Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing
This research monograph explores the rapidly expanding field of networked music making and the ways in which musicians of different cultures improvise together online. It draws on extensive research to uncover the creative and cognitive approaches that geographically dispersed musicians develop to interact in displaced tele-improvisatory collaboration. It presents a multimodal analysis of three tele-improvisatory performances that examine how cross-cultural musician's express and perceive intentionality in these interactions, as well as their experiences of distributed agency and tele-presence. Tele-Improvisation: Intercultural Interaction in the Online Global Music Jam Session will provide essential reading for musician's, postgraduate students, researchers and educators, working in the areas of telematic performance, musicology, music cognition, intercultural communication, distance collaboration and learning, digital humanities, Computer Supported Cooperative Work and HCI.
This volume is a collection of research studies on the modeling of emotions in complex autonomous systems. Several experts in the field are reporting their efforts and reviewing the literature in order to shed lights on how the processes of coding and decoding emotional states took place in humans, which are the physiological, physical, and psychological variables involved, invent new mathematical models and algorithms to describe them, and motivate these investigations in the light of observable societal changes and needs, such as the aging population and the cost of health care services. The consequences are the implementation of emotionally and socially believable machines, acting as helpers into domestic spheres, where emotions drive behaviors and actions. The contents of the book are highly multidisciplinary since the modeling of emotions in robotic socially believable systems requires a holistic perspective on topics coming from different research domains such as computer science, engineering, sociology, psychology, linguistic, and information communication. The book is of interest both to experts and students since last research works on a so complex multidisciplinary topic are described in a neat and didactical scientific language.
This volume explains how advances in computer technology will augment communication in person-to-person, organizational, and educational settings. It describes the convergence of virtual reality and group decision support, and how these will serve educational and organizational effectiveness. Contributors--experts from business and academia--examine what the computing/communications world will look like in the near future, what the specific needs of various industries will be, and how innovations will fit into organizations and society. These three topics are addressed with attention to the following questions: What will be the size of initial and future markets for advanced computer and communications technology? What will be the future computing environment in manufacturing operations, in the executive suite, in the office, in the field and on the road, at the point of service, for the computer-integrated enterprise, at home, in the school, and in the global marketplace?
th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.
This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.
This book contains the collection of papers presented at the conference of the International Federation for Information Processing Working Group 8.2 "Information and Organizations." The conference took place during June 21-24, 2009 at the Universidade do Minho in Guimaraes, Portugal. The conference entitled "CreativeSME - The Role of IS in Leveraging the Intelligence and Creativity of SME's" attracted high-quality submissions from across the world. Each paper was reviewed by at least two reviewers in a double-blind review process. In addition to the 19 papers presented at the conference, there were five panels and four workshops, which covered a range of issues relevant to SMEs, creativity and information systems. We would like to show our appreciation of the efforts of our two invited keynote speakers, Michael Dowling of the University of Regensburg, Germany and Carlos Zorrinho, Portuguese coordinator of the Lisbon Strategy and the Technological Plan. The following organizations supported the conference through financial or other contributions and we would like to thank them for their engagement: "
Artificial intelligence (AI) is often discussed as something extraordinary, a dream-or a nightmare-that awakens metaphysical questions on human life. Yet far from a distant technology of the future, the true power of AI lies in its subtle revolution of ordinary life. From voice assistants like Siri to natural language processors, AI technologies use cultural biases and modern psychology to fit specific characteristics of how users perceive and navigate the external world, thereby projecting the illusion of intelligence. Integrating media studies, science and technology studies, and social psychology, Deceitful Media examines the rise of artificial intelligence throughout history and exposes the very human fallacies behind this technology. Focusing specifically on communicative AIs, Natale argues that what we call "AI" is not a form of intelligence but rather a reflection of the human user. Using the term "banal deception," he reveals that deception forms the basis of all human-computer interactions rooted in AI technologies, as technologies like voice assistants utilize the dynamics of projection and stereotyping as a means for aligning with our existing habits and social conventions. By exploiting the human instinct to connect, AI reveals our collective vulnerabilities to deception, showing that what machines are primarily changing is not other technology but ourselves as humans. Deceitful Media illustrates how AI has continued a tradition of technologies that mobilize our liability to deception and shows that only by better understanding our vulnerabilities to deception can we become more sophisticated consumers of interactive media.
Good product designs merge materials, technology and hardware into a unified user experience; one where the technology recedes into the background and people benefit from the capabilities and experiences available. By focusing on functional gain, critical awareness and emotive connection, even the most multifaceted and complex technology can be made to feel straightforward and become an integral part of daily life. Researchers, designers and developers must understand how to progress or appropriate the right technical and human knowledge to inform their innovations. The 1st International Smart Design conference provides a timely forum and brings together researchers and practitioners to discuss issues, identify challenges and future directions, and share their R&D findings and experiences in the areas of design, materials and technology. This proceedings of the 1st Smart Design conference held at Nottingham Trent University in November 2011 includes summaries of the talks given on topics ranging from intelligent textiles design to pharmaceutical packaging to the impact of social and emotional factors on design choices with the aim of informing and inspiring future application and development of smart design.
This work addresses the challenge of providing effective cutaneous haptic feedback in robotic teleoperation, with the objective of achieving the highest degree of transparency whilst guaranteeing the stability of the considered systems. On the one hand, it evaluates teleoperation systems that provide only cutaneous cues to the operator, thus guaranteeing the highest degree of safety. This cutaneous-only approach shows intermediate performance between no force feedback and full haptic feedback provided by a grounded haptic interface, and it is best suitable for those scenarios where the safety of the system is paramount, e.g., robotic surgery. On the other hand, in order to achieve a higher level of performance, this work also investigates novel robotic teleoperation systems with force reflection able to provide mixed cutaneous and kinesthetic cues to the operator. Cutaneous cues can compensate for the temporary reduction of kinesthetic feedback necessary to satisfy certain stability conditions. This state-of-the-art volume is oriented toward researchers, educators, and students who are interested in force feedback techniques for robotic teleoperation, cutaneous device design, cutaneous rendering methods and perception studies, as well as readers from different disciplines who are interested in applying cutaneous haptic technologies and methods to their field of interest.
The book describes the main directions for the development of the digital society. The author angles its book to those who are interested to know what would replace search engines, and how social networks would evolve; what profit can be made of different forms of informational collaboration (crowdsourcing, collaborative filtering). And, the main thing, how it will influence the structure of the society and human pursuit for happiness. The author does not confine himself to a theory, he sets and solves practical questions: How talent, success and "stardom" are interconnected, how to make money in social networks, what is the business model for the development of entertainment and media, how to measure cultural values, and what is the subjective time of the individual and how to make it qualitative? There have been no answers to these questions before. Internet and social networks have provided tools and data that Alexander Dolgin was the first to use in economics.
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.
Due to the increased global political importance of the nonprofit sector, its technological support and organizational characteristics have become important fields of research. In order to conduct effective work, nonprofits need to communicate and coordinate effectively. However, such settings are generally characterized by a lack of resources, an absence of formal hierarchical structures and differences in languages and culture among the activists. Modern technologies could help nonprofit networks in improving their working. In order to design appropriate technological support for such settings, it is important to understand their work practices, which widely differ from traditional business organizations. This book aims to strengthen the body of knowledge by providing user studies and concepts related to user centered technology design process for nonprofit settings. The examination of ethnographic studies and user centered evaluation of IT artifacts in practice will further the understanding of design requirements of these systems. This book includes chapters from leading scholars and practitioners on the technology design process examining human centered factors. The chapters will focus on developed and developing countries as they both have unique issues in technology design. The book will be useful or of interest to academics from a range of fields including information systems, human computer interaction, computer supported cooperative work and organizational science as well as for government officials and governmental organizations.
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.
This volume presents a collection of carefully selected contributions in the area of social media analysis. Each chapter opens up a number of research directions that have the potential to be taken on further in this rapidly growing area of research. The chapters are diverse enough to serve a number of directions of research with Sentiment Analysis as the dominant topic in the book. The authors have provided a broad range of research achievements from multimodal sentiment identification to emotion detection in a Chinese microblogging website. The book will be useful to research students, academics and practitioners in the area of social media analysis.
The authors describe how the web is transforming from a one-way
information delivery channel to a socially rich communication
vehicle, resulting in the humanizing of the web and fulfilling the
web's original promise. They explain how the web continues to
change businesses, software design, the way we perceive people and
the skills required of us. The web's key challenges are defined as
six paradoxes and its role as an innovation ecosystem is
introduced, emphasizing the consideration of the social web as a
software platform, user experience, and business ecosystem. The
volume explores the challenges related to the search for
Zero-to-One innovations, breakthroughs, and the key strategies for
discovering these kinds of innovations for the social web (or
through the social web for non-web environments). It also envisions
the next generation of the web, including both transformations that
are already ongoing and visible as well as new expectations. An
important message for companies and organizations is to adopt a set
of core business values that will facilitate innovation processes
in this future humanized web. These business values are very
humane. Finally, the authors discuss key threats and opportunities
for this future.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
This book explores the usefulness of looking at very small aspects of human behavior in order to understand computer-human interaction difficulties with hypertext. The focus is on both mechanical actions and talk as social action. While this approach has been used fruitfully to study human-human interaction, Gray has constructed a unique study of human interaction with machines.
Based on more than 10 years of teaching experience, Blanken and his coeditors have assembled all the topics that should be covered in advanced undergraduate or graduate courses on multimedia retrieval and multimedia databases. The single chapters of this textbook explain the general architecture of multimedia information retrieval systems and cover various metadata languages such as Dublin Core, RDF, or MPEG. The authors emphasize high-level features and show how these are used in mathematical models to support the retrieval process. For each chapter, there 's detail on further reading, and additional exercises and teaching material is available online.
This volume presents a collection of research studies on sophisticated and functional computational instruments able to recognize, process, and store relevant situated interactional signals, as well as, interact with people, displaying reactions (under conditions of limited time) that show abilities of appropriately sensing and understanding environmental changes, producing suitable, autonomous, and adaptable responses to various social situations. These social robotic autonomous systems will improve the quality of life of their end-users while assisting them on several needs, ranging from educational settings, health care assistance, communicative disorders, and any disorder impairing either their physical, cognitive, or social functional activities. The multidisciplinary themes presented in the volume will be interesting for experts and students coming from different research fields and with different knowledge and backgrounds. The research reported is particularly relevant for academic centers, and Research & Development Institutions. |
You may like...
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay
Hardcover
R3,302
Discovery Miles 33 020
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R639
Discovery Miles 6 390
|