The intent of this chapter is to outline a distinctive way of thinking about issues of technology and society that has characterized many Nordic approaches to the topic.
Covering key areas of evaluation and methodology, client-side applications, specialist and novel technologies, along with initial appraisals of disabilities, this important book provides comprehensive coverage of web accessibility.
Dave Oliver, Celia Romm and Fay Sudweeks This book follows previous texts: Celia Romm and Fay Sudweeks (eds) (1998), Doing Business Electronically: A Global Perspective of Electronic Commerce, and Fay Sudweeks and Celia Romm (eds) (1999) Doing Business on the Internet: Opportunities and Pitfalls.
Cognition, Communication and Interaction examines the theoretical and methodological research issues that underlie the design and use of interactive technology.
Since the general public began to use the Internet in the mid 1990s, there has been a vast amount of investment by governments and commerce in digital communications technologies.
viii As we look for such a strategy, technological development races on with new technologies that make our efforts and existing technologies on which they are based obsolete in shorter and shorter periods.
The intricate relationship between information technologies, community, and social memory is critical to a fuller understanding of the evolution of our societies.
This book focuses on the modelling and optimization aspects of the feature selection problem through computational intelligence methods in complex, high-dimensional supervised machine learning.
This book explores the emerging field of hyperconnectivity looking at technology and systems that allow person-to-person and person-to-machine communication in networked organizations and the social and economic impact of this society.
Providing a comprehensive introduction into an overview of the field of pervasive healthcare applications, this volume incorporates a variety of timely topics ranging from medical sensors and hardware infrastructures, to software platforms and applications and addresses issues of user experience and technology acceptance.
Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches.
Hacking Europe traces the user practices of chopping games in Warsaw, hacking software in Athens, creating chaos in Hamburg, producing demos in Turku, and partying with computing in Zagreb and Amsterdam.
This exciting new book explores the relationship between cultural traditions and computers, looking at how people from very different cultures and backgrounds communicate and how the use of information technologies can support and enhance these dialogues.
This book reviews the shift in the historiography of computing from inventors and innovations to a user-perspective, and examines how the relevant sources can be created, collected, preserved, and disseminated.
This book presents a set of models, methods, and techniques that allow the successful implementation of data governance (DG) in an organization and reports real experiences of data governance in different public and private sectors.
This book describes how distinctive socio-political commitments and cultural practices developed upon the internet in the later 20th and early 21st century and considers what lies ahead in those terms.
In this compelling journey into Digital Transformation (DT) tailored for Nonprofit Organizations (NPOs), this book unravels the intricacies of technological integration.
This book provides an in-depth treatment of three important topical areas related to regulatory, ethical, and technical discussions in the context of information retrieval and recommender systems (IRRSs): (1) bias, fairness, and non-discrimination, (2) transparency and explainability, and (3) privacy and security.
This newly updated edition presents a global perspective on ergonomics, addressing its application across occupational, recreational, design, and technological environments.
The second edition of this bestselling book provides an in-depth explanation of not only why we fall for scams and how fraudsters use technology and other techniques to manipulate others but also why fraud prevention advice is not always effective.
The newest communication technologies are profoundly changing the world's politics, economies, and cultures, but the specific implications of online game worlds remain mysterious.
The title of this new book: "e;The Connected Home"e; reflects the move away from the idea that smart homes would alter the lives of those living in them by providing technologies to take over tasks that were previously the responsibility of the householder, such as managing entertainment, education - and even eating!
Primitive software chatbots emerged in the 1960s, evolving swiftly through the decades and becoming able to provide engaging human-to-computer interactions sometime in the 1990s.
In an age of rapid technological progress and digital transformation, the convergence of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security.
This is the first research monograph to explore augmented and virtual reality in the context of the emerging metaverse, and their impact on the future of education, culture, art, society, heritage, healthcare, and other areas.