The book addresses the challenge of living in a multilingual world from three perspectives: socio-linguistics and the study of multilingualism in contrast, philosophy of technology with its emphasis on the world as a technosphere-how it is made, how it is experienced, and how it can be managed, and then pedagogy and the question of teaching and learning to competently negotiate multilingual environments.
Web-based school collaboration has attracted the sustained attention of educators, policy-makers, and governmental bodies around the world during the past decade.
Artificial Intelligence was meant to be the great social equalizer that helps promote fairness by removing human bias from the equation, but is this true?
This book enables readers to interrogate the technical, rhetorical, theoretical, and socio-ethical challenges and opportunities involved in the development and adoption of augmentation technologies and artificial intelligence.
This book enables readers to interrogate the technical, rhetorical, theoretical, and socio-ethical challenges and opportunities involved in the development and adoption of augmentation technologies and artificial intelligence.
Just as the automobile radically changed people's lives at the beginning of the 20th century, so too has the revolution in online services (including blogging, podcasting, videogaming, shopping, and social networking) and cell-phone use changed our lives at the turn of the 21st century.
This edited collection approaches the field of social robotics from the perspective of a cultural ecology, fostering a deeper examination of the reach of robotic technology into the lived experience of diverse human populations, as well as the impact of human cultures on the development and design of these social agents.
A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security-humansPeople-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security.
From school lunchrooms to the White House press room, video games are an integral part of our popular culture, and the industry behind them touches all aspects of our lives, gamer and non-gamer alike.
Aimed at addressing the difficulties associated with teaching often abstract elements of technical ethics, this book is an extended fictional case study into the complexities of technology and social structures in complex organizations.
The New York Times and USA Today bestseller-updated to bring you up to speed on the latest social media sites, features, and strategiesFrom one of the world's leading figures in social media marketing, networking, and business applications comes the heavily revised and updated edition of the Likeable Social Media.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.
This bookconstitutes the refereed proceedings of the Second International Symposium onCyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015.
This bookconstitutes the refereed proceedings of the Third European Conference onInformation Literacy, ECIL 2015, held in Tallinn, Estonia, in October 2015.
This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Objects and Technologies for Social Good, GOODTECHS 2017, held in Pisa, Italy, November 29-30, 2017.
This book constitutes the proceedings of the 19th International Conference on Passive and Active Measurement, PAM 2018, held in Berlin, Germany, in March 2018.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018.
The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018.
Since the discovery of electromagnetic waves less than 150 years ago, the application of wireless communications technology has not only revolutionized our daily lives, but also fundamentally changed the course of world history.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Serious Games, Interaction and Simulation, SGAMES 2016, held in Porto, Portugal, in June 2016.
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019.
This book constitutes the refereed proceedings of the 6th International Conference on Advances in Visual Informatics, IVIC 2019, held in Bangi, Malaysia, in November 2019.
This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018.
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.
Es ist für Fachleute wie Laien immer wieder überraschend, wie die Errungenschaften der Informatik das Leben der Menschen verbessern können, manchmal sogar in Richtungen, welche die Menschen gar nicht unbedingt wünschen.
This book constitutes the refereed proceedings of the 13th International Conference on Persuasive Technology, PERSUASIVE 2018, held in Waterloo, ON, Canada, in April 2018.