- Table View
- List View
Society with Future: First EAI International Conference, SC4Life 2019, Braga, Portugal, December 4-6, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #318)
by Paulo Pereira Rita Ribeiro Ivo Oliveira Paulo NovaisThis book constitutes the refereed post-conference proceedings of the First International Conference on Society with Future: Smart and Liveable Cities, SC4Life 2019, which took place in Braga, Portugal, in December 2019. The 13 revised full papers were carefully reviewed and selected from 19 submissions. The conference has brought researchers, developers, and practitioners who are leveraging and develoing new knowledge on the topic of smart cities, offering more efficiency to main infrastructures, utilities and services, creating a sustainable urban environment that improves the quality of life for its citizens and enhances economic development.
Socio-cultural Inspired Metaheuristics (Studies in Computational Intelligence #828)
by Kang Tai Suresh Chandra Satapathy Anand J. Kulkarni Pramod Kumar Singh Ali Husseinzadeh KashanThis book presents the latest insights and developments in the field of socio-cultural inspired algorithms. Akin to evolutionary and swarm-based optimization algorithms, socio-cultural algorithms belong to the category of metaheuristics (problem-independent computational methods) and are inspired by natural and social tendencies observed in humans by which they learn from one another through social interactions. This book is an interesting read for engineers, scientists, and students studying/working in the optimization, evolutionary computation, artificial intelligence (AI) and computational intelligence fields.
Socio-Environmental Research in Latin America: Interdisciplinary Approaches Using GIS and Remote Sensing Frameworks (The Latin American Studies Book Series)
by Santiago LópezThis contributed volume presents relevant examples of socio-environmental research that highlight the challenges and opportunities of using geotechnologies in interdisciplinary settings across the vast, culturally, and environmentally mega-diverse region known as Latin America. While remote sensing has been mostly used for mapping and monitoring physical features, geographic information systems open up opportunities for the integration of socio-economic and environmental data collected through individual and community-based surveys, in-situ measurements, and other participatory research techniques to offer additional analytically grounded power when evaluating socio-environmental processes that shape Latin American landscapes. The topics addressed in this book include deforestation and land degradation, borderlands dynamics, agriculture and agroecological systems, environmental conservation and development, public health, tourism, environmental justice, archeology, volunteered geography and urban planning, among others. The book is intended for academics, graduate and undergraduate classrooms, and general audiences with interest in Latin America and the socio-environmental issues that threaten the sustainability of the region and local communities. The book will also appeal to practitioners, managers, and policy makers interested in the application of geo-technologies and field-based research to address complex socio-environmental problems in the Global South.
Socio-Informatics
by David Randall Volker Wulf Kjeld Schmidt Volkmar Pipek Markus Rohde Gunnar StevensThe book is an exploration of the theoretical, conceptual and methodological foundations of human-centred design. Specifically, it critically examines the notion of 'practice' and argues for an understanding of the concept which emanates from engagement with design problems rather than simply from social scientific theory. The contributors to the book in their various ways all subscribe to a systematic account of how practice- oriented studies can inform design. Using the perspective of 'grounded design', it pursues a long term view of the design process, arguing for user engagement from the very earliest stages of design policy, including methods for understanding user practices to inform initial design policies up to and including processes of appropriation as technologies are embedded in contexts of use. Grounded design is a perspective which also deals with the vexed problem of appropriate generalization in design studies and the kinds of cross-comparison that can usefully be done. The book contains a number of case studies which exemplify these themes, some of which are rooted in the use of technology in organizational contexts, others of which deal with design in contexts such as care of the elderly, firefighting and multicultural education.
Socio-Informatics
The book is an exploration of the theoretical, conceptual and methodological foundations of human-centred design. Specifically, it critically examines the notion of 'practice' and argues for an understanding of the concept which emanates from engagement with design problems rather than simply from social scientific theory. The contributors to the book in their various ways all subscribe to a systematic account of how practice- oriented studies can inform design. Using the perspective of 'grounded design', it pursues a long term view of the design process, arguing for user engagement from the very earliest stages of design policy, including methods for understanding user practices to inform initial design policies up to and including processes of appropriation as technologies are embedded in contexts of use. Grounded design is a perspective which also deals with the vexed problem of appropriate generalization in design studies and the kinds of cross-comparison that can usefully be done. The book contains a number of case studies which exemplify these themes, some of which are rooted in the use of technology in organizational contexts, others of which deal with design in contexts such as care of the elderly, firefighting and multicultural education.
Socio-Inspired Optimization Methods for Advanced Manufacturing Processes (Springer Series in Advanced Manufacturing)
by Apoorva Shastri Aniket Nargundkar Anand J. KulkarniThis book discusses comprehensively the advanced manufacturing processes, including illustrative examples of the processes, mathematical modeling, and the need to optimize associated parameter problems. In addition, it describes in detail the cohort intelligence methodology and its variants along with illustrations, to help readers gain a better understanding of the framework. The theoretical and statistical rigor is validated by comparing the solutions with evolutionary algorithms, simulation annealing, response surface methodology, the firefly algorithm, and experimental work. Lastly, the book critically reviews several socio-inspired optimization methods.
A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology (Law, Science and Society)
by Michael Anthony DizonThe relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology (Law, Science and Society)
by Michael Anthony DizonThe relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
A Socio-Legal Theory of Money for the Digital Commercial Society: A New Analytical Framework to Understand Cryptoassets (Hart Studies in Commercial and Financial Law)
by Israel Cedillo LazcanoThis book poses the question: do we need a new body of regulations and the constitution of new regulatory agents to face the evolution of money in the Fourth Industrial Revolution?After the Global Financial Crisis and the subsequent introduction of Distributed Ledger Technologies in monetary matters, multiple opinions claim that we are in the middle of a financial revolution that will eliminate the need for central banks and other financial institutions to form bonds of trust on our behalf. In contrast to these arguments, this book argues that we are not witnessing a revolutionary expression, but an evolutionary one that we can trace back to the very origin of money.Accordingly, the book provides academics, regulators and policy makers with a multidisciplinary analysis that includes elements such as the relevance of intellectual property rights, which are disregarded in the legal analysis of money. Furthermore, the book proposes the idea that traditional analyses on the exercise of the lex monetae ignore the role of inside monies and technological infrastructures developed and supported by the private sector, as exemplified in the evolution of the cryptoassets market and in cases such as Banco de Portugal v Waterlow & Sons.The book puts forward a proposal for the design and regulation of new payment systems and invites the reader to look beyond the dissemination of individual Distributed Ledger Technologies such as Bitcoin.
A Socio-Legal Theory of Money for the Digital Commercial Society: A New Analytical Framework to Understand Cryptoassets (Hart Studies in Commercial and Financial Law)
by Israel Cedillo LazcanoThis book poses the question: do we need a new body of regulations and the constitution of new regulatory agents to face the evolution of money in the Fourth Industrial Revolution?After the Global Financial Crisis and the subsequent introduction of Distributed Ledger Technologies in monetary matters, multiple opinions claim that we are in the middle of a financial revolution that will eliminate the need for central banks and other financial institutions to form bonds of trust on our behalf. In contrast to these arguments, this book argues that we are not witnessing a revolutionary expression, but an evolutionary one that we can trace back to the very origin of money.Accordingly, the book provides academics, regulators and policy makers with a multidisciplinary analysis that includes elements such as the relevance of intellectual property rights, which are disregarded in the legal analysis of money. Furthermore, the book proposes the idea that traditional analyses on the exercise of the lex monetae ignore the role of inside monies and technological infrastructures developed and supported by the private sector, as exemplified in the evolution of the cryptoassets market and in cases such as Banco de Portugal v Waterlow & Sons.The book puts forward a proposal for the design and regulation of new payment systems and invites the reader to look beyond the dissemination of individual Distributed Ledger Technologies such as Bitcoin.
Socio-Technical Aspects in Security: 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13176)
by Simon Parkin Luca ViganòThis book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.
Socio-Technical Aspects in Security and Trust: 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11739)
by Thomas Groß Theo TryfonasThe open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.
Socio-Technical Aspects in Security and Trust: 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12812)
by Thomas Groß Luca ViganòThis book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020. The 8 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions and are organized in the following topical sections: personality and behavior; behavior in face of adversaries; smart environments; decentralized systems and digital ledgers; and reflections on socio-technical aspects of security.The Chapter “Statistical Reliability of 10 Years of Cyber Security User Studies” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Socio-technical Design of Ubiquitous Computing Systems
by Klaus David Kurt Geihs Jan Marco Leimeister Alexander Roßnagel Ludger Schmidt Gerd Stumme Arno WackerBy using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis.Designing such self-adaptive, context-aware knowledge processing systems is, in itself, a formidable challenge. This book presents core findings from the VENUS project at the Interdisciplinary Research Center for Information System Design (ITeG) at Kassel University, where researchers from different fields, such as computer science, information systems, human-computer interaction and law, together seek to find general principles and guidelines for the design of socially aware ubiquitous computing systems. To this end, system usability, user trust in the technology and adherence to privacy laws and regulations were treated as particularly important criteria in the context of socio-technical system design.During the project, a comprehensive blueprint for systematic, interdisciplinary software development was developed, covering the particular functional and non-functional design aspects of ubiquitous computing at the interface between technology and human beings. The organization of the book reflects the structure of the VENUS work program. After an introductory part I, part II provides the groundwork for VENUS by presenting foundational results from all four disciplines involved. Subsequently, part III focuses on methodological research funneling the development activities into a common framework. Part IV then covers the design of the demonstrators that were built in order to develop and evaluate the VENUS method. Finally, part V is dedicated to the evaluation phase to assess the user acceptance of the new approach and applications.The presented findings are especially important for researchers in computer science, information systems, and human-computer interaction, but also for everyone working on the acceptance of new technologies in society in general.
Socio-Technical Networks: Science and Engineering Design
by Fei Hu Ali Mostashari Jiang XieWhile there are sporadic journal articles on socio-technical networks, there's long been a need for an integrated resource that addresses concrete socio-technical network (STN) design issues from algorithmic and engineering perspectives. Filling this need, Socio-Technical Networks: Science and Engineering Design provides a complete introduction to
Socioinformatics - The Social Impact of Interactions between Humans and IT: The Social Impact Of Interactions Between Humans And It (Springer Proceedings in Complexity)
by Katharina Zweig Wolfgang Neuser Volkmar Pipek Markus Rohde Ingo ScholtesSocioinformatics is a new scientific approach to study the interactions between humans and IT. These proceedings are a collection of the contributions during a workshop of the Gesellschaft für Informatik (GI). Researchers in this emerging field discuss the main aspects of interactions between IT and humans with respect to; social connections, social changes, acceptance of IT and the social conditions affecting this acceptance, effects of IT on humans and in response changes of IT, structures of the society and the influence of IT on these structures, changes of metaphysics influenced by IT and the social context of a knowledge society.
Sociomaterial-Design: Bounding Technologies in Practice (Computer Supported Cooperative Work)
by Pernille Bjørn Carsten ØsterlundInvestigates theoretically and empirically what it means to design technological artefacts while embracing the large number of practices which practitioners engage with when handling technologies. The authors discusses the fields of design and sociomateriality through their shared interests towards the basic nature of work, collaboration, organization, technology, and human agency, striving to make the debates and concepts originating in each field accessible to each other, and thus moving sociomateriality closer to the practical concerns of design and providing a useful analytical toolbox to information system designers and field researchers alike.Sociomaterial-Design: Bounding Technologies in Practice takes on the challenge of redefining design practices through insights from the emerging debate on sociomateriality. It does so by bringing forward a comparative examination of two longitudinal ethnographic studies of the practices within two emergency departments – one in Canada and one in the United States of America. A particular focus is placed upon the use of current collaborative artefacts within the emergency departments and the transformation into digital artefacts through design.
Sociometrics and Human Relationships: Analyzing Social Networks to Manage Brands, Predict Trends, and Improve Organizational Performance
by Peter A. GloorSociometrics and Human Relationships translates the latest academic research into practical business strategies and techniques as well as actionable insights, providing a wealth of examples for social network analysis and predicting trends. Gloor illustrates how to improve organizational performance by optimizing communication and collaboration through email. Based on Collaborative Innovation Networks courses which have been taught for over a decade to students forming virtual teams across a number of universities, Gloor shows readers how to leverage virtual collaborative creativity in the Internet age, and helps them understand and apply the dynamics of online communication via a variety of tools. Gloor has also created a tool that analyses all types of social media such as: Twitter, Wikipedia, online blogs and Facebook as well as email or Skype logs to predict election outcomes, perception and strength of brands, customer and employment satisfaction, or fraudulent behavior. Gloor explains how to use his tool, Condor, to visualize, monitor and manage brands, products and topics online, as well as analyzing organizations through their email networks.
Sociometrics and Human Relationships: Analyzing Social Networks to Manage Brands, Predict Trends, and Improve Organizational Performance
by Peter A. GloorSociometrics and Human Relationships translates the latest academic research into practical business strategies and techniques as well as actionable insights, providing a wealth of examples for social network analysis and predicting trends. Gloor illustrates how to improve organizational performance by optimizing communication and collaboration through email. Based on Collaborative Innovation Networks courses which have been taught for over a decade to students forming virtual teams across a number of universities, Gloor shows readers how to leverage virtual collaborative creativity in the Internet age, and helps them understand and apply the dynamics of online communication via a variety of tools. Gloor has also created a tool that analyses all types of social media such as: Twitter, Wikipedia, online blogs and Facebook as well as email or Skype logs to predict election outcomes, perception and strength of brands, customer and employment satisfaction, or fraudulent behavior. Gloor explains how to use his tool, Condor, to visualize, monitor and manage brands, products and topics online, as well as analyzing organizations through their email networks.
Socionics: Scalability of Complex Social Systems (Lecture Notes in Computer Science #3413)
by Klaus Fischer Michael Florian Thomas MalschSociophysics Approach to Epidemics (Evolutionary Economics and Social Complexity Science #23)
by Jun TanimotoThis book presents the fundamentals of evolutionary game theory and applies them to the analysis of epidemics, which is of paramount importance in the aftermath of the worldwide COVID-19 pandemic. The primary objective of this monograph is to deliver a powerful tool to model and analyze the spread of an infectious disease during a pandemic as well as the human decision dynamics. The book employs a variant of the “vaccination game,” in which a mathematical epidemiological model dovetails with evolutionary game theory. From a social physics standpoint, this book introduces an extended concept of the vaccination game starting from the fundamental issues and touching on the newest practical applications.The book first outlines the fundamental basis of evolutionary game theory, in which a two-player and two-strategy game, the so-called 2 × 2 game, and a multi-player game are concisely introduced, and the important issue of how social dilemmas are quantified is highlighted. Subsequently, the book discusses various recent applications of the extended concept of the vaccination game so as to quantitatively evaluate provisions other than vaccination, including practical intermediate protective measures such as mask-wearing, efficiency of quarantine compared with that of isolation policies for suppressing epidemics, efficiency of preemptive versus late vaccination, and optimal subsidy policies for vaccination.
Sociorobot World: A Guided Tour for All (Intelligent Systems, Control and Automation: Science and Engineering #1048)
by Spyros TzafestasThis book makes a consolidated guided tour to the world of sociorobots (social or socialized robots).Sociorobots and assistive robots provide entertainment, assistance to the handicapped, companionship to the elderly and health care to autistic children and people with dementia. The book provides, in a fluent educational way, all major concepts, architectures and design methodologies. All types of sociorobots are examined, namely walking anthropomorphic, wheeled anthropomorphic, fixed-place anthropomorphic and zoomorphic sociorobots. The book provides an outline of sociorobot intelligent control architectures, robot learning and human robot interaction.
Socket.IO Cookbook
by Tyson CadenheadOver 40 recipes to help you create real-time JavaScript applications using the robust Socket.IO framework About This Book • Create secure WebSocket connections and real-time mobile applications using Socket.IO • Devise efficient messaging systems between the server side and the client side • A step-by-step implementation guide to help you create elements of Socket.IO application Who This Book Is For If you have some knowledge of JavaScript and Node.js and want to create awe-inspiring application experiences using real time communication, then this book is for you. Developers with knowledge of other scripting languages should also be able to easily follow along. What You Will Learn • Build rich and interactive real-time dashboards using Socket.IO to pipe in data as it becomes available • Design chat and multiple-person interfaces that leverage Socket.IO for communication • Segment conversations to rooms and namespaces so that every socket doesn't have to receive every message • Secure your data by implementing various authentication techniques, locking down the HTTP referrer and using secure WebSockets • Load balance across multiple server-side nodes and keep your WebSockets in sync using Redis, RabbitMQ or Memcached • Stream binary data such as audio and video in real-time over a Socket.IO connection • Create real-time experiences outside of the browser by integrating Socket.IO with hybrid mobile applications In Detail Socket.IO is a JavaScript library that provides you with the ability to implement real-time analytics, binary streaming, instant messaging, and document collaboration. It has two parts: a client-side library that runs in the browser, and a server-side library for node.js. Socket.IO is event-driven and primarily uses the WebSocket protocol that allows us to emit data bi-directionally from the server and the client. Socket.IO This book is a complete resource, covering topics from webSocket security to scaling the server-side of a Socket.IO application and everything in between. This book will provide real-world examples of how secure bi-directional, full-duplex connections that can be created using Socket.IO for different environments. It will also explain how the connection vulnerabilities can be resolved for large numbers of users and huge amounts of data/messages. By the end of the book, you will be a competent Socket.IO developer. With the help of the examples and real-world solutions,you will learn to create fast, scalable, and dynamic real-time apps by creating efficient messaging systems between the server side and the client side using Socket.IO. Style and approach This book is written in a cookbook-style format and provides practical, immediately usable task-based recipes that show you how to create the elements of a Socket.IO application.
Socket.io Real-time Web Application Development
by Rohit RaiWritten in an engaging, easy-to-follow style, "Socket.io Real-time Web Application Development" is a practical guide for developing real-time web applications with Node.js and socket.io.This book is aimed at developers who want to start developing highly interactive and real-time web applications like chat systems or online multiplayer games, or want to introduce real-time updates or server push mechanisms in their existing applications. Knowledge of developing in JavaScript and web applications in general is expected. Though there is a chapter on introducing Node.js, prior knowledge of Node.js will be a plus.
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
by James C FosterThe book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode – Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting – Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not "recreate the wheel.5. Coding Tools – The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.