![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Co-creativity has become a significant cultural and economic phenomenon. Media consumers have become media producers. This book offers a rich description and analysis of the emerging participatory, co-creative relationships within the videogames industry. Banks discusses the challenges of incorporating these co-creative relationships into the development process. Drawing on a decade of research within the industry, the book gives us valuable insight into the continually changing and growing world of video games.
Many designers enjoy the interfaces seen in science fiction films and television shows. Freed from the rigorous constraints of designing for real users, sci-fi production designers develop blue-sky interfaces that are inspiring, humorous, and even instructive. By carefully studying these "outsider" user interfaces, designers can derive lessons that make their real-world designs more cutting edge and successful.
Imagine... a world where your next personal computing device is the last one that you would ever need to buy. Where you would never need to worry about operating systems, software patches, or viruses. Where you always had enough processing power, memory, storage, and top-of-the-line graphics. Where you could access all of the very best software applications, regardless of their platform. Where you had a constant connection to all your favourite digital services, and your battery lasted for days, perhaps even weeks, of full-on use. Sounds good, doesn't it? Well, this is the world of the Stream Tone. A world that does not exist in some far off future; this could be, figuratively speaking, our world a mere five minutes from now. All that is needed to make it a reality is the creative convergence of certain technologies that are already available and in use today. Personal computing is changing from an old world of local services, provided by local devices, to a new world of remote Web-based services, provided by cloud computing-based data centres. The STREAM TONE: The Future of Personal Computing? is a 408-page academically-oriented non-fiction book that explores, in some technical detail, what might be required to make a comprehensive move to this exciting new world, and the many benefits that move could bring. This book not only attempts to make a thorough evaluation of the technology ecosystem that will be required to create this future but also considers many of the implications of such a move. Along the way, it also discusses a wide range of currently-available technologies and how they could possibly be used to enable this future.
This volume explores how context has been and can be used in computing to model human behaviors, actions and communications as well as to manage data and knowledge. It addresses context management and exploitation of context for sharing experience across domains. The book serves as a user-centric guide for readers wishing to develop context-based applications, as well as an intellectual reference on the concept of context. It provides a broad yet deep treatment of context in computing and related areas that depend heavily on computing. The coverage is broad because of its cross-disciplinary nature but treats topics at a sufficient depth to permit a reader to implement context in his/her computational endeavors. The volume addresses how context can be integrated in software and systems and how it can be used in a computing environment. Furthermore, the use of context to represent the human dimension, individually as well as collectively is explained. Contributions also include descriptions of how context has been represented in formal as well as non-formal, structured approaches. The last section describes several human behavior representation paradigms based on the concept of context as its central representational element. The depth and breadth of this content is certain to provide useful as well as intellectually enriching information to readers of diverse backgrounds who have an interest in or are intrigued by using context to assist in their representation of the real world.
Manuel Castells - one of the world's pre-eminent social scientists - has drawn together a stellar group of contributors to explore the patterns and dynamics of the network society in its cultural and institutional diversity. The book analyzes the technological, cultural and institutional transformation of societies around the world in terms of the critical role of electronic communication networks in business, everyday life, public services, social interaction and politics. The contributors demonstrate that the network society is the new form of social organization in the Information age, replacing the Industrial society. The book analyzes processes of technological transformation in interaction with social culture in different cultural and institutional contexts: the United States of America, the United Kingdom, Finland, Russia, China, India, Canada, and Catalonia. The topics examined include business productivity, global financial markets, cultural identity, the uses of the Internet in education and health, the anti-globalization movement, political processes, media and identity, and public policies to guide technological development. Taken together these studies show that the network society adopts very different forms, depending on the cultural and institutional environments in which it evolves. The Network Society is an outstanding and original volume of direct interest in academia - particularly in the fields of social sciences, communication studies, and business schools - as well as for policymakers engaged in technological policy and economic development. Business and management experts will also discover much of value to them within this book.
Entrepreneurship is undoubtedly a social process and creating a firm requires both the mobilisation of social networks and the use of social capital. This book addresses the gap that exists between the need to take these factors into consideration and the understanding of how network relationships are developed and transformed across the venturing process. Expert contributions from key scholars in the field illustrate how social networks evolve across entrepreneurial stages, using studies from different regions across the world. Offering a comprehensive understanding, they emphasize the role of formal networks created inside professions and firms. Also examined is the impact of context including both family and internationally variable institutions that can help entrepreneurs to access resources and competencies useful for their projects. The book concludes by emphasizing the various research challenges: which theories are useful for our endeavors and which new methods can be used to understand the dynamics of the venturing process? Dynamic and eminently practical, this book will be invaluable to scholars and students studying the entrepreneurial process and the impact of social networks. It will also prove a useful tool in aiding entrepreneurs to optimize the development of their networks and better manage their entrepreneurial processes. Contributors include: L. Aaboen, M.A. Abebe, A.R. Anderson, M. Brettel, D. Chabaud, H. Chebbi, M. de Beer, S. Drakopoulou Dodd, A. Fayolle, R.T. Harrison, F.M. Hill, S.L. Jack, W. Jansen, W. Lamine, H. Lawton-Smith, C. Lechner, C.M. Leitch, C. Leyronas, F. Lind, S. Loup, A.B.R. Lwango, R. Mauer, S. Mian, G. Mollenhorst, J. Ngijol, S. Qureshi, T. Redd, V. Schutjens, M. Virahsawmy, S. Wu
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using
anonymous networking software Simple, step-by-step instructions for
configuring and using anonymous networking software Use of open
source, time-proven and peer-reviewed tools for anonymity
Plain-language discussion of actual threats and concrete
suggestions for appropriate responses Easy-to-follow tips for safer
computing
This book provides extensive research into the use of augmented reality in the three interconnected and overlapping fields of the tourism industry, museum exhibitions, and cultural heritage. It is written by a virtual team of 50 leading researchers and practitioners from 16 countries around the world. The authors explore the opportunities and challenges of augmented reality applications, their current status and future trends, informal learning and heritage preservation, mixed reality environments and immersive installations, cultural heritage education and tourism promotion, visitors with special needs, and emerging post-COVID-19 museums and heritage sites. Augmented Reality in Tourism, Museums and Heritage: A New Technology to Inform and Entertain is essential reading not only for researchers, application developers, educators, museum curators, tourism and cultural heritage promoters, but also for students (both graduates and undergraduates) and anyone who is interested in the efficient and practical use of augmented reality technology.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers. Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.
This book provides a broad overview of the benefits from a Systems Engineering design philosophy in architecting complex systems composed of artificial intelligence (AI), machine learning (ML) and humans situated in chaotic environments. The major topics include emergence, verification and validation of systems using AI/ML and human systems integration to develop robust and effective human-machine teams-where the machines may have varying degrees of autonomy due to the sophistication of their embedded AI/ML. The chapters not only describe what has been learned, but also raise questions that must be answered to further advance the general Science of Autonomy. The science of how humans and machines operate as a team requires insights from, among others, disciplines such as the social sciences, national and international jurisprudence, ethics and policy, and sociology and psychology. The social sciences inform how context is constructed, how trust is affected when humans and machines depend upon each other and how human-machine teams need a shared language of explanation. National and international jurisprudence determine legal responsibilities of non-trivial human-machine failures, ethical standards shape global policy, and sociology provides a basis for understanding team norms across cultures. Insights from psychology may help us to understand the negative impact on humans if AI/ML based machines begin to outperform their human teammates and consequently diminish their value or importance. This book invites professionals and the curious alike to witness a new frontier open as the Science of Autonomy emerges.
Emerging technologies, such as social networks and interactive web applications, have played a vital role in the way we communicate. These technologies are fundamental in reducing the digital gaps among users. Advanced Research and Trends in New Technologies, Software, Human-Computer Interaction, and Communicability presents scientific, theoretical, and practical insight on the software and technology of social networks and the factors that boost communicability. By highlighting different disciplines in the computer and social sciences, this reference is essential for practitioners, researchers, and scholars invested in the current studies, as well as for future generations in the field of ICT.
This book gathers revised and selected contributions to the 5th Dementia Lab Conference, D-Lab 2021, organized online on January 18-28, 2021, from the Emily Carr University of Art + Design, Vancouver, Canada. It describes original strategies in which design or creative methods have been shown to uncover, support and enhance the abilities of people living with dementia. Papers report on new ideas and findings relating to three main themes: engagement, empowerment and identity. They cover: ethics of inclusion and solutions for shifting the culture of care to be focused on both personal independence and reconnecting with the community; new ways of designing with people living with dementia; strategies for breaking negative stereotypes and preconceived opinions; and approaches to retaining personhood and dignity. Offering a timely source of information on new design and creative methods to a broad community of industrial, communication, interactive and inclusive designers, this book is also meant to address and inspire various stakeholders and organizations in dementia care.
This book provides practical information about web archives, offers inspiring examples for web archivists, raises new challenges, and shares recent research results about access methods to explore information from the past preserved by web archives. The book is structured in six parts. Part 1 advocates for the importance of web archives to preserve our collective memory in the digital era, demonstrates the problem of web ephemera and shows how web archiving activities have been trying to address this challenge. Part 2 then focuses on different strategies for selecting web content to be preserved and on the media types that different web archives host. It provides an overview of efforts to address the preservation of web content as well as smaller-scale but high-quality collections of social media or audiovisual content. Next, Part 3 presents examples of initiatives to improve access to archived web information and provides an overview of access mechanisms for web archives designed to be used by humans or automatically accessed by machines. Part 4 presents research use cases for web archives. It also discusses how to engage more researchers in exploiting web archives and provides inspiring research studies performed using the exploration of web archives. Subsequently, Part 5 demonstrates that web archives should become crucial infrastructures for modern connected societies. It makes the case for developing web archives as research infrastructures and presents several inspiring examples of added-value services built on web archives. Lastly, Part 6 reflects on the evolution of the web and the sustainability of web archiving activities. It debates the requirements and challenges for web archives if they are to assume the responsibility of being societal infrastructures that enable the preservation of memory. This book targets academics and advanced professionals in a broad range of research areas such as digital humanities, social sciences, history, media studies and information or computer science. It also aims to fill the need for a scholarly overview to support lecturers who would like to introduce web archiving into their courses by offering an initial reference for students.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
This handbook presents state-of-the-art research in reinforcement learning, focusing on its applications in the control and game theory of dynamic systems and future directions for related research and technology. The contributions gathered in this book deal with challenges faced when using learning and adaptation methods to solve academic and industrial problems, such as optimization in dynamic environments with single and multiple agents, convergence and performance analysis, and online implementation. They explore means by which these difficulties can be solved, and cover a wide range of related topics including: deep learning; artificial intelligence; applications of game theory; mixed modality learning; and multi-agent reinforcement learning. Practicing engineers and scholars in the field of machine learning, game theory, and autonomous control will find the Handbook of Reinforcement Learning and Control to be thought-provoking, instructive and informative. |
![]() ![]() You may like...
Productivity with Health, Safety, and…
Lakhwinder Pal Singh, Arvind Bhardwaj, …
Hardcover
R5,632
Discovery Miles 56 320
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter
Paperback
|