![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
From Snapshots to Social Media describes the history and future of domestic photography as mediated by technological change. Domestic photography refers to the culture of ordinary people capturing, sharing and using photographs, and is in a particular state of flux today as photos go digital. The book argues that this digital era is the third major chapter in the 170 year history of the area; following the portrait and Kodak eras of the past. History shows that despite huge changes in photographic technology and the way it has been sold, people continue to use photographs to improve memory, support communication and reinforce identity. The future will involve a shift in the balance of these core activities and a replacement of the family album with various multimedia archives for individuals, families and communities. This raises a number of issues that should be taken into account when designing new technologies and business services in this area, including: the ownership and privacy of content, multimedia standards, home ICT infrastructure, and younger and older users of images. The book is a must for designers and engineers of imaging technology and social media who want a better understanding of the history of domestic photography in order to shape its future. It will also be of value to students and researchers in science and technology studies and visual culture, as a fascinating case study of the evolving use of photographs and photographic technology in Western society.
President Barack Obama, in his 2011 State of the Union Address, called America "the nation of Edison and the Wright brothers" and "of Google and Facebook." U.S. Chief Information Officer, Steven VanRoekel, said that America has become a "Facebook nation" that demands increased transparency and interactivity from the federal government. Facebook as a nation in 2012 would be the third largest country in the world with over 900 million citizens, after China and India. This book portrays the social media ecosystem as a world of increasing Total Information Awareness, which is essentially a civilian version of the controversial Total Information Awareness program unveiled in 2002 by the Defense Advanced Research Projects Agency (DARPA) at the U.S. Department of Defense. Back in the 60's, DARPA initiated and funded the research and development of Advanced Research Projects Agency Network (ARPANET) that went online in 1969. The success of ARPANET gave rise to the global commercial Internet in the 90's and the new generation of Fortune 500 companies today including Amazon.com, Google, eBay, and Yahoo!. As if life comes full circle in the 21st century, private businesses and the ubiquity of social networks such as Facebook, Google+, Twitter, and YouTube are creating the technologies and infrastructures necessary for the DARPA-proposed Total Information Awareness program. WikiLeaks founder Julian Assange called Facebook "the most appalling spying machine that has ever been invented." Indeed, military and civilian technologies have interwoven into every fabric of our society, as Facebook co-founder and CEO Mark Zuckerberg said, "We exist at the intersection of technology and social issues." This book offers discourse and practical advice on the privacy issue in the age of big data, the rise of Facebook nation, and Total Information Awareness. Opening with President Ronald Reagan's 1984 National Security Decision Directive and ending with George Orwell's novel 1984, the author takes us on a roller-coaster ride through Facebook's botched IPO, Carrier IQ, Kony 2012, SOPA/PIPA blackout, cyber bullying, crime fighting, and a host of other timely issues facing our Facebook nation. Social media strategists, information architects, social scientists, policymakers, and academic scholars in the Program in Science, Technology, and Society (STS) will find this book a valuable asset.
This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention. The authors of the contributions focus on particular and pertinent issues from the perspective of their different disciplines which range from the legal through sociology, surveillance studies and technology assessment, to computer sciences. Such issues include cutting-edge developments in the field of cloud computing, ambient intelligence and PETs; data retention, PNR-agreements, property in personal data and the right to personal identity; electronic road tolling, HIV-related information, criminal records and teenager's online conduct, to name but a few.
This two volume set LNAI 8917 and 8918 constitutes the refereed proceedings of the 7th International Conference on Intelligent Robotics and Applications, ICIRA 2014, held in Guangzhou, China, in December 2014. The 109 revised full papers presented were carefully reviewed and selected from 159 submissions. The papers aim at enhancing the sharing of individual experiences and expertise in intelligent robotics with particular emphasis on technical challenges associated with varied applications such as biomedical applications, industrial automations, surveillance, and sustainable mobility.
The intent of this chapter is to outline a distinctive way of thinking about issues of technology and society that has characterized many Nordic approaches to the topic. One of the characteristics of this approach has been the recognition of the worth of human labour. Technology is not seen as an alien force, but something which is itself a product of human labour, and it can be designed and utilized in ways which augment human skills and expertise, rather than degrading them. What is particularly striking, at least to this author, in this approach is that we are presented not simply with a vision of how things could be better in our society, but with concrete exemplars of how we can build such a better world. It is in recognition of this fact that I have chosen the title of this chapter, as it emphasizes that, while the tradition of Utopian literature is the - lineation of a supposedly idea world which exists no-place (u-topos, in Greek), these visions can be an inspiration for quite practical activities on the ground, as steps towards their realization. As Wilde notes (in the quote above) this is a never-ending quest, as with each achievement, we recognize that there are further bridges to cross and places to be visited.
How is the adoption of digital media in the Arab world affecting the relationship between the state and its subjects? What new forms of online engagement and strategies of resistance have emerged from the aspirations of digitally empowered citizens? Networked Publics and Digital Contention: The Politics of Everyday Life in Tunisia tells the compelling story of the concurrent evolution of technology and society in the Middle East. It brings into focus the intricate relationship between Internet development, youth activism, cyber resistance, and political participation. Taking Tunisia - the birthplace of the Arab uprisings - as a case study, it offers an ethnographically nuanced and theoretically grounded analysis of the digital culture of contention that developed in an authoritarian context. It broadens the focus from narrow debates about the role that social media played in the Arab uprisings toward a fresh understanding of how changes in media affect existing power relations. Based on extensive fieldwork, in-depth interviews with Internet activists, and immersive analyses of online communication, this book redirects our attention from institutional politics to the informal politics of everyday life. An original contribution to the political sociology of Arab media, Networked Publics and Digital Contention provides a unique perspective on how networked Arab publics negotiate agency, reconfigure political action, and reimagine citizenship.
Advice involves recommendations on what to think; through thought, on what to choose; and via choices, on how to act. Advice is information that moves by communication, from advisors to the recipient of advice. Ivan Jureta offers a general way to analyze advice. The analysis applies regardless of what the advice is about and from whom it comes or to whom it needs to be given, and it concentrates on the production and consumption of advice independent of the field of application. It is made up of two intertwined parts, a conceptual analysis and an analysis of the rationale of advice. He premises that giving advice is a design problem and he treats advice as an artifact designed and used to influence decisions. What is unusual is the theoretical backdrop against which the author's discussions are set: ontology engineering, conceptual analysis, and artificial intelligence. While classical decision theory would be expected to play a key role, this is not the case here for one principal reason: the difficulty of having relevant numerical, quantitative estimates of probability and utility in most practical situations. Instead conceptual models and mathematical logic are the author's tools of choice. The book is primarily intended for graduate students and researchers of management science. They are offered a general method of analysis that applies to giving and receiving advice when the decision problems are not well structured, and when there is imprecise, unclear, incomplete, or conflicting qualitative information.
Wikipedia, Flickr, You Tube, Facebook, LinkedIn are all examples of large community-built databases, although with quite diverse purposes and collaboration patterns. Their usage and dissemination will further grow introducing e.g. new semantics, personalization, or interactive media. Pardede delivers the first comprehensive research reference on community-built databases. The contributions discuss various technical and social aspects of research in and development in areas like in Web science, social networks, and collaborative information systems. Pardede delivers the first comprehensive research reference on community-built databases. The contributions discuss various technical and social aspects of research in and development in areas like in Web science, social networks, and collaborative information systems.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
Communications: Wireless in Developing Countries and Networks of the Future The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organized by the International Federation for Information Processing (IFIP): the Third IFIP TC 6 Int- national Conference on Wireless Communications and Information Technology for Developing Countries (WCITD 2010) and the IFIP TC 6 International Network of the Future Conference (NF 2010). The main objective of these two IFIP conferences on communications is to provide a platform for the exchange of recent and original c- tributions in wireless networks in developing countries and networks of the future. There are many exiting trends and developments in the communications industry, several of which are related to advances in wireless networks, and next-generation Internet. It is commonly believed in the communications industry that a new gene- tion should appear in the next ten years. Yet there are a number of issues that are being worked on in various industry research and development labs and universities towards enabling wireless high-speed networks, virtualization techniques, smart n- works, high-level security schemes, etc. We would like to thank the members of the Program Committees and the external reviewers and we hope these proceedings will be very useful to all researchers int- ested in the fields of wireless networks and future network technologies.
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides a process-oriented discussion of the legal concerns presented by agent-based technologies, processes and programming. It offers a general outline of the potential legal difficulties that could arise in relation to them, focusing on the programming of negotiation and contracting processes in a privacy, consumer and commercial context. The authors will elucidate how it is possible to create form of legal framework and design methodology for transaction agents, applicable in any environment and not just in a specific proprietary framework, that provides the right level of compliance and trust. Key elements considered include the design and programming of legally compliant methods, the determination of rights in respect of objects and variables, and ontologies and programming frameworks for agent interactions. Examples are used to illustrate the points made and provide a practical perspective.
September 11, 2001 had a profound impact upon individuals, institutions, and governments, but also upon the world of global trade. Years later, the reverberations of this deliberate and focused act of terrorism are manifest in much more stringent logistics, documentary requirements, and regulations. A single source on compliance and security, written from a supply chain managera (TM)s perspective, Managing Global Supply Chains sorts out all the issues and frames a comprehensive strategy for supply chain executives in the post 9/11 world.
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as matching theory, game dynamics, games of coordination, networks and social choice, markets and auctions, price of anarchy, computational aspects of games, mechanism design and auctions.
A Journey Through Cultures addresses one of the hottest topics in contemporary HCI: cultural diversity amongst users. For a number of years the HCI community has been investigating alternatives to enhance the design of cross-cultural systems. Most contributions to date have followed either a 'design for each' or a 'design for all' strategy. A Journey Through Cultures takes a very different approach. Proponents of CVM - the Cultural Viewpoint Metaphors perspective - the authors invite HCI practitioners to think of how to expose and communicate the idea of cultural diversity. A detailed case study is included which assesses the metaphors' potential in cross-cultural design and evaluation. The results show that cultural viewpoint metaphors have strong epistemic power, leveraged by a combination of theoretic foundations coming from Anthropology, Semiotics and the authors' own work in HCI and Semiotic Engineering. Luciana Salgado, Carla Leitao and Clarisse de Souza are members of SERG, the Semiotic Engineering Research Group at the Departamento de Informatica of Rio de Janeiro's Pontifical Catholic University (PUC-Rio).
This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the other two volumes review Tools, Perspectives, and Applications, and Security and Privacy in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage from a better understanding of complex social networks; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, highlighting methods for the data mining of CSNs; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
This book constitutes the proceedings of the 12th German Conference on Multiagent System Technologies, MATES 2014, held in Stuttgart, Germany, in September 2014. The 9 full papers and 7 short papers included in this volume were carefully reviewed and selected from 31 submissions. The book also contains 2 invited talks. The papers are organized in topical sections named: mechanisms, negotiation, and game theory; multiagent planning, learning, and control; and multiagent systems engineering, modeling and simulation.
This book contains the refereed proceedings of the 6th Scandinavian Conference on Information Systems, SCIS 2015, held in Oulu, Finland, in August 2015. The theme for this book as well as for the conference is "Design for, with, and by Users." This theme has characterized information systems research already for decades, and it is still a vibrant topic, especially so within the Scandinavian tradition. The 16 full papers accepted for SCIS 2015 were selected from 44 submissions. In addition, two keynote extended abstracts and one keynote paper are included.
Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users' virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users' concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.
This book constitutes the refereed proceedings of the 7th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2014, held in Istanbul, Turkey, in September 2014. The 13 full papers presented together with 2 keynotes were carefully reviewed and selected from 33 submissions. The focus of the conference was on following topics: Competence Science Education, Competence Measurement for Informatics, Emerging Technologies and Tools for Informatics, Teacher Education in Informatics, and Curriculum Issues.
This book constitutes the refereed proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE 2014, held in Paderborn, Germany, in September 2014. The 13 full papers and 10 short papers presented together with one keynote were carefully reviewed and selected from 35 submissions. The papers cover various topics such as integration of software engineering and user-centered design; HCI models and model-driven engineering; incorporating guidelines and principles for designing usable products in the development process; usability engineering; methods for user interface design; patterns in HCI and HCSE; software architectures for user interfaces; user interfaces for special environments; representations for design in the development process; working with iterative and agile process models in HCSE; social and organizational aspects in the software development lifecycle; human-centric software development tools; user profiles and mental models; user requirements and design constraints; and user experience and software design.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.
Today's complex, information-intensive problems often require people to work together. Mostly these tasks go far beyond simply searching together; they include information lookup, sharing, synthesis, and decision-making. In addition, they all have an end-goal that is mutually beneficial to all parties involved. Such "collaborative information seeking" (CIS) projects typically last several sessions and the participants all share an intention to contribute and benefit. Not surprisingly, these processes are highly interactive. Shah focuses on two individually well-understood notions: collaboration and information seeking, with the goal of bringing them together to show how it is a natural tendency for humans to work together on complex tasks. The first part of his book introduces the general notions of collaboration and information seeking, as well as related concepts, terminology, and frameworks; and thus provides the reader with a comprehensive treatment of the concepts underlying CIS. The second part of the book details CIS as a standalone domain. A series of frameworks, theories, and models are introduced to provide a conceptual basis for CIS. The final part describes several systems and applications of CIS, along with their broader implications on other fields such as computer-supported cooperative work (CSCW) and human-computer interaction (HCI). With this first comprehensive overview of an exciting new research field, Shah delivers to graduate students and researchers in academia and industry an encompassing description of the technologies involved, state-of-the-art results, and open challenges as well as research opportunities.
This book constitutes the proceedings of the 20th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Santiago, Chile, in September 2014. The 16 revised papers presented together with 18 progress papers and 3 invited talks were carefully reviewed and selected from 49 submissions. The papers published in proceedings of this year's and past CRIWG conferences reflect the trends in collaborative computing research and its evolution. There was a growing interest in social networks analysis, crowdsourcing and computer support for large communities in general. A special research topic which has been traditionally present in the CRIWG proceedings has been collaborative learning.
This book constitutes the refereed proceedings of the 5th International Conference on Serious Games Development and Applications, SGDA 2014, held in Berlin, Germany, in October 2014. The 14 revised full papers presented together with 4 short papers were carefully reviewed and selected from 31 submissions. The focus of the papers was on the following: games for health, games for medical training, serious games for children, music and sound effects, games for other purposes, and game design and theories.
New technologies are radically changing the way that families connect with one another: we can text our teenagers from work, eat dinner with far-away parents via video link, and instantly upload and share photos after a family day out. Whether we are bridging time or distance, and whether we are enhancing our closest relationships or strengthening the bonds of extended family, as computer technologies alter the communication landscape, they in turn are changing the way we conduct and experience family life. This state of the art volume explores the impact of new communication systems on how families interact - how they share their lives and routines, engage in social touch, and negotiate being together or being apart - by considering a range of different family relationships that shape the nature of communication. Composed of three sections, the first looks at what is often the core of a 'family', the couple, to understand the impact of technology on couple relationships, communication, and feelings of closeness. The second section studies immediate families that have expanded beyond just the individual or couple to include children. Here, the emphasis is on connection for communication, coordination, and play. The third section moves beyond the immediate family to explore connections between extended, distributed family members. This includes connections between adult children and their parents, grandparents and grandchildren, and adult siblings. Here family members have grown older, moved away from 'home', and forged new families. Researchers, designers and developers of new communication technologies will find this volume invaluable. Connecting Families: The Impact of New Communication Technologies on Domestic Life brings together the most up-to-date studies to help in understanding how new communication technologies shape - and are shaped by - family life, and offers inspiration and guidance for design by making clear what families need and value from technological systems. |
![]() ![]() You may like...
Numerical Geometry, Grid Generation and…
Vladimir A. Garanzha, Lennard Kamenski, …
Hardcover
R4,393
Discovery Miles 43 930
Stable Adaptive Neural Network Control
S.S. Ge, C.C. Hang, …
Hardcover
R5,750
Discovery Miles 57 500
Motivation, Emotion, and Goal Direction…
Daniel S. Levine, Samuel J. Leven
Hardcover
R4,514
Discovery Miles 45 140
Research on Ship Design and Optimization…
Bao-Ji Zhang, Sheng-Long Zhang
Hardcover
R4,118
Discovery Miles 41 180
Estimation and Control for Networked…
Hong Lin, Hongye Su, …
Hardcover
Smart and Sustainable Collaborative…
Luis M. Camarinha-Matos, Xavier Boucher, …
Hardcover
R6,500
Discovery Miles 65 000
Systematic Complex Problem Solving in…
Denis Cavallucci, Stelian Brad, …
Hardcover
R2,957
Discovery Miles 29 570
Introduction to Data Systems - Building…
Thomas Bressoud, David White
Hardcover
R2,423
Discovery Miles 24 230
|