William Sims Bainbridge Virtual worlds are persistent online computer-generated environments where people can interact, whether for work or play, in a manner comparable to the real world.
In a world of increasing complexity, instant information availability and constant flux, systems approaches provide the opportunity of a tangible anchor of purpose and iterate learning.
Developing usable, useful, and appealing solutions for the customer or user experience requires customization according to specific users' needs amidst frequently changing physical and social environments.
The intent of this chapter is to outline a distinctive way of thinking about issues of technology and society that has characterized many Nordic approaches to the topic.
Covering key areas of evaluation and methodology, client-side applications, specialist and novel technologies, along with initial appraisals of disabilities, this important book provides comprehensive coverage of web accessibility.
Dave Oliver, Celia Romm and Fay Sudweeks This book follows previous texts: Celia Romm and Fay Sudweeks (eds) (1998), Doing Business Electronically: A Global Perspective of Electronic Commerce, and Fay Sudweeks and Celia Romm (eds) (1999) Doing Business on the Internet: Opportunities and Pitfalls.
Cognition, Communication and Interaction examines the theoretical and methodological research issues that underlie the design and use of interactive technology.
This book contains the proceedings of the Second European Conference on Computer Network Defence to take place in December 2006 at the School of Computing, University of Glamorgan, in the UK, and the Workshop preceding it.
Since the general public began to use the Internet in the mid 1990s, there has been a vast amount of investment by governments and commerce in digital communications technologies.
viii As we look for such a strategy, technological development races on with new technologies that make our efforts and existing technologies on which they are based obsolete in shorter and shorter periods.
The intricate relationship between information technologies, community, and social memory is critical to a fuller understanding of the evolution of our societies.
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it.
This book contains the First European Conference on Computer Network Defence to take place in December 2005 at the School of Computing, University of Glamorgan, in the UK.
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.
This book constitutes the proceedings of the 36th International Conference on Advanced Information Systems Engineering, CAiSE 2024, which was held in Limassol, Cyprus, during June 3-7, 2024.
The multi-volume set LNAI 14169 until 14175 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, in September 2023.
The five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16-18, 2024.
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023.
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances in Smart Computing and Information Security, ASCIS 2023, in Rajkot, Gujarat, India, December 2023.
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
There is a growing need for insights and practical experiences in the evolving field of cyber security for business analytics a need addressed by Cyber Security in Business Analytics.
The five-volume set CCIS 2133-2137 constitutes the refereed proceedings of the workshops held in conjunction with the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, during September 18-22, 2023.
The ten-volume set LNCS 15016-15025 constitutes the refereed proceedings of the 33rd International Conference on Artificial Neural Networks and Machine Learning, ICANN 2024, held in Lugano, Switzerland, during September 17-20, 2024.
The ten-volume set LNCS 15016-15025 constitutes the refereed proceedings of the 33rd International Conference on Artificial Neural Networks and Machine Learning, ICANN 2024, held in Lugano, Switzerland, during September 17-20, 2024.
The two-volume set LNCS 14634 and 14635 constitutes the refereed proceedings of the 27th European Conference on Applications of Evolutionary Computation, EvoApplications 2024, held as part of EvoStar 2024, in Aberystwyth, UK, April 3-5, 2024, and co-located with the EvoStar events, EvoCOP, EvoMUSART, and EuroGP.
The ten-volume set LNCS 15016-15025 constitutes the refereed proceedings of the 33rd International Conference on Artificial Neural Networks and Machine Learning, ICANN 2024, held in Lugano, Switzerland, during September 17-20, 2024.
This book focuses on the modelling and optimization aspects of the feature selection problem through computational intelligence methods in complex, high-dimensional supervised machine learning.
This book constitutes the referred proceedings of the 7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024, held as an hybrid event, in Hangzhou, China, during December 13–14, 2024.
This book explores the emerging field of hyperconnectivity looking at technology and systems that allow person-to-person and person-to-machine communication in networked organizations and the social and economic impact of this society.