![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
An Entrepreneur Best Book of the Year Facebook makes us lonely. Selfies breed narcissism. On Twitter, hostility reigns. Pundits and psychologists warn that digital technologies substantially alter our emotional states, but in this lively investigation of changing feelings about technology, we learn that the gadgets we use don't just affect how we feel-they can profoundly change our sense of self. When we say we're bored, we don't mean the same thing as a Victorian dandy. Could it be that political punditry has helped shape a new kind of anger? Luke Fernandez and Susan Matt take us back in time to consider how our feelings of loneliness, boredom, vanity, and anger have evolved in tandem with new technologies. "Technologies have been shaping [our] emotional culture for more than a century, argue computer scientist Luke Fernandez and historian Susan Matt in this original study. Marshalling archival sources and interviews, they trace how norms (say, around loneliness) have shifted with technological change." -Nature "A powerful story of how new forms of technology are continually integrated into the human experience." -Publishers Weekly
This book constitutes the refereed proceedings of the 8th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, SBP 2015, held in Washington, DC, USA, in March/April 2015. The 24 full papers presented together with 36 poster papers were carefully reviewed and selected from 118 submissions. The goal of the conference was to advance our understanding of human behavior through the development and application of mathematical, computational, statistical, simulation, predictive and other models that provide fundamental insights into factors contributing to human socio-cultural dynamics. The topical areas addressed by the papers are social and behavioral sciences, health sciences, engineering, computer and information science.
Nicholas Carr has made his name as an incisive writer on our complicated relationship with technology. Utopia Is Creepy, a sharp and often funny indictment of our tech-besotted culture, collects essays drawn from Carr's popular blog Rough Type as well as seminal pieces that first appeared in The Atlantic, the MIT Technology Review and The Wall Street Journal, to provide an alternative history of our digital age over the last ten years. Carr lays bare the pitfalls alongside the benefits of the internet age, and dissects the philistinism and misanthropy that underlie Silicon Valley's "liberation mythology". With assessments of some of the crucial issues of the day, from online surveillance to the state of public discourse, Carr puts his finger on today's most pressing issues.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception and text mining.
How is the adoption of digital media in the Arab world affecting the relationship between the state and its subjects? What new forms of online engagement and strategies of resistance have emerged from the aspirations of digitally empowered citizens? Networked Publics and Digital Contention: The Politics of Everyday Life in Tunisia tells the compelling story of the concurrent evolution of technology and society in the Middle East. It brings into focus the intricate relationship between Internet development, youth activism, cyber resistance, and political participation. Taking Tunisia - the birthplace of the Arab uprisings - as a case study, it offers an ethnographically nuanced and theoretically grounded analysis of the digital culture of contention that developed in an authoritarian context. It broadens the focus from narrow debates about the role that social media played in the Arab uprisings toward a fresh understanding of how changes in media affect existing power relations. Based on extensive fieldwork, in-depth interviews with Internet activists, and immersive analyses of online communication, this book redirects our attention from institutional politics to the informal politics of everyday life. An original contribution to the political sociology of Arab media, Networked Publics and Digital Contention provides a unique perspective on how networked Arab publics negotiate agency, reconfigure political action, and reimagine citizenship.
In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.
This book constitutes the thoroughly refereed post-workshop proceedings of the Third IAPR TC3 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction, MPRSS 2014, held in Stockholm, Sweden, in August 2014, as a satellite event of the International Conference on Pattern Recognition, ICPR 2014. The 14 revised papers presented focus on pattern recognition, machine learning and information fusion methods with applications in social signal processing, including multimodal emotion recognition, user identification, and recognition of human activities.
September 11, 2001 had a profound impact upon individuals, institutions, and governments, but also upon the world of global trade. Years later, the reverberations of this deliberate and focused act of terrorism are manifest in much more stringent logistics, documentary requirements, and regulations. A single source on compliance and security, written from a supply chain managera (TM)s perspective, Managing Global Supply Chains sorts out all the issues and frames a comprehensive strategy for supply chain executives in the post 9/11 world.
In an age of increasing complexity, diversification and change, customers expect services that cater to their needs and to their tastes. Emotional Engineering describes how their expectations can be satisfied and managed throughout the product life cycle, if producers focus their attention more on emotion. Emotion plays a crucial role in value recognition, but it is also important for team work, which extends beyond human-human to human-machine and human-environment to enable people to cope with frequently and extensively changing situations. Emotional Engineering proposes the development of services beyond product realization and the creation of value on a lifetime, not just a one-off, basis. As emotion is very much multidisciplinary, chapters cover a wide range of topics that can be applied to product development, including: * emotional design in the virtual environment; * shape design and modeling; * emotional robot competence; and * affective driving. Emotional Engineering is intended to provide readers with a holistic view of its research and applications, enabling them to make strategic decisions on how they can go further beyond product realization. It is recommended for all pioneers in industry, academia and government, who are trying to work with their customers to create value.
This two volume set LNAI 8917 and 8918 constitutes the refereed proceedings of the 7th International Conference on Intelligent Robotics and Applications, ICIRA 2014, held in Guangzhou, China, in December 2014. The 109 revised full papers presented were carefully reviewed and selected from 159 submissions. The papers aim at enhancing the sharing of individual experiences and expertise in intelligent robotics with particular emphasis on technical challenges associated with varied applications such as biomedical applications, industrial automations, surveillance, and sustainable mobility.
The study of cyberbullying has exploded since its first appearance in a peer-reviewed journal article in 2005. Cyberbullying: From theory to intervention aims to make clear and practical sense of this proliferation of coverage by defining the problem of cyberbullying and examining its unique features. The volume provides a thorough overview of state-of-the-art research into the phenomenon, and discusses the development and evaluation of interventions to prevent and combat it. Whereas most research papers offer limited space to describe actual intervention methods, this book provides tremendous insight into the different theoretical methods and practical strategies available to combat cyberbullying. Part One provides readers with a critical review of the existing research literature and collects insights from international researchers involved in bullying and cyberbullying research, tackling key questions such as: how is cyberbullying defined, what is the overlap with traditional bullying, and what are the negative consequences of cyberbullying? Part Two gives an overview of the development and content of evidence-based ICT interventions aimed at preventing and combating bullying and cyberbullying. In addition, some of the important outcomes of the effect evaluations will be described. The book's final chapter integrates the information from Part One with advice regarding practical applications from Part Two. Cyberbullying: From theory to intervention is essential reading for academics and researchers concerned with both cyberbullying and traditional bullying. It can be used in graduate seminars or advanced undergraduate courses in cyberbullying and will also be of interest to teachers, field experts and organisations involved and disseminating cyberbullying solutions.
COOP 2010 is the 9th edition of the International Conference on Designing Cooperative Systems, being the second European conference in the field of Computer Supported Cooperative Work after ECSCW. The conference brings together researchers who contribute to the analysis and design of cooperative systems and their integration in organizational community, public and other settings, and their implications for policy and decision making. Cooperative systems design requires a deep understanding of collective activities, involving both artifacts and social practices. Contributions are solicited from a wide range of domains contributing to the fields of cooperative systems design and evaluation: CSCW, HCI, Information Systems, Knowledge Engineering, Multi-agents, organizational and management sciences, sociology, psychology, anthropology, ergonomics, linguistics.
This book constitutes the refereed proceedings of the 15th International Conference on Product-Focused Software Process Improvement, PROFES 2014, held in Helsinki, Finland, in December 2014. The 18 revised full papers presented together with 14 short papers were carefully reviewed and selected from 45 initial submissions. The papers are organized in topical sections on agile development, decision-making, development practices and issues, product planning, and project management.
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides a process-oriented discussion of the legal concerns presented by agent-based technologies, processes and programming. It offers a general outline of the potential legal difficulties that could arise in relation to them, focusing on the programming of negotiation and contracting processes in a privacy, consumer and commercial context. The authors will elucidate how it is possible to create form of legal framework and design methodology for transaction agents, applicable in any environment and not just in a specific proprietary framework, that provides the right level of compliance and trust. Key elements considered include the design and programming of legally compliant methods, the determination of rights in respect of objects and variables, and ontologies and programming frameworks for agent interactions. Examples are used to illustrate the points made and provide a practical perspective.
th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.
History of Computing: Learning from the Past Why is the history of computing important? Given that the computer, as we now know it, came into existence less than 70 years ago it might seem a little odd to some people that we are concerned with its history. Isn't history about 'old things'? Computing, of course, goes back much further than 70 years with many earlier - vices rightly being known as computers, and their history is, of course, important. It is only the history of electronic digital computers that is relatively recent. History is often justified by use of a quote from George Santayana who famously said that: 'Those who cannot remember the past are condemned to repeat it'. It is arguable whether there are particular mistakes in the history of computing that we should avoid in the future, but there is some circularity in this question, as the only way we will know the answer to this is to study our history. This book contains papers on a wide range of topics relating to the history of c- puting, written both by historians and also by those who were involved in creating this history. The papers are the result of an international conference on the History of Computing that was held as a part of the IFIP World Computer Congress in Brisbane in September 2010.
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.
Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications where the innovation mainly resides in software or in a business method are treated differently by the major patent offices in the US (USPTO), Japan (JPO), and Europe (EPO). The authors start with a thorough introduction into patent laws and practices, as well as in related intellectual property rights, which also explains the procedures at the USPTO, JPO and EPO and, in particular, the peculiarities in the treatment of applications centering on software or computers. Based on this theoretical description, next they present in a very structured way a huge set of case studies from different areas like business methods, databases, graphical user interfaces, digital rights management, and many more. Each set starts with a rather short description and claim of the "invention", then explains the arguments a legal examiner will probably have, and eventually refines the description step by step, until all the reservations are resolved. All of these case studies are based on real-world examples, and will thus give an inexperienced developer an idea about the required level of detail and description he will have to provide. Together, Closa, Gardiner, Giemsa and Machek have more than 70 years experience in the patent business. With their academic background in physics, electronic engineering, and computer science, they know about both the legal and the subject-based subtleties of computer-based inventions. With this book, they provide a guide to a patent examiner's way of thinking in a clear and systematic manner, helping to prepare the first steps towards a successful patent application.
This book outlines the basic principles of creation and maintenance of taxonomies and thesauri. It also provides step by step instructions for building a taxonomy or thesaurus and discusses the various ways to get started on a taxonomy construction project. Often, the first step is to get management and budgetary approval, so I start this book with a discussion of reasons to embark on the taxonomy journey. From there I move on to a discussion of metadata and how taxonomies and metadata are related, and then consider how, where, and why taxonomies are used. Information architecture has its cornerstone in taxonomies and metadata. While a good discussion of information architecture is beyond the scope of this work, I do provide a brief discussion of the interrelationships among taxonomies, metadata, and information architecture. Moving on to the central focus of this book, I introduce the basics of taxonomies, including a definition of vocabulary control and why it is so important, how indexing and tagging relate to taxonomies, a few of the types of tagging, and a definition and discussion of post- and pre-coordinate indexing. After that I present the concept of a hierarchical structure for vocabularies and discuss the differences among various kinds of controlled vocabularies, such as taxonomies, thesauri, authority files, and ontologies. Once you have a green light for your project, what is the next step? Here I present a few options for the first phase of taxonomy construction and then a more detailed discussion of metadata and markup languages. I believe that it is important to understand the markup languages (SGML and XML specifically, and HTML to a lesser extent) in relation to information structure, and how taxonomies and metadata feed into that structure. After that, I present the steps required to build a taxonomy, from defining the focus, collecting and organizing terms, analyzing your vocabulary for even coverage over subject areas, filling in gaps, creating relationships between terms, and applying those terms to your content. Here I offer a cautionary note: don't believe that your taxonomy is "done!" Regular, scheduled maintenance is an important-critical, really-component of taxonomy construction projects. After you've worked through the steps in this book, you will be ready to move on to integrating your taxonomy into the workflow of your organization. This is covered in Book 3 of this series. Table of Contents: List of Figures / Preface / Acknowledgments / Building a Case for Building a Taxonomy / Taxonomy Basics / Getting Started / Terms: The Building Blocks of a Taxonomy / Building the Structure of Your Taxonomy / Evaluation and Maintenance / Standards and Taxonomies / Glossary / End Notes / Author Biography
This book constitutes revised selected papers from the two International Workshops on Artificial Intelligence Approaches to the Complexity of Legal Systems, AICOL IV and AICOL V, held in 2013. The first took place as part of the 26th IVR Congress in Belo Horizonte, Brazil, during July 21-27, 2013; the second was held in Bologna as a joint special workshop of JURIX 2013 on December 11, 2013. The 19 papers presented in this volume were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: social intelligence and legal conceptual models; legal theory, normative systems and software agents; semantic Web technologies, legal ontologies and argumentation; and crowdsourcing and online dispute resolution (ODR).
This book constitutes the proceedings of the 14th International Conference on Transport Systems Telematics, TST 2014, held in Katowice/Krakow and Ustron, Poland, in October 2014. The 49 papers included in this volume were carefully reviewed and selected from 125 submissions. The papers provide an overview of solutions being developed in the fields of transport telematics and intelligent transport systems.
The two-volume set LNCS 8618 and 8619 constitutes the refereed proceedings of the 9th International Conference EuroHaptics 2014, held in Versailles, France, in June 2014. The 118 papers (36 oral presentations and 82 poster presentations) presented were carefully reviewed and selected from 183 submissions. Furthermore, 27 demos were exhibited, each of them resulting in a short paper included in the volumes. These proceedings reflect the multidisciplinary nature of EuroHaptics and cover topics such as human-computer interaction, human-robot interactions, neuroscience, perception and psychophysics, biomechanics and motor control, modelling and simulation; and a broad range of applications in medicine, rehabilitation, art, and design.
This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.
The intent of this chapter is to outline a distinctive way of thinking about issues of technology and society that has characterized many Nordic approaches to the topic. One of the characteristics of this approach has been the recognition of the worth of human labour. Technology is not seen as an alien force, but something which is itself a product of human labour, and it can be designed and utilized in ways which augment human skills and expertise, rather than degrading them. What is particularly striking, at least to this author, in this approach is that we are presented not simply with a vision of how things could be better in our society, but with concrete exemplars of how we can build such a better world. It is in recognition of this fact that I have chosen the title of this chapter, as it emphasizes that, while the tradition of Utopian literature is the - lineation of a supposedly idea world which exists no-place (u-topos, in Greek), these visions can be an inspiration for quite practical activities on the ground, as steps towards their realization. As Wilde notes (in the quote above) this is a never-ending quest, as with each achievement, we recognize that there are further bridges to cross and places to be visited.
Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world. The result of this on-going migration is a new place very much different from the physical world, one where interconnected services interact with human users, sensors and embedded devices. Yet for this vision to become reality, trust needs to be addressed as members of the global e-society r- ularly today deal with the question whether they can trust other, unknown parties. Trust is a vital component of internet-based interactions and service-oriented en- ronment, but all too often it is assumed to be an implicit property that exists in the background rather than being an explicit property that is well-de ned and quant- able. While providing trust is challenging in existing computing systems, providing trust in service oriented environments is much more complex due to the dynamic and adaptable nature of these environment which are often large scale and across domains. To date the problem of trust for service oriented environments has been largely unexplored. This book represents the rst comprehensivecoverageof the principles,methods and systems for trust management and evaluation in service oriented environments. |
![]() ![]() You may like...
Security and Privacy Issues in Internet…
Rajkumar Buyya, Muhammad Imran Tariq, …
Paperback
R3,456
Discovery Miles 34 560
|