![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
This book presents an emerging new vision of the brain, which is essentially expressed in computational terms, for non-experts. As such, it presents the fundamental concepts of neuroscience in simple language, without overwhelming non-biologists with excessive biological jargon. In addition, the book presents a novel computational perspective on the brain for biologists, without resorting to complex mathematical equations. It addresses a comprehensive range of topics, starting with the history of neuroscience, the function of the individual neuron, the various kinds of neural network models that can explain diverse neural phenomena, sensory-motor function, language, emotions, and concluding with the latest theories on consciousness. The book offers readers a panoramic introduction to the "new brain" and a valuable resource for interdisciplinary researchers looking to gatecrash the world of neuroscience.
An insider's account of Apple's creative process during the golden years of Steve Jobs. 'If you’ve ever wondered what it’s like to work in a hotbed of innovation, you’ll enjoy this inside view of life at Apple. Ken Kocienda pioneered the iPhone keyboard, and this book gives a play-by-play of their creative process –from generating ideas to doing a demo for Steve Jobs.' Adam Grant Hundreds of millions of people use Apple products every day; several thousand work on Apple's campus in Cupertino, California; but only a handful sit at the drawing board. Creative Selection recounts the life of one of the few who worked behind the scenes, a highly-respected software engineer who worked in the final years of the Steve Jobs era, the Golden Age of Apple. Ken Kocienda offers an inside look at Apple’s creative process. For fifteen years, he was on the ground floor of the company as a specialist, directly responsible for experimenting with novel user interface concepts and writing powerful, easy-to-use software for products including the iPhone, the iPad and the Safari web browser. His stories explain the symbiotic relationship between software and product development for those who have never dreamed of programming a computer, and reveal what it was like to work on the cutting edge of technology at one of the world's most admired companies. Kocienda shares moments of struggle and success, crisis and collaboration, illuminating each with lessons learned over his Apple career. He introduces the essential elements of innovation, inspiration, collaboration, craft, diligence, decisiveness, taste, and empathy, and uses these as a lens through which to understand productive work culture. An insider's tale of creativity and innovation at Apple, Creative Selection shows readers how a small group of people developed an evolutionary design model, and how they used this methodology to make groundbreaking and intuitive software which countless millions use every day.
This book consists of an anthology of writings. The aim is to honour Marco to celebrate the 35th year of his academic career . The book consists of a collection of selected opinions in the field of IS. Some themes are: IT and Information Systems organizational impacts, Systems development, Business process management, Business organization, e-government, social impact of IT.
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy. This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.
In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.
The Turn analyzes the research of information seeking and retrieval (IS&R) and proposes a new direction of integrating research in these two areas: the fields should turn off their separate and narrow paths and construct a new avenue of research. An essential direction for this avenue is context as given in the subtitle Integration of Information Seeking and Retrieval in Context. Other essential themes in the book include: IS&R research models, frameworks and theories; search and works tasks and situations in context; interaction between humans and machines; information acquisition, relevance and information use; research design and methodology based on a structured set of explicit variables - all set into the holistic cognitive approach. The present monograph invites the reader into a construction project - there is much research to do for a contextual understanding of IS&R. The Turn represents a wide-ranging perspective of IS&R by providing a novel unique research framework, covering both individual and social aspects of information behavior, including the generation, searching, retrieval and use of information. Regarding traditional laboratory information retrieval research, the monograph proposes the extension of research toward actors, search and work tasks, IR interaction and utility of information. Regarding traditional information seeking research, it proposes the extension toward information access technology and work task contexts. The Turn is the first synthesis of research in the broad area of IS&R ranging from systems oriented laboratory IR research to social science oriented information seeking studies.
Japan and the Internet Revolution challenges the portrait of Japan as a technologically slow-moving nation, lacking in creativity and entrepreneurial spirit. Overcoming the substantial barriers erected by the Japanese government to the introduction of the Internet, promoters and entrepreneurs managed to create a flexible and dynamic Internet society. From a slow start, Japan has emerged as the global leader in the mobile Internet, the host of arguably the strongest nation-specific web-presence in the world, and a country determined to remain near the forefront of the digital revolution.
Many Asian countries are achieving remarkable success in closing what researchers call the digital divide between developing and developed nations, while others continue to struggle. This collection of essays sheds light on the various ways in which the Internet has been seen in Asia. As we continue to debate new paradigms of research and development in the digital era, where innovations and convergences are the norm, this book fills an urgent need, revealing how the technological revolution has spread, and is spreading, throughout diverse nations. Chapters on the United States and Japan offer a sort of yardstick by which to measure and compare the diffusion and the impact of the Internet in other Asian countries, including China, Korea, Taiwan, and Singapore. Appealing to readers interested in the development of the Asian region, technological innovation, and international communication, "Cyberpath to Development in Asia" offers an acute study of how a global phenomenon continues to manifest itself in a crucial part of the globe.
This volume is devoted to interactive and iterative processes of decision-making- I2 Fuzzy Decision Making, in brief. Decision-making is inherently interactive. Fuzzy sets help realize human-machine communication in an efficient way by facilitating a two-way interaction in a friendly and transparent manner. Human-centric interaction is of paramount relevance as a leading guiding design principle of decision support systems. The volume provides the reader with an updated and in-depth material on the conceptually appealing and practically sound methodology and practice of I2 Fuzzy Decision Making. The book engages a wealth of methods of fuzzy sets and Granular Computing, brings new concepts, architectures and practice of fuzzy decision-making providing the reader with various application studies. The book is aimed at a broad audience of researchers and practitioners in numerous disciplines in which decision-making processes play a pivotal role and serve as a vehicle to produce solutions to existing problems. Those involved in operations research, management, various branches of engineering, social sciences, logistics, and economics will benefit from the exposure to the subject matter. The book may serve as a useful and timely reference material for graduate students and senior undergraduate students in courses on decision-making, Computational Intelligence, operations research, pattern recognition, risk management, and knowledge-based systems.
This book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) - small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of "big data," and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation. PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities. Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care. Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics - "ethical analysis aimed at influencing the development of new technologies" (Deborah Johnson 2010). The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities - if only to "do no harm" - before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.
This book presents the state of the art technology in Serious Games which is driven extensive by applications and research in simulation. The topics in this book include: (1) Fashion simulation; (2) Chinese calligraphy ink diffusion simulation; (3) Rehabilitation (4) Long vehicle turning simulation; (5) Marine traffic conflict control; (6) CNC simulation; (7) Special needs education. The book also addresses the fundamental issues in Simulation and Serious Games such as rapid collision detection, game engines or game development platforms. The target audience for this book includes scientists, engineers and practitioners involved in the field of Serious Games and Simulation. The major part of this book comprises of papers presented at the 2012 Asia-Europe Workshop on Serious Games and Simulation held in Nanyang Technological University, Singapore (May 9, 2012). All the contributions have been peer reviewed and by scientific committee members with report about quality, content and originality.
Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI.
There is no single approach to modelling and model-based systems development that is best for all possible situations. Therefore, a high-level overview is needed in order to evaluate the options and identify the optimal approach. This unique textbook/reference introduces and describes in detail the SEQUAL framework for understanding the quality of models and modelling languages, including the numerous specialisations of the generic framework, and the various ways in which this can be used for different applications. Examples are provided from the application of SEQUAL in industrial and governmental settings. Topics and features: contains case studies, chapter summaries, review questions, problems and exercises throughout the text, in addition to Appendices on terminology and abbreviations; presents a thorough introduction to the most important concepts in conceptual modelling, including the underlying philosophical outlook on the quality of models; describes the basic tasks and model types in information systems development and evolution, and the main methodologies for mixing different phases of information system development; provides an overview of the general mechanisms and perspectives used in conceptual modelling; predicts future trends in technological development, and discusses how the role of modelling can be envisaged in this landscape. This didactic guide is essential reading for postgraduate students of computer science, software engineering and information systems wishing to learn more about conceptual modelling in their preparation for professional practice. Developers of information systems will also find the book an ideal reference to support their professional activity.
The ways in which humans communicate with one another is constantly evolving. Technology plays a large role in this evolution via new methods and avenues of social and business interaction. The Handbook of Research on Human Interaction and the Impact of Information Technologies is a primary reference source featuring the latest scholarly perspectives on technological breakthroughs in user operation and the processes of communication in the digital era. Including a number of topics such as health information technology, multimedia, and social media, this publication is ideally designed for professionals, technology developers, and researchers seeking current research on technology's role in communication.
Advances in mobile computing have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices.
This book makes an important contribution to the study of political communication. Its chapters provide a detailed analysis of forms of media talk associated with contemporary political elections. The approach is derived from the study of broadcast media talk, which extends here to political communication on the Internet. Key topics include: changing forms of political interview, televised political debates (held in the UK for the first time in 2010), the use of multimedia in promotional discourse, and uses of the Internet to engage with voters (an approach used successfully in the Obama presidential campaigns of 2008 and 2012). In addition to chapters from the UK and USA, there are also contributions from Greece, Spain, Sweden and Austria. Accordingly this book breaks new ground, not only in its coverage of the way politics is communicated to citizens, but also its recognition that in the modern world political culture is increasingly globalised, requiring an international critical perspective.
This book reflects the move in Human Computer Interaction studies from standard usability concerns towards a wider set of problems to do with fun, enjoyment, aesthetics and the experience of use. Traditionally HCI has been concerned with work and task based applications but as digital technologies proliferate in the home fun becomes an important issue. There is an established body of knowledge and a range of techniques and methods for making products and interfaces usable, but far less is known about how to make them enjoyable. Perhaps in the future there will be a body of knowledge and a set of techniques for assessing the pleasure of interaction that will be as thorough as those that currently assess usability. This book is a first step towards that. It brings together a range of researchers from academia and industry to provide answers. Contributors include Alan Dix, Jacob Nielsen and Mary Beth Rosson as well as a number of other researchers from academia and industry.
This book discusses research, methods, and recent developments in the interdisciplinary field that spans research in visualization, eye tracking, human-computer interaction, and psychology. It presents extended versions of papers from the First Workshop on Eye Tracking and Visualization (ETVIS), which was organized as a workshop of the IEEE VIS Conference 2015. Topics include visualization and visual analytics of eye-tracking data, metrics and cognitive models, eye-tracking experiments in the context of visualization interfaces, and eye tracking in 3D and immersive environments. The extended ETVIS papers are complemented by a chapter offering an overview of visualization approaches for analyzing eye-tracking data and a chapter that discusses electrooculography (EOG) as an alternative of acquiring information about eye movements. Covering scientific visualization, information visualization, and visual analytics, this book is a valuable resource for eye-tracking researchers within the visualization community.
This work addresses the evaluation of the human and the automatic speaker recognition performances under different channel distortions caused by bandwidth limitation, codecs, and electro-acoustic user interfaces, among other impairments. Its main contribution is the demonstration of the benefits of communication channels of extended bandwidth, together with an insight into how speaker-specific characteristics of speech are preserved through different transmissions. It provides sufficient motivation for considering speaker recognition as a criterion for the migration from narrowband to enhanced bandwidths, such as wideband and super-wideband.
This book proposes dynamic wavelength and bandwidth allocation (DWBA), a hybrid of time-division multiplexing (TDM) and wavelength-division multiplexing (WDM), which offers a solution for service providers faced with multiservice networks. It discusses different models, architectures and implementations and evaluates their performance.
The content of this textbook is organized as a theory of language for the construction of talking robots. The main topic is the mechanism of natural language communication in both the speaker and the hearer. In the third edition the author has modernized the text, leaving the overview of traditional, theoretical, and computational linguistics, analytic philosophy of language, and mathematical complexity theory with their historical backgrounds intact. The format of the empirical analyses of English and German syntax and semantics has been adapted to current practice; and Chaps. 22-24 have been rewritten to focus more sharply on the construction of a talking robot.
Contemporary Issues in End User Computing brings a wealth of end user computing information to one accessible location. This collection includes empirical and theoretical research concerned with all aspects of end user computing including development, utilization, and management. ""Contemporary Issues in End User Computing"" is divided into three sections, covering Web-based end user computing tools and technologies, end user computing software and trends, and end user characteristics and learning. This scholarly book features the latest research findings dealing with end user computing concepts, issues, and trends.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization. |
![]() ![]() You may like...
The Handbook on Socially Interactive…
Birgit Lugrin, Catherine Pelachaud, …
Hardcover
R2,585
Discovery Miles 25 850
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Usability Engineering - Process…
Laura Leventhal, Julie Barnes
Paperback
R4,633
Discovery Miles 46 330
|