![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Mobile phones are the most ubiquitous communications technology in the world. Besides transforming the way in which we communicate, they can also be used as a powerful tool for conflict prevention and management. This book presents innovative uses of mobile technologies in the areas of early warning, disaster and humanitarian relief, governance, citizens' participation, etc. and cuts across different regions. The book brings together experts and practitioners from different fields-mobile technologies, information systems, computer sciences, online dispute resolution, law, etc.-to reflect on present experiences and to explore new areas for research on conflict management and online dispute resolution (ODR). It also reflects on the transition from present ODR to future mobile Dispute Resolution and discusses key privacy issues. The book is addressed to anyone involved in conflict prevention and dispute management aiming to learn how mobile technologies can play a disruptive role in the way we deal with conflict.
This book provides a critical assessment of progress towards the Information Society. Drawing upon unique empirical data, this book lays the foundation for more useful theories of the process of change, and more effective strategies and policies for increasing the benefits from the Information Society. The authors provide insights into the social, economic, and political forces that are structuring the pathway to the Information Society-and its consequences for business and individuals in their everyday lives.
The dual goal of the "Handbook in Information Systems" is to provide a reference for the diversity of research in the field by scholars from many disciplines, as well as to stimulate new research. This volume, focusing on Information Assurance, Security and Privacy Services, consists of six sections. In the first part contributors discuss Program Security, Data Security and Authentication, while the second section covers Internet Scourges and Web Security. Parts two and three concentrate on Usable Security and Human-Centric Aspects, along with Security, Privacy and Access Control whereas the final sections of the book examine Economic Aspects of Security, and Threat Modeling, Intrusion and Response.
This book provides a detailed discussion of the theoretical and practical implications of the change driven by ICTs. Such a change is often much more profound than an emphasis on information technology and society can capture, for not only does it bring about ethical and policy vacuums that call for a new understanding of ethics, politics and law, but it also "re-ontologizes reality", as propounded by Luciano Floridi's philosophy and ethics of information. The informational turn is transforming our understanding of reality by challenging the conventional ways we have of thinking about our world and our identities in terms of stable and enduring structures and beliefs. The information age we inhabit brings to completion our self-understanding as informational systems that produce, process, and exchange information with other informational systems, in an environment that is itself made up of information. The present volume provides us with a better understanding of the normative nature and role of information, helping us to grasp the sense and extent to which informational resources serve as "constraining affordances" guiding our behaviours. It does so by delineating the background against which we build our beliefs about reality, make decisions, and behave, through our interactions with a multi-agent system that is increasingly dependent on ICTs. The book will be of interest to a vast audience, ranging from information technologists, ethicists, policy makers, social and legal scholars, and all those willing to embrace the following three tenets: we construct our world and ourselves informationally; by constructing our world and ourselves we thereby become aware of our limits; it is precisely these limits that make us become human beings.
Covering key areas of evaluation and methodology, client-side applications, specialist and novel technologies, along with initial appraisals of disabilities, this important book provides comprehensive coverage of web accessibility. Written by leading experts in the field, it provides an overview of existing research and also looks at future developments, providing a much deeper insight than can be obtained through existing research libraries, aggregations, or search engines.
This book provides rare insights into the nature of contemporary, technologically-facilitated government. Its multidisciplinary approach demonstrates that information technology is more than a tool for politicians and policy-makers. E-government has reconfigured public administration, policy, power and citizenship.
Information and Communication Technologies - Visions and Realities, based on Britain's Programme on Information and Communication Technologies (PICT), illuminates the social and economic implications of the digital revolution. The thirty contributors include such leading scholars as Walter Baer, Jay Blumler, Peter Cochrane, Rod Coombes, Bill Dutton, Chris Freeman, Nicholas Garnham, John Goddard, Kenneth Kraemer, Donald MacKenzie, Robin Mansell, Bill melody, Roger Silverstone, Robin Williams, and Steve Woolgar.
This book provides perspectives on how South Asian -- often, more specifically, Indian -- diasporas inhabit techno-mediated environments through their economic and socio-cultural activities. The themes examined include religion, caste, language, and gender in online communities and call centers, and the roles of these factors in the global economy, Bollywood online and offline, digital music, websites for arranging marriages, and so on. The book attempts to map -South Asia in relation to global technospaces produced through and as a consequence of economic globalization efforts."
th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.
The book describes the main directions for the development of the digital society. The author angles its book to those who are interested to know what would replace search engines, and how social networks would evolve; what profit can be made of different forms of informational collaboration (crowdsourcing, collaborative filtering). And, the main thing, how it will influence the structure of the society and human pursuit for happiness. The author does not confine himself to a theory, he sets and solves practical questions: How talent, success and "stardom" are interconnected, how to make money in social networks, what is the business model for the development of entertainment and media, how to measure cultural values, and what is the subjective time of the individual and how to make it qualitative? There have been no answers to these questions before. Internet and social networks have provided tools and data that Alexander Dolgin was the first to use in economics.
This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.
This work addresses the challenge of providing effective cutaneous haptic feedback in robotic teleoperation, with the objective of achieving the highest degree of transparency whilst guaranteeing the stability of the considered systems. On the one hand, it evaluates teleoperation systems that provide only cutaneous cues to the operator, thus guaranteeing the highest degree of safety. This cutaneous-only approach shows intermediate performance between no force feedback and full haptic feedback provided by a grounded haptic interface, and it is best suitable for those scenarios where the safety of the system is paramount, e.g., robotic surgery. On the other hand, in order to achieve a higher level of performance, this work also investigates novel robotic teleoperation systems with force reflection able to provide mixed cutaneous and kinesthetic cues to the operator. Cutaneous cues can compensate for the temporary reduction of kinesthetic feedback necessary to satisfy certain stability conditions. This state-of-the-art volume is oriented toward researchers, educators, and students who are interested in force feedback techniques for robotic teleoperation, cutaneous device design, cutaneous rendering methods and perception studies, as well as readers from different disciplines who are interested in applying cutaneous haptic technologies and methods to their field of interest.
This volume presents a collection of carefully selected contributions in the area of social media analysis. Each chapter opens up a number of research directions that have the potential to be taken on further in this rapidly growing area of research. The chapters are diverse enough to serve a number of directions of research with Sentiment Analysis as the dominant topic in the book. The authors have provided a broad range of research achievements from multimodal sentiment identification to emotion detection in a Chinese microblogging website. The book will be useful to research students, academics and practitioners in the area of social media analysis.
This fascinating work explores the meaning of death in the digital age, showing readers the new ways digital technology allows humans to approach, prepare for, and handle their ultimate destiny. With DeadSocial (TM) one can create messages to be published to social networks after death. Facebook's "If I Die" enables users to create a video or text message for posthumous publication. Twitter _LIVESON accounts will keep tweeting even after the user is gone. There is no doubt that the digital age has radically changed options related to death, dying, grieving, and remembering, allowing people to say goodbye in their own time and their own unique way. Drawing from a range of academic perspectives, this book is the only serious study to focus on the ways in which death, dying, and memorialization appear in and are influenced by digital technology. The work investigates phenomena, devices, and audiences as they affect mortality, remembrances, grieving, posthumous existence, and afterlife experience. It examines the markets to which the providers of such services are responding, and it analyzes the degree to which digital media is changing views and expectations related to death. Ultimately, the contributors seek to answer an even more important question: how digital existences affect both real-world perceptions of life's end and the way in which lives are actually lived. Explains how new technologies and online accessibility are changing human attitudes to death and dying-and impacting the ways in which people live Explores the afterlife experience as it can play out in a variety of digital media, including Facebook and other social media, World of Warcraft and video games, YouTube and other video services, and Internet memorials Analyzes the myriad ways encounters with death and dying and the capacity for mourning are mediated by new technologies Places death and dying in the digital age in historical perspective, showing how beliefs about and approaches to death and dying have changed constantly over time
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increasingly advanced, in some cases modifying fundamental brain function. Today, comparatively low-tech implants are being increasingly employed in non-therapeutic contexts, with applications ranging from the use of ICT implants for VIP entry into nightclubs, automated payments for goods, access to secure facilities and for those with a high risk of being kidnapped. Commercialisation and growing potential of human ICT implants have generated debate over the ethical, legal and social aspects of the technology, its products and application. Despite stakeholders calling for greater policy and legal certainty within this area, gaps have already begun to emerge between the commercial reality of human ICT implants and the current legal frameworks designed to regulate these products. This book focuses on the latest technological developments and on the legal, social and ethical implications of the use and further application of these technologies.
This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.
This collection of original essays brings together contributors from both sides of the Atlantic to discuss the implications of the new media for the creation, delivery and assessment of English studies. Strategies by which digital technologies can serve professional, scholarly and pedagogical needs in a completely new way are explored in the context of the role and mission of humanities in the electronic age, student learning from a distance, teaching e-lit, electronic tutorials and interdisciplinarity and collaboration in a virtual environment. Including a useful Glossary of Terms and lists of Further Reading and Key Individuals in the field, this will be an essential volume for all teachers of English Studies.
This book brings together the reflections of independent researchers from around the world. Sixteen authors from fourteen countries present their views on the use of information and communication technology (ICT) in education, offering valuable insights through the examination of current issues relevant to the future of education. What will education be in tomorrow's world? How can ICT be used without rendering education a purely technical process? How can we succeed the renovation of educational subjects without transforming them into technical objects? The introductory chapter of this publication guides us into the essays through a classification organized by the editors to illustrate different attitudes to technologies: * The 'Globalizers' see the integration of ICT and education as a means of enhancing the competitiveness of their society in a global economy; * The 'Reformists' see it as a means of bringing about significant change in didactics in the various disciplines, and even in the 'basics' of education; * The 'Humanists' consider technologies as possible catalysts for changing the aims and values of education from learni- oriented to humanistic; * The 'Heretic' sees values and aims as being determined exclusively by technology, and economy and culture as s- products of the technology-guided process. He therefore does not see any sense in interrogations as to which aims should guide us in integrating technology with education. Obviously, some arguments stretch across all four categories without completely matching any so-called type.
This book provides a much-needed analysis of the current research in the global epidemic of electronic bullying. Scholars and professionals from the Americas, Europe, and Asia offer data, insights, and solutions, acknowledging both the social psychology and technological contexts underlying cyberbullying phenomena. Contributors address questions that are just beginning to emerge as well as longstanding issues concerning family and gender dynamics, and provide evidence-based prevention and intervention strategies for school and home. The global nature of the book reflects not only the scope and severity of cyberbullying, but also the tenacity of efforts to control and eradicate the problem. Included in the coverage: * Gender issues and cyberbullying in children and adolescents: from gender differences to gender identity measures. * Family relationships and cyberbullying. * Examining the incremental impact of cyberbullying on outcomes over and above traditional bullying in North America. * A review of cyberbullying and education issues in Latin America. * Cyberbullying prevention from child and youth literature. * Cyberbullying and restorative justice. Cyberbullying across the Globe is an essential resource for researchers, graduate students, and other professionals in child and school psychology, public health, social work and counseling, educational policy, and family advocacy.
What exactly do policymakers and journalists mean when they refer to the "information age"? What bearing do the "problems" they describe and the "solutions" they offer have on current global realities? Specifically, what does the Euro-American concept of intellectual property mean in a global context? Why is the idea of electronic commerce so difficult to "export"? These questions which clearly identify issues of crucial importance for the coming decades of human history are given full weight, stripped of ideology, in this book, based on the papers presented at a seminar sponsored by the Macau Institute of European Studies (IEEM) in June 2000. Although there are no clear answers, the accounts and analyses presented here provide a wealth of detail that comes as close as we can expect at this date to the facts of the case. The focus is on East Asia, Greater China in particular, an area which (most social theorists agree) offers the most revealing social context for the examination of emerging global trends in this field.
In our modern information societies, we not only use and welcome computers; we are highly dependent upon them. There is a downside of this kind of progress, however. Computers are not 100% reliable. They are insecure. They are vulnerable to attackers. They can either be attacked directly, to disrupt their services, or they can be abused in clever ways to do the bidding of an attacker as a dysfunctional user. Decision-makers and experts alike always struggle with the amount of interdisciplinary knowledge needed to understand the nuts and bolts of modern information societies and their relation to security, the implications of technological or political progress or the lack thereof. This holds in particular for new challenges to come. These are harder to understand and to categorize; their development is difficult to predict. To mitigate this problem and to enable more foresight, The Secure Information Society provides an interdisciplinary spotlight onto some new and unfolding aspects of the uneasy relationship between information technology and information society, to aid the dialogue not only in its current and ongoing struggle, but to anticipate the future in time and prepare perspectives for the challenges ahead. |
You may like...
Global Health Informatics - How…
Heimar Marin, Eduardo Massad, …
Paperback
R1,872
Discovery Miles 18 720
Emerging Technologies - Ethics, Law and…
Gary E Marchant, Wendell Wallach
Hardcover
R9,337
Discovery Miles 93 370
|