![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
We live in an ever complex, dynamic and technological-based world. A world where industries, businesses and agencies rely ever increasingly on automated systems to maintain efficiency, increase productivity, minimize human error or gain a competitive edge. Moreover, automation is now seen by many organizations as the solution to human performance problems. These organizations continue to invest significant resources to implement automated systems wherever possible and there is no doubt that automation has helped such organizations manage their sophisticated, information-rich environments, where humans have limited capabilities. Therefore, automation has helped to improve industrial and commercial progress to the extent that organizations now depend upon it for their own benefit. However, new and unresolved problems have arisen as more individuals, groups and teams interact with automated systems. Hence, the need and motivation of this volume. The chapters contained in this volume explore some of the key human performance issues facing organizations as they implement or manage automated systems. Dealing with a range of topics, from how to design optional use, avoiding misuse, to creating training strategies for automated systems, this volume also explores which theories may help us understand automation better and what research needs to be conducted. This publication attempts to illustrate how human performance research on automation can help organizations design better systems and also hopes to motivate more theoretically-based but practically-relevant research in the technological-based world of the 21st century.
The broad scope of Cloud Computing is creating a technology, business, sociolo- cal, and economic renaissance. It delivers the promise of making services available quickly with rather little effort. Cloud Computing allows almost anyone, anywhere, at anytime to interact with these service offerings. Cloud Computing creates a unique opportunity for its users that allows anyone with an idea to have a chance to deliver it to a mass market base. As Cloud Computing continues to evolve and penetrate different industries, it is inevitable that the scope and definition of Cloud Computing becomes very subjective, based on providers' and customers' persp- tive of applications. For instance, Information Technology (IT) professionals p- ceive a Cloud as an unlimited, on-demand, flexible computing fabric that is always available to support their needs. Cloud users experience Cloud services as virtual, off-premise applications provided by Cloud service providers. To an end user, a p- vider offering a set of services or applications in the Cloud can manage these off- ings remotely. Despite these discrepancies, there is a general consensus that Cloud Computing includes technology that uses the Internet and collaborated servers to integrate data, applications, and computing resources. With proper Cloud access, such technology allows consumers and businesses to access their personal files on any computer without having to install special tools. Cloud Computing facilitates efficient operations and management of comp- ing technologies by federating storage, memory, processing, and bandwidth.
Robot manipulation is a great challenge; it encompasses versatility -adaptation to different situations-, autonomy -independent robot operation-, and dependability -for success under modeling or sensing errors. A complete manipulation task involves, first, a suitable grasp or contact configuration, and the subsequent motion required by the task. This monograph presents a unified framework by introducing task-related aspects into the knowledge-based grasp concept, leading to task-oriented grasps. Similarly, grasp-related issues are also considered during the execution of a task, leading to grasp-oriented tasks which is called framework for physical interaction (FPI). The book presents the theoretical framework for the versatile specification of physical interaction tasks, as well as the problem of autonomous planning of these tasks. A further focus is on sensor-based dependable execution combining three different types of sensors: force, vision and tactile. The FPI approach allows to perform a wide range of robot manipulation tasks. All contributions are validated with several experiments using different real robots placed on household environments; for instance, a high-DoF humanoid robot can successfully operate unmodeled mechanisms with widely varying structure in a general way with natural motions. This research was recipient of the European Georges Giralt Award and the Robotdalen Scientific Award Honorary Mention.
This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP's rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates' abilities to design, build, and run information privacy management programs. Written by a security and privacy expert and experienced author, CIPM Certified Information Privacy Manager All-in-One Exam Guide is based on proven pedagogy and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. *Provides 100% coverage of all eight objectives for the CIPM exam *Online content includes 300 practice questions in the Total Tester exam engine *Written by a security and privacy expert, educator, and experienced author
Can psychoanalysis offer a new computer model? Can computer designers help psychoanalysts to understand their theory better?In contemporary publications human psyche is often related to neural networks. Why? The wiring in computers can also be related to application software. But does this really make sense? Artificial Intelligence has tried to implement functions of human psyche. The reached achievements are remarkable; however, the goal to get a functional model of the mental apparatus was not reached. Was the selected direction incorrect?The editors are convinced: yes, and they try to give answers here. If one accepts that the brain is an information processing system, then one also has to accept that computer theories can be applied to the brain s functions, the human mental apparatus. The contributors of this book - Solms, Panksepp, Sloman and many others who are all experts in computer design, psychoanalysis and neurology are united in one goal: finding synergy in their interdisciplinary fields."
As democracy encounters increasing difficulties, many citizens are turning to the domain of alternative politics and, in doing so, making considerable use of the Web and other new communication technologies. Clearly this is having significant impact, and new modes of political participation and even political cultures are emerging. In this volume, Peter Dahlgren analyses various factors that shape such Web-facilitated participation, including features of the Web itself as well as broader societal realities.
The advancement of technologies in the 20th century has radically transformed the interconnectedness of humans, science, and technology within an evolving society. Evolving Issues Surrounding Technoethics and Society in the Digital Age serves as an interdisciplinary base of scholarly contributions on the subject of technoethics, a field that deals with current and future problems that arise at the intersection of science, technological innovation, and human life and society. This premier reference work leverages ethical analysis, risk analysis, technology evaluation, and the combination of ethical and technological analyses within a variety of real life decision-making contexts, appealing to scholars and technology experts working in new areas of technology research where social and ethical issues emerge.
The intent of this chapter is to outline a distinctive way of thinking about issues of technology and society that has characterized many Nordic approaches to the topic. One of the characteristics of this approach has been the recognition of the worth of human labour. Technology is not seen as an alien force, but something which is itself a product of human labour, and it can be designed and utilized in ways which augment human skills and expertise, rather than degrading them. What is particularly striking, at least to this author, in this approach is that we are presented not simply with a vision of how things could be better in our society, but with concrete exemplars of how we can build such a better world. It is in recognition of this fact that I have chosen the title of this chapter, as it emphasizes that, while the tradition of Utopian literature is the - lineation of a supposedly idea world which exists no-place (u-topos, in Greek), these visions can be an inspiration for quite practical activities on the ground, as steps towards their realization. As Wilde notes (in the quote above) this is a never-ending quest, as with each achievement, we recognize that there are further bridges to cross and places to be visited.
With the prevalence of social media, businesses and other organizations have a growing need to utilize various online media platforms and sites to engage and interact with their potential consumer base. Virtual communities and social networking can provide an effective escape route from the limits imposed by traditional media. Using optimal strategies can lead to more successful outcomes when using these platforms. Modern Perspectives on Virtual Communications and Social Networking provides innovative insights into connection and conversation through internet media that foster trust, commitment, and transparency in business. The content within this publication represents the potential to create virtual bonds with consumers through the observation of buying behavior, social media best practices, and digital marketing strategies. It is designed for business professionals, academicians, consultants, managers, marketers, and researchers and covers topics centered on the use of online media as a method of reaching a wider population.
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea, Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs
1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandA. Motro PartIII InformationandKnowledgeManagement EffectiveStorageofSemanticWebData...177 RobertoDeVirgilio,PierluigiDelNostro,GiorgioGianforme, StefanoPaolozzi,andRiccardoTorlone AReferenceArchitectureforSemanticKnowledge Coordination ...185 S. Castano,A. Ferrara,andS. Montanelli Service-BasedNetworkedCollaboration...195 DevisBianchini,ValeriaDeAntonellis,andMicheleMelchiori HowtoExploitDataMiningWithoutBecomingAwareofit ...203 N. Ciaramella,andA. Albano AMethodologicalApproachtoEnableCooperative ProcessDesignThroughWebServices...211 D. Bianchini,C. Cappiello,V. DeAntonellis,andB. Pernici TowardanEffectiveandEf?cientQueryProcessing intheNeP4BProject ...
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book.
The home is a key aspect of society and the widespread use of computers and other information appliances is transforming the way in which we live, work and communicate in the information age. The importance of this subject has never been greater with the encroachment of information technology into every corner of the home and social spheres. Many more homes in the developed world will have access to information and information technology in the near future, forming an information society. This book seeks to answer the questions surrounding this move to a wired society', such as: How is the new technology actually used? What are the effects on society as a whole? How will it affect human relationships? Who will gain and who will lose? What technology is there to support everyday life? What services do people really want? How do we study aspects of this phenomenon? A/LISTA Home Informatics and Telematics brings together papers from researchers around the world who are looking at this challenging problem domain. There are contributions on the technical computing areas associated with the home, the HCI of household technology, and theoretical studies on the sociological, psychological and methodological aspects of information technology in everyday life. Also included are studies on the use of computers and the Internet at home, along with fundamental research on the social nature of human communication. This volume contains selected proceedings from the International Conference on Home Informatics and Telematics (HOIT 2000), IT at Home: Virtual Influences on Everyday Life', which was sponsored by the International Federation for Information Processing (IFIP) and held in Wolverhampton, United Kingdom, June 28-30, 2000.
The past decade has seen a revolution in the field of spoken dialogue systems. As in other areas of Computer Science and Artificial Intelligence, data-driven methods are now being used to drive new methodologies for system development and evaluation. This book is a unique contribution to that ongoing change. A new methodology for developing spoken dialogue systems is described in detail. The journey starts and ends with human behaviour in interaction, and explores methods for learning from the data, for building simulation environments for training and testing systems, and for evaluating the results. The detailed material covers: Spoken and Multimodal dialogue systems, Wizard-of-Oz data collection, User Simulation methods, Reinforcement Learning, and Evaluation methodologies. The book is a research guide for students and researchers with a background in Computer Science, AI, or Machine Learning. It navigates through a detailed case study in data-driven methods for development and evaluation of spoken dialogue systems. Common challenges associated with this approach are discussed and example solutions are provided. This work provides insights, lessons, and inspiration for future research and development - not only for spoken dialogue systems in particular, but for data-driven approaches to human-machine interaction in general.
By bringing together various current directions, Software Project Management in a Changing World focuses on how people and organizations can make their processes more change-adaptive. The selected chapters closely correspond to the project management knowledge areas introduced by the Project Management Body of Knowledge, including its extension for managing software projects. The contributions are grouped into four parts, preceded by a general introduction. Part I Fundamentals provides in-depth insights into fundamental topics including resource allocation, cost estimation and risk management. Part II Supporting Areas presents recent experiences and results related to the management of quality systems, knowledge, product portfolios and global and virtual software teams. Part III New Paradigms details new and evolving software-development practices including agile, distributed and open and inner-source development. Finally, Part IV Emerging Techniques introduces search-based techniques, social media, software process simulation and the efficient use of empirical data and their effects on software-management practices.This book will attract readers from both academia and practice with its excellent balance between new findings and experience of their usage in new contexts. Whenever appropriate, the presentation is based on evidence from empirical evaluation of the proposed approaches. For researchers and graduate students, it presents some of the latest methods and techniques to accommodate new challenges facing the discipline. For professionals, it serves as a source of inspiration for refining their project-management skills in new areas."
With the growth of public and private data stores and the emergence of off-the-shelf data-mining technology, recommendation systems have emerged that specifically address the unique challenges of navigating and interpreting software engineering data. This book collects, structures and formalizes knowledge on recommendation systems in software engineering. It adopts a pragmatic approach with an explicit focus on system design, implementation, and evaluation. The book is divided into three parts: "Part I - Techniques" introduces basics for building recommenders in software engineering, including techniques for collecting and processing software engineering data, but also for presenting recommendations to users as part of their workflow."Part II - Evaluation" summarizes methods and experimental designs for evaluating recommendations in software engineering."Part III - Applications" describes needs, issues and solution concepts involved in entire recommendation systems for specific software engineering tasks, focusing on the engineering insights required to make effective recommendations. The book is complemented by the webpage rsse.org/book, which includes free supplemental materials for readers of this book and anyone interested in recommendation systems in software engineering, including lecture slides, data sets, source code, and an overview of people, groups, papers and tools with regard to recommendation systems in software engineering. The book is particularly well-suited for graduate students and researchers building new recommendation systems for software engineering applications or in other high-tech fields. It may also serve as the basis for graduate courses on recommendation systems, applied data mining or software engineering. Software engineering practitioners developing recommendation systems or similar applications with predictive functionality will also benefit from the broad spectrum of topics covered."
This thesis lays the groundwork for the automatic supervision of the laser incision process, which aims to complement surgeons' perception of the state of tissues and enhance their control over laser incisions. The research problem is formulated as the estimation of variables that are representative of the state of tissues during laser cutting. Prior research in this area leveraged numerical computation methods that bear a high computational cost and are not straightforward to use in a surgical setting. This book proposes a novel solution to this problem, using models inspired by the ability of experienced surgeons to perform precise and clean laser cutting. It shows that these new models, which were extracted from experimental data using statistical learning techniques, are straightforward to use in a surgical setup, allowing greater precision in laser-based surgical procedures.
This book presents the proceedings of the KES International Conferences on Innovation in Medicine and Healthcare (KES-InMed-21), held virtually on June 14-16, 2021. Covering a number of key areas, including digital IT architecture in healthcare; advanced ICT for medicine and healthcare; biomedical engineering, trends, research and technologies; and healthcare support systems, this book is a valuable resource for researchers, managers, industrialists and anyone wishing to gain an overview of the latest research in these fields.
Internet is starting to permeate politics much as it has previously revolutionised education, business or the arts. Thus, there is a growing interest in areas of e-government and, more recently, e-democracy. However, most attempts in this field have just envisioned standard political approaches facilitated by technology, like e-voting or e-debating. Alternatively, we could devise a more transforming strategy based on deploying web based group decision support tools and promote their use for public policy decision making. This book delineates how this approach could be implemented. It addresses foundations, basic methodologies, potential implementation and applications, together with a thorough discussion of the many challenging issues. This innovative text will be of interest to students, researchers and practitioners in the fields of e-government, e-democracy and e-participation and research in decision analysis, negotiation analysis and group decision support.
Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.
This book brings together the state of the art and current debates in the field of formative research, and examines many of the innovative methods largely overlooked in the available literature. This book will help social marketing to move beyond surveys and focus groups. The book addresses the needs of social marketing academics and practitioners alike by providing a robust and critical academic discussion of cutting-edge research methods, while demonstrating at the same time how each respective method can help us arrive at a deeper understanding of the issues that social marketing interventions are seeking to remedy. Each chapter includes a scholarly discussion of key formative research methods, a list of relevant internet resources, and three key readings for those interested in extending their understanding of the method. Most chapters also feature a short case study demonstrating how the methods are used. |
![]() ![]() You may like...
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,341
Discovery Miles 13 410
Research Anthology on Architectures…
Information R Management Association
Hardcover
R13,706
Discovery Miles 137 060
Technological Innovation for Applied AI…
Luis M. Camarinha-Matos, Pedro Ferreira, …
Hardcover
R3,419
Discovery Miles 34 190
|