feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    New York, NY : Columbia University Press
    UID:
    b3kat_BV043628755
    Format: 1 Online-Ressource (xi, 278 Seiten)
    ISBN: 9780231541657
    Series Statement: Columbia Business School Publishing
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-0-231-17544-9
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Unternehmen ; Informationstechnik ; Technischer Fortschritt ; Strategisches Management ; Innovationsmanagement ; Unternehmen ; Industrie 4.0 ; Innovationsmanagement ; Strategisches Management
    Author information: Rogers, David L. 1970-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [San Rafael] : Morgan & Claypool Publishers
    UID:
    gbv_728860678
    Format: 1 Online-Ressource (xv, 113 Seiten) , Illustrationen
    Edition: Electronic reproduction; Available via World Wide Web
    ISBN: 9781608459018
    Series Statement: Synthesis lectures on human-centered informatics #14
    Content: Theory is the bedrock of many sciences, providing a rigorous method to advance knowledge, through testing and falsifying hypotheses about observable phenomena. To begin with, the nascent field of HCI followed the scientific method borrowing theories from cognitive science to test theories about user performance at the interface. But HCI has emerged as an eclectic interdiscipline rather than a well-defined science. It now covers all aspects of human life, from birth to bereavement, through all manner of computing, from device ecologies to nano-technology. It comes as no surprise that the role of theory in HCI has also greatly expanded from the early days of scientific testing to include other functions such as describing, explaining, critiquing, and as the basis for generating new designs.The book charts the theoretical developments in HCI, both past and present, reflecting on how they have shaped the field. It explores both the rhetoric and the reality: how theories have been conceptualized, what was promised, how they have been used and which has made the most impact in the field -- and the reasons for this. Finally, it looks to the future and asks whether theory will continue to have a role, and, if so, what this might be
    Content: 4. Classical theories -- 4.1 Body of knowledge -- 4.2 Applying basic research -- 4.3 Cognitive modeling --
    Content: 2. The backdrop to HCI theory -- 2.1 Transforming society -- 2.2 HCI's growing pains -- 2.3 Adolescent HCI -- 2.4 Grown-up HCI: reframing theory --
    Content: 3. The role and contribution of theory in HCI -- 3.1 Introduction -- 3.2 Importing theory -- 3.3 Different roles and expectations -- 3.4 A taxonomy of HCI theory: classical, modern and contemporary --
    Content: 1. Introduction -- 1.1 Burgeoning HCI -- 1.2 Conceptualizing HCI: from paradigms to frameworks -- 1.3 Aims of the book -- 1.4 Parallels with art history --
    Content: 5. Modern theories -- 5.1 External cognition -- 5.1.1 Cognitive dimensions -- 5.1.2 Wright et al.'s resources model -- 5.2 Distributed cognition -- 5.3 Ecological psychology -- 5.4 Situated action -- 5.5 Ethnomethodology and ethnography -- 5.6 CSCW theories -- 5.7 Activity theory -- 5.8 Grounded theory -- 5.9 Hybrid theories --
    Content: 6. Contemporary theory -- 6.1 Human values -- 6.2 Turn to design -- 6.3 Turn to culture -- 6.4 Turn to the wild -- 6.5 Turn to embodiment -- 6.6 The next turn --
    Content: 7. Discussion -- 7.1 Most successful -- 7.2 Somewhat less successful -- 7.3 Not so successful -- 7.4 Moving theory forward: new framings --
    Content: 8. Summary -- Bibliography -- Author's biography
    Note: Includes bibliographical references , 1. Introduction -- 1.1 Burgeoning HCI -- 1.2 Conceptualizing HCI: from paradigms to frameworks -- 1.3 Aims of the book -- 1.4 Parallels with art history , 2. The backdrop to HCI theory -- 2.1 Transforming society -- 2.2 HCI's growing pains -- 2.3 Adolescent HCI -- 2.4 Grown-up HCI: reframing theory , 3. The role and contribution of theory in HCI -- 3.1 Introduction -- 3.2 Importing theory -- 3.3 Different roles and expectations -- 3.4 A taxonomy of HCI theory: classical, modern and contemporary , 4. Classical theories -- 4.1 Body of knowledge -- 4.2 Applying basic research -- 4.3 Cognitive modeling , 5. Modern theories -- 5.1 External cognition -- 5.1.1 Cognitive dimensions -- 5.1.2 Wright et al.'s resources model -- 5.2 Distributed cognition -- 5.3 Ecological psychology -- 5.4 Situated action -- 5.5 Ethnomethodology and ethnography -- 5.6 CSCW theories -- 5.7 Activity theory -- 5.8 Grounded theory -- 5.9 Hybrid theories , 6. Contemporary theory -- 6.1 Human values -- 6.2 Turn to design -- 6.3 Turn to culture -- 6.4 Turn to the wild -- 6.5 Turn to embodiment -- 6.6 The next turn , 7. Discussion -- 7.1 Most successful -- 7.2 Somewhat less successful -- 7.3 Not so successful -- 7.4 Moving theory forward: new framings , 8. Summary -- Bibliography -- Author's biography. , Electronic reproduction; Available via World Wide Web , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    Additional Edition: ISBN 9781608459001
    Additional Edition: Print version HCI Theory Classical, Modern, and Contemporary
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mensch-Maschine-Kommunikation
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Oxford : Elsevier Science
    UID:
    gbv_1651320438
    Format: Online Ressource (xix, 243 pages) , illustrations
    Edition: Online-Ausg.
    ISBN: 1597496650 , 9781597496650 , 9781597496667 , 9781283394130 , 1283394138
    Content: Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical security -- More about locks and ways to low tech hack them -- Low tech wireless hacking -- Low tech targeting and surveillance: how much could they find out about you? -- Low tech hacking for the penetration tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness training: your most valuable countermeasure to employee risk
    Note: Includes index. - Includes bibliographical references and index , Front Cover; Low Tech Hacking: Street Smarts for Security Professionals; Copyright; Contents; Acknowledgments; Foreword; About the Authors; Introlduction; Book Overview and Key Learning Points; Book Audience; How this Book is Organized; Chapter 1: Social engineering: The ultimate low tech hacking threat; Chapter 2: Low tech vulnerabilities: Physical security; Chapter 3: More about locks and ways to low tech hack them; Chapter 4: Low tech wireless hacking; Chapter 5: Low tech targeting and surveillance: How much could they find out about you? , Chapter 6: Low tech hacking for the penetration testerChapter 7: Low tech hacking and the law: Where can you go for help?; Chapter 8: Information security awareness training: Your most valuable countermeasure to employee risk; Conclusion; Chapter 1: Social engineering: The ultimate low tech hacking threat; How Easy is it?; The Mind of a Social Engineer; The mind of a victim; Tools of The Social Engineering Trade; One of my favorite tools of the trade; Social engineering would never work against our company; What Was I Able to Social Engineer Out of Mary? , The Final Sting-Two weeks Later-Friday AfternoonWhy did this scam work?; Let's look at a few more social engineering tools; Keystroke logger: Is there one under your desk?; One of my lunchtime tools; Let's look at that Telephone butt-in set on my tool belt; Meet Mr. Phil Drake; Meet Mr. Paul Henry; Traditional AV, IDS, and IPS considerations; Traditional firewall consideration; Flaw remediation; Do you have a guest user of your credit card?; A few possible countermeasures; Always be slightly suspicious; Start to study the art of social engineering; Start a social engineering book library , SummaryChapter 2: Low tech vulnerabilities: Physical security; A mini risk assessment; What did I have at risk?; What were some possible threats while out on the lake?; What were some of the possible vulnerabilities?; And finally, what about my countermeasures?; Outsider-Insider Threats; Some things to consider for the security of your buildings; Check all locks for proper operation; Use employee badges; Shredder technology keeps changing as well; Keep an eye on corporate or agency phone books; Unsecured areas are targets for tailgating; Special training for off-shift staff , Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?; Purchasing better quality locks will be cost effective; Be aware of lock vulnerabilities; Forced entry-and other ways to cheat! , A time-tested low tech method of forced entry
    Additional Edition: ISBN 1597496650
    Additional Edition: Druckausg. Low tech hacking Amsterdam [u.a.] : Syngress, 2012 ISBN 9781597496650
    Additional Edition: ISBN 1597496650
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Electronic books ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages