0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (26)
  • R250 - R500 (199)
  • R500+ (2,722)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings... Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings (Hardcover, Edition.)
Masakatsu Nishigaki, Audun Josang, Yuko Murayama, Stephen Marsh
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea, Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs

We Are Data - Algorithms and the Making of Our Digital Selves (Paperback): John Cheney-Lippold We Are Data - Algorithms and the Making of Our Digital Selves (Paperback)
John Cheney-Lippold
R756 Discovery Miles 7 560 Ships in 12 - 17 working days

What identity means in an algorithmic age: how it works, how our lives are controlled by it, and how we can resist it Algorithms are everywhere, organizing the near limitless data that exists in our world. Derived from our every search, like, click, and purchase, algorithms determine the news we get, the ads we see, the information accessible to us and even who our friends are. These complex configurations not only form knowledge and social relationships in the digital and physical world, but also determine who we are and who we can be, both on and offline. Algorithms create and recreate us, using our data to assign and reassign our gender, race, sexuality, and citizenship status. They can recognize us as celebrities or mark us as terrorists. In this era of ubiquitous surveillance, contemporary data collection entails more than gathering information about us. Entities like Google, Facebook, and the NSA also decide what that information means, constructing our worlds and the identities we inhabit in the process. We have little control over who we algorithmically are. Our identities are made useful not for us-but for someone else. Through a series of entertaining and engaging examples, John Cheney-Lippold draws on the social constructions of identity to advance a new understanding of our algorithmic identities. We Are Data will educate and inspire readers who want to wrest back some freedom in our increasingly surveilled and algorithmically-constructed world.

Safeguards in a World of Ambient Intelligence (Paperback, 2008 ed.): David Wright, Serge Gutwirth, Michael Friedewald, Elena... Safeguards in a World of Ambient Intelligence (Paperback, 2008 ed.)
David Wright, Serge Gutwirth, Michael Friedewald, Elena Vildjiounaite, Yves Punie
R4,580 Discovery Miles 45 800 Ships in 10 - 15 working days

Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h304310755/fulltext.pdf

This book is a warning. It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI).

In the near future, every manufactured product our clothes, money, appliances, the paint on our walls, the carpets on our floors, our cars, everything will be embedded with intelligence, networks of tiny sensors and actuators, which some have termed smart dust . The AmI world is not far off. We already have surveillance systems, biometrics, personal communicators, machine learning and more. AmI will provide personalised services and know more about us on a scale dwarfing anything hitherto available.

In the AmI vision, ubiquitous computing, communications and interfaces converge and adapt to the user. AmI promises greater user-friendliness in an environment capable of recognising and responding to the presence of different individuals in a seamless, unobtrusive and often invisible way. While most stakeholders paint the promise of AmI in sunny colours, there is a dark side to AmI.

This book aims to illustrate the threats and vulnerabilities by means of four dark scenarios . The authors set out a structured methodology for analysing the four scenarios, and then identify safeguards to counter the foreseen threats and vulnerabilities. They make recommendations to policy-makers and other stakeholders about what they can do to maximise the benefits from ambient intelligence and minimise the negative consequences."

Human-Computer Etiquette - Cultural Expectations and the Design Implications They Place on Computers and Technology (Hardcover,... Human-Computer Etiquette - Cultural Expectations and the Design Implications They Place on Computers and Technology (Hardcover, New)
Caroline C. Hayes, Christopher A. Miller
R4,170 Discovery Miles 41 700 Ships in 12 - 17 working days

Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces. Providing a complete introduction to the design of social responses to computers, the text emphasizes the value of social norms in the development of usable and enjoyable technology. It also describes the role of socially correct behavior in technology adoption and how to design human-computer interfaces for a competitive global market.

Ethics and Policy of  Biometrics - Third International Conference on Ethics  and Policy of Biometrics and International Data... Ethics and Policy of Biometrics - Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January 4-5, 2010 (Paperback, Edition.)
Ajay Kumar, David Zhang
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating such interaction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders.

Proceedings of COOP 2010 - Proceedings of the 9th International Conference on Designing Cooperative Systems, May, 18-21, 2010,... Proceedings of COOP 2010 - Proceedings of the 9th International Conference on Designing Cooperative Systems, May, 18-21, 2010, Aix-en-Provence (Hardcover, 1st ed. 2010)
Myriam Lewkowicz, Parina Hassanaly, Markus Rohde, Volker Wulf
R4,713 Discovery Miles 47 130 Ships in 10 - 15 working days

COOP 2010 is the 9th edition of the International Conference on Designing Cooperative Systems, being the second European conference in the field of Computer Supported Cooperative Work after ECSCW. The conference brings together researchers who contribute to the analysis and design of cooperative systems and their integration in organizational community, public and other settings, and their implications for policy and decision making. Cooperative systems design requires a deep understanding of collective activities, involving both artifacts and social practices. Contributions are solicited from a wide range of domains contributing to the fields of cooperative systems design and evaluation: CSCW, HCI, Information Systems, Knowledge Engineering, Multi-agents, organizational and management sciences, sociology, psychology, anthropology, ergonomics, linguistics.

From CSCW to Web 2.0: European Developments in Collaborative Design - Selected Papers from COOP08 (Paperback, Edition.): David... From CSCW to Web 2.0: European Developments in Collaborative Design - Selected Papers from COOP08 (Paperback, Edition.)
David Randall, Pascal Salembier
R3,022 Discovery Miles 30 220 Ships in 10 - 15 working days

Many challenges were identified in CSCW some thirty years ago, and some of these remain problematic today. However they are being progressively transformed and this edited volume contains contributions that demonstrate how these new challenges are being dealt with in a variety of ways, reflecting the balance of rigour and creativity that has always characterised the field.

Originally presented at COOP 08 which took place in Carry-le-Rouet, France in 2008, the contributions to this volume have been substantially extended and revised. New technologies, new domains and new methods are described for supporting design and evaluation. Taking a progressive and critical stance, the authors cover a variety of themes including inter-organisational working, non task-based environments, creativity, and the development of Web 2.0 (and even Web 3.0) applications, including new cooperative mechanisms and new classification possibilities."

Smart Card Research and Advanced Applications - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany,... Smart Card Research and Advanced Applications - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings (Paperback, Edition.)
Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

TheseproceedingscontainthepapersselectedforpresentationatCARDIS 2010, the 9th IFIP Conference on Smart Card Research and Advanced Application hosted by the Institute of IT-Security and Security Law (ISL) of the University ofPassau, Germany.CARDISisorganizedbyIFIPWorkingGroupsWG8.8and WG 11.2. Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Every second year leading researchers and practitioners meet to present new ideas and discuss recent - velopments in smart card technologies. Thefastevolutioninthe?eldofinformationsecurityrequiresadequatemeans for representing the user in human-machine interactions. Smart cards, and by extension smart devices with their processing power and their direct association with the user, are considered the ?rst choice for this purpose. A wide range of areas including hardware design, operating systems, systems modelling, cr- tography, and distributed systems contribute to this fast-growing technology. The submissions to CARDIS were reviewed by at least three members of the ProgramCommittee, followedbyatwo-weekdiscussionphaseheldelectronically, wherecommittee memberscouldcomment onall papersand allreviews.Finally, 16 papers were selected for presentation at CARDIS. There aremany volunteerswho o?ered their time and energy to put together the symposium and who deserve our acknowledgment. We want to thank all the members of the Program Committee and the external reviewers for their hard work in evaluating and discussing the submissions. We are also very grateful to JoachimPosegga, the GeneralChairof CARDIS 2010, andhisteam for thelocal conference management. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the proceedings stimulat

Development of Multimodal Interfaces: Active Listening and Synchrony - Second COST 2102 International Training School, Dublin,... Development of Multimodal Interfaces: Active Listening and Synchrony - Second COST 2102 International Training School, Dublin, Ireland, March 23-27, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Anna Esposito, Nick Campbell, Carl Vogel, Amir Hussain, Anton Nijholt
R1,610 Discovery Miles 16 100 Ships in 10 - 15 working days

This volume brings together, through a peer-revision process, the advanced research results obtained by the European COST Action 2102: Cross-Modal Analysis of Verbal and Nonverbal Communication, primarily discussed for the first time at the Second COST 2102 International Training School on "Development of Multimodal Int- faces: Active Listening and Synchrony" held in Dublin, Ireland, March 23-27 2009. The school was sponsored by COST (European Cooperation in the Field of Sci- tific and Technical Research, www.cost.esf.org ) in the domain of Information and Communication Technologies (ICT) for disseminating the advances of the research activities developed within the COST Action 2102: "Cross-Modal Analysis of Verbal and Nonverbal Communication" (cost2102.cs.stir.ac.uk) COST Action 2102 in its third year of life brought together about 60 European and 6 overseas scientific laboratories whose aim is to develop interactive dialogue systems and intelligent virtual avatars graphically embodied in a 2D and/or 3D interactive virtual world, capable of interacting intelligently with the environment, other avatars, and particularly with human users.

Advances in Social Computing - Third International Conference on Social Computing, Behavioral Modeling, and Prediction, SBP... Advances in Social Computing - Third International Conference on Social Computing, Behavioral Modeling, and Prediction, SBP 2010, Bethesda, MD, USA, March 30-31, 2010, Proceedings (Paperback, Edition.)
Sun-Ki Chai, John Salerno, Patricia L. Mabry
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

Social computing is concerned with the study of social behavior and social context based on computational systems. Behavioral modeling provides a representation of the social behavior, and allows for experimenting, scenario planning, and deep und- standing of behavior, patterns, and potential outcomes. The pervasive use of computer and Internet technologies by humans in everyday life provides an unprecedented en- ronment of various social activities that, due to the platforms under which they take place, generate large amounts of stored data as a by-product, often in systematically organized form. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepe- ent systems are created and used to represent the various social and physical systems for investigating the interactions between groups, communities, or nation-states. This requires joint efforts to take advantage of the state-of-the-art research from multiple disciplines improving social computing and behavioral modeling in order to document lessons learned and develop novel theories, experiments, and methodologies to better explain the interaction between social (both informal and institutionalized), psyc- logical, and physical mechanisms. The goal is to enable us to experiment, create, and recreate an operational environment with a better understanding of the contributions from each individual discipline, forging joint interdisciplinary efforts. This volume comprises the proceedings of the third international workshop on - cial Computing, Behavioral Modeling and Prediction, which has grown trem- dously.

Passive and Active Measurement - 11th International Conference, PAM 2010, Zurich, Switzerland, April 7-9, 2010, Proceedings... Passive and Active Measurement - 11th International Conference, PAM 2010, Zurich, Switzerland, April 7-9, 2010, Proceedings (Paperback, Edition.)
Arvind Krishnamurthy, Bernhard Plattner
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The 2010 edition of the Passive and Active Measurement Conference was the 11th of a series of successful events. Since 2000, the Passive and Active M- surement (PAM) conference has provided a forum for presenting and discussing innovative and early work in the area of Internet measurements. PAM has a tradition of being a workshop-like conference with lively discussion and active participation from all attendees. This event focuses on research and practical applications of network measurement and analysis techniques. This year's c- ference was held at ETH Zurich, Switzerland. PAM 2010 attracted 79 submissions. Each paper was carefully reviewed by at leastthreemembersoftheTechnicalProgramCommittee.Thereviewingprocess ledtotheacceptanceof23papers.Thepaperswerearrangedinninesessionsc- ering the following areas: routing, transport protocols, mobile devices, topology, measurement infrastructure, characterizing network usage, analysis techniques, tra?c analysis, and the Web. We are very grateful to Endace Ltd. (New Zealand), Cisco Systems Inc. (USA), armasuisse (Switzerland) and the COST Action TMA whose sponsoring allowedustokeepregistrationcostslowandto o?erseveraltravelgrantsto PhD students. We are also grateful to ETH Zurich for sponsoring PAM as a host.

Information Processing and Management - International Conference on Recent Trends in Business Administration and Information... Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings (Paperback, 2010 ed.)
Vinu V. Das, R Vijayakumar, Narayan C Debnath, Janahanlal Stephen, Natarajan Meghanathan, …
R3,084 Discovery Miles 30 840 Ships in 10 - 15 working days

It is my pleasure to write the preface for Information Processing and Management. This book aims to bring together innovative results and new research trends in inf- mation processing, computer science and management engineering. If an information processing system is able to perform useful actions for an obj- tive in a given domain, it is because the system knows something about that domain. The more knowledge it has, the more useful it can be to its users. Without that kno- edge, the system itself is useless. In the information systems field, there is conceptual modeling for the activity that elicits and describes the general knowledge a particular information system needs to know. The main objective of conceptual modeling is to obtain that description, which is called a conceptual schema. Conceptual schemas are written in languages called conceptual modeling languages. Conceptual modeling is an important part of requi- ments engineering, the first and most important phase in the development of an inf- mation system.

Human Work Interaction Design: Usability in Social, Cultural and Organizational Contexts - Second IFIP WG 13.6 Conference, HWID... Human Work Interaction Design: Usability in Social, Cultural and Organizational Contexts - Second IFIP WG 13.6 Conference, HWID 2009, Pune, India, October 7-8, 2009, Revised Selected Papers (Hardcover, Edition.)
Dinesh Katre, Rikke Orngreen, Pradeep Yammiyavar, Torkil Clemmensen
R3,118 Discovery Miles 31 180 Ships in 10 - 15 working days

We are extremely pleased to present a comprehensive book comprising a collection of research papers which is basically an outcome of the Second IFIP TC 13.6 Working Group conference on Human Work Interaction Design, HWID2009. The conference was held in Pune, India during October 7-8, 2009. It was hosted by the Centre for Development of Advanced Computing, India, and jointly organized with Copenhagen Business School, Denmark; Aarhus University, Denmark; and Indian Institute of Technology, Guwahati, India. The theme of HWID2009 was Usability in Social, C- tural and Organizational Contexts. The conference was held under the auspices of IFIP TC 13 on Human-Computer Interaction. 1 Technical Committee TC13 on Human-Computer Interaction The committees under IFIP include the Technical Committee TC13 on Human-Computer Interaction within which the work of this volume has been conducted. TC13 on Human-Computer Interaction has as its aim to encourage theoretical and empirical human science research to promote the design and evaluation of human-oriented ICT. Within TC13 there are different working groups concerned with different aspects of human- computer interaction. The flagship event of TC13 is the bi-annual international conference called INTERACT at which both invited and contributed papers are presented. Contributed papers are rigorously refereed and the rejection rate is high.

Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007): Friedrich L. Bauer Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007)
Friedrich L. Bauer
R5,840 Discovery Miles 58 400 Ships in 10 - 15 working days

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.

Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009 and Second International... Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers (Paperback, Edition.)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier
R1,576 Discovery Miles 15 760 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009.

The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2009 papers cover topics such as privacy in service oriented architectures, privacy-preserving mechanisms, crossmatching and indistinguishability techniques, privacy policies, and disclosure of information. The SETOP 2009 papers address all current issues within the sope of security policies, identification and privacy, as well as security mechanisms.

Web Archiving (Paperback, Softcover reprint of hardcover 1st ed. 2006): Julien Masanes Web Archiving (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Julien Masanes
R1,541 Discovery Miles 15 410 Ships in 10 - 15 working days

This book assembles contributions from computer scientists and librarians that altogether encompass the complete range of tools, tasks and processes needed to successfully preserve the cultural heritage of the Web. It combines the librarian 's application knowledge with the computer scientist 's implementation knowledge, and serves as a standard introduction for everyone involved in keeping alive the immense amount of online information.

Governing Electronically - E-Government and the Reconfiguration of Public Administration, Policy and Power (Paperback, 1st ed.... Governing Electronically - E-Government and the Reconfiguration of Public Administration, Policy and Power (Paperback, 1st ed. 2010)
P Henman
R3,212 Discovery Miles 32 120 Ships in 10 - 15 working days

This book provides rare insights into the nature of contemporary, technologically-facilitated government. Its multidisciplinary approach demonstrates that information technology is more than a tool for politicians and policy-makers. E-government has reconfigured public administration, policy, power and citizenship.

Governing Electronically - E-Government and the Reconfiguration of Public Administration, Policy and Power (Hardcover): P Henman Governing Electronically - E-Government and the Reconfiguration of Public Administration, Policy and Power (Hardcover)
P Henman
R3,218 Discovery Miles 32 180 Ships in 10 - 15 working days

This book provides rare insights into the nature of contemporary, technologically-facilitated government. Its multidisciplinary approach demonstrates that information technology is more than a tool for politicians and policy-makers. E-government has reconfigured public administration, policy, power and citizenship.

Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October... Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers (Paperback, Edition.)
Sanjay Goel
R1,522 Discovery Miles 15 220 Ships in 10 - 15 working days

The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous discussions and strong audience interest. The conference featured an excellent program comprising high-quality paper pr- entations and invited speakers from all around the world. The first day featured a plenary session including George Philip, President of University at Albany, Harry Corbit, Suprintendent of New York State Police, and William Pelgrin, Director of New York State Office of Cyber Security and Critical Infrastructure Coordination. An outstanding keynote was provided by Miklos Vasarhelyi on continuous auditing. This was followed by two parallel sessions on accounting fraud /financial crime, and m- timedia and handheld forensics. The second day of the conference featured a mesm- izing keynote talk by Nitesh Dhanjani from Ernst and Young that focused on psyc- logical profiling based on open source intelligence from social network analysis. The third day of the conference featured both basic and advanced tutorials on open source forensics.

The Insider Threat - Assessment and Mitigation of Risks (Hardcover): Eleanor E. Thompson The Insider Threat - Assessment and Mitigation of Risks (Hardcover)
Eleanor E. Thompson
R2,050 Discovery Miles 20 500 Ships in 12 - 17 working days

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.

Online Misogyny as Hate Crime - A Challenge for Legal Regulation? (Hardcover): Kim Barker, Olga Jurasz Online Misogyny as Hate Crime - A Challenge for Legal Regulation? (Hardcover)
Kim Barker, Olga Jurasz
R1,741 Discovery Miles 17 410 Ships in 12 - 17 working days

The ideal of an inclusive and participatory Internet has been undermined by the rise of misogynistic abuse on social media platforms. However, limited progress has been made at national - and to an extent European - levels in addressing this issue. In England and Wales, the tackling of underlying causes of online abuse has been overlooked because the law focuses on punishment rather than measures to prevent such abuses. Furthermore, online abuse has a significant impact on its victims that is underestimated by policymakers. This volume critically analyses the legal provisions that are currently deployed to tackle forms of online misogyny, and focuses on three aspects; firstly, the phenomenon of social media abuse; secondly, the poor and disparate legal responses to social media abuses; and thirdly, the similar failings of hate crime to tackle problems of online gender-based abuses. This book advances a compelling argument for legal changes to the existing hate crime, and communications legislation.

Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.): Ajith Abraham, Aboul Ella... Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.)
Ajith Abraham, Aboul Ella Hassanien, Vaclav Snasel
R4,798 Discovery Miles 47 980 Ships in 10 - 15 working days

Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.

This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.

Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services.

This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.

Internet and Network Economics - 5th International Workshop, WINE 2009, Rome, Italy, December 14-18, 2009, Proceedings... Internet and Network Economics - 5th International Workshop, WINE 2009, Rome, Italy, December 14-18, 2009, Proceedings (Paperback, 2009 ed.)
Stefano Leonardi
R3,070 Discovery Miles 30 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Workshop on Internet and Network Economics, WINE 2009, held in Rome, Italy, in December 2009.

The 34 regular and 29 short revised full papers presented together with 3 invited talks were carefully reviewed and selected from 142 submissions. The papers address various topics in theoretical computer science, networking and security, economics, mathematics, sociology, and management sciences devoted to the analysis of problems arising in the internet and the worldwide Web, such as auction algorithms, computational advertising, general and majority equilibrium, coalitions, collective action, economics aspects of security and privacy in distributed and network computing, algorithmic design and game theory, information economics, network games, price dynamics, and social networks.

Information Activism - A Queer History of Lesbian Media Technologies (Paperback): Cait McKinney Information Activism - A Queer History of Lesbian Media Technologies (Paperback)
Cait McKinney
R724 Discovery Miles 7 240 Ships in 12 - 17 working days

For decades, lesbian feminists across the United States and Canada have created information to build movements and survive in a world that doesn't want them. In Information Activism Cait McKinney traces how these women developed communication networks, databases, and digital archives that formed the foundation for their work. Often learning on the fly and using everything from index cards to computers, these activists brought people and their visions of justice together to organize, store, and provide access to information. Focusing on the transition from paper to digital-based archival techniques from the 1970s to the present, McKinney shows how media technologies animate the collective and unspectacular labor that sustains social movements, including their antiracist and trans-inclusive endeavors. By bringing sexuality studies to bear on media history, McKinney demonstrates how groups with precarious access to control over information create their own innovative and resourceful techniques for generating and sharing knowledge.

Information Systems: People, Organizations, Institutions, and Technologies - ItAIS:The Italian Association for Information... Information Systems: People, Organizations, Institutions, and Technologies - ItAIS:The Italian Association for Information Systems (Hardcover, 2010 ed.)
Alessandro D'Atri, Domenico Sacca
R4,864 Discovery Miles 48 640 Ships in 10 - 15 working days

1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandA. Motro PartIII InformationandKnowledgeManagement EffectiveStorageofSemanticWebData...177 RobertoDeVirgilio,PierluigiDelNostro,GiorgioGianforme, StefanoPaolozzi,andRiccardoTorlone AReferenceArchitectureforSemanticKnowledge Coordination ...185 S. Castano,A. Ferrara,andS. Montanelli Service-BasedNetworkedCollaboration...195 DevisBianchini,ValeriaDeAntonellis,andMicheleMelchiori HowtoExploitDataMiningWithoutBecomingAwareofit ...203 N. Ciaramella,andA. Albano AMethodologicalApproachtoEnableCooperative ProcessDesignThroughWebServices...211 D. Bianchini,C. Cappiello,V. DeAntonellis,andB. Pernici TowardanEffectiveandEf?cientQueryProcessing intheNeP4BProject ...

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R449 Discovery Miles 4 490
Creativity, Incentive and Reward - An…
Ruth Towse Hardcover R2,908 Discovery Miles 29 080
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Facing Internet Technology and Gaming…
Hilarie Cash, Cosette Rae, … Paperback R846 R708 Discovery Miles 7 080
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
Location, Travel and Information…
Peter Nijkamp Hardcover R4,329 Discovery Miles 43 290
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R260 Discovery Miles 2 600
Translation Tools and Technologies
Andrew Rothwell, Joss Moorkens, … Paperback R1,097 Discovery Miles 10 970

 

Partners