0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (301)
  • R250 - R500 (1,111)
  • R500+ (10,764)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Research on e-Learning and ICT in Education (Hardcover, 2012): Athanassios Jimoyiannis Research on e-Learning and ICT in Education (Hardcover, 2012)
Athanassios Jimoyiannis
R4,000 Discovery Miles 40 000 Ships in 10 - 15 working days

This book aims to serve as a multidisciplinary forum covering technical, pedagogical, organizational, instructional, as well as policy aspects of ICT in Education and e-Learning. Special emphasis is given to applied research relevant to educational practice guided by the educational realities in schools, colleges, universities and informal learning organizations. In a more generic scope, the volume aims to encompass current trends and issues determining ICT integration in practice, including learning and teaching, curriculum and instructional design, learning media and environments, teacher education and professional development, assessment and evaluation, etc.

HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback): Philip Kortum HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback)
Philip Kortum
R1,247 Discovery Miles 12 470 Ships in 10 - 15 working days

As technology expands and evolves, one-dimensional, graphical user interface (GUI) design becomes increasingly limiting and simplistic. Designers must meet the challenge of developing new and creative interfaces that adapt to meet human needs and technological trends. HCI Beyond the GUI provides designers with this know how by exploring new ways to reach users that involve all of the human senses. Dr. Kortum gathers contributions from leading human factors designers to present a single reference for professionals, researchers, and students.
Explores the human factors involved in the design and implementation of the nontraditional interfaces, detailing design strategies, testing methodologies, and implementation techniques
Provides an invaluable resource for practitioners who design interfaces for children, gamers and users with accessibility needs
Offers extensive case studies, examples and design guidelines

Research Handbook on Electronic Commerce Law (Hardcover): John A. Rothchild Research Handbook on Electronic Commerce Law (Hardcover)
John A. Rothchild
R8,681 Discovery Miles 86 810 Ships in 10 - 15 working days

Electronic commerce is big business, and it is getting bigger: it now accounts for 7.5 percent of all retail sales in the US, and continues to expand at double-digit annual rates. The steady growth of Internet commerce over the past twenty years has given rise to a host of new legal issues in a broad range of fields. This authoritative Research Handbook comprises chapters by leading scholars which will provide a solid foundation for newcomers to the subject and also offer exciting new insights that will further the understanding of e-commerce experts. Key topics covered include: contracting, payments, intellectual property, extraterritorial enforcement, alternative dispute resolution, social media, consumer protection, network neutrality, online gambling, domain name governance and privacy. With the rise of Internet commerce, this book will be an invaluable resource for business lawyers as well as legal scholars with an interest in any phase of e-commerce law. Contributors include: A. Bridy, N.R. Cahn, I. Calbol, M.W. Carroll, C.M. Hayes, S.J. Hughes, A. Katz, J.P. Kesan, N.S. Kim, C.L. Kunz, A.R. Levinson, D. Lindsay, C. Markou, S.T. Middlebrook, J. Moringiello, E.A. Morse, J.P. Nehf, C. Riefa, S.E. Rolland, J.A. Rothchild, A.J. Schmitz, D.J. Shakow, S.B. Spencer, H. Travis, M. Trimble, A. Vranaki, S. Walsh, J. Winn

E-Strategies for Technological Diffusion and Adoption - National ICT Approaches for Socioeconomic Development (Hardcover, New):... E-Strategies for Technological Diffusion and Adoption - National ICT Approaches for Socioeconomic Development (Hardcover, New)
Sherif Kamel
R4,596 Discovery Miles 45 960 Ships in 18 - 22 working days

Information and communication technology (ICT) innovations provide significant implications for business and socioeconomic development due to the role it plays in the diffusion of knowledge sharing, community development, and equality. E-Strategies for Technological Diffusion and Adoption: National ICT Approaches for Socioeconomic Development provides comprehensive coverage and definitions of the most important issues, concepts, trends, and technologies related to the adoption, diffusion, and adaptation of national electronic strategies for ICTs in socioeconomic development. This book addresses the importance of such strategies as setting national agendas to complement efforts and resources allocated, as well as includes model strategies, implications, and case studies to work as models for future implementations.

Hackers and Hacking - A Reference Handbook (Hardcover, New): Thomas J. Holt, Bernadette H Schell Hackers and Hacking - A Reference Handbook (Hardcover, New)
Thomas J. Holt, Bernadette H Schell
R1,843 Discovery Miles 18 430 Ships in 18 - 22 working days

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives

Medical Information Processing and Security - Techniques and applications (Hardcover): Amit Kumar Singh, Huiyu Zhou Medical Information Processing and Security - Techniques and applications (Hardcover)
Amit Kumar Singh, Huiyu Zhou
R3,140 R2,842 Discovery Miles 28 420 Save R298 (9%) Ships in 18 - 22 working days

Smart healthcare systems, made up of advanced wearable devices, internet of things (IoT) technologies and mobile internet connectivity, allow significant medical information to be easily and regularly transmitted over public networks. Personal patient information and clinical records are stored on hospitals and healthcare centres and can be accessed remotely by healthcare workers. Due to the widespread increase in the sheer volume of medical data being collected and created all the time, it has never been more important to ensure that such information is collected, stored and processed in a reliable and secure manner. This edited book covers the recent trends in the field of medical information processing, including prediction of complications using machine learning and trends in visualization and image analysis. Further chapters focus on information security and privacy solutions for smart healthcare applications, including encryption of medical information, privacy in smart IoT environments, medical image watermarking and secure communication systems. Medical Information Processing and Security: Techniques and applications can be used as a reference book for practicing engineers, researchers and scientists. It will also be useful for senior undergraduate and graduate students, and practitioners from government and industry as well as healthcare technology professionals working on state-of-the-art security solutions for smart healthcare applications.

Handbook of Research on Organizational Transformations through Big Data Analytics (Hardcover): Madjid Tavana, Kartikeya Puranam Handbook of Research on Organizational Transformations through Big Data Analytics (Hardcover)
Madjid Tavana, Kartikeya Puranam
R6,222 Discovery Miles 62 220 Ships in 18 - 22 working days

Big data analytics utilizes a wide range of software and analytical tools to provide immediate, relevant information for efficient decision-making. Companies are recognizing the immense potential of BDA, but ensuring the data is appropriate and error-free is the largest hurdle in implementing BDA applications. The Handbook of Research on Organizational Transformations through Big Data Analytics not only catalogues the existing platforms and technologies, it explores new trends within the field of big data analytics (BDA). Containing new and existing research materials and insights on the various approaches to BDA; this publication is intended for researchers, IT professionals, and CIOs interested in the best ways to implement BDA applications and technologies.

Novel Applications of Virtual Communities in Healthcare Settings (Hardcover): Christo El Morr Novel Applications of Virtual Communities in Healthcare Settings (Hardcover)
Christo El Morr
R5,780 Discovery Miles 57 800 Ships in 18 - 22 working days

Virtual communities have gained popularity in many growing fields and have continued to expand into healthcare environments. Analyzing the impact these communities have can help provide more effective methods to support patients and community members. Novel Applications of Virtual Communities in Healthcare Settings is a crucial scholarly reference source that examines the challenges virtual communities can face, as well as the advantages they provide to members of healthcare organizations. Featuring pertinent topics that include evaluation frameworks, disaster management, knowledge translation, and user engagement, this book is ideal for medical practitioners, academicians, students, and healthcare researchers that are interested in taking part in the latest discussions of virtual communities within medical fields.

No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback): Johnny Long No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback)
Johnny Long; Series edited by Kevin D. Mitnick
R994 R833 Discovery Miles 8 330 Save R161 (16%) Ships in 10 - 15 working days

As the cliche reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.
As you browse this book, you'll hear old familiar terms like "dumpster diving," "social engineering," and "shoulder surfing." Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?
-Dumpster Diving
Be a good sport and don't read the two "D" words written in big boldletters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
-Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
-Shoulder Surfing
If you like having a screen on your laptop so you can see what you're working on, don't read this chapter.
-Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
-Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.
-Google Hacking
A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
-P2P Hacking
Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
-People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.
-Kiosks
Whathappens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
-Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

Information and Communication Overload in the Digital Age (Hardcover): Rui Pedro Figueiredo Marques, Joao Carlos Lopes Batista Information and Communication Overload in the Digital Age (Hardcover)
Rui Pedro Figueiredo Marques, Joao Carlos Lopes Batista
R4,909 Discovery Miles 49 090 Ships in 18 - 22 working days

Advances in communication technologies have created an overabundance of available information and knowledge to people in contemporary society. Consequently, it has become pivotal to develop new approaches for information processing and understanding. Information and Communication Overload in the Digital Age is a comprehensive reference source for the latest scholarly material on the increased amount of information created by evolving technologies, examining creative methods for improved control of information overload. Focusing on theoretical and experimental topics, such as media consumption, media literacy, and business applications, this book is ideally designed for researchers, practitioners, academics, graduate students, and professionals seeking emerging perspectives on information and communication management.

Personal Data Privacy and Protection in a Surveillance Era - Technologies and Practices (Hardcover, New): Christina Akrivopoulou Personal Data Privacy and Protection in a Surveillance Era - Technologies and Practices (Hardcover, New)
Christina Akrivopoulou
R4,602 Discovery Miles 46 020 Ships in 18 - 22 working days

Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology. This book explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication. It examines media practices and privacy frameworks in the fields of copyright, digital management and genetic information. New models of data protection are proposed along with their advantages and disadvantages.

Examining the Evolution of Gaming and Its Impact on Social, Cultural, and Political Perspectives (Hardcover): Keri Duncan... Examining the Evolution of Gaming and Its Impact on Social, Cultural, and Political Perspectives (Hardcover)
Keri Duncan Valentine, Lucas John Jenson
R4,877 Discovery Miles 48 770 Ships in 18 - 22 working days

With complex stories and stunning visuals eliciting intense emotional responses, coupled with opportunities for self-expression and problem solving, video games are a powerful medium to foster empathy, critical thinking, and creativity in players. As these games grow in popularity, ambition, and technological prowess, they become a legitimate art form, shedding old attitudes and misconceptions along the way. Examining the Evolution of Gaming and Its Impact on Social, Cultural, and Political Perspectives asks whether videogames have the power to transform a player and his or her beliefs from a sociopolitical perspective. Unlike traditional forms of storytelling, videogames allow users to immerse themselves in new worlds, situations, and politics. This publication surveys the landscape of videogames and analyzes the emergent gaming that shifts the definition and cultural effects of videogames. This book is a valuable resource to game designers and developers, sociologists, students of gaming, and researchers in relevant fields.

Social Software and the Evolution of User Expertise - Future Trends in Knowledge Creation and Dissemination (Hardcover, New):... Social Software and the Evolution of User Expertise - Future Trends in Knowledge Creation and Dissemination (Hardcover, New)
Tatjana Taki?1/2eva
R4,493 Discovery Miles 44 930 Ships in 18 - 22 working days

The new generation of internet technologies and web applications is seeing a growth in social software and networking, as well as other communications tools. This infrastructure of social interaction and collaboration has provided an increase in more dynamic user participation and expertise in knowledge of contents and facts traditionally only held by experts.Social Software and the Evolution of User Expertise: Future Trends in Knowledge Creation and Dissemination examines the vital role that social software applications play in regards to the cultural definitions of experts and challenges the reader to consider how recent changes in this area influence how we create and distribute knowledge. This collection brings together scholars and practitioners from various disciplines and professions to project a new kind of thinking about the understanding of the major changes in many professions.

Architects of Intelligence - The truth about AI from the people building it (Paperback): Martin Ford Architects of Intelligence - The truth about AI from the people building it (Paperback)
Martin Ford
R1,041 Discovery Miles 10 410 Ships in 18 - 22 working days

Book DescriptionHow will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level machine intelligence? What should we be concerned about as artificial intelligence advances? Architects of Intelligence contains a series of in-depth, one-to-one interviews where New York Times bestselling author, Martin Ford, uncovers the truth behind these questions from some of the brightest minds in the Artificial Intelligence community. Martin has wide-ranging conversations with twenty-three of the world's foremost researchers and entrepreneurs working in AI and robotics: Demis Hassabis (DeepMind), Ray Kurzweil (Google), Geoffrey Hinton (Univ. of Toronto and Google), Rodney Brooks (Rethink Robotics), Yann LeCun (Facebook) , Fei-Fei Li (Stanford and Google), Yoshua Bengio (Univ. of Montreal), Andrew Ng (AI Fund), Daphne Koller (Stanford), Stuart Russell (UC Berkeley), Nick Bostrom (Univ. of Oxford), Barbara Grosz (Harvard), David Ferrucci (Elemental Cognition), James Manyika (McKinsey), Judea Pearl (UCLA), Josh Tenenbaum (MIT), Rana el Kaliouby (Affectiva), Daniela Rus (MIT), Jeff Dean (Google), Cynthia Breazeal (MIT), Oren Etzioni (Allen Institute for AI), Gary Marcus (NYU), and Bryan Johnson (Kernel). Martin Ford is a prominent futurist, and author of Financial Times Business Book of the Year, Rise of the Robots. He speaks at conferences and companies around the world on what AI and automation might mean for the future.

Computer-mediated Relationships and Trust - Managerial and Organizational Effects (Hardcover): Linda L. Brennan, Victoria... Computer-mediated Relationships and Trust - Managerial and Organizational Effects (Hardcover)
Linda L. Brennan, Victoria Johnson
R4,595 Discovery Miles 45 950 Ships in 18 - 22 working days

'Computer-Mediated Relationships and Trust' examines how building trust is different for managers developing 'virtual' (i.e. computer mediated) relationships.

Permanent Record (Paperback): Edward Snowden Permanent Record (Paperback)
Edward Snowden
R299 R271 Discovery Miles 2 710 Save R28 (9%) Ships in 5 - 10 working days

Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.

Control Applications for Biomedical Engineering Systems (Paperback): Ahmad Taher Azar Control Applications for Biomedical Engineering Systems (Paperback)
Ahmad Taher Azar
R3,037 Discovery Miles 30 370 Ships in 10 - 15 working days

Control Applications for Biomedical Engineering Systems presents different control engineering and modeling applications in the biomedical field. It is intended for senior undergraduate or graduate students in both control engineering and biomedical engineering programs. For control engineering students, it presents the application of various techniques already learned in theoretical lectures in the biomedical arena. For biomedical engineering students, it presents solutions to various problems in the field using methods commonly used by control engineers.

User-Centered Design Stories - Real-World UCD Case Studies (Paperback): Carol Righi, Janice James User-Centered Design Stories - Real-World UCD Case Studies (Paperback)
Carol Righi, Janice James
R1,464 Discovery Miles 14 640 Ships in 10 - 15 working days

Intended for both the student and the practitioner, this is the first user-centered design casebook. It follows the Harvard Case study method, where the reader is placed in the role of the decision-maker in a real-life professional situation. In this book, the reader is asked to perform analysis of dozens of UCD work situations and propose solutions for the problem set.
The problems posed in the cases cover a wide variety of key tasks and issues facing practitioners today, including those that are related to organizational/managerial topics, UCD methods and processes, and technical/ project issues. The benefit of the casebook and its organization is that it offers the new practitioner (as well as experienced practitioners working in new settings) the valuable practice in decision-making that one cannot get by reading a book or attending a seminar.
*The first User-Centered Design Casebook, with cases covering the key tasks and issues facing UCD practitioners today.
*Each chapter based on real world cases with complex problems, giving readers as close to a real-world experience as possible.
* Offers "the things you don't learn in school," such as innovative and hybrid solutions that were actually used on the problems discussed.

Selected Readings on the Human Side of Information Technology (Hardcover): Edward Szewczak Selected Readings on the Human Side of Information Technology (Hardcover)
Edward Szewczak
R5,021 Discovery Miles 50 210 Ships in 18 - 22 working days

Education and research in the field of humanside information technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on the Human Side of Information Technology supplements course instruction and student research with quality chapters focused on key issues concerning the behavioral and social aspects of information technology. Containing over 30 chapters from authors across the globe, these selected readings in areas such as user behavior, human computer interaction, and social computing depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R1,854 Discovery Miles 18 540 Ships in 18 - 22 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Promoting Economic and Social Development Through Serious Games (Hardcover): Oscar Bernardes, Vanessa Amorim Promoting Economic and Social Development Through Serious Games (Hardcover)
Oscar Bernardes, Vanessa Amorim
R6,648 Discovery Miles 66 480 Ships in 18 - 22 working days

This publication contributes to the serious games field by investigating original contributions and methods that use serious games in various domains. This comprehensive and timely publication works as an essential reference source, building on the available literature in the field of Serious Games for the economic and social development of countries while providing for further research opportunities in this dynamic and growing field. Thus, the book provides the opportunity for a reflection on this important issue, increasing the understanding of the importance of Serious Games in the context of organizations' improvements, providing relevant academic work, empirical research findings, and an overview of this relevant field of study. This text provides the resources necessary for policy makers, technology developers and managers to adopt and implement solutions for a more digital era.

Human-Computer Interaction - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover): Information Reso Management... Human-Computer Interaction - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover)
Information Reso Management Association
R16,512 Discovery Miles 165 120 Ships in 18 - 22 working days
Jobs to Be Done Playbook - Align Your Markets, Organization, and Strategy Around Customer Needs (Paperback): Jim Kalbach Jobs to Be Done Playbook - Align Your Markets, Organization, and Strategy Around Customer Needs (Paperback)
Jim Kalbach; Foreword by Michael Schrage; Illustrated by Michael Tanamachi
R1,071 Discovery Miles 10 710 Ships in 18 - 22 working days
Critical Issues Impacting Science, Technology, Society (STS) and Our Future (Hardcover): Heather Christina Lum Critical Issues Impacting Science, Technology, Society (STS) and Our Future (Hardcover)
Heather Christina Lum
R4,622 Discovery Miles 46 220 Ships in 18 - 22 working days

We are in an ever-changing and fast-paced world that is entrenched in technological innovation. But how is technology and science impacting our society? How does it affect our interactions with these products and ultimately with each other? How is society shaping the types of technologies we are advancing? Critical Issues Impacting Science, Technology, Society (STS) and Our Future compiles theory and research from the confluence of a variety of disciplines to discuss how scientific research and technological innovation is shaping society, politics, and culture, and predicts what can be expected in the future. While highlighting topics including political engagement, artificial intelligence, and wearable technology, this book is ideally designed for policymakers, government officials, business managers, computer engineers, IT specialists, scientists, and professionals and researchers in the science, technology, and humanities fields.

Multimodal Human Computer Interaction and Pervasive Services (Hardcover): Patrizia Grifoni Multimodal Human Computer Interaction and Pervasive Services (Hardcover)
Patrizia Grifoni
R5,017 Discovery Miles 50 170 Ships in 18 - 22 working days

The use of multimodality combined with mobile devices allows a simple, intuitive communication approach and generates new and pervasive services for users. ""Multimodal Human Computer Interaction and Pervasive Services"" provides theoretical and practical concepts, methodologies, and applications used to design and develop multimodal systems. Collecting cutting-edge research by international experts, this Premier Reference Source addresses the many challenges of multimodal systems with a particular focus on mobile devices. Topics covered in this title include: amibuity management in multimodal systems; analyzing multimodal interaction; mobile virtual blackboard; multimodal human computer interaction; multimodal input fusion strategies; multimodal language processor; multimodal user interface; pervasive services; technology acceptance models; and, usability evaluation of multimodal interfaces.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R505 Discovery Miles 5 050
Information And Communications…
Dana van der Merwe Paperback R1,320 R1,199 Discovery Miles 11 990
Misbelief - What Makes Rational People…
Dan Ariely Paperback R350 R317 Discovery Miles 3 170
E-Commerce In South Africa
Adheesh Budree Paperback R445 Discovery Miles 4 450
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter Paperback R1,382 R1,304 Discovery Miles 13 040
At Any Cost - The South African…
Stephen Timm Paperback R385 R344 Discovery Miles 3 440
Brain Machine Interfaces for Space…
Luca Rossini, Dario Izzo Hardcover R4,841 Discovery Miles 48 410
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi Paperback R664 R612 Discovery Miles 6 120
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,565 Discovery Miles 15 650

 

Partners