This book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2020, held in Shenzhen, China, in November 2020.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017.
"e;Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data.
As a practicing child psychiatrist and mother of three, Jodi Gold has a unique understanding of both the mind-boggling benefits and the serious downsides of technology.
This bookconstitutes revised selected papers from the First International Conference onInformation Systems Security and Privacy, ICISSP 2015, held in Angers, France,in February 2015.
The three-volume set LNCS 10288, 10289, and 10290 constitutes the proceedings of the 6th International Conference on Design, User Experience, and Usability, DUXU 2017, held as part of the 19th International Conference on Human-Computer Interaction, HCII 2017, in Vancouver, BC, Canada, in July 2017, jointly with 14 other thematically similar conferences.
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns.
This book constitutes the thoroughly refereed conference proceedings of the First International Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016.
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions.
This book constitutes the proceedings of the 15th International Conference on Transport Systems Telematics, TST 2015, held in Wroclaw, Poland, in April 2015.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining.
The author investigates how to produce realistic and workable ethical codes or regulations in this rapidly developing field to address the immediate and realistic longer-term issues facing us.
This book constitutes the refereed proceedings of the 7th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, SBP 2014, held in Washington, DC, USA, in April 2014.
Highly publicized legal cases, such as those involving libel verdicts, obscenity prosecutions, the First Amendment, and other areas of media law have focused attention on only one part of the media's impact on law.
Cypherpunk Ethics explores the moral worldview of the cypherpunks, a movement that advocates the use of strong digital cryptography-or crypto, for short-to defend individual privacy and promote institutional transparency in the digital age.
Revised and updated to address shifts in the climate of bullying in schools and online, this timely work suggests anti-bullying approaches that are concrete, practical, and grounded in research.
The Metaverse seamlessly integrates the real world with the virtual world and allows avatars to engage in a broad range of activities including entertainment, social networking, and trading.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
If you believe the sky really is the limit when it comes to creating unparalleled user experiences and applications for the Web--then Macromedia Flash MX is sure to be your tool of choice.
This book investigates the spaces where architecture and computer science share a common set of assumptions and goals, using methods and objectives from architecture, ethnography, and human-computer interaction (HCI).
"e;Companies with a stake in the technology industry or that have staked on the Internet (ala Google or Amazon or any of the thousands of small ecommerce companies around the world) are likely to pluck multiple nuggets of wisdom from her book.
Sport Cyberpsychology is the first book devoted to assessing the influence of technology on human interaction, behaviour and mental health in a sport context, gathering research on the use of technology and the Internet by athletes, coaches and sport science support staff.
This book constitutes the refereed proceedings of the 21st International Conference on Collaboration and Technology, CRIWG 2015, held in Yerevan, Armenia, in September 2015.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Mobile Networks and Management, MONAMI 2017, held in Melbourne, Australia, in December 2017.
The four-volume set LNCS 8517, 8518, 8519 and 8520 constitutes the proceedings of the Third International Conference on Design, User Experience and Usability, DUXU 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 13 other thematically similar conferences.
The three-volume set LNCS 9186, 9187, and 9188 constitutes the proceedings of the 4th International Conference on Design, User Experience, and Usability, DUXU 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, in Los Angeles, CA, USA, in August 2015, jointly with 13 other thematically similar conferences.
This book provides in-depth information about the technical, legal, and policy issues that are raised when humans and artificially intelligent machines are enhanced by technology.