Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Cham : Springer  (3)
  • Dordrecht [u.a.] : Springer
  • Computer science  (4)
  • Computersicherheit
  • Computer Science  (4)
Datasource
Material
Language
Years
Subjects(RVK)
  • 1
    ISBN: 9783319219547
    Language: English
    Pages: Online-Ressource
    Edition: Springer eBook Collection. Computer Science
    Series Statement: Human-Computer Interaction Series
    DDC: 005.437
    RVK:
    RVK:
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Social sciences ; Ethnomethodologie ; Design Thinking ; Wissenschaftskritik
    Abstract: This book aims to deconstruct ethnography to alert systems designers, and other stakeholders, to the issues presented by new approaches that move beyond the studies of ‘work’ and ‘work practice’ within the social sciences (in particular anthropology and sociology). The theoretical and methodological apparatus of the social sciences distort the social and cultural world as lived in and understood by ordinary members, whose common-sense understandings shape the actual milieu into which systems are placed and used.  In Deconstructing Ethnography the authors show how ‘new’ calls are returning systems design to ‘old’ and problematic ways of understanding the social. They argue that systems design can be appropriately grounded in the social through the ordinary methods that members use to order their actions and interactions.  This work is written for post-graduate students and researchers alike, as well as design practitioners who have an interest in bringing the social to bear on design in a systematic rather than a piecemeal way. This is not a ‘how to’ book, but instead elaborates the foundations upon which the social can be systematically built into the design of ubiquitous and interactive systems
    Description / Table of Contents: IntroductionBuilding the Social into System Design -- Ethnography as Cultural Theory -- ‘New’ Ethnography and Ubiquitous Computing -- Interpretation, Reflexivity and Objectivity -- The Missing What of Ethnographic Studies -- Ethnography, Ethnomethodology and Design -- Members’ Not Ethnographers’ Methods.
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham : Springer
    ISBN: 9783319227351
    Language: English
    Pages: Online-Ressource (xiii, 126 pages) , illustrations (some color)
    Edition: 1st ed. 2015
    Edition: Online-Ausg. Springer eBook Collection. Computer Science
    DDC: 302.30285
    RVK:
    Keywords: Computer science ; Application software ; Graph theory ; Soziales Netzwerk ; Informatik ; Graphentheorie ; Anwender-Software ; Empfehlungssystem ; Verhaltensforschung
    Abstract: This book introduces novel techniques and algorithms necessary to support the formation of social networks. Concepts such as link prediction, graph patterns, recommendation systems based on user reputation, strategic partner selection, collaborative systems and network formation based on ‘social brokers’ are presented. Chapters cover a wide range of models and algorithms, including graph models and a personalized PageRank model. Extensive experiments and scenarios using real world datasets from GitHub, Facebook, Twitter, Google Plus and the European Union ICT research collaborations serve to enhance reader understanding of the material with clear applications. Each chapter concludes with an analysis and detailed summary. Social Network-Based Recommender Systems is designed as a reference for professionals and researchers working in social network analysis and companies working on recommender systems. Advanced-level students studying computer science, statistics or mathematics will also find this books useful as a secondary text
    Description / Table of Contents: Overview of Social Recommender SystemsLink Prediction for Directed Graphs -- Follow Recommendation in Communities -- Partner Recommendation -- Social Broker Recommendation -- Conclusion.
    Note: Includes bibliographical references at the end of each chapters
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9783319050447
    Language: English
    Pages: Online-Ressource (X, 353 S.) , Ill.
    Edition: Online-Ausg. Springer eBook Collection. Computer Science
    DDC: 302.35072
    RVK:
    Keywords: Computer science ; Software engineering ; Data protection ; Informatik ; Software Engineering ; Datenschutz ; Ubiquitous Computing
    Abstract: By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis. Designing such self-adaptive, context-aware knowledge processing systems is, in itself, a formidable challenge. This book presents core findings from the VENUS project at the Interdisciplinary Research Center for Information System Design (ITeG) at Kassel University, where researchers from different fields, such as computer science, information systems, human-computer interaction and law, together seek to find general principles and guidelines for the design of socially aware ubiquitous computing systems. To this end, system usability, user trust in the technology and adherence to privacy laws and regulations were treated as particularly important criteria in the context of socio-technical system design. During the project, a comprehensive blueprint for systematic, interdisciplinary software development was developed, covering the particular functional and non-functional design aspects of ubiquitous computing at the interface between technology and human beings. The organization of the book reflects the structure of the VENUS work program. After an introductory part I, part II provides the groundwork for VENUS by presenting foundational results from all four disciplines involved. Subsequently, part III focuses on methodological research funneling the development activities into a common framework. Part IV then covers the design of the demonstrators that were built in order to develop and evaluate the VENUS method. Finally, part V is dedicated to the evaluation phase to assess the user acceptance of the new approach and applications. The presented findings are especially important for researchers in computer science, information systems, and human-computer interaction, but also for everyone working on the acceptance of new technologies in society in general
    Description / Table of Contents: Part I IntroductionA Research Agenda for the Socio-Technical Design of Ubiquitous Computing Systems -- Part II Foundations -- Protecting Personality Rights and Legal Accountability -- Understanding the Formation of Trust -- User Model -- Enabling Active User Participation in Self-Adaptive Applications -- Matching and Mediation of Heterogeneous Context Information -- Mining Social Links for Ubiquitous Knowledge Engineering -- Collaborative Context Prediction -- Ranking Cryptographic Algorithms -- Part III Methods -- Socially Compatible Technology Design -- Requirement Patterns to Support Socio-technical System Design -- Designing Usable Adaptations -- SEMAT and VENUS - Different Perspectives? -- Part IV Applications -- Meet-U - Mobile Social Network -- Connect-U - A System for Enhancing Social Networking -- Support-U - Designing an Ambient Assisted Living System using Interdisciplinary Development Patterns -- Part V Evaluation -- System Evaluation -- Simulation Study -- Part VI Conclusion & Outlook -- The Future of Socio-Technical Design for Ubiquitous Computing Systems.
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9789400751705 , 9781283865654
    Language: English
    Pages: Online-Ressource (XI, 440 p. 26 illus., 20 illus. in color)
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Sciences and Law Electronic reproduction; Available via World Wide Web
    DDC: 341
    RVK:
    Keywords: Law ; Philosophy of law ; Technology Philosophy ; Computer science ; Computersicherheit
    Abstract: On 25 January 2012, the European Commission presented its long awaited new Data protection package. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media
    Abstract: On 25 January 2012, the European Commission presented its long awaited new “Data protection package”. With this proposal for a drastic revision of the data protection framework in Europe, it is fair to say that we are witnessing a rebirth of European data protection, and perhaps, its passage from an impulsive youth to a more mature state. Technology advances rapidly and mobile devices are significantly changing the landscape. Increasingly, we carry powerful, connected, devices, whose location and activities can be monitored by various stakeholders. Very powerful social network sites emerged in the first half of last decade, processing personal data of many millions of users. Updating the regulatory framework was imminent and the presentation of the new package will initiate a period of intense debate in which the proposals will be thoroughly commented upon and criticized, and numerous amendments will undoubtedly be proposed. This volume brings together some 19 chapters offering conceptual analyses, highlighting issues, proposing solutions, and discussing practices regarding privacy and data protection. In the first part of the book, conceptual analyses of concepts such as privacy and anonymity are provided. The second section focuses on the contrasted positions of digital natives and ageing users in the information society. The third section provides four chapters on privacy by design, including discussions on roadmapping and concrete techniques. The fourth section is devoted to surveillance and profiling, with illustrations from the domain of smart metering, self-surveillance and the benefits and risks of profiling. The book concludes with case studies pertaining to communicating privacy in organisations, the fate of a data protection supervisor in one of the EU member states and data protection in social network sites and online media.
    Description / Table of Contents: European Data Protection:Coming of Age; Foreword; Contents; Part I: Concepts; Chapter 1: Seven Types of Privacy; 1.1 Introduction; 1.2 Defining and Conceptualising Privacy; 1.3 Seven Types of Privacy; 1.4 Privacy Impacts of New and Emerging Technologies; 1.4.1 Whole Body Imaging Scanners; 1.4.2 RFID-Enabled Travel Documents; 1.4.3 Unmanned Aircraft Systems; 1.4.4 Second-Generation DNA Sequencing Technologies; 1.4.5 Human Enhancement; 1.4.6 Second-Generation Biometrics; 1.4.7 Filling in the Gaps; 1.5 The Merit of Elusiveness; 1.6 Conclusion; References
    Description / Table of Contents: Chapter 2: The Internet as Surveilled Workplayplace and Factory2.1 Introduction; 2.2 Workplace Surveillance; 2.3 The Rise of Play Labour; 2.4 Internet Playbour; 2.5 Internet Surveillance; 2.6 Conclusion: The Surveilled Workplayplace Factory; References; Chapter 3: From Market-Making Tool to Fundamental Right: The Role of the Court of Justice in Data Protection's Identity Crisis; 3.1 Introduction; 3.2 A Critical Analysis of the 'Market-Making' Vocation of European Data Protection Law; 3.2.1 The Emergence of the Dual Objectives of European Data Protection Law
    Description / Table of Contents: 3.2.2 The Competence Question: The Legitimacy of EU Legislation in the Human Rights Sphere3.3 Loosening the Links Between Data Protection and Market Harmonisation?; 3.3.1 The Broad Conception of the Directive's Scope of Application; 3.3.2 The Margin of Discretion Left to National Authorities; 3.4 The Rights-Based Approach to Data Protection in the EU and the Residual Impact of Market Integration Restraints; 3.4.1 Data Protection as a Fundamental Right Pre-Lisbon; 3.4.2 The Right to Data Protection in the Post-Lisbon Era; 3.5 Conclusion: Casting Our Eyes on the Future; References
    Description / Table of Contents: Case Law of the Court of JusticeChapter 4: Anonymity: A Comparison Between the Legal and Computer Science Perspectives; 4.1 Introduction; 4.2 The Notion of Anonymity in European Legislation on Personal Data; 4.2.1 The Notion of Anonymity in Common Language; 4.2.2 The Definition of Personal Data; 4.2.3 The Concept of Anonymous Data; 4.2.4 A Case Study: The Definition of Anonymous Data in the Italian Personal Protection Code; 4.3 Anonymity in Data Disclosure; 4.3.1 Anonymity in Data Publication; 4.3.1.1 Problem Definition and Characterization; 4.3.1.2 k -Anonymity
    Description / Table of Contents: 4.3.1.3 k -Anonymity with Multiple QI4.3.1.4 l -Diversity; 4.3.1.5 t -Closeness; 4.3.2 Anonymity When Disclosing Spatio-Temporal Information; 4.3.2.1 Problem Description; 4.3.2.2 Privacy Models for LBS Anonymity; 4.4 Discussion; 4.4.1 The Role of Anonymity in Privacy Preservation; 4.4.2 Identifying Information and Personal Data; 4.4.3 Anonymity Measurement; 4.4.4 Anonymity and the Principle of Minimization; 4.5 Conclusions and Future Work; References; Part II: Digital Natives and Ageing Users
    Description / Table of Contents: Chapter 5: Digital Natives and the Metamorphosis of the European Information Society. The Emerging Behavioral Trends Regarding Privacy and Their Legal Implications
    Description / Table of Contents: Foreword -- I. Concepts -- 1. Seven types of privacy; Rachel Finn, David Wright and Michael Friedewald -- 2. The Internet as Surveilled Workplayplace and Factory; Christian Fuchs and Daniel Trottier -- 3. From Market-Making Tool to Fundamental Right: the Role of the Court of Justice in Data Protection’s Identity Crisis; Orla Lynskey -- 4. Anonymity: a Comparison between the Legal and Computer Science Perspectives; Sergio Mascetti, Anna Monreale, Annarita Ricci and Andrea Gerino -- II. Digital natives and ageing users -- 5. Digital Natives and the Metamorphosis of European Society. The emerging behavioral trends regarding privacy and their legal implications; Norberto Andrade and Shara Monteleone -- 6. Autonomy in ICT for older persons at the crossroads between legal and care practices; Daniel Lopez Gomez, Eugenio Mantovani and Paul De Hert -- 7. Ethical implications of technologies that "support" ageing with dementia at home; Unai Díaz-Orueta and Elena Urdaneta -- III. Privacy by design -- 8. Privacy by Design: Enhanced Privacy Leadership, Methods, and Results; Ann Cavoukian -- 9. Roadmap for Privacy Protection in Mobile Sensing Applications; Delphine Christin, Matthias Hollick -- 10. Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends; Maria Luisa Damiani -- 11. Privacy by Design through social requirements analysis of social network sites from a user perspective; Ralf De Wolf, Rob Heyman and Jo Pierson -- IV. Surveillance, profiling and smart metering -- 12. Smart metering and privacy in Europe: lessons from the Dutch case; Colette Cuijpers and Bert-Jaap Koops -- 13. User Choice, Privacy Sensitivity, and Acceptance of Personal Information Collection; Joshua B. Hurwitz -- 14. Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering; Frank Pallas -- 15. Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes; Martin Pekárek, Arnold Roosendaal and Jasper Sluijs -- 6. Computers Reading Our Minds? The benefits and risks of profiling; Jorg Polakiewicz -- Case studies -- 17. Communicating Privacy in Organisations. Catharsis and Change in the Case of the Deutsche Bahn; Daniel Guagnin, Carla Ilten and Leon Hempel -- 18. The end of independent data protection supervision in Hungary - a case study;  András Jóri -- 19. Data Protection, Social Networks and Online Mass Media; Artemi Rallo and Ricard Martínez..
    Note: Description based upon print version of record , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...