![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing
Information is considered both an essential element of organizational design and an asset to be processed and managed. Further research on and application of topics relating to the architecture, management, and use of information is imperative to organizational success. The Handbook of Research on Information Architecture and Management in Modern Organizations focuses on information as an essential element of organizational design and emphasizes the strategic role of knowledge transfer and management in organizations across industries. Taking a cross-disciplinary approach to information architecture and management, this publication draws on research essential to diverse organizations and is designed for use by business professionals, researchers, academicians, and upper-level students. This comprehensive reference work features key research and concepts on topics related to information functionality, information modeling, information overload, information retrieval, innovation management, organizational architecture, informed governance, and relevant applications across industries.
Current speech recognition systems are based on speaker independent speech models and suffer from inter-speaker variations in speech signal characteristics. This work develops an integrated approach for speech and speaker recognition in order to gain space for self-learning opportunities of the system. This work introduces a reliable speaker identification which enables the speech recognizer to create robust speaker dependent models In addition, this book gives a new approach to solve the reverse problem, how to improve speech recognition if speakers can be recognized. The speaker identification enables the speaker adaptation to adapt to different speakers which results in an optimal long-term adaptation.
The success of a BCI system depends as much on the system itself as on the user's ability to produce distinctive EEG activity. BCI systems can be divided into two groups according to the placement of the electrodes used to detect and measure neurons firing in the brain. These groups are: invasive systems, electrodes are inserted directly into the cortex are used for single cell or multi unit recording, and electrocorticography (EcoG), electrodes are placed on the surface of the cortex (or dura); noninvasive systems, they are placed on the scalp and use electroencephalography (EEG) or magnetoencephalography (MEG) to detect neuron activity. The book is basically divided into three parts. The first part of the book covers the basic concepts and overviews of Brain Computer Interface. The second part describes new theoretical developments of BCI systems. The third part covers views on real applications of BCI systems.
The advent of the Information Society is marked by the explosive penetration of information technologies in all aspects of life and by a related fundamental transofmation in every form of the organization. Researchers, business people and policy makers have recognized the importance of addressing technological, economic and social impacts in conjunction. For example, the rise and fall of the dot-com hype depended a lot on the strenght of the business model, on the technological capabilities avalable to firms and on the readiness of the socity and economy at large sustain a new breed of business activity. However, it is notoriously difficult to examine the cross-impacts of social, economic and technological aspects of the Information Socity. This kind of work requires multidisciplinary work and collaboration on a wide range of skills. Social and Economic Transformation in the Digital Era addresses this challenge by assembling the latest thinking of leading researchers and policy makers. The book covers all key subject areas of the Information Society an presents innovative business models, case studies, normative theories and social explanations.
Based on a selection of the most relevant and high quality research papers from the 2010 Networked Learning Conference, this book is an indispensible resource for all researchers, instructional designers, program managers, and learning technologists interested in the area of Technology Enhanced Learning. The book was an important catalyst for the Springer "Research in Networked Learning" Book Series edited by Vivien Hodgson and David McConnell. Details of the "Research in Networked Learning" Book Series and current titles can be found at http: //www.springer.com/series/11810 This volume provides information on current trends and advances in research on networked learning, technology enhanced learning, and e-learning. Specifically, it provides cutting edge information in the areas of: Designing and Facilitating Learning in a Networked World Methodologies for Research in Networked Learning Learning in Social Networks Embedding Networked Learning in Public and Private Organizations Problem based Networked Learning Globalization and Multiculturalism in Networked Learning Networked Learning and International Development Participation and Alienation in Networked Learning "
While a sharp debate is emerging about whether conventional biometric technology offers society any significant advantages over other forms of identification, and whether it constitutes a threat to privacy, technology is rapidly progressing. Politicians and the public are still discussing fingerprinting and iris scan, while scientists and engineers are already testing futuristic solutions. Second generation biometrics - which include multimodal biometrics, behavioural biometrics, dynamic face recognition, EEG and ECG biometrics, remote iris recognition, and other, still more astonishing, applications - is a reality which promises to overturn any current ethical standard about human identification. Robots which recognise their masters, CCTV which detects intentions, voice responders which analyse emotions: these are only a few applications in progress to be developed. This book is the first ever published on ethical, social and privacy implications of second generation biometrics. Authors include both distinguished scientists in the biometric field and prominent ethical, privacy and social scholars. This makes this book an invaluable tool for policy makers, technologists, social scientists, privacy authorities involved in biometric policy setting. Moreover it is a precious instrument to update scholars from different disciplines who are interested in biometrics and itswider social, ethical and political implications.
Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently despised. Is their vilification justified? This is the first book to use previously validated psychological inventories to explore and profile the personalities and behavioral traits of more than 200 self-admitted hackers. Many of the profiled are at the top of their game, revered by both the good hackers (white hats) and their more malevolent peers (black hats). While there are serious reasons to fear the darker elements of the hacker community, there is also much to admire in their nobler counterparts. Fascinating case studies on hackers who have been caught and convicted of their crimes, as well as those betrayed by their peers, offer a unique, credible understanding of what makes hackers tick. The authors examine current laws meant to control hacking and its collateral crimes--stalking and terrorism--along with other means of reining in the irresponsible scriptkiddies and vicious black hats. Moderated and balanced, this book is an easy-to-read, authoritative source information for anyone interested in who hackers are, and how much we should worry about them.
Ananda Kiamsha Madelyn Leeke became a pioneer in the digital universe twenty-seven years ago, when she logged in to the LexisNexis research service as a first-year law student at Howard University School of Law. She was immediately smitten with what the World Wide Web could do. Later, while attending the UN Fourth World Conference on Women in Beijing, China, in 1995, Leeke found herself in an Internet cafe, where she experienced an interaction that changed her life. Over time, through interactions and conversations both online and in-person, Leeke developed the concept of "digital sisterhood." Embracing this revolutionary concept led to a complete career reinvention that finally allowed her to embrace her enormous creative spirit. She found in her digital sisters true "sheroes" and virtual mentors. Her blogging and social media adventures highlight the lessons she learned in the process, the reasons she launched the Digital Sisterhood Network, and the experiences that caused her to adopt what she terms the "fierce living" commitments. In her memoir, Leeke details her journey, sharing experiences and insights helped her and her digital sisters use the Internet as a self-discovery tool and identifying leadership archetypes that shaped her role as a social media leader.
This pioneering book develops definitions and concepts related to Quality of Experience in the context of multimedia- and telecommunications-related applications, systems and services and applies these to various fields of communication and media technologies. The editors bring together numerous key-protagonists of the new discipline Quality of Experience and combine the state-of-the-art knowledge in one single volume."
IN LITTLE MORE THAN HALF A DECADE, Facebook has gone from a
dorm-room novelty to a company with 500 million users. It is one of
the fastest growing companies in history, an essential part of the
social life not only of teenagers but hundreds of millions of
adults worldwide. As Facebook spreads around the globe, it creates
surprising effects--even becoming instrumental in political
protests from Colombia to Iran.
How are the new electronic technologies transforming business here and abroad -- indeed, the entire world economy -- and what new strategies must business develop to meet the challenges of this transformation? Economist, writer, and communications executive Maurice Estabrooks provides a readable, comprehensive survey of how businesses are using microchips, computers, and telecommunications to reshape the entire world of work -- its cultures, organization, and economic systems. With insight and impeccable scholarship he provides concrete evidence of the emergence of artificially intelligent, cybernetic, network-based entities that are creating new linkages between businesses, markets, and technology itself -- linkages that will profoundly affect the way businesses create and implement their corporate survival and growth strategies in the future. Drawing on the work of economic theorist Joseph Schumpeter, Estabrooks shows how Schumpeterian dynamics have played a key role in the breakup of AT&T and the Bell System, and in the deregulation of telecommunications, broadcasting, banking, finance, and other economically critical industries. What has emerged, he maintains, is an increasingly integrated, global information- and software-based services economy. Optical fibers, satellites, and wireless communications systems have already made possible the development of electronic superhighways, but in doing so they have also initiated a massive redistribution of economic power and wealth throughout the world, the implications of which are only now being understood. Historical, analytical, descriptive, Estabrooks' book will speak not only to academics and others who observe world transformations from relatively theoretical perspectives, but also to corporate and other executives whose organizations, and certainly their personal work lives, will be changed dramatically by the developments he describes in practical day-to-day situations.
This book constitutes the refereed proceedings of the 4th IFIP WG 8.1 Working Conference on Method Engineering, ME 2011, held in Paris, France, in April 2011. The 13 revised full papers and 6 short papers presented together with the abstracts of two keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on situated method engineering, method engineering foundations, customized methods, tools for method engineering, new trends to build methods, and method engineering services.
This important text synthesizes the state of knowledge related to thinking and technology and provides strategies for helping young people cultivate thinking skills required to navigate the new digital landscape. The rise of technology has resulted in new ways of searching and communicating information among youth, often creating information "overload". We do not know how the new technologies will affect the ways young people learn and think. There are plenty of warnings about the dangers of information technology, but there is also enormous potential for technology to aid human thinking, which this book explores from an open-minded perspective. Coverage Includes: - An up to date review of the literature on thinking skills in general, and in relation to technology.- Practical guidelines for thinking with technology.- A scholarly review of the characteristics of the digital generation.- A discussion of the various steps involved in the thinking process.- A historical context of the Information Age and the transition from oral history, to printing press, to the Internet. Thinking Skills for the Digital Generation: The Development of Thinking and Learning in the Age of Information is an invaluable reference for educators and research professionals particularly interested in educational technology, and improving thinking and problem-solving skills.
This book presents a collection of the latest research in the area of immersive technologies, presented at the International Augmented and Virtual Reality Conference 2018 in Manchester, UK, and showcases how augmented reality (AR) and virtual reality (VR) are transforming the business landscape. Innovations in this field are seen as providing opportunities for businesses to offer their customers unique services and experiences. The papers gathered here advance the state of the art in AR/VR technologies and their applications in various industries such as healthcare, tourism, hospitality, events, fashion, entertainment, retail, education and gaming. The volume collects contributions by prominent computer and social sciences experts from around the globe. Addressing the most significant topics in the field of augmented and virtual reality and sharing the latest findings, it will be of interest to academics and practitioners alike.
Remarkable progress in eye-tracking technologies opened the way to design novel attention-based intelligent user interfaces, and highlighted the importance of better understanding of eye-gaze in human-computer interaction and human-human communication. For instance, a user's focus of attention is useful in interpreting the user's intentions, their understanding of the conversation, and their attitude towards the conversation. In human face-to-face communication, eye gaze plays an important role in floor management, grounding, and engagement in conversation. Eye Gaze in Intelligent User Interfaces draws on ideas from a number of contributors working on how attentional information can be applied to novel intelligent interfaces. Part I focuses on analyzing human eye gaze behaviors to reveal characteristics of human communication and cognition; Part II addresses estimation and prediction of the cognitive state of the users using gaze information; and Part III presents proposals of novel gaze-aware interfaces which integrate eye-trackers as a system component. The contributions highlight a direction for the future of human-computer interaction, and discuss issues in human attentional behaviors and face-to-face communication which are essential in designing gaze aware interactive interfaces.
Cyberspace is everywhere in today s world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice. In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches. Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations."
In Intersectional Tech: Black Users in Digital Gaming, Kishonna L. Gray interrogates blackness in gaming at the intersections of race, gender, sexuality, and (dis)ability. Situating her argument within the context of the concurrent, seemingly unrelated events of Gamergate and the Black Lives Matter movement, Gray highlights the inescapable chains that bind marginalized populations to stereotypical frames and limited narratives in video games. Intersectional Tech explores the ways that the multiple identities of black gamers some obvious within the context of games, some more easily concealed affect their experiences of gaming. The normalization of whiteness and masculinity in digital culture inevitably leads to isolation, exclusion, and punishment of marginalized people. Yet, Gray argues, we must also examine the individual struggles of prejudice, discrimination, and microaggressions within larger institutional practices that sustain the oppression. These ""new"" racisms and a complementary colorblind ideology are a kind of digital Jim Crow, a new mode of the same strategies of oppression that have targeted black communities throughout American history. Drawing on extensive interviews that engage critically with identity development and justice issues in gaming, Gray explores the capacity for gaming culture to foster critical consciousness, aid in participatory democracy, and effect social change. Intersectional Tech is rooted in concrete situations of marginalized members within gaming culture. It reveals that despite the truths articulated by those who expose the sexism, racism, misogyny, and homophobia that are commonplace within gaming communities, hegemonic narratives continue to be privileged. This text, in contrast, centers the perspectives that are often ignored and provides a critical corrective to notions of gaming as a predominantly white and male space.
This book examines the possibilities of incorporating elements of user-centred design (UCD) such as user experience (UX) and usability with agile software development. It explores the difficulties and problems inherent in integrating these two practices despite their relative similarities, such as their emphasis on stakeholder collaboration. Developed from a workshop held at NordiCHI in 2014, this edited volume brings together researchers from across the software development, UCD and creative design fields to discuss the current state-of-the-art. Practical case studies of integrating UCD in Agile development across diverse contexts are presented, whilst the different futures for UCD and other design practices in the context of agile software development are identified and explored. Integrating User Centred Design in Agile Development will be ideal for researchers, designers and academics who are interested in software development, user-centred design, agile methodologies and related areas.
This book provides a broad survey of advanced pattern recognition techniques for human behavior analysis. Clearly structured, the book begins with concise coverage of the major concepts, before introducing the most frequently used techniques and algorithms in detail, and then discussing examples of real applications. Features: contains contributions from an international selection of experts in the field; presents a thorough introduction to the fundamental topics of human behavior analysis; investigates methods for activity recognition, including gait and posture analysis, hand gesture analysis, and semantics of human behavior in image sequences; provides an accessible psychological treatise on social signals for the analysis of social behaviors; discusses voice and speech analysis, combined audiovisual cues, and social interactions and group dynamics; examines applications in different research fields; each chapter concludes with review questions, a summary of the topics covered, and a glossary.
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.
This book addresses extensible and adaptable computing, a broad range of methods and techniques used to systematically tackle the future growth of systems and respond proactively and seamlessly to change. The book is divided into five main sections: Agile Software Development, Data Management, Web Intelligence, Machine Learning and Computing in Education. These sub-domains of computing work together in mutually complementary ways to build systems and applications that scale well, and which can successfully meet the demands of changing times and contexts. The topics under each track have been carefully selected to highlight certain qualitative aspects of applications and systems, such as scalability, flexibility, integration, efficiency and context awareness. The first section (Agile Software Development) includes six contributions that address related issues, including risk management, test case prioritization and tools, open source software reliability and predicting the change proneness of software. The second section (Data Management) includes discussions on myriad issues, such as extending database caches using solid-state devices, efficient data transmission, healthcare applications and data security. In turn, the third section (Machine Learning) gathers papers that investigate ML algorithms and present their specific applications such as portfolio optimization, disruption classification and outlier detection. The fourth section (Web Intelligence) covers emerging applications such as metaphor detection, language identification and sentiment analysis, and brings to the fore web security issues such as fraud detection and trust/reputation systems. In closing, the fifth section (Computing in Education) focuses on various aspects of computer-aided pedagogical methods.
In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial and insurance services. Further, it identifies the differences in the data protection systems of EU member states and examines the development of common standards and principles of data protection that could help build a data protection model for Mercosur. Divided into four parts, the book starts out with a discussion of the evolution of the right to privacy, focusing on the last few decades, and taking into account the development of new technologies. The second part discusses the interaction between data protection and specific industries that serve as case studies: insurance, banking and credit reporting. The focus of this part is on generalization and discrimination, adverse selection and the processing of sensitive and genetic data. The third part of the book presents an analysis of the legislation of three EU Member States (France, Italy and UK). Specific elements of analysis that are compared are the concepts of personal and anonymous data, data protection principles, the role of the data protection authorities, the role of the data protection officer, data subjects' rights, the processing of sensitive data, the processing of genetic data and the experience of the case studies in processing data. The book concludes with the proposal of a model for data protection that could be adopted by Mercosur, taking into account the different levels of data protection that exist in its member states."
Logic and the Organization of Information closely examines the
historical and contemporary methodologies used to catalogue
information objects-books, ebooks, journals, articles, web pages,
images, emails, podcasts and more-in the digital era. |
You may like...
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R678
Discovery Miles 6 780
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter
Paperback
Global Health Informatics - How…
Heimar Marin, Eduardo Massad, …
Paperback
R1,872
Discovery Miles 18 720
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R762
Discovery Miles 7 620
|