feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • UB Potsdam  (9)
  • Computer Science  (9)
Type of Medium
Language
Region
Access
  • 1
    Book
    Book
    New York : Columbia Business School Publishing
    UID:
    b3kat_BV043519359
    Format: XI, 278 Seiten , Illustrationen
    ISBN: 9780231175449
    Note: Includes bibliographical references and index
    Additional Edition: Übersetzt als Rogers, David L. Digitale Transformation
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-0-231-54165-7
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Unternehmen ; Informationstechnik ; Technischer Fortschritt ; Strategisches Management ; Innovationsmanagement ; Unternehmen ; Industrie 4.0 ; Innovationsmanagement ; Strategisches Management
    Author information: Rogers, David L. 1970-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV019315456
    Format: XXIII, 519 S. , Ill.
    ISBN: 0471492787
    Language: English
    Subjects: Computer Science , Comparative Studies. Non-European Languages/Literatures , Psychology
    RVK:
    RVK:
    RVK:
    Keywords: Mensch-Maschine-Kommunikation ; World Wide Web ; Dialogverarbeitung
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Cambridge, Massachusetts ; London, England : The MIT Press
    UID:
    b3kat_BV049304009
    Format: 274 Seiten , Illustrationen, Diagramme, Karten , 24 cm
    Edition: First paperback edition
    ISBN: 9780262528245 , 026252824X
    Note: Literaturverzeichnis: Seiten 233-259 , The end of the virtual : digital methods -- The link and the politics of Web space -- The website as archived object -- Googlization and the inculpable engine -- Search as research -- National Web studies -- Social media and post-demographics -- Wikipedia as cultural reference -- After cyberspace : big data, small data
    Additional Edition: Äquivalent
    Additional Edition: Erscheint auch als Online-Ausgabe 2013 ISBN 9781461931867
    Additional Edition: ISBN 9780262313384
    Additional Edition: ISBN 9780262313391
    Language: English
    Subjects: Computer Science , General works
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Forschungsmethode
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV022820681
    Format: XXVI, 775 S. , Ill., graph. Darst.
    Edition: 2. ed.
    ISBN: 0470018666 , 9780470018668
    Note: 3. Aufl. u.d.T.: Rogers, Yvonne: Interaction design
    Language: English
    Subjects: Computer Science , Psychology
    RVK:
    RVK:
    Keywords: Mensch-Maschine-Kommunikation ; World Wide Web ; Dialogverarbeitung
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1614311374
    Format: xiii, 567 Seiten , Illustrationen, Diagramme
    Edition: Fourth edition
    ISBN: 9781119020752
    Note: Hier auch später erschienene, unveränderte Nachdrucke
    Additional Edition: ISBN 9781119066019
    Additional Edition: ISBN 9781119088790
    Language: English
    Subjects: Computer Science , Comparative Studies. Non-European Languages/Literatures , Psychology
    RVK:
    RVK:
    RVK:
    Keywords: Mensch-Maschine-Kommunikation ; World Wide Web ; Dialogverarbeitung ; Mensch-Maschine-Kommunikation ; World Wide Web ; Dialogverarbeitung
    Author information: Sharp, Helen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [San Rafael] : Morgan & Claypool Publishers
    UID:
    gbv_728860678
    Format: 1 Online-Ressource (xv, 113 Seiten) , Illustrationen
    Edition: Electronic reproduction; Available via World Wide Web
    ISBN: 9781608459018
    Series Statement: Synthesis lectures on human-centered informatics #14
    Content: Theory is the bedrock of many sciences, providing a rigorous method to advance knowledge, through testing and falsifying hypotheses about observable phenomena. To begin with, the nascent field of HCI followed the scientific method borrowing theories from cognitive science to test theories about user performance at the interface. But HCI has emerged as an eclectic interdiscipline rather than a well-defined science. It now covers all aspects of human life, from birth to bereavement, through all manner of computing, from device ecologies to nano-technology. It comes as no surprise that the role of theory in HCI has also greatly expanded from the early days of scientific testing to include other functions such as describing, explaining, critiquing, and as the basis for generating new designs.The book charts the theoretical developments in HCI, both past and present, reflecting on how they have shaped the field. It explores both the rhetoric and the reality: how theories have been conceptualized, what was promised, how they have been used and which has made the most impact in the field -- and the reasons for this. Finally, it looks to the future and asks whether theory will continue to have a role, and, if so, what this might be
    Content: 4. Classical theories -- 4.1 Body of knowledge -- 4.2 Applying basic research -- 4.3 Cognitive modeling --
    Content: 2. The backdrop to HCI theory -- 2.1 Transforming society -- 2.2 HCI's growing pains -- 2.3 Adolescent HCI -- 2.4 Grown-up HCI: reframing theory --
    Content: 3. The role and contribution of theory in HCI -- 3.1 Introduction -- 3.2 Importing theory -- 3.3 Different roles and expectations -- 3.4 A taxonomy of HCI theory: classical, modern and contemporary --
    Content: 1. Introduction -- 1.1 Burgeoning HCI -- 1.2 Conceptualizing HCI: from paradigms to frameworks -- 1.3 Aims of the book -- 1.4 Parallels with art history --
    Content: 5. Modern theories -- 5.1 External cognition -- 5.1.1 Cognitive dimensions -- 5.1.2 Wright et al.'s resources model -- 5.2 Distributed cognition -- 5.3 Ecological psychology -- 5.4 Situated action -- 5.5 Ethnomethodology and ethnography -- 5.6 CSCW theories -- 5.7 Activity theory -- 5.8 Grounded theory -- 5.9 Hybrid theories --
    Content: 6. Contemporary theory -- 6.1 Human values -- 6.2 Turn to design -- 6.3 Turn to culture -- 6.4 Turn to the wild -- 6.5 Turn to embodiment -- 6.6 The next turn --
    Content: 7. Discussion -- 7.1 Most successful -- 7.2 Somewhat less successful -- 7.3 Not so successful -- 7.4 Moving theory forward: new framings --
    Content: 8. Summary -- Bibliography -- Author's biography
    Note: Includes bibliographical references , 1. Introduction -- 1.1 Burgeoning HCI -- 1.2 Conceptualizing HCI: from paradigms to frameworks -- 1.3 Aims of the book -- 1.4 Parallels with art history , 2. The backdrop to HCI theory -- 2.1 Transforming society -- 2.2 HCI's growing pains -- 2.3 Adolescent HCI -- 2.4 Grown-up HCI: reframing theory , 3. The role and contribution of theory in HCI -- 3.1 Introduction -- 3.2 Importing theory -- 3.3 Different roles and expectations -- 3.4 A taxonomy of HCI theory: classical, modern and contemporary , 4. Classical theories -- 4.1 Body of knowledge -- 4.2 Applying basic research -- 4.3 Cognitive modeling , 5. Modern theories -- 5.1 External cognition -- 5.1.1 Cognitive dimensions -- 5.1.2 Wright et al.'s resources model -- 5.2 Distributed cognition -- 5.3 Ecological psychology -- 5.4 Situated action -- 5.5 Ethnomethodology and ethnography -- 5.6 CSCW theories -- 5.7 Activity theory -- 5.8 Grounded theory -- 5.9 Hybrid theories , 6. Contemporary theory -- 6.1 Human values -- 6.2 Turn to design -- 6.3 Turn to culture -- 6.4 Turn to the wild -- 6.5 Turn to embodiment -- 6.6 The next turn , 7. Discussion -- 7.1 Most successful -- 7.2 Somewhat less successful -- 7.3 Not so successful -- 7.4 Moving theory forward: new framings , 8. Summary -- Bibliography -- Author's biography. , Electronic reproduction; Available via World Wide Web , System requirements: Adobe Acrobat Reader. , Mode of access: World Wide Web.
    Additional Edition: ISBN 9781608459001
    Additional Edition: Print version HCI Theory Classical, Modern, and Contemporary
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mensch-Maschine-Kommunikation
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Oxford : Elsevier Science
    UID:
    gbv_1651320438
    Format: Online Ressource (xix, 243 pages) , illustrations
    Edition: Online-Ausg.
    ISBN: 1597496650 , 9781597496650 , 9781597496667 , 9781283394130 , 1283394138
    Content: Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical security -- More about locks and ways to low tech hack them -- Low tech wireless hacking -- Low tech targeting and surveillance: how much could they find out about you? -- Low tech hacking for the penetration tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness training: your most valuable countermeasure to employee risk
    Note: Includes index. - Includes bibliographical references and index , Front Cover; Low Tech Hacking: Street Smarts for Security Professionals; Copyright; Contents; Acknowledgments; Foreword; About the Authors; Introlduction; Book Overview and Key Learning Points; Book Audience; How this Book is Organized; Chapter 1: Social engineering: The ultimate low tech hacking threat; Chapter 2: Low tech vulnerabilities: Physical security; Chapter 3: More about locks and ways to low tech hack them; Chapter 4: Low tech wireless hacking; Chapter 5: Low tech targeting and surveillance: How much could they find out about you? , Chapter 6: Low tech hacking for the penetration testerChapter 7: Low tech hacking and the law: Where can you go for help?; Chapter 8: Information security awareness training: Your most valuable countermeasure to employee risk; Conclusion; Chapter 1: Social engineering: The ultimate low tech hacking threat; How Easy is it?; The Mind of a Social Engineer; The mind of a victim; Tools of The Social Engineering Trade; One of my favorite tools of the trade; Social engineering would never work against our company; What Was I Able to Social Engineer Out of Mary? , The Final Sting-Two weeks Later-Friday AfternoonWhy did this scam work?; Let's look at a few more social engineering tools; Keystroke logger: Is there one under your desk?; One of my lunchtime tools; Let's look at that Telephone butt-in set on my tool belt; Meet Mr. Phil Drake; Meet Mr. Paul Henry; Traditional AV, IDS, and IPS considerations; Traditional firewall consideration; Flaw remediation; Do you have a guest user of your credit card?; A few possible countermeasures; Always be slightly suspicious; Start to study the art of social engineering; Start a social engineering book library , SummaryChapter 2: Low tech vulnerabilities: Physical security; A mini risk assessment; What did I have at risk?; What were some possible threats while out on the lake?; What were some of the possible vulnerabilities?; And finally, what about my countermeasures?; Outsider-Insider Threats; Some things to consider for the security of your buildings; Check all locks for proper operation; Use employee badges; Shredder technology keeps changing as well; Keep an eye on corporate or agency phone books; Unsecured areas are targets for tailgating; Special training for off-shift staff , Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?; Purchasing better quality locks will be cost effective; Be aware of lock vulnerabilities; Forced entry-and other ways to cheat! , A time-tested low tech method of forced entry
    Additional Edition: ISBN 1597496650
    Additional Edition: Druckausg. Low tech hacking Amsterdam [u.a.] : Syngress, 2012 ISBN 9781597496650
    Additional Edition: ISBN 1597496650
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Electronic books ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    San Rafael, California : Morgan & Claypool | Cham : Springer International Publishing | Cham : Imprint: Springer
    UID:
    gbv_165725206X
    Format: 1 Online-Ressource (1 PDF (xiii, 97 pages)) , illustrations.
    ISBN: 9783031022203 , 9781627058780
    Series Statement: Synthesis lectures on human-centered informatics # 37
    Content: 6. Conclusions -- References -- Author biographies
    Content: 5. Practical and ethical issues -- 5.1 Introduction -- 5.2 Practical challenges -- 5.2.1 Managing expectations -- 5.2.2 Identifying and resolving tensions -- 5.2.3 Dealing with the unexpected -- 5.2.4 Overcoming the novelty effect -- 5.3 Ethics: consent, data collection, and permission -- 5.4 Publishing research in the wild --
    Content: 4. Case studies: designing and evaluating technologies for use in the wild -- 4.1 Introduction -- 4.2 Case study 1: the ambient wood project -- 4.2.1 Background -- 4.3 Case study 2: the clouds and twinkly lights project -- 4.3.1 Background -- 4.3.2 Theory -- 4.3.3 Design -- 4.3.4 Technology -- 4.3.5 In situ study -- 4.4 Case study 3: the Physikit project -- 4.4.1 Background -- 4.4.2 Theory -- 4.4.3 Design -- 4.4.4 Technology -- 4.4.5 In situ study -- 4.5 Overall summary --
    Content: 3. Approaches to conducting research in the wild -- 3.1 Introduction -- 3.2 Participatory and provocative approaches to research in the wild -- 3.2.1 Participatory approaches -- 3.2.2 Provocative approaches -- 3.3 Design methods used for research in the wild -- 3.3.1 Designing on the fly during research in the wild studies -- 3.3.2 Designing for appropriation: how to invite and guide the general public -- 3.4 Technologies developed in the wild -- 3.5 Methods for conducting in situ studies in the wild -- 3.5.1 New ways of collecting data -- 3.6 Summary --
    Content: 2. Moving into the wild: from situated cognition to embodied interaction -- 2.1 Introduction -- 2.2 Plans and situated action -- 2.3 Cognition in practice -- 2.4 Cognition in the wild -- 2.5 Embodied interaction approaches -- 2.6 Current theorizing within RITW -- 2.7 Conclusion --
    Content: The phrase "in-the-wild" is becoming popular again in the field of human-computer interaction (HCI), describing approaches to HCI research and accounts of user experience phenomena that differ from those derived from other lab-based methods. The phrase first came to the forefront 20-25 years ago when anthropologists Jean Lave (1988), Lucy Suchman (1987), and Ed Hutchins (1995) began writing about cognition being in-the-wild. Today, it is used more broadly to refer to research that seeks to understand new technology interventions in everyday living. A reason for its resurgence in contemporary HCI is an acknowledgment that so much technology is now embedded and used in our everyday lives. Researchers have begun following suit-decamping from their usability and living labs and moving into the wild; carrying out in-situ development and engagement, sampling experiences, and probing people in their homes and on the streets. The aim of this book is to examine what this new direction entails and what it means for HCI theory, practice, and design. The focus is on the insights, demands and concerns. But how does research in the wild differ from the other applied approaches in interaction design, such as contextual design, action research, or ethnography? What is added by labeling user research as being in the wild? One main difference is where the research starts and ends: unlike user-centered, and more specifically, ethnographic approaches which typically begin by observing existing practices and then suggesting general design implications or system requirements, in the wild approaches create and evaluate new technologies and experiences in situ (Rogers, 2012). Moreover, novel technologies are often developed to augment people, places, and settings, without necessarily designing them for specific user needs. There has also been a shift in design thinking. Instead of developing solutions that fit in with existing practices, researchers are experimenting with new technological possibilities that can change and even disrupt behavior. Opportunities are created, interventions installed, and different ways of behaving are encouraged. A key concern is how people react, change and integrate these in their everyday lives. This book outlines the emergence and development of research in the wild. It is structured around a framework for conceptualizing and bringing together the different strands. It covers approaches, methods, case studies, and outcomes. Finally, it notes that there is more in the wild research in HCI than usability and other kinds of user studies in HCI and what the implications of this are for the field
    Note: Part of: Synthesis digital library of engineering and computer science. - Includes bibliographical references (pages 83-96). - Google book search. INSPEC. Google scholar. Compendex. - Title from PDF title page (viewed on April 18, 2017) , 1. Introduction -- 1.1 Research gone wild -- 1.2 How does research in-the-wild differ from lab experiments? -- 1.3 A framework for HCI research in the wild -- 1.4 Scoping research in the wild -- 1.5 Aim of the book -- 1.6 Summary --
    Additional Edition: ISBN 9783031010927
    Additional Edition: ISBN 9783031033483
    Additional Edition: ISBN 9781627056922
    Additional Edition: Erscheint auch als Rogers, Yvonne Research in the wild [San Rafael] : Morgan & Claypool Publishers, 2017 ISBN 9781627056922
    Additional Edition: ISBN 1627056920
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mensch-Maschine-Kommunikation ; In situ
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_749094729
    Format: Online-Ressource (XIV, 694 p. Also available online) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540277958 , 3540223126 , 9783540223122
    Series Statement: Lecture Notes in Computer Science 3101
    Content: This book constitutes the refereed proceedings of the 6th Asia Pacific Conference on Computer Human Interaction, APCHI 2004, held in Rotorua, New Zealand in June/July 2004. The 56 revised full papers and 13 revised short papers presented together with 10 short papers from a doctoral consortium track were carefully reviewed and selected for inclusion in the book. The topics addressed span the entire spectrum of HCI, including human factors and ergonomics, user interface tools and technologies, mobile and ubiquitous computing, visualization, augmented reality, collaborative systems, internationalization and cultural issues, etc
    Additional Edition: ISBN 9783540223122
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662215272
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540223122
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mensch-Maschine-Schnittstelle
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages