Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
"Bootstrapping" analyzes the genesis of personal computing from
both technological and social perspectives, through a close study
of the pathbreaking work of one researcher, Douglas Engelbart. In
his lab at the Stanford Research Institute in the 1960s, Engelbart,
along with a small team of researchers, developed some of the
cornerstones of personal computing as we know it, including the
mouse, the windowed user interface, and hypertext. Today, all these
technologies are well known, even taken for granted, but the
assumptions and motivations behind their invention are not.
"Bootstrapping" establishes Douglas Engelbart's contribution
through a detailed history of both the material and the symbolic
constitution of his system's human-computer interface in the
context of the computer research community in the United States in
the 1960s and 1970s.
On an everyday basis, we communicate with one another using various technological media, such as text messaging, social networking tools, and electronic mail, in work, educational, and personal settings. As a consequence of the increasing frequency of use and importance of computer-supported interaction, social scientists in particular have heeded the call to understand the social processes involved in such interactions. In this volume, the editors explore how aspects of a situation interact with characteristics of a person to help explain our technologically supported social interactions. The person-by-situation interaction perspective recognizes the powerful role of the situation and social forces on behavior, thought, and emotion, but also acknowledges the importance of person variables in explaining social interaction, including power and gender, social influence, truth and deception, ostracism, and leadership. This important study is of great relevance to modern readers, who are more and more frequently using technology to communicate with one another.
This book constitutes the proceedings of the 7th International Conference on Mobile Computing, Applications, and Services (MobiCASE 2015) held in Berlin, Germany, in November 2015. The 16 full and 4 poster papers were carefully reviewed and selected from 43 submissions, and are presented together with 4 papers from the First Workshop on Situation Recognition by Mining Temporal Information (SIREMETI 2015). The conference papers cover the following topics: intelligent caching, activity recognition and crowdsourcing, mobile frameworks, middleware, interactive applications and mobility.
"These editors have the respect, visibility, and track-record to make this volume a contribution to the field of Internet studies. It will be adopted as an upper-division text and can also serve as a valuable reference work for doctoral students. Given its broad mix of qualitative and quantitative approaches, this work should have wide appeal across the Social Sciences and Information Studies." -- Sandra J. Ball-Rokeach, Annenberg School for Communication, University of Southern California Within the developed world, much of society experiences political, economic, and cultural life through a set of communication technologies barely older than many citizens. Society Online: The Internet in Context examines how new media technologies have not simply diffused across society, but how they have rapidly and deeply become embedded in our organizations and institutions. Society Online is not exclusively devoted to a particular technology, or specifically the Internet, but to a range of technologies and technological possibilities labeled "new media." Rather than trying to cover every possible topic relating to new communication technologies, this unique text is organized by how these new technologies mediate the community, political, economic, personal, and global spheres of our social lives. Editors Philip N. Howard and Steve Jones explore the multiple research methods that are required to understand the embeddedness of new media. Society Online discusses the findings of the Pew Internet and American Life Project and is the first book to bring together leading social scientists to provide the most comprehensive and far-reaching Internet research data sets and to contextualize Internet use in modern life. The book features contributions by leading scholars from across the social sciences using a range of research techniques including systematic content analysis; comparative methods; quasi-experimental methods; probit; ordinary least squares and logistic regression analysis; small focus groups; historical, archival, and survey methods; ethnographic and auto-ethnographic work; and comparative analyses of policy traditions to probe, analyze, and understand the Internet in the context of everyday life. Society Online is designed for undergraduate and graduate students taking media studies courses in the areas of Communication, Sociology, Political Science, Anthropology, Cultural Studies, Information Sciences, and American Studies.
This is the latest book from law and technology guru Richard Susskind, author of best-selling The Future of Law, bringing together in one volume eleven significant essays on the application of IT to legal practice and the administration of justice, including Susskind's very latest thinking on key topics such as knowledge management and the impact of electronic commerce and electronic government.
This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers.
This book constitutes the refereed proceedings of the Third European Conference on Information Literacy, ECIL 2015, held in Tallinn, Estonia, in October 2015. The 61 revised full papers presented were carefully reviewed and selected from 226 submissions. The papers are organized in topical sections on information literacy, environment and sustainability; workplace information literacy and knowledge management; ICT competences and digital literacy; copyright literacy; other literacies; information literacy instruction; teaching and learning information literacy; information literacy, games and gamification; information need, information behavior and use; reading preference: print vs electronic; information literacy in higher education; scholarly competencies; information literacy, libraries and librarians; information literacy in different context.
This book constitutes the refereed proceedings of the 6th International Conference on E-Democracy, E-Democracy 2015, held in Athens, Greece, in December 2015. The 13 revised full papers presented together with 8 extended abstracts were carefully selected from 33 submissions. The papers are organized in topical sections on privacy in e-voting, e-polls and e-surveys; security and privacy in new computing paradigms; privacy in online social networks; e-government and e-participation; legal issues. The book also contains the extended abstracts describing progress within European research and development projects on security and privacy in the cloud; secure architectures and applications; enabling citizen-to-government communication.
"Digital technologies have given society an extraordinary cultural
potential. If that potential is to be made real, we must reconcile
it with the legitimate and important claims of copyright. In this
beautifully written and careful work, Fisher, more completely than
anyone else, maps the choices that we might make. He argues for a
choice that would produce enormous social good. And while not
everyone will agree with the conclusions he draws, no one who cares
seriously about creators or culture can ignore the framework that
he has set. There are choices that we as a society must make. And
as Rawls did in political theory, or Milton Friedman did in
economics, Fisher provides an understanding that will color policy
analysis for the generations to come."--Lawrence Lessig, Stanford
Law School
This book constitutes the thoroughly refereed proceedings of the International Conference on Communication Technologies for Ageing Well and e-Health, ICT4AgeingWell 2015, held in Lisbon, Portugal, in May 2015. The 11 full papers and two invited papers presented were carefully reviewed and selected from 45 submissions. The papers cover five main topic areas, covering different aspects, including Ambient Assisted Living, Telemedicine and E-Health, Monitoring, Accessibility and User Interfaces, Robotics and Devices for Independent Living and HCI for Ageing Populations.
This book constitutes thoroughly revised, selected papers of the proceedings of the 6th International Workshop on Collaborative Agents Research and Development, CARE 2015 and the Second International Workshop on Multi-agent Foundations of Social Computing, MFSC 2015, held in Istanbul, Turkey, on May 4, 2015. Both Workshops were held in conjunction with AAMAS 2015. The 5 revised full papers of CARE and the 7 full papers of MFSC presented were carefully selected from 14 CARE and 10 MFSC submissions. Both workshop address issues in relevant areas of social computing such as smart societies, social applications, urban intelligence, intelligent mobile services, models of teamwork and collaboration.
This book constitutes the proceedings of the 15th International Conference on Transport Systems Telematics, TST 2015, held in Wroclaw, Poland, in April 2015. The 35 revised full papers and two short papers included in this volume were carefully reviewed and selected from 115 submissions. The papers provide an overview of solutions being developed in the fields of transport telematics and intelligent transport systems.
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies; risk and trust; research and innovation in cyber security and privacy.
This volume presents the proceedings of ECSCW 2013, the 13th European Conference on Computer Supported Cooperative Work. Each conference offers an occasion to critically review our research field, which has been multidisciplinary and committed to high scientific standards, both theoretical and methodological, from its beginning. The papers this year focus on work and the enterprise as well as on the challenges of involving citizens, patients, etc. into collaborative settings. The papers embrace new theories, and discuss known ones. They contribute to the discussions on the blurring boundaries between home and work and on the ways we think about and study work. They introduce recent and emergent technologies, and study known social and collaborative technologies. With contributions from all over the world, the papers in interesting ways help focus on the European perspective in our community. The 15 papers selected for this conference deal with and reflect the lively debate currently ongoing in our field of research.
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. The 31 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.
This book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) - small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of "big data," and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation. PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities. Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care. Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics - "ethical analysis aimed at influencing the development of new technologies" (Deborah Johnson 2010). The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities - if only to "do no harm" - before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.
This book contains the refereed proceedings of the 6th Scandinavian Conference on Information Systems, SCIS 2015, held in Oulu, Finland, in August 2015. The theme for this book as well as for the conference is "Design for, with, and by Users." This theme has characterized information systems research already for decades, and it is still a vibrant topic, especially so within the Scandinavian tradition. The 16 full papers accepted for SCIS 2015 were selected from 44 submissions. In addition, two keynote extended abstracts and one keynote paper are included.
Nicholas Carr has made his name as an incisive writer on our complicated relationship with technology. Utopia Is Creepy, a sharp and often funny indictment of our tech-besotted culture, collects essays drawn from Carr's popular blog Rough Type as well as seminal pieces that first appeared in The Atlantic, the MIT Technology Review and The Wall Street Journal, to provide an alternative history of our digital age over the last ten years. Carr lays bare the pitfalls alongside the benefits of the internet age, and dissects the philistinism and misanthropy that underlie Silicon Valley's "liberation mythology". With assessments of some of the crucial issues of the day, from online surveillance to the state of public discourse, Carr puts his finger on today's most pressing issues.
September 11, 2001 had a profound impact upon individuals, institutions, and governments, but also upon the world of global trade. Years later, the reverberations of this deliberate and focused act of terrorism are manifest in much more stringent logistics, documentary requirements, and regulations. A single source on compliance and security, written from a supply chain managera (TM)s perspective, Managing Global Supply Chains sorts out all the issues and frames a comprehensive strategy for supply chain executives in the post 9/11 world.
This book constitutes the refereed proceedings of the 8th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, SBP 2015, held in Washington, DC, USA, in March/April 2015. The 24 full papers presented together with 36 poster papers were carefully reviewed and selected from 118 submissions. The goal of the conference was to advance our understanding of human behavior through the development and application of mathematical, computational, statistical, simulation, predictive and other models that provide fundamental insights into factors contributing to human socio-cultural dynamics. The topical areas addressed by the papers are social and behavioral sciences, health sciences, engineering, computer and information science.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception and text mining.
The study of cyberbullying has exploded since its first appearance in a peer-reviewed journal article in 2005. Cyberbullying: From theory to intervention aims to make clear and practical sense of this proliferation of coverage by defining the problem of cyberbullying and examining its unique features. The volume provides a thorough overview of state-of-the-art research into the phenomenon, and discusses the development and evaluation of interventions to prevent and combat it. Whereas most research papers offer limited space to describe actual intervention methods, this book provides tremendous insight into the different theoretical methods and practical strategies available to combat cyberbullying. Part One provides readers with a critical review of the existing research literature and collects insights from international researchers involved in bullying and cyberbullying research, tackling key questions such as: how is cyberbullying defined, what is the overlap with traditional bullying, and what are the negative consequences of cyberbullying? Part Two gives an overview of the development and content of evidence-based ICT interventions aimed at preventing and combating bullying and cyberbullying. In addition, some of the important outcomes of the effect evaluations will be described. The book's final chapter integrates the information from Part One with advice regarding practical applications from Part Two. Cyberbullying: From theory to intervention is essential reading for academics and researchers concerned with both cyberbullying and traditional bullying. It can be used in graduate seminars or advanced undergraduate courses in cyberbullying and will also be of interest to teachers, field experts and organisations involved and disseminating cyberbullying solutions.
In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead.
This book constitutes the thoroughly refereed post-workshop proceedings of the Third IAPR TC3 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction, MPRSS 2014, held in Stockholm, Sweden, in August 2014, as a satellite event of the International Conference on Pattern Recognition, ICPR 2014. The 14 revised papers presented focus on pattern recognition, machine learning and information fusion methods with applications in social signal processing, including multimodal emotion recognition, user identification, and recognition of human activities.
This two volume set LNAI 8917 and 8918 constitutes the refereed proceedings of the 7th International Conference on Intelligent Robotics and Applications, ICIRA 2014, held in Guangzhou, China, in December 2014. The 109 revised full papers presented were carefully reviewed and selected from 159 submissions. The papers aim at enhancing the sharing of individual experiences and expertise in intelligent robotics with particular emphasis on technical challenges associated with varied applications such as biomedical applications, industrial automations, surveillance, and sustainable mobility. |
You may like...
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,492
Discovery Miles 34 920
|