![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
th It is fitting that there was a World Computer Congress in the 50 anniversary year of IFIP. Within the Learn IT Stream of WCC2010, the conference, Key Competencies in the Knowledge Society (KCKS), brought together some 43 papers from around the world covering many areas of ICT and its role in education. Of the papers presented here, three were selected as key theme papers for the KCKS conference. These papers' by Adams and Tatnall, Tarrago and Wilson, Diethelm and Dorge, are included in these proceedings. We congratulate these authors for the quality of their work that led to selection. The range of issues covered within this volume is too broad to set out here but c- ers, amongst other things, e-examination, Twitter, teacher education, school-based learning, methodological frameworks and human development theories. It has been an exciting and rewarding task to put these papers together. They rep- sent a coming together of great minds and cutting-edge research. We thank our contributors and our reviewers for producing such an impressive body of work."
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increasingly advanced, in some cases modifying fundamental brain function. Today, comparatively low-tech implants are being increasingly employed in non-therapeutic contexts, with applications ranging from the use of ICT implants for VIP entry into nightclubs, automated payments for goods, access to secure facilities and for those with a high risk of being kidnapped. Commercialisation and growing potential of human ICT implants have generated debate over the ethical, legal and social aspects of the technology, its products and application. Despite stakeholders calling for greater policy and legal certainty within this area, gaps have already begun to emerge between the commercial reality of human ICT implants and the current legal frameworks designed to regulate these products. This book focuses on the latest technological developments and on the legal, social and ethical implications of the use and further application of these technologies.
This authorised book is the perfect gift for fans of the #1 plush property Based on the bestselling squishy toy, this adorable collector's guide is the perfect gift for any Squishmallows fan! They're lovable, they're squishy-they're Squishmallows! This OFFICIAL Collector's Guide is packed with quirky tidbits, top-ten lists, bios & stats, and a "rarity factor" for Squishmallows' collectible characters. Filled with hundreds of colorful photos and unique art styles. Avid fans, new collectors, young or old, Squishmallows: The Collector's Guide is perfect for just about anyone! Squishmallows are plush toys that are here to fill your hearts with love and affection. Since 2017, the versatile Squishmallows have grown into an international phenomenon and offer comfort, support, and warmth as friends, couch companions, bedtime buddies, and travel teammates. With more than 500 Squishmallows characters to collect, young fans can aspire to be like their favorite characters. Each Squishmallow has its own unique name and storyline to add to the fun.
The recent advances in display technologies and mobile devices is having an important effect on the way users interact with all kinds of devices (computers, mobile devices, laptops, tablets, and so on). These are opening up new possibilities for interaction, including the distribution of the UI (User Interface) amongst different devices, and implies that the UI can be split and composed, moved, copied or cloned among devices running the same or different operating systems. These new ways of manipulating the UI are considered under the emerging topic of Distributed User Interfaces (DUIs). DUIs are concerned with the repartition of one of many elements from one or many user interfaces in order to support one or many users to carry out one or many tasks on one or many domains in one or many contexts of use - each context of use consisting of users, platforms, and environments. The 20 chapters in the book cover between them the state-of-the-art, the foundations, and original applications of DUIs. Case studies are also included, and the book culminates with a review of interesting and novel applications that implement DUIs in different scenarios.
Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications where the innovation mainly resides in software or in a business method are treated differently by the major patent offices in the US (USPTO), Japan (JPO), and Europe (EPO). The authors start with a thorough introduction into patent laws and practices, as well as in related intellectual property rights, which also explains the procedures at the USPTO, JPO and EPO and, in particular, the peculiarities in the treatment of applications centering on software or computers. Based on this theoretical description, next they present in a very structured way a huge set of case studies from different areas like business methods, databases, graphical user interfaces, digital rights management, and many more. Each set starts with a rather short description and claim of the "invention," then explains the arguments a legal examiner will probably have, and eventually refines the description step by step, until all the reservations are resolved. All of these case studies are based on real-world examples, and will thus give an inexperienced developer an idea about the required level of detail and description he will have to provide. Together, Closa, Gardiner, Giemsa and Machek have more than 70 years experience in the patent business. With their academic background in physics, electronic engineering, and computer science, they know about both the legal and the subject-based subtleties of computer-based inventions. With this book, they provide a guide to a patent examiner's way of thinking in a clear and systematic manner, helping to prepare the first steps towards a successful patent application.
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.
The success of the World Wide Web depends on the ability of users to store, p- cess and retrieve digital information regardless of distance boundaries, languages and domains of knowledge. The universality and ?exibility of the World Wide Web have also enabled the rapid growth of a variety of new services and applications based on human-machine interaction. The semantics of exchanged information and services should be useful not only for human to human communications, but also in that machines would be able to understand and automatically process web content. Semanticsgive well-de?nedmeaningto web content and enable computersand p- ple to work in cooperation. Today, the crucial challenge becomes the development of languages to express information in a machine processable format. Now more than ever, new advanced techniques and intelligent approaches are required to tra- form the Web into a universal reasoning and computing machine. Web intelligence attempts to deal with this challenge by exploiting information technologies and - ti?cial intelligence approaches to design the next generation of web-empowered systems and services.
Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." V. Reding, Commissioner, Responsible for Information Society and Media (EU)"
I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent
This book features papers from CEPE-IACAP 2015, a joint international conference focused on the philosophy of computing. Inside, readers will discover essays that explore current issues in epistemology, philosophy of mind, logic, and philosophy of science from the lens of computation. Coverage also examines applied issues related to ethical, social, and political interest. The contributors first explore how computation has changed philosophical inquiry. Computers are now capable of joining humans in exploring foundational issues. Thus, we can ponder machine-generated explanation, thought, agency, and other quite fascinating concepts. The papers are also concerned with normative aspects of the computer and information technology revolution. They examine technology-specific analyses of key challenges, from Big Data to autonomous robots to expert systems for infrastructure control and financial services. The virtue of a collection that ranges over philosophical questions, such as this one does, lies in the prospects for a more integrated understanding of issues. These are early days in the partnership between philosophy and information technology. Philosophers and researchers are still sorting out many foundational issues. They will need to deploy all of the tools of philosophy to establish this foundation. This volume admirably showcases those tools in the hands of some excellent scholars.
Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.
This book brings together the reflections of independent researchers from around the world. Sixteen authors from fourteen countries present their views on the use of information and communication technology (ICT) in education, offering valuable insights through the examination of current issues relevant to the future of education. What will education be in tomorrow's world? How can ICT be used without rendering education a purely technical process? How can we succeed the renovation of educational subjects without transforming them into technical objects? The introductory chapter of this publication guides us into the essays through a classification organized by the editors to illustrate different attitudes to technologies: * The 'Globalizers' see the integration of ICT and education as a means of enhancing the competitiveness of their society in a global economy; * The 'Reformists' see it as a means of bringing about significant change in didactics in the various disciplines, and even in the 'basics' of education; * The 'Humanists' consider technologies as possible catalysts for changing the aims and values of education from learni- oriented to humanistic; * The 'Heretic' sees values and aims as being determined exclusively by technology, and economy and culture as s- products of the technology-guided process. He therefore does not see any sense in interrogations as to which aims should guide us in integrating technology with education. Obviously, some arguments stretch across all four categories without completely matching any so-called type.
Information technology for intellectual property protection has become an increasingly important issue due to the expansion of ubiquitous network connectivity, which allows people to use digital content and programs that are susceptible to unauthorized electric duplication or copyright and patent infringement. Information Technology for Intellectual Property Protection: Interdisciplinary Advancements contains multidisciplinary knowledge and analysis by leading researchers and practitioners with technical backgrounds in information engineering and institutional experience in intellectual property practice. Through its discussions of both engineering solutions and the social impact of institutional protection, this book fills a gap in the existing literature and provides methods and applications for both practitioners and IT engineers.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance a" investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics II describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:
This book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The bookcontains a selection of twenty-five edited papers from the First Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2006. Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Martin S. Olivier is a Professor of Computer Science and co-manager of the Information and Computer Security Architectures Research Group at the University of Pretoria, Pretoria, South Africa. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.
This book includes a short history of interactive narrative and an account of a small group collaboratively authored social media narrative: Romeo and Juliet on Facebook: After Love Comes Destruction. At the forefront of narrative innovation are social media channels - speculative spaces for creating and experiencing stories that are interactive and collaborative. Media, however, is only the access point to the expressiveness of narrative content. Wikis, messaging, mash-ups, and social media (Facebook, Twitter, YouTube and others) are on a trajectory of participatory story creation that goes back many centuries. These forms offer authors ways to create narrative meaning that reflects our current media culture, as the harlequinade reflected the culture of the 18th century, and as the volvelle reflected that of the 13th century. Interactivity, Collaboration, and Authoring in Social Media first prospects the last millennium for antecedents of today's authoring practices. It does so with a view to considering how today's digital manifestations are a continuation, perhaps a reiteration, perhaps a novel pioneering, of humans' abiding interest in interactive narrative. The book then takes the reader inside the process of creating a collaborative, interactive narrative in today's social media through an authoring experience undertaken by a group of graduate students. The engaging mix of blogs, emails, personal diaries , and fabricated documents used to create the narrative demonstrates that a social media environment can facilitate a meaningful and productive collaborative authorial experience and result in an abundance of networked, personally expressive, and visually and textually referential content. The resulting narrative, After Love Comes Destruction, based in Shakespeare's Romeo and Juliet, shows how a generative narrative space evolved around the students' use of social media in ways they had not previously considered both for authoring and for delivery of their final narrative artifact.
This book covers key topics in the field of intelligent ambient adaptive systems. It focuses on the results worked out within the framework of the ATRACO (Adaptive and TRusted Ambient eCOlogies) project. The theoretical background, the developed prototypes, and the evaluated results form a fertile ground useful for the broad intelligent environments scientific community as well as for industrial interest groups. The new edition provides: Chapter authors comment on their work on ATRACO with final remarks as viewed in retrospective Each chapter has been updated with follow-up work emerging from ATRACO An extensive introduction to state-of-the-art statistical dialog management for intelligent environments Approaches are introduced on how Trust is reflected during the dialog with the system
This collection of original essays brings together contributors from both sides of the Atlantic to discuss the implications of the new media for the creation, delivery and assessment of English studies. Strategies by which digital technologies can serve professional, scholarly and pedagogical needs in a completely new way are explored in the context of the role and mission of humanities in the electronic age, student learning from a distance, teaching e-lit, electronic tutorials and interdisciplinarity and collaboration in a virtual environment. Including a useful Glossary of Terms and lists of Further Reading and Key Individuals in the field, this will be an essential volume for all teachers of English Studies.
This book provides a much-needed analysis of the current research in the global epidemic of electronic bullying. Scholars and professionals from the Americas, Europe, and Asia offer data, insights, and solutions, acknowledging both the social psychology and technological contexts underlying cyberbullying phenomena. Contributors address questions that are just beginning to emerge as well as longstanding issues concerning family and gender dynamics, and provide evidence-based prevention and intervention strategies for school and home. The global nature of the book reflects not only the scope and severity of cyberbullying, but also the tenacity of efforts to control and eradicate the problem. Included in the coverage: * Gender issues and cyberbullying in children and adolescents: from gender differences to gender identity measures. * Family relationships and cyberbullying. * Examining the incremental impact of cyberbullying on outcomes over and above traditional bullying in North America. * A review of cyberbullying and education issues in Latin America. * Cyberbullying prevention from child and youth literature. * Cyberbullying and restorative justice. Cyberbullying across the Globe is an essential resource for researchers, graduate students, and other professionals in child and school psychology, public health, social work and counseling, educational policy, and family advocacy.
The key idea of the book is that scientific and practical advances can be obtained if researchers working in traditions that have been assumed to be mutually incompatible make a real effort to engage in dialogue with each other, comparing and contrasting their understandings of a given phenomenon and how these different understandings can either complement or mutually elaborate on each other. This key idea applies to many fields, particularly in the social and behavioral sciences, as well as education and computer science. The book shows how we have achieved this by presenting our study of collaborative learning during the course of a four-year project. Through a series of five workshops involving dozens of researchers, the 37 editors and authors involved in this project studied and reported on collaborative learning, technology enhanced learning, and cooperative work. The authors share an interest in understanding group interactions, but approach this topic from a variety of traditional disciplinary homes and theoretical and methodological traditions. This allows the book to be of use to researchers in many different fields and with many different goals and agendas.
This book gives recommendations on which interactive decision aids to offer in webstores. Interactive decision aids are tools that help online shoppers to compare and evaluate product information. Consumers can, for instance, exclude products that do not meet certain criteria, they can highlight certain information or they can assign ratings of different kinds. Interactive decision aids are important, because finding the preferred product in a short amount of time increases both the customers' satisfaction and, in turn, the sales volume.This book includes a detailed description of decision aids, closely studies how decision aids are related to the decision behavior of customers, and develops a comprehensive system of decision aids, which is very flexible, increases both customer satisfaction and confidence, and can be used intuitively. The close link between typical behaviors and the decision aids allows webstores to learn about customers' decision-making behavior by using a simple click stream analysis. The book is written in an easy-to-read style and provides both practical recommendations and knowledge about consumer behavior "
Search engines have become a key part of our everyday lives. Yet there is growing concern with how algorithms, which run just beneath the surface of our interactions online, are affecting society. This timely new edition of Search Engine Society enlightens readers on the forms of bias that algorithms introduce into our knowledge and social spaces, drawing on recent changes to technology, industries, policies, and research. It provides an introduction to the social place of the search engine and addresses crucial questions such as: *How have search engines changed the way we organize our thoughts about the world, and how we work? *In what ways are big data and advances in artificial intelligence already influencing what we know of the world and each other? *To what extent do politics shape search, and does search shape politics? *What does the future of search portend for education, knowledge, work, privacy, and social power? While the search engine is starting to disappear from view, it is, at the same time, having an ever greater effect on how we learn about the world and how it learns about us. This book is a must-read for those who wish to understand the future of the social internet and how search shapes it.
"Biometrics in the New World" takes a fresh look at biometrics and identity management within a fast-changing world. The concept of biometric identity verification is revisited, including identity intelligence, federation and the use of third party infrastructure. Furthermore, the book examines some of the fundamentals of the technology which are often overlooked. However, the dialogue extends beyond technical considerations, and explores some of the broader societal and philosophical aspects surrounding the use of biometric applications, bringing this whole area into a new focus at a time. Topics and features: presents a brief history of the development of biometrics, and describes some of the popularly held misconceptions surrounding the technology; investigates the challenges and possibilities of biometrics across third party infrastructures and on mobile computing devices; provides guidance on biometric systems design, stressing the importance of an end-to-end approach, together with the alignment with policy and operational procedures; explores the mechanisms necessary to enable identity intelligence, including logging mechanisms, data communications and data formats; discusses such usage issues as collaboration frameworks, and messaging and data translation; examines the impact of biometric technologies on society, for better and worse, covering issues of privacy and user factors; reviews the current situation in identity management and biometric technologies, and predicts where these trends may take us in the future. This accessible and thought-provoking work is an essential guide for biometric systems integrators, professional consultancies, government agencies and other consumers of biometric technology. Academics interested in biometrics will also find the book to be a source of valuable insights, as will the casual reader. |
![]() ![]() You may like...
Studying and Designing Technology for…
Tejinder Judge, Carman Neustaedter
Paperback
Brain Machine Interfaces for Space…
Luca Rossini, Dario Izzo
Hardcover
R5,145
Discovery Miles 51 450
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay
Hardcover
R3,642
Discovery Miles 36 420
Emerging Technologies - Ethics, Law and…
Gary E Marchant, Wendell Wallach
Hardcover
R9,928
Discovery Miles 99 280
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud
Paperback
|