![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the refereed proceedings of the 7th
International Conference on Information Security Practice and
Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
The two-volume set LNCS 6769 + LNCS 6770 constitutes the proceedings of the First International Conference on Design, User Experience, and Usability, DUXU 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences. A total of 4039 contributions was submitted to HCII 2011, of which 1318 papers were accepted for publication. The total of 154 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on DUXU theory, methods and tools; DUXU guidelines and standards; novel DUXU: devices and their user interfaces; DUXU in industry; DUXU in the mobile and vehicle context; DXU in Web environment; DUXU and ubiquitous interaction/appearance; DUXU in the development and usage lifecycle; DUXU evaluation; and DUXU beyond usability: culture, branding, and emotions.
This book constitutes the thoroughly refereed post-workshop proceedings of the 9th International Conference on Web-Based Learning, ICWL 2010, held in Shanghai, China, in December 2010. The 36 revised full papers and 8 short papers presented were carefully reviewed and selected from 192 submissions. They deal with topics such as e-learning platforms and tools, technology enhanced learning, Web-based learning for oriental languages, mobile/situated e-learning, learning resource deployment, organization and management, design, model and framework of e-learning systems, e-learning metadata and standards, collaborative learning and game-based learning, as well as practice and experience sharing, and pedagogical issues.
Confronting the digital revolution in academia, this book examines the application of new computational techniques and visualisation technologies in the Arts & Humanities. Uniting differing perspectives, leading and emerging scholars discuss the theoretical and practical challenges that computation raises for these disciplines.
This book constitutes the refereed proceedings of the 5th
International Conference on Information Theoretic Security, held in
Amsterdam, The Netherlands, in May 2011.
This book constitutes the refereed proceedings of the 17th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2011, held in Essen, Germany, in March 2011. The 10 revised full papers and the 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in seven topical sections on security and sustainability; process improvement and requirements in context; elicitation; models; services; embedded and real-time systems; and prioritization and traceability.
Simplicity in nature is the ultimate sophistication. The world's magnificence has been enriched by the inner drive of instincts, the profound drive of our everyday life. Instinct is an inherited behavior that responds to environmental stimuli. Instinctive computing is a computational simulation of biological and cognitive instincts, which influence how we see, feel, appear, think and act. If we want a computer to be genuinely secure, intelligent, and to interact naturally with us, we must give computers the ability to recognize, understand, and even to have primitive instincts. This book, Computing with Instincts, comprises the proceedings of the Instinctive Computing Workshop held at Carnegie Mellon University in the summer of 2009. It is the first state-of-the-art survey on this subject. The book consists of three parts: Instinctive Sensing, Communication and Environments, including new experiments with in vitro biological neurons for the control of mobile robots, instinctive sound recognition, texture vision, visual abstraction, genre in cultures, human interaction with virtual world, intuitive interfaces, exploitive interaction, and agents for smart environments.
This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011. The 24 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers were arranged into seven sessions covering passive measurement, wireless models, bandwidth, automated bots, route avoidance, interdomain protocols, timing, and diagnosis.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011. The 48 papers and 3 keynotes presented in this volume were carefully reviewed and selected from 88 submissions. The papers cover a wide range of topics including social network analysis; modeling; machine learning and data mining; social behaviors; public health; cultural aspects; and effects and search.
This book constitutes the refereed proceedings of the International Conference on Advances in Information Technology and Mobile Communication, AIM 2011, held at Nagpur, India, in April 2011. The 31 revised full papers presented together with 27 short papers and 34 poster papers were carefully reviewed and selected from 313 submissions. The papers cover all current issues in theory, practices, and applications of Information Technology, Computer and Mobile Communication Technology and related topics.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2011, held in Kaunas, Lithuania, in October 2011. The 25 revised papers presented were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: e-government and e-governance, e-services, digital goods and products, e-business process modeling and re-engineering, innovative e-business models and implementation, e-health and e-education, and innovative e-business models.
We are very pleased to introduce Open Source Development, Communities and Quality. The International Conference on Open Source Systems has come to its fourth edition - OSS 2008. Now, Free, Libre, and Open Source software is by all means now one of the most relevant subjects of study in several disciplines, ranging from information technology to social sciences and including also law, business, and political sciences. There are several conference tracks devoted to open source software with several publications appearing in high quality journals and magazines. OSS 2008 has been organized with the purpose of being the reference venue for those working in this area, being the most prominent conference in this area. For this th reason OSS 2008 has been located within the frameworks of the 20 World Computer Congress, WCC 2008, in Milan, the largest event of IFIP in 2008. We believe that this conference series, and the IFIP working group it represents, can play an important role in meeting these challenges, and hope that this book will become a valuable contribution to the open source body of research.
This book constitutes the proceedings of the Second International Conference on Security-Enriched Urban Computing and Smart Grid, held in Hualien, Taiwan, in September 2011. The 35 revised full papers presented together with two invited papers were carefully reviewed and selected from 97 submissions. Among the topics covered are the internet of things, mobile networks, wireless networks, service-oriented computing, data-centric computing, voice over IP, cloud computing, privacy, smart grid systems, distributed systems, agent-based systems, assistive technology, social networks, and wearable computing.
This book constitutes the refereed proceedings of the 17th EUNICE 2011 Workshop on energy-aware communications, held in Dresden, in September 2011. The proceedings comprise 16 full papers and 7 poster papers which are presented together with the abstracts of the 3 invited talks. The topics covered are: network architectures; ad-hoc and wireless networks; system simulation; network planning, optimization, and migration; traffic engineering; quality of experience; and energy efficient architectures.
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010. The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior in computer systems.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011. The 49 papers included in the second volume are organized in topical sections on health, human factors, interacting in public spaces, interacting with displays, interaction design for developing regions, interface design, international and culural aspect of HCI, interruptions and attention, mobile interfaces, multi-modal interfaces, multi-user interaction/cooperation, and navigation and wayfinding.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011. The 46 papers included in the third volume are organized in topical sections on novel user interfaces and interaction techniques, paper 2.0, recommender systems, social media and privacy, social networks, sound and smell, touch interfaces, tabletops, ubiquitous and context-aware computing, UI modeling, and usability.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011. The fourth volume includes 27 regular papers organized in topical sections on usable privacy and security, user experience, user modelling, visualization, and Web interaction, 5 demo papers, 17 doctoral consortium papers, 4 industrial papers, 54 interactive posters, 5 organization overviews, 2 panels, 3 contributions on special interest groups, 11 tutorials, and 16 workshop papers.
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection V describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, and Infrastructure Modeling and Simulation. This book is the 5th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of 14 edited papers from the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2011. Critical Infrastructure Protection V is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jonathan Butts is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
This book presents the proceedings of the Working Conference on the societal and organizational implications for information systems of social inclusion. The contributed papers explore technology design and use in organizations, and consider the processes that engender social exclusion along with the issues that derive from it. The conference, sponsored by the International Federation for Information Processing Working Group 8.2, was held in Limerick, Ireland, in July, 2006.
Delving into the complexities of contemporary reportage, this book draws from moral philosophy and histories of photojournalism to understand the emergence of this distinct practice and discuss its evolution in a digital era. In arguing that the digitization of photography obliges us to radically challenge some of the traditional conceptions of press photography, this book addresses the historic opposition between artistic and journalistic photographs, showing and challenging how this has subtly inspired support for a forensic approach to photojournalism ethics. The book situates this debate within questions of relativism over what is 'moral', and normative debates over what is 'journalistic', alongside technical debates as to what is 'possible', to underpin a discussion of photojournalism as an ethical, moral, and societally important journalistic practice. Including detailed comparative analyses of codes of ethics, examination of controversial cases, and a study of photojournalism ethics as applied in different newsrooms, the book examines how ethical principles are applied by the global news media and explores the potential for constructive dialogue between different voices interested in pursuing the best version of photojournalism. A targeted, comprehensive and engaging book, this is a valuable resource for academics, researchers and students of photojournalism, as well as philosophy, communications and media studies more broadly.
What effect have innovations in digital technology had on the way we communicate and work, and what can we expect from the future? Following on from the hugely successful "e-Shock," Michael de Kare Silver analyses the developments in digital technology over the past decade, and how they have changed our lives both at home and in the workplace.
The book describes the main directions for the development of the digital society. The author angles its book to those who are interested to know what would replace search engines, and how social networks would evolve; what profit can be made of different forms of informational collaboration (crowdsourcing, collaborative filtering). And, the main thing, how it will influence the structure of the society and human pursuit for happiness. The author does not confine himself to a theory, he sets and solves practical questions: How talent, success and "stardom" are interconnected, how to make money in social networks, what is the business model for the development of entertainment and media, how to measure cultural values, and what is the subjective time of the individual and how to make it qualitative? There have been no answers to these questions before. Internet and social networks have provided tools and data that Alexander Dolgin was the first to use in economics.
Governments, the media, the information technology industry and scientists publicly argue that information and communication technologies (ICT) will bring about an inevitable transition from "industrial" to "information" or "knowledge-based" economies and societies. It is assumed that all aspects of our economic and social lives, in both the public and private spheres, will be radically different from what they are today. The World Summit on the Information Society (Geneva 2003 - Tunis 2005) shows the importance of a worldwide reflection on those topics. Perspectives and Policies on ICT in Society explores the ICT policies of different nations and regions such as Africa, China, Europe, and India. The authors assess the arguments surrounding the impending new age, as well as some of the more sensitive issues of its developments. This progress will signal an expansion of ICT in many domains - the so-called ubiquity - such as in the workplace, the home, government, and education and it will affect privacy and professional ethics. The expansion will also encompass all parts of the earth, particularly developing countries. Such growth must take place in the context of historical dimensions and should underscore the accountability of professionals in the field. The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. Thirty authors from twelve countries consider the ICT policies with their associated perspectives and they explore what may be the information age and the digital society of tomorrow. The book provides reflection on today's complex society and addresses the uncertain developments rising from an increasingly global and technologically connected world. Jacques Berleur is at the University of Namur, Belgium, and Chrisanthi Avgerou at the London School of Economics, United Kingdom. |
![]() ![]() You may like...
Exceeding Reason - Freedom and Religion…
Dennis Vanden Auweele
Hardcover
R3,947
Discovery Miles 39 470
Bone Histology - An Anthropological…
Christian Crowder, Sam Stout
Hardcover
R4,764
Discovery Miles 47 640
Regional and National Identities in…
Heinz-Gerhard Haupt, Michael G. Manduuml, …
Hardcover
R8,200
Discovery Miles 82 000
Martin Heidegger - Critical Assessments
Christopher Macann
Hardcover
R25,538
Discovery Miles 255 380
Transnational Chinese - Fujianese…
Frank N. Pieke, P al Ny iri, …
Paperback
R690
Discovery Miles 6 900
The Use of Tools by Human and Non-human…
A. Berthelet, J. Chavaillon
Hardcover
R4,588
Discovery Miles 45 880
|