![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Extensive research conducted by the Hasso Plattner Design Thinking Research Program at Stanford University in Palo Alto, California, USA, and the Hasso Plattner Institute in Potsdam, Germany, has yielded valuable insights on why and how design thinking works. The participating researchers have identified metrics, developed models, and conducted studies, which are featured in this book, and in the previous volumes of this series. This volume provides readers with tools to bridge the gap between research and practice in design thinking with varied real world examples. Several different approaches to design thinking are presented in this volume. Acquired frameworks are leveraged to understand design thinking team dynamics. The contributing authors lead the reader through new approaches and application fields and show that design thinking can tap the potential of digital technologies in a human-centered way. In a final section, new ideas in neurodesign at Stanford University and at Hasso Plattner Institute in Potsdam are elaborated upon thereby challenging the reader to consider newly developed methodologies and provide discussion of how these insights can be applied to various sectors. Special emphasis is placed on understanding the mechanisms underlying design thinking at the individual and team levels. Design thinking can be learned. It has a methodology that can be observed across multiple settings and accordingly, the reader can adopt new frameworks to modify and update existing practice. The research outcomes compiled in this book are intended to inform and provide inspiration for all those seeking to drive innovation - be they experienced design thinkers or newcomers.
In recent years, searching for source code on the web has become increasingly common among professional software developers and is emerging as an area of academic research. This volume surveys past research and presents the state of the art in the area of "code retrieval on the web." This work is concerned with the algorithms, systems, and tools to allow programmers to search for source code on the web and the empirical studies of these inventions and practices. It is a label that we apply to a set of related research from software engineering, information retrieval, human-computer interaction, management, as well as commercial products. The division of code retrieval on the web into snippet remixing and component reuse is driven both by empirical data, and analysis of existing search engines and tools. Contributors include leading researchers from human-computer interaction, software engineering, programming languages, and management. "Finding Source Code on the Web for Remix and Reuse" consists of five parts. Part I is titled "Programmers and Practices," and consists of a retrospective chapter and two empirical studies on how programmers search the web for source code. Part II is titled "From Data Structures to Infrastructures," and covers the creation of ground-breaking search engines for code retrieval required ingenuity in the adaptation of existing technology and in the creation of new algorithms and data structures. Part III focuses on "Reuse: Components and Projects," which are reused with minimal modification. Part IV is on "Remix: Snippets and Answers," which examines how source code from the web can also be used as solutions to problems and answers to questions. The book concludes with Part V, "Looking Ahead," that looks at future programming and the legalities of software reuse and remix and the implications of current intellectual property law on the future of software development. The story, "Richie Boss: Private Investigator Manager," was selected as the winner of a crowdfunded short story contest."
The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users' information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients' medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts' panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.
This book offers practical advice on managing enterprise modeling (EM) projects and facilitating participatory EM sessions. Modeling activities often involve groups of people, and models are created in a participatory way. Ensuring that this is done efficiently requires dedicated individuals who know how to organize modeling projects and sessions, how to manage discussions during these sessions, and what aspects influence the success and efficiency of modeling in practice. The book also includes a summary of the theoretical background to EM, although participatory modeling can also be used in conjunction with other methods that are not made for EM, such as those made for goal-oriented requirements engineering and information systems analysis. The first four chapters present an overview of enterprise modeling from various viewpoints (including methods, processes and organizational challenges), providing a background for those that need to refresh their basic knowledge. The next six chapters form the core of the book and detail the roles and competences needed in an EM project, typical stakeholder behaviors and how to handle them, tools and methods for managing participatory modeling and facilitation, and how to train modeling experts for these social aspects of modeling. Lastly, a concluding chapter presents a summary and an outlook on current research in participatory EM. This book is intended for anybody who wants to learn more about how to facilitate participatory modeling in practice and how to set up and carry out EM projects. It does not require any in-depth knowledge about specific EM methods and tools, and can be used by students and lecturers for courses on participatory modeling, and by practitioners wanting to extend their knowledge of social and organizational topics to become an experienced facilitator and EM project manager.
Future technical systems will be companion systems, competent assistants that provide their functionality in a completely individualized way, adapting to a user's capabilities, preferences, requirements, and current needs, and taking into account both the emotional state and the situation of the individual user. This book presents the enabling technology for such systems. It introduces a variety of methods and techniques to implement an individualized, adaptive, flexible, and robust behavior for technical systems by means of cognitive processes, including perception, cognition, interaction, planning, and reasoning. The technological developments are complemented by empirical studies from psychological and neurobiological perspectives.
This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.
This book provides an insight into recent technological trends and innovations in mobility solutions and platforms to improve mobility of visually impaired people. The authors' goal is to help to contribute to the social and societal inclusion of the visually impaired. The book's topics include, but are not limited to, obstacle detection systems, indoor and outdoor navigation, transportation sustainability systems, and hardware/devices to aid visually impaired people. The book has a strong focus on practical applications, tested in a real environment. Applications include city halls, municipalities, and companies that can keep up to date with recent trends in platforms, methodologies and technologies to promote urban mobility. Also discussed are broader realms including education, health, electronics, tourism, and transportation. Contributors include a variety of researchers and practitioners around the world. Features practical, tested applications of technological mobility solutions for visual impaired people; Presents topics such as obstacle detection systems, urban mobility, smart home services, and ambient assisted living; Includes a number of application examples in education, health, electronics, tourism, and transportation.
Participatory design is about the direct involvement of people in the co-design of the technologies they use. Its central concern is how collaborative design processes can be driven by the participation of the people affected by the technology designed. Embracing a diverse collection of principles and practices aimed at making technologies, tools, environments, businesses, and social institutions more responsive to human needs, the International Handbook of Participatory Design is a state-of-the-art reference handbook for the subject. The Handbook brings together a multidisciplinary and international group of highly recognized and experienced experts to present an authoritative overview of the field and its history and discuss contributions and challenges of the pivotal issues in participatory design, including heritage, ethics, ethnography, methods, tools and techniques and community involvement. The book also highlights three large-scale case studies which show how participatory design has been used to bring about outstanding changes in different organizations. The book shows why participatory design is an important, highly relevant and rewarding area for research and practice. It will be an invaluable resource for students, researchers, scholars and professionals in participatory design.
This book presents the proceedings of the 8th International Ergonomics Conference (ERGONOMICS), held in Zagreb, Croatia on December 2-5, 2020. By highlighting the latest theories and models, as well as cutting-edge technologies and applications, and by combining findings from a range of disciplines including engineering, design, robotics, healthcare, management, computer science, human biology and behavioral science, it provides researchers and practitioners alike with a comprehensive, timely guide on human factors and ergonomics. It also offers an excellent source of innovative ideas to stimulate future discussions and developments aimed at applying knowledge and techniques to optimize system performance, while at the same time promoting the health, safety and wellbeing of individuals. The proceedings include papers from researchers and practitioners, scientists and physicians, institutional leaders, managers and policy makers that contribute to constructing the Human Factors and Ergonomics approach across a variety of methodologies, domains and productive sectors.
This book explores the way today's interconnected and digitized world--marked by social media, over-sharing, and blurred lines between public and private spheres--shapes the nature and fallout of scandal in a frenzied media environment. Today's digitized world has erased the former distinction between the public and private self in the social sphere. Scandal in a Digital Age marries scholarly research on scandal with journalistic critique to explore how our Internet culture driven by (over)sharing and viral, visual content impacts the occurrence of scandal and its rapid spread online through retweets and reposts. No longer are examples of scandalous behavior "merely" reported in the news. Today, news consumers can see the visual evidence of salacious behavior whether through an illicit tweet or video with a simple click. And we can't help but click.
Passage of the European Data Protection Directive and other national laws have increased the need for companies and other entities to improve their data protection and privacy controls. Clients, stakeholders, and the public are clamoring for it. Klosek introduces the various legal means to protect personal data in the United States and the European Union, targeting her book at American and international businesses that may have difficulty complying with the European Directive. She explains its main elements and practical effects, presents primary components of national privacy laws abroad and in the United States, and gives advice on some steps companies can take to improve the level of protection they afford to the data they possess. Klosek offers a comprehensive review of the American and European systems for providing protection to personal information in the Internet age. She explains the European Data Protection Directive, the national data protection laws of the fifteen countries of the European Union, and the laws and other initiatives for protecting individual personal data. She endeavors to discuss the protection of personal data in general but focuses on, and emphasizes, the protection of personal data within the context of the Internet. In doing so, she provides much useful, fascinating information on the obvious and non-obvious means of collecting and processing personal data through the Internet. Among its unusual features, the book helps United States corporate decision makers assess the effect data protection laws will have in Europe and the U.S., and how companies that are operating web sites that cross international boundaries can ensure they stay in compliance with data protection laws in countries in which their web sites may be accessible. The book is essential reading for corporate compliance executives, corporate communications and other top-level organizational administrators, particularly in Internet industries.
As technology continues to play a vital role in our everyday lives, advancements in human-computer interaction studies embrace ubiquitous computing as a tool for information processing to evolve into the human environment. Global Applications of Pervasive and Ubiquitous Computing provides the global applications and efforts in building and applying pervasive and ubiquitous computer technology. This book provides an essential collection of research on information technology for educators, researchers, and practitioners aiming to advance the practice and understanding of pervasive and ubiquitous applications.
Recently, there has been a major push to rediscover the ethical dimension of technology across the sciences, social sciences, and humanities. Technoethics and the Evolving Knowledge Society: Ethical Issues in Technological Design, Research, Development, and Innovation examines human processes and practices connected to technology embedded within social, political, and moral spheres of life. This innovative publication engages readers in critical debates connected to the ethical dimensions of a technological society through insightful examinations, theories, and research findings not covered by any other text to date.
Technology has always played a decisive role in humanity's progress, although the positive impacts technology has on human development may become tainted by the risks it entails. ""Information Communication Technologies and Human Development: Opportunities and Challenges"" emphasizes the need to consider the geographic, historic, and cultural context of an information communication technology (ICT) for development initiative, and includes several real examples that show some of the key success factors that have to be taken into consideration when using ICTs for development. ""Information Communication Technologies and Human Development: Opportunities and Challenges"" is a tool for practitioners, providing a wide knowledge of several important ICTs for development experiences that have been conducted all over the developing world.
This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.
This work examines how vast amounts of personal information are finding their way into corporate hands. It argues that once there, this data can be combined and used to develope electronic profiles of individuals and groups that are potentially more detailed and intrusive.
This is the first book that presents a comprehensive overview of sustainability aspects in software engineering. Its format follows the structure of the SWEBOK and covers the key areas involved in the incorporation of green aspects in software engineering, encompassing topics from requirement elicitation to quality assurance and maintenance, while also considering professional practices and economic aspects. The book consists of thirteen chapters, which are structured in five parts. First the Introduction gives an overview of the primary general concepts related to Green IT, discussing what Green "in" Software Engineering is and how it differs from Green "by" Software Engineering.Next Environments, Processes and Construction presents green software development environments, green software engineering processes and green software construction in general. The third part, Economic and Other Qualities, details models for measuring how well software supports green software engineering techniques and for performing trade-off analyses between alternative green practices from an economic perspective. Software Development Process then details techniques for incorporating green aspects at various stages of software development, including requirements engineering, design, testing, and maintenance. In closing, Practical Issues addresses the repercussions of green software engineering on decision-making, stakeholder participation and innovation management. The audience for this book includes software engineering researchers in academia and industry seeking to understand the challenges and impact of green aspects in software engineering, as well as practitioners interested in learning about the state of the art in Green in Software Engineering. "
While technology has had a considerable impact on humanity s progress, it can also fuel inequality and tension. Considerable opportunities exist for investigating the link between ICT design and individual and social development. ICTs for Advancing Rural Communities and Human Development: Addressing the Digital Divide reviews the important impact ICTs have on economic, social, and political development and provides analyses of ICTs for education, commerce, and governance. This reference develops strategies and promotes awareness of human development initiatives as they relate to technology development and design.
This edited book discusses the exciting field of Digital Creativity. Through exploring the current state of the creative industries, the authors show how technologies are reshaping our creative processes and how they are affecting the innovative creation of new products. Readers will discover how creative production processes are dominated by digital data transmission which makes the connection between people, ideas and creative processes easy to achieve within collaborative and co-creative environments. Since we rely on our senses to understand our world, perhaps of more significance is that technologies through 3D printing are returning from the digital to the physical world. Written by an interdisciplinary group of researchers this thought provoking book will appeal to academics and students from a wide range of backgrounds working or interested in the technologies that are shaping our experiences of the future.
This volume brings together papers that offer methodologies, conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the eight annual International Conference on Computers, Privacy, and Data Protection, CPDP 2015, held in Brussels in January 2015. The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation. The book also discusses EU policies with respect to Big and Open Data and provides advice to policy makers regarding these topics. Also attention is being paid to regulation and its effects, for instance in case of the so-called 'EU-cookie law' and groundbreaking cases, such as Europe v. Facebook. This interdisciplinary book was written during what may turn out to be the final stages of the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission. It discusses open issues and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.
This rigorous book is a complete and up-to-date reference for the Csound system from the perspective of its main developers and power users. It explains the system, including the basic modes of operation and its programming language; it explores the many ways users can interact with the system, including the latest features; and it describes key applications such as instrument design, signal processing, and creative electronic music composition. The Csound system has been adopted by many educational institutions as part of their undergraduate and graduate teaching programs, and it is used by practitioners worldwide. This book is suitable for students, lecturers, composers, sound designers, programmers, and researchers in the areas of music, sound, and audio signal processing.
Next Generation Mobile Networks and Ubiquitous Computing provides a comprehensive and unified view of the latest and most innovative research findings for university professors, researchers, students, and industry professionals alike. Presenting chapters by experts from across the globe, this reference offers a single body of knowledge to show the many existing interactions between mobile networking, wireless communications, and ubiquitous computing.
Global cybercrime is arguably the biggest underworld industry of our times. Global forces and technologies such as mobile phones, social media and cloud computing are shaping the structure of the global cybercrime industry estimated at US$1 trillion. Nir Kshetri documents and compares the patterns, characteristics and processes of cybercrime activities in major regions and economies in the Global South such as China, India, the former Second World economies, Latin America and the Caribbean, Sub-Saharan Africa and Middle East and North Africa. Integrating theories from a wide range of disciplines, he explains initiatives at the global, supranational, national, sub-national and local levels.
Imagine how much easier creating web and mobile applications would be if you had a practical and concise, hands-on guide to visual design. "Visual Usability" gets into the nitty-gritty of applying visual design principles to complex application design. You ll learn how to avoid common mistakes, make informed
decisions about application design, and elevate the ordinary. We ll
review three key principles that affect application design -
consistency, hierarchy, and personality - and illustrate how to
apply tools like typography, color, and layout to digital
application design. Whether you re a UI professional looking to
fine-tune your skills, a developer who cares about making
applications beautiful and usable, or someone entirely new to the
design arena, Visual Usability is your one-stop, practical guide to
visual design. |
![]() ![]() You may like...
Ward 7, Precinct 1, City of Boston: List…
Boston Election Department
Paperback
R654
Discovery Miles 6 540
Ward 10, Precinct 1, City of Boston…
Boston Election Department
Paperback
R635
Discovery Miles 6 350
|