![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.
How is the adoption of digital media in the Arab world affecting the relationship between the state and its subjects? What new forms of online engagement and strategies of resistance have emerged from the aspirations of digitally empowered citizens? Networked Publics and Digital Contention: The Politics of Everyday Life in Tunisia tells the compelling story of the concurrent evolution of technology and society in the Middle East. It brings into focus the intricate relationship between Internet development, youth activism, cyber resistance, and political participation. Taking Tunisia - the birthplace of the Arab uprisings - as a case study, it offers an ethnographically nuanced and theoretically grounded analysis of the digital culture of contention that developed in an authoritarian context. It broadens the focus from narrow debates about the role that social media played in the Arab uprisings toward a fresh understanding of how changes in media affect existing power relations. Based on extensive fieldwork, in-depth interviews with Internet activists, and immersive analyses of online communication, this book redirects our attention from institutional politics to the informal politics of everyday life. An original contribution to the political sociology of Arab media, Networked Publics and Digital Contention provides a unique perspective on how networked Arab publics negotiate agency, reconfigure political action, and reimagine citizenship.
Advice involves recommendations on what to think; through thought, on what to choose; and via choices, on how to act. Advice is information that moves by communication, from advisors to the recipient of advice. Ivan Jureta offers a general way to analyze advice. The analysis applies regardless of what the advice is about and from whom it comes or to whom it needs to be given, and it concentrates on the production and consumption of advice independent of the field of application. It is made up of two intertwined parts, a conceptual analysis and an analysis of the rationale of advice. He premises that giving advice is a design problem and he treats advice as an artifact designed and used to influence decisions. What is unusual is the theoretical backdrop against which the author's discussions are set: ontology engineering, conceptual analysis, and artificial intelligence. While classical decision theory would be expected to play a key role, this is not the case here for one principal reason: the difficulty of having relevant numerical, quantitative estimates of probability and utility in most practical situations. Instead conceptual models and mathematical logic are the author's tools of choice. The book is primarily intended for graduate students and researchers of management science. They are offered a general method of analysis that applies to giving and receiving advice when the decision problems are not well structured, and when there is imprecise, unclear, incomplete, or conflicting qualitative information.
Wikipedia, Flickr, You Tube, Facebook, LinkedIn are all examples of large community-built databases, although with quite diverse purposes and collaboration patterns. Their usage and dissemination will further grow introducing e.g. new semantics, personalization, or interactive media. Pardede delivers the first comprehensive research reference on community-built databases. The contributions discuss various technical and social aspects of research in and development in areas like in Web science, social networks, and collaborative information systems. Pardede delivers the first comprehensive research reference on community-built databases. The contributions discuss various technical and social aspects of research in and development in areas like in Web science, social networks, and collaborative information systems.
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as matching theory, game dynamics, games of coordination, networks and social choice, markets and auctions, price of anarchy, computational aspects of games, mechanism design and auctions.
This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the other two volumes review Tools, Perspectives, and Applications, and Security and Privacy in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage from a better understanding of complex social networks; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, highlighting methods for the data mining of CSNs; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
This book contains the refereed proceedings of the 6th Scandinavian Conference on Information Systems, SCIS 2015, held in Oulu, Finland, in August 2015. The theme for this book as well as for the conference is "Design for, with, and by Users." This theme has characterized information systems research already for decades, and it is still a vibrant topic, especially so within the Scandinavian tradition. The 16 full papers accepted for SCIS 2015 were selected from 44 submissions. In addition, two keynote extended abstracts and one keynote paper are included.
A Journey Through Cultures addresses one of the hottest topics in contemporary HCI: cultural diversity amongst users. For a number of years the HCI community has been investigating alternatives to enhance the design of cross-cultural systems. Most contributions to date have followed either a 'design for each' or a 'design for all' strategy. A Journey Through Cultures takes a very different approach. Proponents of CVM - the Cultural Viewpoint Metaphors perspective - the authors invite HCI practitioners to think of how to expose and communicate the idea of cultural diversity. A detailed case study is included which assesses the metaphors' potential in cross-cultural design and evaluation. The results show that cultural viewpoint metaphors have strong epistemic power, leveraged by a combination of theoretic foundations coming from Anthropology, Semiotics and the authors' own work in HCI and Semiotic Engineering. Luciana Salgado, Carla Leitao and Clarisse de Souza are members of SERG, the Semiotic Engineering Research Group at the Departamento de Informatica of Rio de Janeiro's Pontifical Catholic University (PUC-Rio).
New technologies are radically changing the way that families connect with one another: we can text our teenagers from work, eat dinner with far-away parents via video link, and instantly upload and share photos after a family day out. Whether we are bridging time or distance, and whether we are enhancing our closest relationships or strengthening the bonds of extended family, as computer technologies alter the communication landscape, they in turn are changing the way we conduct and experience family life. This state of the art volume explores the impact of new communication systems on how families interact - how they share their lives and routines, engage in social touch, and negotiate being together or being apart - by considering a range of different family relationships that shape the nature of communication. Composed of three sections, the first looks at what is often the core of a 'family', the couple, to understand the impact of technology on couple relationships, communication, and feelings of closeness. The second section studies immediate families that have expanded beyond just the individual or couple to include children. Here, the emphasis is on connection for communication, coordination, and play. The third section moves beyond the immediate family to explore connections between extended, distributed family members. This includes connections between adult children and their parents, grandparents and grandchildren, and adult siblings. Here family members have grown older, moved away from 'home', and forged new families. Researchers, designers and developers of new communication technologies will find this volume invaluable. Connecting Families: The Impact of New Communication Technologies on Domestic Life brings together the most up-to-date studies to help in understanding how new communication technologies shape - and are shaped by - family life, and offers inspiration and guidance for design by making clear what families need and value from technological systems.
This book constitutes the proceedings of the 12th German Conference on Multiagent System Technologies, MATES 2014, held in Stuttgart, Germany, in September 2014. The 9 full papers and 7 short papers included in this volume were carefully reviewed and selected from 31 submissions. The book also contains 2 invited talks. The papers are organized in topical sections named: mechanisms, negotiation, and game theory; multiagent planning, learning, and control; and multiagent systems engineering, modeling and simulation.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013. The 20 revised full papers presented were carefully selected from numerous submissions. The papers are organized in topical sections on security, privacy; e-governance; e-government applications, virtualizations; politics, legislation: European initiatives.
Securing privacy in the current environment is one of the great challenges of today s democracies. "Privacy vs. Security" explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today s attacks on privacy by the simple use of today s technology, like web services and e-payment technologies and by State-level surveillance activities."
From Snapshots to Social Media describes the history and future of domestic photography as mediated by technological change. Domestic photography refers to the culture of ordinary people capturing, sharing and using photographs, and is in a particular state of flux today as photos go digital. The book argues that this digital era is the third major chapter in the 170 year history of the area; following the portrait and Kodak eras of the past. History shows that despite huge changes in photographic technology and the way it has been sold, people continue to use photographs to improve memory, support communication and reinforce identity. The future will involve a shift in the balance of these core activities and a replacement of the family album with various multimedia archives for individuals, families and communities. This raises a number of issues that should be taken into account when designing new technologies and business services in this area, including: the ownership and privacy of content, multimedia standards, home ICT infrastructure, and younger and older users of images. The book is a must for designers and engineers of imaging technology and social media who want a better understanding of the history of domestic photography in order to shape its future. It will also be of value to students and researchers in science and technology studies and visual culture, as a fascinating case study of the evolving use of photographs and photographic technology in Western society.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
This book constitutes the refereed proceedings of the 7th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2014, held in Istanbul, Turkey, in September 2014. The 13 full papers presented together with 2 keynotes were carefully reviewed and selected from 33 submissions. The focus of the conference was on following topics: Competence Science Education, Competence Measurement for Informatics, Emerging Technologies and Tools for Informatics, Teacher Education in Informatics, and Curriculum Issues.
This book constitutes the refereed proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE 2014, held in Paderborn, Germany, in September 2014. The 13 full papers and 10 short papers presented together with one keynote were carefully reviewed and selected from 35 submissions. The papers cover various topics such as integration of software engineering and user-centered design; HCI models and model-driven engineering; incorporating guidelines and principles for designing usable products in the development process; usability engineering; methods for user interface design; patterns in HCI and HCSE; software architectures for user interfaces; user interfaces for special environments; representations for design in the development process; working with iterative and agile process models in HCSE; social and organizational aspects in the software development lifecycle; human-centric software development tools; user profiles and mental models; user requirements and design constraints; and user experience and software design.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.
This book constitutes the refereed proceedings of the 5th International Conference on Serious Games Development and Applications, SGDA 2014, held in Berlin, Germany, in October 2014. The 14 revised full papers presented together with 4 short papers were carefully reviewed and selected from 31 submissions. The focus of the papers was on the following: games for health, games for medical training, serious games for children, music and sound effects, games for other purposes, and game design and theories.
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
This book constitutes the proceedings of the 20th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Santiago, Chile, in September 2014. The 16 revised papers presented together with 18 progress papers and 3 invited talks were carefully reviewed and selected from 49 submissions. The papers published in proceedings of this year's and past CRIWG conferences reflect the trends in collaborative computing research and its evolution. There was a growing interest in social networks analysis, crowdsourcing and computer support for large communities in general. A special research topic which has been traditionally present in the CRIWG proceedings has been collaborative learning.
This book constitutes the refereed proceedings of the 11th International Conference on Mobile Web and Information Systems, MobiWIS 2014, held in Barcelona, Spain, in August 2014. The 24 papers presented were carefully reviewed and selected from 75 submissions and cover topics such as: mobile software systems, middleware/SOA for mobile systems, context- and location-aware services, data management in the mobile web, mobile cloud services, mobile web of things, mobile web security, trust and privacy, mobile networks, protocols and applications, mobile commerce and business services, HCI in mobile applications, social media, and adaptive approaches for mobile computing.
The two-volume set LNCS 8547 and 8548 constitutes the refereed proceedings of the 14th International Conference on Computers Helping People with Special Needs, ICCHP 2014, held in Paris, France, in July 2014. The 132 revised full papers and 55 short papers presented were carefully reviewed and selected from 362 submissions. The papers included in the first volume are organized in the following topical sections: accessible media; digital content and media accessibility; 25 years of the Web: weaving accessibility; towards e-inclusion for people with intellectual disabilities; the impact of PDF/UA on accessible PDF; accessibility of non-verbal communication; emotions for accessibility (E4A), games and entertainment software; accessibility and therapy; implementation and take-up of e-accessibility; accessibility and usability of mobile platforms for people with disabilities and elderly persons; portable and mobile platforms for people with disabilities and elderly persons; people with cognitive disabilities: At, ICT and AAC; autism: ICT and AT; access to mathematics, science and music and blind and visually impaired people: AT, HCI and accessibility.
This book constitutes the refereed proceedings of the 5th International Conference on Well-Being in the Information Society, WIS 2014, held in Turku, Finland, in September 2014. The 24 revised full papers presented were carefully reviewed and selected from 64 submissions. The core topic is livability and quality of (urban) living with safety and security. The papers address topics such as secure and equal use of information resources, safe and secure work environments and education institutions, cyberaggression and cybersecurity as well as impact of culture on urban safety and security.
This book constitutes the refereed proceedings of the Third International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2014, held in Munich, Germany, in September 2014, in conjunction with DEXA 2014. The 23 revised full papers presented together with one invited talk were carefully reviewed and selected for inclusion in this volume. The papers are organized in the following topical sections: identity management in e-government; e-participation; intelligent systems in e-government; semantic technologies in e-government; e-government cases; open government data and G-cloud; and privacy and security in e-government.
The two-volume set LNCS 8525-8526 constitutes the refereed proceedings of the 6th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI 2014, in Heraklion, Crete, Greece, in June 2014, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 82 contributions included in the VAMR proceedings were carefully reviewed and selected for inclusion in this two-volume set. The 39 papers included in this volume are organized in the following topical sections: interaction devices, displays and techniques in VAMR; designing virtual and augmented environments; avatars and virtual characters; developing virtual and augmented environments. |
![]() ![]() You may like...
Emerging Technologies - Ethics, Law and…
Gary E Marchant, Wendell Wallach
Hardcover
R9,928
Discovery Miles 99 280
Digital Media Strategies of the Far…
Patricia Anne Simpson, Helga Druxes
Paperback
R1,242
Discovery Miles 12 420
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R3,031
Discovery Miles 30 310
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,876
Discovery Miles 38 760
|