You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised full papers and 4 revised short papers are presented together with 1 keynote paper and 7 trust management tool and systems demonstration reports. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and philosophy are addressed.
This volume presents the refereed proceedings of the 11th International Conference on Deontic Logic in Computer Science, DEON 2012, held in Bergen, Norway, in July 2012. The 14 revised papers included in the volume were carefully reviewed and selected from 29 submissions. Topics covered include logical study of normative reasoning, formal analysis of normative concepts and normative systems, formal specification of aspects of norm-governed multi-agent systems and autonomous agents, normative aspects of protocols for communication, negotiation and multi-agent decision making, formal representation of legal knowledge, formal specification of normative systems for the management of bureaucratic processes in public or private administration, and applications of normative logic to the specification of database integrity constraints.
This volume presents a variety of papers bearing on the relation between deontic logics, logics of action, and normative systems, i.e. systems of or about interacting agents (computers, human beings, corporations, etc.) whose behaviour is subject to ideal constraints that may not always be fulfilled in practice. The papers range from theoretical studies of the logical and conceptual tools needed, to studies of various applications. The set of papers collected in this book should be of interest to investigators working in a variety of fields, from philosophy, logic and legal theory to artificial intelligence, computer and management sciences, since it covers topics ranging from theoretical research on foundational issues in deontic and action logics, defeasible reasoning, decision theory, ethical theory, and legal theory, to research on a variety of issues relevant to applications connected with expert systems in the law, document specification, automation of defeasible reasoning, specification of responsibilities and powers in organizations, normative systems specification, confidentiality in database systems, and a host of other applications.
This volume presents the refereed proceedings of the 9th International Conference on Deontic Logic in Computer Science, DEON 2008, held in Luxembourg in July 2008. The 16 revised full papers presented together with 4 invited talks were carefully reviewed and selected for inclusion in the book. The topics addressed are development of formal systems of deontic logic and related areas of logic, and applications. Of particular interest is the interaction between computer systems and their users; the papers focus also on the special topic of logical approaches to deontic notions in computer science in the area of security and trust, encompassing applications in e-commerce as well as traditional areas of computer security.
The year 2010 was a landmark in the history of digital libraries because for the first time this year the ACM/IEEE Joint Conference on Digital Libraries (JCDL) and the annual International Conference on Asia-Pacific Digital Libraries (ICADL) were held together at the Gold Coast in Australia. The combined conferences provided an - portunity for digital library researchers, academics and professionals from across the globe to meet in a single forum to disseminate, discuss, and share their valuable - search. For the past 12 years ICADL has remained a major forum for digital library - searchers and professionals from around the world in general, and for the Asia-Pacific region in particular. Res...
Revised and updated to reflect new technologies in the field, the fourth edition of this popular text takes an in-depth look at the social costs and moral problems that have emerged by the ever expanding use of the Internet, and offers up-to-date legal and philosophical examinations of these issues. It focuses heavily on content control, free speech, intellectual property, and security while delving into new areas of blogging and social networking. Case studies throughout discuss real-world events and include coverage of numerous hot topics. In the process of exploring current issues, it identifies legal disputes that will likely set the standard for future cases. Instructor Resouces: -PowerPoint Lecture Outlines
An excellent primary text to use in conjunction with Readings in CyberEthics, Second Edition, this volume carefully reviews the social costs and moral problems that have been triggered by the expanded
The rush to the Information Superhighway and the transition to an Information Age have enormous political, ethical, and religious consequences. The essays collected here develop both interdisciplinary and international perspectives on privacy, critical thinking and literacy, democratization, gender, religion, and the very nature of the revolution promised in cyberspace. These essays are essential reading for anyone who wants to better understand and reflect upon these events and issues.
An increasing reliance on the Internet and mobile communication has deprived us of our usual means of assessing another party’s trustworthiness. This is increasingly forcing us to rely on control. Yet the notion of trust and trustworthiness is essential to the continued development of a technology-enabled society. Trust, Complexity and Control offers readers a single, consistent explanation of how the sociological concept of ‘trust’ can be applied to a broad spectrum of technology-related areas; convergent communication, automated agents, digital security, semantic web, artificial intelligence, e-commerce, e-government, privacy etc. It presents a model of confidence in which trust and ...
This book explores how social networking platforms such as Facebook, Twitter, and WhatsApp ‘accidentally’ enable and nurture the creation of digital afterlives, and, importantly, the effect this digital inheritance has on the bereaved. Debra J. Bassett offers a holistic exploration of this phenomenon and presents qualitative data from three groups of participants: service providers, digital creators, and digital inheritors. For the bereaved, loss of data, lack of control, or digital obsolescence can lead to a second loss, and this book introduces the theory of ‘the fear of second loss’. Bassett argues that digital afterlives challenge and disrupt existing grief theories, suggesting h...