This book constitutes the refereed proceedings of the 8th Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2021, held in St.
The two most wanted terrorists in Southeast Asia - a Malaysian and a Singaporean - are on the run in the Philippines, but they manage to keep their friends and family updated on Facebook.
Artificial intelligence (AI) is increasingly impacting many aspects of people's lives across the globe, from relatively mundane technology to more advanced digital systems that can make their own decisions.
The success of predictive large language models (PLLMs) like GPT3 and ChatGPT has created both enthusiasts and skeptics of their widespread practical applications, but this book argues that the larger significance of such models is contained in what they suggest about human cognition.
This book constitutes the refereed proceedings of the 16th International Conference on Entertainment Computing, ICEC 2017, held in Tsukuba City, Japan, in September 2017.
From two of TIME's 100 Most Influential People in AI, what you need to know about AIand how to defend yourself against bogus AI claims and productsConfused about AI and worried about what it means for your future and the future of the world?
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
Today's ubiquitous computing technology is imbedded in everyday objects from cars to clothes to shipping containers, whose location, context, and state can be monitored, instantly processed, and acted upon.
As a practicing child psychiatrist and mother of three, Jodi Gold has a unique understanding of both the mind-boggling benefits and the serious downsides of technology.
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019.
Social information access is defined as a stream of research that explores methods for organizing the past interactions of users in a community in order to provide future users with better access to information.
This book constitutes the refereed proceedings of the 14th International Conference on Persuasive Technology, PERSUASIVE 2019, held in Limassol, Cyprus, in April 2019.
This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017.
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2017, held in Lagos, Nigeria, in December 2017.
Wearable devices are being used by an increasing number of elite-level sports teams to manage and control the health, performance, and productivity of their athletes.
This book explores the opportunities and challenges people with disabilities experience in the context of digital games from the perspective of three related areas: representation, access and inclusion, and community.
Technologies such as artificial intelligence have led to significant advances in science and medicine, but have also facilitated new forms of repression, policing and surveillance.
This book focuses on the recent rise of "e;infodemics"e; as forms of disinformation, misinformation and mal-information saturate contemporary media platforms, shaping public opinion to advance agendas.
This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016.
Social machines are a type of network connected by interactive digital devices made possible by the ubiquitous adoption of technologies such as the Internet, the smartphone, social media and the read/write World Wide Web, connecting people at scale to document situations, cooperate on tasks, exchange information, or even simply to play.
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2016, held in Ouagadougou, Burkina Faso, in December 2016.
'I have fond memories of watching Hugo de Burgh handle the Chinese media and I can think of no one better qualified to tell us about a subject of ever-growing importance' Boris Johnson, Prime Minster, United Kingdom'An excellent, well-written and important survey which should be on the shelves of all those interested in China and in the media' Alan MacFarlane, Professor of Anthropology, University of Cambridge'Well written and a good access point particularly for students that have not previously been exposed to the Chinese media.
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013.
An accessible introduction to the artificial intelligence technology that enables computer vision, speech recognition, machine translation, and driverless cars.
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media.
Covering topics ranging from web filters to laws aimed at preventing the flow of information, this book explores freedom-and censorship-of the Internet and considers the advantages and disadvantages of policies at each end of the spectrum.
The ultimate guide to assessing and exploiting the customer value and revenue potential of the Cloud A new business model is sweeping the world the Cloud.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
Since the discovery of electromagnetic waves less than 150 years ago, the application of wireless communications technology has not only revolutionized our daily lives, but also fundamentally changed the course of world history.
This book constitutes the refereed proceedings of the 12th International Conference on Persuasive Technology, PERSUASIVE 2017, held in Amsterdam, The Netherlands, in April 2017.
A variety of ideas, approaches, and techniques exist -- in terms of both architecture and learning -- and this abundance seems to lead to many exciting possibilities in terms of theoretical advances and application potentials.