![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users' information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients' medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts' panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.
Recently, there has been a major push to rediscover the ethical dimension of technology across the sciences, social sciences, and humanities. Technoethics and the Evolving Knowledge Society: Ethical Issues in Technological Design, Research, Development, and Innovation examines human processes and practices connected to technology embedded within social, political, and moral spheres of life. This innovative publication engages readers in critical debates connected to the ethical dimensions of a technological society through insightful examinations, theories, and research findings not covered by any other text to date.
This book offers practical advice on managing enterprise modeling (EM) projects and facilitating participatory EM sessions. Modeling activities often involve groups of people, and models are created in a participatory way. Ensuring that this is done efficiently requires dedicated individuals who know how to organize modeling projects and sessions, how to manage discussions during these sessions, and what aspects influence the success and efficiency of modeling in practice. The book also includes a summary of the theoretical background to EM, although participatory modeling can also be used in conjunction with other methods that are not made for EM, such as those made for goal-oriented requirements engineering and information systems analysis. The first four chapters present an overview of enterprise modeling from various viewpoints (including methods, processes and organizational challenges), providing a background for those that need to refresh their basic knowledge. The next six chapters form the core of the book and detail the roles and competences needed in an EM project, typical stakeholder behaviors and how to handle them, tools and methods for managing participatory modeling and facilitation, and how to train modeling experts for these social aspects of modeling. Lastly, a concluding chapter presents a summary and an outlook on current research in participatory EM. This book is intended for anybody who wants to learn more about how to facilitate participatory modeling in practice and how to set up and carry out EM projects. It does not require any in-depth knowledge about specific EM methods and tools, and can be used by students and lecturers for courses on participatory modeling, and by practitioners wanting to extend their knowledge of social and organizational topics to become an experienced facilitator and EM project manager.
This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.
This book provides an insight into recent technological trends and innovations in mobility solutions and platforms to improve mobility of visually impaired people. The authors' goal is to help to contribute to the social and societal inclusion of the visually impaired. The book's topics include, but are not limited to, obstacle detection systems, indoor and outdoor navigation, transportation sustainability systems, and hardware/devices to aid visually impaired people. The book has a strong focus on practical applications, tested in a real environment. Applications include city halls, municipalities, and companies that can keep up to date with recent trends in platforms, methodologies and technologies to promote urban mobility. Also discussed are broader realms including education, health, electronics, tourism, and transportation. Contributors include a variety of researchers and practitioners around the world. Features practical, tested applications of technological mobility solutions for visual impaired people; Presents topics such as obstacle detection systems, urban mobility, smart home services, and ambient assisted living; Includes a number of application examples in education, health, electronics, tourism, and transportation.
Participatory design is about the direct involvement of people in the co-design of the technologies they use. Its central concern is how collaborative design processes can be driven by the participation of the people affected by the technology designed. Embracing a diverse collection of principles and practices aimed at making technologies, tools, environments, businesses, and social institutions more responsive to human needs, the International Handbook of Participatory Design is a state-of-the-art reference handbook for the subject. The Handbook brings together a multidisciplinary and international group of highly recognized and experienced experts to present an authoritative overview of the field and its history and discuss contributions and challenges of the pivotal issues in participatory design, including heritage, ethics, ethnography, methods, tools and techniques and community involvement. The book also highlights three large-scale case studies which show how participatory design has been used to bring about outstanding changes in different organizations. The book shows why participatory design is an important, highly relevant and rewarding area for research and practice. It will be an invaluable resource for students, researchers, scholars and professionals in participatory design.
Passage of the European Data Protection Directive and other national laws have increased the need for companies and other entities to improve their data protection and privacy controls. Clients, stakeholders, and the public are clamoring for it. Klosek introduces the various legal means to protect personal data in the United States and the European Union, targeting her book at American and international businesses that may have difficulty complying with the European Directive. She explains its main elements and practical effects, presents primary components of national privacy laws abroad and in the United States, and gives advice on some steps companies can take to improve the level of protection they afford to the data they possess. Klosek offers a comprehensive review of the American and European systems for providing protection to personal information in the Internet age. She explains the European Data Protection Directive, the national data protection laws of the fifteen countries of the European Union, and the laws and other initiatives for protecting individual personal data. She endeavors to discuss the protection of personal data in general but focuses on, and emphasizes, the protection of personal data within the context of the Internet. In doing so, she provides much useful, fascinating information on the obvious and non-obvious means of collecting and processing personal data through the Internet. Among its unusual features, the book helps United States corporate decision makers assess the effect data protection laws will have in Europe and the U.S., and how companies that are operating web sites that cross international boundaries can ensure they stay in compliance with data protection laws in countries in which their web sites may be accessible. The book is essential reading for corporate compliance executives, corporate communications and other top-level organizational administrators, particularly in Internet industries.
As technology continues to play a vital role in our everyday lives, advancements in human-computer interaction studies embrace ubiquitous computing as a tool for information processing to evolve into the human environment. Global Applications of Pervasive and Ubiquitous Computing provides the global applications and efforts in building and applying pervasive and ubiquitous computer technology. This book provides an essential collection of research on information technology for educators, researchers, and practitioners aiming to advance the practice and understanding of pervasive and ubiquitous applications.
This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.
Technology has always played a decisive role in humanity's progress, although the positive impacts technology has on human development may become tainted by the risks it entails. ""Information Communication Technologies and Human Development: Opportunities and Challenges"" emphasizes the need to consider the geographic, historic, and cultural context of an information communication technology (ICT) for development initiative, and includes several real examples that show some of the key success factors that have to be taken into consideration when using ICTs for development. ""Information Communication Technologies and Human Development: Opportunities and Challenges"" is a tool for practitioners, providing a wide knowledge of several important ICTs for development experiences that have been conducted all over the developing world.
This edited volume presents an overview of cutting-edge research areas within digital ethics as defined by the Digital Ethics Lab of the University of Oxford. It identifies new challenges and opportunities of influence in setting the research agenda in the field. The yearbook presents research on the following topics: conceptual metaphor theory, cybersecurity governance, cyber conflicts, anthropomorphism in AI, digital technologies for mental healthcare, data ethics in the asylum process, AI's legitimacy and democratic deficit, digital afterlife industry, automatic prayer bots, foresight analysis and the future of AI. This volume appeals to students, researchers and professionals.
This edited book discusses the exciting field of Digital Creativity. Through exploring the current state of the creative industries, the authors show how technologies are reshaping our creative processes and how they are affecting the innovative creation of new products. Readers will discover how creative production processes are dominated by digital data transmission which makes the connection between people, ideas and creative processes easy to achieve within collaborative and co-creative environments. Since we rely on our senses to understand our world, perhaps of more significance is that technologies through 3D printing are returning from the digital to the physical world. Written by an interdisciplinary group of researchers this thought provoking book will appeal to academics and students from a wide range of backgrounds working or interested in the technologies that are shaping our experiences of the future.
This is the first book that presents a comprehensive overview of sustainability aspects in software engineering. Its format follows the structure of the SWEBOK and covers the key areas involved in the incorporation of green aspects in software engineering, encompassing topics from requirement elicitation to quality assurance and maintenance, while also considering professional practices and economic aspects. The book consists of thirteen chapters, which are structured in five parts. First the Introduction gives an overview of the primary general concepts related to Green IT, discussing what Green "in" Software Engineering is and how it differs from Green "by" Software Engineering.Next Environments, Processes and Construction presents green software development environments, green software engineering processes and green software construction in general. The third part, Economic and Other Qualities, details models for measuring how well software supports green software engineering techniques and for performing trade-off analyses between alternative green practices from an economic perspective. Software Development Process then details techniques for incorporating green aspects at various stages of software development, including requirements engineering, design, testing, and maintenance. In closing, Practical Issues addresses the repercussions of green software engineering on decision-making, stakeholder participation and innovation management. The audience for this book includes software engineering researchers in academia and industry seeking to understand the challenges and impact of green aspects in software engineering, as well as practitioners interested in learning about the state of the art in Green in Software Engineering. "
While technology has had a considerable impact on humanity s progress, it can also fuel inequality and tension. Considerable opportunities exist for investigating the link between ICT design and individual and social development. ICTs for Advancing Rural Communities and Human Development: Addressing the Digital Divide reviews the important impact ICTs have on economic, social, and political development and provides analyses of ICTs for education, commerce, and governance. This reference develops strategies and promotes awareness of human development initiatives as they relate to technology development and design.
Computer simulation-based education and training is a multi-billion dollar industry. With the increased complexity of organizational decision making, projected demand for computer simulation-based decisional aids is on the rise. The objective of this book is to enhance systematically our understanding of and gain insights into the general process by which human facilitated ILEs are effectively designed and used in improving users' decision making in dynamic tasks. This book is divided into four major parts. Part I serves as an introduction to the subject of "decision making in dynamic tasks", its importance and its complexity. Part II provides background material, drawing upon the relevant literature, for the development of an integrated process model on the effectiveness of human facilitated ILEs in improving decision making in dynamic tasks. Part III focuses on the design, development and application of Fish Bank ILE, in laboratory experiments, to gather empirical evidence for the validity of the process model. Finally, part IV presents a comprehensive analysis of the gathered data to provide a powerful basis for understating important phenomena of training with human facilitated simulation-based learning environments, thereby, help to drive critical lessons to be learned. This book provides the reader with both a comprehensive understanding of the phenomena encountered in decision making with human facilitated ILEs and a unique way of studying the effects of these phenomena on people's ability to make better decision in complex, dynamic tasks. This book is intended to be of use to managers and practitioners, researchers and students of dynamic decision making. The background material of Part II provides a solid base to understand and organize the existing experimental research literature and approaches.
Enormous advances in information technology have permeated essentially all facets of life in the past two decades. Formidable challenges remain in fostering tools that enhance productivity but are sensitive to work practices. Cognitive Informatics (CI) is the multidisciplinary study of cognition, information and computational sciences that investigates all facets of human computing including design and computer-mediated intelligent action, thus is strongly grounded in methods and theories from cognitive science. As an applied discipline, it has a close affiliation with human factors and human-computer interaction, and provides a framework for the analysis and modeling of complex human performance in technology-mediated settings and contributes to the design and development of better information systems. In recent years, CI has emerged as a distinct area with special relevance to biomedicine and health care. In addition, it has become a foundation for education and training of health informaticians, the Office of the National Coordinator for Health Information Technology initiating a program including CI as one of its critical elements to support health IT curriculum development. This book represents a first textbook on cognitive informatics and will focus on key examples drawn from the application of methods and theories from CI to challenges pertaining to the practice of critical-care medicine (CCM). Technology is transforming critical care workflows and re-organizing patient care management processes. CCM has proven to be a fertile test bed for theories and methods of cognitive informatics. CI, in turn, has contributed much to our understanding of the factors that result in complexity and patient errors. The topic is strongly interdisciplinary and will be important for individuals from a range of academic and professional backgrounds, including critical care specialists, psychologists, computer scientists, medical informaticians, and anthropologists.
This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.
This book presents a collection of research findings and proposals on computer science and computer engineering, introducing readers to essential concepts, theories, and applications. It also shares perspectives on how cutting-edge and established methodologies and techniques can be used to obtain new and interesting results. Each chapter focuses on a specific aspect of computer science or computer engineering, such as: software engineering, complex systems, computational intelligence, embedded systems, and systems engineering. As such, the book will bring students and professionals alike up to date on key advances in these areas.
This rigorous book is a complete and up-to-date reference for the Csound system from the perspective of its main developers and power users. It explains the system, including the basic modes of operation and its programming language; it explores the many ways users can interact with the system, including the latest features; and it describes key applications such as instrument design, signal processing, and creative electronic music composition. The Csound system has been adopted by many educational institutions as part of their undergraduate and graduate teaching programs, and it is used by practitioners worldwide. This book is suitable for students, lecturers, composers, sound designers, programmers, and researchers in the areas of music, sound, and audio signal processing.
Next Generation Mobile Networks and Ubiquitous Computing provides a comprehensive and unified view of the latest and most innovative research findings for university professors, researchers, students, and industry professionals alike. Presenting chapters by experts from across the globe, this reference offers a single body of knowledge to show the many existing interactions between mobile networking, wireless communications, and ubiquitous computing.
Global cybercrime is arguably the biggest underworld industry of our times. Global forces and technologies such as mobile phones, social media and cloud computing are shaping the structure of the global cybercrime industry estimated at US$1 trillion. Nir Kshetri documents and compares the patterns, characteristics and processes of cybercrime activities in major regions and economies in the Global South such as China, India, the former Second World economies, Latin America and the Caribbean, Sub-Saharan Africa and Middle East and North Africa. Integrating theories from a wide range of disciplines, he explains initiatives at the global, supranational, national, sub-national and local levels.
This book provides essential insights on the adoption of modern software engineering practices at large companies producing software-intensive systems, where hundreds or even thousands of engineers collaborate to deliver on new systems and new versions of already deployed ones. It is based on the findings collected and lessons learned at the Software Center (SC), a unique collaboration between research and industry, with Chalmers University of Technology, Gothenburg University and Malmoe University as academic partners and Ericsson, AB Volvo, Volvo Car Corporation, Saab Electronic Defense Systems, Grundfos, Axis Communications, Jeppesen (Boeing) and Sony Mobile as industrial partners. The 17 chapters present the "Stairway to Heaven" model, which represents the typical evolution path companies move through as they develop and mature their software engineering capabilities. The chapters describe theoretical frameworks, conceptual models and, most importantly, the industrial experiences gained by the partner companies in applying novel software engineering techniques. The book's structure consists of six parts. Part I describes the model in detail and presents an overview of lessons learned in the collaboration between industry and academia. Part II deals with the first step of the Stairway to Heaven, in which R&D adopts agile work practices. Part III of the book combines the next two phases, i.e., continuous integration (CI) and continuous delivery (CD), as they are closely intertwined. Part IV is concerned with the highest level, referred to as "R&D as an innovation system," while Part V addresses a topic that is separate from the Stairway to Heaven and yet critically important in large organizations: organizational performance metrics that capture data, and visualizations of the status of software assets, defects and teams. Lastly, Part VI presents the perspectives of two of the SC partner companies. The book is intended for practitioners and professionals in the software-intensive systems industry, providing concrete models, frameworks and case studies that show the specific challenges that the partner companies encountered, their approaches to overcoming them, and the results. Researchers will gain valuable insights on the problems faced by large software companies, and on how to effectively tackle them in the context of successful cooperation projects.
This book provides an introduction and overview of the rapidly evolving topic of game user experience, presenting the new perspectives employed by researchers and the industry, and highlighting the recent empirical findings that illustrate the nature of it. The first section deals with cognition and player psychology, the second section includes new research on modeling and measuring player experience, the third section focuses on the impact of game user experience on game design processes and game development cycles, the fourth section presents player experience case studies on contemporary computer games, and the final section demonstrates the evolution of game user experience in the new era of VR and AR. The book is suitable for students and professionals with different disciplinary backgrounds such as computer science, game design, software engineering, psychology, interactive media, and many others.
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
This book diagnoses the social, mental and political consequences of working and economic organizations that generate value from communication. It calls for the role of communication technologies to be reimagined in order to create a healthier, fairer society. |
![]() ![]() You may like...
Technologies for Medical Sciences
Renato M Natal Jorge, Joao Tavares, …
Hardcover
R3,067
Discovery Miles 30 670
Flow Visualization: Techniques And…
Alexander J. Smits, Tee Tai Lim
Hardcover
R4,419
Discovery Miles 44 190
Modern Age Waste Water Problems…
Mohammad Oves, Mohammad Omaish Ansari, …
Hardcover
R3,077
Discovery Miles 30 770
Semiconductor Nanophotonics - Materials…
Michael Kneissl, Andreas Knorr, …
Hardcover
R5,411
Discovery Miles 54 110
Advanced Dynamics and Model-Based…
Hans Irschik, Michael Krommer, …
Hardcover
R3,041
Discovery Miles 30 410
|