![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
This book presents a collection of research findings and proposals on computer science and computer engineering, introducing readers to essential concepts, theories, and applications. It also shares perspectives on how cutting-edge and established methodologies and techniques can be used to obtain new and interesting results. Each chapter focuses on a specific aspect of computer science or computer engineering, such as: software engineering, complex systems, computational intelligence, embedded systems, and systems engineering. As such, the book will bring students and professionals alike up to date on key advances in these areas.
This book diagnoses the social, mental and political consequences of working and economic organizations that generate value from communication. It calls for the role of communication technologies to be reimagined in order to create a healthier, fairer society.
This book explores the inputs with regard to individuals and companies who have developed technologies and innovative solutions, bioinformatics, datasets, apps for diagnosis, etc., that can be leveraged for strengthening the fight against coronavirus. It focuses on technology solutions to stop Covid-19 outbreak and mitigate the risk. The book contains innovative ideas from active researchers who are presently working to find solutions, and they give insights to other researchers to explore the innovative methods and predictive modeling techniques. The novel applications and techniques of established technologies like artificial intelligence (AI), Internet of things (IoT), big data, computer vision and machine learning are discussed to fight the spread of this disease, Covid-19. This pandemic has triggered an unprecedented demand for digital health technology solutions and unleashing information technology to win over this pandemic.
This state of the art monograph presents a unique introduction to thinking about cuteness and its incorporation into modern, especially computer-based, products and services. Cuteness is defined and explored in relation to user-centered design concepts and methods, in addition to considering the history of cuteness and cuteness in other cultures, especially in relation to eastern Asia. The authors provide detailed analyses and histories of cuteness in Japan and in China, the rise of Kawaii and Moe cultural artifacts, and their relation to social, psychological, and design issues. They also attempt an initial taxonomy of cuteness. Finally, detailed interviews with leading designers of cute products and services, such as Hello Kitty, provide an understanding of the philosophy and decision-making process of designers of cuteness. Cuteness Engineering: Designing Adorable Products and Services will be of interest and use to a wide range of professionals, researchers, academics, and students who are interested in exploring the world of cuteness in fresh new ways and gaining insights useful for their work and studies.
Computer simulation-based education and training is a multi-billion dollar industry. With the increased complexity of organizational decision making, projected demand for computer simulation-based decisional aids is on the rise. The objective of this book is to enhance systematically our understanding of and gain insights into the general process by which human facilitated ILEs are effectively designed and used in improving users' decision making in dynamic tasks. This book is divided into four major parts. Part I serves as an introduction to the subject of "decision making in dynamic tasks", its importance and its complexity. Part II provides background material, drawing upon the relevant literature, for the development of an integrated process model on the effectiveness of human facilitated ILEs in improving decision making in dynamic tasks. Part III focuses on the design, development and application of Fish Bank ILE, in laboratory experiments, to gather empirical evidence for the validity of the process model. Finally, part IV presents a comprehensive analysis of the gathered data to provide a powerful basis for understating important phenomena of training with human facilitated simulation-based learning environments, thereby, help to drive critical lessons to be learned. This book provides the reader with both a comprehensive understanding of the phenomena encountered in decision making with human facilitated ILEs and a unique way of studying the effects of these phenomena on people's ability to make better decision in complex, dynamic tasks. This book is intended to be of use to managers and practitioners, researchers and students of dynamic decision making. The background material of Part II provides a solid base to understand and organize the existing experimental research literature and approaches.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.
Enormous advances in information technology have permeated essentially all facets of life in the past two decades. Formidable challenges remain in fostering tools that enhance productivity but are sensitive to work practices. Cognitive Informatics (CI) is the multidisciplinary study of cognition, information and computational sciences that investigates all facets of human computing including design and computer-mediated intelligent action, thus is strongly grounded in methods and theories from cognitive science. As an applied discipline, it has a close affiliation with human factors and human-computer interaction, and provides a framework for the analysis and modeling of complex human performance in technology-mediated settings and contributes to the design and development of better information systems. In recent years, CI has emerged as a distinct area with special relevance to biomedicine and health care. In addition, it has become a foundation for education and training of health informaticians, the Office of the National Coordinator for Health Information Technology initiating a program including CI as one of its critical elements to support health IT curriculum development. This book represents a first textbook on cognitive informatics and will focus on key examples drawn from the application of methods and theories from CI to challenges pertaining to the practice of critical-care medicine (CCM). Technology is transforming critical care workflows and re-organizing patient care management processes. CCM has proven to be a fertile test bed for theories and methods of cognitive informatics. CI, in turn, has contributed much to our understanding of the factors that result in complexity and patient errors. The topic is strongly interdisciplinary and will be important for individuals from a range of academic and professional backgrounds, including critical care specialists, psychologists, computer scientists, medical informaticians, and anthropologists.
This book provides an introduction and overview of the rapidly evolving topic of game user experience, presenting the new perspectives employed by researchers and the industry, and highlighting the recent empirical findings that illustrate the nature of it. The first section deals with cognition and player psychology, the second section includes new research on modeling and measuring player experience, the third section focuses on the impact of game user experience on game design processes and game development cycles, the fourth section presents player experience case studies on contemporary computer games, and the final section demonstrates the evolution of game user experience in the new era of VR and AR. The book is suitable for students and professionals with different disciplinary backgrounds such as computer science, game design, software engineering, psychology, interactive media, and many others.
The Handbook on Socially Interactive Agents provides a comprehensive overview of the research fields of Embodied Conversational Agents, Intelligent Virtual Agents, and Social Robotics. Socially Interactive Agents (SIAs), whether virtually or physically embodied, are autonomous agents that are able to perceive an environment including people or other agents, reason, decide how to interact, and express attitudes such as emotions, engagement, or empathy. They are capable of interacting with people and one another in a socially intelligent manner using multimodal communicative behaviors, with the goal to support humans in various domains. Written by international experts in their respective fields, the book summarizes research in the many important research communities pertinent for SIAs, while discussing current challenges and future directions. The handbook provides easy access to modeling and studying SIAs for researchers and students, and aims at further bridging the gap between the research communities involved. In two volumes, the book clearly structures the vast body of research. The first volume starts by introducing what is involved in SIAs research, in particular research methodologies and ethical implications of developing SIAs. It further examines research on appearance and behavior, focusing on multimodality. Finally, social cognition for SIAs is investigated using different theoretical models and phenomena such as theory of mind or pro-sociality. The second volume starts with perspectives on interaction, examined from different angles such as interaction in social space, group interaction, or long-term interaction. It also includes an extensive overview summarizing research and systems of human-agent platforms and of some of the major application areas of SIAs such as education, aging support, autism, and games.
This book presents guidelines for a future device type: a tablet that allows ergonomic front- and back-of-device interaction. These guidelines help designers and developers of user interfaces to build ergonomic applications for tablet devices, in particular for devices that enable back-of-device interaction. In addition, manufacturers of tablet devices obtain arguments that back-of-device interaction is a promising extension of the interaction design space and results in increased input capabilities, enriched design possibilities, and proven usability. The guidelines are derived from empirical studies and developed to fit the users' skills to the way the novel device type is held. Three particular research areas that are relevant to develop design guidelines for tablet interaction are investigated: ergonomic gestures, interaction areas, and pointing techniques.
The 21st century has seen an expansion in digital technology and the ways in which it affects everyday life. These technologies have become essential in the growth of social communication and mass media. Fostering 21st Century Digital Literacy and Technical Competency offers the latest in research on the technological advances on computer proficiency in the educational system and society. This collection of research brings together theories and experiences in order to create a common framework and is essential for educators and professionals in the technology fields.
This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.
This is a unique book addressing the integration of risk methodology from various fields. It will stimulate intellectual debate and communication across disciplines, promote better risk management practices and contribute to the development of risk management methodologies. Individual chapters explain fundamental risk models and measurement, and address risk and security issues from diverse areas such as finance and insurance, the health sciences, life sciences, engineering and information science. Integrated Risk Sciences is an emerging discipline that considers risks in different fields, aiming at a common language, and at sharing and improving methods developed in different fields. Readers should have a Bachelor degree and have taken at least one basic university course in statistics and probability. The main goal of the book is to provide basic knowledge on risk and security in a common language; the authors have taken particular care to ensure that all content can readily be understood by doctoral students and researchers across disciplines. Each chapter provides simple case studies and examples, open research questions and discussion points, and a selected bibliography inviting readers to further study.
This book provides essential insights on the adoption of modern software engineering practices at large companies producing software-intensive systems, where hundreds or even thousands of engineers collaborate to deliver on new systems and new versions of already deployed ones. It is based on the findings collected and lessons learned at the Software Center (SC), a unique collaboration between research and industry, with Chalmers University of Technology, Gothenburg University and Malmoe University as academic partners and Ericsson, AB Volvo, Volvo Car Corporation, Saab Electronic Defense Systems, Grundfos, Axis Communications, Jeppesen (Boeing) and Sony Mobile as industrial partners. The 17 chapters present the "Stairway to Heaven" model, which represents the typical evolution path companies move through as they develop and mature their software engineering capabilities. The chapters describe theoretical frameworks, conceptual models and, most importantly, the industrial experiences gained by the partner companies in applying novel software engineering techniques. The book's structure consists of six parts. Part I describes the model in detail and presents an overview of lessons learned in the collaboration between industry and academia. Part II deals with the first step of the Stairway to Heaven, in which R&D adopts agile work practices. Part III of the book combines the next two phases, i.e., continuous integration (CI) and continuous delivery (CD), as they are closely intertwined. Part IV is concerned with the highest level, referred to as "R&D as an innovation system," while Part V addresses a topic that is separate from the Stairway to Heaven and yet critically important in large organizations: organizational performance metrics that capture data, and visualizations of the status of software assets, defects and teams. Lastly, Part VI presents the perspectives of two of the SC partner companies. The book is intended for practitioners and professionals in the software-intensive systems industry, providing concrete models, frameworks and case studies that show the specific challenges that the partner companies encountered, their approaches to overcoming them, and the results. Researchers will gain valuable insights on the problems faced by large software companies, and on how to effectively tackle them in the context of successful cooperation projects.
Collaboration in highly distributed organizations of people, robots, and autonomous systems is and must be revolutionized by engineering augmentation. The aim is to augment humans' abilities at work and, through this augmentation, improve organizations' abilities to accomplish their missions. This book establishes the theoretical foundations and design principles of collaborative e-Work, e-Business and e-Service, their models and applications, design and implementation techniques. The fundamental premise is that without effective e-Work and e-Services, the potential of emerging activities, such as e-Commerce, virtual manufacturing, tele-robotic medicine, automated construction, smart energy grid, cyber-supported agriculture, and intelligent transportation cannot be fully materialized. Typically, workers and managers of such value networks are frustrated with complex information systems, originally designed and built to simplify and improve performance. Even if the human-computer interface for such systems is well designed, the information and task overloads can be overwhelming. Effective delivery of expected outcomes may not occur. Challenges and emerging solutions in the context of the recently developed CCT, Collaborative Control Theory, are described, with emphasis on issues of computer-supported and communication-enabled integration, coordination and augmented collaboration. Research results and analyses of engineering design methods and complex systems management techniques are explained and illustrated.
This new reference investigates the notion that ICTs have the potential to improve the lives of people and contribute to social development in a developing countries.
This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.
Search is not just a box and ten blue links. Search is a
journey: an exploration where what we encounter along the way
changes what we seek. But in order to guide people along this
journey, designers must understand both the art and science of
search.In "Designing the Search Experience, "authors Tony
Russell-Rose and Tyler Tate weave together the theories of
information seeking with the practice of user interface
design. Understand how people search, and how the concepts of information seeking, information foraging, and sensemaking underpin the search process. Apply the principles of user-centered design to the search box, search results, faceted navigation, mobile interfaces, social search, and much more. Design the cross-channel search experiences of tomorrow that span desktop, tablet, mobile, and other devices.
Human Computer Interaction (HCI) is easy to define yet difficult to predict. Encompassing the management, study, planning, and design of the ways in which users interact with computers, this field has evolved from using punch cards to force touch in a matter of decades. What was once considered science fiction is now ubiquitous. The future of HCI is mercurial, yet predictions point to the effortless use of high-functioning services. The Handbook of Research on Human-Computer Interfaces, Developments, and Applications is primarily concerned with emerging research regarding gesture interaction, augmented reality, and assistive technologies and their place within HCI. From gaming to rehabilitation systems, these new technologies share the need to interface with humans, and as computers become thoroughly integrated into everyday life, so does the necessity of HCI research. This handbook of research benefits the research needs of programmers, developers, students and educators in computer science, and researchers.
Information is considered both an essential element of organizational design and an asset to be processed and managed. Further research on and application of topics relating to the architecture, management, and use of information is imperative to organizational success. The Handbook of Research on Information Architecture and Management in Modern Organizations focuses on information as an essential element of organizational design and emphasizes the strategic role of knowledge transfer and management in organizations across industries. Taking a cross-disciplinary approach to information architecture and management, this publication draws on research essential to diverse organizations and is designed for use by business professionals, researchers, academicians, and upper-level students. This comprehensive reference work features key research and concepts on topics related to information functionality, information modeling, information overload, information retrieval, innovation management, organizational architecture, informed governance, and relevant applications across industries.
A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 4e is ideal for courses in Computer Ethics and Computers and Society. Sara Baase explores the social, legal, philosophical, ethical, political, constitutional, and economic implications of computing and the controversies they raise. With a computer scientist's perspective, and with historical context for many issues, she covers the issues students will face both as members of a technological society and as professionals in computer-related fields. A primary goal is to develop computer professionals who understand the implications of what they create and how it fits into society at large.
This book explores the factors that make digital disruption possible and the effects this has on existing business models. It takes a look at the industries that are most susceptible to disruption and highlights what executives can do to take advantage of disruption to re-invent their business model. It also examines the pivotal role that technology plays in creating new dynamics to business operations and forcing business model changes. Adoption of digital technology has caused process disruptions in a number of industries and led to new business models (e.g., UEber, AirBnb) and new products. In addition to covering some of the more popular and well known examples, this book targets not so obvious disruptions in the education sector and in services and changing business models. Phantom Ex Machina: Digital Disruption's Role in Business Model Transformation is divided into six parts. The book begins with an introduction to digital disruption and why it matters. The next part of the book focuses on business strategy which includes case studies on the impact of social media and how digital disruption changes pricing strategies and price models. For part three, the authors observe technology's role in digital disruptions. Chapters cover how 3D printing is challenging existing business models and how the automotive industry is innovating with new perspectives. Part four covers higher education, recognizing digital disruption's transformation in graduate management education. Part five centers upon the service industry with a look at virtual teams and the emergence of virtual think tanks. Finally the book concludes with a look to the future, embracing disruptions.
This book combines the three dimensions of technology, society and economy to explore the advent of today's cloud ecosystems as successors to older service ecosystems based on networks. Further, it describes the shifting of services to the cloud as a long-term trend that is still progressing rapidly.The book adopts a comprehensive perspective on the key success factors for the technology - compelling business models and ecosystems including private, public and national organizations. The authors explore the evolution of service ecosystems, describe the similarities and differences, and analyze the way they have created and changed industries. Lastly, based on the current status of cloud computing and related technologies like virtualization, the internet of things, fog computing, big data and analytics, cognitive computing and blockchain, the authors provide a revealing outlook on the possibilities of future technologies, the future of the internet, and the potential impacts on business and society. |
![]() ![]() You may like...
Kinetics of Water-Rock Interaction
Susan Brantley, James Kubicki, …
Hardcover
R6,370
Discovery Miles 63 700
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier
Paperback
Bishop Herbert Vaughan and the Jesuits…
Martin John Broadley
Hardcover
R1,524
Discovery Miles 15 240
The Soweto Uprisings - Counter-Memories…
Sifiso Mxolisi Ndlovu
Paperback
![]()
|