![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Every one relies on some kind of transportation system nearly every day. Go ing to work, shopping, dropping children at school and many other cultural or social activities imply leaving home, and using some form of transportation, which we expect tobe eflicient and reliable. Of course, efliciency and reliabil ity do not occur by chance, but require careful and often relatively complex planning by transportation system managers, both in the public and private sectors. It has long been recognized that mathematics, and, more specifically, op erations research is an important tool of this planning process. However, the range of skills required to cover both fields, even partially, is very large, and the opportunities to gather people with this very diverse expertise are too few. The organization of the NATO Advanced Studies Institute on "Opera tions Research and Decision Aid Methodologies in Traflic and Transportation Management" in March 1997 in Balatonfured, Hungary, was therefore more than welcome and the group of people that gathered for a very studious two weeks on the shores of the beautiful lake Balaton did really enjoy the truly multidisciplinary and high scientific level of the meeting. The purpose of the present volume is to report, in a chronological order, the various questions that were considered by the lecturers and the' students at the institute. After a general introduction to the topic, the first week focused on issues related to traflic modeling, mostly in an urban context."
Engineering the Knowledge Society (EKS) - Event of the World Summit on the Information Society (WSIS) This book is the result of a joint event of the World Federation of Engineering Organisations (WFEO) and the International Federation for Information Processing (IFIP) held during the World Summit on the Information Society (WSIS) in Geneva, Switzerland, December 11 - 12, 2003. The organisation was in the hands of Mr. Raymond Morel of the Swiss Academy of Engineering Sciences (SATW). Information Technology (or Information and Communication Technology) cannot be seen as a separate entity. Its application should support human development and this application has to be engineered. Education plays a central role in the engineering of Information and Communication Technology (ICT) for human support. The conference addressed the following aspects: Lifelong Learning and education, - inclusion, ethics and social impact, engineering profession, developing- society, economy and e-Society. The contributions in this World Summit event reflected an active stance towards human development supported by ICT. A Round Table session provided concrete proposals for action
While artificial intelligence (AI), robots, bio-technologies and digital media are transforming work, culture, and social life, there is little understanding of or agreement about the scope and significance of this change. This new interpretation of the 'great transformation' uses history and evolutionary theory to highlight the momentous shift in human consciousness taking place. Only by learning from recent crises and rejecting technological determinism will governments and communities redesign social arrangements that ensure we all benefit from the new and emerging technologies. The book documents the transformations under way in financial markets, entertainment, and medicine, affecting all aspects of work and social life. It draws on historical sociology and co-evolutionary theory arguing that the radical evolution of human consciousness and social life now under way is comparable with, if not greater than, the agrarian revolution (10000 BCE), the explosion of science, philosophy, and religion in the Axial Age (600 BCE), and the recent Industrial Revolution. Turning to recent major socio-economic crisis, and asking what can be learnt from them, the answer is we cannot afford this time around to repeat the failures of elites and theoretical systems such as economics to attend appropriately to radical change. We need to think beyond the constraints of determinist and reductionist explanations and embrace the idea of deep freedom. This book will appeal to educators, social scientists, policy-makers, business leaders, and students. It concludes with social design principles that can inform deliberative processes and new social arrangements that ensure everyone benefits from the affordances of the new and emerging technologies.
The principal message of the 'Human Choice and Computers' (HCC) tradition and its associated conferences over the years is that there are choices and alternatives. In this volume, Social Informatics takes two directions. The first supports readers in interpreting of the meaning of Social Informatics. The second, more extensive part develops an overview of various applications of Social Informatics. Researchers inspired by Social Informatics touch many areas of human and social life.
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010. The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior in computer systems.
1.1 Introduction Each year corporations spend millions of dollars training and educating their - ployees. On average, these corporations spend approximately one thousand dollars 1 per employee each year. As businesses struggle to stay on the cutting-edge and to keep their employees educated and up-to-speed with professional trends as well as ever-changing information needs, it is easy to see why corporations are investing more time and money than ever in their efforts to support their employees' prof- sional development. During the Industrial Age, companies strove to control natural resources. The more resources they controlled, the greater their competitive edge in the mark- place. Senge (1993) refers to this kind of organization as resource-based. In the Information Age, companies must create, disseminate, and effectively use kno- edge within their organization in order to maintain their market share. Senge - scribes this kind of organization as knowledge-based. Given that knowledge-based organizations willcontinuetobeadrivingforcebehindtheeconomy, itisimperative that corporations support the knowledge and information needs of their workers.
This book constitutes the refereed proceedings of the 5th
International Conference on Information Theoretic Security, held in
Amsterdam, The Netherlands, in May 2011.
Cognition, Communication and Interaction examines the theoretical and methodological research issues that underlie the design and use of interactive technology. Present interactive designs are addressing the multi-modality of human interaction and the multi-sensory dimension of how we engage with each other. This book aims to provide a trans-disciplinary research framework and methodology for interaction design. The analysis directs attention to three human capacities that our engagement with interactive technology has made salient and open to constant redefinition. These capacities are human cognition, communication and interaction. In this book examination of these capacities is embedded in understanding the following foundations for design: concepts of communication and interaction and their application (Part 1); conceptions of knowledge and cognition (Part 2); the role of aesthetics and ethics in design (Part 3).
Delving into the complexities of contemporary reportage, this book draws from moral philosophy and histories of photojournalism to understand the emergence of this distinct practice and discuss its evolution in a digital era. In arguing that the digitization of photography obliges us to radically challenge some of the traditional conceptions of press photography, this book addresses the historic opposition between artistic and journalistic photographs, showing and challenging how this has subtly inspired support for a forensic approach to photojournalism ethics. The book situates this debate within questions of relativism over what is 'moral', and normative debates over what is 'journalistic', alongside technical debates as to what is 'possible', to underpin a discussion of photojournalism as an ethical, moral, and societally important journalistic practice. Including detailed comparative analyses of codes of ethics, examination of controversial cases, and a study of photojournalism ethics as applied in different newsrooms, the book examines how ethical principles are applied by the global news media and explores the potential for constructive dialogue between different voices interested in pursuing the best version of photojournalism. A targeted, comprehensive and engaging book, this is a valuable resource for academics, researchers and students of photojournalism, as well as philosophy, communications and media studies more broadly.
Simplicity in nature is the ultimate sophistication. The world's magnificence has been enriched by the inner drive of instincts, the profound drive of our everyday life. Instinct is an inherited behavior that responds to environmental stimuli. Instinctive computing is a computational simulation of biological and cognitive instincts, which influence how we see, feel, appear, think and act. If we want a computer to be genuinely secure, intelligent, and to interact naturally with us, we must give computers the ability to recognize, understand, and even to have primitive instincts. This book, Computing with Instincts, comprises the proceedings of the Instinctive Computing Workshop held at Carnegie Mellon University in the summer of 2009. It is the first state-of-the-art survey on this subject. The book consists of three parts: Instinctive Sensing, Communication and Environments, including new experiments with in vitro biological neurons for the control of mobile robots, instinctive sound recognition, texture vision, visual abstraction, genre in cultures, human interaction with virtual world, intuitive interfaces, exploitive interaction, and agents for smart environments.
This book constitutes the refereed proceedings of the 17th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2011, held in Essen, Germany, in March 2011. The 10 revised full papers and the 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in seven topical sections on security and sustainability; process improvement and requirements in context; elicitation; models; services; embedded and real-time systems; and prioritization and traceability.
It is a great pleasure to share with you the Springer LNCS proceedings of the Second World Summit on the Knowledge Society, WSKS 2009, organized by the Open - search Society, Ngo, http: //www.open-knowledge-society.org, and held in Samaria Hotel, in the beautiful city of Chania in Crete, Greece, September 16-18, 2009. The 2nd World Summit on the Knowledge Society (WSKS 2009) was an inter- tional scientific event devoted to promoting dialogue on the main aspects of the knowledge society towards a better world for all. The multidimensional economic and social crisis of the last couple of years has brought to the fore the need to discuss in depth new policies and strategies for a human centric developmental processes in the global context. This annual summit brings together key stakeholders involved in the worldwide development of the knowledge society, from academia, industry, and government, including policy makers and active citizens, to look at the impact and prospects of - formation technology, and the knowledge-based era it is creating, on key facets of l- ing, working, learning, innovating, and collaborating in today's hyper-complex world. The summit provides a distinct, unique forum for cross-disciplinary fertilization of research, favoring the dissemination of research on new scientific ideas relevant to - ternational research agendas such as the EU (FP7), OECD, or UNESCO. We focus on the key aspects of a new sustainable deal for a bold response to the multidimensional crisis of our times.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of Web 2.0, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology).
Human-Systems Integration: From Virtual to Tangible Subject Guide: Ergonomics and Human Factors This book is an attempt to better formalize a systemic approach to human-systems integration (HSI). Good HSI is a matter of maturity... it takes time to mature. It takes time for a human being to become autonomous, and then mature! HSI is a matter of human-machine teaming, where human-machine cooperation and coordination are crucial. We cannot think engineering design without considering people and organizations that go with it. We also cannot think new technology, new organizations, and new jobs without considering change management. More specifically, this book is a follow-up of previous contributions in human-centered design and practice in the development of virtual prototypes that requires progressive operational tangibility toward HSI. The book discusses flexibility in design and operations, tangibility of software-intensive systems, virtual human-centered design, increasingly autonomous complex systems, human factors and ergonomics of sociotechnical systems, systems integration, and changed management in digital organizations. The book will be of interest to industry, academia, those involved with systems engineering, human factors, and the broader public.
This volume contains the papers presented at the Second International Sym- sium on Algorithmic Game Theory (SAGT 2009), which was held on October 18-20, 2009, in Paphos, Cyprus. This event followed the ?rst, very successful SAGT symposium, which took place in Paderborn, Germany, last year. The purpose of SAGT is to bring together researchers from computer s- ence, economics and mathematics to present and discuss originalresearchat the intersection of algorithms and game theory. It has been intended to cover all important areas such as solution concepts, game classes, computation of equil- riaandmarketequilibria, algorithmicmechanismdesign, automatedmechanism design, convergenceandlearningingames, complexityclassesingametheory, - gorithmicaspectsof?xed-pointtheorems, mechanisms, incentivesandcoalitions, cost-sharing algorithms, computational problems in economics, ?nance, decision theory and pricing, computational social choice, auction algorithms, price of - archyand its relatives, representationsof games and their complexity, economic aspects of distributed computing and the internet, congestion, routing and n- work design and formation games and game-theoretic approaches to networking problems. Approximately55submissionstoSAGT2009 werereceived.Eachsubmission was reviewed by at least three Program Committee members. The Program Committee decided to accept 29 papers. Out of these, a small number will be invited to a Special Issue of the Theory of Computing Systems journal with selected papers from SAGT 2009. The program of SAGT 2009 featured three invited talks from three outstanding researchers in algorithmic game theory: Elias Koutsoupias, Dov Monderer and Mihalis Yannakakis. We are very grateful toElias, DovandMihalisforjoiningusinPaphosandfortheirexcellentl
Electronic business, the integration of IT and the Internet into business processes, has begun to completely revolutionize business and the economy. The aim of this book is to point out the challenges and opportunities Europe and its companies are faced with in electronic business. The material is based upon the authors joint experience of years of research into the use of IT in business, industry, and government, as well as their management experience as President and CEO of leading technology organizations.
Computer systems can only deliver benefits if functionality, users and usability are central to their design and deployment. This book encapsulates work done in the DIRC project (Interdisciplinary Research Collaboration in Dependability), bringing together a range of disciplinary approaches - computer science, sociology and software engineering - to produce a socio-technical systems perspective on the issues surrounding trust in technology in complex settings.
History of Computing: Learning from the Past Why is the history of computing important? Given that the computer, as we now know it, came into existence less than 70 years ago it might seem a little odd to some people that we are concerned with its history. Isn't history about 'old things'? Computing, of course, goes back much further than 70 years with many earlier - vices rightly being known as computers, and their history is, of course, important. It is only the history of electronic digital computers that is relatively recent. History is often justified by use of a quote from George Santayana who famously said that: 'Those who cannot remember the past are condemned to repeat it'. It is arguable whether there are particular mistakes in the history of computing that we should avoid in the future, but there is some circularity in this question, as the only way we will know the answer to this is to study our history. This book contains papers on a wide range of topics relating to the history of c- puting, written both by historians and also by those who were involved in creating this history. The papers are the result of an international conference on the History of Computing that was held as a part of the IFIP World Computer Congress in Brisbane in September 2010.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
Copy the following link for free access to the first chapter of this title: http: //www.springerlink.com/content/j23468h304310755/fulltext.pdf This book is a warning. It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in the rapidly approaching world of ambient intelligence (AmI). In the near future, every manufactured product - our clothes, money, appliances, the paint on our walls, the carpets on our floors, our cars, everything - will be embedded with intelligence, networks of tiny sensors and actuators, which some have termed "smart dust." The AmI world is not far off. We already have surveillance systems, biometrics, personal communicators, machine learning and more. AmI will provide personalised services - and know more about us - on a scale dwarfing anything hitherto available. In the AmI vision, ubiquitous computing, communications and interfaces converge and adapt to the user. AmI promises greater user-friendliness in an environment capable of recognising and responding to the presence of different individuals in a seamless, unobtrusive and often invisible way. While most stakeholders paint the promise of AmI in sunny colours, there is a dark side to AmI. This book aims to illustrate the threats and vulnerabilities by means of four "dark scenarios." The authors set out a structured methodology for analysing the four scenarios, and then identify safeguards to counter the foreseen threats and vulnerabilities. They make recommendations to policy-makers and other stakeholders about what they can do to maximise the benefits from ambient intelligence and minimise the negative consequences.
Knowledge management (KM) is more a nd more recognized as a key factor of success for organisations: not only stru ctured companies, but also virtual enterprises, networks of organisations or ev en virtual communities. These organisations of differentki nds, are becoming increasingly aware of the need to collect, organise, mobilise, increase, in sum manage, the knowledge characterising their ability to stay alive, adapt and evolve in a turbulent context. Through various organisationaland t echnological approaches, KM aims at improving knowledge access, sharing and reuse as well as new knowledge creation. KMIA 2008 highlights problems, requirements and solutions that are derived from actual, concrete experiences. The fourteen papers accepted at KMIA 2008 give various answers to the following questions: What organisational strategies can enable to enact and promote KM within organisations? How to link these organisational strategies withth e ICT technology? Organisational strategies can be related to the evolution of the organisation itself or to its environment: intra organisational and inter organisational strategies can thus bedi stinguished. Some papers emphasize the importance of collaboration and knowledge transfer for team work and collaborative projects that may be intra organisational or inter organisational (e.g. intero rganisational outsourcing relationships). Strategies for designing and manufacturing innovative products are recognised as crucial for enterprises that operate in competitive sectors. Networkso forg anisations can help to improve the competitiveness of these organisations: KM can thus enhance competency management in such networks and help an organisation to find relevant costumers, suppliers, or cooperation partners.
In the present digital revolution we often seem trapped in a Kafkaesque world of technological advances, some desired, some disliked or even feared, which we cannot influence but must accept. This book discusses the urgent need to redress this situation. The authors argue that technologies succeed or fail according to their relevance and value to people, who need to be actively engaged in order to create shared visions and influence their implementation.
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu
The 13th International Conference on Human-Computer Interaction, HCI Inter- tional 2009, was held in San Diego, California, USA, July 19-24, 2009, jointly with the Symposium on Human Interface (Japan) 2009, the 8th International Conference on Engineering Psychology and Cognitive Ergonomics, the 5th International Conference on Universal Access in Human-Computer Interaction, the Third International Conf- ence on Virtual and Mixed Reality, the Third International Conference on Internati- alization, Design and Global Development, the Third International Conference on Online Communities and Social Computing, the 5th International Conference on Augmented Cognition, the Second International Conference on Digital Human Mod- ing, and the First International Conference on Human Centered Design. A total of 4,348 individuals from academia, research institutes, industry and gove- mental agencies from 73 countries submitted contributions, and 1,397 papers that were judged to be of high scientific quality were included in the program. These papers - dress the latest research and development efforts and highlight the human aspects of the design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.
Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile. The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems. |
You may like...
|