![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book contains the refereed proceedings of the 6th Scandinavian Conference on Information Systems, SCIS 2015, held in Oulu, Finland, in August 2015. The theme for this book as well as for the conference is "Design for, with, and by Users." This theme has characterized information systems research already for decades, and it is still a vibrant topic, especially so within the Scandinavian tradition. The 16 full papers accepted for SCIS 2015 were selected from 44 submissions. In addition, two keynote extended abstracts and one keynote paper are included.
A Journey Through Cultures addresses one of the hottest topics in contemporary HCI: cultural diversity amongst users. For a number of years the HCI community has been investigating alternatives to enhance the design of cross-cultural systems. Most contributions to date have followed either a 'design for each' or a 'design for all' strategy. A Journey Through Cultures takes a very different approach. Proponents of CVM - the Cultural Viewpoint Metaphors perspective - the authors invite HCI practitioners to think of how to expose and communicate the idea of cultural diversity. A detailed case study is included which assesses the metaphors' potential in cross-cultural design and evaluation. The results show that cultural viewpoint metaphors have strong epistemic power, leveraged by a combination of theoretic foundations coming from Anthropology, Semiotics and the authors' own work in HCI and Semiotic Engineering. Luciana Salgado, Carla Leitao and Clarisse de Souza are members of SERG, the Semiotic Engineering Research Group at the Departamento de Informatica of Rio de Janeiro's Pontifical Catholic University (PUC-Rio).
New technologies are radically changing the way that families connect with one another: we can text our teenagers from work, eat dinner with far-away parents via video link, and instantly upload and share photos after a family day out. Whether we are bridging time or distance, and whether we are enhancing our closest relationships or strengthening the bonds of extended family, as computer technologies alter the communication landscape, they in turn are changing the way we conduct and experience family life. This state of the art volume explores the impact of new communication systems on how families interact - how they share their lives and routines, engage in social touch, and negotiate being together or being apart - by considering a range of different family relationships that shape the nature of communication. Composed of three sections, the first looks at what is often the core of a 'family', the couple, to understand the impact of technology on couple relationships, communication, and feelings of closeness. The second section studies immediate families that have expanded beyond just the individual or couple to include children. Here, the emphasis is on connection for communication, coordination, and play. The third section moves beyond the immediate family to explore connections between extended, distributed family members. This includes connections between adult children and their parents, grandparents and grandchildren, and adult siblings. Here family members have grown older, moved away from 'home', and forged new families. Researchers, designers and developers of new communication technologies will find this volume invaluable. Connecting Families: The Impact of New Communication Technologies on Domestic Life brings together the most up-to-date studies to help in understanding how new communication technologies shape - and are shaped by - family life, and offers inspiration and guidance for design by making clear what families need and value from technological systems.
This book constitutes the proceedings of the 12th German Conference on Multiagent System Technologies, MATES 2014, held in Stuttgart, Germany, in September 2014. The 9 full papers and 7 short papers included in this volume were carefully reviewed and selected from 31 submissions. The book also contains 2 invited talks. The papers are organized in topical sections named: mechanisms, negotiation, and game theory; multiagent planning, learning, and control; and multiagent systems engineering, modeling and simulation.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013. The 20 revised full papers presented were carefully selected from numerous submissions. The papers are organized in topical sections on security, privacy; e-governance; e-government applications, virtualizations; politics, legislation: European initiatives.
Securing privacy in the current environment is one of the great challenges of today s democracies. "Privacy vs. Security" explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today s attacks on privacy by the simple use of today s technology, like web services and e-payment technologies and by State-level surveillance activities."
From Snapshots to Social Media describes the history and future of domestic photography as mediated by technological change. Domestic photography refers to the culture of ordinary people capturing, sharing and using photographs, and is in a particular state of flux today as photos go digital. The book argues that this digital era is the third major chapter in the 170 year history of the area; following the portrait and Kodak eras of the past. History shows that despite huge changes in photographic technology and the way it has been sold, people continue to use photographs to improve memory, support communication and reinforce identity. The future will involve a shift in the balance of these core activities and a replacement of the family album with various multimedia archives for individuals, families and communities. This raises a number of issues that should be taken into account when designing new technologies and business services in this area, including: the ownership and privacy of content, multimedia standards, home ICT infrastructure, and younger and older users of images. The book is a must for designers and engineers of imaging technology and social media who want a better understanding of the history of domestic photography in order to shape its future. It will also be of value to students and researchers in science and technology studies and visual culture, as a fascinating case study of the evolving use of photographs and photographic technology in Western society.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
This book constitutes the refereed proceedings of the 7th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2014, held in Istanbul, Turkey, in September 2014. The 13 full papers presented together with 2 keynotes were carefully reviewed and selected from 33 submissions. The focus of the conference was on following topics: Competence Science Education, Competence Measurement for Informatics, Emerging Technologies and Tools for Informatics, Teacher Education in Informatics, and Curriculum Issues.
This book constitutes the refereed proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE 2014, held in Paderborn, Germany, in September 2014. The 13 full papers and 10 short papers presented together with one keynote were carefully reviewed and selected from 35 submissions. The papers cover various topics such as integration of software engineering and user-centered design; HCI models and model-driven engineering; incorporating guidelines and principles for designing usable products in the development process; usability engineering; methods for user interface design; patterns in HCI and HCSE; software architectures for user interfaces; user interfaces for special environments; representations for design in the development process; working with iterative and agile process models in HCSE; social and organizational aspects in the software development lifecycle; human-centric software development tools; user profiles and mental models; user requirements and design constraints; and user experience and software design.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.
This book constitutes the refereed proceedings of the 5th International Conference on Serious Games Development and Applications, SGDA 2014, held in Berlin, Germany, in October 2014. The 14 revised full papers presented together with 4 short papers were carefully reviewed and selected from 31 submissions. The focus of the papers was on the following: games for health, games for medical training, serious games for children, music and sound effects, games for other purposes, and game design and theories.
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
This book constitutes the proceedings of the 20th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Santiago, Chile, in September 2014. The 16 revised papers presented together with 18 progress papers and 3 invited talks were carefully reviewed and selected from 49 submissions. The papers published in proceedings of this year's and past CRIWG conferences reflect the trends in collaborative computing research and its evolution. There was a growing interest in social networks analysis, crowdsourcing and computer support for large communities in general. A special research topic which has been traditionally present in the CRIWG proceedings has been collaborative learning.
This book constitutes the refereed proceedings of the 11th International Conference on Mobile Web and Information Systems, MobiWIS 2014, held in Barcelona, Spain, in August 2014. The 24 papers presented were carefully reviewed and selected from 75 submissions and cover topics such as: mobile software systems, middleware/SOA for mobile systems, context- and location-aware services, data management in the mobile web, mobile cloud services, mobile web of things, mobile web security, trust and privacy, mobile networks, protocols and applications, mobile commerce and business services, HCI in mobile applications, social media, and adaptive approaches for mobile computing.
The two-volume set LNCS 8547 and 8548 constitutes the refereed proceedings of the 14th International Conference on Computers Helping People with Special Needs, ICCHP 2014, held in Paris, France, in July 2014. The 132 revised full papers and 55 short papers presented were carefully reviewed and selected from 362 submissions. The papers included in the first volume are organized in the following topical sections: accessible media; digital content and media accessibility; 25 years of the Web: weaving accessibility; towards e-inclusion for people with intellectual disabilities; the impact of PDF/UA on accessible PDF; accessibility of non-verbal communication; emotions for accessibility (E4A), games and entertainment software; accessibility and therapy; implementation and take-up of e-accessibility; accessibility and usability of mobile platforms for people with disabilities and elderly persons; portable and mobile platforms for people with disabilities and elderly persons; people with cognitive disabilities: At, ICT and AAC; autism: ICT and AT; access to mathematics, science and music and blind and visually impaired people: AT, HCI and accessibility.
This book constitutes the refereed proceedings of the 5th International Conference on Well-Being in the Information Society, WIS 2014, held in Turku, Finland, in September 2014. The 24 revised full papers presented were carefully reviewed and selected from 64 submissions. The core topic is livability and quality of (urban) living with safety and security. The papers address topics such as secure and equal use of information resources, safe and secure work environments and education institutions, cyberaggression and cybersecurity as well as impact of culture on urban safety and security.
This book constitutes the refereed proceedings of the Third International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2014, held in Munich, Germany, in September 2014, in conjunction with DEXA 2014. The 23 revised full papers presented together with one invited talk were carefully reviewed and selected for inclusion in this volume. The papers are organized in the following topical sections: identity management in e-government; e-participation; intelligent systems in e-government; semantic technologies in e-government; e-government cases; open government data and G-cloud; and privacy and security in e-government.
The two-volume set LNCS 8525-8526 constitutes the refereed proceedings of the 6th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI 2014, in Heraklion, Crete, Greece, in June 2014, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 82 contributions included in the VAMR proceedings were carefully reviewed and selected for inclusion in this two-volume set. The 39 papers included in this volume are organized in the following topical sections: interaction devices, displays and techniques in VAMR; designing virtual and augmented environments; avatars and virtual characters; developing virtual and augmented environments.
The two-volume set LNCS 8547 and 8548 constitutes the refereed proceedings of the 14th International Conference on Computers Helping People with Special Needs, ICCHP 2014, held in Paris, France, in July 2014. The 132 revised full papers and 55 short papers presented were carefully reviewed and selected from 362 submissions. The papers included in the second volume are organized in the following topical sections: tactile graphics and models for blind people and recognition of shapes by touch; mobility support and accessible tourism; smart and assistive environments: ambient assisted living (AAL); text entry for accessible computing; people with motor and mobility disabilities: AT and accessibility; assistive technology: service and practice; ICT-based learning technologies for disabled and non-disabled people; universal learning design: methodology; universal learning design: hearing impaired and deaf people; universal learning design: sign language in education; sign language transcription, recognition and generation; universal learning design: accessibility and AT; differentiation, individualisation and influencing factors in ICT-assisted learning for people with special needs; developing accessible teaching and learning materials within a user centred design framework and using mobile technologies to support individuals with special needs in educational environments.
The four-volume set LNCS 8517, 8518, 8519 and 8520 constitutes the proceedings of the Third International Conference on Design, User Experience, and Usability, DUXU 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 256 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in this four-volume set. The 45 papers included in this volume are organized in topical sections on DUXU in the enterprise, design for diverse target users, emotional and persuasion design, user experience case studies.
This book constitutes the refereed proceedings of the 7th International Workshop on Multiple Access Communications, MACOM 2014, held in Halmstad, Sweden, in August 2014. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They describe the latest advancements in the field of multiple access communications with an emphasis on reliability issues, physical layer techniques, cognitive radio, medium access control protocols, and video coding.
This book constitutes the refereed proceedings of the 7th International Conference on Hybrid Learning, ICHL 2014, held in Shanghai, China, in August 2014. The 31 papers presented were carefully reviewed and selected from 90 submissions. The selected papers cover various aspects on hybrid learning, computer supported collaborative learning, expericiences in hybrid learning, improved flexibility on learning processes and the pedagogical and psychological issues of hybrid learning.
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure. |
![]() ![]() You may like...
Portfolio Construction, Measurement, and…
John B. Guerard Jr
Hardcover
R5,202
Discovery Miles 52 020
The Effect - An Introduction to Research…
Nick Huntington-Klein
Hardcover
R2,802
Discovery Miles 28 020
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, …
Paperback
R2,849
Discovery Miles 28 490
Singularities, Mirror Symmetry, and the…
Tyler J. Jarvis, Nathan Priddis
Paperback
R3,121
Discovery Miles 31 210
Multiplicative Ideal Theory and…
Scott Chapman, Marco Fontana, …
Hardcover
R5,814
Discovery Miles 58 140
Behind Prison Walls - Unlocking a Safer…
Edwin Cameron, Rebecca Gore, …
Paperback
|