![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
The ways in which humans communicate with one another is constantly evolving. Technology plays a large role in this evolution via new methods and avenues of social and business interaction. The Handbook of Research on Human Interaction and the Impact of Information Technologies is a primary reference source featuring the latest scholarly perspectives on technological breakthroughs in user operation and the processes of communication in the digital era. Including a number of topics such as health information technology, multimedia, and social media, this publication is ideally designed for professionals, technology developers, and researchers seeking current research on technology's role in communication.
Advances in mobile computing have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices.
This book makes an important contribution to the study of political communication. Its chapters provide a detailed analysis of forms of media talk associated with contemporary political elections. The approach is derived from the study of broadcast media talk, which extends here to political communication on the Internet. Key topics include: changing forms of political interview, televised political debates (held in the UK for the first time in 2010), the use of multimedia in promotional discourse, and uses of the Internet to engage with voters (an approach used successfully in the Obama presidential campaigns of 2008 and 2012). In addition to chapters from the UK and USA, there are also contributions from Greece, Spain, Sweden and Austria. Accordingly this book breaks new ground, not only in its coverage of the way politics is communicated to citizens, but also its recognition that in the modern world political culture is increasingly globalised, requiring an international critical perspective.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
AI Metaheuristics for Information Security in Digital Media examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications. Drawing on multidisciplinary research including computer vision, machine learning, artificial intelligence, modified/newly developed metaheuristics algorithms, it will enhance information security for society. It includes state-of-the-art research with illustrations and exercises throughout.
This book reflects the move in Human Computer Interaction studies from standard usability concerns towards a wider set of problems to do with fun, enjoyment, aesthetics and the experience of use. Traditionally HCI has been concerned with work and task based applications but as digital technologies proliferate in the home fun becomes an important issue. There is an established body of knowledge and a range of techniques and methods for making products and interfaces usable, but far less is known about how to make them enjoyable. Perhaps in the future there will be a body of knowledge and a set of techniques for assessing the pleasure of interaction that will be as thorough as those that currently assess usability. This book is a first step towards that. It brings together a range of researchers from academia and industry to provide answers. Contributors include Alan Dix, Jacob Nielsen and Mary Beth Rosson as well as a number of other researchers from academia and industry.
This book discusses research, methods, and recent developments in the interdisciplinary field that spans research in visualization, eye tracking, human-computer interaction, and psychology. It presents extended versions of papers from the First Workshop on Eye Tracking and Visualization (ETVIS), which was organized as a workshop of the IEEE VIS Conference 2015. Topics include visualization and visual analytics of eye-tracking data, metrics and cognitive models, eye-tracking experiments in the context of visualization interfaces, and eye tracking in 3D and immersive environments. The extended ETVIS papers are complemented by a chapter offering an overview of visualization approaches for analyzing eye-tracking data and a chapter that discusses electrooculography (EOG) as an alternative of acquiring information about eye movements. Covering scientific visualization, information visualization, and visual analytics, this book is a valuable resource for eye-tracking researchers within the visualization community.
This work addresses the evaluation of the human and the automatic speaker recognition performances under different channel distortions caused by bandwidth limitation, codecs, and electro-acoustic user interfaces, among other impairments. Its main contribution is the demonstration of the benefits of communication channels of extended bandwidth, together with an insight into how speaker-specific characteristics of speech are preserved through different transmissions. It provides sufficient motivation for considering speaker recognition as a criterion for the migration from narrowband to enhanced bandwidths, such as wideband and super-wideband.
This book proposes dynamic wavelength and bandwidth allocation (DWBA), a hybrid of time-division multiplexing (TDM) and wavelength-division multiplexing (WDM), which offers a solution for service providers faced with multiservice networks. It discusses different models, architectures and implementations and evaluates their performance.
The content of this textbook is organized as a theory of language for the construction of talking robots. The main topic is the mechanism of natural language communication in both the speaker and the hearer. In the third edition the author has modernized the text, leaving the overview of traditional, theoretical, and computational linguistics, analytic philosophy of language, and mathematical complexity theory with their historical backgrounds intact. The format of the empirical analyses of English and German syntax and semantics has been adapted to current practice; and Chaps. 22-24 have been rewritten to focus more sharply on the construction of a talking robot.
Contemporary Issues in End User Computing brings a wealth of end user computing information to one accessible location. This collection includes empirical and theoretical research concerned with all aspects of end user computing including development, utilization, and management. ""Contemporary Issues in End User Computing"" is divided into three sections, covering Web-based end user computing tools and technologies, end user computing software and trends, and end user characteristics and learning. This scholarly book features the latest research findings dealing with end user computing concepts, issues, and trends.
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
This book embodies principles and applications of advanced soft computing approaches in engineering, healthcare and allied domains directed toward the researchers aspiring to learn and apply intelligent data analytics techniques. The first part covers AI, machine learning and data analytics tools and techniques and their applications to the class of several hospital and health real-life problems. In the later part, the applications of AI, ML and data analytics shall be covered over the wide variety of applications in hospital, health, engineering and/or applied sciences such as the clinical services, medical image analysis, management support, quality analysis, bioinformatics, device analysis and operations. The book presents knowledge of experts in the form of chapters with the objective to introduce the theme of intelligent data analytics and discusses associated theoretical applications. At last, it presents simulation codes for the problems included in the book for better understanding for beginners.
Tele operation systems, in which robots are controlled remotely, are a potential solution to performing tasks in remote, small, and hazardous environments. However, there is a big disadvantage to these systems; as the direct connection between the human and the environment is lost and operators are deprived of their sense of touch. The recreation of touch feedback through haptic devices is a possible solution, however haptic devices are far from perfect and improving their design is usually a slow trial-and-error process. This book describes 7 scientific studies that try to break this slow loop by using a deductive approach. Through investigating fundamental properties of human haptic perception using psychophysical paradigms, general knowledge on haptic perception of force, position, movement and hardness was gained. The resulting information can be applied to many different haptic devices. Consequently haptic systems can be more easily designed in an intuitive, human-centered way.
This book describes breath signal processing technologies and their applications in medical sample classification and diagnosis. First, it provides a comprehensive introduction to breath signal acquisition methods, based on different kinds of chemical sensors, together with the optimized selection and fusion acquisition scheme. It then presents preprocessing techniques, such as drift removing and feature extraction methods, and uses case studies to explore the classification methods. Lastly it discusses promising research directions and potential medical applications of computerized breath diagnosis. It is a valuable interdisciplinary resource for researchers, professionals and postgraduate students working in various fields, including breath diagnosis, signal processing, pattern recognition, and biometrics.
This book introduces new trends of theory and practice of information technologies in tourism. The book does not handle only the fundamental contribution, but also discusses innovative and emerging technologies to promote and develop new generation tourism informatics theory and their applications. Some chapters are concerned with data analysis, web technologies, social media and their case studies. Travel information on the web provided by travelers is very useful for other travelers make their travel plan. A chapter in this book proposes a method for interactive retrieval of information on accommodation facilities to support travelling customers in their travel preparations. Also an adaptive user interface for personalized transportation guidance system is proposed. Another chapter in this book shows a novel support system for the collaborative tourism planning by using the case reports that are collected via Internet. Also, a system for recommending hotels for the users is proposed and evaluated. Other chapters are concerned with recommendation, personalization and other emerging technologies.
This volume includes proceedings articles presented at the Workshop on Paralinguistic Information and its Integration in Spoken Dialogue Systems held in Granada, Spain. The material focuses on the three broad areas of spoken dialogue systems for robotics, emotions and spoken dialogue systems, and Spoken dialogue systems for real-world applications The workshop proceedings are part of the 3rd Annual International Workshop on Spoken Dialogue Systems, which brings together researchers from all over the world working in the field of spoken dialogue systems. It provides an international forum for the presentation of research and applications, and for lively discussions among researchers as well as industrialists.
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.
The focus from most Virtual Reality (VR) systems lies mainly on the visual immersion of the user. But the emphasis only on the visual perception is insufficient for some applications as the user is limited in his interactions within the VR. Therefore the textbook presents the principles and theoretical background to develop a VR system that is able to create a link between physical simulations and haptic rendering which requires update rates of 1\,kHz for the force feedback. Special attention is given to the modeling and computation of contact forces in a two-finger grasp of textiles. Addressing further the perception of small scale surface properties like roughness, novel algorithms are presented that are not only able to consider the highly dynamic behaviour of textiles but also capable of computing the small forces needed for the tactile rendering at the contact point. Final analysis of the entire VR system is being made showing the problems and the solutions found in the work
This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP's rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates' abilities to design, build, and run information privacy management programs. Written by a security and privacy expert and experienced author, CIPM Certified Information Privacy Manager All-in-One Exam Guide is based on proven pedagogy and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. *Provides 100% coverage of all eight objectives for the CIPM exam *Online content includes 300 practice questions in the Total Tester exam engine *Written by a security and privacy expert, educator, and experienced author
This book discusses how smart cities strive to deploy and interconnect infrastructures and services to guarantee that authorities and citizens have access to reliable and global customized services. The book addresses the wide range of topics present in the design, development and running of smart cities, ranging from big data management, Internet of Things, and sustainable urban planning. The authors cover - from concept to practice - both the technical aspects of smart cities enabled primarily by the Internet of Things and the socio-economic motivations and impacts of smart city development. The reader will find smart city deployment motivations, technological enablers and solutions, as well as state of the art cases of smart city implementations and services. * Provides a single compendium of the technological, political, and social aspects of smart cities; * Discusses how the successful deployment of smart Cities requires a unified infrastructure to support the diverse set of applications that can be used towards urban development; * Addresses design, development and running of smart cities, including big data management and Internet of Things applications.
Art and Technology of Entertainment Computing and Communication takes a blue sky research perspective on the field of interactive media for entertainment computing. Adrian David Cheok argues that entertainment as an end-product is useful for interactive play, however it is also a powerful tool for learning and communication and it is also a key driver for the development of information technology. This book explores the future of entertainment technologies used for communication and describes quantum step research. It will inform and inspire readers to create their own radical inventions and innovations that are not incremental, but which break through ideas and non-obvious solutions. One of the main explorations is the examination of how new forms of computer interaction can lead to radical new forms of technology and art for entertainment computing. Art and Technology of Entertainment Computing and Communication is an informative and inspirational text for students and the next generation of researchers. It s main aim is to provide information that will hopefully help change the world and society for the better, through new modes of entertainment and communication. Academics, researchers, engineers, game designers, and interaction designers, will find the content both interesting and valuable. Entertainment is the "engine" to inspire people and drive innovation in interactive digital media design. The pioneer of the field, Prof. Adrian David Cheok, takes you on an exciting tour of the future shaped by the Entertainment Technologies. Hiroshi ISHII, Muriel R. Cooper Professor of Media Arts and Sciences, MIT Media Laboratory." |
![]() ![]() You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter
Paperback
Productivity with Health, Safety, and…
Lakhwinder Pal Singh, Arvind Bhardwaj, …
Hardcover
R5,632
Discovery Miles 56 320
|