![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research results as well as best professional practice to improve the security of information systems. This balance between future technology improvements and day-to-day security management has contributed to better understanding between researchers, solution providers and practitioners, making this forum lively and fruitful. Security and Protection in Information Processing Systems contains the papers selected for presentation at the 19th IFIP International Conference on Information Security (SEC2004), which was held in August 2004 as a co-located conference of the 18th IFIP World Computer Congress in Toulouse, France. The conference was sponsored by the International Federation for Information Processing (IFIP).This volume is essential reading for scholars, researchers, and practitioners interested in keeping pace with the ever-growing field of information security.
This book constitutes the refereed proceedings of the 10th International Conference on Pervasive Computing, Pervasive 2012, held in Newcastle, UK, in June 2012. The 28 revised papers presented were carefully reviewed and selected from 138 submissions. The contributions are grouped into the following topical sections: activity capturing; urban mobility and computing; home and energy; HCI; development tools and devices; indoor location and positioning; social computing and games; privacy; public displays and services.
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security.
This book constitutes the refereed proceedings of the 7th International Conference on Haptic and Audio Interaction Design, HAID 2012, held in Lund, Sweden, in August 2012. The 15 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on haptics and audio in navigation, supporting experiences and activities, object and interface, test and evaluation.
This book constitutes the proceedings of the 10th International Conference on Business Process Management, BPM 2012, held in Tallinn, Estonia, in September 2012. The 17 regular papers and 7 short papers included in this volume were carefully reviewed and selected from 126 submissions. The book also features two keynote lectures which were given at the conference. The papers are organized in topical sections named: process quality; conformance and compliance; BPM applications; process model analysis; BPM and the cloud; requirements and performance; process mining; and refactoring and optimization.
The two-volume set LNCS 7382 and 7383 constiutes the refereed proceedings of the 13th International Conference on Computers Helping People with Special Needs, ICCHP 2012, held in Linz, Austria, in July 2012. The 147 revised full papers and 42 short papers were carefully reviewed and selected from 364 submissions. The papers included in the second volume are organized in the following topical sections: portable and mobile systems in assistive technology; assistive technology, HCI and rehabilitation; sign 2.0: ICT for sign language users: information sharing, interoperability, user-centered design and collaboration; computer-assisted augmentative and alternative communication; easy to Web between science of education, information design and speech technology; smart and assistive environments: ambient assisted living; text entry for accessible computing; tactile graphics and models for blind people and recognition of shapes by touch; mobility for blind and partially sighted people; and human-computer interaction for blind and partially sighted people.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. The 16th issue of the Transactions on Computational Science journal contains 11 extended versions of selected papers from Cyberworlds 2011, held in Banff, AB, Canada, in October 2011. The topics span the areas of haptic modeling, shared virtual worlds, virtual reality, human-computer interfaces, e-learning in virtual collaborative spaces, multi-user web games, cybersecurity, social networking, and art and heritage in cyberspaces.
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physical world. Online child sexual abuse has become a high profile and important issue in public life. When children are victims, there is clearly intense public and political interest and concern. Sex offenders are society's most reviled deviants and the object of seemingly undifferentiated public fear and loathing. This may be evidenced in ongoing efforts to advance legislation, develop police tactics and to educate children and their carers to engage with multi-media and the internet safely. Understanding how sex offenders use the internet and how the police and the government are responding to their behaviour is central to the development of preventative measures. Based on extensive ethnographic research conducted with the police and a specialist paedophile unit, here Elena Marellozzo presents an informed analysis of online child sexual abuse: of the patterns and characteristics of online grooming, and of the challenges and techniques that characterize its policing. Connecting theory, research and practice in the field of policing, social policy, victimology and criminology, this book adds significantly to our understanding and knowledge of the problem of online child sexual abuse, the way in which victims are targeted and how this phenomenon is, and might be, policed.
This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012. The 21 revised full papers presented together with 3 short papers and 4 workshop and tutorial papers were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on process focused software process improvement, open-source agile and lean practices, product and process measurements and estimation, distributed and global software development, quality assessment, and empirical studies.
This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linkoping, Sweden, in June 2012. The 21 full papers presented together with 5 short papers were carefully reviewed and selected from numerous submissions. In addition three keynote papers are included in this volume. The papers cover the typical fields of persuasive technology, such as health, safety and education."
This book constitutes the refereed proceedings of the 3 rd International ICST Conference on IT Revolutions, held in Cordoba, Spain in March 2011. The 20 revised full papers presented were carefully reviewed and selected from numerous submissions. They are grouped in topical sections on eGreen energy, smart buildings, health and ambient assisted living, smart environments and user experience, grid and cloud computing, eLearning.
The frequency of new editions of this book is indicative of the rapid and trem- dous changes in the fields of computer and information sciences. First published in 1995, the book has rapidly gone through three editions already and now we are in the fourth. Over this period, we have become more dependent on computer and telecommunication technology than ever before and computer technology has become ubiquitous. Since I started writing on social computing, I have been ad- cating a time when we, as individuals and as nations, will become totally dependent on computing technology. That time is almost on us. Evidence of this is embodied in the rapid convergence of telecommunication, broadcasting, and computing devices; the miniaturization of these devices; and the ever increasing storage capacity , speed of computation, and ease of use. These qualities have been a big pulling force sucking in millions of new users every day, sometimes even those unwilling. Other appealing features of these devices are the increasing number of applications, apps, as they are increasingly becoming known, and being wireless and easily portable. Whether small or big, these new gizmos have become the c- terpiece of an individual's social and economic activities and the main access point for all information. Individuals aside, computing technology has also become the engine that drives the nations' strategic and security infrastructures that control power grids, gas and oil storage facilities, transportation, and all forms of national communication, including emergency services.
This book constitutes the refereed proceedings of the 7th International Conference on Theory and Application of Diagrams, Diagrams 2012, held in Canaterbury, UK, in July 2012. The 16 long papers, 6 short papers and 21 poster abstracts presented were carefully reviewed and selected from 83 submissions. The papers are organized in keynotes, tutorial, workshops, graduate student symposium and topical sections on psychological and cognitive issues, diagram layout, diagrams and data analysis, Venn and Euler diagrams, reasoning with diagrams, investigating aesthetics, applications of diagrams.
Back in 1983 I was chatting with Dick Coleman, publisher of Traffic World magazine, when he unexpectedly proposed that I write a column for the magazine on computer applications in the transportation/physical distribution industry. "But, Dick, I don't know all that much about computers," I protested. "You use one, don't you?" he asked logically. Yes, I did; I'd been running my consulting business with it for two years. But that didn't, I explained, make me an expert. "Think about it," he said. That's typical Coleman; he drops these studiedly casual ideas and just lets them lay there until you pick them up and wind up doing just what he wanted you to do all along. Sure enough, the longer I pondered the notion the more it appealed to me. OK, I wasn't a computer expert (I'm still not). But I was a computer user, in the transportation/distribution field; maybe from that perspective I might have some useful things to say to other transportation/distribution users and would-be users of computers. Thus was born the "Computer Software for Transportation" column. The first one appeared in the April 11, 1983, issue of Traffic World, and it's been a once-a-month schedule ever since. And thus, too, was ultimately born this book.
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.
This book constitutes the thoroughly refereed post-workshop proceedings of the First IAPR TC3 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction (MPRSS2012), held in Tsukuba, Japan in November 2012, in collaboration with the NLGD Festival of Games. The 21 revised papers presented during the workshop cover topics on facial expression recognition, audiovisual emotion recognition, multimodal Information fusion architectures, learning from unlabeled and partially labeled data, learning of time series, companion technologies and robotics.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011. The 20 revised full papers presented along with 8 short papers were carefully reviewed and selected from numerous submissions in total and cover a wide range of topics including social media analysis, knowledge integration and EPR, personalisation and patient support systems, early warning systems and mobile monitoring, games and learning, security, privacy and prevention, online support for professionals and patients, agents in eHealth, online communities of practice, eHealth solutions, social media surveillance, and communication and data integration.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software. The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand
The First Conference on the History of Nordic Computing (HiNC1) was organized in Trondheim, in June 2003. The HiNC1 event focused on the early years of computing, that is the years from the 1940s through the 1960s, although it formally extended to year 1985. In the preface of the proceedings of HiNC1, Janis Bubenko, Jr. , John Impagliazzo, and Arne Solvberg describe well the peculiarities of early Nordic c- puting [1]. While developing hardware was a necessity for the first professionals, quite soon the computer became an industrial product. Computer scientists, among others, grew increasingly interested in programming and application software. P- gress in these areas from the 1960s to the 1980s was experienced as astonishing. The developments during these decades were taken as the focus of HiNC2. During those decades computers arrived to every branch of large and medium-sized businesses and the users of the computer systems were no longer only computer s- cialists but also people with other main duties. Compared to the early years of comp- ing before 1960, where the number of computer projects and applications was small, capturing a holistic view of the history between the 1960s and the 1980s is conside- bly more difficult. The HiNC2 conference attempted to help in this endeavor.
This book constitutes selected papers from the lectures given at the workshops held in conjunction with the User Modeling, Adaptation and Personalization Conference, UMAP 2011, Girona, Spain, in July 2011. The 40 papers presented were carefully reviewed and selected for inclusion in this book. For each workshop there is an overview paper summarizing the workshop themes, the accepted contributions and the future research trends. In addition the volume presents a selection of the best poster papers of UMAP 2011. The workshops included are: AST, adaptive support for team collaboration; AUM, augmenting user models with real worlds experiences to enhance personalization and adaptation; DEMRA, decision making and recommendation acceptance issues in recommender systems; PALE, personalization approaches in learning environments; SASWeb, semantic adaptive social web; TRUM, trust, reputation and user modeling; UMADR, user modeling and adaptation for daily routines: providing assistance to people with special and specific needs; UMMS, user models for motivational systems: the affective and the rational routes to persuasion.
This book constitutes the thoroughly refereed proceedings of the First International Workshop on the Theory and Applications of Formal Argumentation, TAFA 2011, held in Barcelona, Spain, in Juli 2011, as a workshop at IJCAI 2011, the 22nd International Joint Conference on Artificial Intelligence. The 9 revised full papers presented together with 8 revised poster papers were carefully selected during two rounds of reviewing and improvement from 32 initial submissions. The workshop promotes and fosters uptake of argumentation as a viable AI paradigm with wide ranging application, and provides a forum for further development of ideas and the initiation of new and innovative collaborations. The papers cover the following topics: properties of formal models of argumentation; instantiations of abstract argumentation frameworks; relationships among different argumentation frameworks; practical applications of formal models of argumentation; argumentation and other artificial intelligence techniques; evaluation of formal models of argumentation; validation and evaluation of applications of argumentation.
Welcome to the 5th International Conference on Open Source Systems! It is quite an achievement to reach the five-year mark - that's the sign of a successful enterprise. This annual conference is now being recognized as the primary event for the open source research community, attracting not only high-quality papers, but also building a community around a technical program, a collection of workshops, and (starting this year) a Doctoral Consortium. Reaching this milestone reflects the efforts of many people, including the conference founders, as well as the organizers and participants in the previous conferences. My task has been easy, and has been greatly aided by the hard work of Kevin Crowston and Cornelia Boldyreff, the Program Committee, as well as the Organizing Team led by Bjoern Lundell. All of us are also grateful to our attendees, especially in the difficult economic climate of 2009. We hope the participants found the conference valuable both for its technical content and for its personal networking opportunities. To me, it is interesting to look back over the past five years, not just at this conference, but at the development and acceptance of open source software. Since 2004, the business and commercial side of open source has grown enormously. At that time, there were only a handful of open source businesses, led by RedHat and its Linux distribution. Companies such as MySQL and JBoss were still quite small.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Green Communication and Networking (GreeNets 2011), held in Colmar, France, on October 5-7, 2011. The 16 revised full papers presented were carefully selected and reviewed from numerous submissions and explain the scope and challenges of designing, building, and deploying GreeNets. In this regard, the conference aims to establish a forum to bring together research professionals from diverse fields including green mobile networks, system architectures, networking & communication protocols, applications, test-bed and prototype, traffic balance and energy-efficient cooperation transmission, system and application issues related to GreenNets. |
![]() ![]() You may like...
Transactions of the Royal Society of…
Royal Society of South Australia
Paperback
R943
Discovery Miles 9 430
Web-Based Services - Concepts…
Information Reso Management Association
Hardcover
R18,334
Discovery Miles 183 340
|