![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Data visualization has emerged as a serious scholarly topic, and a wide range of tools have recently been developed at an accelerated pace to aid in this research area. Examining different ways of analyzing big data can result in increased efficiency for many corporations and organizations. Data Visualization and Statistical Literacy for Open and Big Data highlights methodological developments in the way that data analytics is both learned and taught. Featuring extensive coverage on emerging relevant topics such as data complexity, statistics education, and curriculum development, this publication is geared toward teachers, academicians, students, engineers, professionals, and researchers that are interested in expanding their knowledge of data examination and analysis.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.
This multi-disciplinary book provides insight in how to establish consumer trust in electronic commerce. It first goes into detail on a broad variety of consumer trust criteria with regard to the security and reliability of electronic consumer transactions, what information must be provided to consumers, how to create a legally binding contract online, confidence in electronic payments, the resolution of disputes, what law applies to the electronic consumer contract, which body is entitled to settle the dispute and personal data protection. By means of these criteria it is assessed into what extent consumer trust is ensured by the application of a public-key infrastructure, which supports cryptographic services such as electronic signatures and encryption. An assessment is also made on the European Union cryptography policy and the European Union policy on consumer protection in electronic commerce. In addition, a wide range of co-regulation and self-regulation initiatives within the European Union and Northern America are assessed. Finally, this book provides a consumer trust framework which learns that various ingredients at different levels are required to build consumer trust in electronic commerce. As such, it clarifies the roles and responsibilities of government, industry and consumer organisations, businesses, as well as consumers themselves.
E-government has emerged not merely as a specialization in public administration but as a transformative force affecting all leaves and functions in government. Digital Government: Principles and Best Practices, written by a collection of practitioners and researchers, provides an overview of the management challenges and issues involved in seeking a new form of governance - digital government.
This edited book is the first of its kind to systematically address the intersection of e-democracy and European politics. It contributes to an improved understanding of the role that new media technologies play in European politics and the potential impact that Internet-based political participation processes may have on modern-day representative democracy in Europe. A unique, holistic approach is taken to examine e-democracy's current state and prospects in Europe from three, partially overlapping and interlocking perspectives: e-public, e-participation and e-voting. The authors provide both theory-inspired reflections on e-democracy's contribution to the formation of the European public sphere, as well as rich empirical analyses of contemporary e-participation phenomena such as the European Citizens' Initiative or e-voting practices in Estonia. Based on the presented findings, the concluding chapter combines a prospective outlook with recommendations for future paths towards meaningful integration of e-democracy in European politics and governance.
This book stages a dialogue between international researchers from the broad fields of complexity science and narrative studies. It presents an edited collection of chapters on aspects of how narrative theory from the humanities may be exploited to understand, explain, describe, and communicate aspects of complex systems, such as their emergent properties, feedbacks, and downwards causation; and how ideas from complexity science can inform narrative theory, and help explain, understand, and construct new, more complex models of narrative as a cognitive faculty and as a pervasive cultural form in new and old media. The book is suitable for academics, practitioners, and professionals, and postgraduates in complex systems, narrative theory, literary and film studies, new media and game studies, and science communication.
What the book is about This book is about the theory and practice of the use of multimedia, multimodal interfaces for leaming. Yet it is not about technology as such, at least in the sense that the authors do not subscribe to the idea that one should do something just because it is technologically possible. 'Multimedia' has been adopted in some commercial quarters to mean little more than a computer with some form of audio ar (more usually) video attachment. This is a trend which ought to be resisted, as exemplified by the material in this book. Rather than merely using a new technology 'because it is there', there is a need to examine how people leam and eommunicate, and to study diverse ways in which computers ean harness text, sounds, speech, images, moving pietures, gestures, touch, etc. , to promote effective human leaming. We need to identify which media, in whieh combinations, using what mappings of domain to representation, are appropriate far which educational purposes . . The word 'multimodal ' in the title underlies this perspective. The intention is to focus attention less on the technology and more on how to strueture different kinds of information via different sensory channels in order to yield the best possible quality of communication and educational interaction. (Though the reader should refer to Chapter 1 for a discussion of the use of the word 'multimodal' . ) Historically there was little problem.
This book presents a collection of results from the interdisciplinary research project "ELLI" published by researchers at RWTH Aachen University, the TU Dortmund and Ruhr-Universitat Bochum between 2011 and 2016. All contributions showcase essential research results, concepts and innovative teaching methods to improve engineering education. Further, they focus on a variety of areas, including virtual and remote teaching and learning environments, student mobility, support throughout the student lifecycle, and the cultivation of interdisciplinary skills.
This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.
ED-L2L, Learning to Live in the Knowledge Society, is one of the co-located conferences of the 20th World Computer Congress (WCC2008). The event is organized under the auspices of IFIP (International Federation for Information Processing) and is to be held in Milan from 7th to 10th September 2008. ED-L2L is devoted to themes related to ICT for education in the knowledge society. It provides an international forum for professionals from all continents to discuss research and practice in ICT and education. The event brings together educators, researchers, policy makers, curriculum designers, teacher educators, members of academia, teachers and content producers. ED-L2L is organised by the IFIP Technical Committee 3, Education, with the support of the Institute for Educational Technology, part of the National Research Council of Italy. The Institute is devoted to the study of educational innovation brought about through the use of ICT. Submissions to ED-L2L are published in this conference book. The published papers are devoted to the published conference themes: Developing digital literacy for the knowledge society: information problem solving, creating, capturing and transferring knowledge, commitment to lifelong learning Teaching and learning in the knowledge society, playful and fun learning at home and in the school New models, processes and systems for formal and informal learning environments and organisations Developing a collective intelligence, learning together and sharing knowledge ICT issues in education - ethics, equality, inclusion and parental role Educating ICT professionals for the global knowledge society Managing the transition to the knowledge society
This book addresses action research (AR), one of the main research methodologies used for academia-industry research collaborations. It elaborates on how to find the right research activities and how to distinguish them from non-significant ones. Further, it details how to glean lessons from the research results, no matter whether they are positive or negative. Lastly, it shows how companies can evolve and build talents while expanding their product portfolio. The book's structure is based on that of AR projects; it sequentially covers and discusses each phase of the project. Each chapter shares new insights into AR and provides the reader with a better understanding of how to apply it. In addition, each chapter includes a number of practical use cases or examples. Taken together, the chapters cover the entire software lifecycle: from problem diagnosis to project (or action) planning and execution, to documenting and disseminating results, including validity assessments for AR studies. The goal of this book is to help everyone interested in industry-academia collaborations to conduct joint research. It is for students of software engineering who need to learn about how to set up an evaluation, how to run a project, and how to document the results. It is for all academics who aren't afraid to step out of their comfort zone and enter industry. It is for industrial researchers who know that they want to do more than just develop software blindly. And finally, it is for stakeholders who want to learn how to manage industrial research projects and how to set up guidelines for their own role and expectations.
The design of various virtual environments should be based on the needs of a diverse population of users around the globe. Interface design should be user centric and should strive for making the user's interaction as simple, meaningful, and efficient as possible. User Interface Design for Virtual Environments: Challenges and Advances focuses on challenges that designers face in creating interfaces for users of various virtual environments. Chapters included in this book address various critical issues that have implications for user interface design from a number of different viewpoints. This book is written for professionals who want to improve their understanding of challenges associated with user interface design issues for globally-dispersed users in various virtual environments.
Information technology is continuing to transform global communications and the world economy with innovative products and services. In this dynamic environment, events tend to be market-driven and it may be difficult for the regulators to keep up. At the same time, there is a need for public authorities to promote effective competition within a clear, coherent, and predictable framework. This reference work summarizes the major rules and policies for information technology at European level. It describes the institutional framework and general policies for the "information society", examines the detailed rules for external trade, competition and intellectual property, and discusses the Internet and electronic commerce. It provides an excellent overview of the subject as well as a good starting point for additional research on particular issues. This work should be of interest to practising lawyers, corporate counsel, business executives, consultants, academics, and government or trade association officials.
Edited by thought leaders in the fields of urban informatics and urban interaction design, this book brings together case studies and examples from around the world to discuss the role that urban interfaces, citizen action, and city making play in the quest to create and maintain not only secure and resilient, but productive, sustainable and viable urban environments. The book debates the impact of these trends on theory, policy and practice. The individual chapters are based on blind peer reviewed contributions by leading researchers working at the intersection of the social / cultural, technical / digital, and physical / spatial domains of urbanism scholarship. The book will appeal not only to researchers and students, but also to a vast number of practitioners in the private and public sector interested in accessible content that clearly and rigorously analyses the potential offered by urban interfaces, mobile technology, and location-based services in the context of engaging people with open, smart and participatory urban environments.
How can we design better experiences? Experience Design brings together leading international scholars to provide a cross-section of critical thinking and professional practice within this emerging field. Contributors writing from theoretical, empirical and applied design perspectives address the meaning of 'experience'; draw on case studies to explore ways in which specific 'experiences' can be designed; examine which methodologies and practices are employed in this process; and consider how experience design interrelates with other academic and professional disciplines. Chapters are grouped into thematic sections addressing positions, objectives and environments, and interactions and performances, with individual case studies addressing a wide range of experiences, including urban spaces, the hospital patient, museum visitors, mobile phone users, and music festival and restaurant goers.
This book constitutes the refereed proceedings of the Third International Conference on Intelligence Science, ICIS 2018, held in Beijing China, in November 2018. The 44 full papers and 5 short papers presented were carefully reviewed and selected from 85 submissions. They deal with key issues in intelligence science and have been organized in the following topical sections: brain cognition; machine learning; data intelligence; language cognition; perceptual intelligence; intelligent robots; fault diagnosis; and ethics of artificial intelligence.
This book is the result of a group of researchers from different disciplines asking themselves one question: what does it take to develop a computer interface that listens, talks, and can answer questions in a domain? First, obviously, it takes specialized modules for speech recognition and synthesis, human interaction management (dialogue, input fusion, and multimodal output fusion), basic question understanding, and answer finding. While all modules are researched as independent subfields, this book describes the development of state-of-the-art modules and their integration into a single, working application capable of answering medical (encyclopedic) questions such as "How long is a person with measles contagious?" or "How can I prevent RSI?." The contributions in this book, which grew out of the IMIX project funded by the Netherlands Organisation for Scientific Research, document the development of this system, but also address more general issues in natural language processing, such as the development of multidimensional dialogue systems, the acquisition of taxonomic knowledge from text, answer fusion, sequence processing for domain-specific entity recognition, and syntactic parsing for question answering. Together, they offer an overview of the most important findings and lessons learned in the scope of the IMIX project, making the book of interest to both academic and commercial developers of human-machine interaction systems in Dutch or any other language. Highlights include: integrating multi-modal input fusion in dialogue management (Van Schooten and Op den Akker), state-of-the-art approaches to the extraction of term variants (Van der Plas, Tiedemann, and Fahmi; Tjong Kim Sang, Hofmann, and De Rijke), and multi-modal answer fusion (two chapters by Van Hooijdonk, Bosma, Krahmer, Maes, Theune, and Marsi). Watch the IMIX movie at www.nwo.nl/imix-film. Like IBM's Watson, the IMIX system described in the book gives naturally phrased responses to naturally posed questions. Where Watson can only generate synthetic speech, the IMIX system also recognizes speech. On the other hand, Watson is able to win a television quiz, while the IMIX system is domain-specific, answering only to medical questions. "The Netherlands has always been one of the leaders in the general field of Human Language Technology, and IMIX is no exception. It was a very ambitious program, with a remarkably successful performance leading to interesting results. The teams covered a remarkable amount of territory in the general sphere of multimodal question answering and information delivery, question answering, information extraction and component technologies." Eduard Hovy, USC, USA, Jon Oberlander, University of Edinburgh, Scotland, and Norbert Reithinger, DFKI, Germany"
This book provides an in-depth investigation on the psychological phenomenon "reactance" in the context of Human-Computer Interaction (HCI). The author argues that the complexity and autonomy of modern technology can sometimes be overwhelming and can then be perceived as a threat to freedom by its users, thereby diminishing acceptance. The book investigates if and how this is the case and provides strategies to regain the lost acceptance. Topics include relevance of reactance on HCI, triggers for reactance, consequences of reactance, measurement of reactance, and countermeasures to reactance.
How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland. -- .
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area-including healthcare, finance, manufacturing, and marketing-could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science. After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media. This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.
-a short handbook designed for practical use by business owners to ensure they act in a professional, ethical and informed way around cybersecurity -first resource of its kind for coaches and therapists
This book provides a comprehensive introduction to computational epidemiology, highlighting its major methodological paradigms throughout the development of the field while emphasizing the needs for a new paradigm shift in order to most effectively address the increasingly complex real-world challenges in disease control and prevention. Specifically, the book presents the basic concepts, related computational models, and tools that are useful for characterizing disease transmission dynamics with respect to a heterogeneous host population. In addition, it shows how to develop and apply computational methods to tackle the challenges involved in population-level intervention, such as prioritized vaccine allocation. A unique feature of this book is that its examination on the issues of vaccination decision-making is not confined only to the question of how to develop strategic policies on prioritized interventions, as it further approaches the issues from the perspective of individuals, offering a well integrated cost-benefit and social-influence account for voluntary vaccination decisions. One of the most important contributions of this book lies in it offers a blueprint on a novel methodological paradigm in epidemiology, namely, systems epidemiology, with detailed systems modeling principles, as well as practical steps and real-world examples, which can readily be applied in addressing future systems epidemiological challenges. The book is intended to serve as a reference book for researchers and practitioners in the fields of computer science and epidemiology. Together with the provided references on the key concepts, methods, and examples being introduced, the book can also readily be adopted as an introductory text for undergraduate and graduate courses in computational epidemiology as well as systems epidemiology, and as training materials for practitioners and field workers.
People are increasingly engaged in profession-related learning via social networks supported by Web 2.0 tools. Some of these informal online learners are already actively engaged in a profession, whereas others are preparing to enter a profession. Their online interactions enhance their formal education and face-to-face professional experiences Virtual Professional Development and Informal Learning via Social Networks will examine how individuals and organizations are using Web 2.0 tools to create informal learning and professional development opportunities. Informal learning is learning which occurs outside of a formal educational context, typically driven by a personal question or an immediate need. In other instances, informal learning may occur as a by-product of other social interactions. In this context, we focus on informal learning that occurs through online social networks on a voluntary basis. Professional development, then, is defined as learning that will enhance one's job-related knowledge or career growth. This book is perfectly suited for academics and practitioners as it is written in a manner that is clearly accessible and includes implications for practice.
This book is based on contributions to the Seventh European Summer School on Language and Speech Communication that was held at KTH in Stockholm, Sweden, in July of 1999 under the auspices of the European Language and Speech Network (ELSNET). The topic of the summer school was "Multimodality in Language and Speech Systems" (MiLaSS). The issue of multimodality in interpersonal, face-to-face communication has been an important research topic for a number of years. With the increasing sophistication of computer-based interactive systems using language and speech, the topic of multimodal interaction has received renewed interest both in terms of human-human interaction and human-machine interaction. Nine lecturers contri buted to the summer school with courses on specialized topics ranging from the technology and science of creating talking faces to human-human communication, which is mediated by computer for the handicapped. Eight of the nine lecturers are represented in this book. The summer school attracted more than 60 participants from Europe, Asia and North America representing not only graduate students but also senior researchers from both academia and industry." |
![]() ![]() You may like...
Lacanian Psychoanalysis - A Contemporary…
Shlomit Yadlin-Gadot, Uri Hadar
Paperback
R759
Discovery Miles 7 590
Practising Strategy - A Southern African…
Peet Venter, Tersia Botha
Paperback
![]() R746 Discovery Miles 7 460
Introduction To Business Management…
L. Alsemgeest, K. Booysen, …
Paperback
R782
Discovery Miles 7 820
|