You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Structuring, or, as it is referred to in the title of this book, the art of structuring, is one of the core elements in the discipline of Information Systems. While the world is becoming increasingly complex, and a growing number of disciplines are evolving to help make it a better place, structure is what is needed in order to understand and combine the various perspectives and approaches involved. Structure is the essential component that allows us to bridge the gaps between these different worlds, and offers a medium for communication and exchange. The contributions in this book build these bridges, which are vital in order to communicate between different worlds of thought and methodology – be it between Information Systems (IS) research and practice, or between IS research and other research disciplines. They describe how structuring can be and should be done so as to foster communication and collaboration. The topics covered reflect various layers of structure that can serve as bridges: models, processes, data, organizations, and technologies. In turn, these aspects are complemented by visionary outlooks on how structure influences the field.
This book constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Smart Working, Living and Organising" on Transfer and Diffusion of IT, TDIT 2018, held in Portsmouth, UK, in June 2018. The 17 revised full papers and 2 short papers presented were carefully reviewed and selected from 34 submissions. They deal with the adoption of new classes of technology used by individuals, organisations, sectors and society with a particular focus on how emerging technologies are adopted and appropriated in organisations and everday life and their impact. The papers are organized in the following topical sections: being smart: adoption challenges; sharing economy and social media; government and infrastructure; IT project management; and revisiting concepts and theories.
Implementing new information technologies into the healthcare sector can provide alternatives to managing patients’ health records, systems, and improving the quality of care received. This book provides an overview of Internet of Things (IoT) technologies related to the healthcare field and covers the main advantages and disadvantages along with industry case studies. This edited volume covers required standardization and interoperability initiatives, various Artificial Intelligence and Machine Learning algorithms, and discusses how health technology can meet the challenge of improving quality of life regardless of social and financial status, gender, age, and location. The book presents real-time applications and case studies in the fields of engineering, computer science, IoT, and healthcare and provides many examples of successful IoT projects. The target audience for this edited volume includes researchers, practitioners, students, as well as key stakeholders involved in and working on healthcare engineering solutions.
This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.
This edited collection provides an invaluable resource of seventeen chapters from a wide range of academic disciplines. These chapters place sex and sexualities in Ireland in historical context and take the reader through the structural changes that have transformed the expression of sexuality in Ireland from one of self-denial to self-expression. The collection does not however unquestionably assume a linear narrative of progress: new issues and challenges are also addressed throughout. This book will be of interest to students and scholars from a range of disciplines including sociology, social policy, history, media, gender studies and psychology. The collection is divided into six separate but interlinked thematic sections: Sexualities in Historical Irish Contexts, Young Adults, Sexual Health, and Education, Sexual Practices and Health, Minority Sexualities and Genders, Sex Work in Ireland and Activism and Contestation.
The 3-volume set LNCS 8510, 8511 and 8512 constitutes the refereed proceedings of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.
In times of crisis, it is crucial that information is disseminated quickly and accurately to the appropriate channels. In today’s technological world, there is a plethora of misinformation that can negatively sway individuals and provide them with false reports. To ensure information is distributed appropriately, organizations must implement a plan to ensure their communication is effective. Further study on the best practices and challenges of managing crisis and risk communications is required to ensure organizations are prepared. The Research Anthology on Managing Crisis and Risk Communications discusses strategies and tactics to effectively manage communication in times of crisis and c...
The 3-volume set LNCS 8510, 8511 and 8512 constitutes the refereed proceedings of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.
The four-volume set LNCS 8513-8516 constitutes the refereed proceedings of the 8th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 14 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-comp...
"This multiple-volume publications exhibits the most up-to-date collection of research results and recent discoveries in the transfer of knowledge access across the globe"--Provided by publisher.