feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Die angezeigten Daten werden derzeit aktualisiert.
Derzeit steht der Fernleihindex leider nicht zur Verfügung.
Export
Filter
  • Online Resource  (7)
  • UB Potsdam  (5)
  • HU Berlin  (2)
  • SB Königs Wusterhausen
  • Akademie d. Wiss.
  • Medienzentrum Ostprignitz-Ruppin
  • Computer Science  (4)
  • Geography  (3)
Type of Medium
Language
Region
Library
Years
Access
  • 1
    UID:
    b3kat_BV046083636
    Format: 1 Online-Ressource (xii, 862 Seiten) , Illustrationen, Diagramme (teilweise farbig)
    ISBN: 9783030156046
    Series Statement: World Sustainability Series
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-3-030-15603-9
    Additional Edition: Erscheint auch als Druck-Ausgabe, Softcover ISBN 978-3-030-15605-3
    Additional Edition: Erscheint auch als Druck-Ausgabe, Softcover ISBN 978-3-030-15606-0
    Language: English
    Subjects: Education , Geography , General works
    RVK:
    RVK:
    RVK:
    Keywords: Nachhaltigkeit ; Hochschulbildung ; Hochschuldidaktik ; Projektunterricht ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Leal Filho, Walter 1965-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV047413598
    Format: 1 Online-Ressource (384 Seiten) , 2.955 MB
    ISBN: 9783955716592
    Uniform Title: Coming back to life: The updated guide to the work that reconnects
    Content: Wir können immer das Leben wählen Klimawandel, radioaktive Verseuchung, Fracking, Genmanipulation. Diese entmutigende Liste zum Zustand unsere Welt ließe sich fortsetzen - und dennoch: Wir haben noch immer die Möglichkeit, zum Wohle einer lebenswerten Welt zu handeln. Denn: Wir können unsere Bedürfnisse erfüllen, ohne unser lebenserhaltendes System zu zerstören. Dafür haben wir das notwendige Wissen und die technischen Möglichkeiten. Alles was wir noch brauchen ist der kollektive Wille, beides in diesem Sinne einzusetzen. Dieses Buch ist ein Leitfaden. Es hilft uns, unsere natürliche Vitalität und Entschlossenheit zu entdecken und so die Selbstheilungskräfte unserer Welt zu unterstützen. Im Zentrum steht eine besondere Form der Gruppenarbeit, die Joanna Macy in den 1970er-Jahren begonnen und die sich seither stetig weiter entwickelt hat. Ungeachtet der sich rapide verschlechternden sozialen und ökologischen Rahmenbedingungen hat sie Hunderttausenden Frauen und Männern rund um den Erdball geholfen, solidarisch und mutig zu handeln. Das Buch erschien 2003 erstmals in deutscher Übersetzung, unter dem Titel "Die Reise ins lebendige Leben". Es wurde gründlich überarbeitet und die aktuellen Entwicklungen wurden einbezogen
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783955716288
    Language: German
    Subjects: Geography , Psychology , Theology
    RVK:
    RVK:
    RVK:
    Keywords: Gesellschaft ; Entwicklung ; Nachhaltigkeit ; Ganzheit ; Spiritualität ; Lebensführung ; Gruppenarbeit ; Meditation
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Brown, Molly
    Author information: Hamburger, Gunter 1951-
    Author information: Macy, Joanna 1929-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Boca Raton ; London ; New York : CRC Press
    UID:
    b3kat_BV046676201
    Format: 1 Online-Ressource (xxix, 397 Seiten) , Illustrationen, Diagramme
    Edition: Second edition
    ISBN: 9781498738569 , 9781498738545 , 9781315382159
    Note: Auf der Webseite ist der Erscheinungstermin abweichend, mit "30 September 2016" angegeben, im PDF ist das Copyrightjahr mit 2017 angegeben
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-4987-3848-4
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Maschinelles Lernen ; Einführung
    Author information: Girolami, Mark 1963-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV041402763
    Format: 1 Online-Ressource (VI, 581 S.) , graph. Darst., Kt.
    Edition: 1. ed.
    ISBN: 0199599866 , 9780191758065
    Series Statement: Oxford Quick reference collection
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-0-19-959986-8
    Language: English
    Subjects: Geography
    RVK:
    RVK:
    Keywords: Anthropogeografie ; Wörterbuch ; Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [San Rafael] : Morgan & Claypool Publishers
    UID:
    gbv_728860678
    Format: 1 Online-Ressource (xv, 113 Seiten) , Illustrationen
    Edition: Electronic reproduction; Available via World Wide Web
    ISBN: 9781608459018
    Series Statement: Synthesis lectures on human-centered informatics #14
    Content: Theory is the bedrock of many sciences, providing a rigorous method to advance knowledge, through testing and falsifying hypotheses about observable phenomena. To begin with, the nascent field of HCI followed the scientific method borrowing theories from cognitive science to test theories about user performance at the interface. But HCI has emerged as an eclectic interdiscipline rather than a well-defined science. It now covers all aspects of human life, from birth to bereavement, through all manner of computing, from device ecologies to nano-technology. It comes as no surprise that the role of theory in HCI has also greatly expanded from the early days of scientific testing to include other functions such as describing, explaining, critiquing, and as the basis for generating new designs.The book charts the theoretical developments in HCI, both past and present, reflecting on how they have shaped the field. It explores both the rhetoric and the reality: how theories have been conceptualized, what was promised, how they have been used and which has made the most impact in the field -- and the reasons for this. Finally, it looks to the future and asks whether theory will continue to have a role, and, if so, what this might be
    Content: 4. Classical theories -- 4.1 Body of knowledge -- 4.2 Applying basic research -- 4.3 Cognitive modeling --
    Content: 2. The backdrop to HCI theory -- 2.1 Transforming society -- 2.2 HCI's growing pains -- 2.3 Adolescent HCI -- 2.4 Grown-up HCI: reframing theory --
    Content: 3. The role and contribution of theory in HCI -- 3.1 Introduction -- 3.2 Importing theory -- 3.3 Different roles and expectations -- 3.4 A taxonomy of HCI theory: classical, modern and contemporary --
    Content: 1. Introduction -- 1.1 Burgeoning HCI -- 1.2 Conceptualizing HCI: from paradigms to frameworks -- 1.3 Aims of the book -- 1.4 Parallels with art history --
    Content: 5. Modern theories -- 5.1 External cognition -- 5.1.1 Cognitive dimensions -- 5.1.2 Wright et al.'s resources model -- 5.2 Distributed cognition -- 5.3 Ecological psychology -- 5.4 Situated action -- 5.5 Ethnomethodology and ethnography -- 5.6 CSCW theories -- 5.7 Activity theory -- 5.8 Grounded theory -- 5.9 Hybrid theories --
    Content: 6. Contemporary theory -- 6.1 Human values -- 6.2 Turn to design -- 6.3 Turn to culture -- 6.4 Turn to the wild -- 6.5 Turn to embodiment -- 6.6 The next turn --
    Content: 7. Discussion -- 7.1 Most successful -- 7.2 Somewhat less successful -- 7.3 Not so successful -- 7.4 Moving theory forward: new framings --
    Content: 8. Summary -- Bibliography -- Author's biography
    Note: Includes bibliographical references , 1. Introduction -- 1.1 Burgeoning HCI -- 1.2 Conceptualizing HCI: from paradigms to frameworks -- 1.3 Aims of the book -- 1.4 Parallels with art history , 2. The backdrop to HCI theory -- 2.1 Transforming society -- 2.2 HCI's growing pains -- 2.3 Adolescent HCI -- 2.4 Grown-up HCI: reframing theory , 3. The role and contribution of theory in HCI -- 3.1 Introduction -- 3.2 Importing theory -- 3.3 Different roles and expectations -- 3.4 A taxonomy of HCI theory: classical, modern and contemporary , 4. Classical theories -- 4.1 Body of knowledge -- 4.2 Applying basic research -- 4.3 Cognitive modeling , 5. Modern theories -- 5.1 External cognition -- 5.1.1 Cognitive dimensions -- 5.1.2 Wright et al.'s resources model -- 5.2 Distributed cognition -- 5.3 Ecological psychology -- 5.4 Situated action -- 5.5 Ethnomethodology and ethnography -- 5.6 CSCW theories -- 5.7 Activity theory -- 5.8 Grounded theory -- 5.9 Hybrid theories , 6. Contemporary theory -- 6.1 Human values -- 6.2 Turn to design -- 6.3 Turn to culture -- 6.4 Turn to the wild -- 6.5 Turn to embodiment -- 6.6 The next turn , 7. Discussion -- 7.1 Most successful -- 7.2 Somewhat less successful -- 7.3 Not so successful -- 7.4 Moving theory forward: new framings , 8. Summary -- Bibliography -- Author's biography. , Electronic reproduction; Available via World Wide Web , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    Additional Edition: ISBN 9781608459001
    Additional Edition: Print version HCI Theory Classical, Modern, and Contemporary
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mensch-Maschine-Kommunikation
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Oxford : Elsevier Science
    UID:
    gbv_1651320438
    Format: Online Ressource (xix, 243 pages) , illustrations
    Edition: Online-Ausg.
    ISBN: 1597496650 , 9781597496650 , 9781597496667 , 9781283394130 , 1283394138
    Content: Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical security -- More about locks and ways to low tech hack them -- Low tech wireless hacking -- Low tech targeting and surveillance: how much could they find out about you? -- Low tech hacking for the penetration tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness training: your most valuable countermeasure to employee risk
    Note: Includes index. - Includes bibliographical references and index , Front Cover; Low Tech Hacking: Street Smarts for Security Professionals; Copyright; Contents; Acknowledgments; Foreword; About the Authors; Introlduction; Book Overview and Key Learning Points; Book Audience; How this Book is Organized; Chapter 1: Social engineering: The ultimate low tech hacking threat; Chapter 2: Low tech vulnerabilities: Physical security; Chapter 3: More about locks and ways to low tech hack them; Chapter 4: Low tech wireless hacking; Chapter 5: Low tech targeting and surveillance: How much could they find out about you? , Chapter 6: Low tech hacking for the penetration testerChapter 7: Low tech hacking and the law: Where can you go for help?; Chapter 8: Information security awareness training: Your most valuable countermeasure to employee risk; Conclusion; Chapter 1: Social engineering: The ultimate low tech hacking threat; How Easy is it?; The Mind of a Social Engineer; The mind of a victim; Tools of The Social Engineering Trade; One of my favorite tools of the trade; Social engineering would never work against our company; What Was I Able to Social Engineer Out of Mary? , The Final Sting-Two weeks Later-Friday AfternoonWhy did this scam work?; Let's look at a few more social engineering tools; Keystroke logger: Is there one under your desk?; One of my lunchtime tools; Let's look at that Telephone butt-in set on my tool belt; Meet Mr. Phil Drake; Meet Mr. Paul Henry; Traditional AV, IDS, and IPS considerations; Traditional firewall consideration; Flaw remediation; Do you have a guest user of your credit card?; A few possible countermeasures; Always be slightly suspicious; Start to study the art of social engineering; Start a social engineering book library , SummaryChapter 2: Low tech vulnerabilities: Physical security; A mini risk assessment; What did I have at risk?; What were some possible threats while out on the lake?; What were some of the possible vulnerabilities?; And finally, what about my countermeasures?; Outsider-Insider Threats; Some things to consider for the security of your buildings; Check all locks for proper operation; Use employee badges; Shredder technology keeps changing as well; Keep an eye on corporate or agency phone books; Unsecured areas are targets for tailgating; Special training for off-shift staff , Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?; Purchasing better quality locks will be cost effective; Be aware of lock vulnerabilities; Forced entry-and other ways to cheat! , A time-tested low tech method of forced entry
    Additional Edition: ISBN 1597496650
    Additional Edition: Druckausg. Low tech hacking Amsterdam [u.a.] : Syngress, 2012 ISBN 9781597496650
    Additional Edition: ISBN 1597496650
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Electronic books ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    San Rafael, California : Morgan & Claypool | Cham : Springer International Publishing | Cham : Imprint: Springer
    UID:
    gbv_165725206X
    Format: 1 Online-Ressource (1 PDF (xiii, 97 pages)) , illustrations.
    ISBN: 9783031022203 , 9781627058780
    Series Statement: Synthesis lectures on human-centered informatics # 37
    Content: 6. Conclusions -- References -- Author biographies
    Content: 5. Practical and ethical issues -- 5.1 Introduction -- 5.2 Practical challenges -- 5.2.1 Managing expectations -- 5.2.2 Identifying and resolving tensions -- 5.2.3 Dealing with the unexpected -- 5.2.4 Overcoming the novelty effect -- 5.3 Ethics: consent, data collection, and permission -- 5.4 Publishing research in the wild --
    Content: 4. Case studies: designing and evaluating technologies for use in the wild -- 4.1 Introduction -- 4.2 Case study 1: the ambient wood project -- 4.2.1 Background -- 4.3 Case study 2: the clouds and twinkly lights project -- 4.3.1 Background -- 4.3.2 Theory -- 4.3.3 Design -- 4.3.4 Technology -- 4.3.5 In situ study -- 4.4 Case study 3: the Physikit project -- 4.4.1 Background -- 4.4.2 Theory -- 4.4.3 Design -- 4.4.4 Technology -- 4.4.5 In situ study -- 4.5 Overall summary --
    Content: 3. Approaches to conducting research in the wild -- 3.1 Introduction -- 3.2 Participatory and provocative approaches to research in the wild -- 3.2.1 Participatory approaches -- 3.2.2 Provocative approaches -- 3.3 Design methods used for research in the wild -- 3.3.1 Designing on the fly during research in the wild studies -- 3.3.2 Designing for appropriation: how to invite and guide the general public -- 3.4 Technologies developed in the wild -- 3.5 Methods for conducting in situ studies in the wild -- 3.5.1 New ways of collecting data -- 3.6 Summary --
    Content: 2. Moving into the wild: from situated cognition to embodied interaction -- 2.1 Introduction -- 2.2 Plans and situated action -- 2.3 Cognition in practice -- 2.4 Cognition in the wild -- 2.5 Embodied interaction approaches -- 2.6 Current theorizing within RITW -- 2.7 Conclusion --
    Content: The phrase "in-the-wild" is becoming popular again in the field of human-computer interaction (HCI), describing approaches to HCI research and accounts of user experience phenomena that differ from those derived from other lab-based methods. The phrase first came to the forefront 20-25 years ago when anthropologists Jean Lave (1988), Lucy Suchman (1987), and Ed Hutchins (1995) began writing about cognition being in-the-wild. Today, it is used more broadly to refer to research that seeks to understand new technology interventions in everyday living. A reason for its resurgence in contemporary HCI is an acknowledgment that so much technology is now embedded and used in our everyday lives. Researchers have begun following suit-decamping from their usability and living labs and moving into the wild; carrying out in-situ development and engagement, sampling experiences, and probing people in their homes and on the streets. The aim of this book is to examine what this new direction entails and what it means for HCI theory, practice, and design. The focus is on the insights, demands and concerns. But how does research in the wild differ from the other applied approaches in interaction design, such as contextual design, action research, or ethnography? What is added by labeling user research as being in the wild? One main difference is where the research starts and ends: unlike user-centered, and more specifically, ethnographic approaches which typically begin by observing existing practices and then suggesting general design implications or system requirements, in the wild approaches create and evaluate new technologies and experiences in situ (Rogers, 2012). Moreover, novel technologies are often developed to augment people, places, and settings, without necessarily designing them for specific user needs. There has also been a shift in design thinking. Instead of developing solutions that fit in with existing practices, researchers are experimenting with new technological possibilities that can change and even disrupt behavior. Opportunities are created, interventions installed, and different ways of behaving are encouraged. A key concern is how people react, change and integrate these in their everyday lives. This book outlines the emergence and development of research in the wild. It is structured around a framework for conceptualizing and bringing together the different strands. It covers approaches, methods, case studies, and outcomes. Finally, it notes that there is more in the wild research in HCI than usability and other kinds of user studies in HCI and what the implications of this are for the field
    Note: Part of: Synthesis digital library of engineering and computer science. - Includes bibliographical references (pages 83-96). - Google book search. INSPEC. Google scholar. Compendex. - Title from PDF title page (viewed on April 18, 2017) , 1. Introduction -- 1.1 Research gone wild -- 1.2 How does research in-the-wild differ from lab experiments? -- 1.3 A framework for HCI research in the wild -- 1.4 Scoping research in the wild -- 1.5 Aim of the book -- 1.6 Summary --
    Additional Edition: ISBN 9783031010927
    Additional Edition: ISBN 9783031033483
    Additional Edition: ISBN 9781627056922
    Additional Edition: Erscheint auch als Rogers, Yvonne Research in the wild [San Rafael] : Morgan & Claypool Publishers, 2017 ISBN 9781627056922
    Additional Edition: ISBN 1627056920
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mensch-Maschine-Kommunikation ; In situ
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages