Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains three full-paper length invited papers and 7 corrected and extended papers from the First International Workshop on Smart Grid Security, SmartGridSec 2012, which brought together researchers from different communities from academia and industry in the area of securing the Future Smart Grid and was held in Berlin, Germany, on December 3, 2012.
In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.
This book constitutes the refereed proceedings of the Workshops which complemented the 11th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2013, held in Salamanca, Spain, in May 2013. This volume presents the papers that have been accepted for the workshops: Workshop on Agent-based Approaches for the Transportation Modeling and Optimization, Workshop on Agent-Based Solutions for Manufacturing and Supply Chain, Workshop on User-Centric Technologies and Applications, Workshop on Conflict Resolution in Decision Making, Workshop on Multi-Agent System Based Learning Environments, Workshop on Multi-agent based Applications for Sustainable Energy Systems, Workshop on Agents and multi-agent Systems for AAL and e-Health
This volume constitutes the refereed proceedings of the 6th International Conference on Multimedia Communications, Services and Security, MCSS 2013, held in Krakow, Poland, in June 2013. The 27 full papers included in the volume were selected from numerous submissions. The papers cover various topics related to multimedia technology and its application to public safety problems.
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields. It covers aspects from educational and game theories, human-computer interaction, computer graphics, artificial intelligence, and systems design. This issue contains a special section on serious games with 8 outstanding contributions from the VS-Games 2011 conference; furthermore, there are 13 regular papers. These contributions clearly demonstrate the use of serious games and virtual worlds for edutainment applications and form a basis for further exploration and new ideas.
Co-editors of the volume are: Federico "Alvarez," Alessandro "Bassi," Michele "Bezzi," Laurent "Ciavaglia," Frances "Cleary," Petros "Daras," Hermann "De Meer," Panagiotis "Demestichas," John "Domingue," Theo G. "Kanter," Stamatis "Karnouskos," Srdjan "Kr"" ""o," Laurent "Lefevre," Jasper "Lentjes," Man-Sze "Li," Paul "Malone," Antonio "Manzalini," Volkmar "Lotz," Henning "Muller," Karsten "Oberle," Noel E. "O'Connor," Nick "Papanikolaou," Dana "Petcu," Rahim "Rahmani," Danny" Raz," Gael "Richards," Elio "Salvadori," Susana "Sargento," Hans "Schaffers," Joan" Serrat," Burkhard "Stiller," Antonio F. "Skarmeta," Kurt "Tutschku," Theodore "Zahariadis" The Internet is the most vital scientific, technical, economic and societal set of infrastructures in existence and in operation today serving 2.5 billion users. Continuing its developments would secure much of the upcoming innovation and prosperity and it would underpin the sustainable growth in economic values and volumes needed in the future. Future Internet infrastructures research is therefore a must. The Future Internet Assembly (FIA) is a successful conference that brings together participants of over 150 research projects from several distinct yet interrelated areas in the European Union Framework Programme 7 (FP7). The research projects are grouped as follows: the network of the future as infrastructure connecting and orchestrating the future Internet of people, computers, devices, content, clouds and things; cloud computing, Internet of Services and advanced software engineering; the public-private partnership projects on Future Internet; Future Internet Research and Experimentation (FIRE). The 26 full papers included in this volume were selected from 45 submissions. They are organized in topical sections named: software driven networks, virtualization, programmability and autonomic management; computing and networking clouds; internet of things; and enabling technologies and economic incentives."
Human Choice and Computers: Issues of Choice and Quality of Life in the Information Society presents different views about how terrorist actions are influencing political and social discussions and decisions, and it covers questions related to legitimacy and power in the Information Society. Ethical principles are important guidelines for responsible behavior of IT professionals. But even under strong external pressure, long ranging aspects such as education and the roles of developing countries in the Information Society are important to discuss, especially to enable all to actively participate in information processes.
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.
This book constitutes the thoroughly refereed post-workshop proceedings of the First IAPR TC3 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction (MPRSS2012), held in Tsukuba, Japan in November 2012, in collaboration with the NLGD Festival of Games. The 21 revised papers presented during the workshop cover topics on facial expression recognition, audiovisual emotion recognition, multimodal Information fusion architectures, learning from unlabeled and partially labeled data, learning of time series, companion technologies and robotics.
In most scenarios of the future a personalized virtual butler appears. This butler not only performs communication and coordination tasks but also gives recommendations on how to handle everyday problems. The aim of this book is to explore the prerequisites of such a personalized virtual butler by asking: what is known about the capacities and the needs of aging people; which information and communication technologies have been used in assisting/conversing with persons, especially older ones, and what were the results; what are the advantages/disadvantages of virtual butlers as mainly software programs compared robots as butlers; and which methods, especially in artificial intelligence, have to be developed further and in which direction in order to create a virtual butler in the foreseeable future?
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world. Online child sexual abuse has become a high profile and important issue in public life. When children are victims, there is clearly intense public and political interest and concern. Sex offenders are society's most reviled deviants and the object of seemingly undifferentiated public fear and loathing. This may be evidenced in ongoing efforts to advance legislation, develop police tactics and to educate children and their carers to engage with multi-media and the internet safely. Understanding how sex offenders use the internet and how the police and the government are responding to their behaviour is central to the development of preventative measures. Based on extensive ethnographic research conducted with the police and a specialist paedophile unit, here Elena Marellozzo presents an informed analysis of online child sexual abuse: of the patterns and characteristics of online grooming, and of the challenges and techniques that characterize its policing. Connecting theory, research and practice in the field of policing, social policy, victimology and criminology, this book adds significantly to our understanding and knowledge of the problem of online child sexual abuse, the way in which victims are targeted and how this phenomenon is, and might be, policed.
In modernity, an individual identity was constituted from civil society, while in a globalized network society, human identity, if it develops at all, must grow from communal resistance. A communal resistance to an abstract conceptualised world, where there is no possibility for perception and experience of power and therefore no possibility for human choice and action, is of utmost importance for the constituting of human choosers and actors. This book therefore sets focus on those human choosers and actors wishing to read and enjoy the papers as they are actually perceiving and experiencing their lives in a diversity of social and cultural contexts. In so doing, the book tries to imagine in what kind of networks humans may choose and act based on the knowledge and empirical evidence presented in the papers. The topics covered in the book include: People and Their Changing Values. Citizens in a Network Society. The Individual and Knowledge Based Organisations. Human Responsibility and Technology. Exclusion and Regeneration. This valuable new book contains the edited proceedings of the Fifth World Conference on Human Choice and Computers (HCC-5), which was sponsored by the International Federation for Information Processing (IFIP) and held in Geneva, Switzerland in August 1998. Since the first HCC conference in 1974, IFIP's Technical Committee 9 has endeavoured to set the agenda for human choices and human actions vis-a-vis computers."
Collecting short thought pieces by some of the leading thinkers on the emerging 'Immersive Internet', Power and Teigland's book questions what a more immersive and intimate internet - based on social media, augmented reality, virtual worlds, online games, 3D internet and beyond - might mean for society and for each of us.
This book makes an important contribution to the study of political communication. Its chapters analyse forms of media talk associated with contemporary political elections. Key topics include: changing forms of political interview, televised political debates, and the use of multimedia in promotional discourse.
This book constitutes the refereed proceedings of the 6th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2013, held in Oldenburg, Germany, in February/March 2013. The 15 full papers included in this volume were carefully reviewed and selected from 48 submissions; in addition the book contains two keynote talks in full-paper length. The contributions are organized in topical sections named: from computer usage to computational thinking; algorithmic and computational thinking; games; informatics in the context of other disciplines; and competence-based learning and retention of competencies.
Modern society has been transformed by the digital convergence towards a future where technologies embed themselves into the fabric of everyday life. This ongoing merging of social and technological infrastructures provides and necessitates new possibilities to renovate past notions, models and methods of information systems development that accommodates humans as actors within the infrastructure. This shift introduces new possibilities for information systems designers to fulfil more and more everyday functions, and to enhance their value and worth to the user. Reframing Humans in Information Systems Development aims to reframe the phenomenon of human-centered development of information systems by connecting scientific constructs produced within the field of information systems which has recently provided a plethora of multidisciplinary user views, without explicitly defining clear constructs that serve the IS field in particular. IS researchers, practitioners and students would benefit from Reframing Humans in Information Systems Development as the book provides a comprehensive view to various human-centered development methods and approaches. The representatives of the fields of Human-Computer Interaction and Computer Supported Collaborative Work will also find this book an excellent resource. A theoretical handbook and collection of practical experiences, are included along with critical discussions of the utilization methods in ISD and their implications with some interconnecting commentary viewpoints.
Travelling through theories of emotion and affect, this book addresses the key ways in which media studies can be brought to bear upon everyday encounters with online cultures and practices. The book takes stock of where we are emotionally with regard to the Internet in the context of other screen media.
How did digital media happen ? Through a unique approach to digital documents, and detailed intricate histories of illicit internet piracy networks, The Digital Culture Industry goes beyond the Napster creation myth and illuminates the unseen individuals, code and events behind the turn to digital media.
This book investigates the extent to which a Public Service Broadcasting (PSB) ethos has been extended to the online world in Europe. It examines the most significant policy initiatives carried out by PSBs in Europe on online platforms, and analyzes how the public service philosophy is being reinvented by policy makers.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was "Bringing protocols to life."
This book constitutes the refereed proceedings of the Second International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage, HCITOCH 2011, held in Cordoba, Argentina, in September 2011. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The volume is intended to be a meeting point of all those who freely wish to boost and perfect the set of strategies and techniques to improve the human-computer interaction, tourism, and cultural heritage.
In the future, everyday life in traffic will be intricately meshed with city life. Today motorways, cities and streets are places where we spend a considerable amount of time, and where a large number of everyday encounters between people occur. Any road user's journey coincides with hundreds or even thousands of others. This book unpacks the details of the practical achievements involved in socially engaging with people at high speed. Although, generally speaking, these encounters are brief and interaction is slight, the recent emergence of mobile technologies offers opportunities to support drivers and passengers beyond just helping them to reach their destination. New social media could enhance interaction in traffic making life on the road more interesting and meaningful. Such innovative applications could include car stereos that share music amongst drivers; digital games that interact with the landscape passing outside the car windows, or with passengers in surrounding cars; message systems that allow drivers to help each other; and web applications that allow motorcyclists to socialize on the road. Social Media on the Road - The Future of Car Based Computing provides a bridge between research in transport planning and traffic technology, and new media areas such as Computer Human Interaction and Computer Supported Cooperative Work. Those studying and researching in the areas of human computer interaction in mobile use contexts, and those interested in developing new forms of mobile applications and services will find this book an excellent resource. Oskar Juhlin is Associate Professor and Director of the Mobile Life VinnExcellence Centre at Stockholm University and Interactive Institute. 'This book represents a pioneering and key research work that examines the future of transportation being merged with communication and interactive media. It also provides a glimpse of the future potential of mixed reality entertainment for children and family on the move. It is essential for scientists, designers, and engineers working on mobile social media, as well as for business people looking for new potential urban transport media services.' Professor Adrian D. Cheok, Graduate School of Media Design, Keio University.
There is, in general, no doubt regarding the ethical and human behaviour aspects of the research work of any type. The researchers are thought of working for society and are low paid. However, in the practice of science and technology, they should work, first of all, for system designers who need their support in designing, developing and implementing the systems under investigation. Unfortunately, this is not a popular case in the area of Information and Communication Technology (ICT), where the support of the system and network researchers for the system and network designers, developers and operators is very limited. Considering that, the team of authors of the book (the team) decided to present the design experiences gained during designing, implementing and operating some line of the computer systems and networks in Poland (the country). The country was selected purposefully: Due to the political reasons, various embargos were imposed on the importation of modern equipment and methods of the computer industry, and the team needed very severely good support from the researchers to fulfil the design and development tasks successfully. However, in the ICT domain, which is a relatively new study and, thus, needing the significant support of science in every country, this support was a minute one in practice. In well developed countries, possessing a surplus of hardware and software components, the need for the support was also observed but could be bypassed through using a surplus of supplies or by learning from the design errors. This bypass was much less available in the country in severe economic conditions and the political conditions of the so-called Cold War. The objective of this book is to present the line of the ICT systems and networks under design and operation from the late 1960s and finishing when this book was written, and to present the requirements for the system and the basic support available from this science. The research aspects under consideration were, first of all, the performance evaluation and, for the systems of the 21st century, the robustness evaluation, with the system designers, implementers and operators being the ideal audience. |
You may like...
Using Computational Intelligence for the…
Romil Rawat, Upinder Kaur, …
Hardcover
R6,530
Discovery Miles 65 300
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,492
Discovery Miles 34 920
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,732
Discovery Miles 27 320
|