The Internet has had and will continue to have a profound effect
on society. It is hard to imagine life without such technologies as
computers, cell phones, gaming devices, and so on. The Internet,
World Wide Web, and their associated technologies have altered
our social and personal experience of the world. In no other time in...
One of the most important things an architect can do is reflection. That is, examine
systems, organizations, people and ask “What alternatives were considered and why
was that particular decision made?” Thinking about the response gives an architect
insight into the motivations and decision processes that others have used...
The 14th International Conference on Human–Computer Interaction, HCI International
2011, was held in Orlando, Florida, USA, July 9–14, 2011, jointly
with the Symposium on Human Interface (Japan) 2011, the 9th International
Conference on Engineering Psychology and Cognitive Ergonomics, the 6th International
Conference on...
Where does that kernel of inspiration come from? Does it hit you
when you are in the shower or when you are driving on the turnpike?
Wherever it takes hold of you, it marks the beginning of the process of
making a piece of art. Some artists agonize step-by-step in the creation
process. For some people the work fl ows seamlessly from...
This earliest recorded attempt to regulate the engineering profession reminds
us, in the bluntest way possible, that the paramount purpose of engineering and
engineering design is to serve the user. One would assume that the engineer’s
responsibility to users is so self evident that it goes without saying. Various
professional...
What do people learn when they do not know that they are learning? Until recently all of the work in the area of implicit learning focused on empirical questions and methods. In this book, Axel Cleeremans explores unintentional learning from an information-processing perspective. He introduces a theoretical framework that unifies existing...
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...
We are excited to publish the third edition of Ethics in Information Technology. This new
edition builds on the success of the previous editions and meets the need for a resource that
helps readers understand many of the legal, ethical, and societal issues associated with IT.
We have responded to the feedback from our first and second...
Developing games for the iPhone or iPad can be a lot of fun. It is one of the few
things we can do to feel like a kid again. Everyone, it seems, has an idea for a game,
and what better platform to develop for than the iPhone and iPad?
What stops most people from actually developing...
With the dramatic changes in computing power and wider availability of software
tools for design and production, engineers are now using CAD/CAM/CAE systems
for everyday tasks, not just for demonstrations. International competition, de-
creased availability of skilled labor, and increased emphasis on quality are also
forcing...
Late last year, in 2008, I was fi nishing work on another book called Electricity
for the Entertainment Electrician & Technician when Danielle Monroe, one of
the many wonderful people at Focal Press, sent me an email. Almost as an
afterthought—one of those oh-by-the-ways—she mentioned that we should
start work on...
Facebook has taken the world by storm and just breached the 500 million-user mark as its popularity continues to increase every day the world over. Yet, despite its popularity, many people are not aware of all that Facebook has to offer. This handy, approachable guide shares...