![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
In this book readers will find technological discussions on the existing and emerging technologies across the different stages of the big data value chain. They will learn about legal aspects of big data, the social impact, and about education needs and requirements. And they will discover the business perspective and how big data technology can be exploited to deliver value within different sectors of the economy. The book is structured in four parts: Part I "The Big Data Opportunity" explores the value potential of big data with a particular focus on the European context. It also describes the legal, business and social dimensions that need to be addressed, and briefly introduces the European Commission's BIG project. Part II "The Big Data Value Chain" details the complete big data lifecycle from a technical point of view, ranging from data acquisition, analysis, curation and storage, to data usage and exploitation. Next, Part III "Usage and Exploitation of Big Data" illustrates the value creation possibilities of big data applications in various sectors, including industry, healthcare, finance, energy, media and public services. Finally, Part IV "A Roadmap for Big Data Research" identifies and prioritizes the cross-sectorial requirements for big data research, and outlines the most urgent and challenging technological, economic, political and societal issues for big data in Europe. This compendium summarizes more than two years of work performed by a leading group of major European research centers and industries in the context of the BIG project. It brings together research findings, forecasts and estimates related to this challenging technological context that is becoming the major axis of the new digitally transformed business environment.
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge. This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community. This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.
This book constitutes the refereed proceedings of the Third International Conference on Love and Sex with Robots, LSR 2017, held in December 2017, in London, UK. The 12 revised papers presented together with 2 keynotes were carefully reviewed and selected from a total of 83 submissions. One of the biggest challenges of the Love and Sex with Robots conference is to engage a wider scientific community in the discussions of the multifaceted topic, which has only recently established itself as an academic research topic within, but not limited to, the disciplines of artificial intelligence, human-computer interaction, robotics, biomedical science and robot ethics etc.
This book constitutes the refereed conference proceedings of the 14th International Conference on Advances in Computer Entertainment Technology, ACE 2017, held in London, UK, in December 2017. The 59 full papers presented were selected from a total of 229 submissions. ACE is by nature a multi-disciplinary conference, therefore attracting people across a wide spectrum of interests and disciplines including computer science, design, arts, sociology, anthropology, psychology, and marketing. The main goal is to stimulate discussion in the development of new and compelling entertainment computing and interactive art concepts and applications. The chapter 'eSport vs irlSport' is open access under a CC BY 4.0 license via link.springer.com.
How is technology changing the way people remember? This book explores the interplay of memory stored in the brain (internal memory) and outside of the brain (external memory), providing a thorough interdisciplinary review of the current literature, including relevant theoretical frameworks from across a variety of disciplines in the sciences, arts, and humanities. It also presents the findings of a rich and novel empirical data set, based on a comprehensive survey on the shifting interplay of internal and external memory in the 21st century. Results reveal a growing symbiosis between the two forms of memory in our everyday lives. The book presents a new theoretical framework for understanding the interplay of internal and external memory, and their complementary strengths. It concludes with a guide to important dimensions, questions, and methods for future research. Memory and Technology will be of interest to researchers, professors, and students across the disciplines of psychology, philosophy, library and information science, human factors, media and cultural studies, anthropology and archaeology, photography, and cognitive rehabilitation, as well as anyone interested in how technology is affecting human memory. _____ "This is a novel book, with interesting and valuable data on an important, meaningful topic, as well as a gathering of multidisciplinary and interdisciplinary ideas...The research is accurately represented and inclusive. As a teaching tool, I can envision graduate seminars in different disciplines drawing on the material as the basis for teaching and discussions." Dr. Linda A. Henkel, Fairfield University "This book documents the achievements of a vibrant scientific project - you feel the enthusiasm of the authors for their research. The organization of the manuscript introduces the reader into a comparatively new field the same way as pioneering authors have approached it." Prof. Dr. Wolfgang Schoenpflug, Freie Universitat Berlin
This book discusses key ethical and deontological problems concerning the use of the most common information and communication devices. It focuses on the challenges of the new environments we now find ourselves in thanks to these technologies, and the issues arising from the newly established relationship between the virtual sphere and the real world. Each aspect is analysed by starting from a very specific example or a case study presenting a dilemma that can only be resolved by making a reasoned ethical choice. Rather than thematically addressing only one of the many aspects mentioned above (for example, computer ethics or social network ethics), the book presents a comprehensive introduction to, and a co-ordinated overview of, the various deontological and ethical issues regarding the spread of the most common information and communication technologies.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
This book is a valuable resource for the increasing body of researchers and practitioners in the field of geospatial technologies. Written by leading researchers and experts it is designed in such a way that technical achievements and challenges of geospatial computing applications are followed by various applications developed for society. As such, they serve as a bridge between technologists and solution developers, which is critical in the context of developing countries. There have been significant advances in geospatial technologies in India in the last decade, including advances in spatial data infrastructures, geocomputation and spatial databases, and innovative applications in natural resource development. Ranging from LIDAR standards, to data integration using ontologies, and mobile computing, such progress enhances the utility of the technology for both urban and rural development. This book discusses these achievements and considers the way forward.
Cyber-risks are moving targets and societal responses to combat cyber-victimization are often met by the distrust of young people. Drawing on original research, this book explores how young people define, perceive, and experience cyber-risks, how they respond to both the messages they are receiving from society regarding their safety online, and the various strategies and practices employed by society in regulating their online access and activities. This book complements existing quantitative examinations of cyberbullying assessing its extent and frequency, but also aims to critique and extend knowledge of how cyber-risks such as cyberbullying are perceived and responded to. Following a discussion of their methodology and their experiences of conducting research with teens, the authors discuss the social network services that teens are using and what they find appealing about them, and address teens' experiences with and views towards parental and school-based surveillance. The authors then turn directly to areas of concern expressed by their participants, such as relational aggression, cyberhacking, privacy, and privacy management, as well as sexting. The authors conclude by making recommendations for policy makers, educators and teens - not only by drawing from their own theoretical and sociological interpretations of their findings, but also from the responses and recommendations given by their participants about going online and tackling cyber-risk. One of the first texts to explore how young people respond to attempts to regulate online activity, this book will be key reading for those involved in research and study surrounding youth crime, cybercrime, youth culture, media and crime, and victimology - and will inform those interested in addressing youth safety online how to best approach what is often perceived as a sensitive and volatile social problem.
What can a WWII-era tank teach us about design? What does a small, blue flower tell us about audiences? What do drunk, French marathon-runners show us about software? In 40+ chapters and stories, you will learn the ways in which UX has influenced history and vice versa, and how it continues to change our daily lives. This book enables you to participate fully in discussions about UX, as you discover the fundamentals of user experience design and research. Rather than grasp concepts through a barrage of facts and figures, you will learn through stories. Poisonous blowfish, Russian playwrights, tiny angels, Texas sharpshooters, and wilderness wildfires all make an appearance. From Chinese rail workers to UFOs, you will cover a lot of territory, because the experiences that surround you are as broad and varied as every age, culture, and occupation. You will start by covering the principles of UX before going into more diverse topics, including: being human, the art of persuasion, and the murky waters of process. Every day, people gather around conference tables, jump onto phone calls, draw on whiteboards, stare at computer monitors, and try to build things - we all create. Increasingly, what we create is something digital. From apps to web sites, and from emails to video games, often the sole evidence of an experience appears on an illuminated screen. We design tiny worlds that thrive or perish at the whim of a device's on/off button. With this book you will be ready. What You'll Learn Master the fundamentals of UX Acquire the skills to participate intelligently in discussions about UX design and research Understand how UX impacts business, including product, pricing, placement, and promotion as well as security, speed, and privacy Who This Book Is For Professionals who work alongside UX designers and researchers, including but not limited to: project managers, graphic designers, copyeditors, developers, and human resource professionals; and business, marketing, and computer science students seeking to understand how UX affects human cognition and memory, product pricing and promotion, and software security and privacy.
This book examines the fundamental question of how legislators and other rule-makers should handle remembering and forgetting information (especially personally identifiable information) in the digital age. It encompasses such topics as privacy, data protection, individual and collective memory, and the right to be forgotten when considering data storage, processing and deletion. The authors argue in support of maintaining the new digital default, that (personally identifiable) information should be remembered rather than forgotten. The book offers guidelines for legislators as well as private and public organizations on how to make decisions on remembering and forgetting personally identifiable information in the digital age. It draws on three main perspectives: law, based on a comprehensive analysis of Swiss law that serves as an example; technology, specifically search engines, internet archives, social media and the mobile internet; and an interdisciplinary perspective with contributions from various disciplines such as philosophy, anthropology, sociology, psychology, and economics, amongst others.. Thanks to this multifaceted approach, readers will benefit from a holistic view of the informational phenomenon of "remembering and forgetting". This book will appeal to lawyers, philosophers, sociologists, historians, economists, anthropologists, and psychologists among many others. Such wide appeal is due to its rich and interdisciplinary approach to the challenges for individuals and society at large with regard to remembering and forgetting in the digital age.
This book constitutes the refereed proceedings of the Second International Conference on Digital Transformation and Global Society, DTGS 2017, held in St. Petersburg, Russia, in June 2017. The 34 revised full papers and three revised short papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on eSociety: social media analysis; eSociety: ICTs in education and science; eSociety: legal, security and usability issues; ePolity: electronic governance and electronic participation; ePolity: politics of cyberspace; eCity: urban planning and smart cities; eHealth: ICTs in public health management; eEconomy and eFinance: finance and knowledge management.
This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.
How best can we understand why the application of information and communication technology in organizations succeeds or fails? Calling on technical, organisational, social, psychological and economic perspectives, this book provides a fresh and comprehensive framework for answering this question. Consideration is given to how ICT is adopted, implemented and used within organizations. Throughout special features will help readers clarify their understanding. These features include: - Case studies and vignettes that chart the opportunities and pitfalls created by ICT - Useful chapter introductions - An up to date glossary of concepts and abbreviations
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2016, held in Ouagadougou, Burkina Faso, in December 2016. The 44 papers were carefully selected from 57 submissions and cover topics such as: mobile and social networks; cloud, VPN and overlays; IoT, water, land, agriculture; networks, TVWS; learning; crypto and services.
This book constitutes the refereed proceedings of the 7th International Conference on E-Democracy, E-Democracy 2017, held in Athens, Greece, in December 2017. The 18 revised full papers presented were carefully selected from 44 submissions. The papers are organized in topical sections on e-democracy; privacy; information dissemination and freedom of expression; social networks; electronic identity authentication; ICT in government and in the economy.
This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present the most recent innovations, trends, results, experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from small-scale cyber-physical systems security via information infrastructures and their interaction with national and international infrastructures.
This volume constitutes the refereed proceedings of the 9th International Conference on Multimedia Communications, Services and Security, MCSS 2017, held in Krakow, Poland, in November 2017. The 16 full papers included in the volume were selected from 38 submissions. The papers cover ongoing research activities in the following topics: multimedia services; intelligent monitoring; audio-visual systems; biometric applications; experiments and deployments.
This book is a timely collection of chapters that present the state of the art within the analysis and application of big data. Working within the broader context of big data, this text focuses on the hot topics of social network modelling and analysis such as online dating recommendations, hiring practices, and subscription-type prediction in mobile phone services. Manuscripts are expanded versions of the best papers presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'2016), which was held in August 2016. The papers were among the best featured at the meeting and were then improved and extended substantially. Social Network Based Big Data Analysis and Applications will appeal to students and researchers in the field.
This book constitutes the proceedings of the 8thScandinavian Conference on Information Systems, SCIS 2017, held in Halden, Norway, in August 2017. The 11 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They focus on so-called "smart" systems that prevail in many areas and influence work processes, communication, leasure activities and lifelong learning, and they deal with questions in design, implementation and adaptation in organizations.
This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017. The 32 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on the future of digital forensics; cyber intelligence and operation; information systems security management; systems security, safety, and sustainability; cyber infrastructure protection.
'Do I wish to keep up with the times? No. My wish simply is to live my life as fully as I can' The great American poet, novelist and environmental activist argues for a life lived slowly. Penguin Modern: fifty new books celebrating the pioneering spirit of the iconic Penguin Modern Classics series, with each one offering a concentrated hit of its contemporary, international flavour. Here are authors ranging from Kathy Acker to James Baldwin, Truman Capote to Stanislaw Lem and George Orwell to Shirley Jackson; essays radical and inspiring; poems moving and disturbing; stories surreal and fabulous; taking us from the deep South to modern Japan, New York's underground scene to the farthest reaches of outer space.
This book constitutes the refereed post-conference proceedings of the 6th International Conference on Mobile Communication and Healthcare, MobiHealth 2016, held in Milan, Italy, in November 2016. The 50 revised full papers were reviewed and selected from numerous submissions and are organized in topical sections covering: Technological development for m-health application user engagement.- IoT - Internet of Things.- Advances in soft wearable technology for mobile-health.- Emerging experiences into receiving and delivering healthcare through mobile and embedded solutions.- Advances in personalized healthcare services.- Mobile monitoring, and social media pervasive technologies.
This book considers a burgeoning social phenomenon, compensated dating in Hong Kong, that facilitates direct commercial sex exchange between consenting females from their mid-teens through the late 20s and males from their early 20s to mid-adulthood. Informed by the transformation of intimacy, the breakdown of institutional constraints, the emergence of a new female sexual autonomy and the advancement of information technology, this book moves beyond stereotypes of sex work to look at the complexities of compensated dating. The phenomenon of compensated dating is distinctive from most other sex trades in that it involves intense emotional interactions and often extends beyond the commercial boundary. Given the dynamic, flexible and ambiguous nature of compensated dating, it has become more of a space for sexual explorations and less of a rigid model of commercial sex, at least in the eye of the participants. This book walks through how men become involved in compensated dating and also sheds lights on how gender relations are negotiated, with important implications on what it means to be a man and a woman in contemporary Hong Kong society. It also speaks to the broader transformations of some of the key social structures and elements, particularly gender and sexualities, in the era of late modernity. |
![]() ![]() You may like...
|