Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Mobile User Research
  • Language: en
  • Pages: 202

Mobile User Research

This book will give you a practical overview of several methods and approaches for designing mobile technologies and conducting mobile user research, including how to understand behavior and evaluate how such technologies are being (or may be) used out in the world. Each chapter includes case studies from our own work and highlights advantages, limitations, and very practical steps that should be taken to increase the validity of the studies you conduct and the data you collect. This book is intended as a practical guide for conducting mobile research focused on the user and their experience. We hope that the depth and breadth of case studies presented, as well as specific best practices, will help you to design the best technologies possible and choose appropriate methods to gather ethical, reliable, and generalizable data to explore the use of mobile technologies out in the world.

Handbook of Ambient Intelligence and Smart Environments
  • Language: en
  • Pages: 1290

Handbook of Ambient Intelligence and Smart Environments

Our homes anticipate when we want to wake up. Our computers predict what music we want to buy. Our cars adapt to the way we drive. In today’s world, even washing machines, rice cookers and toys have the capability of autonomous decision-making. As we grow accustomed to computing power embedded in our surroundings, it becomes clear that these ‘smart environments’, with a number of devices controlled by a coordinating system capable of ‘ambient intelligence’, will play an ever larger role in our lives. This handbook provides readers with comprehensive, up-to-date coverage in what is a key technological field. . Systematically dealing with each aspect of ambient intelligence and smart...

Supporting Users in Password Authentication with Persuasive Design
  • Language: en
  • Pages: 318

Supporting Users in Password Authentication with Persuasive Design

  • Type: Book
  • -
  • Published: 2018-08-03
  • -
  • Publisher: Tobias Seitz

Activities like text-editing, watching movies, or managing personal finances are all accomplished with web-based solutions nowadays. The providers need to ensure security and privacy of user data. To that end, passwords are still the most common authentication method on the web. They are inexpensive and easy to implement. Users are largely accustomed to this kind of authentication but passwords represent a considerable nuisance, because they are tedious to create, remember, and maintain. In many cases, usability issues turn into security problems, because users try to work around the challenges and create easily predictable credentials. Often, they reuse their passwords for many purposes, wh...

Pervasive Computing
  • Language: en
  • Pages: 359

Pervasive Computing

This book constitutes the refereed proceedings of the Third International Conference on Pervasive Computing, PERVASIVE 2005, held in Munich, Germany in May 2005. The 20 revised full papers presented were carefully reviewed and selected from 130 submissions. The papers are organized in topical sections on location techniques, activity and context, location and privacy, handheld devices, sensor systems, and user interaction.

Left to Our Own Devices
  • Language: en
  • Pages: 187

Left to Our Own Devices

  • Type: Book
  • -
  • Published: 2024-05-21
  • -
  • Publisher: MIT Press

Unexpected ways that individuals adapt technology to reclaim what matters to them, from working through conflict with smart lights to celebrating gender transition with selfies. We have been warned about the psychological perils of technology: distraction, difficulty empathizing, and loss of the ability (or desire) to carry on a conversation. But our devices and data are woven into our lives. We can't simply reject them. Instead, Margaret Morris argues, we need to adapt technology creatively to our needs and values. In Left to Our Own Devices, Morris offers examples of individuals applying technologies in unexpected ways—uses that go beyond those intended by developers and designers. Morri...

Pervasive Information Systems
  • Language: en
  • Pages: 265

Pervasive Information Systems

Today's ubiquitous computing technology is imbedded in everyday objects from cars to clothes to shipping containers, whose location, context, and state can be monitored, instantly processed, and acted upon. This new volume in the "Advances in Management Information Systems" series provides an in-depth review of the state-of-the-art practices and research opportunities in a new era where information technology resides in physical space. Written for both scholars and practitioners, "Pervasive Information Systems" is organized into three sections, each investigating a distinct part of the subject. Part I focuses on the design challenges of Pervasive Information Systems (PS), and discusses issues relating to the coordination of PS through middleware structures as well as issues related to the efficient deployment of PS. Part II discusses the challenges and limitations of deploying pervasive technologies to support domestic, corporate, and public systems. Part III presents two emerging research fields of PS - design for aesthetics and PS evaluation.

Privacy, Security and Trust within the Context of Pervasive Computing
  • Language: en
  • Pages: 167

Privacy, Security and Trust within the Context of Pervasive Computing

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Advanced Location-Based Technologies and Services
  • Language: en
  • Pages: 348

Advanced Location-Based Technologies and Services

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

Since the publication of the first edition in 2004, advances in mobile devices, positioning sensors, WiFi fingerprinting, and wireless communications, among others, have paved the way for developing new and advanced location-based services (LBSs). This second edition provides up-to-date information on LBSs, including WiFi fingerprinting, mobile computing, geospatial clouds, geospatial data mining, location privacy, and location-based social networking. It also includes new chapters on application areas such as LBSs for public health, indoor navigation, and advertising. In addition, the chapter on remote sensing has been revised to address advancements.

Mensch und Computer 2015 – Workshopband
  • Language: en
  • Pages: 842

Mensch und Computer 2015 – Workshopband

The Workshop Volume from the Humans and Computers Conference documents the advanced tutorials that were presented to deepen the understanding gained from the conference lectures. It presents case studies along with accompanying exercises.

Social Exclusion, Power, and Video Game Play
  • Language: en
  • Pages: 284

Social Exclusion, Power, and Video Game Play

While many books and articles are emerging on the new area of game studies and the application of computer games to learning, therapeutic, military and entertainment environments, few have attempted to contextualize the importance of virtual play within a broader social, cultural and political environment that raises the question of the significance of work, play, power and inequalities in the modern world. Many studies tend to concentrate on the content of virtual games, but few have questioned how power is produced or reproduced by publishers, gamers or even social media; how social exclusion (e.g., race, class, gender, etc.) in the virtual environments are reproduced from the real world; and how actors are able to use new media to transcend their fears, anxieties, prejudices and assumptions. The articles presented by the contributors in this volume represent cutting-edge research in the area of critical game play with the hope to draw attention to the need for more studies that are both sociological and critical.