Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
This book constitutes the refereed proceedings of the 8th
International Conference on Haptic and Audio Interaction Design,
HAID 2013, held in Daejeon, Korea, in April 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.
This book constitutes the refereed proceedings of the 14th International Conference on Product-Focused Software Process Improvement, PROFES 2013, held in Paphos, Cyprus, in June 2013. The 22 revised full papers presented together with 10 short papers and 2 tutorial papers were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on empirical software engineering, software process improvement, managing software processes, software measurement, decision support in software engineering, safety-critical software engineering, and software maintenance.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.
This book constitutes the refereed proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2013, held in Toulouse, France, in September 2013. The 20 revised full papers presented together with 5 practical experience reports were carefully reviewed and selected from more than 88 submissions. The papers are organized in topical sections on safety requirements and assurance, testing and verification, security, software reliability assessment, practical experience reports and tools, safety assurance in automotive, error control codes, dependable user interfaces, and hazard and failure mode analysis.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
This book contains the refereed proceedings of the 4th Scandinavian Conference on Information Systems (SCIS), held in Oslo, Norway, in August 2013. Participants were invited to discuss experiences of "digital living" within a multitude of empirical settings, covering questions like e.g. "how do people relate to each other when interaction is mediated through social networks?" or "what are the societal effects of ICT becoming ubiquitous in everyday situations?". The 6 papers accepted for presentation at the conference were selected from 18 submissions and address "digital living" from different perspectives.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2013, held in Beijing, China, in August 2013 in conjunction with the International Joint Conference on Artificial Intelligence (IJCAI 2013). The 4 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on information sharing and data/text mining; terrorism informatics; network-based data analytics; and information access and security.
The three-volume set LNCS 8009-8011 constitutes the refereed proceedings of the 7th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 230 contributions included in the UAHCI proceedings were carefully reviewed and selected for inclusion in this three-volume set. The 74 papers included in this volume are organized in the following topical sections: design for all methods, techniques and tools; eInclusion practice; universal access to the built environment; multi-sensory and multimodal interfaces; brain-computer interfaces.
The five-volume set LNCS 8004--8008 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. This volume contains papers in the thematic area of human-computer Interaction, addressing the following major topics: HCI in healthcare; games and gamification; HCI in learning and education; in-vehicle Interaction.
This is the second part of the two-volume set (LNCS 8023-8024) that constitutes the refereed proceedings of the 5th International Conference on Cross-Cultural Design, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. This two-volume set contains 113 papers. The papers in this volume focus on the following topics: cultural issues in business and industry; culture, health and quality of life; cross-cultural and intercultural collaboration; culture and the smart city; cultural differences on the Web.
This book constitutes the refereed proceedings of the 5th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2013, held in Koblenz, Germany, in September 2013. The 13 revised full papers presented were carefully reviewed and selected from 30 submissions. The papers cover a wide range of research in both social and technological scientific domains, seeking to demonstrate new theories, concepts, methods and styles of eParticipation with the support of innovative ICT. They have been organized in the following topical sections: research directions, social media and eParticipation, and online deliberation.
Mobile phones are the most ubiquitous communications technology in the world. Besides transforming the way in which we communicate, they can also be used as a powerful tool for conflict prevention and management. This book presents innovative uses of mobile technologies in the areas of early warning, disaster and humanitarian relief, governance, citizens' participation, etc. and cuts across different regions. The book brings together experts and practitioners from different fields-mobile technologies, information systems, computer sciences, online dispute resolution, law, etc.-to reflect on present experiences and to explore new areas for research on conflict management and online dispute resolution (ODR). It also reflects on the transition from present ODR to future mobile Dispute Resolution and discusses key privacy issues. The book is addressed to anyone involved in conflict prevention and dispute management aiming to learn how mobile technologies can play a disruptive role in the way we deal with conflict.
We are told that the future of work will be increasingly automated. Algorithms, processing massive amounts of information at startling speed, will lead us to a new world of effortless labour and a post-work utopia of ever expanding leisure. But behind the gleaming surface stands millions of workers, often in the Global South, manually processing data for a pittance. Recent years have seen a boom in online crowdworking platforms like Amazon's Mechanical Turk and Clickworker, and these have become an increasingly important source of work for millions of people. And it is these badly paid tasks, not algorithms, that make our digital lives possible. Used to process data for everything from the mechanics of self-driving cars to Google image search, this is an increasingly powerful part of the new digital economy, although one hidden and rarely spoken of. But what happens to work when it makes itself obsolete. In this stimulating work that blends political economy, studies of contemporary work, and speculations on the future of capitalism, Phil Jones looks at what this often murky and hidden form of labour looks like, and what it says about the state of global capitalism.
Transformations in wireless connectivity and location-aware technologies hold the promise of bringing a sea-change in the way transportation information is generated and used in the future. Sensors in the transportation system, when integrated with those in other sectors (for example, energy, utility and health) have the potential to foster novel new ways of improving livability and sustainability. The end-result of these developments has been somewhat contradictory. Although automation in the transportation environment has become increasingly widespread, the level of involvement and active participation by people, in terms of co-creation and contribution of information, has also increased. As a result, the following two major trends have been observed: (1) increases in Machine-to- Machine (M2M) communications; and (2) increases in the variety and volume of User-Generated Content. In this transportation paradigm, the pervasive use of Information and Communication Technologies will serve as the foundation for mobility intelligence towards an "ubiquitous information-centered mobility environment". However, many technical and operational questions, as well as social, management and legal challenges present themselves in the transformation to this vision. The book presents a non-technical review of research and initiatives and a discussion of such opportunities and challenges.
This is the first of a two-volume set (CCIS 373 and CCIS 374) that constitutes the extended abstracts of the posters presented during the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA, in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The extended abstracts were carefully reviewed and selected for inclusion in this two-volume set. The papers included in this volume are organized in the following topical sections: HCI design approaches, methods and techniques; usability methods, techniques and studies; universal access and eInclusion; multimodal and ambient interaction; cognitive and psychological aspects of interaction; perception and interaction; ergonomic and human modelling issues; capturing gaze, biosignals and brainwaves; development environments; product design, marketing and advertisement.
This book constitutes the refereed proceedings of the 13th
International Symposium on Privacy Enhancing Technologies, PET
2013, held in Bloomington, IN, USA, in July 2013.
Teletechnologies, or technologies of distance, cannot be ignored. Indeed, the present electronic age is said to have wrought profound changes to how we think about and experience who we are, where we are, and how we relate with one another. Place and community have traditionally formed key concepts for thinking about these issues, but what relevance do these concepts now hold for us? In this wide-ranging study, Wilken re-evaluates how ideas of place and community intersect with and help us make sense of a world transformed by information and communication technologies. This interdisciplinary investigation ranges across diverse textual and contextual terrain, exploring approaches from media and communications, architectural history and theory, philosophy, sociology, geography, literature, and urban design. The rich analysis of these myriad texts reveals the complex and at times contradictory ways in which notions of place and community circulate in relation to these technologies of distance. Wilken's examination underscores both the enduring importance of ideas of place and community in the present age, and the urgent need to continue to engage with, think about and reconfigure these twin ideas.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.
The four-volume set LNCS 8012, 8013, 8014 and 8015 constitutes the proceedings of the Second International Conference on Design, User Experience, and Usability, DUXU 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 282 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in this four-volume set. The 67 papers included in this volume are organized in topical sections on design philosophy, usability methods and tools, and design processes, methods and tools.
This book constitutes the refereed proceedings of the Fourth International Symposium on End-User Development, IS-EUD 2013, held in Copenhagen, Denmark, in June 2013. The 13 full papers (45% acceptance rate) and 11 short papers (50% acceptance rate) have been presented at the event. In addition the volume contains two keynote speeches, three doctoral consortia papers, and information on 2 workshops. The papers provide a broad overview of the current state of End-User Development research.
Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary ethical debates. The Cambridge Handbook of Information and Computer Ethics, first published in 2010, provides an ambitious and authoritative introduction to the field, with discussions of a range of topics including privacy, ownership, freedom of speech, responsibility, technological determinism, the digital divide, cyber warfare, and online pornography. It offers an accessible and thoughtful survey of the transformations brought about by ICTs and their implications for the future of human life and society, for the evaluation of behaviour, and for the evolution of moral values and rights. It will be a valuable book for all who are interested in the ethical aspects of the information society in which we live.
This book constitutes the thoroughly refereed proceedings of the Second International Conference, GreeNets 2012, held in Gaudia, Spain, in October 2012. The 11 revised full papers presented were carefully selected and reviewed. These papers represent 23.68% of the submissions and cover topics such as communications and networking, energy-efficient network architecture and protocols, systems and technologies, and energy-efficient management.
This is the second of a two-volume set (CCIS 373 and CCIS 374) that constitutes the extended abstracts of the posters presented during the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA, in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The extended abstracts were carefully reviewed and selected for inclusion in this two-volume set. The papers included in this volume are organized in the following topical sections: learning and education; health and medicine; media, art and culture; transport; Web and social media; information search and retrieval; work, collaboration and creativity; text and storytelling; agents, avatars and robots; smart environments; virtual and mixed environments; security and privacy. |
You may like...
Loss - Poems To Better Weather The Many…
Donna Ashworth
Hardcover
(1)
|