![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.
This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.
Modern society has been transformed by the digital convergence towards a future where technologies embed themselves into the fabric of everyday life. This ongoing merging of social and technological infrastructures provides and necessitates new possibilities to renovate past notions, models and methods of information systems development that accommodates humans as actors within the infrastructure. This shift introduces new possibilities for information systems designers to fulfil more and more everyday functions, and to enhance their value and worth to the user. Reframing Humans in Information Systems Development aims to reframe the phenomenon of human-centered development of information systems by connecting scientific constructs produced within the field of information systems which has recently provided a plethora of multidisciplinary user views, without explicitly defining clear constructs that serve the IS field in particular. IS researchers, practitioners and students would benefit from Reframing Humans in Information Systems Development as the book provides a comprehensive view to various human-centered development methods and approaches. The representatives of the fields of Human-Computer Interaction and Computer Supported Collaborative Work will also find this book an excellent resource. A theoretical handbook and collection of practical experiences, are included along with critical discussions of the utilization methods in ISD and their implications with some interconnecting commentary viewpoints.
This is the second of a two-volume set (CCIS 373 and CCIS 374) that constitutes the extended abstracts of the posters presented during the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA, in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The extended abstracts were carefully reviewed and selected for inclusion in this two-volume set. The papers included in this volume are organized in the following topical sections: learning and education; health and medicine; media, art and culture; transport; Web and social media; information search and retrieval; work, collaboration and creativity; text and storytelling; agents, avatars and robots; smart environments; virtual and mixed environments; security and privacy.
This book is a compilation of chapters written by leading researchers from all over the world. Those researchers' common characteristic is that they have investigated issues at the intersection of the elds of information systems (IS) and evoluti- ary psychology (EP). The main goal of this book is to serve as a reference for IS research building on EP concepts and theories (in short, IS-EP research). The book is organized in three main parts: Part I focuses on EP concepts and theories that can be used as a basis for IS-EP research; Part II provides several exemplars of IS-EP research in practice; and Part III summarizes emerging issues and debate that can inform IS-EP research, including debate regarding philosophical foundations and credibility of related ndings. IS-EP research is generally concerned with the use of concepts and theories from EP in the study of IS, particularly regarding the impact of modern information and communication technologies on the behavior of individuals, groups, and organi- tions. From a practitioners' perspective, the most immediate consumers of IS-EP research are those who develop and use IS, of which a large contingent are in bu- nesses that employ IS to support marketing, order-taking, production, and delivery of goods and services. In this context, IS-EP ndings may be particularly useful due to the present need to design web-based interfaces that will be used by in- viduals from different cultures, and often different countries, and whose common denominator is their human nature.
The inspiring idea of this workshop series, Artificial Intelligence Approaches to the Complexity of Legal Systems (AICOL), is to develop models of legal knowledge concerning organization, structure, and content in order to promote mutual understanding and communication between different systems and cultures. Complexity and complex systems describe recent developments in AI and law, legal theory, argumentation, the Semantic Web, and multi-agent systems. Multisystem and multilingual ontologies provide an important opportunity to integrate different trends of research in AI and law, including comparative legal studies. Complexity theory, graph theory, game theory, and any other contributions from the mathematical disciplines can help both to formalize the dynamics of legal systems and to capture relations among norms. Cognitive science can help the modeling of legal ontology by taking into account not only the formal features of law but also social behaviour, psychology, and cultural factors. This book is thus meant to support scholars in different areas of science in sharing knowledge and methodological approaches. This volume collects the contributions to the workshop's third edition, which took place as part of the 25th IVR congress of Philosophy of Law and Social Philosophy, held in Frankfurt, Germany, in August 2011. This volume comprises six main parts devoted to the each of the six topics addressed in the workshop, namely: models for the legal system ethics and the regulation of ICT, legal knowledge management, legal information for open access, software agent systems in the legal domain, as well as legal language and legal ontology.
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.
This book constitutes the refereed proceedings of the 4th International Conference on Human-Centered Software Engineering, HCSE 2012, held in Toulouse, France, in October 2012. The twelve full papers and fourteen short papers presented were carefully reviewed and selected from various submissions. The papers cover the following topics: user interface design, examining the relationship between software engineering and human-computer interaction and on how to strengthen user-centered design as an essential part of software engineering process.
This book presents the thoroughly refereed and revised post-workshop proceedings of the 17th Monterey Workshop, held in Oxford, UK, in March 2012. The workshop explored the challenges associated with the Development, Operation and Management of Large-Scale complex IT Systems. The 21 revised full papers presented were significantly extended and improved by the insights gained from the productive and lively discussions at the workshop, and the feedback from the post-workshop peer reviews.
This book constitutes the revised selected papers of the 4th International Provenance and Annotation Workshop, IPAW 2012, held in Santa Barbara, CA, USA, in June 2012. The 14 full papers, 4 demo papers and 12 poster papers presented were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on documents databases; the Web; reconstruction; science applications; and demonstrations.
This book constitutes the refereed proceedings of the 6th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2012, held in Vitoria-Gasteiz, Spain, in December 2012. The 70 research papers were carefully reviewed and selected from various submissions. The main focus of this book has been to explore how Ambient Intelligence can contribute towards smarter but still more sustainable environments. Beyond sustainable computing the proceedings also include research work describing progress on other key research topics for AmI such as human environment mobile-mediated (through NFC or AR) interaction, artificial intelligence techniques to foster user- and context-aware environment adaptation, future internet trends such as social networks analysis, linked data or crowd-sourcing applied to AmI, internet-connected object ecosystems collaborating to give place to smarter environments.
This book constitutes the refereed proceedings of the Joint Conference of the Interdisciplinary Research Group on Technology, Education, Communication, and the Scientific Network on Critical and Flexible Thinking, held in Ghent, Belgium, in October 2011. The 12 papers in this volume represent extended versions of the 20 papers presented at the conference and selected from numerous submissions. The conference brought together scholars and researchers who study the use of serious games in educational settings from different perspectives, such as instructional design, domain specific didactics, cognitive and computer science.
This account of the global switch to digital television, from its origins to its emerging outcomes, provides an understanding of how digital television is converging with the Internet. It pictures a future in which the democratic role of the media, freedom of expression and democratic participation can be enhanced.
This book constitutes the proceedings of the 10th German Conference on Multiagent System Technologies held in Trier Germany, in October 2012. The 7 revised full papers presented together with 6 short parers and one invited paper were carefully reviewed and selected from 39 submissions. The paper cover various research topics in intelligent agents and multi-agent-systems. In particular, the conference investigated technologies for truly open distributed systems covering a wide spectrum of approaches from self-organization and autonomous systems to agreement computing.
This book constitutes the joint thoroughly refereed post-proceedings of the Second International Workshop on Modeling Social Media, MSM 2011, held in Boston, MA, USA, in October 2011, and the Second International Workshop on Mining Ubiquitous and Social Environments, MUSE 2011, held in Athens, Greece, in September 2011. The 9 full papers included in the book are revised and significantly extended versions of papers submitted to the workshops. They cover a wide range of topics organized in three main themes: communities and networks in ubiquitous social media; mining approaches; and issues of user modeling, privacy and security.
This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.
This book constitutes the refereed proceedings of the third International Joint Conference an Ambient Intelligence, AmI 2012, held in Pisa, Italy, in November 2012. The 18 revised full papers and 5 short papers presented were carefully reviewed and selected from 47 (full papers) respectively 14 (short papers) submissions. From a scientific point of view, the papers make a multidisciplinary approach covering fields like computer science, human computer interaction, electrical engineering, industrial design, behavioral sciences, aimed at enriching physical environments with a network of distributed devices, such as sensors, actuators, and computational resources, in order to support users in their everyday activities. From a technological perspective the volume represents the convergence of recent achievements in ubiquitous and communication technologies, pervasive computing, intelligent user interfaces and artificial intelligence.
This book constitutes the refereed proceedings of the 11th IFIP WG 8.5 International Conference, EGOV 2012, held in Delft, The Netherlands, in September 2012. The 23 revised full papers presented were carefully reviewed and selected from more then 80 submissions. The papers are organized in topical sections on foundations; adoption and diffusion; open government and transformation; infrastructure and technology; evaluation; and citizen perspective, social inclusion, and social media.
This book constitutes the refereed proceedings of the 3rd International Conference on Serious Games Development and Applications, SGDA 2012, held in Bremen, Germany in September 2012. The 22 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover various topics on serious games including engineering, education, health care, military applications, game design, game study, game theories, virtual reality, 3D visualisation and medical applications of games technology.
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of robotics for rehabilitation and assistance; mechatronics and integration technology in electronics and information devices fabrication; man-machine interactions; manufacturing; micro and nano systems; mobile robots and intelligent autonomous systems; motion control; multi-agent systems and distributed control; and multi-sensor data fusion algorithms.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Energy Efficient Data Centers (E2DC 2012) held in Madrid, Spain, in May 2012. The 13 revised full papers presented were carefully selected from 32 submissions. The papers cover topics from information and communication technologies of green data centers to business models and GreenSLA solutions. The first section presents contributions in form of position and short papers, related to various European projects. The other two sections comprise papers with more in-depth technical details. The topics covered include energy-efficient data center management and service delivery as well as energy monitoring and optimization techniques for data centers.
In most scenarios of the future a personalized virtual butler appears. This butler not only performs communication and coordination tasks but also gives recommendations on how to handle everyday problems. The aim of this book is to explore the prerequisites of such a personalized virtual butler by asking: what is known about the capacities and the needs of aging people; which information and communication technologies have been used in assisting/conversing with persons, especially older ones, and what were the results; what are the advantages/disadvantages of virtual butlers as mainly software programs compared robots as butlers; and which methods, especially in artificial intelligence, have to be developed further and in which direction in order to create a virtual butler in the foreseeable future?
This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.
This book constitutes the refereed proceedings of the Fourth IFIP WG 8.5 International Conference, ePart 2012, held in Kristiansand, Norway, in September 2012. The 14 revised full papers presented were carefully reviewed and selected from numerous submissions. This volume includes complete research work organised in five groups as follows: * Keynote Speech * Reviews * Policy Consultations * Case Studies * Techniques and Analysis. |
![]() ![]() You may like...
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,952
Discovery Miles 29 520
Handbook of Research on Cultural and…
P.E. Thomas, M. Srihari, …
Hardcover
R8,866
Discovery Miles 88 660
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,780
Discovery Miles 37 800
|