![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
The application of new computational techniques and visualisation technologies in the Arts and Humanities are resulting in fresh approaches and methodologies for the study of new and traditional corpora. This 'computational turn' takes the methods and techniques from computer science to create innovative means of close and distant reading. This book discusses the implications and applications of 'Digital Humanities' and the questions raised when using algorithmic techniques. Key researchers in the field provide a comprehensive introduction to important debates surrounding issues such as the contrast between narrative versus database, pattern-matching versus hermeneutics, and the statistical paradigm versus the data mining paradigm. Also discussed are the new forms of collaboration within the Arts and Humanities that are raised through modular research teams and new organisational structures, as well as techniques for collaborating in an interdisciplinary way.
This book constitutes the refereed proceedings of the 12 International Conference on Product-Focused Software Process Improvement, PROFES 2011, held in Torre Canne, Italy, in June 2011. The 24 revised full papers presented together with the abstracts of 2 keynote addresses were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections on agile and lean practices, cross-model quality improvement, global and competitive software development, managing diversity, product and process measurements, product-focused software process improvement, requirement process improvement, and software process improvement.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Wireless and Mobile Communication in Healthcare, MobiHealth 2010, held in Ayia Napa, Cyprus, in October 2010. The 33 papers in this volume describe various applications of information and communication technologies in healthcare and medicine and cover a wide range of topics such as intelligent public health monitoring services, mobile health technologies, signal processing techniques for monitoring services, wearable biomedical devices, ambient assistive technologies, emergency and disaster applications, and integrated systems for chronic monitoring and management.
This book constitutes the refereed proceedings of the 10th
International Symposium, PETS 2011, held in Waterloo, Canada, in
July 2011.
This book constitutes the refereed proceedings of the 16th International Conference on Applications of Natural Language to Information Systems, held in Alicante, Spain, in June 2011. The 11 revised full papers and 11 revised short papers presented together with 23 poster papers, 1 invited talk and 6 papers of the NLDB 2011 doctoral symposium were carefully reviewed and selected from 74 submissions. The papers address all aspects of Natural Language Processing related areas and present current research on topics such as natural language in conceptual modeling, NL interfaces for data base querying/retrieval, NL-based integration of systems, large-scale online linguistic resources, applications of computational linguistics in information systems, management of textual databases NL on data warehouses and data mining, NLP applications, as well as NL and ubiquitous computing.
This book constitutes the refereed proceedings of the 7th
International Conference on Information Security Practice and
Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
The two-volume set LNCS 6769 + LNCS 6770 constitutes the proceedings of the First International Conference on Design, User Experience, and Usability, DUXU 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences. A total of 4039 contributions was submitted to HCII 2011, of which 1318 papers were accepted for publication. The total of 154 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on DUXU theory, methods and tools; DUXU guidelines and standards; novel DUXU: devices and their user interfaces; DUXU in industry; DUXU in the mobile and vehicle context; DXU in Web environment; DUXU and ubiquitous interaction/appearance; DUXU in the development and usage lifecycle; DUXU evaluation; and DUXU beyond usability: culture, branding, and emotions.
This book constitutes the thoroughly refereed post-workshop proceedings of the 9th International Conference on Web-Based Learning, ICWL 2010, held in Shanghai, China, in December 2010. The 36 revised full papers and 8 short papers presented were carefully reviewed and selected from 192 submissions. They deal with topics such as e-learning platforms and tools, technology enhanced learning, Web-based learning for oriental languages, mobile/situated e-learning, learning resource deployment, organization and management, design, model and framework of e-learning systems, e-learning metadata and standards, collaborative learning and game-based learning, as well as practice and experience sharing, and pedagogical issues.
This book constitutes the refereed proceedings of the 5th
International Conference on Information Theoretic Security, held in
Amsterdam, The Netherlands, in May 2011.
This book constitutes the refereed proceedings of the 17th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2011, held in Essen, Germany, in March 2011. The 10 revised full papers and the 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in seven topical sections on security and sustainability; process improvement and requirements in context; elicitation; models; services; embedded and real-time systems; and prioritization and traceability.
Simplicity in nature is the ultimate sophistication. The world's magnificence has been enriched by the inner drive of instincts, the profound drive of our everyday life. Instinct is an inherited behavior that responds to environmental stimuli. Instinctive computing is a computational simulation of biological and cognitive instincts, which influence how we see, feel, appear, think and act. If we want a computer to be genuinely secure, intelligent, and to interact naturally with us, we must give computers the ability to recognize, understand, and even to have primitive instincts. This book, Computing with Instincts, comprises the proceedings of the Instinctive Computing Workshop held at Carnegie Mellon University in the summer of 2009. It is the first state-of-the-art survey on this subject. The book consists of three parts: Instinctive Sensing, Communication and Environments, including new experiments with in vitro biological neurons for the control of mobile robots, instinctive sound recognition, texture vision, visual abstraction, genre in cultures, human interaction with virtual world, intuitive interfaces, exploitive interaction, and agents for smart environments.
This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011. The 24 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers were arranged into seven sessions covering passive measurement, wireless models, bandwidth, automated bots, route avoidance, interdomain protocols, timing, and diagnosis.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011. The 48 papers and 3 keynotes presented in this volume were carefully reviewed and selected from 88 submissions. The papers cover a wide range of topics including social network analysis; modeling; machine learning and data mining; social behaviors; public health; cultural aspects; and effects and search.
This book constitutes the refereed proceedings of the International Conference on Advances in Information Technology and Mobile Communication, AIM 2011, held at Nagpur, India, in April 2011. The 31 revised full papers presented together with 27 short papers and 34 poster papers were carefully reviewed and selected from 313 submissions. The papers cover all current issues in theory, practices, and applications of Information Technology, Computer and Mobile Communication Technology and related topics.
We are very pleased to introduce Open Source Development, Communities and Quality. The International Conference on Open Source Systems has come to its fourth edition - OSS 2008. Now, Free, Libre, and Open Source software is by all means now one of the most relevant subjects of study in several disciplines, ranging from information technology to social sciences and including also law, business, and political sciences. There are several conference tracks devoted to open source software with several publications appearing in high quality journals and magazines. OSS 2008 has been organized with the purpose of being the reference venue for those working in this area, being the most prominent conference in this area. For this th reason OSS 2008 has been located within the frameworks of the 20 World Computer Congress, WCC 2008, in Milan, the largest event of IFIP in 2008. We believe that this conference series, and the IFIP working group it represents, can play an important role in meeting these challenges, and hope that this book will become a valuable contribution to the open source body of research.
This book constitutes the proceedings of the Second International Conference on Security-Enriched Urban Computing and Smart Grid, held in Hualien, Taiwan, in September 2011. The 35 revised full papers presented together with two invited papers were carefully reviewed and selected from 97 submissions. Among the topics covered are the internet of things, mobile networks, wireless networks, service-oriented computing, data-centric computing, voice over IP, cloud computing, privacy, smart grid systems, distributed systems, agent-based systems, assistive technology, social networks, and wearable computing.
This book constitutes the refereed proceedings of the 17th EUNICE 2011 Workshop on energy-aware communications, held in Dresden, in September 2011. The proceedings comprise 16 full papers and 7 poster papers which are presented together with the abstracts of the 3 invited talks. The topics covered are: network architectures; ad-hoc and wireless networks; system simulation; network planning, optimization, and migration; traffic engineering; quality of experience; and energy efficient architectures.
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010. The 11 revised full papers presented were carefully reviewed and selected from 21 submissions. The papers range from data privacy to security applications, focusing on detecting malicious behavior in computer systems.
Big data, surveillance, crisis management. Three largely different and richly researched fields, however, the interplay amongst these three domains is rarely addressed. In this enlightening title, the link between these three fields is explored in a consequential order through a variety of contributions and series of unique and international case studies. Indeed, whilst considering crisis management as an "umbrella term" that covers a number of crises and ways of managing them, the reader will also explore the collection of "big data" by governmental crisis organisations. However, this volume also addresses the unintended consequences of using such data. In particular, through the lens of surveillance, one will also investigate how the use and abuse of big data can easily lead to monitoring and controlling the behaviour of people affected by crises. Thus, the reader will ultimately join the authors in their debate of how big data in crisis management needs to be examined as a political process involving questions of power and transparency. An enlightening and highly topical volume, Big Data, Surveillance and Crisis Management will appeal to postgraduate students and postdoctoral researchers interested in fields including Sociology and Surveillance Studies, Disaster and Crisis Management, Media Studies, Governmentality, Organisation Theory and Information Society Studies.
While artificial intelligence (AI), robots, bio-technologies and digital media are transforming work, culture, and social life, there is little understanding of or agreement about the scope and significance of this change. This new interpretation of the 'great transformation' uses history and evolutionary theory to highlight the momentous shift in human consciousness taking place. Only by learning from recent crises and rejecting technological determinism will governments and communities redesign social arrangements that ensure we all benefit from the new and emerging technologies. The book documents the transformations under way in financial markets, entertainment, and medicine, affecting all aspects of work and social life. It draws on historical sociology and co-evolutionary theory arguing that the radical evolution of human consciousness and social life now under way is comparable with, if not greater than, the agrarian revolution (10000 BCE), the explosion of science, philosophy, and religion in the Axial Age (600 BCE), and the recent Industrial Revolution. Turning to recent major socio-economic crisis, and asking what can be learnt from them, the answer is we cannot afford this time around to repeat the failures of elites and theoretical systems such as economics to attend appropriately to radical change. We need to think beyond the constraints of determinist and reductionist explanations and embrace the idea of deep freedom. This book will appeal to educators, social scientists, policy-makers, business leaders, and students. It concludes with social design principles that can inform deliberative processes and new social arrangements that ensure everyone benefits from the affordances of the new and emerging technologies.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011. The 49 papers included in the second volume are organized in topical sections on health, human factors, interacting in public spaces, interacting with displays, interaction design for developing regions, interface design, international and culural aspect of HCI, interruptions and attention, mobile interfaces, multi-modal interfaces, multi-user interaction/cooperation, and navigation and wayfinding.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011. The 46 papers included in the third volume are organized in topical sections on novel user interfaces and interaction techniques, paper 2.0, recommender systems, social media and privacy, social networks, sound and smell, touch interfaces, tabletops, ubiquitous and context-aware computing, UI modeling, and usability.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011. The fourth volume includes 27 regular papers organized in topical sections on usable privacy and security, user experience, user modelling, visualization, and Web interaction, 5 demo papers, 17 doctoral consortium papers, 4 industrial papers, 54 interactive posters, 5 organization overviews, 2 panels, 3 contributions on special interest groups, 11 tutorials, and 16 workshop papers.
This is a book about creating information systems within firms that will truly give managers the information they need to make informed business decisions. The author contends that information is part of an ecological system in which it undergoes a process of evolution and adaptation to the requirements of the local users. The book explains ecological planning tools that guide managers to develop information systems to meet their changing needs. |
![]() ![]() You may like...
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,780
Discovery Miles 37 800
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,952
Discovery Miles 29 520
Using Computational Intelligence for the…
Romil Rawat, Upinder Kaur, …
Hardcover
R6,852
Discovery Miles 68 520
|