Account
Orders
Advanced search
Where do the digital humanities really come from? Are they really news? What are the theoretical and technical influences that participate in this scientific field that arouses interest and questions? This book tries to show and explain the main theories and methods...
For 200 years, industry mastered iron, fire, strength and energy. Today, electronics shapes our everyday objects, integrating chips: computers, phones, keys, games, household appliances, etc. Data, software and calculation frame the conduct of humankind, and everything...
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually...
The aim of this book is to describe the methodology of conducting the THEDRE research "Traceable Human Experiment Design Research". It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users to build scientific...
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences, similarities and...
Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rendered on the screen...
This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value creation process, the...
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet,...
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As...
Collective Intelligence and Digital Archives DIGITAL TOOLS AND USES SET Coordinated by Imad Saleh This book presents the most up-to-date research from different areas of digital archives to show how and why collective intelligence is being developed to organize and...
This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The design and visualization schemes included in any system will be related to the variety of social and technical complexities...
Digital technologies are reshaping every field of social and economic lives, so do they in the world of scientific knowledge. “The New Challenges of Knowledge” aims at understanding how the new digital technologies alter the production, diffusion and valorization of...
This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relational processes. The purpose is to help the reader become a better Collective Intelligence Leader, who will be able to...
The main aim of this book is to offer companies a simple and practical method to assess their maturity in the Governance Information System, so that they are in working order to face the challenges of Digital Transformation. How can companies effectively manage their...
People now view digital services and applications as an essential part of their lives and as carriers of great benefits. Nevertheless, because they provide a new space for criminals, terrorists and others with malicious intent, digital technologies also present...
There is a great transformation of the production of knowledge and intelligibility. The "digital fold of the world" (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also controversial issues....
Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression and communication, a tool in the fight against terrorism or the source of a new economic wealth. Computerization has unexpectedly progressed...
Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information...
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibilities for investigation and application. This book provides keys for understanding and designing these multi-disciplinary...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers