![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
The development of information-based societies worldwide is now impacting public organizations and their delivery of services to citizens. Systems Thinking and E-Participation: ICT in the Governance of Society provides a systemic-based inquiry platform to explore boundaries, limits, and advantages of information and communication technology use in the public decision making processes. With theoretical and practical contributions, this publication examines the impact of governmental technologies useful to those involved with politics, sociology, and information systems.
Guide to TCP/IP: IPv6 and IPv4 introduces students to the concepts, terminology, protocols, and services that the Transmission Control Protocol/Internet Protocol (TCP/IP) suite uses to make the Internet work. This text stimulates hands-on skills development by not only describing TCP/IP capabilities, but also by encouraging students to interact with protocols. It provides the troubleshooting knowledge and tools that network administrators and analysts need to keep their systems running smoothly. Guide to TCP/IP covers topics ranging from traffic analysis and characterization, to error detection, security analysis and more. Both IPv6 and IPv4 are covered in detail.
This self-contained book, written by active researchers, presents up-to-date information on smart maintenance strategies for human-robot interaction (HRI) and the associated applications of novel search algorithms in a single volume, eliminating the need to consult scattered resources. Unlike other books, it addresses maintaining a smart HRI from three dimensions, namely, hardware, cyberware, and hybrid-asset management, covering problems encountered in each through a wide variety of representative examples and elaborated illustrations. Further, the diverse mathematical models and intelligent systems constructions make the book highly practical. It enables readers interested in maintenance, robotics, and intelligent systems but perplexed by myriads of interrelated issues to grasp basic methodologies. At the same time, the referenced literature can be used as a roadmap for conducting deeper researches.
Mass customization and personalization are widely appreciated as viable and promising strategies which aim to provide products and services that best serve individuals' personal needs with near mass production efficiency. ""Mass Customization for Personalized Communication Environments: Integrating Human Factors"" focuses on the customization of services and communication environments to advance user satisfaction and provide a total redefinition of the way goods and services are created or sold and customers and vendors interact. This authoritative collection of chapters offers relevant theoretical foundations, principles, methodologies, frameworks, and best practices within the field of research.
This book explains how gamification, specifically enterprise gamification, can help mangers in multiple areas within an enterprise to improve attrition. Employee Engagement is an important component to foster employee relations with the organization. Gamification by its inherent design helps to increase engagement within an enterprise. Several successful case studies in Gamification are presented, which present new practical tips for Gamification for IT Management. By introducing general IT management concepts related to the specific environment managers work in, the authors then detail the benefits of introducing gamification in this very environment to resolve business issues. IT Managers, as well as HR professionals, Group Heads and Delivery Leaders will find this be a useful resource to understand how Gamification can improve their everyday work. The book can also be used as a reference for engaging learners and employees to improve their productivity in organizations.
This book is inspired by the contemporary fascination with virtual reality and growing presence of this type of technology in everyday life. It explores the ways in which virtual reality evokes illusory transformation responses. The power of virtual reality is in making the mediation by technology in these experiences appear irrelevant to cognitive processes, so much so that it is often assumed that skills acquired in virtual environments are generally transferable to the physical world. However, cognition is affected by virtual reality technology, which is reflected in issues related to virtual embodiment, choice of spatial strategies, differences in neural and electrophysiological patterns associated with movement processing when navigating virtual vs. physical environments, and, at least to some extent, in virtual proxemics. In addition to spatial cognition, the book explores the sense of self in virtual reality, social interaction and virtual togetherness, action and motor cognition, calling to mind debates from philosophy, psychology, and cognitive neuroscience.
This volume offers a general overview on the handling and regulating electronic evidence in Europe, presenting a standard for the exchange process. Chapters explore the nature of electronic evidence and readers will learn of the challenges involved in upholding the necessary standards and maintaining the integrity of information. Challenges particularly occur when European Union member states collaborate and evidence is exchanged, as may be the case when solving a cybercrime. One such challenge is that the variety of possible evidences is so wide that potentially anything may become the evidence of a crime. Moreover, the introduction and the extensive use of information and communications technology (ICT) has generated new forms of crimes or new ways of perpetrating them, as well as a new type of evidence. Contributing authors examine the legal framework in place in various EU member states when dealing with electronic evidence, with prominence given to data protection and privacy issues. Readers may learn about the state of the art tools and standards utilized for treating and exchanging evidence, and existing platforms and environments run by different Law Enforcement Agencies (LEAs) at local and central level. Readers will also discover the operational point of view of LEAs when dealing with electronic evidence, and their requirements and expectations for the future. Finally, readers may consider a proposal for realizing a unique legal framework for governing in a uniform and aligned way the treatment and cross border exchange of electronic evidence in Europe. The use, collection and exchange of electronic evidence in the European Union context and the rules, practises, operational guidelines, standards and tools utilized by LEAs, judges, Public prosecutors and other relevant stakeholders are all covered in this comprehensive work. It will appeal to researchers in both law and computer science, as well as those with an interest in privacy, digital forensics, electronic evidence, legal frameworks and law enforcement.
This textbook addresses the conceptual and practical aspects of the various phases of the lifecycle of service systems, ranging from service ideation, design, implementation, analysis, improvement and trading associated with service systems engineering. Written by leading experts in the field, this indispensable textbook will enable a new wave of future professionals to think in a service-focused way with the right balance of competencies in computer science, engineering, and management. Fundamentals of Service Systems is a centerpiece for a course syllabus on service systems. Each chapter includes a summary, a list of learning objectives, an opening case, and a review section with questions, a project description, a list of key terms, and a list of further reading bibliography. All these elements enable students to learn at a faster and more comfortable peace. For researchers, teachers, and students who want to learn about this new emerging science, Fundamentals of Service Systems provides an overview of the core disciplines underlying the study of service systems. It is aimed at students of information systems, information technology, and business and economics. It also targets business and IT practitioners, especially those who are looking for better ways of innovating, designing, modeling, analyzing, and optimizing service systems.
This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016. The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.
This volume provides a complete record of presentations made at Industrial Engineering, Management Science and Applications 2015 (ICIMSA 2015), and provides the reader with a snapshot of current knowledge and state-of-the-art results in industrial engineering, management science and applications. The goal of ICIMSA is to provide an excellent international forum for researchers and practitioners from both academia and industry to share cutting-edge developments in the field and to exchange and distribute the latest research and theories from the international community. The conference is held every year, making it an ideal platform for people to share their views and experiences in industrial engineering, management science and applications related fields.
This book explores novel aspects of social robotics, spoken dialogue systems, human-robot interaction, spoken language understanding, multimodal communication, and system evaluation. It offers a variety of perspectives on and solutions to the most important questions about advanced techniques for social robots and chat systems. Chapters by leading researchers address key research and development topics in the field of spoken dialogue systems, focusing in particular on three special themes: dialogue state tracking, evaluation of human-robot dialogue in social robotics, and socio-cognitive language processing. The book offers a valuable resource for researchers and practitioners in both academia and industry whose work involves advanced interaction technology and who are seeking an up-to-date overview of the key topics. It also provides supplementary educational material for courses on state-of-the-art dialogue system technologies, social robotics, and related research fields.
This book presents selected research and development on virtual reality (VR) and serious games (SG) applications to assist children with Autism Spectrum Disorder (ASD) in their learning of different skills. Children with ASD have challenges to learn skills of learning, living, and working, due to their cognitive and behavioral limitations. The authors and their research teams of this book have many years' research experience developing innovative and interactive VR and SG technology for the special needs education. More specifically, several VR serious games are designed to train children with ASD on learning skill, life skill, and job skill. Such games are often developed based on the needs of special education and used by special needs schools in Singapore. This book is a useful resource for students, scholars, and designers of learning material who want to embrace VR and SG for children with ASD.
Following the 1979 Islamic Revolution, there was a dramatic reversal of women's rights, and the state revived many premodern social conventions through modern means and institutions. Customs such as the enforced veiling of women, easy divorce for men, child marriage, and polygamy were robustly reintroduced and those who did not conform to societal strictures were severely punished. At the same time, new social and economic programs benefited the urban and rural poor, especially women, which had a direct impact on gender relations and the institution of marriage. Edited by Janet Afary and Jesilyn Faust, this interdisciplinary volume responds to the growing interest and need for literature on gender, marriage and family relations in the Islamic context. The book examines how the institution of marriage transformed in Iran, paying close attention to the country's culture and politics. Part One examines changes in urban marriages to new forms of cohabitation. In Part Two contributors, such as Soraya Tremayne, explore the way technology and social media has impacted and altered the institution of family. Part Three turns its eye to look at marital changes in the rural and tribal sectors of society through the works of anthropologists including Erika Friedl and Mary Hegland. Based on the work of both new and established scholars, the book provides an up-to-date study of an important and intensely politicized subject.
This volume offers readers various perspectives and visions for cutting-edge research in ubiquitous healthcare. The topics emphasize large-scale architectures and high performance solutions for smart healthcare, healthcare monitoring using large-scale computing techniques, Internet of Things (IoT) and big data analytics for healthcare, Fog Computing, mobile health, large-scale medical data mining, advanced machine learning methods for mining multidimensional sensor data, smart homes, and resource allocation methods for the BANs. The book contains high quality chapters contributed by leading international researchers working in domains, such as e-Health, pervasive and context-aware computing, cloud, grid, cluster, and big-data computing. We are optimistic that the topics included in this book will provide a multidisciplinary research platform to the researchers, practitioners, and students from biomedical engineering, health informatics, computer science, and computer engineering.
Games-based learning focuses on the exploration of high-quality computer games and associated software tools for education and training. Games-Based Learning Advancements for Multi-Sensory Human Computer Interfaces: Techniques and Effective Practices disseminates knowledge on the theory and practice of games-based learning, promoting the development and adoption of best practices. Through a combination of theoretical chapters as well as practical case studies, readers will benefit from expert knowledge and learn from the experiences of both researchers and practitioners from across the globe.
Information and Communication Technologies, Society and Human Beings: Theory and Framework addresses the extensive area of effects of ICT on human beings and the interaction between ICT, individuals, organizations, and society. This premier reference source features contributions from over 45 distinguished researchers from around the world, each presenting high quality research on Social Informatics, Human Computer Interaction, Organizational Behavior, and Macro-ergonomics. This unique publication is perfect for students, teachers, researchers, engineers, practitioners, managers, policy-makers, and media alike.
Websites such as Twitter, Facebook, LinkedIn, and Google+ have enabled users to create virtual communities for social networking and communities of practice. Because of the ever-evolving environment in social networking, there has been much opportunity for new areas of research. Research in virtual communities and social networking has taken different forms with much focus on the software and hardware of the program and the design of the site and its interface and usability. There is also great emphasis on the research behind discovering new opportunities in virtual worlds, as well as the social and behavioral issues related to trust and online culture. Technical, Social and Legal Issues in Virtual Communities: Emerging Environments examines a variety of issues related to virtual communities and social networking, addressing issues related to team identification, leader-member issues, social networking for education, participation in social networks, and other issues directly related to this eclectic field of study. This publication provides comprehensive coverage and understanding of the social, cultural, organizational, human, and cognitive issues related to the virtual communities and social networking. Readers will find that this book encompasses an overall body of knowledge regarding participation of individuals, groups and organizations in virtual communities and networks, by providing an outlet for scholarly research in the area.
This book considers a burgeoning social phenomenon, compensated dating in Hong Kong, that facilitates direct commercial sex exchange between consenting females from their mid-teens through the late 20s and males from their early 20s to mid-adulthood. Informed by the transformation of intimacy, the breakdown of institutional constraints, the emergence of a new female sexual autonomy and the advancement of information technology, this book moves beyond stereotypes of sex work to look at the complexities of compensated dating. The phenomenon of compensated dating is distinctive from most other sex trades in that it involves intense emotional interactions and often extends beyond the commercial boundary. Given the dynamic, flexible and ambiguous nature of compensated dating, it has become more of a space for sexual explorations and less of a rigid model of commercial sex, at least in the eye of the participants. This book walks through how men become involved in compensated dating and also sheds lights on how gender relations are negotiated, with important implications on what it means to be a man and a woman in contemporary Hong Kong society. It also speaks to the broader transformations of some of the key social structures and elements, particularly gender and sexualities, in the era of late modernity.
This book captures the current challenges in automatic recognition of emotion in spontaneous speech and makes an effort to explain, elaborate, and propose possible solutions. Intelligent human-computer interaction (iHCI) systems thrive on several technologies like automatic speech recognition (ASR); speaker identification; language identification; image and video recognition; affect/mood/emotion analysis; and recognition, to name a few. Given the importance of spontaneity in any human-machine conversational speech, reliable recognition of emotion from naturally spoken spontaneous speech is crucial. While emotions, when explicitly demonstrated by an actor, are easy for a machine to recognize, the same is not true in the case of day-to-day, naturally spoken spontaneous speech. The book explores several reasons behind this, but one of the main reasons for this is that people, especially non-actors, do not explicitly demonstrate their emotion when they speak, thus making it difficult for machines to distinguish one emotion from another that is embedded in their spoken speech. This short book, based on some of authors' previously published books, in the area of audio emotion analysis, identifies the practical challenges in analysing emotions in spontaneous speech and puts forward several possible solutions that can assist in robustly determining the emotions expressed in spontaneous speech.
An essential tool for dispute resolution professionals as well as for anyone considering using dispute resolution in their lives and work, Online Dispute Resolution explains the many diverse and unique applications of doing conflict resolution online. The expert authors examine the tremendous growth of online dispute resolution-including its use by eBay and other e-commerce companies-and reveal the enormous possibilities to come, along with the many employment opportunities for practitioners in the field. They show how the online environment will affect the role of those who are concerned with dispute resolution just as it has brought changes to those who practice law, sell stocks, or run for office. For those who see the value of technology as a critical building block in the future of dispute resolution, Online Dispute Resolution will be an indispensable resource.
This book analyzes the effect of policy on the digital game complex: government, industry, corporations, distributors, players, and the like. Contributors argue that digital games are not created nor consumed outside of the complex power relationships that dictate the full production and distribution cycles, and that we need to consider those relationships in order to effectively "read" and analyze digital games. Through examining a selection of policies, e.g. the Australian government's refusal (until recently) to allow an R18 rating for digital games, Blizzard's policy in regards to intellectual property, Electronic Arts' corporate policy for downloadable content (DLC), they show how policy, that is to say the rules governing the production, distribution and consumption of digital games, has a tangible effect upon our understanding of the digital game medium.
Technology has changed the way people carry out their daily lives and communicate with one another. Society has become dependent on technology and with that comes the need to understand the advantages and disadvantages that come along with it. Technology-Enhanced Human Interaction in Modern Society is an essential reference source for the latest scholarly research on the technological advances of applied aspects of life such as training, health, information gathering, and social communication. Featuring coverage on subjects including biomedical test instruments, computer animation, and mobile phones, this publication is ideally designed for researchers and academicians seeking current material on technology-based communication.
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
Knowledge and Technology Management in Virtual Organizations: Issues, Trends, Opportunities and Solutions presents a collection of the most recent contributions in the areas of organization, knowledge, and technology management in the context of virtual enterprises. This book contains important and in-depth information on four dimensions: semantic, managerial, technological, and social. The semantic dimensions covered in this book are ontological and organizational approaches, concepts, organizational models, and knowledge management models. In respect to managerial dimensions, this book covers process management, integration management, relationship management, process integration, knowledge management, technology integration management, and information integration. ""Knowledge and Technology Management in Virtual Organizations: Issues, Trends, Opportunities and Solutions"" presents the technological dimension by explaining the infrastructures and technologies to support technology and information integration standards and protocols. Lastly, this title highlights the social dimension, including human resources management, human resources integration, social issues, social impact, social requirements, and communities of knowledge. |
![]() ![]() You may like...
Salinity Gradient Heat Engines
Alessandro Tamburini, Andrea Cipollina, …
Paperback
R4,475
Discovery Miles 44 750
Index Data Structures in Object-Oriented…
Thomas A. Mueck, Martin L. Polaschek
Hardcover
R4,452
Discovery Miles 44 520
Electric Machinery and Transformers
Bhag S. Guru, Huseyin R. Hiziroglu
Hardcover
R6,367
Discovery Miles 63 670
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, …
Paperback
R2,849
Discovery Miles 28 490
Informational Passages for Text Marking…
Martin Lee, Marcia Miller
Paperback
Power-to-Gas: Bridging the Electricity…
Mohammad Amin Mirzaei, Mahdi Habibi, …
Paperback
R3,413
Discovery Miles 34 130
|