You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Social Informatics: Past, Present and Future is a collection of twelve papers that provides a state-of-the-art review of 21st century social informatics. Two papers review the history of social informatics, and show that its intellectual roots can be found in the late 1970s and early ’80s and that it emerged in several different locations around the world before it coalesced in the US in the mid-1990s. The evolution of social informatics is described under four periods: foundational work, development and expansion, a robust period of coherence, and a period of diversification that continues today. Five papers provide a view of the breadth and depth of contemporary social informatics, demon...
Announcements for the following year included in some vols.
Foreword by Alan S. Inouye; Afterword by Nancy Kranich The first of its kind, this important new text provides a much-needed introduction to the myriad information policy issues that impact information professionals, information institutions, and the patrons and communities served by those institutions. In this key textbook for LIS students and reference text for practitioners, noted scholars Jaeger and Taylor draw from current, authoritative sources to familiarize readers with the history of information policy; discuss the broader societal issues shaped by policy, including access to infrastructure, digital literacy and inclusion, accessibility, and security; elucidate the specific laws, re...
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions.
How have women managed to break through the glass ceiling of the business world, and what management techniques do they employ once they ascend to the upper echelons of power? What difficult situations have these female business leaders faced, and what strategies have they used to resolve those challenges? Junctures in Women’s Leadership: Business answers these questions by highlighting the professional accomplishments of twelve remarkable women and examining how they responded to critical leadership challenges. Some of the figures profiled in the book are household names, including lifestyle maven Martha Stewart, influential chef Alice Waters, and trailblazing African-American entrepreneu...
Formal approaches are those taken by government bodies through laws, court decisions and actions of government regulatory bodies. Informal approaches are those taken by individuals, non profit organizations, industries working at self-regulation, etc. Because the formal means are tied to a particular legal system, this kind of approach is nation-specific and the book focuses on the United States. But many of the things the authors have to say about US food policy and the interactions between formal and informal approaches would also be of interest to policymakers and food industry professionals in other countries. Coverage includes the regulation of food advertising on children's television and the internet, regulation of school lunch programs and the influence of Eleanor Roosevelt and Michelle Obama.
1. This extremely multidisciplinary book engages descriptive and prescriptive methods of study to video games, drawing heavily on philosophical traditions. It will have appeal outside of Film & Media and Philosophy to other areas of scholarly research including Sociology, Anthropology and Political Science. 2.The author is a senior scholar with extensive publications that explore the intersection of philosophy and ethics with digital games and reality. He has a strong presence on Facebook and Twitter as well as a well-designed personal website. He has historically be very engaged with his own digital and social media marketing for books he authors and plans to do the same for this title. 3. The author works to debunk and reframe what readers think they know about video games and digital culture, showing that it is wrong (or at least misguided) and that the important questions are often far more interesting and potentially disturbing than anticipated.
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010:...