![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
This book presents current innovative, alternative and creative approaches that challenge traditional mechanisms in and across disciplines and industries targeting societal impact. A common thread throughout the book is human-centered, uni and multi-modal strategies across the range of human technologies, including sensing and stimuli; virtual and augmented worlds; games for serious applications; accessibility; digital-ethics and more. Focusing on engaging, meaningful, and motivating activities that at the same time offer systemic information on human condition, performance and progress, the book is of interest to anyone seeking to gain insights into the field, be they students, teachers, practicing professionals, consultants, or family representatives. By offering a wider perspective, it addresses the need for a core text that evokes and provokes, engages and demands and stimulates and satisfies.
Based on the seminar that took place in Dagstuhl, Germany in June 2011, this contributed monograph studies the four important topics within the scientific visualization field: uncertainty visualization, multifield visualization, biomedical visualization and scalable visualization. Uncertainty visualization deals with uncertain data from
simulations or sampled data, uncertainty due to the mathematical
processes operating on the data, and uncertainty in the visual
representation, "Scientific Visualization" will be useful to practitioners of scientific visualization, students interested in both overview and advanced topics and those interested in knowing more about the visualization process."
This book examines online dating from the "inside," using in-depth interviews with dating website members to reveal-and keenly analyze-what relationships and romance in the 21st century are really like. The members of the current generation of "digital guinea pigs" are true social pioneers as they embrace digital technology to create a new realm of mating, dating, and intimacy in America. Ironically, "digital dating" frequently results in an outcome that is exactly opposite to its participants' intended purposes. The Illusion of Intimacy: Problems in the World of Online Dating is more than a thorough investigation of the realities of modern relationships, many of which begin online-one in five, according to Match.com; the book introduces the reader to some of the natives and industry "users" who make up its clientele. Author John C. Bridges shows how they have adapted to technology to find new interactions, meet new partners, and share new experiences. The research focuses on the dating sites ranked in the top five by actual members of these sites who interviewed with the author to share their personal stories and experiences, all documented by saved emails and text messages.
This book introduces readers to the current trends in using deep learners and deep learner descriptors for medical applications. It reviews the recent literature and presents a variety of medical image and sound applications to illustrate the five major ways deep learners can be utilized: 1) by training a deep learner from scratch (chapters provide tips for handling imbalances and other problems with the medical data); 2) by implementing transfer learning from a pre-trained deep learner and extracting deep features for different CNN layers that can be fed into simpler classifiers, such as the support vector machine; 3) by fine-tuning one or more pre-trained deep learners on an unrelated dataset so that they are able to identify novel medical datasets; 4) by fusing different deep learner architectures; and 5) by combining the above methods to generate a variety of more elaborate ensembles. This book is a value resource for anyone involved in engineering deep learners for medical applications as well as to those interested in learning more about the current techniques in this exciting field. A number of chapters provide source code that can be used to investigate topics further or to kick-start new projects.
Highlights key research currently being undertaken within the field of telepresence, providing the most detailed account of the field to date, advancing our understanding of a fundamental property of all media - the illusion of presence; the sense of "being there" inside a virtual environment, with actual or virtual others. This collection has been put together by leading international scholars from America, Europe, and Asia. Together, they describe the state-of-the-art in presence theory, research and technology design for an advanced academic audience. Immersed in Media provides research that can help designers optimize presence for users of advanced media technologies such as virtual and augmented reality, collaborative social media, robotics, and artificial intelligence and lead us to better understand human cognition, emotion and behaviour.
This volume presents the proceedings of the 11th International Conference on the Design of Cooperative Systems (COOP 2014). The conference is a venue for multidisciplinary research contributing to the design, assessment and analysis of cooperative systems and their integration in organizations, public venues, and everyday life. COOP emerged from the European tradition of Computer Supported Cooperative Work (CSCW) and Cognitive Ergonomics as practiced in France. These proceedings are a collection of 28 papers reflecting the variety of research activities in the field, as well as an increasing interest in investigating the use and design of ICT in all aspects of everyday life and society, and not merely in the workplace. The papers represent a variety of research topics, from healthcare to sustainable mobility to disaster response, in settings from all over the world. For the first time, the proceedings include papers presented in an Early-Career Researchers Track which was organized in order to give young researchers the opportunity to discuss their work with an international community. This collection of papers provides a picture of new developments and classic topics of research around cooperative systems, based on the principle that a deep knowledge of cooperative practices is a key to understanding technology impacts and producing quality designs. The articles presented will appeal to researchers and practitioners alike, as they combine an understanding of the nature of work with the possibilities offered by novel digital technologies.
Cyberculture is a particularly complex issue. It is seen as a fantastic meeting point of classic philosophers with postmodern theorists, politicians with community engineers, contemporary sophists with software engineers, and artists with rhetoricians. Today, cyberculture is identified highly with new media and digital rhetoric and could be used to create a comprehensive map of modern culture. Present and Future Paradigms of Cyberculture in the 21st Century is a comprehensive research publication that explores the influence of the internet and internet culture on society as a whole. Highlighting a wide range of topics such as digital media, activism, and psychology, this book is ideal for academicians, researchers, sociologists, psychologists, anthropologists, and students.
This book develops a common understanding between the client and the provider in each of the four stages of strategic outsourcing. These stages range from discovery, where the parties envision their future collaboration; planning, where they lay the ground work for the contract and the project; building, where they effectively carry out the work; and lastly to running, where they orchestrate the relationship on a daily basis to ensure that the new, enlarged company achieves the results sought. In a simple yet direct style, it highlights the dos and don'ts the parties should bear in mind at each stage of the process and combines both the client's and the provider's perspectives by comparing their respective involvement at each stage of the process and considering, equally, their obligations in establishing a balanced relationship. The book is primarily intended for those in the private sector with experience of dealing with complex outsourcing situations and who are looking for the small or bigger differentiators that will support their decisions and actions. The target audiences include, on the client side: CCOs, CIOs, lawyers, procurement managers, outsourcing consultants and IT Service managers and, on the provider side: account managers, bid managers, outsourcing project managers, operation managers and service managers. However, it is also useful for anybody involved in outsourcing who is seeking to develop a global understanding of the main processes and roles upstream and downstream in the chain.
The lockdowns and shutdowns due to COVID-19 encouraged accelerated experimental with new organization practices. The impacts of the pandemic were very strong, both in times of containment, the loosening of restrictions, and recovery periods. Whether in collective and individual commitment, health, and the rapid adoption of new working methods, companies were challenged to adjust very quickly to cope with the emergency. With the interconnection of health, economic, social, and environmental crises, the situation changed the market and economy, and the lasting impacts of this unprecedented and intense experience must be examined. This book explores the digital ecosystem through a historical, sociological, political, and economic approach. It discusses new organizational practices such as remote work, digital culture, and the implementation of transformation strategy using appropriate technological tools. This book deciphers the new paradigm proposed by the digital era and provides theoretical and empirical frameworks in the field of economics and technology.
A lot of personal data is being collected and stored as we use our media devices for business and pleasure in mobile and online spaces. This book helps us contemplate what a post-Facebook or post-Google world might look like, and how the tensions within capitalist information societies between corporations, government and citizens might play out.
One of the consequences of the digital revolution is the availability and pervasiveness of media and technology. They became an integral part of many people's lives, including children, who are often exposed to media and technology at an early age. Due to this early exposure, children have become targeted consumers for businesses and other organizations that seek to utilize the data they generate. The Handbook of Research on Children's Consumption of Digital Media is a scholarly research publication that examines how children have become consumers as well as how their consumption habits have changed in the age of digital and media technologies. Featuring current research on cyber bullying, social media, and digital advertising, this book is geared toward marketing and advertising professionals, consumer researchers, international business strategists, academicians, and upper-level graduate students seeking current research on the transformation of child to consumer.
Legal and ethical issues have become a standard part of engineering and business schools' curricula. This has not been the case for computer science or management information systems programs, although there has been increasing emphasis on the social skills of these students. This leaves a frightening void in their professional development. Information systems pose unique social challenges, especially for technical professionals who have been taught to think in terms of logic, structures and flows. Social, Ethical and Policy Implications of Information Technology focuses on the human impact of information systems, including ethical challenges, social implications, legal issues, and unintended costs and consequences.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
The volume explores the consequences of recent events in global Internet policy and possible ways forward following the 2012 World Conference on International Telecommunications (WCIT-12). It offers expert views on transformations in governance, the future of multistakeholderism and the salience of cybersecurity. Based on the varied backgrounds of the contributors, the book provides an interdisciplinary perspective drawing on international relations, international law and communication studies. It addresses not only researchers interested in the evolution of new forms of transnational networked governance, but also practitioners who wish to get a scholarly reflection on current regulatory developments. It notably provides firsthand accounts on the role of the WCIT-12 in the future of Internet governance.
This volume summarizes the ethical, social and cultural contexts of interfacing brains and computers. It is intended for the interdisciplinary community of BCI stakeholders. Insofar, engineers, neuroscientists, psychologists, physicians, care-givers and also users and their relatives are concerned. For about the last twenty years brain-computer-interfaces (BCIs) have been investigated with increasing intensity and have in principle shown their potential to be useful tools in diagnostics, rehabilitation and assistive technology. The central promise of BCI technology is enabling severely impaired people in mobility, grasping, communication, and entertainment. Successful applications are for instance communication devices enabling locked-in patients in staying in contact with their environment, or prostheses enabling paralysed people in reaching and grasping. In addition to this, it serves as an introduction to the whole field of BCI for any interested reader.
The goal of this book is to crystallize the emerging mobile computing technologies and trends into positive efforts to focus on the most promising solutions in services computing. Many toys built today are increasingly using these technologies together and it is important to understand the various research and practical issues. The book will provide clear proof that mobile technologies are playing an ever increasing important and critical role in supporting toy computing, which is a new research discipline in computer science. It is also expected that the book will further research new best practices and directions in toy computing. The goal of this book is to bring together academics and practitioners to describe the use and synergy between the above-mentioned technologies. This book is mainly intended for researchers and students working in computer science and engineering, and for toy industry technology providers, having particular interests in mobile services. The wide range of authors of this book will help the various communities understand both specific and common problems. This book facilities software developers and researchers to become more aware of this challenging research opportunity. As well, the book is soliciting shall provide valuable strategic outlook on the emerging toy industry.
Cyber security, encompassing both information and network security, is of utmost importance in today s information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).
This contributed volume presents state-of-the-art advances in logistics theory in various fields as well as case studies. The book reports on a number of recently conducted studies in the Dinalog and the EffizienzCluster LogistikRuhr, thus bridging the gap between different perspectives of theoretical and applied research. A selection of theoretical topics, practical examples, case studies and project reports is presented in this volume. The editors carefully selected contributions from a wide variety of projects, which were carried out in both the Dinalog cluster and the Effizienzcluster LogistikRuhr. The contributions are grouped in five main sections, each representing key domains in the evolution of logistics and supply chain management: sustainability, urban logistics, value chain management, IT-based innovation, knowledge management. This book is intended for both researchers and practitioners in the field of logistics and supply chain management, to serve as an important source of information for further research as well as to stimulate further innovation.
The Handbook on Socially Interactive Agents provides a comprehensive overview of the research fields of Embodied Conversational Agents, Intelligent Virtual Agents, and Social Robotics. Socially Interactive Agents (SIAs), whether virtually or physically embodied, are autonomous agents that are able to perceive an environment including people or other agents, reason, decide how to interact, and express attitudes such as emotions, engagement, or empathy. They are capable of interacting with people and one another in a socially intelligent manner using multimodal communicative behaviors, with the goal to support humans in various domains. Written by international experts in their respective fields, the book summarizes research in the many important research communities pertinent for SIAs, while discussing current challenges and future directions. The handbook provides easy access to modeling and studying SIAs for researchers and students, and aims at further bridging the gap between the research communities involved. In two volumes, the book clearly structures the vast body of research. The first volume starts by introducing what is involved in SIAs research, in particular research methodologies and ethical implications of developing SIAs. It further examines research on appearance and behavior, focusing on multimodality. Finally, social cognition for SIAs is investigated using different theoretical models and phenomena such as theory of mind or pro-sociality. The second volume starts with perspectives on interaction, examined from different angles such as interaction in social space, group interaction, or long-term interaction. It also includes an extensive overview summarizing research and systems of human-agent platforms and of some of the major application areas of SIAs such as education, aging support, autism, and games.
Out of all the human senses, touch is the one that is most often unappreciated, and undervalued. Yet, the surface of the human body, the skin, is actually one huge sheet of tactile receptors. It provides us with the means to connect with our surroundings. Despite the important role that vision plays in our everyday lives, it is the skin that constitutes both the oldest, and by far the largest of our sense organs. The skin protects our body from the external world and, at the same time, informs us about what occurs on its surface. In Touch With The Future explores the science of touch, bringing together the latest findings from cognitive neuroscience about the processing of tactile information in humans. The book provides a comprehensive overview of scientific knowledge regarding themes such as tactile memory, tactile awareness (consciousness), tactile attention, the role of touch in interpersonal and sexual interactions, and the neurological substrates of touch. It highlights the many ways in which our growing understanding of the world of touch can, and in some cases already are, being applied in the real world in everything from the development of virtual reality (VR) environments, tablet PCs, mobile phones, and even teledildonics - the ultimate frontier in terms of adult entertainment. In addition, the book shows how the cognitive neuroscience approach to the study of touch can be applied to help improve the design of many real-world applications/products as well as to many of our everyday experiences, such as those related to the appreciation of food, marketing, packaging design, the development of enhanced sensory substitution systems, art, and man-machine interfaces. Crucially, the authors makes a convincing argument for the view that one cannot really understand touch, especially not in a real-world context, without placing it in a multisensory context. That is, the senses interact to influence tactile perception in everything - from changing the feel of a surface or product by changing the sound it makes or the fragrance it has. For students and researchers in the brain sciences, this book presents a valuable and fascinating exploration into one of our least understood senses
This essay places the emerging brain-Internet interface within a broad historical context: that the Internet represents merely the next stage in a very long history of human cognition whereby the brain couples with symbolic technologies. Understanding this 'deep history' provides a way to imagine the future of brain-Internet cognition.
With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.
Currently, Internet and virtual reality communication is essentially audio-visual. The next important breakthrough of the Internet will be the communication and sharing of smell and taste experiences digitally. Audio-visual stimuli are frequency based, and they can be easily digitized and actuated. On the other hand, taste and smell stimuli are based on chemical molecules, therefore, they are not easy to digitize or actuate. To solve this problem, we are required to discover new digital actuation technologies for taste and smell. The authors of this book have experimented on developing digital actuation devices for several years. This book will provide a complete overview of the importance of digitizing taste and smell, prior works, proposed technologies by the authors, other state of the art research, advantages and limitations of the proposed methods, and future applications. We expect digital taste and smell technologies will revolutionize the field of multisensory augmented reality and open up new interaction possibilities in different disciplines such as Human Computer Interaction, Communication, and Augmented and Virtual Reality.
The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health. |
![]() ![]() You may like...
The Child's Interests in Conflict - The…
Maarit Jantera-Jareborg
Paperback
![]() R1,913 Discovery Miles 19 130
In My Life - Stories From Young…
Shannon Walsh, Claudia Mitchell, …
Paperback
Social Care and Social Exclusion - A…
T. Blackman, S. Brodhurst, …
Hardcover
R1,592
Discovery Miles 15 920
|