![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
A 3D user interface (3DUI) is an interface in which the user performs tasks in three dimensions. For example, interactions using hand/body gestures, interaction using a motion controller (e.g. Sony PlayStation Move), interaction with virtual reality devices using tracked motion controllers, etc. All these technologies which let a user interact in three dimensions are called 3D user interface technologies. These 3D user interfaces have the potential to make games more immersive & engaging and thus potentially provide a better user experience to gamers. Although 3D user interface technologies are available for games, it is unclear how their usage affects game play and if there are any user performance benefits. This book presents state of the art research on exploring 3D user interface technologies for improving video games. It also presents a review of research work done in this area and describes experiments focused on usage of stereoscopic 3D, head tracking, and hand gesture-based control in gaming scenarios. These experiments are systematic studies in gaming environments and are aimed at understanding the effect of the underlined 3D interface technology on the gaming experience of a user. Based on these experiments, several design guidelines are presented which can aid game designers in designing better immersive games.
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
This book discusses the latest developments in the field of open data. The opening of data by public organizations has the potential to improve the public sector, inspire business innovation, and establish transparency. With this potential comes unique challenges; these developments impact the operation of governments as well as their relationship with private sector enterprises and society. Changes at the technical, organizational, managerial, and political level are taking place, which, in turn, impact policy-making and traditional institutional structures. This book contributes to the systematic analysis and publication of cutting-edge methods, tools, and approaches for more efficient data sharing policies, practices, and further research. Topics discussed include an introduction to open data, the open data landscape, the open data life cycle, open data policies, organizational issues, interoperability, infrastructure, business models, open data portal evaluation, and research directions, best practices, and guidelines. Written to address different perspectives, this book will be of equal interest to students and researchers, ICT industry staff, practitioners, policy makers and public servants.
Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently despised. Is their vilification justified? This is the first book to use previously validated psychological inventories to explore and profile the personalities and behavioral traits of more than 200 self-admitted hackers. Many of the profiled are at the top of their game, revered by both the good hackers (white hats) and their more malevolent peers (black hats). While there are serious reasons to fear the darker elements of the hacker community, there is also much to admire in their nobler counterparts. Fascinating case studies on hackers who have been caught and convicted of their crimes, as well as those betrayed by their peers, offer a unique, credible understanding of what makes hackers tick. The authors examine current laws meant to control hacking and its collateral crimes--stalking and terrorism--along with other means of reining in the irresponsible scriptkiddies and vicious black hats. Moderated and balanced, this book is an easy-to-read, authoritative source information for anyone interested in who hackers are, and how much we should worry about them.
This book examines the possibilities of incorporating elements of user-centred design (UCD) such as user experience (UX) and usability with agile software development. It explores the difficulties and problems inherent in integrating these two practices despite their relative similarities, such as their emphasis on stakeholder collaboration. Developed from a workshop held at NordiCHI in 2014, this edited volume brings together researchers from across the software development, UCD and creative design fields to discuss the current state-of-the-art. Practical case studies of integrating UCD in Agile development across diverse contexts are presented, whilst the different futures for UCD and other design practices in the context of agile software development are identified and explored. Integrating User Centred Design in Agile Development will be ideal for researchers, designers and academics who are interested in software development, user-centred design, agile methodologies and related areas.
This book constitutes the refereed proceedings of the 4th IFIP WG 8.1 Working Conference on Method Engineering, ME 2011, held in Paris, France, in April 2011. The 13 revised full papers and 6 short papers presented together with the abstracts of two keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on situated method engineering, method engineering foundations, customized methods, tools for method engineering, new trends to build methods, and method engineering services.
The book reports on the author's original work to address the use of today's state-of-the-art smartphones for human physical activity recognition. By exploiting the sensing, computing and communication capabilities currently available in these devices, the author developed a novel smartphone-based activity-recognition system, which takes into consideration all aspects of online human activity recognition, from experimental data collection, to machine learning algorithms and hardware implementation. The book also discusses and describes solutions to some of the challenges that arose during the development of this approach, such as real-time operation, high accuracy, low battery consumption and unobtrusiveness. It clearly shows that it is possible to perform real-time recognition of activities with high accuracy using current smartphone technologies. As well as a detailed description of the methods, this book also provides readers with a comprehensive review of the fundamental concepts in human activity recognition. It also gives an accurate analysis of the most influential works in the field and discusses them in detail. This thesis was supervised by both the Universitat Politecnica de Catalunya (primary institution) and University of Genoa (secondary institution) as part of the Erasmus Mundus Joint Doctorate in Interactive and Cognitive Environments.
This book features selected papers presented at the International Conference on Information Management and Machine Intelligence (ICIMMI 2019), held at the Poornima Institute of Engineering & Technology, Jaipur, Rajasthan, India, on December 14-15, 2019. It covers a range of topics, including data analytics; AI; machine and deep learning; information management, security, processing techniques and interpretation; applications of artificial intelligence in soft computing and pattern recognition; cloud-based applications for machine learning; application of IoT in power distribution systems; as well as wireless sensor networks and adaptive wireless communication.
The advent of the Information Society is marked by the explosive penetration of information technologies in all aspects of life and by a related fundamental transofmation in every form of the organization. Researchers, business people and policy makers have recognized the importance of addressing technological, economic and social impacts in conjunction. For example, the rise and fall of the dot-com hype depended a lot on the strenght of the business model, on the technological capabilities avalable to firms and on the readiness of the socity and economy at large sustain a new breed of business activity. However, it is notoriously difficult to examine the cross-impacts of social, economic and technological aspects of the Information Socity. This kind of work requires multidisciplinary work and collaboration on a wide range of skills. Social and Economic Transformation in the Digital Era addresses this challenge by assembling the latest thinking of leading researchers and policy makers. The book covers all key subject areas of the Information Society an presents innovative business models, case studies, normative theories and social explanations.
Cyberspace is everywhere in today s world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice. In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches. Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations."
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.
This book provides a broad survey of advanced pattern recognition techniques for human behavior analysis. Clearly structured, the book begins with concise coverage of the major concepts, before introducing the most frequently used techniques and algorithms in detail, and then discussing examples of real applications. Features: contains contributions from an international selection of experts in the field; presents a thorough introduction to the fundamental topics of human behavior analysis; investigates methods for activity recognition, including gait and posture analysis, hand gesture analysis, and semantics of human behavior in image sequences; provides an accessible psychological treatise on social signals for the analysis of social behaviors; discusses voice and speech analysis, combined audiovisual cues, and social interactions and group dynamics; examines applications in different research fields; each chapter concludes with review questions, a summary of the topics covered, and a glossary.
This open access book constitutes the refereed post-conference proceedings of the 9th IFIP WG 5.5 International Precision Assembly Seminar, IPAS 2020, held virtually in December 2020.The 16 revised full papers and 10 revised short papers presented together with 1 keynote paper were carefully reviewed and selected from numerous submissions. The papers address topics such as assembly design and planning; assembly operations; assembly cells and systems; human centred assembly; and assistance methods in assembly.
This book provides a comprehensive introduction to the conversational interface, which is becoming the main mode of interaction with virtual personal assistants, smart devices, various types of wearable, and social robots. The book consists of four parts. Part I presents the background to conversational interfaces, examining past and present work on spoken language interaction with computers. Part II covers the various technologies that are required to build a conversational interface along with practical chapters and exercises using open source tools. Part III looks at interactions with smart devices, wearables, and robots, and discusses the role of emotion and personality in the conversational interface. Part IV examines methods for evaluating conversational interfaces and discusses future directions.
In the context of the continuous advance of information technologies and biomedicine, and of the creation of economic blocs, this work analyzes the role that data protection plays in the integration of markets. It puts special emphasis on financial and insurance services. Further, it identifies the differences in the data protection systems of EU member states and examines the development of common standards and principles of data protection that could help build a data protection model for Mercosur. Divided into four parts, the book starts out with a discussion of the evolution of the right to privacy, focusing on the last few decades, and taking into account the development of new technologies. The second part discusses the interaction between data protection and specific industries that serve as case studies: insurance, banking and credit reporting. The focus of this part is on generalization and discrimination, adverse selection and the processing of sensitive and genetic data. The third part of the book presents an analysis of the legislation of three EU Member States (France, Italy and UK). Specific elements of analysis that are compared are the concepts of personal and anonymous data, data protection principles, the role of the data protection authorities, the role of the data protection officer, data subjects' rights, the processing of sensitive data, the processing of genetic data and the experience of the case studies in processing data. The book concludes with the proposal of a model for data protection that could be adopted by Mercosur, taking into account the different levels of data protection that exist in its member states."
This book presents the proceedings of the Seventh International Conference on Management Science and Engineering Management (ICMSEM2013) held from November 7 to 9, 2013 at Drexel University, Philadelphia, Pennsylvania, USA and organized by the International Society of Management Science and Engineering Management, Sichuan University (Chengdu, China) and Drexel University (Philadelphia, Pennsylvania, USA). The goals of the Conference are to foster international research collaborations in Management Science and Engineering Management as well as to provide a forum to present current research findings. The selected papers cover various areas in management science and engineering management, such as Decision Support Systems, Multi-Objective Decisions, Uncertain Decisions, Computational Mathematics, Information Systems, Logistics and Supply Chain Management, Relationship Management, Scheduling and Control, Data Warehousing and Data Mining, Electronic Commerce, Neural Networks, Stochastic Models and Simulation, Fuzzy Programming, Heuristics Algorithms, Risk Control, Organizational Behavior, Green Supply Chains, and Carbon Credits. The proceedings introduce readers to novel ideas on and different problem-solving methods in Management Science and Engineering Management. We selected excellent papers from all over the world, integrating their expertise and ideas in order to improve research on Management Science and Engineering Management.
How are the new electronic technologies transforming business here and abroad -- indeed, the entire world economy -- and what new strategies must business develop to meet the challenges of this transformation? Economist, writer, and communications executive Maurice Estabrooks provides a readable, comprehensive survey of how businesses are using microchips, computers, and telecommunications to reshape the entire world of work -- its cultures, organization, and economic systems. With insight and impeccable scholarship he provides concrete evidence of the emergence of artificially intelligent, cybernetic, network-based entities that are creating new linkages between businesses, markets, and technology itself -- linkages that will profoundly affect the way businesses create and implement their corporate survival and growth strategies in the future. Drawing on the work of economic theorist Joseph Schumpeter, Estabrooks shows how Schumpeterian dynamics have played a key role in the breakup of AT&T and the Bell System, and in the deregulation of telecommunications, broadcasting, banking, finance, and other economically critical industries. What has emerged, he maintains, is an increasingly integrated, global information- and software-based services economy. Optical fibers, satellites, and wireless communications systems have already made possible the development of electronic superhighways, but in doing so they have also initiated a massive redistribution of economic power and wealth throughout the world, the implications of which are only now being understood. Historical, analytical, descriptive, Estabrooks' book will speak not only to academics and others who observe world transformations from relatively theoretical perspectives, but also to corporate and other executives whose organizations, and certainly their personal work lives, will be changed dramatically by the developments he describes in practical day-to-day situations.
In a globalized world, one of the most prominent developments in technology has been the advancement of non-human entities. The applications of these entities in media as well as other fields of science have been looked upon as irrelevant for understanding human agency. Analytical Frameworks, Applications, and Impacts of ICT and Actor-Network Theory provides innovative insights into human and non-human roles (e.g., physical objects, technology, animals, or even beliefs, scientific facts, or discourses) and their influence on this theory and to each other. The content within this publication represents the work of consumer culture, technology, and the arts. It is designed for researchers, students, and professionals as it covers topics centered on a multidisciplinary reading of actor-network theory for a variety of fields.
This work deals with the applications of Semantic Publishing technologies in the legal domain, i.e., the use of Semantic Web technologies to address issues related to the Legal Scholarly Publishing. Research in the field of Law has a long tradition in the application of semantic technologies, such as Semantic Web and Linked Data, to real-world scenarios. This book investigates and proposes solutions for three main issues that Semantic Publishing needs to address within the context of the Legal Scholarly Publishing: the need of tools for linking document text to a formal representation of its meaning; the lack of complete metadata schemas for describing documents according to the publishing vocabulary and the absence of effective tools and user interfaces for easily acting on semantic publishing models and theories. In particular, this work introduces EARMARK, a markup meta language that allows one to create markup documents without the structural and semantic limits imposed by markup languages such as XML. EARMARK is a platform to link the content layer of a document with its intended formal semantics and it can be used with the Semantic Publishing and Referencing (SPAR) Ontologies, another topic in this book. SPAR Ontologies are a collection of formal models providing an upper semantic layer for describing the publishing domain. Using EARMARK as a foundation for SPAR descriptions opens up to a semantic characterisation of all the aspects of a document and of its parts. Finally, four user-friendly tools are introduced: LODE, KC-Viz, Graffoo and Gaffe. They were expressly developed to facilitate the interaction of publishers and domain experts with Semantic Publishing technologies by shielding such users from the underlying formalisms and semantic models of such technologies.
Agent-centric theories, approaches and technologies are contributing to enrich interactions between users and computers. This book aims at highlighting the influence of the agency perspective in Human-Computer Interaction through a careful selection of research contributions. Split into five sections; Users as Agents, Agents and Accessibility, Agents and Interactions, Agent-centric Paradigms and Approaches, and Collective Agents, the book covers a wealth of novel, original and fully updated material, offering: To provide a coherent, in depth, and timely material on the agency perspective in HCI To offer an authoritative treatment of the subject matter presented by carefully selected authors To offer a balanced and broad coverage of the subject area, including, human, organizational, social, as well as technological concerns. u To offer a hands-on-experience by covering representative case studies and offering essential design guidelines The book will appeal to a broad audience of researchers and professionals associated to software engineering, interface design, accessibility, as well as agent-based interaction paradigms and technology. "
This book proposes a data-driven methodology using multi-way data analysis for the design of video-quality metrics. It also enables video- quality metrics to be created using arbitrary features. This data- driven design approach not only requires no detailed knowledge of the human visual system, but also allows a proper consideration of the temporal nature of video using a three-way prediction model, corresponding to the three-way structure of video. Using two simple example metrics, the author demonstrates not only that this purely data- driven approach outperforms state-of-the-art video-quality metrics, which are often optimized for specific properties of the human visual system, but also that multi-way data analysis methods outperform the combination of two-way data analysis methods and temporal pooling. |
![]() ![]() You may like...
Advanced Introduction to Megaprojects
Nathalie Drouin, Rodney Turner
Paperback
R806
Discovery Miles 8 060
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald
Hardcover
R5,763
Discovery Miles 57 630
Advances in the Convergence of…
Tiago M. Fernandez-Carames, Paula Fraga-Lamas
Hardcover
R2,767
Discovery Miles 27 670
Design of FPGA-Based Computing Systems…
Hasitha Muthumala Waidyasooriya, Masanori Hariyama, …
Hardcover
R3,769
Discovery Miles 37 690
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,539
Discovery Miles 15 390
Unlocking the Power of Networks - Keys…
Donald F Kettl, Stephen Goldsmitth
Paperback
R914
Discovery Miles 9 140
Complex Networks XII - Proceedings of…
Andreia Sofia Teixeira, Diogo Pacheco, …
Hardcover
R4,581
Discovery Miles 45 810
Advice and Consent - The Politics of…
Lee Epstein, Jeffrey Allan Segal
Hardcover
R1,967
Discovery Miles 19 670
Scheduling Problems - New Applications…
Rodrigo Da Rosa Righi
Hardcover
R3,325
Discovery Miles 33 250
|