![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. The papers are organized in topical sections on tools, risk analysis, testing, quantitative analysis, security, formal methods, aeronautic, automotive, and process. Also included are 4 case studies.
This book constitutes the refereed proceedings of the 11th IFIP WG 8.5 International Conference, EGOV 2012, held in Delft, The Netherlands, in September 2012. The 23 revised full papers presented were carefully reviewed and selected from more then 80 submissions. The papers are organized in topical sections on foundations; adoption and diffusion; open government and transformation; infrastructure and technology; evaluation; and citizen perspective, social inclusion, and social media.
This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012. The 21 revised full papers presented together with 3 short papers and 4 workshop and tutorial papers were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on process focused software process improvement, open-source agile and lean practices, product and process measurements and estimation, distributed and global software development, quality assessment, and empirical studies.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 16th issue of the Transactions on Computational Science journal contains 11 extended versions of selected papers from Cyberworlds 2011, held in Banff, AB, Canada, in October 2011. The topics span the areas of haptic modeling, shared virtual worlds, virtual reality, human-computer interfaces, e-learning in virtual collaborative spaces, multi-user web games, cybersecurity, social networking, and art and heritage in cyberspaces.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011. The 48 papers and 3 keynotes presented in this volume were carefully reviewed and selected from 88 submissions. The papers cover a wide range of topics including social network analysis; modeling; machine learning and data mining; social behaviors; public health; cultural aspects; and effects and search.
This book constitutes the refereed proceedings of the 3 rd International ICST Conference on IT Revolutions, held in Cordoba, Spain in March 2011. The 20 revised full papers presented were carefully reviewed and selected from numerous submissions. They are grouped in topical sections on eGreen energy, smart buildings, health and ambient assisted living, smart environments and user experience, grid and cloud computing, eLearning.
Information behavior has emerged as an important aspect of human life, however our knowledge and understanding of it is incomplete and underdeveloped scientifically. Research on the topic is largely contemporary in focus and has generally not incorporated results from other disciplines. In this monograph Spink provides a new understanding of information behavior by incorporating related findings, theories and models from social sciences, psychology and cognition. In her presentation, she argues that information behavior is an important instinctive sociocognitive ability that can only be fully understood with a highly interdisciplinary approach. The leitmotivs of her examination are three important research questions: First, what is the evolutionary, biological and developmental nature of information behavior? Second, what is the role of instinct versus environment in shaping information behavior? And, third, how have information behavior capabilities evolved and developed over time? Written for researchers in information science as well as social and cognitive sciences, Spink's controversial text lays the foundation for a new interdisciplinary theoretical perspective on information behavior that will not only provide a more holistic framework for this field but will also impact those sciences, and thus also open up many new research directions.
We are very pleased to introduce Open Source Development, Communities and Quality. The International Conference on Open Source Systems has come to its fourth edition - OSS 2008. Now, Free, Libre, and Open Source software is by all means now one of the most relevant subjects of study in several disciplines, ranging from information technology to social sciences and including also law, business, and political sciences. There are several conference tracks devoted to open source software with several publications appearing in high quality journals and magazines. OSS 2008 has been organized with the purpose of being the reference venue for those working in this area, being the most prominent conference in this area. For this th reason OSS 2008 has been located within the frameworks of the 20 World Computer Congress, WCC 2008, in Milan, the largest event of IFIP in 2008. We believe that this conference series, and the IFIP working group it represents, can play an important role in meeting these challenges, and hope that this book will become a valuable contribution to the open source body of research.
This book constitutes the refereed proceedings of the 7th International Conference on Theory and Application of Diagrams, Diagrams 2012, held in Canaterbury, UK, in July 2012. The 16 long papers, 6 short papers and 21 poster abstracts presented were carefully reviewed and selected from 83 submissions. The papers are organized in keynotes, tutorial, workshops, graduate student symposium and topical sections on psychological and cognitive issues, diagram layout, diagrams and data analysis, Venn and Euler diagrams, reasoning with diagrams, investigating aesthetics, applications of diagrams.
Online communities are among the most obvious manifestations of social networks based on new media technology. Facilitating ad-hoc communication and leveraging collective intelligence by matching similar or related users have become important success factors in almost every successful business plan. Researchers are just beginning to understand virtual communities and collaborations among participants currently proliferating across the world. Virtual Communities, Social Networks and Collaboration covers cutting edge research topics of utmost real-world importance in the specific domain of social networks. This volume focuses on exploring issues relating to the design, development, and outcomes from electronic groups and online communities, including: - The implications of social networking, - Understanding of how and why knowledge is shared among participants, - What leads to participation, effective collaboration, co-creation and innovation, - How organizations can better utilize the potential benefits of communities in both internal operations, marketing, and new product development.
Back in 1983 I was chatting with Dick Coleman, publisher of Traffic World magazine, when he unexpectedly proposed that I write a column for the magazine on computer applications in the transportation/physical distribution industry. "But, Dick, I don't know all that much about computers," I protested. "You use one, don't you?" he asked logically. Yes, I did; I'd been running my consulting business with it for two years. But that didn't, I explained, make me an expert. "Think about it," he said. That's typical Coleman; he drops these studiedly casual ideas and just lets them lay there until you pick them up and wind up doing just what he wanted you to do all along. Sure enough, the longer I pondered the notion the more it appealed to me. OK, I wasn't a computer expert (I'm still not). But I was a computer user, in the transportation/distribution field; maybe from that perspective I might have some useful things to say to other transportation/distribution users and would-be users of computers. Thus was born the "Computer Software for Transportation" column. The first one appeared in the April 11, 1983, issue of Traffic World, and it's been a once-a-month schedule ever since. And thus, too, was ultimately born this book.
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011. The 20 revised full papers presented along with 8 short papers were carefully reviewed and selected from numerous submissions in total and cover a wide range of topics including social media analysis, knowledge integration and EPR, personalisation and patient support systems, early warning systems and mobile monitoring, games and learning, security, privacy and prevention, online support for professionals and patients, agents in eHealth, online communities of practice, eHealth solutions, social media surveillance, and communication and data integration.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011. The 46 papers included in the third volume are organized in topical sections on novel user interfaces and interaction techniques, paper 2.0, recommender systems, social media and privacy, social networks, sound and smell, touch interfaces, tabletops, ubiquitous and context-aware computing, UI modeling, and usability.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
This book presents the proceedings of the Working Conference on the societal and organizational implications for information systems of social inclusion. The contributed papers explore technology design and use in organizations, and consider the processes that engender social exclusion along with the issues that derive from it. The conference, sponsored by the International Federation for Information Processing Working Group 8.2, was held in Limerick, Ireland, in July, 2006.
Governments, the media, the information technology industry and scientists publicly argue that information and communication technologies (ICT) will bring about an inevitable transition from "industrial" to "information" or "knowledge-based" economies and societies. It is assumed that all aspects of our economic and social lives, in both the public and private spheres, will be radically different from what they are today. The World Summit on the Information Society (Geneva 2003 - Tunis 2005) shows the importance of a worldwide reflection on those topics. Perspectives and Policies on ICT in Society explores the ICT policies of different nations and regions such as Africa, China, Europe, and India. The authors assess the arguments surrounding the impending new age, as well as some of the more sensitive issues of its developments. This progress will signal an expansion of ICT in many domains - the so-called ubiquity - such as in the workplace, the home, government, and education and it will affect privacy and professional ethics. The expansion will also encompass all parts of the earth, particularly developing countries. Such growth must take place in the context of historical dimensions and should underscore the accountability of professionals in the field. The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. Thirty authors from twelve countries consider the ICT policies with their associated perspectives and they explore what may be the information age and the digital society of tomorrow. The book provides reflection on today's complex society and addresses the uncertain developments rising from an increasingly global and technologically connected world. Jacques Berleur is at the University of Namur, Belgium, and Chrisanthi Avgerou at the London School of Economics, United Kingdom.
This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization, to explore and understand the shifting boundaries and dependencies between organizational activities and their computer support. The book marks the result of the IFIP WG 8. 2 conference on "Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges. " Since its inception in the late 1970s, IFIP WG 8. 2 has sought to understand how computer-based information systems interact and must be designed as an integrated part of the organizational design. At that time, information systems handled repetitive and remote back-office functions and the main concern was work task design for repetitive input tasks and the potential impact of improved information support on organizational decision-making and structure. The focus of the information system design shifted in the 1980s when computers became part of the furniture and moved into the office. Reflecting this significant change, IFIP WG 8. 2 in 1989 organized a conference dedicated to the design and impact of desktop technology in order to examine how organizational processes and the locus of action changed when the computer was moved into the office. Sixteen years later, we are experiencing another significant change. Computers are now becoming part of our body and sensory system and will move out of the traditional office locations and into the wilderness. Again, IFIP WG 8.
As we approach the beginning of the 21 st century, we are beginning to see the emer gence of knowledge management as a natural evolution of the focus and importance of quality in the 1980s and reengineering in the I 990s. Quality placed a huge em phasis on getting all employees to use their brainpower better. Reengineering em phasized the use of technology to streamline business processes and take out costs. With the lessons of quality and reengineering firmly embedded in our everyday op erations (continual cost containment and higher quality is a way of life), businesses are now turning their attention to growth. Growth is a common pursuit. Customers are calling for it. Financial markets are calling for it. Employees are asking for it because they want an exciting and stimu lating environment in which to work. If a business doesn't grow, it will eventually die because knowledge workers ofthe 21 st century won't want to work with or for a business that's not growing. Skilled workers have plenty of options to choose from as demand for knowledge workers escalates around the world."
Web search engines are not just indispensable tools for finding and accessing information online, but have become a defining component of the human condition and can be conceptualized as a complex behavior embedded within an individual's everyday social, cultural, political, and information-seeking activities. This book investigates Web search from the non-technical perspective, bringing together chapters that represent a range of multidisciplinary theories, models, and ideas.
ED-L2L, Learning to Live in the Knowledge Society, is one of the co-located conferences of the 20th World Computer Congress (WCC2008). The event is organized under the auspices of IFIP (International Federation for Information Processing) and is to be held in Milan from 7th to 10th September 2008. ED-L2L is devoted to themes related to ICT for education in the knowledge society. It provides an international forum for professionals from all continents to discuss research and practice in ICT and education. The event brings together educators, researchers, policy makers, curriculum designers, teacher educators, members of academia, teachers and content producers. ED-L2L is organised by the IFIP Technical Committee 3, Education, with the support of the Institute for Educational Technology, part of the National Research Council of Italy. The Institute is devoted to the study of educational innovation brought about through the use of ICT. Submissions to ED-L2L are published in this conference book. The published papers are devoted to the published conference themes: Developing digital literacy for the knowledge society: information problem solving, creating, capturing and transferring knowledge, commitment to lifelong learning Teaching and learning in the knowledge society, playful and fun learning at home and in the school New models, processes and systems for formal and informal learning environments and organisations Developing a collective intelligence, learning together and sharing knowledge ICT issues in education - ethics, equality, inclusion and parental role Educating ICT professionals for the global knowledge society Managing the transition to the knowledge society
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software. The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management. |
You may like...
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R4,152
Discovery Miles 41 520
Ethical Practice of Statistics and Data…
Rochelle Tractenberg
Hardcover
R2,402
Discovery Miles 24 020
Global Health Informatics - How…
Heimar Marin, Eduardo Massad, …
Paperback
R1,872
Discovery Miles 18 720
|