![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Advances in network connectivity, power consumption, and physical size create new possibilities for using interactive computing outdoors. However, moving computing outdoors can drastically change the human outdoor experience. This impact is felt in many kinds of outdoor activities such as citizen science, personal recreation, search and rescue, informal education, and others. It is also felt across outdoor settings that range from remote wilderness to crowded cities. Understanding these effects can lead to ideas, designs and systems that improve, rather than diminish, outdoor experiences. This book represents the current results emerging from recent workshops focused on HCI outdoors and held in conjunction with CHI, GROUP, UbiComp, and MobileHCI conferences. Based on feedback at those workshops, and outreach to other leaders in the field, the chapters collected were crafted to highlight methods and approaches for understanding how technologies such as handhelds, wearables, and installed standalone devices impact individuals, groups, and even communities. These findings frame new ways of thinking about HCI outdoors, explore logistical issues associated with moving computing outdoors, and probe new experiences created by involving computing in outdoor pursuits. Also important are the ways that social media has influenced preparation, experience, and reflection related to outdoor experiences. HCI Outdoors: Theory, Design, Methods and Applications is of interest to HCI researchers, HCI practitioners, and outdoor enthusiasts who want to shape future understanding and current practice related to technology in every kind of outdoor experience.
With the internet, smartphones, and video games easily available to increasing portions of society, researchers are becoming concerned with the potential side effects and consequences of their prevalence in people's daily lives. Many individuals are losing control of their internet use, using it and other devices excessively to the point that they negatively affect their wellbeing as these individuals withdraw from social life and use their devices to escape from the pressure of the real world. As such, it is imperative to seek new methods and strategies for identifying and treating individuals with digital addictions. Multifaceted Approach to Digital Addiction and Its Treatment is an essential research publication that explores the definition and different types of digital addiction, including internet addiction, smartphone addiction, and online gaming addition, and examines overall treatment approaches while covering sample cases by practitioners working with digital addiction. This book highlights topics such as neuroscience, pharmacology, and psychodynamics. It is ideal for psychologists, therapists, psychiatrists, counselors, health professionals, students, educators, researchers, and practitioners.
As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researchers, and professionals of the discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.""Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions"" serves as a critical source of information related to emerging issues and solutions in data mining and the influence of political and socioeconomic factors. An immense breakthrough, this essential reference provides concise coverage of emerging issues and technological solutions in data mining, and covers problems with applicable laws governing such issues.
User research is global yet despite its pervasiveness, practitioners are not all well equipped to work globally. What may have worked in Nigeria may not be accepted in Russia, may be done differently in Brazil, may partly work in China, and may completely fail in Kuwait. And what often goes less noticed, but can be equally vexing are technical, logistical and planning issues such as hiring qualified translators, payment procedures, travel issues, setting up facilities and finding test participants. The Handbook of Global User Researchis the first book to focus
on global user research. The book collects insight from UX
professionals from nine countries and, following a typical project
timeline, presents practical insights into the preparation,
fieldwork, analysis and reporting, and overall project management
forglobal user research projects. Any user experience professional
that works on global projects -- including those new to the field,
UX veterans who need information on this expanding aspect of user
research, and students -- will need this book to do their job
effectively. *Presents the definitive collection of hard won lessonsfrom user research professionals around the world *Includes real-world examples ofglobal user research challenges and provides approaches to these issues *Contains anecdotes and hard-won from the field that illustrate actionable tactics for practitioners "
Virtual communities have gained popularity in many growing fields and have continued to expand into healthcare environments. Analyzing the impact these communities have can help provide more effective methods to support patients and community members. Novel Applications of Virtual Communities in Healthcare Settings is a crucial scholarly reference source that examines the challenges virtual communities can face, as well as the advantages they provide to members of healthcare organizations. Featuring pertinent topics that include evaluation frameworks, disaster management, knowledge translation, and user engagement, this book is ideal for medical practitioners, academicians, students, and healthcare researchers that are interested in taking part in the latest discussions of virtual communities within medical fields.
Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.
There remains a widespread perception among both the public and elements of academia that the Internet is "ungovernable". However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to how it is being governed. This book will present a new conceptual framework for analysis that deconstructs the Internet into four policy "layers" with the aim of formulating a new political architecture that accurately maps out and depicts authority on the Internet today. Foremost, it will seek to draw a distinction between those actors who have a demonstrable policymaking authority versus those who merely wield influence. The book will then apply this four-layer model to an analysis of U.S. national cybersecurity policy, post-9/11. Ultimately, it will seek to determine the consequences of these political arrangements and governance policies.
Big data analytics utilizes a wide range of software and analytical tools to provide immediate, relevant information for efficient decision-making. Companies are recognizing the immense potential of BDA, but ensuring the data is appropriate and error-free is the largest hurdle in implementing BDA applications. The Handbook of Research on Organizational Transformations through Big Data Analytics not only catalogues the existing platforms and technologies, it explores new trends within the field of big data analytics (BDA). Containing new and existing research materials and insights on the various approaches to BDA; this publication is intended for researchers, IT professionals, and CIOs interested in the best ways to implement BDA applications and technologies.
The concept of pervasive and ubiquitous computing challenges our existing understanding of human-computer interaction, as it suggests a world in which computers become increasingly integrated into our daily lives. Emerging Pervasive and Ubiquitous Aspects of Information Systems: Cross-Disciplinary Advancements reviews pervasive and ubiquitous computing as it informs modern information systems. This publication provides an overview of emerging trends in context-aware computing, pervasive and smart environments, as well as research on applications of pervasive technologies in healthcare organizations, work environments, and educational settings.
This book is the THE source for information on virtual worlds, covering every aspect of this intriguing and fast-changing social practice and the technologies upon which it rests. Virtual Lives: A Reference Handbook describes the history, development, and role of virtual worlds, also known as virtual environments and immersive virtual environments. It provides detailed background about virtual worlds and their societal impact, from early precursors and inspirations to the latest trends and developments. Specifics on user demographics are included, as are descriptions of virtual worlds' functions, discussion of societal concerns and opportunities, and information about relevant research data and key persons and organizations. Although virtual worlds in their current form are a relatively new phenomenon, other online social environments have served as precursors for decades and literary inspirations go back even further. This handbook therefore covers some early developments dating back to the mid-20th century. Its primary focus, however, is on developments since the mid-1990s and especially on the current state and social impact of virtual worlds, including their impact both in the United States and around the world. A detailed chronology detailing inspirations, precursors, developments, and controversies related to virtual worlds Tables of data about users of virtual worlds An annotated list of private, nonprofit, and government organizations pertinent to virtual worlds Biographical sketches of authors, developers, researchers, policymakers, and notable virtual world users A glossary of scores of relevant terms related to virtual worlds' function and use A bibliography of additional resources readers can consult to learn even more about virtual worlds
Currently in a state of cultural transition, global society is moving from a literary society to digital one, adopting widespread use of advanced technologies such as the Internet and mobile devices. Digital media has an extraordinary impact on society's formative processes, forcing a pragmatic shift in their management and organization. ""Digital Literacy"" strives to define a conceptual framework for understanding social changes produced by digital media and creates a framework within which digital literacy acts as a tool to assist younger generations to interact critically with digital media and their culture, providing scholars, educators, researchers, and practitioners a technological and sociological approach to this cutting-edge topic from an educational perspective.
Electronic commerce is big business, and it is getting bigger: it now accounts for 7.5 percent of all retail sales in the US, and continues to expand at double-digit annual rates. The steady growth of Internet commerce over the past twenty years has given rise to a host of new legal issues in a broad range of fields. This authoritative Research Handbook comprises chapters by leading scholars which will provide a solid foundation for newcomers to the subject and also offer exciting new insights that will further the understanding of e-commerce experts. Key topics covered include: contracting, payments, intellectual property, extraterritorial enforcement, alternative dispute resolution, social media, consumer protection, network neutrality, online gambling, domain name governance and privacy. With the rise of Internet commerce, this book will be an invaluable resource for business lawyers as well as legal scholars with an interest in any phase of e-commerce law. Contributors include: A. Bridy, N.R. Cahn, I. Calbol, M.W. Carroll, C.M. Hayes, S.J. Hughes, A. Katz, J.P. Kesan, N.S. Kim, C.L. Kunz, A.R. Levinson, D. Lindsay, C. Markou, S.T. Middlebrook, J. Moringiello, E.A. Morse, J.P. Nehf, C. Riefa, S.E. Rolland, J.A. Rothchild, A.J. Schmitz, D.J. Shakow, S.B. Spencer, H. Travis, M. Trimble, A. Vranaki, S. Walsh, J. Winn
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
Information and communication technology (ICT) innovations provide significant implications for business and socioeconomic development due to the role it plays in the diffusion of knowledge sharing, community development, and equality. E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development provides comprehensive coverage and definitions of the most important issues, concepts, trends, and technologies related to the adoption, diffusion, and adaptation of national electronic strategies for ICTs in socioeconomic development. This book addresses the importance of such strategies as setting national agendas to complement efforts and resources allocated, as well as includes model strategies, implications, and case studies to work as models for future implementations.
This book presents the fundamentals of evolutionary game theory and applies them to the analysis of epidemics, which is of paramount importance in the aftermath of the worldwide COVID-19 pandemic. The primary objective of this monograph is to deliver a powerful tool to model and analyze the spread of an infectious disease during a pandemic as well as the human decision dynamics. The book employs a variant of the "vaccination game," in which a mathematical epidemiological model dovetails with evolutionary game theory. From a social physics standpoint, this book introduces an extended concept of the vaccination game starting from the fundamental issues and touching on the newest practical applications. The book first outlines the fundamental basis of evolutionary game theory, in which a two-player and two-strategy game, the so-called 2 x 2 game, and a multi-player game are concisely introduced, and the important issue of how social dilemmas are quantified is highlighted. Subsequently, the book discusses various recent applications of the extended concept of the vaccination game so as to quantitatively evaluate provisions other than vaccination, including practical intermediate protective measures such as mask-wearing, efficiency of quarantine compared with that of isolation policies for suppressing epidemics, efficiency of preemptive versus late vaccination, and optimal subsidy policies for vaccination.
This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination between intellectual property law and secured transactions law. In the context of business financing, intellectual property rights are still only reluctantly used as collateral, and on a small scale. If they are used at all, it is mostly done in the form of a floating charge or some other "all-asset" security right. The only sector in which security rights in intellectual property play a major role, at least in some jurisdictions, is the financing of movies. On the other hand, it is virtually undisputed that security rights in intellectual property could be economically valuable, or even crucial, for small and medium-sized enterprises - especially for start-ups, which are often very innovative and creative, but have limited access to corporate financing and must rely on capital markets (securitization, capital market). Therefore, they need to secure bank loans, yet lack their own traditional collateral, such as land.
Advances in communication technologies have created an overabundance of available information and knowledge to people in contemporary society. Consequently, it has become pivotal to develop new approaches for information processing and understanding. Information and Communication Overload in the Digital Age is a comprehensive reference source for the latest scholarly material on the increased amount of information created by evolving technologies, examining creative methods for improved control of information overload. Focusing on theoretical and experimental topics, such as media consumption, media literacy, and business applications, this book is ideally designed for researchers, practitioners, academics, graduate students, and professionals seeking emerging perspectives on information and communication management.
This book addresses challenges that new technologies and the big data revolution pose to existing regulatory and legal frameworks. The volume discusses issues such as blockchain and its implications for property transactions and taxes, three (or four) dimensional title registration, land use and urban planning in the age of big data, and the future of property rights in light of these changes. The book brings together an interdisciplinary collection of chapters that revolve around the potential influence of disruptive technologies on existing legal norms and the future development of real estate markets. The book is divided into five parts. Part I presents a survey of the current available research on blockchain and real estate. Part II provides a background on property law for the volume, grounding it in fundamental theory. Part III discusses the changing landscapes of property rights while Part IV debates the potential effects of blockchain on land registration. Finally the book concludes with Part V, which is devoted to new technological applications relevant to real estate. Providing an interdisciplinary perspective on emerging technologies that have the potential to disrupt the real estate industry and the regulation of it, this book will appeal to a broad audience, consisting of scholars, policy-makers, practitioners, and students, interested in real estate, law, economics, blockchain, and technology policy.
Book DescriptionHow will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level machine intelligence? What should we be concerned about as artificial intelligence advances? Architects of Intelligence contains a series of in-depth, one-to-one interviews where New York Times bestselling author, Martin Ford, uncovers the truth behind these questions from some of the brightest minds in the Artificial Intelligence community. Martin has wide-ranging conversations with twenty-three of the world's foremost researchers and entrepreneurs working in AI and robotics: Demis Hassabis (DeepMind), Ray Kurzweil (Google), Geoffrey Hinton (Univ. of Toronto and Google), Rodney Brooks (Rethink Robotics), Yann LeCun (Facebook) , Fei-Fei Li (Stanford and Google), Yoshua Bengio (Univ. of Montreal), Andrew Ng (AI Fund), Daphne Koller (Stanford), Stuart Russell (UC Berkeley), Nick Bostrom (Univ. of Oxford), Barbara Grosz (Harvard), David Ferrucci (Elemental Cognition), James Manyika (McKinsey), Judea Pearl (UCLA), Josh Tenenbaum (MIT), Rana el Kaliouby (Affectiva), Daniela Rus (MIT), Jeff Dean (Google), Cynthia Breazeal (MIT), Oren Etzioni (Allen Institute for AI), Gary Marcus (NYU), and Bryan Johnson (Kernel). Martin Ford is a prominent futurist, and author of Financial Times Business Book of the Year, Rise of the Robots. He speaks at conferences and companies around the world on what AI and automation might mean for the future.
|
![]() ![]() You may like...
Waste Biomass Management - A Holistic…
Lakhveer Singh, Vipin Chandra Kalia
Hardcover
R5,105
Discovery Miles 51 050
Sustainable Welfare in the Asia-Pacific…
Phillip Lawn, Matthew Clarke
Hardcover
R4,189
Discovery Miles 41 890
African Natural Plant Products - New…
H. Rodolfo Juliani, James Simon
Hardcover
R7,391
Discovery Miles 73 910
Advances in Construction and Demolition…
Fernando Pacheco Torgal, Yining Ding, …
Paperback
R6,834
Discovery Miles 68 340
|