![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing
This book applies a new analytical framework to the study of the evolution of large Internet companies such as Apple, Google, Microsoft, Facebook, Amazon and Samsung. It sheds light on the dynamics of business groups, which are approached as 'business ecosystems,' and introduces the concept of Epigenetic Economic Dynamics (EED), which is defined as the study of the epigenetic dynamics generated as a result of the adaptation of organizations to major changes in their respective environments. The book augments the existing literature on evolutionary economic thinking with findings from epigenetics, which are proving increasingly useful in analyzing the workings of large organizations. It also details the theoretical and conceptual nature of recent work based on evolutionary economics, mainly from the perspective of generalized Darwinism, resilience and related variety, and complements the work conducted on evolutionary economics by applying the analytical framework of EED. It makes it easier to forecast future dynamics on the Internet by proving that a sizable number of big business groups are veering from their initial paths to take unprecedented new directions as a result of competition pressure, and as such is a valuable resource for postgraduates and researchers as well as those involved in economics and innovation studies.
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection V describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, and Infrastructure Modeling and Simulation. This book is the 5th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of 14 edited papers from the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2011. Critical Infrastructure Protection V is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jonathan Butts is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
This is a review of the current and future consequences of the information revolution. It draws on an international authorship, as well as members of the Georgia Faculty Program on the Information Revolution. Porter and Read look at the implications of the revolution in five areas of human activity: business and financial capital; the workplace and human capital; academia and publishing; politics, internationalism and citizenship; and the "information society", public and private. In a final section, predictions are offered as to how the information technology revolution will evolve in the future and how human society might continue to ride the IT wave and adapt in its wake.
Achieving enterprise success necessitates addressing enterprises in ways that match the complexity and dynamics of the modern enterprise environment. However, since the majority of enterprise strategic initiatives appear to fail - among which those regarding information technology - the currently often practiced approaches to strategy development and implementation seem more an obstacle than an enabler for strategic enterprise success. Two themes underpin the fundamentally different views outlined in this book. First, the competence-based perspective on governance, whereby employees are viewed as the crucial core for effectively addressing the complex, dynamic and uncertain enterprise reality, as well as for successfully defining and operationalizing strategic choices. Second, enterprise engineering as the formal conceptual framework and methodology for arranging a unified and integrated enterprise design, which is a necessary condition for enterprise success. Jan Hoogervorst's presentation, which is based on both research and his professional background at Sogeti B.V., aims at professionals in management and consulting as well as students in management science and business information systems.
This book discusses recent developments and contemporary research in mathematics, statistics and their applications in computing. All contributing authors are eminent academicians, scientists, researchers and scholars in their respective fields, hailing from around the world. The conference has emerged as a powerful forum, offering researchers a venue to discuss, interact and collaborate and stimulating the advancement of mathematics and its applications in computer science. The book will allow aspiring researchers to update their knowledge of cryptography, algebra, frame theory, optimizations, stochastic processes, compressive sensing, functional analysis, complex variables, etc. Educating future consumers, users, producers, developers and researchers in mathematics and computing is a challenging task and essential to the development of modern society. Hence, mathematics and its applications in computer science are of vital importance to a broad range of communities, including mathematicians and computing professionals across different educational levels and disciplines.
This is the first book to describe how Autonomous Virtual Humans and Social Robots can interact with real people, be aware of the environment around them, and react to various situations. Researchers from around the world present the main techniques for tracking and analysing humans and their behaviour and contemplate the potential for these virtual humans and robots to replace or stand in for their human counterparts, tackling areas such as awareness and reactions to real world stimuli and using the same modalities as humans do: verbal and body gestures, facial expressions and gaze to aid seamless human-computer interaction (HCI). The research presented in this volume is split into three sections: *User Understanding through Multisensory Perception: deals with the analysis and recognition of a given situation or stimuli, addressing issues of facial recognition, body gestures and sound localization. *Facial and Body Modelling Animation: presents the methods used in modelling and animating faces and bodies to generate realistic motion. *Modelling Human Behaviours: presents the behavioural aspects of virtual humans and social robots when interacting and reacting to real humans and each other. Context Aware Human-Robot and Human-Agent Interaction would be of great use to students, academics and industry specialists in areas like Robotics, HCI, and Computer Graphics.
This book develops a crowdsourced sensor-cloud service composition framework taking into account spatio-temporal aspects. This book also unfolds new horizons to service-oriented computing towards the direction of crowdsourced sensor data based applications, in the broader context of Internet of Things (IoT). It is a massive challenge for the IoT research field how to effectively and efficiently capture, manage and deliver sensed data as user-desired services. The outcome of this research will contribute to solving this very important question, by designing a novel service framework and a set of unique service selection and composition frameworks. Delivering a novel service framework to manage crowdsourced sensor data provides high-level abstraction (i.e., sensor-cloud service) to model crowdsourced sensor data from functional and non-functional perspectives, seamlessly turning the raw data into "ready to go" services. A creative indexing model is developed to capture and manage the spatio-temporal dynamism of crowdsourced service providers. Delivering novel frameworks to compose crowdsourced sensor-cloud services is vital. These frameworks focuses on spatio-temporal composition of crowdsourced sensor-cloud services, which is a new territory for existing service oriented computing research. A creative failure-proof model is also designed to prevent composition failure caused by fluctuating QoS. Delivering an incentive model to drive the coverage of crowdsourced service providers is also vital. A new spatio-temporal incentive model targets changing coverage of the crowdsourced providers to achieve demanded coverage of crowdsourced sensor-cloud services within a region. The outcome of this research is expected to potentially create a sensor services crowdsourcing market and new commercial opportunities focusing on crowdsourced data based applications. The crowdsourced community based approach adds significant value to journey planning and map services thus creating a competitive edge for a technologically-minded companies incentivizing new start-ups, thus enabling higher market innovation. This book primarily targets researchers and practitioners, who conduct research work in service oriented computing, Internet of Things (IoT), smart city and spatio-temporal travel planning, as well as advanced-level students studying this field. Small and Medium Entrepreneurs, who invest in crowdsourced IoT services and journey planning infrastructures, will also want to purchase this book.
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.
Ever since its inception, the Web has changed the landscape of human experiences on how we interact with one another and data through service infrastructures via various computing devices. This interweaving environment is now becoming ever more embedded into devices and systems that integrate seamlessly on how we live, both in our working or leisure time. For this volume, King and Baeza-Yates selected some pioneering and cutting-edge research work that is pointing to the future of the Web. Based on the Workshop Track of the 17th International World Wide Web Conference (WWW2008) in Beijing, they selected the top contributions and asked the authors to resubmit their work with a minimum of one third of additional material from their original workshop manuscripts to be considered for this volume. After a second-round of reviews and selection, 16 contributions were finally accepted. The work within this volume represents the tip of an iceberg of the many exciting advancements on the WWW. It covers topics like semantic web services, location-based and mobile applications, personalized and context-dependent user interfaces, social networks, and folksonomies. The presentations aim at researchers in academia and industry by showcasing latest research findings. Overall they deliver an excellent picture of the current state-of-the-art, and will also serve as the basis for ongoing research discussions and point to new directions.
Applying multimodal textual analysis to the languages and images of
online communication forms, Kay Richardson shows, from an applied
linguistic perspective, how the Internet is being used for global,
interactive communication about public health risks. Detailed case
studies of the possible risks posed by SARS, by mobile phones and
by the vaccination of babies against childhood diseases are
situated within the context of research on computer-mediated
communication, as well as within the broader social context of
globalization and discourses of risk and trust.
Social computing concerns the study of social behavior and context based on computational systems. Behavioral modeling reproduces the social behavior, and allows for experimenting with and deep understanding of behavior, patterns, and potential outcomes. The pervasive use of computer and Internet technologies provides an unprecedented environment where people can share opinions and experiences, offer suggestions and advice, debate, and even conduct experiments. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, anticipation, and prediction. The proceedings from this interdisciplinary workshop provide a platform for researchers, practitioners, and graduate students from sociology, behavioral and computer science, psychology, cultural study, information systems, and operations research to share results and develop new concepts and methodologies aimed at advancing and deepening our understanding of social and behavioral computing to aid critical decision making.
This text helps the reader generate clear, effective documentation that is tailored to the information requirements of the end-user. Written for technical writers and their managers, quality assurance experts, and software engineers, the book describes a user-centered information design method (UCID) that should help ensure documentation conveys significant information for the user. The UCID shows how to: integrate the four major information components of a software system - user interface labels, messages, online and printed documentation; make sure these elements work together to improve usability; deploy iterative design and prototyping procedures that minimize flaws and save time and money; and guide technical writers effectively.
Collaborative Networks A Tool for Promoting Co-creation and Innovation The collaborative networks paradigm offers powerful socio-organizational mec- nisms, supported by advanced information and communication technologies for p- moting innovation. This, in turn, leads to new products and services, growth of better customer relationships, establishing better project and process management, and building higher-performing consortia. By putting diverse entities that bring different perspectives, competencies, practices, and cultures, to work together, collaborative networks develop the right environment for the emergence of new ideas and more efficient, yet practical, solutions. This aspect is particularly important for small and medium enterprises which typically lack critical mass and can greatly benefit from participation in co-innovation networks. However, larger organizations also benefit from the challenges and the diversity found in collaborative ecosystems. In terms of research, in addition to the trend identified in previous years toward a sounder consolidation of the theoretical foundation in this discipline, there is now a direction of developments more focused on modeling and reasoning about new c- laboration patterns and their contribution to value creation. "Soft issues," including social capital, cultural aspects, ethics and value systems, trust, emotions, behavior, etc. continue to deserve particular attention in terms of modeling and reasoning. Exploi- tion of new application domains such as health care, education, and active aging for retired professionals also help identify new research challenges, both in terms of m- eling and ICT support development.
This book gathers visionary ideas from leading academics and scientists to predict the future of wireless communication and enabling technologies in 2050 and beyond. The content combines a wealth of illustrations, tables, business models, and novel approaches to the evolution of wireless communication. The book also provides glimpses into the future of emerging technologies, end-to-end systems, and entrepreneurial and business models, broadening readers' understanding of potential future advances in the field and their influence on society at large
Usability has become increasingly important as an essential part of the design and development of software and systems for all sectors of society, business, industry, government and education, as well as a topic of research. Today, we can safely say that, in many parts of the world, information technology and communications is or is becoming a central force in revolutionising the way that we all live and how our societies function. IFIP's mission states clearly that it "encourages and assists in the development, exploitation and application of information technology for the benefit of all people." The question that must be considered now is how much attention has been given to the usability of the IT-based systems that we use in our work and daily lives. There is much evidence to indicate that the real interests and needs of people have not yet been embraced in a substantial way by IT decision makers and when developing and implementing the IT systems that shape our lives, both as private individuals and at work. But some headway has been made. Three years ago, the IFIP Technical Committee on Human Computer Interaction (IFIP TC13) gave the subject of usability its top priority for future work in advancing HCI within the international community. This Usability Stream of the IFIP World Computer Congress is a result of this initiative. It provides a showcase on usability involving some practical business solutions and experiences, and some research findings."
Designing Inclusive Interactions contains the proceedings of the fifth Cambridge Workshop on Universal Access and Assistive Technology (CWUAAT), incorporating the 8th Cambridge Workshop on Rehabilitation Robotics, held in Cambridge, England, in March 2010. It contains contributions from an international group of leading researchers in the fields of Universal Access and Assistive Technology. This conference will mainly focus on the following principal topics: 1. Designing assistive and rehabilitation technology for working and daily living environments 2. Measuring inclusion for the design of products for work and daily living 3. Inclusive interaction design and new technologies for inclusive design 4. Assembling new user data for inclusive design 5. The design of accessible and inclusive contexts: work and daily living environments 6. Business advantages and applications of inclusive design 7. Legislation, standards and government awareness of inclusive design
The book includes 61 selected papers from 106 presented at the
second International Conference on Machine Automation (ICMA2000).
The conference focused, for the first time, on human friendly
mechantronics which covers machine systems interacting with human
beings, psychological, physiological, and physical behaviors of the
human being itself, robotics, human-mimetic mechanical systems,
commercial application examples and so on. Machine automation has
owed a lot to mechatronics technology in the last decades, however,
a paradigm shift is desired and emphasized in the 21st century in
every aspect of our society, and mechantronics is not an exception.
The paradigm shift in mechatronics is a pursuit of productivity and
efficiency to the preference of humans, and it is time that a new
concept of a human friendly robot must be proposed that is welcome
by human users. The book aims to offer the most up-to-date and
valuable information on:
Electric Dreams turns to the past to trace the cultural history of computers. Ted Friedman charts the struggles to define the meanings of these powerful machines over more than a century, from the failure of Charles Babbage's "difference engine" in the nineteenth century to contemporary struggles over file swapping, open source software, and the future of online journalism. To reveal the hopes and fears inspired by computers, Electric Dreams examines a wide range of texts, including films, advertisements, novels, magazines, computer games, blogs, and even operating systems. Electric Dreams argues that the debates over computers are critically important because they are how Americans talk about the future. In a society that in so many ways has given up on imagining anything better than multinational capitalism, cyberculture offers room to dream of different kinds of tomorrow.
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
This book introduces the latest progress in six degrees of freedom (6-DoF) haptic rendering with the focus on a new approach for simulating force/torque feedback in performing tasks that require dexterous manipulation skills. One of the major challenges in 6-DoF haptic rendering is to resolve the conflict between high speed and high fidelity requirements, especially in simulating a tool interacting with both rigid and deformable objects in a narrow space and with fine features. The book presents a configuration-based optimization approach to tackle this challenge. Addressing a key issue in many VR-based simulation systems, the book will be of particular interest to researchers and professionals in the areas of surgical simulation, rehabilitation, virtual assembly, and inspection and maintenance. |
You may like...
Contract Theory in Continuous-Time…
Jaksa Cvitanic, Jianfeng Zhang
Hardcover
R4,012
Discovery Miles 40 120
The Oxford Handbook of Music and…
Sheila Whiteley, Shara Rambarran
Hardcover
R4,713
Discovery Miles 47 130
Advances in Difference Equations and…
Saber Elaydi, Yoshihiro Hamaya, …
Hardcover
R2,701
Discovery Miles 27 010
|