![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living (AAL) systems and services, EvAAL 2011, which was organized in two major events, the Competition in Valencia, Spain, in July 2011, and the Final workshop in Lecce, Italy, in September 2011. The papers included in this book describe the organization and technical aspects of the competition, and provide a complete technical description of the competing artefacts and report on the experience lessons learned by the teams during the competition.
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.
This book constitutes the proceedings of the 18th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Raesfeld, Germany, in September 2012. The 9 revised papers presented together with 12 short papers were carefully reviewed and selected from numerous submissions. They are grouped into five themes that represent collaborative learning, social media analytics, conceptual and design models, formal modeling and technical approaches and collaboration support in emergency scenarios.
This book constitutes the refereed proceedings of the 4th International Conference on Well-Being in the Information Society, WIS 2012, held in Turku, Finland, in August 2012. The 13 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-health; measuring and documenting health and well-being; empowering and educating citizens for healthy living and equal opportunities; governance for health; safe and secure cities; information society as a challenge and a possibility for aged people.
This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011. The 34 full papers presented together were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on RAM evaluation, complex systems dependability, formal verification, risk and hazard analysis, cybersecurity and optimization methods.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
This book constitutes the refereed proceedings of the 8th
International Conference on Cooperative Design, Visualization, and
Engineering, CDVE 2011, held in Hong Kong, China, in September
2011.
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle, WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference . The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are organized in topical sections on privacy protection and quantification, security in cloud and sensor networks and secure data managment technologies.
One of the major problems in the development of virtual societies, in particular in electronic commerce and computer-mediated interactions in organizations, is trust and deception. This book provides analyses by various researchers of the different types of trust that are needed for various tasks, such as facilitating on-line collaboration, building virtual communities and network organizations, and even the design of effective and user-friendly human-computer interfaces. The book has a multi-disciplinary character providing theoretical models of trust and deception, empirical studies, and practical solutions for creating trust in electronic commerce and multi-agent systems.
Nicholas Carr has made his name as an incisive writer on our complicated relationship with technology. Utopia Is Creepy, a sharp and often funny indictment of our tech-besotted culture, collects essays drawn from Carr's popular blog Rough Type as well as seminal pieces that first appeared in The Atlantic, the MIT Technology Review and The Wall Street Journal, to provide an alternative history of our digital age over the last ten years. Carr lays bare the pitfalls alongside the benefits of the internet age, and dissects the philistinism and misanthropy that underlie Silicon Valley's "liberation mythology". With assessments of some of the crucial issues of the day, from online surveillance to the state of public discourse, Carr puts his finger on today's most pressing issues.
Slated as 'the next big thing in tech', augmented reality promises to take the screen out of our hands and wrap it around the world via 'smart spectacles'. As a pervasive, invisible interface between the world and our senses, AR offers unparalleled capacity to reveal hidden digital depths, but it also comes at a cost to our privacy, our property, and our reality. In this crucial and provocative book, Mark Pesce draws on over thirty years' experience to offer the first mainstream exploration of augmented reality. He discusses the exciting and beneficial features of AR as well as the issues and risks raised by this still-emerging technology - a technology that moulds us by shaping what we see and hear. Augmented Reality is essential reading for anyone interested in the growing influence of this impressive but deeply concerning technology. As the book reveals, reality - once augmented - will never be the same.
Digital Homecare is a collection of services to deliver, maintain and improve care in the home environment using the latest ICT technology and devices. It is important to recognize the wide range of issues that are covered by digital homecare. This book shows a good selection of related issues, be it experience, technologies, managerial issues or standardization. A very diverse "audience"; elderly, people with chronic conditions, disabled, to name the most important groups, benefits from digital homecare, within the comfort and protection of their own homes.
In the future, everyday life in traffic will be intricately meshed with city life. Today motorways, cities and streets are places where we spend a considerable amount of time, and where a large number of everyday encounters between people occur. Any road user's journey coincides with hundreds or even thousands of others. This book unpacks the details of the practical achievements involved in socially engaging with people at high speed. Although, generally speaking, these encounters are brief and interaction is slight, the recent emergence of mobile technologies offers opportunities to support drivers and passengers beyond just helping them to reach their destination. New social media could enhance interaction in traffic making life on the road more interesting and meaningful. Such innovative applications could include car stereos that share music amongst drivers; digital games that interact with the landscape passing outside the car windows, or with passengers in surrounding cars; message systems that allow drivers to help each other; and web applications that allow motorcyclists to socialize on the road. Social Media on the Road - The Future of Car Based Computing provides a bridge between research in transport planning and traffic technology, and new media areas such as Computer Human Interaction and Computer Supported Cooperative Work. Those studying and researching in the areas of human computer interaction in mobile use contexts, and those interested in developing new forms of mobile applications and services will find this book an excellent resource. Oskar Juhlin is Associate Professor and Director of the Mobile Life VinnExcellence Centre at Stockholm University and Interactive Institute. 'This book represents a pioneering and key research work that examines the future of transportation being merged with communication and interactive media. It also provides a glimpse of the future potential of mixed reality entertainment for children and family on the move. It is essential for scientists, designers, and engineers working on mobile social media, as well as for business people looking for new potential urban transport media services.' Professor Adrian D. Cheok, Graduate School of Media Design, Keio University.
Handbook of Usability and User Experience: Methods and Techniques is concerned with emerging usability and user experience in design concepts, theories and applications of human factors knowledge focusing on the discovery, design and understanding of human interaction and usability issues with products and systems for their improvement. This volume presents methods and techniques to design products, systems and environments with good usability, accessibility and user satisfaction. It introduces the concepts of usability and its association with user experience, and discusses methods and models for usability and UX. It also introduces relevant cognitive, cultural, social and experiential individual differences, which are essential for understanding, measuring and utilizing these differences in the study of usability and interaction design. In addition, the book discusses the use of usability assessment to improve healthcare, the relationship between usability and user experience in the built environment, the state-of-the-art review of usability and UX in the digital world, usability and UX in the current context, and emerging technologies. We hope that this first of two volumes will be helpful to a large number of professionals, students and practitioners who strive to incorporate usability and user experience principles and knowledge in a variety of applications. We trust that the knowledge presented in this volume will ultimately lead to an increased appreciation of the benefits of usability and incorporate the principles of usability and user experience knowledge to improve the quality, effectiveness and efficiency of consumer products, systems and environments in which we live.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Green Communication and Networking (GreeNets 2011), held in Colmar, France, on October 5-7, 2011. The 16 revised full papers presented were carefully selected and reviewed from numerous submissions and explain the scope and challenges of designing, building, and deploying GreeNets. In this regard, the conference aims to establish a forum to bring together research professionals from diverse fields including green mobile networks, system architectures, networking & communication protocols, applications, test-bed and prototype, traffic balance and energy-efficient cooperation transmission, system and application issues related to GreenNets.
This book constitutes the refereed proceedings of the 10th
International Symposium, PETS 2011, held in Waterloo, Canada, in
July 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Energy Efficient Data Centers (E2DC 2012) held in Madrid, Spain, in May 2012. The 13 revised full papers presented were carefully selected from 32 submissions. The papers cover topics from information and communication technologies of green data centers to business models and GreenSLA solutions. The first section presents contributions in form of position and short papers, related to various European projects. The other two sections comprise papers with more in-depth technical details. The topics covered include energy-efficient data center management and service delivery as well as energy monitoring and optimization techniques for data centers.
This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.
The two-volume set LNCS 7382 and 7383 constiutes the refereed proceedings of the 13th International Conference on Computers Helping People with Special Needs, ICCHP 2012, held in Linz, Austria, in July 2012. The 147 revised full papers and 42 short papers were carefully reviewed and selected from 364 submissions. The papers included in the second volume are organized in the following topical sections: portable and mobile systems in assistive technology; assistive technology, HCI and rehabilitation; sign 2.0: ICT for sign language users: information sharing, interoperability, user-centered design and collaboration; computer-assisted augmentative and alternative communication; easy to Web between science of education, information design and speech technology; smart and assistive environments: ambient assisted living; text entry for accessible computing; tactile graphics and models for blind people and recognition of shapes by touch; mobility for blind and partially sighted people; and human-computer interaction for blind and partially sighted people.
The two-volume set LNCS 6769 + LNCS 6770 constitutes the proceedings of the First International Conference on Design, User Experience, and Usability, DUXU 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences. A total of 4039 contributions was submitted to HCII 2011, of which 1318 papers were accepted for publication. The total of 154 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on DUXU theory, methods and tools; DUXU guidelines and standards; novel DUXU: devices and their user interfaces; DUXU in industry; DUXU in the mobile and vehicle context; DXU in Web environment; DUXU and ubiquitous interaction/appearance; DUXU in the development and usage lifecycle; DUXU evaluation; and DUXU beyond usability: culture, branding, and emotions.
This book constitutes the thoroughly refereed post-workshop proceedings of the 9th International Conference on Web-Based Learning, ICWL 2010, held in Shanghai, China, in December 2010. The 36 revised full papers and 8 short papers presented were carefully reviewed and selected from 192 submissions. They deal with topics such as e-learning platforms and tools, technology enhanced learning, Web-based learning for oriental languages, mobile/situated e-learning, learning resource deployment, organization and management, design, model and framework of e-learning systems, e-learning metadata and standards, collaborative learning and game-based learning, as well as practice and experience sharing, and pedagogical issues.
This book constitutes the proceedings of the 10th German Conference on Multiagent System Technologies held in Trier Germany, in October 2012. The 7 revised full papers presented together with 6 short parers and one invited paper were carefully reviewed and selected from 39 submissions. The paper cover various research topics in intelligent agents and multi-agent-systems. In particular, the conference investigated technologies for truly open distributed systems covering a wide spectrum of approaches from self-organization and autonomous systems to agreement computing.
This book constitutes the joint thoroughly refereed post-proceedings of the Second International Workshop on Modeling Social Media, MSM 2011, held in Boston, MA, USA, in October 2011, and the Second International Workshop on Mining Ubiquitous and Social Environments, MUSE 2011, held in Athens, Greece, in September 2011. The 9 full papers included in the book are revised and significantly extended versions of papers submitted to the workshops. They cover a wide range of topics organized in three main themes: communities and networks in ubiquitous social media; mining approaches; and issues of user modeling, privacy and security.
This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. The papers are organized in topical sections on tools, risk analysis, testing, quantitative analysis, security, formal methods, aeronautic, automotive, and process. Also included are 4 case studies. |
You may like...
Advanced Technologies and Polymer…
Sabu Thomas, Phil Coates, …
Paperback
R4,949
Discovery Miles 49 490
The Local Dimension of Migration…
Tiziana Caponio, Maren Borkert
Paperback
R1,433
Discovery Miles 14 330
Data Science and Big Data: An…
Witold Pedrycz, Shyi-Ming Chen
Hardcover
R4,705
Discovery Miles 47 050
|