|
|
Books > Computing & IT > Social & legal aspects of computing
We are in an ever-changing and fast-paced world that is entrenched
in technological innovation. But how is technology and science
impacting our society? How does it affect our interactions with
these products and ultimately with each other? How is society
shaping the types of technologies we are advancing? Critical Issues
Impacting Science, Technology, Society (STS) and Our Future
compiles theory and research from the confluence of a variety of
disciplines to discuss how scientific research and technological
innovation is shaping society, politics, and culture, and predicts
what can be expected in the future. While highlighting topics
including political engagement, artificial intelligence, and
wearable technology, this book is ideally designed for
policymakers, government officials, business managers, computer
engineers, IT specialists, scientists, and professionals and
researchers in the science, technology, and humanities fields.
The use of multimodality combined with mobile devices allows a
simple, intuitive communication approach and generates new and
pervasive services for users. ""Multimodal Human Computer
Interaction and Pervasive Services"" provides theoretical and
practical concepts, methodologies, and applications used to design
and develop multimodal systems. Collecting cutting-edge research by
international experts, this Premier Reference Source addresses the
many challenges of multimodal systems with a particular focus on
mobile devices. Topics covered in this title include: amibuity
management in multimodal systems; analyzing multimodal interaction;
mobile virtual blackboard; multimodal human computer interaction;
multimodal input fusion strategies; multimodal language processor;
multimodal user interface; pervasive services; technology
acceptance models; and, usability evaluation of multimodal
interfaces.
This book presents a variety of techniques designed to enhance and
empower multi-disciplinary and multi-institutional machine learning
research in healthcare informatics. It is intended to provide a
unique compendium of current and emerging machine learning
paradigms for healthcare informatics, reflecting the diversity,
complexity, and depth and breadth of this multi-disciplinary area.
This book is available as open access through the Bloomsbury Open
Access programme and is available on www.bloomsburycollections.com.
Social, casual and mobile games, played on devices such as
smartphones, tablets, or PCs and accessed through online social
networks, have become extremely popular, and are changing the ways
in which games are designed, understood, and played. These games
have sparked a revolution as more people from a broader demographic
than ever play games, shifting the stereotype of gaming away from
that of hardcore, dedicated play to that of activities that fit
into everyday life. Social, Casual and Mobile Games explores the
rapidly changing gaming landscape and discusses the ludic,
methodological, theoretical, economic, social and cultural
challenges that these changes invoke. With chapters discussing
locative games, the new freemium economic model, and gamer
demographics, as well as close studies of specific games (including
Candy Crush Saga, Angry Birds, and Ingress), this collection offers
an insight into the changing nature of games and the impact that
mobile media is having upon individuals and societies around the
world.
In the digital age, numerous technological tools are available to
enhance educational practices. When used effectively, student
engagement and mobile learning are significantly increased. Social
Media in Education: Breakthroughs in Research and Practice contains
a compendium of the latest academic material on the usage,
strategies, and applications of social media in education today.
Including innovative studies on online networks, social
constructivism, and collaborative learning, this publication is an
ideal source for educators, professionals, school administrators,
researchers, and practitioners in the field of education.
'Information Technology and Economic Development' looks at the
effect of information technology on fields such as politics,
education, sociology and technology.
Community Informatics: Enabling Communities with Information and
Communications Technologies provides an introduction to the
community use of information and communications technologies, an
overview of the various areas in which ICT is impacting local
development and a set of case studies of CI.
Service delivery in the digital era is all about bringing together
innovative ideas from various stakeholders in the private, public,
and civil sectors to meet customer expectations. Like any business,
government public service entities must provide public service
delivery to their customers in an age that is heavily influenced by
technological advancements. Information Systems Strategic Planning
for Public Service Delivery in the Digital Era is an essential
reference source that discusses issues related to public service
delivery in the digital era and the degree to which governments may
take advantage of the transformational potential of ICT to move
towards seamless government, particularly for improving service
delivery, democratic responsiveness, and public outreach. The book
also provides a pragmatic framework for government entities to
define their information systems strategic plan (ISSP), guiding the
reader in a step-by-step practical description of the various
technical concepts, current and future technology trends, and
implementation considerations for formulating their ISSP to ensure
the maximum gain from public service delivery. Including research
on topics such as human capital, knowledge economy, and block chain
technology, this book is ideally designed for academicians, public
administrators, government officials, IT consultants.
Due to the prevalence of social network service and social media,
the problem of cyberbullying has risen to the forefront as a major
social issue over the last decade. Internet hate, harassment,
cyberstalking, cyberbullying-these terms, which were almost unknown
10 years ago-are in the everyday lexicon of all internet users.
Unfortunately, it is becoming increasingly difficult to undertake
continuous surveillance of websites as new ones are appearing
daily. Methods for automatic detection and mitigation for online
bullying have become necessary in order to protect the online user
experience. Automatic Cyberbullying Detection: Emerging Research
and Opportunities provides innovative insights into online bullying
and methods of early identification, mitigation, and prevention of
harassing speech and activity. Explanations and reasoning for each
of these applied methods are provided as well as their pros and
cons when applied to the language of online bullying. Also included
are some generalizations of cyberbullying as a phenomenon and how
to approach the problem from a practical technology-backed point of
view. The content within this publication represents the work of
deep learning, language modeling, and web mining. It is designed
for academicians, social media moderators, IT consultants,
programmers, education administrators, researchers, and
professionals and covers topics centered on identification methods
and mitigation of internet hate and online harassment.
Recent advancements and innovations in medical image and data
processing have led to a need for robust and secure mechanisms to
transfer images and signals over the internet and maintain
copyright protection. The Handbook of Research on Information
Security in Biomedical Signal Processing provides emerging research
on security in biomedical data as well as techniques for accurate
reading and further processing. While highlighting topics such as
image processing, secure access, and watermarking, this publication
explores advanced models and algorithms in information security in
the modern healthcare system. This publication is a vital resource
for academicians, medical professionals, technology developers,
researchers, students, and practitioners seeking current research
on intelligent techniques in medical data security.
This edited volume explores the intersection between philosophy and
computing. It features work presented at the 2016 annual meeting of
the International Association for Computing and Philosophy. The 23
contributions to this volume neatly represent a cross section of 40
papers, four keynote addresses, and eight symposia as they cut
across six distinct research agendas. The volume begins with
foundational studies in computation and information, epistemology
and philosophy of science, and logic. The contributions next
examine research into computational aspects of cognition and
philosophy of mind. This leads to a look at moral dimensions of
man-machine interaction as well as issues of trust, privacy, and
justice. This multi-disciplinary or, better yet, a-disciplinary
investigation reveals the fruitfulness of erasing distinctions
among and boundaries between established academic disciplines. This
should come as no surprise. The computational turn itself is
a-disciplinary and no former discipline, whether scientific,
artistic, or humanistic, has remained unchanged. Rigorous
reflection on the nature of these changes opens the door to inquiry
into the nature of the world, what constitutes our knowledge of it,
and our understanding of our place in it. These investigations are
only just beginning. The contributions to this volume make this
clear: many encourage further research and end with open questions.
Social media platforms have emerged as an influential and popular
tool in the digital era. No longer limited to just personal use,
the applications of social media have expanded in recent years into
the business realm. Analyzing the Strategic Role of Social
Networking in Firm Growth and Productivity examines the role of
social media technology in organizational settings to promote
business development and growth. Highlighting a range of relevant
discussions from the public and private sectors, this book is a
pivotal reference source for professionals, researchers,
upper-level students, and academicians.
In this book, you will learn several skills and techniques that you
need to acquire in order to become a successful computer hacker.
Hacking is a term that has been associated with negativity over the
years. It has been mentioned when referring to a ran
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The
Pentester BluePrint: Your Guide to Being a Pentester offers readers
a chance to delve deeply into the world of the ethical, or
"white-hat" hacker. Accomplished pentester and author Phillip L.
Wylie and cybersecurity researcher Kim Crawley walk you through the
basic and advanced topics necessary to understand how to make a
career out of finding vulnerabilities in systems, networks, and
applications. You'll learn about the role of a penetration tester,
what a pentest involves, and the prerequisite knowledge you'll need
to start the educational journey of becoming a pentester. Discover
how to develop a plan by assessing your current skillset and
finding a starting place to begin growing your knowledge and
skills. Finally, find out how to become employed as a pentester by
using social media, networking strategies, and community
involvement. Perfect for IT workers and entry-level information
security professionals, The Pentester BluePrint also belongs on the
bookshelves of anyone seeking to transition to the exciting and
in-demand field of penetration testing. Written in a highly
approachable and accessible style, The Pentester BluePrint avoids
unnecessarily technical lingo in favor of concrete advice and
practical strategies to help you get your start in pentesting. This
book will teach you: The foundations of pentesting, including basic
IT skills like operating systems, networking, and security systems
The development of hacking skills and a hacker mindset Where to
find educational options, including college and university classes,
security training providers, volunteer work, and self-study Which
certifications and degrees are most useful for gaining employment
as a pentester How to get experience in the pentesting field,
including labs, CTFs, and bug bounties
It is not possible to imagine our lives today without technology.
From the moment we get up in the morning until the time that we go
to bed at night, technology is present in almost every moment, even
if we are not aware of it. Some of the most basic activities we
need to perform regularly could not be carried out without
technology. Sociological and Philosophical Aspects of Human
Interaction with Technology: Advancing Concepts presents a careful
blend of conceptual, theoretical and applied research in regards to
the relationship between technology and humans. This book explores
the importance of these interactions, aspects related with trust,
communication, data protection, usability concerning organizational
change, and e-learning. The advancement of these theories and
practices will benefit from this publication as it provides a voice
for the users.
This book explores the main elements of e-Democracy, the term
normally used to describe the implementation of democratic
government processes by electronic means. It provides insights into
the main technological and human issues regarding governance,
government, participation, inclusion, empowerment, procurement and,
last but not least, ethical and privacy issues. Its main aim is to
bridge the gap between technological solutions, their successful
implementation, and the fruitful utilization of the main set of
e-Services totally or partially delivered by governments or
non-government organizations. Today, various parameters actively
influence e-Services' success or failure: cultural aspects,
organisational issues, bureaucracy and workflows, infrastructure
and technology in general, user habits, literacy, capacity or
merely interaction design. This includes having a significant
population of citizens who are willing and able to adopt and use
online services; as well as developing the managerial and technical
capability to implement applications that meet citizens' needs.
This book helps readers understand the mutual dependencies
involved; further, a selection of success stories and failures,
duly commented on, enables readers to identify the right approach
to innovation in governmental e-Services. With its balanced
humanistic and technological approach, the book mainly targets
public authorities, decision-makers, stakeholders, solution
developers, and graduate students.
|
|