and why taxonomies are used. Information architecture has its cornerstone in taxonomies and metadata. While a good discussion of information architecture is beyond the scope of this work, I do provide a brief discussion of the interrelationships among taxonomies, metadata, and information architecture. Moving on to the central focus of this book, I introduce the basics of taxonomies, including a definition of vocabulary control and why it is so important, how indexing and tagging relate to taxonomies, a few of the types of tagging, and a definition and discussion of post- and pre-coordinate indexing. After that I present the concept of a hierarchical structure for vocabularies and discuss the differences among various kinds of controlled vocabularies, such as taxonomies, thesauri, authority files, and ontologies. Once you have a green light for your project, what is the next step? Here I present a few options for the first phase of taxonomy construction and then a more detailed discussion of metadata and markup languages. I believe that it is important to understand the markup languages (SGML and XML specifically, and HTML to a lesser extent) in relation to information structure, and how taxonomies and metadata feed into that structure. After that, I present the steps required to build a taxonomy, from defining the focus, collecting and organizing terms, analyzing your vocabulary for even coverage over subject areas, filling in gaps, creating relationships between terms, and applying those terms to your content. Here I offer a cautionary note: don't believe that your taxonomy is "done!" Regular, scheduled maintenance is an important-critical, really-component of taxonomy construction projects. After you've worked through the steps in this book, you will be ready to move on to integrating your taxonomy into the workflow of your organization. This is covered in Book 3 of this series. Table of Contents: List of Figures / Preface / Acknowledgments / Building a Case for Building a Taxonomy / Taxonomy Basics / Getting Started / Terms: The Building Blocks of a Taxonomy / Building the Structure of Your Taxonomy / Evaluation and Maintenance / Standards and Taxonomies / Glossary / End Notes / Author Biography

AI Approaches to the Complexity of Legal Systems - AICOL 2013 International Workshops, AICOL-IV@IVR, Belo Horizonte, Brazil,... AI Approaches to the Complexity of Legal Systems - AICOL 2013 International Workshops, AICOL-IV@IVR, Belo Horizonte, Brazil, July 21-27, 2013 and AICOL-V@SINTELNET-JURIX, Bologna, Italy, December 11, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Pompeu Casanovas, Ugo Pagallo, Monica Palmirani, Giovanni Sartor
R2,382 Discovery Miles 23 820 Ships in 10 - 15 working days

This book constitutes revised selected papers from the two International Workshops on Artificial Intelligence Approaches to the Complexity of Legal Systems, AICOL IV and AICOL V, held in 2013. The first took place as part of the 26th IVR Congress in Belo Horizonte, Brazil, during July 21-27, 2013; the second was held in Bologna as a joint special workshop of JURIX 2013 on December 11, 2013. The 19 papers presented in this volume were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: social intelligence and legal conceptual models; legal theory, normative systems and software agents; semantic Web technologies, legal ontologies and argumentation; and crowdsourcing and online dispute resolution (ODR).

Telematics - Support for Transport - 14th International Conference on Transport Systems Telematics, TST 2014,... Telematics - Support for Transport - 14th International Conference on Transport Systems Telematics, TST 2014, Katowice/Krakow/Ustron, Poland, October 22-25, 2014. Proceedings (Paperback, 2014 ed.)
Jerzy Mikulski
R2,912 Discovery Miles 29 120 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th International Conference on Transport Systems Telematics, TST 2014, held in Katowice/Krakow and Ustron, Poland, in October 2014. The 49 papers included in this volume were carefully reviewed and selected from 125 submissions. The papers provide an overview of solutions being developed in the fields of transport telematics and intelligent transport systems.

Haptics: Neuroscience, Devices, Modeling, and Applications - 9th International Conference, EuroHaptics 2014, Versailles,... Haptics: Neuroscience, Devices, Modeling, and Applications - 9th International Conference, EuroHaptics 2014, Versailles, France, June 24-26, 2014, Proceedings, Part II (Paperback, 2014 ed.)
Malika Auvray, Christian Duriez
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

The two-volume set LNCS 8618 and 8619 constitutes the refereed proceedings of the 9th International Conference EuroHaptics 2014, held in Versailles, France, in June 2014. The 118 papers (36 oral presentations and 82 poster presentations) presented were carefully reviewed and selected from 183 submissions. Furthermore, 27 demos were exhibited, each of them resulting in a short paper included in the volumes. These proceedings reflect the multidisciplinary nature of EuroHaptics and cover topics such as human-computer interaction, human-robot interactions, neuroscience, perception and psychophysics, biomechanics and motor control, modelling and simulation; and a broad range of applications in medicine, rehabilitation, art, and design.

Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014,... Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Frances Cleary, Massimo Felici
R2,028 Discovery Miles 20 280 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.

(Re)Searching the Digital Bauhaus (Paperback, 2009 ed.): Thomas Binder, Jonas Loewgren, Lone Malmborg (Re)Searching the Digital Bauhaus (Paperback, 2009 ed.)
Thomas Binder, Jonas Loewgren, Lone Malmborg
R4,467 Discovery Miles 44 670 Ships in 10 - 15 working days

The intent of this chapter is to outline a distinctive way of thinking about issues of technology and society that has characterized many Nordic approaches to the topic. One of the characteristics of this approach has been the recognition of the worth of human labour. Technology is not seen as an alien force, but something which is itself a product of human labour, and it can be designed and utilized in ways which augment human skills and expertise, rather than degrading them. What is particularly striking, at least to this author, in this approach is that we are presented not simply with a vision of how things could be better in our society, but with concrete exemplars of how we can build such a better world. It is in recognition of this fact that I have chosen the title of this chapter, as it emphasizes that, while the tradition of Utopian literature is the - lineation of a supposedly idea world which exists no-place (u-topos, in Greek), these visions can be an inspiration for quite practical activities on the ground, as steps towards their realization. As Wilde notes (in the quote above) this is a never-ending quest, as with each achievement, we recognize that there are further bridges to cross and places to be visited.

Trust Management for Service-Oriented Environments (Paperback, 2009 ed.): Zaki Malik, Athman Bouguettaya Trust Management for Service-Oriented Environments (Paperback, 2009 ed.)
Zaki Malik, Athman Bouguettaya
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world. The result of this on-going migration is a new place very much different from the physical world, one where interconnected services interact with human users, sensors and embedded devices. Yet for this vision to become reality, trust needs to be addressed as members of the global e-society r- ularly today deal with the question whether they can trust other, unknown parties. Trust is a vital component of internet-based interactions and service-oriented en- ronment, but all too often it is assumed to be an implicit property that exists in the background rather than being an explicit property that is well-de ned and quant- able. While providing trust is challenging in existing computing systems, providing trust in service oriented environments is much more complex due to the dynamic and adaptable nature of these environment which are often large scale and across domains. To date the problem of trust for service oriented environments has been largely unexplored. This book represents the rst comprehensivecoverageof the principles,methods and systems for trust management and evaluation in service oriented environments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook on Crime and Technology
Don Hummer, James M. Byrne Hardcover R6,475 Discovery Miles 64 750
Scholarly Communication in China, Hong…
Jingfeng Xia Hardcover R1,967 Discovery Miles 19 670
The Citizen Marketer
Joel Penney Hardcover R3,390 Discovery Miles 33 900
The Alignment Problem - Machine Learning…
Brian Christian Paperback R528 R458 Discovery Miles 4 580
The Everyday Life of an Algorithm
Daniel Neyland Hardcover R1,403 Discovery Miles 14 030
Autonomous Vehicles - Tracing the Locus…
Atilla Kasap Hardcover R2,766 Discovery Miles 27 660
Security and Privacy in the Internet of…
AI Awad Hardcover R3,426 Discovery Miles 34 260
Security and Privacy Issues in Internet…
Rajkumar Buyya, Muhammad Imran Tariq, … Paperback R3,456 Discovery Miles 34 560
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R576 R520 Discovery Miles 5 200

 

Partners