![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing
The adoption of technology has provided opportunities for increased participation in global affairs both at an individual and organizational level. As a discipline, e-adoption focuses on the requirements, policies, and implications of widespread technology use in developed and developing countries. E-Adoption and Technologies for Empowering Developing Countries: Global Advances reviews the impact technology has had on individuals and organizations whose access to media and resources is otherwise limited. With overviews of topics including electronic voting, electronic delivery systems, social Web applications, and online educational environments, this reference work provides a foundation for understanding the interplay between technology and societal growth and development.
Emotion Online: Theorizing Affect on the Internet takes stock of where we are emotionally with regards to the Internet in social and cultural terms. Online users are switching between personal, national, international and global modes of being and feeling that shape private and public experiences. Drawing upon the well-established discipline of media studies, the book travels theoretically through, across, in and between examples of traditional media as they merge and emerge online. Garde-Hansen and Gorton explore how we feel about, and how we feel in, our online media ecology in the context of global media platforms.
Assistive and augmentive communication is an emerging research area receiving much support from the disabled community. It enables communication for those with impairments or restrictions on the production or comprehension of spoken or written language. Assistive and Augmentive Communication for the Disabled: Intelligent Technologies for Communication, Learning and Teaching provides benefits to the professionals and researchers working in various disciplines in the field, such as special education, healthcare, computational intelligence and information technology. Moreover, this book provides insights and support to individuals who are concerned with the development of children and adults with disabilities. It covers recently completed studies, as well as ongoing research, to provide a cutting-edge window into this area of promising, new applications.
End users have become increasingly integrated into computing environments, necessitating continued inquiry into successful models for end user design and development and the impact that these models have on performance and productivity. End-User Computing, Development and Software Engineering: New Challenges explores the implementation of organizational and end user computing initiatives and provides foundational research to further the understanding of this discipline and its related fields. This book reviews the factors and barriers to ICT adoption in organizations, opportunities and benefits of communities of practice, and impact that end user computing can have on overall firm performance.
Valuing People and Technology in the Workplace: A Competitive Advantage Framework introduces a more proactive, strategic approach to bring employees into, and develop them within, an organization. Interpreting and accepting this concept requires managers to think of employees as they would think of technology. Technology, equipment, and systems are strategically aligned within organizations. Integrating the literature from strategic technology management, strategic human resource management, and human resource development and exploring how this integration can provide competitive advantage to organizations for better implementation of people and technology development initiatives is a potential solution. Valuing People and Technology in the Workplace: A Competitive Advantage Framework provides a comprehensive framework that can be used to develop and design case studies that could measure the identified values that people, technology, and strategy can provide to the organization. This book aims to serve as a guide for managers and leaders as they develop strategies to introduce new people and technology into the workplace.
What Is BCI2000? BCI2000 is a general-purpose software platform for brain-computer interface (BCI) research. It can also be used for a wide variety of data acquisition, stimulus p- sentation, and brain monitoring applications. BCI2000 has been in development since 2000 in a project led by the Brain-Computer Interface R&D Program at the Wadsworth Center of the New York State Department of Health in Albany, New York, USA, with substantial contributions by the Institute of Medical Psychology and Behavioral Neurobiology at the University of Tubingen, Germany. In addition, many laboratories around the world, most notably the BrainLab at Georgia State University in Atlanta, Georgia, and Fondazione Santa Lucia in Rome, Italy, have also played an important role in the project's development. Mission The mission of the BCI2000 project is to facilitate research and the development of applications in all areas that depend on real-time acquisition, processing, and feedback of biosignals. Vision Our vision is that BCI2000 will become a widely used software tool for diverse areas of research and development.
This book tackles the regulatory issues of Unmanned Aerial Systems (UAS) or Remotely-Piloted Aerial Systems (RPAS), which have profound consequences for privacy, security and other fundamental liberties. Collectively known as "drones," they were initially deployed for military purposes: reconnaissance, surveillance and extrajudicial executions. Today, we are witnessing a growth of their use into the civilian and humanitarian domain. They are increasingly used for goals as diverse as news gathering, aerial inspection of oil refinery flare stacks, mapping of the Amazonian rain-forest, crop spraying and search and rescue operations. The civil use of drones is becoming a reality in the European Union and in the US.The drone revolution may be a new technological revolution. Proliferation of the next generation of "recreational" drones show how drones will be sold as any other consumer item. The cultural perception of the technology is shifting, as drones are increasingly being used for humanitarian activities, on one hand, but they can also firmly be situated in the prevailing modes of postmodern governance on the other hand. This work will be of interest to researchers in Criminology and Criminal Justice interested in issues related to surveillance, security, privacy, and technology. It will also provide a criminological background for related legal issues, such as privacy law, aviation law, international criminal law, and comparative law.
The prominence of social media, especially in the lives of teenagers and young adults, has long been regarded as a significant distraction from studies. However, the integration of these forms of media into the teaching experience can improve the engagement of students. Global Perspectives on Social Media in Tertiary Learning and Teaching: Emerging Research and Opportunities is an essential scholarly publication that embeds innovative, current pedagogical practices into new and redeveloped courses and introduces digital and online learning tools to best support teaching practices. Featuring coverage on a wide range of topics including collaborative learning, innovative learning environments, and blended teaching, this book provides essential research for educators, educational administrators, education stakeholders, academicians, researchers, and professionals within the realm of higher education.
Computer-Aided Innovation (CAI) is emerging as a strategic domain of research and application to support enterprises throughout the overall innovation process. The 5.4 Working Group of IFIP aims at defining the scientific foundation of Computer Aided Innovation systems and at identifying state of the art and trends of CAI tools and methods. These Proceedings derive from the second Topical Session on Computer- Aided Innovation organized within the 20th World Computer Congress of IFIP. The goal of the Topical Session is to provide a survey of existing technologies and research activities in the field and to identify opportunities of integration of CAI with other PLM systems. According to the heterogeneous needs of innovation-related activities, the papers published in this volume are characterized by multidisciplinary contents and complementary perspectives and scopes. Such a richness of topics and disciplines will certainly contribute to the promotion of fruitful new collaborations and synergies within the IFIP community. Gaetano Cascini th Florence, April 30 20 08 CAI Topical Session Organization The IFIP Topical Session on Computer-Aided Innovation (CAI) is a co-located conference organized under the auspices of the IFIP World Computer Congress (WCC) 2008 in Milano, Italy Gaetano Cascini CAI Program Committee Chair [email protected]
MUSIC 2013 will be the most comprehensive text focused on the various aspects of Mobile, Ubiquitous and Intelligent computing. MUSIC 2013 provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of intelligent technologies in mobile and ubiquitous computing environment. MUSIC 2013 is the next edition of the 3rd International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC-12, Vancouver, Canada, 2012) which was the next event in a series of highly successful International Workshop on Multimedia, Communication and Convergence technologies MCC-11 (Crete, Greece, June 2011), MCC-10 (Cebu, Philippines, August 2010).
What does it mean to live and work inside the information and communication technology revolution? The nature and significance of newly emerging patterns of social and technical interaction as digital technologies become more pervasive in the knowledge economy are the focus of this book. The places and spaces where digital technolgoies are in use are examined to show why such use may or may not be associated with improvements in society. Studies of on- and off-line interactions between individuals and of collective attempts to govern and manage the new technologies show that the communication revolution is essentially about people, social organization, adaptation, and control, not just technologies This book contains original empirical studies conducted within a programme of research in the Information, Networks and Knowledge (INK) research centre at SPRU, University of Sussex.
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion
Human-in-the-Loop Simulations is a compilation of articles from experts in the design, development, and use of human-in-the-loop simulations. The first section of the handbook consists of papers on fundamental concepts in human-in-the-loop simulations, such as object-oriented simulation development, interface design and development, and performance measurement. The second section includes papers from researchers who utilized HITL simulations to inform models of cognitive processes to include decision making and metacognition. The last section describes human-in-the-loop processes for complex simulation models in trade space exploration and epidemiological analyses. Human-in-the-Loop Simulations is a useful tool for multiple audiences, including graduate students and researchers in engineering and computer science.
Mobile phones are the most ubiquitous communications technology in the world. Besides transforming the way in which we communicate, they can also be used as a powerful tool for conflict prevention and management. This book presents innovative uses of mobile technologies in the areas of early warning, disaster and humanitarian relief, governance, citizens' participation, etc. and cuts across different regions. The book brings together experts and practitioners from different fields-mobile technologies, information systems, computer sciences, online dispute resolution, law, etc.-to reflect on present experiences and to explore new areas for research on conflict management and online dispute resolution (ODR). It also reflects on the transition from present ODR to future mobile Dispute Resolution and discusses key privacy issues. The book is addressed to anyone involved in conflict prevention and dispute management aiming to learn how mobile technologies can play a disruptive role in the way we deal with conflict.
To solve performance problems in modern computing infrastructures, often comprising thousands of servers running hundreds of applications, spanning multiple tiers, you need tools that go beyond mere reporting. You need tools that enable performance analysis of application workflow across the entire enterprise. That's what PDQ (Pretty Damn Quick) provides. PDQ is an open-source performance analyzer based on the paradigm of queues. Queues are ubiquitous in every computing environment as buffers, and since any application architecture can be represented as a circuit of queueing delays, PDQ is a natural fit for analyzing system performance. Building on the success of the first edition, this considerably expanded second edition now comprises four parts. Part I contains the foundational concepts, as well as a new first chapter that explains the central role of queues in successful performance analysis. Part II provides the basics of queueing theory in a highly intelligible style for the non-mathematician; little more than high-school algebra being required. Part III presents many practical examples of how PDQ can be applied. The PDQ manual has been relegated to an appendix in Part IV, along with solutions to the exercises contained in each chapter. Throughout, the Perl code listings have been newly formatted to improve readability. The PDQ code and updates to the PDQ manual are available from the author's web site at www.perfdynamics.com
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the benefits of previous research efforts. In this context, the IFIP Working Group 11.6 on Identity Management has been founded in August 2006. The intention of the Working Group is to offer a broad forum for the exchange of knowledge and for the tracking and discussion of issues and new developments. In this, we take an interdisciplinary approach. Scientists as well as practitioners, from government and business, who are involved in the field of identity management are welcome to participate. The IDMAN 2007 Conference on Policies and Research in Identity Management was the very first conference organized by this Working Group. We aim to organize conferences bi-annually. The IDMAN 2007 Conference has been centered around the theme of National Identity Management or, in other words, identity management in the public sector.
This book provides a critical assessment of progress towards the Information Society. Drawing upon unique empirical data, this book lays the foundation for more useful theories of the process of change, and more effective strategies and policies for increasing the benefits from the Information Society. The authors provide insights into the social, economic, and political forces that are structuring the pathway to the Information Society-and its consequences for business and individuals in their everyday lives.
'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.
The dual goal of the "Handbook in Information Systems" is to provide a reference for the diversity of research in the field by scholars from many disciplines, as well as to stimulate new research. This volume, focusing on Information Assurance, Security and Privacy Services, consists of six sections. In the first part contributors discuss Program Security, Data Security and Authentication, while the second section covers Internet Scourges and Web Security. Parts two and three concentrate on Usable Security and Human-Centric Aspects, along with Security, Privacy and Access Control whereas the final sections of the book examine Economic Aspects of Security, and Threat Modeling, Intrusion and Response.
In this book, the capability map, a novel general representation of the kinematic capabilities of a robot arm, is introduced. The capability map allows to determine how well regions of the workspace are reachable for the end effector in different orientations. It is a representation that can be machine processed as well as intuitively visualized for the human. The capability map and the derived algorithms are a valuable source of information for high- and low-level planning processes. The versatile applicability of the capability map is shown by examples from several distinct application domains. In human-robot interaction, a bi-manual interface for tele-operation is objectively evaluated. In low-level geometric planning, more human-like motion is planned for a humanoid robot while also reducing the computation time. And in high-level task reasoning, the suitability of a robot for a task is evaluated.
This book provides a detailed discussion of the theoretical and practical implications of the change driven by ICTs. Such a change is often much more profound than an emphasis on information technology and society can capture, for not only does it bring about ethical and policy vacuums that call for a new understanding of ethics, politics and law, but it also "re-ontologizes reality", as propounded by Luciano Floridi's philosophy and ethics of information. The informational turn is transforming our understanding of reality by challenging the conventional ways we have of thinking about our world and our identities in terms of stable and enduring structures and beliefs. The information age we inhabit brings to completion our self-understanding as informational systems that produce, process, and exchange information with other informational systems, in an environment that is itself made up of information. The present volume provides us with a better understanding of the normative nature and role of information, helping us to grasp the sense and extent to which informational resources serve as "constraining affordances" guiding our behaviours. It does so by delineating the background against which we build our beliefs about reality, make decisions, and behave, through our interactions with a multi-agent system that is increasingly dependent on ICTs. The book will be of interest to a vast audience, ranging from information technologists, ethicists, policy makers, social and legal scholars, and all those willing to embrace the following three tenets: we construct our world and ourselves informationally; by constructing our world and ourselves we thereby become aware of our limits; it is precisely these limits that make us become human beings.
This volume focuses on the responsibilities of online service providers (OSPs) in contemporary societies. It examines the complexity and global dimensions of the rapidly evolving and serious challenges posed by the exponential development of Internet services and resources. It looks at the major actors - such as Facebook, Google, Twitter, and Yahoo! - and their significant influence on the informational environment and users' interactions within it, as well as the responsibilities and liabilities such influence entails. It discusses the position of OSPs as information gatekeepers and how they have gone from offering connecting and information-sharing services to paying members to providing open, free infrastructure and applications that facilitate digital expression and the communication of information. The book seeks consensus on the principles that should shape OSPs' responsibilities and practices, taking into account business ethics and policies. Finally, it discusses the rights of users and international regulations that are in place or currently lacking.
Quality is not a fixed or universal property of software; it depends on the context and goals of its stakeholders. Hence, when you want to develop a high-quality software system, the first step must be a clear and precise specification of quality. Yet even if you get it right and complete, you can be sure that it will become invalid over time. So the only solution is continuous quality control: the steady and explicit evaluation of a product's properties with respect to its updated quality goals. This book guides you in setting up and running continuous quality control in your environment. Starting with a general introduction on the notion of quality, it elaborates what the differences between process and product quality are and provides definitions for quality-related terms often used without the required level of precision. On this basis, the work then discusses quality models as the foundation of quality control, explaining how to plan desired product qualities and how to ensure they are delivered throughout the entire lifecycle. Next it presents the main concepts and techniques of continuous quality control, discussing the quality control loop and its main techniques such as reviews or testing. In addition to sample scenarios in all chapters, the book is rounded out by a dedicated chapter highlighting several applications of different subsets of the presented quality control techniques in an industrial setting. The book is primarily intended for practitioners working in software engineering or quality assurance, who will benefit by learning how to improve their current processes, how to plan for quality, and how to apply state-of-the-art quality control techniques. Students and lecturers in computer science and specializing in software engineering will also profit from this book, which they can use in practice-oriented courses on software quality, software maintenance and quality assurance. |
You may like...
Coding Theory and Applications - 4th…
Raquel Pinto, Paula Rocha Malonek, …
Hardcover
R2,731
Discovery Miles 27 310
Mycorrhiza - Function, Diversity, State…
Ajit Varma, Ramprasad, …
Hardcover
R6,425
Discovery Miles 64 250
Evaluating Voting Systems with…
Mostapha Diss, Vincent Merlin
Hardcover
R4,302
Discovery Miles 43 020
|