This book is about how people (we refer to them as practitioners) can help guide participants in creating representations of issues or ideas, such as collaborative diagrams, especially in the context of Participatory Design (PD).
This book presents a contextual approach to designing contemporary interactive mobile computer systems as integral parts of ubiquitous computing environments.
Translating Euclid reports on an effort to transform geometry for students from a stylus-and-clay-tablet corpus of historical theorems to a stimulating computer-supported collaborative-learning inquiry experience.
Large surface computing devices (wall-mounted or tabletop) with touch interfaces and their application to collaborative data analysis, an increasingly important and prevalent activity, is the primary topic of this book.
he Envisionment and Discovery Collaboratory (EDC) is a long-term research platform exploring immersive socio-technical environments in which stakeholders can collaboratively frame and solve problems and discuss and make decisions in a variety of application domains and different disciplines.
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time.
Social media platforms are the latest manifestation in a series of sociotechnical innovations designed to enhance civic engagement, political participation, and global activism.
Although it has influenced the field of Human-Computer Interaction (HCI) since its origins, humanistic HCI has come into its own since the early 2000s.
In his In the blink of an eye, Walter Murch, the Oscar-awarded editor of The English Patient, Apocalypse Now, and many other outstanding movies, devises the Rule of Six -- six criteria for what makes a good cut.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
Human-centered informatics (HCI) is a young discipline that is still defining its core components, with approaches rooted in engineering, science, and creative design.
Theory is the bedrock of many sciences, providing a rigorous method to advance knowledge, through testing and falsifying hypotheses about observable phenomena.
This lecture describes a theoretical framework for the behavioural sciences that holds high promise for theory-driven research and design in Human-Computer Interaction.
Spaces of Interaction, Places for Experience is a book about Human-Computer Interaction (HCI), interaction design (ID) and user experience (UX) in the age of ubiquitous computing.
Activity theory -- a conceptual framework originally developed by Aleksei Leontiev -- has its roots in the socio-cultural tradition in Russian psychology.
In his In the blink of an eye, Walter Murch, the Oscar-awarded editor of The English Patient, Apocalypse Now, and many other outstanding movies, devises the Rule of Six -- six criteria for what makes a good cut.
Activity theory -- a conceptual framework originally developed by Aleksei Leontiev -- has its roots in the socio-cultural tradition in Russian psychology.
This book examines the transformative potential of integrating explainable artificial intelligence (XAI) and blockchain technology in modern supply chain management.
Forensic Perspectives on Cybercrime is the first book to combine the disciplines of cyberpsychology and forensic psychology, helping to define this emergent area.
Against the backdrop of high Internet penetration and smartphone use, coupled with the widespread diffusion of credit cards, Korea has been leading the digital payment revolution, transforming itself into a cashless society.
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security.
This book focuses on a subtopic of explainable AI (XAI) called explainable agency (EA), which involves producing records of decisions made during an agent's reasoning, summarizing its behavior in human-accessible terms, and providing answers to questions about specific choices and the reasons for them.
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.
Cyber Victimology provides a global socio-legal-victimological perspective on victimisation online, written in clear, non-technical terms, and presents practical solutions for the problem.
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions.
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected.
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry.