![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Human factors are the scientific discipline concerned with the understanding of interactions among humans and other elements of a system, and the profession that applies theory, principles, data, and other methods to design to optimize human well-being and overall system performance. Human factor issues and the impact of technology on society is a topic that is only growing, and it is essential that it is considered as technology becomes more present in our daily lives. This not only impacts society now but is something to be considered for the future. It is also incredibly important for those in the human factors profession to consider the impact of technology for their work and for the users they are helping design for. Therefore, this topic has immense impact and is important to study from a research perspective to advance the understanding of how technology works, how we work, and how we as humans work within the context of the technology we use. Human Factors Issues and the Impact of Technology on Society examines the role of technology on society with a specific focus on human factors issues and how they are associated with and related to technology use in society. A few highlighted topics within this book are digital health technologies, learning technologies, ethics in social technology, ICT use in businesses, and sustainability. These topics are only a few of examples of how this book analyzes technology in all different facets of society, making it ideal for a wide audience including human factors practitioners, technologists, sociologists, policy makers, teachers, technology developers and designers, business professionals, ethicists, researchers, academicians, students, and anyone else seeking more information on how technology is impacting society through the viewpoint of human factors.
Due to its versatility and accessibility, individuals all around the world routinely use various forms of technology to interact with one another. Over the years, the design and development of technologies and interfaces have increasingly aimed to improve the human-computer interactive experience in unimaginable ways. The Handbook of Research on Human-Computer Interfaces and New Modes of Interactivity is a collection of innovative research on the methods and applications of interactive technologies in the modern age. Highlighting topics including digital environments, sensory applications, and transmedia applications, this book is ideally designed for academicians, researchers, HCI developers, programmers, IT consultants, and media specialists seeking current research on the design, application, and advancement of different media technologies and interfaces that can support interaction across a wide range of users.
Researchers have harnessed the flood of personal information and opinions shared on social media platforms in a variety of ways. People communicate not only what they imagine they are purposely sharing but also unintentionally leak information, which allows others to glimpse a sense of the subconscious and unconscious at a macro level. Electronic Hive Minds on Social Media: Emerging Research and Opportunities explores various research techniques to profile the electronic hive mind around social topics as expressed on various modalities of social media, from human, bot, and cyborg social media accounts, and proposes new research methods for harnessing public data from social media platforms. Highlighting topics such as knowledge sharing, swarm intelligence, and social psychology, this publication is designed for researchers, social psychologists, practitioners, and students in marketing, communications, mass media, and similar fields.
The Internet serves as an essential tool in promoting health awareness through the circulation of important research among the medical professional community. While digital tools and technologies have greatly improved healthcare, challenges are still prevalent among diverse populations worldwide. The Handbook of Research on Advancing Health Education through Technology presents a comprehensive discussion of health knowledge equity and the importance of the digital age in providing life-saving data for diagnosis and treatment of diverse populations with limited resources. Featuring timely, research-based chapters across a broad spectrum of topic areas including, but not limited to, online health information resources, data management and analysis, and knowledge accessibility, this publication is an essential reference source for researchers, academicians, medical professionals, and upper level students interested in the advancement and dissemination of medical knowledge.
In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academicians, advanced-level students, and technology developers in the field of big data.
Scientific experiments and medical improvements in recent years have augmented our bodies, made them manipulable; our personal data have been downloaded, stored, sold, analyzed; and the pandemic has given new meaning to the idea of 'virtual presence'. Such phenomena are often thought to belong to the era of the 'posthuman', an era that both promises and threatens to redefine the notion of the human: what does it mean to be human? Can technological advances impact the way we define ourselves as a species? What will the future of humankind look like? These questions have gained urgency in recent years, and continue to preoccupy cultural and legal practitioners alike. How can the law respond and adapt to a world shaped by technology and AI? How can it ensure that technological developments remain inclusive, while simultaneously enforcing ethical limits to its reach? The volume explores how fictional texts, whether on the page or on screen, negotiate the legal dilemmas posed by the increasing infiltration of technology into modern life.
This book sets out a possible trajectory for the co-development of legal responsibility on the one hand and artificial intelligence and the machines and systems driven by it on the other. As autonomous technologies become more sophisticated it will be harder to attribute harms caused by them to the humans who design or work with them. This will put pressure on legal responsibility and autonomous technologies to co-evolve. Mark Chinen illustrates how these factors strengthen incentives to develop even more advanced systems, which in turn inspire nascent calls to grant legal and moral status to autonomous machines. This book is a valuable resource for scholars and practitioners of legal doctrine, ethics and autonomous technologies, as well as legislators and policy makers, and engineers and designers who are interested in the broader implications of their work.
Intellectual property goods are frequently referred to as intangible or abstract. Yet, traditionally, they have almost always needed to be embodied or materialized in order to be protected (and - to a certain extent - to be used and enjoyed), regardless of whether they are copyrighted works, patented inventions or trademarks. With a focus on the issue of access and the challenges of new technologies such as biotechnology and digital technologies, this unique collection analyzes the relationship between intellectual property and its physical embodiments. It contains a mixture of theoretical and practical perspectives and encompasses an interdisciplinary approach, including chapters on the connection between intellectual property and cultural heritage law, cultural property law and international trade law. The book furthermore comprises historical reflections that illuminate how intellectual property has never been purely about the intangible. Intellectual Property and Access to Im/material Goods will be of interest to scholars, practitioners and law and policymakers. Users of intellectual property goods such as museums, libraries, archives and/or other cultural institutions, as well as users of biomaterials, copyrighted works, patented inventions and/or trademarked goods will find value in this book. Contributors include: C.E. Bell, M. Blakeney, D.L. Burk, S. Corbett, S. Frankel, M.J. Madison, A. McMahon, A. Pottage, L.K. Skorodenski, G. Spedicato, P.K. Yu
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
The first NFT book that tells of the beginning of Crypto Art with 50 of the best artists in the movement. In the last year, crypto art has overwhelmed the world of digital art and beyond, involving collectors, museums, and auction houses, creating a fully-fledged digital revolution. It is guided by visionary artists who have promoted this unprecedented movement, with new rules, overwhelming dynamics, and innovative ways of using art. Crypto Art Begins, published by Rizzoli Italia and New York, is based on an idea and project by The NFT Magazine, the first monthly magazine to be read and collected on the blockchain Ethereum. The volume tells of this exciting movement through the history and works of 50 crypto artists including Hackatao, Refik Anadol, Kevin Abosch, Osinachi, Federico Clapis, Giant Swan, and DADA.Art who contributed to its creation and form a part of it with their NFTs (non-fungible tokens) representing the present and future of this new world.
Although the effort to involve women in engineering has risen in recent years with the creation of new initiatives and the promotion of inclusion in technical disciplines, the active participation of women in engineering professions is continuously lower than expected. While the need for engineers appears to be constantly increasing, women still do not fill most of this role and have a long way to go to even reach an equal split in the field. This gender gap has a significant impact how women in the STEM fields are perceived as well as their experiences in their education and careers. When it comes to Latin American women in IT, their contribution to science can go unnoticed, their participation levels in these fields are very low, and they often occupy lower-level positions than their male counterparts. These issues need to be discussed, and the experiences of women who work in the field must be shared. Latin American Women and Research Contributions to the IT Field highlights the important role of Latin American women in IT by collecting and disseminating their frontier-research contributions in order to provide more visibility and inspire greater participation of Latin American women within the major field of computer science. With chapters contributed by female authors from eight Latin American and Caribbean countries, the book provides a deep analysis of these women's trajectory paths to high quality theoretical and applied relevant research in computer science and IT. While highlighting areas such as inclusivity and STEM education, along with advancements and achievements in topics that include nonverbal interaction in virtual reality, fuzzy logic applications in education, and ant colony optimization, this book is ideal for professionals, academics, students, and researchers working in the fields of information technologies and computer science as well as those interested in gender and women's studies.
The notion of surveillance has become increasingly more crucial in public conversation as new tools of observation are obtained by many different players. The traditional notion of "overseeing" is being increasingly replaced by multi-level surveillance where many different actors, at different levels of hierarchy, from the child surveilling the parent to the state surveilling its citizens, are entering the surveillance theater. This creates a unique surveillance ecosystem where the individual is observed not only as an analog flesh-and-blood body moving through real spaces such as a shopping mall, but also tracked as a data point where the volume of data is perpetually and permanently expanding as the digital life story is inscribed in the digital spaces. The combined narrative of the individual is now under surveillance. Modern Day Surveillance Ecosystem and Impacts on Privacy navigates the reader through an understanding of the self as a narrative element that is open for observation and analysis. This book provides a broad-based and theoretically grounded look at the overall processes of surveillance in a global system. Covering topics including commodity, loss of privacy, and big data, this text is essential for researchers, government officials, policymakers, security analysts, lawmakers, teachers, professors, graduate and undergraduate students, practitioners, and academicians interested in communication, technology, surveillance, privacy, and more.
CLARIN, the "Common Language Resources and Technology Infrastructure", has established itself as a major player in the field of research infrastructures for the humanities. This volume provides a comprehensive overview of the organization, its members, its goals and its functioning, as well as of the tools and resources hosted by the infrastructure. The many contributors representing various fields, from computer science to law to psychology, analyse a wide range of topics, such as the technology behind the CLARIN infrastructure, the use of CLARIN resources in diverse research projects, the achievements of selected national CLARIN consortia, and the challenges that CLARIN has faced and will face in the future. The book will be published in 2022, 10 years after the establishment of CLARIN as a European Research Infrastructure Consortium by the European Commission (Decision 2012/136/EU). Watch our talk with the editors Darja Fiser and Andreas Witt here: https://youtu.be/ZOoiGbmMbxI
Entity resolution is an essential tool in processing and analyzing data in order to draw precise conclusions from the information being presented. Further research in entity resolution is necessary to help promote information quality and improved data reporting in multidisciplinary fields requiring accurate data representation. Innovative Techniques and Applications of Entity Resolution draws upon interdisciplinary research on tools, techniques, and applications of entity resolution. This research work provides a detailed analysis of entity resolution applied to various types of data as well as appropriate techniques and applications and is appropriately designed for students, researchers, information professionals, and system developers.
As the utilization of intelligent machines spreads to numerous realms, the discourse of machine ethics has also developed and expanded. Concerns over machine intelligence and the role of automata in everyday life must be addressed before artificial intelligence and robotic technologies may be fully integrated into human society. Rethinking Machine Ethics in the Age of Ubiquitous Technology blends forward-looking, constructive, and interdisciplinary visions of ethical ideals, aims, and applications of machine technology. This visionary reference work incorporates ethical conversations in the fields of technology, computer science, robotics, and the medical industry, creating a vibrant dialogue between philosophical ideals and the applied sciences. With its broad scope of relevant topics, this book serves as an excellent tool for policymakers, academicians, researchers, advanced-level students, technology developers, and government officials. This timely publication features thoroughly researched articles on the topics of artificial moral agency, cyber-warfare, transhumanism, organic neural nets, human worker replacement, automaticity and global governance, security and surveillance, military drones, and more.
This book is open access and available on www.bloomsburycollections.com. It is funded by the University of Sussex, UK. How can we know about children's everyday lives in a digitally saturated world? What is it like to grow up in and through new media? What happens between the ages of 7 and 15 and does it make sense to think of maturation as mediated? These questions are explored in this innovative book, which synthesizes empirical documentation of children's everyday lives with discussions of key theoretical and methodological concepts to provide a unique guide to researching childhood and youth. Researching Everyday Childhoods begins by asking what recent 'post-empirical' and 'post-digital' frameworks can offer researchers of children and young people's lives, particularly in researching and theorising how the digital remakes childhood and youth. The key ideas of time, technology and documentation are then introduced and are woven throughout the book's chapters. Research-led, the book is informed by two state of the art empirical studies - 'Face 2 Face' and 'Curating Childhoods' - and links to a dynamic multimedia archive generated by the studies.
This book uses literature as a wrench to pry open social networks and to ask different questions than have been asked about social networks previously. The book emphasizes the story-telling aspect of social networks, as well as the connection between narrative and social networks by incorporating narrative, dynamic networks, and time. Thus, it constructs a bridge between literature, digital humanities, and social networks. This book is a pioneering work that attempts to express social and philosophic constructs in mathematical terms. The material used to test the algorithms is texts intended for performance, such as plays, film scripts, and radio plays; mathematical representations of the texts, or "literature networks", are then used to analyze the social networks found in the respective texts. By using literature networks and their accompanying narratives, along with their supporting analyses, this book allows for a novel approach to social network analysis.
The Western cultural trend of self-representation is transcending borders as it permeates the online world. A prime example of this trend is selfies, and how they have evolved into more than just self-portraits. Selfies as a Mode of Social Media and Work Space Research is a comprehensive reference source for the latest research on explicit and implicit messaging of self-portraiture and its indications about individuals, groups, and societies. Featuring coverage on a broad range of topics including dating, job hunting, and marketing, this publication is ideally designed for academicians, researchers, and professionals interested in the current phenomenon of selfies and their impact on society.
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties
An approach to socio-technical HCI called Human Work Interaction Design (HWID) emerged around 2005. It has grown steadily, and now is the time for sharing this research with a wider audience. In this book, the HWID approach is used to discuss socio-technical HCI theory, cases, methods, and impact. The book introduces HWID as a multi-sided platform for theorizing about socio-technical HCI work design in the digital age. It presents design cases that illustrate the design of socio-technical relations, provides specific advice for researchers, consultants, and policy makers, and reflects on the open issues related to theorizing about sociotechnical HCI. The benefits of HWID include that it meets the requirement of taking both the social and the technical into account, while focusing strongly on the relationship between the social and the technical. In addition, it is truly international and explicitly considers local cultural, organizational, and technological contexts. |
![]() ![]() You may like...
Heat Kernels for Elliptic and…
Ovidiu Calin, Der-Chen Chang, …
Hardcover
R3,136
Discovery Miles 31 360
Operator Theory and Differential…
Anatoly G. Kusraev, Zhanna D. Totieva
Hardcover
R2,921
Discovery Miles 29 210
Operator Semigroups Meet Complex…
Wolfgang Arendt, Ralph Chill, …
Hardcover
R5,224
Discovery Miles 52 240
|