This two-volume set CCIS 166 and CCIS 167 constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2011, held in Dijon, France, in June 2010. The 128 revised full papers presented in both volumes were carefully reviewed and selected from 330 submissions. The papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; Distributed and Parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.
The rapid development of information communication technologies (ICTs) is having a profound impact across numerous aspects of social, economic, and cultural activity worldwide, and keeping pace with the associated effects, implications, opportunities, and pitfalls has been challenging to researchers in diverse realms ranging from education to competitive intelligence.
This two-volume set CCIS 166 and 167 constitutes the refereed proceedings of the International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2011, held in Dijon, France, in June 2010. The 128 revised full papers presented in both volumes were carefully reviewed and selected from 330 submissions. The papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; Distributed and Parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.
This book presents state-of-the-art research into the application of information and communication technologies to travel and tourism. The range of topics covered is broad, encompassing digital marketing and social media, mobile computing and web design, semantic technologies and recommender systems, augmented and virtual reality, electronic distribution and online travel reviews, MOOC and eLearning, eGovernment, and the sharing economy. There is a particular focus on the development of digital strategies, the impact of big data, and the digital economy. In addition to the description of research advances and innovative ideas, readers will find a number of informative industrial case studies. The contents of the book are based on the 2017 ENTER eTourism conference, held in Rome. The volume will be of interest to all academics and practitioners who wish to keep abreast of the latest developments in eTourism.
This book gathers the proceedings of the 16th International Conference on Computing and Information Technology (IC2IT 2020), held on May 14th–15th, 2020, at Dusit Thani Pattaya, Thailand. The topics covered include big data, artificial intelligence, machine learning, natural language processing, speech recognition, image and video processing, and deep learning. In turn, the topics represent major research and engineering directions for autonomous driving, language assistants, automatic translation, and answering systems. Lastly, they are responses to major economic changes around the world, which are increasingly shaped by the need for enhanced globalization and worldwide cooperation, and by emerging global problems.
Presenting an overview of the most important factors that determine whether the application of ICT in organizations will succeed or fail, this text pays attention to technical, organizational and economic perspectives as well as examining psychological and user perspectives.
The production and consumption of Information and Communication Technologies (or ICTs) have become embedded within our societies. The influence and implications of this have an impact at a macro level, in the way our governments, economies, and businesses operate, and in our everyday lives. This handbook is about the many challenges presented by ICTs. It sets out an intellectual agenda that examines the implications of ICTs for individuals, organizations, democracy, and the economy. Explicity interdisciplinary, and combining empirical research with theoretical work, it is organised around four themes covering the knowledge economy; organizational dynamics, strategy, and design; governance and democracy; and culture, community and new media literacies. It provides a comprehensive resource for those working in the social sciences, and in the physical sciences and engineering fields, with leading contemporary research informed principally by the disciplines of anthropology, economics, philosophy, politics, and sociology.
"This collection compiles research in all areas of the global information domain. It examines culture in information systems, IT in developing countries, global e-business, and the worldwide information society, providing critical knowledge to fuel the future work of researchers, academicians and practitioners in fields such as information science, political science, international relations, sociology, and many more"--Provided by publisher.
The industrial nations of the world have become Information Societies. Advanced technologies have created a communication revolution, and the individual, through the advent of computers, has become an active participant in this process. The "human" aspect, therefore, is as important as technologically advanced media systems in understanding communication technology. The flagship book in the Series in Communication Technology & Society, Communication Technology introduces the history and uses of the new technologies and examines basic issues posed by interactive media in areas that affect intellectual, organization, and social life. Author and series co-editor Everett M. Rogers defines the field of communication technology with its major implications for researchers, students, and practitioners in an age of ever more advanced information exchange.
We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.