![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.
This book features the latest research in the area of immersive technologies, presented at the 5th International Augmented and Virtual Reality Conference, held in Munich, Germany in 2019. Bridging the gap between academia and industry, it presents the state of the art in augmented reality (AR) and virtual reality (VR) technologies and their applications in various industries such as marketing, education, healthcare, tourism, events, fashion, entertainment, retail and the gaming industry. The volume is a collection of research papers by prominent AR and VR scholars from around the globe. Covering the most significant topics in the field of augmented and virtual reality and providing the latest findings, it is of interest to academics and practitioners alike.
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. ""Managerial Guide for Handling Cyber-Terrorism and Information Warfare"" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.
An interdisciplinary field, technology and culture, or social informatics, is part of a larger body of socio-economic, socio-psychological, and cultural research that examines the ways in which technology and groups within society are shaped by social forces within organizations, politics, economics, and culture. Given the popularity and increased usage of technology, it is imperative that educators, trainers, consultants, administrators, researchers, and professors monitor the current trends and issues relating to social side of technology in order to meet the needs and challenges of tomorrow.""Social Information Technology"" provides educators, trainers, consultants, administrators, researchers, and professors with a fundamental research source for definitions, antecedents, and consequences of social informatics and the cultural aspect of technology. This groundbreaking research work also addresses the major cultural/societal issues in social informatics technology and society such as the Digital Divide, the government and technology law, information security and privacy, cyber ethics, technology ethics, and the future of social informatics and technology, as well as concepts from technology in developing countries.
This volume includes eleven original essays that explore and expand on the work of Don Ihde, bookended by two chapters by Ihde himself. Ihde, the recipient of the first Society for Philosophy and Technology's Lifetime Achievement Award in 2017, is best known for his development of postphenomenology, a blend of pragmatism and phenomenology that incorporates insights into the ways technology mediates human perception and action. The book contains contributions from academics from Europe, North America, and Asia, which demonstrates the global impact of Ihde's work. Essays in the book explore the relationship between Ihde's work and its origins in phenomenology (especially Husserl and Heidegger) and American pragmatism; integrate his philosophical work within the embodied experience of radical architecture and imagine the possibility of a future philosophy of technology after postphenomenology; develop central ideas of postphenomenology and expand the resources present in postphenomenology to ethics and politics; and extend the influence of Ihde's ideas to mobile media and engineering, and comprehensively assess the influence of his work in China. The book includes a reprint of the Introduction of Sense and Significance, one of Ihde's first books; "Hawk: Predatory Vision," a new chapter that blends his biographical experience with feminism, technoscience, and environmental observation; and an appendix that lists all of Ihde's books as well as secondary sources annotated by Ihde himself. Starting with an Editors' Introduction that offers an overview of the central ideas in Ihde's corpus and concluding with an index that facilitates research across the various chapters, this book is of interest to a diverse academic community that includes philosophers, STS scholars, anthropologists, historians, and sociologists.
* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy in the context of location data, and answers questions such as what are the privacy related behaviors in this context, and what are the factors influencing such behaviors. The book gives an overview to what privacy means for users in terms of understandings, attitudes and valuations. This book discusses reasons for why research around this topic is challenging, and presents various methods for diving into the topic through empirical studies. The work is relevant for professionals, researchers, and users of technology.
This edited book focuses on speech etiquette, examining the rules that govern communication in various online communities: professional, female, and ethnospecific. The contributors analyze online communication in the Slavic languages Russian, Slovak, Polish, and Belarusian, showing how the concept of speech etiquette differs from the concept of politeness, although both reflect the relationship between people in interaction. Online communities are united on the basis of common informative or phatic illocutions among their participants, and their speech etiquette is manifested in stable forms of conducting discussions - stimulating and responding. Each group has its own ideas of unacceptable speech behavior and approaches to sanitation, and the rules of speech etiquette in each group determine the degree of rapport and distancing between the participants in discourse. The chapters in this book explore how rapport and distance are established through acts such as showing attention to the addressee and increasing his or her communicative status; reducing or increasing the illocutionary power of evaluations and motivations; and evaluating one's own or someone else's speech. The volume will be of interest to researchers studying online communication in such diverse fields as linguistics, sociology, anthropology, programming, and media studies.
Tools and technologies have long complemented and extended our physical abilities: from pre-historic spearheads to steam-propelled ploughs and high-tech prosthetics. While the development of lenses granted us insights into the micro and macrocosms, new sensors and technologies increasingly augment our cognitive abilities, including memory and perception. This book integrates current research efforts, results, and visions from the fields of computer science, neuroscience, and psychology. It provides a comprehensive overview of the state-of-the-art and future applications of how technologies assist and augment human perception and cognition. Experts in the field share their research and findings on: Working memory enhancements Digitization of memories through lifelog archives The consequences of technology-induced disruptions and forgetting The creation and utilization of new human senses Ethical and security concerns that arise with augmentation technologies. As technology weaves itself ever deeper into our lives, careful examination of its capabilities, risks and benefits is warranted. While this book focuses on the complementation and augmentation of human capabilities, it serves as a foundation for students, researchers and designers of technologies that push the boundaries of perception and cognition.
To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Web 2.0 provides a useful tool in developing the relationships between business and consumer. The Handbook of Research on Integrating Social Media into Strategic Marketing explores the use of social networking and other online media in marketing communications, including both best practices and common pitfalls to provide comprehensive coverage of the topic. This book is intended for marketing professionals, business managers, and anyone interested in how social media fits into today's marketing environments.
Intelligent Computing for Interactive System Design provides a comprehensive resource on what has become the dominant paradigm in designing novel interaction methods, involving gestures, speech, text, touch and brain-controlled interaction, embedded in innovative and emerging human-computer interfaces. These interfaces support ubiquitous interaction with applications and services running on smartphones, wearables, in-vehicle systems, virtual and augmented reality, robotic systems, the Internet of Things (IoT), and many other domains that are now highly competitive, both in commercial and in research contexts. This book presents the crucial theoretical foundations needed by any student, researcher, or practitioner working on novel interface design, with chapters on statistical methods, digital signal processing (DSP), and machine learning (ML). These foundations are followed by chapters that discuss case studies on smart cities, brain-computer interfaces, probabilistic mobile text entry, secure gestures, personal context from mobile phones, adaptive touch interfaces, and automotive user interfaces. The case studies chapters also highlight an in-depth look at the practical application of DSP and ML methods used for processing of touch, gesture, biometric, or embedded sensor inputs. A common theme throughout the case studies is ubiquitous support for humans in their daily professional or personal activities. In addition, the book provides walk-through examples of different DSP and ML techniques and their use in interactive systems. Common terms are defined, and information on practical resources is provided (e.g., software tools, data resources) for hands-on project work to develop and evaluate multimodal and multi-sensor systems. In a series of in-chapter commentary boxes, an expert on the legal and ethical issues explores the emergent deep concerns of the professional community, on how DSP and ML should be adopted and used in socially appropriate ways, to most effectively advance human performance during ubiquitous interaction with omnipresent computers. This carefully edited collection is written by international experts and pioneers in the fields of DSP and ML. It provides a textbook for students and a reference and technology roadmap for developers and professionals working on interaction design on emerging platforms.
This book starts with the proposition that digital media invite play and indeed need to be played by their everyday users. Play is probably one of the most visible and powerful ways to appropriate the digital world. The diverse, emerging practices of digital media appear to be essentially playful: Users are involved and active, produce form and content, spread, exchange and consume it, take risks, are conscious of their own goals and the possibilities of achieving them, are skilled and know how to acquire more skills. They share a perspective of can-do, a curiosity of what happens next? Play can be observed in social, economic, political, artistic, educational and criminal contexts and endeavours. It is employed as a (counter) strategy, for tacit or open resistance, as a method and productive practice, and something people do for fun. The book aims to define a particular contemporary attitude, a playful approach to media. It identifies some common ground and key principles in this novel terrain. Instead of looking at play and how it branches into different disciplines like business and education, the phenomenon of play in digital media is approached unconstrained by disciplinary boundaries. The contributions in this book provide a glimpse of a playful technological revolution that is a joyful celebration of possibilities that new media afford. This book is not a practical guide on how to hack a system or to pirate music, but provides critical insights into the unintended, artistic, fun, subversive, and sometimes dodgy applications of digital media. Contributions from Chris Crawford, Mathias Fuchs, Rilla Khaled, Sybille Lammes, Eva and Franco Mattes, Florian 'Floyd' Mueller, Michael Nitsche, Julian Oliver, and others cover and address topics such as reflective game design, identity and people's engagement in online media, conflicts and challenging opportunities for play, playing with cartographical interfaces, player-emergent production practices, the re-purposing of data, game creation as an educational approach, the ludification of society, the creation of meaning within and without play, the internalisation and subversion of roles through play, and the boundaries of play.
In today's society, the utilization of social media platforms has become an abundant forum for individuals to post, share, tag, and, in some cases, overshare information about their daily lives. As significant amounts of data flood these venues, it has become necessary to find ways to collect and evaluate this information. Social Media Data Extraction and Content Analysis explores various social networking platforms and the technologies being utilized to gather and analyze information being posted to these venues. Highlighting emergent research, analytical techniques, and best practices in data extraction in global electronic culture, this publication is an essential reference source for researchers, academics, and professionals.
A new framework for the digital society that merges the science of degrowth with a global analysis of the high-tech economy. The world is racing toward an irreversible ecological catastrophe. Environmental science makes clear that humans must reduce total material resource use, requiring a radical redistribution of wealth within and between countries. Yet little attention has been paid to how the digital economy fits into this equation. Michael Kwet is a Postdoctoral researcher of the Centre for Social Change at the University of Johannesburg and a leading expert on digital colonialism, and here presents a new framework for the digital society. Merging the science of degrowth with a global analysis of the high-tech economy, he argues that digital capitalism and colonialism must be abolished quickly. In Digital Degrowth, Kwet maps out a path to a people's tech future. He calls for direct action against Silicon Valley, US imperialism and power elites everywhere in order to realise a radically egalitarian digital society that fosters equality in harmony with nature.
The book reports on advanced topics in interactive robotics research and practice; in particular, it addresses non-technical obstacles to the broadest uptake of these technologies. It focuses on new technologies that can physically and cognitively interact with humans, including neural interfaces, soft wearable robots, and sensor and actuator technologies; further, it discusses important regulatory challenges, including but not limited to business models, standardization, education and ethical-legal-socioeconomic issues. Gathering the outcomes of the 1st INBOTS Conference (INBOTS2018), held on October 16-20, 2018 in Pisa, Italy, the book addresses the needs of a broad audience of academics and professionals working in government and industry, as well as end users. In addition to providing readers with detailed information and a source of inspiration for new projects and collaborations, it discusses representative case studies highlighting practical challenges in the implementation of interactive robots in a number of fields, as well as solutions to improve communication between different stakeholders. By merging engineering, medical, ethical and political perspectives, the book offers a multidisciplinary, timely snapshot of interactive robotics.
Since the dawn of the digital era, the transfer of knowledge has shifted from analog to digital, local to global, and individual to social. Complex networked communities are a fundamental part of these new information-based societies. Emerging Pedagogies in the Networked Knowledge Society: Practices Integrating Social Media and Globalization examines the production, dissemination, and consumption of knowledge within networked communities in the wider global context of pervasive Web 2.0 and social media services. This book will offer insight for business stakeholders, researchers, scholars, and administrators by highlighting the important concepts and ideas of information- and knowledge-based economies.
This book explores how technology can foster interaction between children and their peers, teachers and other adults. It presents the Co-EnACT framework to explain how technology can support children to collaborate, so helping them to learn and engage enjoyably with the world, in both work and play. The focus is on children, rather than young people, but the principles of supporting interaction apply throughout all life stages. Chapters on classrooms and on autism explain principles behind using technology in ways that support, rather than obstruct, social interaction in diverse populations. Collaborative interaction involves both verbal and non-verbal behaviour and this book presents evidence from closely analysing children's behaviour in natural settings. Examples from cutting-edge technology illustrate principles applicable to more widely-available technology. The book will be of interest to psychologists, educators, researchers in Human-Computer Interaction (HCI), particularly those designing with children in mind, and practitioners working with children who want to deepen their understanding of using technology for collaboration.
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.
This proceedings book presents papers from the 10th Cambridge Workshops on Universal Access and Assistive Technology. The CWUAAT series of workshops have celebrated a long history of interdisciplinarity, including design disciplines, computer scientists, engineers, architects, ergonomists, ethnographers, ethicists, policymakers, practitioners, and user communities. This reflects the wider increasing realisation over the long duration of the series that design for inclusion is not limited to technology, engineering disciplines, and computer science but instead requires an interdisciplinary approach. The key to this is providing a platform upon which the different disciplines can engage and see each other's antecedents, methods, and point of view. This proceedings book of the 10th CWUAAT conference presents papers in a variety of topics including Reconciling usability, accessibility, and inclusive design; Designing inclusive assistive and rehabilitation systems; Designing cognitive interaction with emerging technologies; Designing inclusive architecture; Data mining and visualising inclusion; Legislation, standards, and policy in inclusive design; Situational inclusive interfaces; and The historical perspective: 20 years of CWUAAT. CWUAAT has always aimed to be inclusive in the fields that it invites to the workshop. We must include social science, psychologies, anthropologies, economists, politics, governance, and business. This requirement is now energised by imminent new challenges arising from techno-social change. In particular, artificial intelligence, wireless technologies, and the Internet of Things generate a pressing need for more socially integrated projects with operational consequences on individuals in the built environment and at all levels of design and society. Business cases and urgent environmental issues such as sustainability and transportation should now be a focus point for inclusion in an increasingly challenging world. This proceedings book continues the goal of designing for inclusion, as set out by the CWUAAT when it first started.
How will members of human society interact with each other in the new millennium? Nothing less than that is the question that writer, teacher, scientist, and futurist Joseph Pelton takes on in this provocative, challenging new book. We have moved beyond the global village envisioned by Marshall McLuhan, and are living instead in an environment of rapid-fire, non-stop instantaneous global communication--the e-sphere. The result is that we no longer receive information passively; in order to survive we must create and share it--and it is this fact that defines the new non-linear paradigm of the world for Pelton's 21st Century. The impact will affect every aspect of our lives, from employment to education to sex to family life. The stakes in adapting successfully to this world are of the highest order: the survival of our species. All this he explores in clear, engaging prose, well buttressed by research and his lifetime of thought. A truly important, necessary study for people at all levels of today's organizations, and for those expecting to live in tomorroW's age of the World-wide Mind. Among the unique features of Pelton's book are: It offers new cyberspace oriented strategies for getting and keeping a job in the 21st Century; outlines fundamental reforms to be expected in education and health care, examines how business will be restructured and its practices altered in a cybernetic world dominated by information systems and services. Pelton also explores the expected loss of privacy, information overload, techno-terrorism and other Teleshock aspects of living. He provides a new understanding of the social and economic discontinuities that come from shifting to a non-linear world, where change comes in jerks and surges. He then lays out the need for a fundamental shift in economic systems that can allow the reconnection of production to consumption, one that will refocus our efforts away from simple economic throughputs and force us to revalue and prioritize economic issues with survival of the species uppermost in mind. Not only organizational decision makers but people in the academic and health care community will find much to think about here, as we all attempt to understand what this new millennium actually has in store for us, at least during our own lifetimes and quite possibly in the lifetimes of others who will come after us.
This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual technologies enabled by social manufacturing for each topic, supported by case studies. The technologies discussed include manufacturing resource minimalization and their socialized reorganizations, blockchain models in cybersecurity, computing and decision-making, social business relationships and organizational networks, open product design, social sensors and extended cyber-physical systems, and social factory and inter-connections. This book helps engineers and managers in industry to practice social manufacturing, as well as offering a systematic reference resource for researchers in manufacturing. Students also benefit from the detailed discussions of the latest research and technologies that will have been put into practice by the time they graduate. |
![]() ![]() You may like...
3D Printing and Additive Manufacturing…
L. Jyothish Kumar, Pulak M Pandey, …
Hardcover
R4,682
Discovery Miles 46 820
Additive Manufacturing - Breakthroughs…
Information Resources Management Association
Hardcover
Towards Teaching in Public - Reshaping…
Mike Neary, Les Bell, …
Hardcover
R5,017
Discovery Miles 50 170
|