![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Ever since its inception, the Web has changed the landscape of human experiences on how we interact with one another and data through service infrastructures via various computing devices. This interweaving environment is now becoming ever more embedded into devices and systems that integrate seamlessly on how we live, both in our working or leisure time. For this volume, King and Baeza-Yates selected some pioneering and cutting-edge research work that is pointing to the future of the Web. Based on the Workshop Track of the 17th International World Wide Web Conference (WWW2008) in Beijing, they selected the top contributions and asked the authors to resubmit their work with a minimum of one third of additional material from their original workshop manuscripts to be considered for this volume. After a second-round of reviews and selection, 16 contributions were finally accepted. The work within this volume represents the tip of an iceberg of the many exciting advancements on the WWW. It covers topics like semantic web services, location-based and mobile applications, personalized and context-dependent user interfaces, social networks, and folksonomies. The presentations aim at researchers in academia and industry by showcasing latest research findings. Overall they deliver an excellent picture of the current state-of-the-art, and will also serve as the basis for ongoing research discussions and point to new directions.
Peer to Peer Accommodation networks presents a new conceptual framework which offers an initial explanation for the continuing and rapid success of 'disruptive innovators' and their effects on the international hospitality industry, with a specific focus on Airbnb, in the international context. Using her first-hand experience as a host on both traditional holiday accommodation webpages and a peer-to-peer accommodation network, respected tourism academic Sara Dolnicar examines possible reasons for the explosive success of peer to peer accommodation networks, investigates related topics which are less frequently discussed - such as charitable activities and social activism - and offers a future research agenda. Using first hand empirical results, this text provides much needed insight into this 'disruptive innovator' for those studying and working within the tourism and hospitality industries. This book discusses a wealth of issues including: * The disruptive innovation model - the criteria for identifying and understanding new disruptive innovators, and how peer-to-peer accommodation networks comply with these; * The factors postulated to drive the success of these networks and the celebration of variation; * Who are genuine networks members, tourist motivators and the chance of the 'perfect match'; * Pricing, discrimination and stimulation of the creation of new businesses.
This book presents works detailing the application of processing and visualization techniques for analyzing the Earth's subsurface. The topic of the book is interactive data processing and interactive 3D visualization techniques used on subsurface data. Interactive processing of data together with interactive visualization is a powerful combination which has in the recent years become possible due to hardware and algorithm advances in. The combination enables the user to perform interactive exploration and filtering of datasets while simultaneously visualizing the results so that insights can be made immediately. This makes it possible to quickly form hypotheses and draw conclusions. Case studies from the geosciences are not as often presented in the scientific visualization and computer graphics community as e.g., studies on medical, biological or chemical data. This book will give researchers in the field of visualization and computer graphics valuable insight into the open visualization challenges in the geosciences, and how certain problems are currently solved using domain specific processing and visualization techniques. Conversely, readers from the geosciences will gain valuable insight into relevant visualization and interactive processing techniques. Subsurface data has interesting characteristics such as its solid nature, large range of scales and high degree of uncertainty, which makes it challenging to visualize with standard methods. It is also noteworthy that parallel fields of research have taken place in geosciences and in computer graphics, with different terminology when it comes to representing geometry, describing terrains, interpolating data and (example-based) synthesis of data. The domains covered in this book are geology, digital terrains, seismic data, reservoir visualization and CO2 storage. The technologies covered are 3D visualization, visualization of large datasets, 3D modelling, machine learning, virtual reality, seismic interpretation and multidisciplinary collaboration. People within any of these domains and technologies are potential readers of the book.
The combination of high-resolution visual and depth sensing, supported by machine learning, opens up new opportunities to solve real-world problems in computer vision. This authoritative text/reference presents an interdisciplinary selection of important, cutting-edge research on RGB-D based computer vision. Divided into four sections, the book opens with a detailed survey of the field, followed by a focused examination of RGB-D based 3D reconstruction, mapping and synthesis. The work continues with a section devoted to novel techniques that employ depth data for object detection, segmentation and tracking, and concludes with examples of accurate human action interpretation aided by depth sensors. Topics and features: discusses the calibration of color and depth cameras, the reduction of noise on depth maps, and methods for capturing human performance in 3D; reviews a selection of applications which use RGB-D information to reconstruct human figures, evaluate energy consumption, and obtain accurate action classification; presents an innovative approach for 3D object retrieval, and for the reconstruction of gas flow from multiple Kinect cameras; describes an RGB-D computer vision system designed to assist the visually impaired, and another for smart-environment sensing to assist elderly and disabled people; examines the effective features that characterize static hand poses, and introduces a unified framework to enforce both temporal and spatial constraints for hand parsing; proposes a new classifier architecture for real-time hand pose recognition, and a novel hand segmentation and gesture recognition system. Researchers and practitioners working in computer vision, HCI and machine learning will find this to be a must-read text. The book also serves as a useful reference for graduate students studying computer vision, pattern recognition or multimedia.
Achieving enterprise success necessitates addressing enterprises in ways that match the complexity and dynamics of the modern enterprise environment. However, since the majority of enterprise strategic initiatives appear to fail - among which those regarding information technology - the currently often practiced approaches to strategy development and implementation seem more an obstacle than an enabler for strategic enterprise success. Two themes underpin the fundamentally different views outlined in this book. First, the competence-based perspective on governance, whereby employees are viewed as the crucial core for effectively addressing the complex, dynamic and uncertain enterprise reality, as well as for successfully defining and operationalizing strategic choices. Second, enterprise engineering as the formal conceptual framework and methodology for arranging a unified and integrated enterprise design, which is a necessary condition for enterprise success. Jan Hoogervorst's presentation, which is based on both research and his professional background at Sogeti B.V., aims at professionals in management and consulting as well as students in management science and business information systems.
Over the last few decades information and communication technology has come to play an increasingly prominent role in our dealings with other people. Computers, in particular, have made available a host of new ways of interacting, which we have increasingly made use of. In the wake of this development a number of ethical questions have been raised and debated. Ethics in Cyberspace focuses on the consequences for ethical agency of mediating interaction by means of computers, seeking to clarify how the conditions of certain kinds of interaction in cyberspace (for example, in chat-rooms and virtual worlds) differ from the conditions of interaction face-to-face and how these differences may come to affect the behaviour of interacting agents in terms of ethics.
The book provides readers with a comprehensive overview of the state of the art in the field of gait and balance rehabilitation. It describes technologies and devices together with the requirements and factors to be considered during their application in clinical settings. The book covers physiological and pathophysiological basis of locomotion and posture control, describes integrated approaches for the treatment of neurological diseases and spinal cord injury, as well as important principles for designing appropriate clinical studies. It presents computer and robotic technologies currently used in rehabilitation, such as exoskeleton devices, functional electrical stimulation, virtual reality and many more, highlighting the main advantages and challenges both from the clinical and engineering perspective. Written in an easy-to-understand style, the book is intended for people with different background and expertise, including medical and engineering students, clinicians and physiotherapists, as well as technical developers of rehabilitation systems and their corresponding human-compute interfaces. It aims at fostering an increased awareness of available technologies for balance and gait rehabilitation, as well as a better communication and collaboration between their users and developers.
Collaborative Networks A Tool for Promoting Co-creation and Innovation The collaborative networks paradigm offers powerful socio-organizational mec- nisms, supported by advanced information and communication technologies for p- moting innovation. This, in turn, leads to new products and services, growth of better customer relationships, establishing better project and process management, and building higher-performing consortia. By putting diverse entities that bring different perspectives, competencies, practices, and cultures, to work together, collaborative networks develop the right environment for the emergence of new ideas and more efficient, yet practical, solutions. This aspect is particularly important for small and medium enterprises which typically lack critical mass and can greatly benefit from participation in co-innovation networks. However, larger organizations also benefit from the challenges and the diversity found in collaborative ecosystems. In terms of research, in addition to the trend identified in previous years toward a sounder consolidation of the theoretical foundation in this discipline, there is now a direction of developments more focused on modeling and reasoning about new c- laboration patterns and their contribution to value creation. "Soft issues," including social capital, cultural aspects, ethics and value systems, trust, emotions, behavior, etc. continue to deserve particular attention in terms of modeling and reasoning. Exploi- tion of new application domains such as health care, education, and active aging for retired professionals also help identify new research challenges, both in terms of m- eling and ICT support development.
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computation Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the book will highlight the ethical and legal practices used in computing technologies, increase the effectiveness of computing students and professionals in applying ethical values and legal statues, and provide insight on ethical and legal discussions of real-world applications.
This reference book shows how the Zero Outage method leads to more stability in operations, more reliability in projects and, ultimately, to greater customer satisfaction. It explains why clear standards for platforms, processes and personnel are essential for ensuring high ICT quality from end to end and what to look out for during changes - the most common cause of IT outages. Readers also learn how to resolve errors as quickly as possible and permanently eliminate them, and why industry-wide collaboration will only be possible with a shared standard of quality. This book is a practical introduction to making your ICT world even more failsafe and efficient. The authors share key knowledge in quality management and offer an exclusive insight into their extensively tested and continually enhanced formula for success: the Zero Outage approach.
Applying multimodal textual analysis to the languages and images of
online communication forms, Kay Richardson shows, from an applied
linguistic perspective, how the Internet is being used for global,
interactive communication about public health risks. Detailed case
studies of the possible risks posed by SARS, by mobile phones and
by the vaccination of babies against childhood diseases are
situated within the context of research on computer-mediated
communication, as well as within the broader social context of
globalization and discourses of risk and trust.
In more ways than one, assistive technologies can have a profound impact on humans and their operations within society. Understanding these emerging technologies is crucial to their effective use in improving human lives. Human-Computer Interfaces and Interactivity: Emergent Research and Applications aims to address the main issues of interest within the culture and design of interactive systems for individuals living with disabilities. This premier reference work addresses a range of approaches including, but not limited to, the conceptual, technological, and design issues related to human-computer interaction, issues of interest to a range of individuals including academics, university teachers, researchers, post-graduate students, public and private institutions, and HCI developers and researchers.
Learn how to switch off and find calm - from the New York Times bestselling author of A World Without Email 'Digital Minimalism is the Marie Kondo of technology' Evening Standard 'An eloquent, powerful and enjoyably practical guide to cutting back on screen time' The Times 'An urgent call to action for anyone serious about being in command of their own life' Ryan Holiday 'What a timely and useful book' Naomi Alderman, author of The Power Do you find yourself endlessly scrolling through social media or the news while your anxiety rises? Are you feeling frazzled after a long day of endless video calls? In this timely book, professor Cal Newport shows us how to pair back digital distractions and live a more meaningful life with less technology. By following a 'digital declutter' process, you'll learn to: * Rethink your relationship with social media * Prioritize 'high bandwidth' conversations over low quality text chains * Rediscover the pleasures of the offline world Take back control from your devices and find calm amongst the chaos with Digital Minimalism.
This book highlights the methods and applications for roadside video data analysis, with a particular focus on the use of deep learning to solve roadside video data segmentation and classification problems. It describes system architectures and methodologies that are specifically built upon learning concepts for roadside video data processing, and offers a detailed analysis of the segmentation, feature extraction and classification processes. Lastly, it demonstrates the applications of roadside video data analysis including scene labelling, roadside vegetation classification and vegetation biomass estimation in fire risk assessment.
As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2011, held in Kaunas, Lithuania, in October 2011. The 25 revised papers presented were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: e-government and e-governance, e-services, digital goods and products, e-business process modeling and re-engineering, innovative e-business models and implementation, e-health and e-education, and innovative e-business models.
Artificial Intelligence and Industry 4.0 explores recent advancements in blockchain technology and artificial intelligence (AI) as well as their crucial impacts on realizing Industry 4.0 goals. The book explores AI applications in industry including Internet of Things (IoT) and Industrial Internet of Things (IIoT) technology. Chapters explore how AI (machine learning, smart cities, healthcare, Society 5.0, etc.) have numerous potential applications in the Industry 4.0 era. This book is a useful resource for researchers and graduate students in computer science researching and developing AI and the IIoT.
This book introduces the latest progress in six degrees of freedom (6-DoF) haptic rendering with the focus on a new approach for simulating force/torque feedback in performing tasks that require dexterous manipulation skills. One of the major challenges in 6-DoF haptic rendering is to resolve the conflict between high speed and high fidelity requirements, especially in simulating a tool interacting with both rigid and deformable objects in a narrow space and with fine features. The book presents a configuration-based optimization approach to tackle this challenge. Addressing a key issue in many VR-based simulation systems, the book will be of particular interest to researchers and professionals in the areas of surgical simulation, rehabilitation, virtual assembly, and inspection and maintenance.
Designing Inclusive Interactions contains the proceedings of the fifth Cambridge Workshop on Universal Access and Assistive Technology (CWUAAT), incorporating the 8th Cambridge Workshop on Rehabilitation Robotics, held in Cambridge, England, in March 2010. It contains contributions from an international group of leading researchers in the fields of Universal Access and Assistive Technology. This conference will mainly focus on the following principal topics: 1. Designing assistive and rehabilitation technology for working and daily living environments 2. Measuring inclusion for the design of products for work and daily living 3. Inclusive interaction design and new technologies for inclusive design 4. Assembling new user data for inclusive design 5. The design of accessible and inclusive contexts: work and daily living environments 6. Business advantages and applications of inclusive design 7. Legislation, standards and government awareness of inclusive design
One of The New York Times Book Review's 100 Notable Books of 2022. Named one of the best books of 2022 by The New Yorker, Pitchfork, Vanity Fair and TIME. A New York Times Book Review Editors' Choice. "On the internet, fandom can be a route toward cyberbullying a baby, or it can be a way of figuring some things out about yourself. Sometimes, it can even forge a writer as funny and perceptive as Kaitlyn Tiffany." --Amanda Hess, The New York Times "Wistful, winning, and unexpectedly funny." --Katy Waldman, The New Yorker A thrilling dive into the world of superfandom and the fangirls who shaped the social internet. In 2014, on the side of a Los Angeles freeway, a One Direction fan erected a shrine in the spot where, a few hours earlier, Harry Styles had vomited. "It's interesting for sure," Styles said later, adding, "a little niche, maybe." But what seemed niche to Styles was actually a signpost for an unfathomably large, hyper-connected alternate universe: stan culture. In Everything I Need I Get from You, Kaitlyn Tiffany, a staff writer at The Atlantic and a superfan herself, guides us through the online world of fans, stans, and boybands. Along the way we meet girls who damage their lungs from screaming too loud, fans rallying together to manipulate chart numbers using complex digital subversion, and an underworld of inside jokes and shared memories surrounding band members' allergies, internet typos, and hairstyles. In the process, Tiffany makes a convincing, and often moving, argument that fangirls, in their ingenuity and collaboration, created the social internet we know today. "Before most people were using the internet for anything," Tiffany writes, "fans were using it for everything." With humor, empathy, and an insider's eye, Everything I Need I Get from You reclaims internet history for young women, establishing fandom not as the territory of hysterical girls but as an incubator for digital innovation, art, and community. From alarming, fandom-splitting conspiracy theories about secret love and fake children, to the interplays between high and low culture and capitalism, Tiffany's book is a riotous chronicle of the movement that changed the internet forever.
|
![]() ![]() You may like...
Integrated Drought Management, Volume 2…
Vijay P. Singh, Deepak Jhajharia, …
Hardcover
R6,325
Discovery Miles 63 250
Examining the Teacher Induction Process…
Mustafa OEzturk, Paul Robert Hoard
Hardcover
R4,806
Discovery Miles 48 060
Geodetic and Geophysical Observations in…
Alessandro Capra, Reinhard Dietrich
Hardcover
R5,632
Discovery Miles 56 320
Modern Age Waste Water Problems…
Mohammad Oves, Mohammad Omaish Ansari, …
Hardcover
R2,927
Discovery Miles 29 270
Troubleshooting Finite-Element Modeling…
Raphael Jean Boulbes
Hardcover
R4,608
Discovery Miles 46 080
|