![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.
Dave Oliver, Celia Romm and Fay Sudweeks This book follows previous texts: Celia Romm and Fay Sudweeks (eds) (1998), Doing Business Electronically: A Global Perspective of Electronic Commerce, and Fay Sudweeks and Celia Romm (eds) (1999) Doing Business on the Internet: Opportunities and Pitfalls. Not only is this current book about doing something, but it also aims to present insights into how electronic commerce impacts upon the lives of everyday people; in other words, how electronic commerce is received, as well as how it is 'done'. Accessing the Internet on a regular basis has become an established activity for many people. This activity gives academics and researchers the opportunity to observe and study the nature and effects of this engagement in society. The influence of the Internet in our social fabric also provides the incentive for organizations to implement a web presence. As expressed in the title Self-Service on the Internet: Expectations and Experiences, we aim to present the expectations or reasons for the availability of various services on the Internet, and social responses to these developments, i. e. the experiences. These are the two main dimensions to the chapters presented in this book. The major component in the title is self-service on the Internet. The term electronic commerce is too restrictive for our purpose as it tends towards commercial overtones, which do not especially concern us.
Everyday Innovators explores the active role of people, collectively and individually, in shaping the use of information and communication technologies. It examines issues around acquiring and using that knowledge of users, how we should conceptualise the role of users and understand the forms and limitations of their participation.
This book enables a cross-fertilisation of perspectives from different disciplines and aims to provide new insights into the role of users, drawing out both applied and theoretical implications"
Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." -V. Reding, Commissioner, Responsible for Information Society and Media (EU)
This book constitutes the refereed proceedings of the 8th International Conference on Human Choice and Computers (HCC8), IFIP TC9, held in Pretoria, South Africa on September 25-26, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
Knowledge management (KM) is more a nd more recognized as a key factor of success for organisations: not only stru ctured companies, but also virtual enterprises, networks of organisations or ev en virtual communities. These organisations of differentki nds, are becoming increasingly aware of the need to collect, organise, mobilise, increase, in sum manage, the knowledge characterising their ability to stay alive, adapt and evolve in a turbulent context. Through various organisationaland t echnological approaches, KM aims at improving knowledge access, sharing and reuse as well as new knowledge creation. KMIA 2008 highlights problems, requirements and solutions that are derived from actual, concrete experiences. The fourteen papers accepted at KMIA 2008 give various answers to the following questions: What organisational strategies can enable to enact and promote KM within organisations? How to link these organisational strategies withth e ICT technology? Organisational strategies can be related to the evolution of the organisation itself or to its environment: intra organisational and inter organisational strategies can thus bedi stinguished. Some papers emphasize the importance of collaboration and knowledge transfer for team work and collaborative projects that may be intra organisational or inter organisational (e.g. intero rganisational outsourcing relationships). Strategies for designing and manufacturing innovative products are recognised as crucial for enterprises that operate in competitive sectors. Networkso forg anisations can help to improve the competitiveness of these organisations: KM can thus enhance competency management in such networks and help an organisation to find relevant costumers, suppliers, or cooperation partners.
Computer systems can only deliver benefits if functionality, users and usability are central to their design and deployment. This book encapsulates work done in the DIRC project (Interdisciplinary Research Collaboration in Dependability), bringing together a range of disciplinary approaches - computer science, sociology and software engineering - to produce a socio-technical systems perspective on the issues surrounding trust in technology in complex settings.
Not long ago, projections of how office technologies would revolutionize the production of documents in a high-tech future carriedmany promises. The paper less office and the seamless and problem-free sharing of texts and other work materials among co-workers werejust around the corner, we were told. To anyone who has been involved in putting together a volume of the present kind, such forecasts will be met with considerable skepticism, if not outright distrust. The diskette, the email, the fax, the net, and all the other forms of communication that are now around are powerful assets, but they do not in any way reduce the flow of paper or the complexity of coordinating activities involved in producing an artifact such as a book. Instead, the reverse seems to be true. Obviously, the use of such tools requires considerable skill at the center of coordination, to borrow an expression from a chapter in this volume. As editors, we have been fortunate to have Ms. Lotta Strand, Linkoping University, at the center of the distributed activity that producing this volume has required over the last few years. With her considerable skill and patience, Ms. Strand and her work provide a powerful illustration of the main thrust of most of the chapters in this volume: Practice is a coordination of thinking and action, and many things had to be kept in mind during the production of this volume."
The perspectives and techniques used in human-computer interaction design, practice and research are broadening. This book looks at emerging approaches which are likely to contribute to the discipline in near future. The underlying idea is that human character rather than technology should determine the nature of interaction. The concept of "interaction design" covers this range of concerns relevant to enabling quality design. Each chapter emphasizes alternative perspectives on interaction and new concepts to help researchers and practitioners relate to alternative design approaches and opportunities. This second volume provides a wider perspective, from both a scientific and geographic outlook. New topics, such as psychological design processes, gerotechnology, modelling, e-learning and subconscious experiences are discussed from a team of international authors. This book will be of considerable value to those seeking innovative perspectives upon designing and ensuring effective interaction between humans and technology.
Cultural history enthusiasts have asserted the urgent need to protect digital information from imminent loss. This book describes methodology for long-term preservation of all kinds of digital documents. It justifies this methodology using 20th century theory of knowledge communication, and outlines the requirements and architecture for the software needed. The author emphasizes attention to the perspectives and the needs of end users.
The setting for this book is the networked community. The treatment of the subject matter is broad and interdisciplinary, with contributions from computer science, sociology, design, human factors and communication technology. The chapter contributors, drawn from across Europe and North America, offer a varied
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users' virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users' concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.
It is a great pleasure to share with you the Springer CCIS 111 proceedings of the Third World Summit on the Knowledge Society--WSKS 2010--that was organized by the International Scientific Council for the Knowledge Society, and supported by the Open Research Society, NGO, (http://www.open-knowledge-society.org) and the Int- national Journal of the Knowledge Society Research, (http://www.igi-global.com/ijksr), and took place in Aquis Corfu Holiday Palace Hotel, on Corfu island, Greece, September 22-24, 2010. The Third World Summit on the Knowledge Society (WSKS 2010) was an inter- tional scientific event devoted to promoting the dialogue on the main aspects of the knowledge society towards a better world for all. The multidimensional economic and social crisis of the last couple years brings to the fore the need to discuss in depth new policies and strategies for a human-centric developmental process in the global c- text. This annual summit brings together key stakeholders of knowledge society dev- opment worldwide, from academia, industry, government, policy makers, and active citizens to look at the impact and prospects of it information technology, and the knowledge-based era it is creating, on key facets of living, working, learning, innovating, and collaborating in today's hyper-complex world.
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: "There must exist better solutions. " I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ], whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security, privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ] supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own."
This book has evolved out of roughly ve years of working on computing with social trust. In the beginning, getting people to accept that social networks and the relationships in them could be the basis for interesting, relevant, and exciting c- puter science was a struggle. Today, social networking and social computing have become hot topics, and those of us doing research in this space are nally nding a wealth of opportunities to share our work and to collaborate with others. This book is a collection of chapters that cover all the major areas of research in this space. I hope it will serve as a guide to students and researchers who want a strong introduction to work in the eld, and as encouragement and direction for those who are considering bringing their own techniques to bear on some of these problems. It has been an honor and privilege to work with these authors for whom I have so much respect and admiration. Thanks to all of them for their outstanding work, which speaks for itself, and for patiently enduringall my emails. Thanks, as always, to Jim Hendler for his constant support. Cai Ziegler has been particularly helpful, both as a collaborator, and in the early stages of development for this book. My appreciation also goes to Beverley Ford, Rebecca Mowat and everyone at Springer who helped with publication of this work.
Mobile communications and ubiquitous computing generate large volumes of data. Mining this data can produce useful knowledge, yet individual privacy is at risk. This book investigates the various scientific and technological issues of mobility data, open problems, and roadmap. The editors manage a research project called GeoPKDD, Geographic Privacy-Aware Knowledge Discovery and Delivery, and this book relates their findings in 13 chapters covering all related subjects.
This book summarizes highlights of the investigation of "An Elucidation of the Role of Institutional Systems in Characterizing Technology Development Trajectories - A Global Comparative Analysis of Manufacturing Technology and Information Te- nology in the Enhancement of Business Practice" supported by Grant-in-Aid for Scienti?c Research (S) by Japan's Ministry of Education, Culture, Sports, Science and Technology/Japan Society for Science Policy over the period 2002-2006. Background and objectives of the investigation are summarized as follows: (a) Japan ranks far below the level of the USA with respect to the development and utilization of information technology (IT) in the information society that emerged in the 1990s. (b) This can be attributed toa vicious cycle between Japan's non-elastic institutions, insuf?cient utilization of the potential bene?ts of IT, and economic stagnation. (c) The source of such a vicious cycle can be derived from the fundamental d- ferences of the characterizing process of technology between manufacturing technology (MT) and IT during their diffusion processes. This investigation - tempted to elucidate this mechanism. Noteworthy ?ndings obtained include: (a) MT has been developed largely by the supply side and its functionality is - tablished during the stage of its supply to the market. In contrast, IT is strongly driven by the demand side and its functionality is created through diffusion in a self-propagating way. This contrast can be clearly observed in the dramatic advancement of Japan's mobile phone industry in the late 1990s.
Mobile phones are the most ubiquitous communications technology in the world. Besides transforming the way in which we communicate, they can also be used as a powerful tool for conflict prevention and management. This book presents innovative uses of mobile technologies in the areas of early warning, disaster and humanitarian relief, governance, citizens' participation, etc. and cuts across different regions. The book brings together experts and practitioners from different fields-mobile technologies, information systems, computer sciences, online dispute resolution, law, etc.-to reflect on present experiences and to explore new areas for research on conflict management and online dispute resolution (ODR). It also reflects on the transition from present ODR to future mobile Dispute Resolution and discusses key privacy issues. The book is addressed to anyone involved in conflict prevention and dispute management aiming to learn how mobile technologies can play a disruptive role in the way we deal with conflict.
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
Big data, surveillance, crisis management. Three largely different and richly researched fields, however, the interplay amongst these three domains is rarely addressed. In this enlightening title, the link between these three fields is explored in a consequential order through a variety of contributions and series of unique and international case studies. Indeed, whilst considering crisis management as an "umbrella term" that covers a number of crises and ways of managing them, the reader will also explore the collection of "big data" by governmental crisis organisations. However, this volume also addresses the unintended consequences of using such data. In particular, through the lens of surveillance, one will also investigate how the use and abuse of big data can easily lead to monitoring and controlling the behaviour of people affected by crises. Thus, the reader will ultimately join the authors in their debate of how big data in crisis management needs to be examined as a political process involving questions of power and transparency. An enlightening and highly topical volume, Big Data, Surveillance and Crisis Management will appeal to postgraduate students and postdoctoral researchers interested in fields including Sociology and Surveillance Studies, Disaster and Crisis Management, Media Studies, Governmentality, Organisation Theory and Information Society Studies.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of Web 2.0, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology).
Welcome to the Proceedings of ICCHP 2010! We were proud to welcome participants from more than 40 countries from all over the world to this year's ICCHP. Since the late 1980s, it has been ICCHP's mission to support and reflect development in the field of "Assistive Technologies," eAccessibility and eInclusion. With a focus on scientific quality, ICCHP has become an important reference in our field. The 2010 conference and this collection of papers once again fulfilled this mission. The International Programme Committee, comprising 106 experts from all over the world, selected 147 full and 44 short papers out of 328 abstracts submitted to ICCHP. This acceptance ratio of about half of the submissions demonstrates our strict pursuit of scientific quality both of the programme and in particular of the proceedings in your hands. An impressive number of experts agreed to organize "Special Thematic Sessions" (STS) for ICCHP 2010. These STS help to bring the meeting into sharper focus in several key areas. In turn, this deeper level of focus helps to collate a state of the art and mainstream technical, social, cultural and political developments.
Advice involves recommendations on what to think; through thought, on what to choose; and via choices, on how to act. Advice is information that moves by communication, from advisors to the recipient of advice. Ivan Jureta offers a general way to analyze advice. The analysis applies regardless of what the advice is about and from whom it comes or to whom it needs to be given, and it concentrates on the production and consumption of advice independent of the field of application. It is made up of two intertwined parts, a conceptual analysis and an analysis of the rationale of advice. He premises that giving advice is a design problem and he treats advice as an artifact designed and used to influence decisions. What is unusual is the theoretical backdrop against which the author's discussions are set: ontology engineering, conceptual analysis, and artificial intelligence. While classical decision theory would be expected to play a key role, this is not the case here for one principal reason: the difficulty of having relevant numerical, quantitative estimates of probability and utility in most practical situations. Instead conceptual models and mathematical logic are the author's tools of choice. The book is primarily intended for graduate students and researchers of management science. They are offered a general method of analysis that applies to giving and receiving advice when the decision problems are not well structured, and when there is imprecise, unclear, incomplete, or conflicting qualitative information. |
![]() ![]() You may like...
Machines, Computations, and Universality…
Jerome Durand-Lose, Sergey Verlan
Paperback
R2,072
Discovery Miles 20 720
5G+ - How 5G Change the Society
Zhengmao Li, Xiaoyun Wang, …
Hardcover
R5,239
Discovery Miles 52 390
The Routledge Handbook of Plurilingual…
Enrica Piccardo, Aline Germain-Rutherford, …
Hardcover
R6,584
Discovery Miles 65 840
The Ceramic Process - A Manual and…
European Ceramic Work Centre, Anton Reijnders
Hardcover
R1,289
Discovery Miles 12 890
STEM Research for Students Volume 2…
Julia H Cothron, Ronald N Giese, …
Hardcover
R2,883
Discovery Miles 28 830
|