![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.
TheseproceedingscontainthepapersselectedforpresentationatCARDIS 2010, the 9th IFIP Conference on Smart Card Research and Advanced Application hosted by the Institute of IT-Security and Security Law (ISL) of the University ofPassau, Germany.CARDISisorganizedbyIFIPWorkingGroupsWG8.8and WG 11.2. Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Every second year leading researchers and practitioners meet to present new ideas and discuss recent - velopments in smart card technologies. Thefastevolutioninthe?eldofinformationsecurityrequiresadequatemeans for representing the user in human-machine interactions. Smart cards, and by extension smart devices with their processing power and their direct association with the user, are considered the ?rst choice for this purpose. A wide range of areas including hardware design, operating systems, systems modelling, cr- tography, and distributed systems contribute to this fast-growing technology. The submissions to CARDIS were reviewed by at least three members of the ProgramCommittee, followedbyatwo-weekdiscussionphaseheldelectronically, wherecommittee memberscouldcomment onall papersand allreviews.Finally, 16 papers were selected for presentation at CARDIS. There aremany volunteerswho o?ered their time and energy to put together the symposium and who deserve our acknowledgment. We want to thank all the members of the Program Committee and the external reviewers for their hard work in evaluating and discussing the submissions. We are also very grateful to JoachimPosegga, the GeneralChairof CARDIS 2010, andhisteam for thelocal conference management. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the proceedings stimulat
This volume brings together, through a peer-revision process, the advanced research results obtained by the European COST Action 2102: Cross-Modal Analysis of Verbal and Nonverbal Communication, primarily discussed for the first time at the Second COST 2102 International Training School on "Development of Multimodal Int- faces: Active Listening and Synchrony" held in Dublin, Ireland, March 23-27 2009. The school was sponsored by COST (European Cooperation in the Field of Sci- tific and Technical Research, www.cost.esf.org ) in the domain of Information and Communication Technologies (ICT) for disseminating the advances of the research activities developed within the COST Action 2102: "Cross-Modal Analysis of Verbal and Nonverbal Communication" (cost2102.cs.stir.ac.uk) COST Action 2102 in its third year of life brought together about 60 European and 6 overseas scientific laboratories whose aim is to develop interactive dialogue systems and intelligent virtual avatars graphically embodied in a 2D and/or 3D interactive virtual world, capable of interacting intelligently with the environment, other avatars, and particularly with human users.
It is my pleasure to write the preface for Information Processing and Management. This book aims to bring together innovative results and new research trends in inf- mation processing, computer science and management engineering. If an information processing system is able to perform useful actions for an obj- tive in a given domain, it is because the system knows something about that domain. The more knowledge it has, the more useful it can be to its users. Without that kno- edge, the system itself is useless. In the information systems field, there is conceptual modeling for the activity that elicits and describes the general knowledge a particular information system needs to know. The main objective of conceptual modeling is to obtain that description, which is called a conceptual schema. Conceptual schemas are written in languages called conceptual modeling languages. Conceptual modeling is an important part of requi- ments engineering, the first and most important phase in the development of an inf- mation system.
The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating such interaction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders.
Social computing is concerned with the study of social behavior and social context based on computational systems. Behavioral modeling provides a representation of the social behavior, and allows for experimenting, scenario planning, and deep und- standing of behavior, patterns, and potential outcomes. The pervasive use of computer and Internet technologies by humans in everyday life provides an unprecedented en- ronment of various social activities that, due to the platforms under which they take place, generate large amounts of stored data as a by-product, often in systematically organized form. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepe- ent systems are created and used to represent the various social and physical systems for investigating the interactions between groups, communities, or nation-states. This requires joint efforts to take advantage of the state-of-the-art research from multiple disciplines improving social computing and behavioral modeling in order to document lessons learned and develop novel theories, experiments, and methodologies to better explain the interaction between social (both informal and institutionalized), psyc- logical, and physical mechanisms. The goal is to enable us to experiment, create, and recreate an operational environment with a better understanding of the contributions from each individual discipline, forging joint interdisciplinary efforts. This volume comprises the proceedings of the third international workshop on - cial Computing, Behavioral Modeling and Prediction, which has grown trem- dously.
This book assembles contributions from computer scientists and librarians that altogether encompass the complete range of tools, tasks and processes needed to successfully preserve the cultural heritage of the Web. It combines the librarian 's application knowledge with the computer scientist 's implementation knowledge, and serves as a standard introduction for everyone involved in keeping alive the immense amount of online information.
The 2010 edition of the Passive and Active Measurement Conference was the 11th of a series of successful events. Since 2000, the Passive and Active M- surement (PAM) conference has provided a forum for presenting and discussing innovative and early work in the area of Internet measurements. PAM has a tradition of being a workshop-like conference with lively discussion and active participation from all attendees. This event focuses on research and practical applications of network measurement and analysis techniques. This year's c- ference was held at ETH Zurich, Switzerland. PAM 2010 attracted 79 submissions. Each paper was carefully reviewed by at leastthreemembersoftheTechnicalProgramCommittee.Thereviewingprocess ledtotheacceptanceof23papers.Thepaperswerearrangedinninesessionsc- ering the following areas: routing, transport protocols, mobile devices, topology, measurement infrastructure, characterizing network usage, analysis techniques, tra?c analysis, and the Web. We are very grateful to Endace Ltd. (New Zealand), Cisco Systems Inc. (USA), armasuisse (Switzerland) and the COST Action TMA whose sponsoring allowedustokeepregistrationcostslowandto o?erseveraltravelgrantsto PhD students. We are also grateful to ETH Zurich for sponsoring PAM as a host.
This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009. The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2009 papers cover topics such as privacy in service oriented architectures, privacy-preserving mechanisms, crossmatching and indistinguishability techniques, privacy policies, and disclosure of information. The SETOP 2009 papers address all current issues within the sope of security policies, identification and privacy, as well as security mechanisms.
This book provides rare insights into the nature of contemporary, technologically-facilitated government. Its multidisciplinary approach demonstrates that information technology is more than a tool for politicians and policy-makers. E-government has reconfigured public administration, policy, power and citizenship.
Modern society has been transformed by the digital convergence towards a future where technologies embed themselves into the fabric of everyday life. This ongoing merging of social and technological infrastructures provides and necessitates new possibilities to renovate past notions, models and methods of information systems development that accommodates humans as actors within the infrastructure. This shift introduces new possibilities for information systems designers to fulfil more and more everyday functions, and to enhance their value and worth to the user. Reframing Humans in Information Systems Development aims to reframe the phenomenon of human-centered development of information systems by connecting scientific constructs produced within the field of information systems which has recently provided a plethora of multidisciplinary user views, without explicitly defining clear constructs that serve the IS field in particular. IS researchers, practitioners and students would benefit from Reframing Humans in Information Systems Development as the book provides a comprehensive view to various human-centered development methods and approaches. The representatives of the fields of Human-Computer Interaction and Computer Supported Collaborative Work will also find this book an excellent resource. A theoretical handbook and collection of practical experiences, are included along with critical discussions of the utilization methods in ISD and their implications with some interconnecting commentary viewpoints.
The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous discussions and strong audience interest. The conference featured an excellent program comprising high-quality paper pr- entations and invited speakers from all around the world. The first day featured a plenary session including George Philip, President of University at Albany, Harry Corbit, Suprintendent of New York State Police, and William Pelgrin, Director of New York State Office of Cyber Security and Critical Infrastructure Coordination. An outstanding keynote was provided by Miklos Vasarhelyi on continuous auditing. This was followed by two parallel sessions on accounting fraud /financial crime, and m- timedia and handheld forensics. The second day of the conference featured a mesm- izing keynote talk by Nitesh Dhanjani from Ernst and Young that focused on psyc- logical profiling based on open source intelligence from social network analysis. The third day of the conference featured both basic and advanced tutorials on open source forensics.
In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.
This significant book presents an original examination of the theoretical and empirical interactions between globalization, technology and poverty. Jeffrey James studies the effect of information technology on patterns of globalization and explores how such patterns can be altered to reduce the growing global divide between rich and poor nations.The author first illustrates how the impact of information technology on globalization can be conceptualized in terms of transactions costs, product proliferation and mechanisms of cumulative causation. He finds that globalization tends to benefit a relatively small group of rich individuals, firms and countries. Consequently he suggests policy measures through which information technology can be used to lessen, rather than exacerbate, the digital divide. He goes on to argue that even if the proposed measures are reasonably successful, considerable attention will still need to be paid to conventional technologies and, in particular, to the promotion of technologies that will benefit the poorest groups in the developing nations. Finally, the author looks in detail at technology policy in sub-Saharan Africa, a region which has profited least from the benefits provided by new technologies such as email and the internet. Technology, Globalization and Poverty will be essential reading for academics interested in technological change, economic development, and the relationship between the two. Policymakers in both developed and developing countries will also draw great value from this work.
In the future, everyday life in traffic will be intricately meshed with city life. Today motorways, cities and streets are places where we spend a considerable amount of time, and where a large number of everyday encounters between people occur. Any road user's journey coincides with hundreds or even thousands of others. This book unpacks the details of the practical achievements involved in socially engaging with people at high speed. Although, generally speaking, these encounters are brief and interaction is slight, the recent emergence of mobile technologies offers opportunities to support drivers and passengers beyond just helping them to reach their destination. New social media could enhance interaction in traffic making life on the road more interesting and meaningful. Such innovative applications could include car stereos that share music amongst drivers; digital games that interact with the landscape passing outside the car windows, or with passengers in surrounding cars; message systems that allow drivers to help each other; and web applications that allow motorcyclists to socialize on the road. Social Media on the Road - The Future of Car Based Computing provides a bridge between research in transport planning and traffic technology, and new media areas such as Computer Human Interaction and Computer Supported Cooperative Work. Those studying and researching in the areas of human computer interaction in mobile use contexts, and those interested in developing new forms of mobile applications and services will find this book an excellent resource. Oskar Juhlin is Associate Professor and Director of the Mobile Life VinnExcellence Centre at Stockholm University and Interactive Institute. 'This book represents a pioneering and key research work that examines the future of transportation being merged with communication and interactive media. It also provides a glimpse of the future potential of mixed reality entertainment for children and family on the move. It is essential for scientists, designers, and engineers working on mobile social media, as well as for business people looking for new potential urban transport media services.' Professor Adrian D. Cheok, Graduate School of Media Design, Keio University.
Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor. In recent years there has been a growing awareness both in the political sphere and in civil society including the bu- ness sectors, on the importance of sustainability. Therefore, this is an important and timely research issue, not only in terms of systems design but also as an effort to b- row and integrate contributions from different disciplines when designing and/or g- erning those systems. The discipline of collaborative networks especially, which has already emerged in many application sectors, shall play a key role in the implemen- tion of effective sustainability strategies. PRO-VE 2010 focused on sharing knowledge and experiences as well as identi- ing directions for further research and development in this area. The conference - dressed models, infrastructures, support tools, and governance principles developed for collaborative networks, as important resources to support multi-stakeholder s- tainable developments. Furthermore, the challenges of this theme open new research directions for CNs. PRO-VE 2010 held in St.
th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.
Internet is starting to permeate politics much as it has previously revolutionised education, business or the arts. Thus, there is a growing interest in areas of e-government and, more recently, e-democracy. However, most attempts in this field have just envisioned standard political approaches facilitated by technology, like e-voting or e-debating. Alternatively, we could devise a more transforming strategy based on deploying web based group decision support tools and promote their use for public policy decision making. This book delineates how this approach could be implemented. It addresses foundations, basic methodologies, potential implementation and applications, together with a thorough discussion of the many challenging issues. This innovative text will be of interest to students, researchers and practitioners in the fields of e-government, e-democracy and e-participation and research in decision analysis, negotiation analysis and group decision support.
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.
The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA. A few of the papers in this volume were produced through a multi-step process. First, we recorded the talk given by each author at the workshop in May 2008. Next, we transcribed the recording. The authors then produced a draft of their paper from these transcriptions, refining each draft until the final version. Although the papers are not verbatim transcriptions of the talks given, some do retain the informal and conv- sational quality of the presentations. In one instance we have included some material from the question-and-answer period after the talk, since the material covered proved to be relevant and interesting. The majority of authors, however, preferred to include a more formal paper based on the material presented at the workshop.
This book constitutes the refereed proceedings of the 5th International Workshop on Internet and Network Economics, WINE 2009, held in Rome, Italy, in December 2009. The 34 regular and 29 short revised full papers presented together with 3 invited talks were carefully reviewed and selected from 142 submissions. The papers address various topics in theoretical computer science, networking and security, economics, mathematics, sociology, and management sciences devoted to the analysis of problems arising in the internet and the worldwide Web, such as auction algorithms, computational advertising, general and majority equilibrium, coalitions, collective action, economics aspects of security and privacy in distributed and network computing, algorithmic design and game theory, information economics, network games, price dynamics, and social networks.
It is a great pleasure to share with you the Springer LNCS proceedings of the Second World Summit on the Knowledge Society, WSKS 2009, organized by the Open - search Society, Ngo, http: //www.open-knowledge-society.org, and held in Samaria Hotel, in the beautiful city of Chania in Crete, Greece, September 16-18, 2009. The 2nd World Summit on the Knowledge Society (WSKS 2009) was an inter- tional scientific event devoted to promoting dialogue on the main aspects of the knowledge society towards a better world for all. The multidimensional economic and social crisis of the last couple of years has brought to the fore the need to discuss in depth new policies and strategies for a human centric developmental processes in the global context. This annual summit brings together key stakeholders involved in the worldwide development of the knowledge society, from academia, industry, and government, including policy makers and active citizens, to look at the impact and prospects of - formation technology, and the knowledge-based era it is creating, on key facets of l- ing, working, learning, innovating, and collaborating in today's hyper-complex world. The summit provides a distinct, unique forum for cross-disciplinary fertilization of research, favoring the dissemination of research on new scientific ideas relevant to - ternational research agendas such as the EU (FP7), OECD, or UNESCO. We focus on the key aspects of a new sustainable deal for a bold response to the multidimensional crisis of our times.
It is a great pleasure to share with you the Springer LNCS proceedings of the Second World Summit on the Knowledge Society, WSKS 2009, organized by the Open - search Society, Ngo, http: //www.open-knowledge-society.org, and held in Samaria Hotel, in the beautiful city of Chania in Crete, Greece, September 16-18, 2009. The 2nd World Summit on the Knowledge Society (WSKS 2009) was an inter- tional scientific event devoted to promoting dialogue on the main aspects of the knowledge society towards a better world for all. The multidimensional economic and social crisis of the last couple of years has brought to the fore the need to discuss in depth new policies and strategies for a human centric developmental processes in the global context. This annual summit brings together key stakeholders involved in the worldwide development of the knowledge society, from academia, industry, and government, including policy makers and active citizens, to look at the impact and prospects of - formation technology, and the knowledge-based era it is creating, on key facets of l- ing, working, learning, innovating, and collaborating in today's hyper-complex world. The summit provides a distinct, unique forum for cross-disciplinary fertilization of research, favoring the dissemination of research on new scientific ideas relevant to - ternational research agendas such as the EU (FP7), OECD, or UNESCO. We focus on the key aspects of a new sustainable deal for a bold response to the multidimensional crisis of our times. |
![]() ![]() You may like...
Numerology For The Beginner - Master the…
Michelle Northrup
Hardcover
The Tarot Spreads Yearbook - 52 Spreads…
Chelsey Pippin Mizzi
Paperback
Twenty-Two Impressions - notes from the…
Jessica Friedmann
Hardcover
Wild Card - Let The Tarot Tell Your…
Jen Cownie, Fiona Lensvelt
Paperback
|