![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Human computer interaction is constantly evolving in many areas and facets of modern society. Analyzing these interactions can provide a more balanced understanding of these technological advances as they pertain to people's lives. Experience-Based Human-Computer Interactions: Emerging Research and Opportunities is a pivotal reference source that provides in-depth discussions on the progression and contemporary applications of human computer interaction. Highlighting relevant topic areas such as semantic support, software intensive systems, ontology applications, and conceptual objects, this publication is ideal for engineers, academicians, students, and researchers that would like to attain more information on recent advances being made to bridge the gap between human and computer interactions.
As the internet and its applications grow more sophisticated and widespread, so too do the strategies of modern terrorist groups. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. It is necessary to understand how terrorist cells are using and adapting online tools in order to counteract their efforts. Utilization of New Technologies in Global Terror: Emerging Research and Opportunities is an informative resource that explores new developments in technological advancements and the progression of terror organizations while also examining non-government activist organizations and their new role in protecting internet freedom and combating cyberterrorism. Featuring relevant topics such as social media, cyber threats, and counterterrorism, this publication will benefit government officials, political scientists, policymakers, researchers, academicians, and graduate students interested in political science, mass communication, and cyberwarfare.
As the world has adapted to the age of digital technology, present day business leaders are required to change with the times as well. Addressing and formatting their business practices to not only encompass digital technologies, but expand their capabilities, the leaders of today must be flexible and willing to familiarize themselves with all types of global business practices. Global Business Leadership Development for the Fourth Industrial Revolution is a collection of advanced research on the methods and tactics utilized to succeed as a leader in the digital age. While highlighting topics including data privacy, corporate governance, and risk management, this book is ideally designed for business professionals, administrators, managers, executives, researchers, academicians, and business students who want to improve their understanding of the strategic role of digital technologies in the global economy, in networks and organizations, in teams and work groups, in information systems, and at the level of individuals as actors in digitally networked environments.
Usability Testing for Survey Research provides researchers with a guide to the tools necessary to evaluate, test, and modify surveys in an iterative method during the survey pretesting process. It includes examples that apply usability to any type of survey during any stage of development, along with tactics on how to tailor usability testing to meet budget and scheduling constraints. The book's authors distill their experience to provide tips on how usability testing can be applied to paper surveys, mixed-mode surveys, interviewer-administered tools, and additional products. Readers will gain an understanding of usability and usability testing and why it is needed for survey research, along with guidance on how to design and conduct usability tests, analyze and report findings, ideas for how to tailor usability testing to meet budget and schedule constraints, and new knowledge on how to apply usability testing to other survey-related products, such as project websites and interviewer administered tools.
Though humans have been communicating through virtual mediators since the invention of the telephone, new technologies make the use of virtual communications even more immediate and pervasive than ever before. By understanding the theories and models behind virtual communication, one can understand the way society has been changed and how it will continue to do so. Analyzing Digital Discourse and Human Behavior in Modern Virtual Environments examines the implications of virtual communication and online interaction and the theories and trends associated with them. It will discuss and address the differences and challenges that develop when communicating virtually and explore the various influences virtual communication plays in work, education, and quotidian life. This title provides a foundation of emerging trends from which new theories and models of communication can grow. This book will become a cherished resource for academics, researchers, technology developers, students, and government or institutional leaders.
Knowledge is a valuable resource that must be managed well for any organization to thrive. Proper knowledge management can improve business processes by creating value, yet the available tools meant to aid in the creation, collection, and storage of information have drastically changed since the emergence of social media. By using this collaborative online application for engaging with information, organizations are able to precisely decimate knowledge to the correct audience. Harnessing Social Media as a Knowledge Management Tool addresses the challenges and rewards of the proper use of social media, as well as the key enablers and barriers of its application. This publication endeavors to provide thorough insight into the role of social media in knowledge management from both an organizational and individual perspective. This book elucidates emerging strategies perfect for policy makers, managers, advertisers, academics, students, and organizations who wish to optimize performance.
Universal UX Design: Building Multicultural User Experience provides an ideal guide as multicultural UX continues to emerge as a transdisciplinary field that, in addition to the traditional UI and corporate strategy concerns, includes socio/cultural and neurocognitive concerns that constitute one of the first steps in a truly global product strategy. In short, multicultural UX is no longer a nice-to-have in your overall UX strategy, it is now a must-have. This practical guide teaches readers about international concerns on the development of a uniquely branded, yet culturally appealing, software end-product. With hands-on examples throughout, readers will learn how to accurately predict user behavior, optimize layout and text elements, and integrate persuasive design in layout, as well as how to determine which strategies to communicate image and content more effectively, while demystifying the psychological and sociopolitical factors associated with culture. The book reviews the essentials of cognitive UI perception and how they are affected by socio-cultural conditioning, as well as how different cultural bias and expectations can work in UX design.
Using a multi-disciplinary and comparative approach, this study examines emerging and innovative attempts to tackle privacy and legal issues in cloud computing such as personal data privacy, security and intellectual property protection. An international team of legal scholars, computer science researchers, regulators and practitioners present original and critical responses to the growing challenges posed by cloud computing. They analyze the specific legal implications pertaining to jurisdiction, biomedical practice and information ownership, as well as issues of regulatory control, competition and cross-border regulation. Law academics, practitioners and regulators will find this book to be a valuable, practical and accessible resource, as will computer science scholars interested in cloud computing issues. Contributors: H. Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y. Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny, C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.
The second in the Women Securing the Future with TIPPSS series, this book provides insight and expert advice from seventeen women leaders in technology, healthcare and policy to address the challenges of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for connected healthcare, and the growing Internet of Medical Things (IoMT) ecosystem. The ten chapters in this book delve into trust, security and privacy risks in connected healthcare for patients, medical devices, personal and clinical data, healthcare providers and institutions, and provide practical approaches to manage and protect the data, devices, and humans. Cybersecurity, technology and legal experts discuss risks, from data and device hacks to ransomware, and propose approaches to address the challenges including new frameworks for architecting and evaluating medical device and connected hospital cybersecurity. We all need to be aware of the TIPPSS challenges in connected healthcare, and we call upon engineers, device manufacturers, system developers and healthcare providers to ensure trust and manage the risk. Featuring contributions from prominent female experts and role models in technology, cybersecurity, engineering, computer science, data science, business, healthcare, accessibility, research, law, privacy and policy, this book sets the stage to improve security and safety in our increasingly connected world.
Demand for integral and sustainable solutions is on the rise. As new ways of defining reality emerge, this generates the progression of more humanistic and sustainable construction of operating systems. Designing for Human-Machine Symbiosis using the URANOS Model: Emerging Research and Opportunities is a pivotal reference source for the latest research on human-centered system modeling and methods to provide a generic system model to describe complex non-linear systems. Featuring extensive coverage across a range of relevant topics, such as pervasive computing systems, smart environments, and smart industrial machines, this book is ideally designed for researchers, engineers, and professionals seeking current research on the integration of human beings and their natural, informational, and socio-cultural environments into system design.
Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS
With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.
The phrase "information society" is one so ubiquitous it has become passe, but its continued use, even in academic spheres, indicates a shared acknowledgement: that information, in its myriad mercurial forms, has become so integrated into every facet of modern life that it must be considered first and foremost when making any attempt to describe the character of the age. TheHandbook of Research on Cultural and Economic Impacts of the Information Society brings together an international and interdisciplinary forum of scholars and researchers to provide a comprehensive understanding of the role that information plays in all aspects of modern society. Through case-studies and empirical analyses, this volume provides an audience of academics, researchers, students, and professionals with a timely and straightforward reference source on the role that information technology plays in such spheres as law enforcement, democracy, governance, finance, rural development, and more. Featuring empirical research and real-world case studies, this handbook explores concepts including, but not limited to, consumer culture, the impact of information and communication technologies on business innovation, cloud computing services, open and unrestricted data, and the potential value of affective computing.
|
![]() ![]() You may like...
Brain Machine Interfaces for Space…
Luca Rossini, Dario Izzo
Hardcover
R5,145
Discovery Miles 51 450
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter
Paperback
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Usability Engineering - Process…
Laura Leventhal, Julie Barnes
Paperback
R4,815
Discovery Miles 48 150
Productivity with Health, Safety, and…
Lakhwinder Pal Singh, Arvind Bhardwaj, …
Hardcover
R5,632
Discovery Miles 56 320
|