Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
The two-volume set LNCS 8525-8526 constitutes the refereed proceedings of the 6th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI 2014, in Heraklion, Crete, Greece, in June 2014, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences were carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 82 contributions included in the VAMR proceedings were carefully reviewed and selected for inclusion in this two-volume set. The 43 papers included in this volume are organized in the following topical sections: VAMR in education and cultural heritage; games and entertainment; medical, health and rehabilitation applications; industrial, safety and military applications.
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
This book is an impressive survey of our collective and cumulative
understanding of the evolution of digital communication systems and
the Internet. While the information societies of the twenty-first
century will develop ever more sophisticated technologies, the
Internet is now a familiar and pervasive part of the world in which
we live, work, and communicate. As such it is important to take
stock of some fundamental questions--whether, for example, it
contributes to progress, social cohesion, democracy, and
growth--and at the same time to review the rich and varied theories
and perspectives developed by thinkers in a range of disciplines
over the last fifty years or more.
This volume constitutes the refereed proceedings of the 7th International Conference on Multimedia Communications, Services and Security, MCSS 2014, held in Krakow, Poland, in June 2014. The 21 full papers included in the volume were selected from numerous submissions. The papers cover ongoing research activities in the following topics: audiovisual systems, novel multimedia architectures, multimedia data fusion, acquisition of multimedia content, quality of experience management, watermarking technology and applications, content searching methods, interactive multimedia applications, cybercrime countermeasures, cryptography, biometry, as well as privacy protection solutions.
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: applied modeling and simulation; mobile computing; advanced urban-scale ICT applications; semantic web and knowledge management; cloud computing; image processing; software engineering; collaboration technologies and systems; e-learning; data warehousing and data mining; e-government and e-health; biometric and bioinformatics systems; network security; dependable systems and applications; privacy and trust management; cryptography; multimedia security and dependable systems and applications.
This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile Computing, Applications, and Services (MobiCASE 2013) held in Paris, France, in November 2013. The 13 full, 5 short and 9 poster papers were carefully reviewed and selected from 64 submissions, and are presented together with 3 papers from the Workshop on Near Field Communication for Mobile Applications (NFS). The conference papers are covering mobile applications development, mobile social networking, novel user experience and interfaces, mobile services and platforms such as Android, iOS, BlackBerry OS, Windows phone, Bada, mobile software engineering and mobile Web, mobile payments and M2M infrastructure, mobile services such as novel hardware add-ons, energy aware services or tools, NFC-based services, authentication services.
This book constitutes revised selected papers from the following SEFM 2012 satellite events: InSuEdu, the First International Symposium on Innovation and Sustainability in Education; MokMaSD, the First International Symposium on Modelling and Knowledge Management for Sustainable Development and Open Cert, the 6th International Workshop on Foundations and Techniques for Open Source Software Certification, held in Thessaloniki, Greece, in October 2012. The total of 14 regular papers and 7 short papers included in this volume were carefully reviewed and selected from 35 submissions. The papers cover the topics related to the use of Information and Communication Technology (ICT) and Open Source Software (OSS) as tools to foster and support Education, Innovation and Sustainability.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2011, held in Kaunas, Lithuania, in October 2011. The 25 revised papers presented were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: e-government and e-governance, e-services, digital goods and products, e-business process modeling and re-engineering, innovative e-business models and implementation, e-health and e-education, and innovative e-business models.
This book constitutes the refereed proceedings of the 7th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, SBP 2014, held in Washington, DC, USA, in April 2014. The 51 full papers presented were carefully reviewed and selected from 101 submissions. The SBP conference provides a forum for researchers and practitioners from academia, industry, and government agencies to exchange ideas on current challenges in social computing, behavioral-cultural modeling and prediction, and on state-of-the-art methods and best practices being adopted to tackle these challenges. The topical areas addressed by the papers are social and behavioral sciences, health sciences, military science, and information science.
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.
It is often argued that contemporary media homogenize our thoughts and actions, without us being fully aware of the restrictions they impose. But what if the problem is not that we are all synchronized to the same motions or moments, but rather dispersed into countless different emotional micro-experiences? What if the effect of so-called social media is to calibrate the interactive spectacle so that we never fully feel the same way as other potential allies at the same time? While one person is fuming about economic injustice or climate change denial, another is giggling at a cute cat video. And, two hours late, vice versa. The nebulous indignation which constitutes the very fuel of true social change can be redirected safely around the network, avoiding any dangerous surges of radical activity. In this short and provocative book, Dominic Pettman examines the deliberate deployment of what he calls 'hypermodulation,' as a key strategy encoded into the contemporary media environment. His account challenges the various narratives that portray social media as a sinister space of synchronized attention, in which we are busily clicking ourselves to death. This critical reflection on the unprecedented power of the Internet requires us to rethink the potential for infinite distraction that our latest technologies now allow.
A comprehensive look at the news landscape that positions digital as the new hope for mainstream media prestige The news media in the late twentieth century has become increasingly sensational and irrelevant to the lives of the American public. Network news shows frequently resemble entertainment programs, and major newspapers often fail to serve the interests of their communities. Young people in particular are casting aside newspapers and television news for computerized information and entertainment. In the wake of this shift, the convergence of digital technology, computing, and telecommunications has given rise to a new form of journalism: digital news. And That's The Way It Will Be argues convincingly that digital journalism has the potential to reverse the decline in prestige of the mainstream media. Focusing on the public's dissatisfaction with traditional communication sources, seasoned journalist Christopher Harper evaluates computers as a means of providing and receiving news and information. Harper profiles some of the key players in the world of digital journalism including Microsoft, America Online, The New York Times, The Chicago Tribune, and Time Warner. He assesses the impact of digital news in poor neighborhoods and the developing world and explores the issues of pornography, privacy, and government regulation of the Internet's news and information system. The volume closes with predictions about the future by presidents of communications organizations, computer experts, network news anchors, software developers, columnists, on-line editors, and Web designers. The first book to focus exclusively on the nature and future of journalism in an electronic age, And That's The Way It Will Be provides a comprehensive look at the emergence, challenges, and promise of digital news.
This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013. The 16 revised full papers and 4 short papers were thoroughly reviewed and selected from 57 submissions. The papers are structured in the following topical sections: new challenges, natural disasters, smart grids, threats and risk, and SCADA/ICS and sensors.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
This book constitutes the refereed proceedings of the European Conference on Information Literacy, ECIL 2013, held in Istanbul Turkey, in October 2013. The 73 revised full papers presented together with two keynotes, 9 invited papers and four doctoral papers were carefully reviewed and selected from 236 submissions. The papers are organized in topical sections on overview and research; policies and strategies; theoretical framework; related concepts; citizenship and digital divide; disadvantaged groups; information literacy for the workplace and daily life; information literacy in Europe; different approaches to information literacy; teaching and learning information literacy; information literacy instruction; assessment of information literacy; information literacy and K-12; information literacy and higher education; information literacy skills of LIS students; librarians, libraries and ethics.
This book constitutes the refereed proceedings of the workshops co-located with the 4th International Joint Conference on Ambient Intelligence, AmI 2013, held in Dublin, Ireland, in December 2013. The 33 revised full papers presented were carefully reviewed and selected from numerous submissions to the following workshops: 5th International Workshop on Intelligent Environments Supporting Healthcare and Well-being (WISHWell 13) 3d International workshop on Pervasive and Context-Aware Middleware (PerCAM 13), 2nd International Workshop on Adaptive Robotic Ecologies (ARE'13), International Workshop on Aesthetic Intelligence (AxI'13), First International Workshop on Uncertainty in Ambient Intelligence (UAmI13). The papers are organized in topical sections on intelligent environments supporting healthcare and well-being; adaptive robotic ecologies; uncertainty in ambient intelligence; aesthetic intelligence; pervasive and context-aware middleware."
The proposed book explores the theme of identity, specifically as applied to its role and development in virtual worlds. Following the introduction, it is divided into four sections: identities, avatars and the relationship between them; factors that support the development of identity in virtual worlds; managing multiple identities across different environments and creating an online identity for a physical world purpose.
This book constitutes the refereed proceedings of the 4th International Joint Conference an Ambient Intelligence, AmI 2013, held in Dublin, Ireland, in December 2013. The 15 revised full papers, 4 papers from the landscape track, 3 papers from the doctoral colloquium and 6 demo and poster papers were carefully reviewed and selected from numerous submissions and are presented with 6 workshop descriptions. The papers cover a variety of multi-disciplinary topics in computer science, human computer interaction, electrical engineering, industrial design, behavioral sciences, distributed devices, ubiquitous and communication technologies, pervasive computing, intelligent user interfaces and artificial intelligence.
Now in paperback for the first time, Social Movements and their Technologies explores the interplay between social movements and their 'liberated technologies'. It analyzes the rise of low-power radio stations and radical internet projects ('emancipatory communication practices') as a political subject, focusing on the sociological and cultural processes at play. It provides an overview of the relationship between social movements and technology, and investigates what is behind the communication infrastructure that made possible the main protest events of the past fifteen years. In doing so, Stefania Milan illustrates how contemporary social movements organize in order to create autonomous alternatives to communication systems and networks, and how they contribute to change the way people communicate in daily life, as well as try to change communication policy from the grassroots. She situates these efforts in a historical context in order to show the origins of contemporary communication activism, and its linkages to media reform campaigns and policy advocacy.
The newest communication technologies are profoundly changing the world's politics, economies, and cultures, but the specific implications of online game worlds remain mysterious. "The Virtual Future" employs theories and methods from social science to explore nine very different virtual futures: "The Matrix Online," "Tabula Rasa," "Anarchy Online," "Entropia Universe," "Star Trek Online," "EVE Online, Star Wars Galaxies," "World of Warcraft: Burning Crusade," and "The Chronicles of Riddick." Each presents a different picture of how technology and society could evolve in coming centuries, but one theme runs through all of them, the attempt to escape the Earth and seek new destinies among the stars. Four decades after the last trip to the moon, a new conception of spaceflight is emerging. Rather than rockets shooting humans across vast physical distances to sterile rocks that lack the resources to sustain life, perhaps robot space probes and orbiting telescopes will glean information about the universe, that humans can then experience inside computer-generated environments much closer to home. All nine of these fantastically rich multiplayer masterpieces have shown myriads of people that really radical alternatives to contemporary society could exist, and has served as a laboratory for examining the consequences. Each is a prototype of new social forms, a utopian subculture, and a simulation of technologies that have yet to be invented. They draw upon several different traditions of science fiction and academic philosophy, and they were created in several nations. By comparing these nine role-playing fantasies, we can better consider what kind of world we want to inhabit in the real future."
"Data Security Breaches and Privacy in Europe" aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling. |
You may like...
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,732
Discovery Miles 27 320
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,492
Discovery Miles 34 920
|