![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions. Topics covered include crypto and electronic money; wireless security; web security; intrusion detection and monitoring; and anonymity and privacy.
Information behavior has emerged as an important aspect of human life, however our knowledge and understanding of it is incomplete and underdeveloped scientifically. Research on the topic is largely contemporary in focus and has generally not incorporated results from other disciplines. In this monograph Spink provides a new understanding of information behavior by incorporating related findings, theories and models from social sciences, psychology and cognition. In her presentation, she argues that information behavior is an important instinctive sociocognitive ability that can only be fully understood with a highly interdisciplinary approach. The leitmotivs of her examination are three important research questions: First, what is the evolutionary, biological and developmental nature of information behavior? Second, what is the role of instinct versus environment in shaping information behavior? And, third, how have information behavior capabilities evolved and developed over time? Written for researchers in information science as well as social and cognitive sciences, Spink's controversial text lays the foundation for a new interdisciplinary theoretical perspective on information behavior that will not only provide a more holistic framework for this field but will also impact those sciences, and thus also open up many new research directions.
This book and its companion volume, LNCS 7282 and 7283, constitute the refereed proceedings of the 8th International Conference, EuroHaptics 2012, held in Tampere, Finland, in June 2012. The 99 papers (56 full papers, 32 short papers, and 11 demo papers) presented were carefully reviewed and selected from 153 submissions. Part I contains the full papers whereas Part II contains the short papers and the demo papers.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce.
Online communities are among the most obvious manifestations of social networks based on new media technology. Facilitating ad-hoc communication and leveraging collective intelligence by matching similar or related users have become important success factors in almost every successful business plan. Researchers are just beginning to understand virtual communities and collaborations among participants currently proliferating across the world. Virtual Communities, Social Networks and Collaboration covers cutting edge research topics of utmost real-world importance in the specific domain of social networks. This volume focuses on exploring issues relating to the design, development, and outcomes from electronic groups and online communities, including: - The implications of social networking, - Understanding of how and why knowledge is shared among participants, - What leads to participation, effective collaboration, co-creation and innovation, - How organizations can better utilize the potential benefits of communities in both internal operations, marketing, and new product development.
The internet has begun to develop into a much more immersive and multi-dimensional space. Three dimensional spaces and sites of interaction have not just gripped our attention but have begun to weave or be woven into the fabric of our professional and social lives. The Immersive Internet - including social media, augmented reality, virtual worlds, online games, 3D internet and beyond - is still nascent, but is moving towards a future where communications technologies and virtual spaces offer immersive experiences persuasive enough to blur the lines between the virtual and the physical. It is this emerging Immersive Internet that is the focus of this book of short thought pieces - postcards from the metaverse - by some of the leading thinkers in the field. The book questions what a more immersive and intimate internet might mean for society and for each of us.
This book constitutes the refereed proceedings of the 10th International Conference on Pervasive Computing, Pervasive 2012, held in Newcastle, UK, in June 2012. The 28 revised papers presented were carefully reviewed and selected from 138 submissions. The contributions are grouped into the following topical sections: activity capturing; urban mobility and computing; home and energy; HCI; development tools and devices; indoor location and positioning; social computing and games; privacy; public displays and services.
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.
This book constitutes the refereed proceedings of the 4th International Conference on Well-Being in the Information Society, WIS 2012, held in Turku, Finland, in August 2012. The 13 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-health; measuring and documenting health and well-being; empowering and educating citizens for healthy living and equal opportunities; governance for health; safe and secure cities; information society as a challenge and a possibility for aged people.
This book constitutes the refereed proceedings of the 7th International Conference on Haptic and Audio Interaction Design, HAID 2012, held in Lund, Sweden, in August 2012. The 15 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on haptics and audio in navigation, supporting experiences and activities, object and interface, test and evaluation.
This book constitutes the proceedings of the 10th International Conference on Business Process Management, BPM 2012, held in Tallinn, Estonia, in September 2012. The 17 regular papers and 7 short papers included in this volume were carefully reviewed and selected from 126 submissions. The book also features two keynote lectures which were given at the conference. The papers are organized in topical sections named: process quality; conformance and compliance; BPM applications; process model analysis; BPM and the cloud; requirements and performance; process mining; and refactoring and optimization.
The two-volume set LNCS 7382 and 7383 constiutes the refereed proceedings of the 13th International Conference on Computers Helping People with Special Needs, ICCHP 2012, held in Linz, Austria, in July 2012. The 147 revised full papers and 42 short papers were carefully reviewed and selected from 364 submissions. The papers included in the second volume are organized in the following topical sections: portable and mobile systems in assistive technology; assistive technology, HCI and rehabilitation; sign 2.0: ICT for sign language users: information sharing, interoperability, user-centered design and collaboration; computer-assisted augmentative and alternative communication; easy to Web between science of education, information design and speech technology; smart and assistive environments: ambient assisted living; text entry for accessible computing; tactile graphics and models for blind people and recognition of shapes by touch; mobility for blind and partially sighted people; and human-computer interaction for blind and partially sighted people.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 16th issue of the Transactions on Computational Science journal contains 11 extended versions of selected papers from Cyberworlds 2011, held in Banff, AB, Canada, in October 2011. The topics span the areas of haptic modeling, shared virtual worlds, virtual reality, human-computer interfaces, e-learning in virtual collaborative spaces, multi-user web games, cybersecurity, social networking, and art and heritage in cyberspaces.
This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012. The 21 revised full papers presented together with 3 short papers and 4 workshop and tutorial papers were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on process focused software process improvement, open-source agile and lean practices, product and process measurements and estimation, distributed and global software development, quality assessment, and empirical studies.
This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linkoping, Sweden, in June 2012. The 21 full papers presented together with 5 short papers were carefully reviewed and selected from numerous submissions. In addition three keynote papers are included in this volume. The papers cover the typical fields of persuasive technology, such as health, safety and education."
This book constitutes the refereed proceedings of the 3 rd International ICST Conference on IT Revolutions, held in Cordoba, Spain in March 2011. The 20 revised full papers presented were carefully reviewed and selected from numerous submissions. They are grouped in topical sections on eGreen energy, smart buildings, health and ambient assisted living, smart environments and user experience, grid and cloud computing, eLearning.
The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual's social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations' strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.
This book constitutes the refereed proceedings of the 7th International Conference on Theory and Application of Diagrams, Diagrams 2012, held in Canaterbury, UK, in July 2012. The 16 long papers, 6 short papers and 21 poster abstracts presented were carefully reviewed and selected from 83 submissions. The papers are organized in keynotes, tutorial, workshops, graduate student symposium and topical sections on psychological and cognitive issues, diagram layout, diagrams and data analysis, Venn and Euler diagrams, reasoning with diagrams, investigating aesthetics, applications of diagrams.
Back in 1983 I was chatting with Dick Coleman, publisher of Traffic World magazine, when he unexpectedly proposed that I write a column for the magazine on computer applications in the transportation/physical distribution industry. "But, Dick, I don't know all that much about computers," I protested. "You use one, don't you?" he asked logically. Yes, I did; I'd been running my consulting business with it for two years. But that didn't, I explained, make me an expert. "Think about it," he said. That's typical Coleman; he drops these studiedly casual ideas and just lets them lay there until you pick them up and wind up doing just what he wanted you to do all along. Sure enough, the longer I pondered the notion the more it appealed to me. OK, I wasn't a computer expert (I'm still not). But I was a computer user, in the transportation/distribution field; maybe from that perspective I might have some useful things to say to other transportation/distribution users and would-be users of computers. Thus was born the "Computer Software for Transportation" column. The first one appeared in the April 11, 1983, issue of Traffic World, and it's been a once-a-month schedule ever since. And thus, too, was ultimately born this book.
The authors describe how the web is transforming from a one-way
information delivery channel to a socially rich communication
vehicle, resulting in the humanizing of the web and fulfilling the
web's original promise. They explain how the web continues to
change businesses, software design, the way we perceive people and
the skills required of us. The web's key challenges are defined as
six paradoxes and its role as an innovation ecosystem is
introduced, emphasizing the consideration of the social web as a
software platform, user experience, and business ecosystem. The
volume explores the challenges related to the search for
Zero-to-One innovations, breakthroughs, and the key strategies for
discovering these kinds of innovations for the social web (or
through the social web for non-web environments). It also envisions
the next generation of the web, including both transformations that
are already ongoing and visible as well as new expectations. An
important message for companies and organizations is to adopt a set
of core business values that will facilitate innovation processes
in this future humanized web. These business values are very
humane. Finally, the authors discuss key threats and opportunities
for this future.
There is, in general, no doubt regarding the ethical and human behaviour aspects of the research work of any type. The researchers are thought of working for society and are low paid. However, in the practice of science and technology, they should work, first of all, for system designers who need their support in designing, developing and implementing the systems under investigation. Unfortunately, this is not a popular case in the area of Information and Communication Technology (ICT), where the support of the system and network researchers for the system and network designers, developers and operators is very limited. Considering that, the team of authors of the book (the team) decided to present the design experiences gained during designing, implementing and operating some line of the computer systems and networks in Poland (the country). The country was selected purposefully: Due to the political reasons, various embargos were imposed on the importation of modern equipment and methods of the computer industry, and the team needed very severely good support from the researchers to fulfil the design and development tasks successfully. However, in the ICT domain, which is a relatively new study and, thus, needing the significant support of science in every country, this support was a minute one in practice. In well developed countries, possessing a surplus of hardware and software components, the need for the support was also observed but could be bypassed through using a surplus of supplies or by learning from the design errors. This bypass was much less available in the country in severe economic conditions and the political conditions of the so-called Cold War. The objective of this book is to present the line of the ICT systems and networks under design and operation from the late 1960s and finishing when this book was written, and to present the requirements for the system and the basic support available from this science. The research aspects under consideration were, first of all, the performance evaluation and, for the systems of the 21st century, the robustness evaluation, with the system designers, implementers and operators being the ideal audience.
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011. The 20 revised full papers presented along with 8 short papers were carefully reviewed and selected from numerous submissions in total and cover a wide range of topics including social media analysis, knowledge integration and EPR, personalisation and patient support systems, early warning systems and mobile monitoring, games and learning, security, privacy and prevention, online support for professionals and patients, agents in eHealth, online communities of practice, eHealth solutions, social media surveillance, and communication and data integration.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software. The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand |
![]() ![]() You may like...
Organometallic Chemistry - Volume 31
J.A. Timney, I.R. Butler, …
Hardcover
R10,527
Discovery Miles 105 270
Spectroscopic Properties of Inorganic…
Jack Yarwood, Richard Douthwaite, …
Hardcover
R11,264
Discovery Miles 112 640
An Administrator's Garden - Sowing Seeds…
Mary J Goodwin-Clinkscale
Hardcover
R753
Discovery Miles 7 530
Metal-Organic Framework - From Design to…
Xian-He Bu, Michael J. Zaworotko, …
Hardcover
R11,302
Discovery Miles 113 020
Qualitative Techniques for Workplace…
Manish Gupta, Musarrat Shaheen, …
Hardcover
R5,782
Discovery Miles 57 820
Financial Mathematics - A Comprehensive…
Giuseppe Campolieti, Roman N. Makarov
Hardcover
R2,762
Discovery Miles 27 620
|