You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Even when products and systems are highly localized, rarely is there one design suitable for a single, mono-cultural population of users. The products and systems created and used are cultural artifacts representing shared cognitions that characterize mental models that result from interactions with physical environments. Thus, culture is embedded and impacts the extent to which products are usable, accessible, useful, and safe. Products and systems that deviate from users’ mental models may have negative consequences for users, ranging from minor annoyance to more serious consequences such as severe injury or death. Both an introduction and a primer, Cultural Ergonomics: Theory, Methods, ...
Responding to the demand by researchers and practitioners for a comprehensive reference, Handbook of Industrial and Systems Engineering offers full and easy access to a wide range of industrial and systems engineering tools and techniques in a concise format. Providing state of the art coverage from more than 40 contributing authors, many of whom a
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.
The moment of truth-that instant when consumers experience and judge service quality-is often a deciding factor in business success. Designing Service Excellence: People and Technology provides practical information on the design, management, and organization of many different types of service industries, such as hotels, restaurants, banks and fina
Advances in technology continue to alter the ways in which we conduct our lives, from the private sphere to how we interact with others in public. As these innovations become more integrated into modern society, their applications become increasingly relevant in various facets of life. Wearable Technologies: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on the development and implementation of wearables within various environments, emphasizing the valuable resources offered by these advances. Highlighting a range of pertinent topics, such as assistive technologies, data storage, and health and fitness applications, this multi-volume book is ideally designed for researchers, academics, professionals, students, and practitioners interested in the emerging applications of wearable technologies.
Metadata is a key aspect of our evolving infrastructure for information management, social computing, and scientific collaboration. DC-2008 will focus on metadata challenges, solutions, and innovation in initiatives and activities underlying semantic and social applications. Metadata is part of the fabric of social computing, which includes the use of wikis, blogs, and tagging for collaboration and participation. Metadata also underlies the development of semantic applications, and the Semantic Web -- the representation and integration of multimedia knowledge structures on the basis of semantic models. These two trends flow together in applications such as Wikipedia, where authors collective...
Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices.
Best practices, practical advice, and design ideas for successful ecommerce search A glaring gap has existed in the market for a resource that offers a comprehensive, actionable design patterns and design strategies for ecommerce search—but no longer. With this invaluable book, user experience designer and user researcher Greg Nudelman shares his years of experience working on popular ecommerce sites as he tackles even the most difficult ecommerce search design problems. Nudelman helps you create highly effective and intuitive ecommerce search design solutions and he takes a unique forward-thinking look at trends such as integrating searching with browsing to create a single-finding user i...
FLINS, originally an acronym for Fuzzy Logic and Intelligent Technologies in Nuclear Science, is now extended to Computational Intelligence for applied research. The contributions to the ninth in the series of FLINS conferences cover state-of-the-art research, development, and technology for computational intelligence systems — both from foundations and applications points-of-view.