You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The 3 volume-set LNCS 11566, 11567 + 11568 constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 21st International Conference on Human-Computer Interaction, HCII 2019, which took place in Orlando, Florida, USA, in July 2019. A total of 1274 papers and 209 posters have been accepted for publication in the HCII 2019 proceedings from a total of 5029 submissions. The 125 papers included in this HCI 2019 proceedings were organized in topical sections as follows: Part I: design and evaluation methods and tools; redefining the human in HCI; emotional design, Kansei and aesthetics in HCI; and narrative, storytelling, discourse and dialogue. Part II: mobile interaction; facial expressions and emotions recognition; eye-gaze, gesture and motion-based interaction; and interaction in virtual and augmented reality. Part III: design for social challenges; design for culture and entertainment; design for intelligent urban environments; and design and evaluation case studies.
As computer and internet technologies continue to advance at a fast pace, the rate of cybercrimes is increasing. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security, while cyberbullying, cyberstalking, child pornography, and trafficking crimes are made easier through the anonymity of the internet. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. Digital Forensics and Forensic Investigations: Breakthroughs in Research and Practice addresses current chall...
In the rapidly evolving digital landscape, the ability to connect with consumers through personalized and programmatic advertising has become a vital skill for global companies. As the market undergoes a paradigm shift towards consumer-centric approaches, the need for comprehensive knowledge in this domain is escalating every day. Connecting With Consumers Through Effective Personalization and Programmatic Advertising addresses a timely and pivotal theme that is crucial for companies and the academic community. By bridging the gap between theory and practice, this book equips readers with the tools and strategies necessary to make informed decisions and navigate the dynamic landscape of digital marketing. The book's invaluable content serves as a reliable resource for decision-makers in companies seeking to optimize their digital marketing strategies. It also delves into the depths of knowledge, skills, and processes behind effective personalization and programmatic advertising, offering valuable insights for researchers, teachers, students, and professionals alike.
This book presents the Proceedings of The 4th Brazilian Technology Symposium (BTSym'18). Part I of the book discusses current technological issues on Systems Engineering, Mathematics and Physical Sciences, such as the Transmission Line, Protein-modified mortars, Electromagnetic Properties, Clock Domains, Chebyshev Polynomials, Satellite Control Systems, Hough Transform, Watershed Transform, Blood Smear Images, Toxoplasma Gondi, Operation System Developments, MIMO Systems, Geothermal-Photovoltaic Energy Systems, Mineral Flotation Application, CMOS Techniques, Frameworks Developments, Physiological Parameters Applications, Brain Computer Interface, Artificial Neural Networks, Computational Vis...
Impact communities are the places where individuals gather to contribute to the transformation of their territories by disseminating knowledge. As such, it is vital to research the use of open and social learning in contributing to the evolution of impact communities and smart territories. Open and Social Learning in Impact Communities and Smart Territories is an essential reference source that discusses the learning processes in impact communities and in smart territories through case studies and other research methods. Featuring research on topics such as learning processes, smart communities, and social entrepreneurship, this book is ideally designed for entrepreneurs, managers, academicians, and researchers seeking coverage on the concept of impact communities and smart territories.
This book constitutes the refereed joint proceedings of eight international workshops held in conjunction with the 28th International Conference on Conceptual Modeling, ER 2009, in Gramado, Brazil, in November 2009. The 33 revised full papers presented were carefully reviewed and selected from 100 submissions. Topics addressed by the workshops are active conceptual modeling of learning (ACM-L), conceptual modeling in the large (CoMoL), evolving theories of conceptual modeling (ETheCoM), workshop on foundations and practices of UML (FP-UML), joint international workshop on metamodels, ontologies, semantic technologies, and information systems for the semantic web (MOST-ONISW), quality of information systems (QoIS), requirements, Intentions and goals in conceptual modeling ( RIGiM) and semantic and conceptual issues in geographic information systems (SeCoGIS).
Tourists frequently rely on social networks to provide information about a product or destination as a decision support tool to make adequate decisions in the process of planning a trip. In this digital environment, tourists share their travel experiences, impressions, emotions, special moments, and opinions about an assortment of tourist services like hotels, restaurants, airlines, and car rental services, all of which contribute to the online reputation of a tourist destination. The Handbook of Research on Social Media Applications for the Tourism and Hospitality Sector is a fundamental reference source that provides vital theoretical frameworks and the latest innovative empirical research findings of online social media in the tourism industry. While highlighting topics such as e-business, mobile marketing, and smart tourism, this publication explores user-generated content and the methods of mobile strategies. This book is ideally designed for tour developers, travel agents, restaurateurs, hotel management, tour directors, entrepreneurs, social media analysts, managers, industry professionals, academicians, researchers, and students.
This book explores the dynamic landscape in contemporary newsrooms across three continents by investigating the impact that the processes of searching, processing, and distributing data and information and the use of big data, with secure, automatic, and agile retrieval of information all have in this context. Journalistic organizations have undergone digital transformations, and only those implementing accurate transformations survive. In so doing, the book addresses the fields of e-Communication, Computer Science, and Information Science and other areas of the authors’ expertise. The first five chapters focus on technical visits to investigate newsrooms’ productive routines and flows i...
The three-volume set LNCS 10288, 10289, and 10290 constitutes the proceedings of the 6th International Conference on Design, User Experience, and Usability, DUXU 2017, held as part of the 19th International Conference on Human-Computer Interaction, HCII 2017, in Vancouver, BC, Canada, in July 2017, jointly with 14 other thematically similar conferences. The total of 1228 papers presented at the HCII 2017 conferences were carefully reviewed and selected from 4340 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of Human-Com...
With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.