![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.
By exploring the experiences of community activists and organizations working with information and communication technology (ICT) to build communities, this book offers a grounded and informed study of the role ICT plays in people's lives. The author emphasizes the importance of networks built around trust, shared spaces and local knowledge bases in the formation of significant relationships in contemporary Western societies and in doing so, questions many of the assumptions which inform the rhetorics of the information age.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
This engaging volume celebrates the life and work of Theodor Holm "Ted" Nelson, a pioneer and legendary figure from the history of early computing. Presenting contributions from world-renowned computer scientists and figures from the media industry, the book delves into hypertext, the docuverse, Xanadu and other products of Ted Nelson's unique mind. Features: includes a cartoon and a sequence of poems created in Nelson's honor, reflecting his wide-ranging and interdisciplinary intellect; presents peer histories, providing a sense of the milieu that resulted from Nelson's ideas; contains personal accounts revealing what it is like to collaborate directly with Nelson; describes Nelson's legacy from the perspective of his contemporaries from the computing world; provides a contribution from Ted Nelson himself. With a broad appeal spanning computer scientists, science historians and the general reader, this inspiring collection reveals the continuing influence of the original visionary of the World Wide Web.
This research topic was first established in China by Professor Shengzhao Long in 1981, with direct support from one of the greatest modern Chinese scientists, Xuesen Qian. In a letter to Shengzhao Long from October 22nd, 1993, Xuesen Qian wrote: "You have created a very important modern science subject and technology in China!" MMESE primarily focuses on the relationship between Man, Machine and Environment, studying the optimum combination of man-machine-environment systems. In this system, "Man" refers to working people as the subject in the workplace (e.g. operators, decision-makers); "Machine" is the general name for any object controlled by Man (including tools, machinery, computers, systems and technologies), and "Environment" describes the specific working conditions under which Man and Machine interact (e.g. temperature, noise, vibration, hazardous gases etc.). The three goals of optimization are to ensure "Safety, High efficiency and Economy" of man-machine-environment systems. These proceedings are an academic showcase of the best papers selected from more than 400 submissions, introducing readers to the top research topics and the latest developmental trends in the theory and application of MMESE. These proceedings are interdisciplinary studies on the concepts and methods of physiology, psychology, system engineering, computer science, environment science, management, education, and other related disciplines. Researchers and professionals who study an interdisciplinary subject crossing above disciplines or researchers on MMESE subject will be mainly benefited from these proceedings.
This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.
This book deals with the theoretical, methodological, and empirical implications of bounded rationality in the operation of institutions. It focuses on decisions made under uncertainty, and presents a reliable strategy of knowledge acquisition for the design and implementation of decision-support systems. Based on the distinction between the inner and outer environment of decisions, the book explores both the cognitive mechanisms at work when actors decide, and the institutional mechanisms existing among and within organizations that make decisions fairly predictable. While a great deal of work has been done on how organizations act as patterns of events for (boundedly) rational decisions, less effort has been devoted to study under which circumstances organizations cease to act as such reliable mechanisms. Through an empirical strategy on open-ended response data from a survey among junior judges, the work pursues two main goals. The first one is to explore the limits of "institutional rationality" of the Spanish lower courts on-call service, an optimal scenario to observe decision-making under uncertainty. The second aim is to achieve a better understanding of the kind of uncertainty under which inexperienced decision-makers work. This entails exploring the demands imposed by problems and the knowledge needed to deal with them, making this book also a study on expertise achievement in institutional environments. This book combines standard multivariate statistical methods with machine learning techniques such as multidimensional scaling and topic models, treating text as data. Doing so, the book contributes to the collaboration between empirical social scientific approaches and the community of scientists that provide the set of tools and methods to make sense of the fastest growing resource of our time: data.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand
An exploration of the effects of new technology on culture and psychology, this title demonstrates how society has been both enriched and challenged by these changes. It should be of interest to those who need to be aware of the psychological impact of new technology and responsive to issues of international communication and cooperation.
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. "Hacking Point of Sale" is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to applicationExplores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISOExplains how protected areas are hacked and how hackers spot vulnerabilitiesProposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code "Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions" is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.
"Proceedings of the 2012 International Conference on Information
Technology and Software Engineering" presents selected articles
from this major event, which was held in Beijing, December 8-10,
2012. This book presents the latest research trends, methods and
experimental results in the fields of information technology and
software engineering, covering various state-of-the-art research
theories and approaches. The subjects range from intelligent
computing to information processing, software engineering, Web,
unified modeling language (UML), multimedia, communication
technologies, system identification, graphics and visualizing,
etc.
This handbook is a comprehensive overview of the burgeoning podcast industry. It covers the history of podcasting from its roots in radio; the variety of genres, topics and styles of today's podcasts (both individual and corporate); and the steps required to build your own podcast. The handbook covers all the elements needed to create a successful podcast including platform options, programming, advertising and sponsorships. Supplemental essays from professionals in various industries provide information and tips to enhance the podcasting experience. The structure of the book is easily adapted into lesson plans, and the exercises included for readers make it a book well suited for classes on podcasting.
The relationship between innovation, networks and localities is of central concern for many nations. However, despite increasing interest in the components of this research triangle, efforts in these fields are hampered by a lackofconceptual and empirical insights. This volume brings together contributions from a distinguished group of scholars working in different but related disciplines, and aims to provide a fresh look at this research triangle. The objective is to offer a concise overview of current developments and insights derived from recent studies in Europe and North America. All of the contributions are based on original research undertaken in the various regions and nations and are published here for the first time. We are grateful to all those who have contributed to this volume for their willingness to participate in the project. Without their co-operation this book would not have been possible. We should like, in addition, to thank Angela Spence for her careful linguistic editing and assistance in co-ordinating the production of the camera ready copy. Lastly, but not least, we wish to express our gratitude for support from our home institutions, and in particular the Austrian Academy of Sciences (Institute for Urban and Regional Research), the Austrian Ministry for Science and Transport, the Styrian Government (Section for Science and Research) and the Federation of Austrian Industry in Styria for the financial backing received. April 1999 Manfred M.
The Semantic Web has evolved as a blueprint for a knowledge-based framework aimed at crossing the chasm from the current Web of unstructured information resources to a Web equipped with metadata and oriented to delegating tasks to software agents. Semantic Web Personalization and Context Awareness: Management of Personal Identities and Social Networking communicates relevant recent research in Semantic Web-based personalization as applied to the context of information systems. This book reviews knowledge engineering for organizational applications, and Semantic Web approaches to information systems and ontology-based information systems research, as well as the diverse underlying database and knowledge representation aspects that impact personalization and customization.
The International Workshop on "Human Interaction with Machines" is the sixth in a successful series of workshops that were established by Shanghai Jiao Tong University and Technische Universitat Berlin. The goal of those workshops is to bring together researchers from both universities in order to present research results to an international community. The series of workshops started in 1990 with the International Workshop on "Artificial Intelligence" and was continued with the International Workshop on "Advanced Software Technology" in 1994. Both workshops have been hosted by Shanghai Jiaotong University. In 1998 the third wo- shop took place in Berlin. This International Workshop on "Communi- tion Based Systems" was essentially based on results from the Graduiertenkolleg on Communication Based Systems that was funded by the German Research Society (DFG) from 1991 to 2000. The fourth Int- national Workshop on "Robotics and its Applications" was held in Sha- hai in 2000. The fifth International Workshop on "The Internet Challenge: Technology and Applications" was hosted by TU Berlin in 2002."
Although social, economical, and environmental sustainability has become increasingly important in this era of globalization, little effort has been put forth to investigate the social and cultural impact. Organizational Communication and Sustainable Development: ICTs for Mobility explores how mobility meets sustainability in contemporary organizational communication. A compendium of chapters written by leading international experts, this defining body of research sheds light on the advantages as well as disadvantages of the use of ICTs for social, economical, and environmental sustainability.
Whole Body Interaction is The integrated capture and processing of human signals from physical, physiological, cognitive and emotional sources to generate feedback to those sources for interaction in a digital environment (England 2009). "Whole Body Interaction "looks at the challenges of Whole Body Interaction from the perspectives of design, engineering and research methods. How do we take physical motion, cognition, physiology, emotion and social context to push boundaries of Human Computer Interaction to involve the complete set of human capabilities? Through the use of various applications the authors attempt to answer this question and set a research agenda for future work. Aimed at students and researchers who are looking for new project ideas or to extend their existing work with new dimensions of interaction. "
Artificial Intelligence (AI) is everywhere, yet it causes damage to society in ways that can't be fixed. Instead of helping to address our current crises, AI causes divisions that limit people's life chances, and even suggests fascistic solutions to social problems. This book provides an analysis of AI's deep learning technology and its political effects and traces the ways that it resonates with contemporary political and social currents, from global austerity to the rise of the far right. Dan McQuillan calls for us to resist AI as we know it and restructure it by prioritising the common good over algorithmic optimisation. He sets out an anti-fascist approach to AI that replaces exclusions with caring, proposes people's councils as a way to restructure AI through mutual aid and outlines new mechanisms that would adapt to changing times by supporting collective freedom. Academically rigorous, yet accessible to a socially engaged readership, this unique book will be of interest to all who wish to challenge the social logic of AI by reasserting the importance of the common good.
This book explores next-generation artificial intelligence based on the symbiosis between humans, machines and nature, including the rules and emerging patterns of recognition, and the integration and optimization of various flows through cyberspace, physical space and social space. It unveils a reciprocal human-machine-nature symbiotic mechanism together with relevant rules on structuring and evolving reality, and also proposes a multi-dimensional space for modelling reality and managing the methodologies for exploring reality. As such it lays the foundation for the emerging research area cyber-physical-social intelligence. Inspiring researchers and university students to explore the development of intelligence and scientific methodology, it is intended for researchers and broad readers with a basic understanding of computer science and the natural sciences. Next-generation artificial intelligence will extend machine intelligence and human intelligence to cyber-physical-social intelligence rendered by various interactions in cyberspace, physical space and social space. With the transformational development of science and society, a multi-dimensional reality is emerging and evolving, leading to the generation and development of various spaces obeying different principles. A fundamental scientific challenge is uncovering the essential mechanisms and principles that structure and evolve the reality emerging and evolving along various dimensions. Meeting this challenge requires identifying the basic relations between humans, machines and nature in order to reveal the cyber-physical-social principles.
The practical task of building a talking robot requires a theory of how natural language communication works. Conversely, the best way to computationally verify a theory of natural language communication is to demonstrate its functioning concretely in the form of a talking robot, the epitome of human-machine communication. To build an actual robot requires hardware that provides appropriate recognition and action interfaces, and because such hardware is hard to develop the approach in this book is theoretical: the author presents an artificial cognitive agent with language as a software system called database semantics (DBS). Because a theoretical approach does not have to deal with the technical difficulties of hardware engineering there is no reason to simplify the system - instead the software components of DBS aim at completeness of function and of data coverage in word form recognition, syntactic-semantic interpretation and inferencing, leaving the procedural implementation of elementary concepts for later. In this book the author first examines the universals of natural language and explains the Database Semantics approach. Then in Part I he examines the following natural language communication issues: using external surfaces; the cycle of natural language communication; memory structure; autonomous control; and learning. In Part II he analyzes the coding of content according to the aspects: semantic relations of structure; simultaneous amalgamation of content; graph-theoretical considerations; computing perspective in dialogue; and computing perspective in text. The book ends with a concluding chapter, a bibliography and an index. The book will be of value to researchers, graduate students and engineers in the areas of artificial intelligence and robotics, in particular those who deal with natural language processing. |
![]() ![]() You may like...
Teachers in Action in America - From…
Humphrey Humberto Pachecker
Hardcover
R901
Discovery Miles 9 010
Asian American Identities, Families and…
Clara C. Park, A.Lin Goodwin, …
Hardcover
R3,046
Discovery Miles 30 460
Scotland: Defending the Nation - Mapping…
Carolyn Anderson, Chris Fleet
Hardcover
R1,036
Discovery Miles 10 360
Progress Report of the Hydrometric…
M C (Murray Calder) D 1951 Hendry, Canada Dominion Water Power Branch
Hardcover
R892
Discovery Miles 8 920
A Memoir on the Indian Surveys…
Charles Edward Drummond Black, Great Britain. India Office
Hardcover
R912
Discovery Miles 9 120
Education of the Black Adult in the…
Leo McGee, Harvey Neufeldt
Hardcover
R1,352
Discovery Miles 13 520
|