The core message of this book is: computer games best realise affective interaction. This book brings together contributions from specialists in affective computing, game studies, game artificial intelligence, user experience research, sensor technology, multi-modal interfaces and psychology that will advance the state-of-the-art in player experience research; affect modelling, induction, and s…
This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification…
We will first define and discuss some common definitions and measures of quality that have been put forward by quality philosophers. Next we will provide an overview of the historical development of quality management. In the third major section of this module we describe the eight different dimensions of quality used for analysing quality characteristics. An important measure of the effectiven…
Based on theory and an empirical survey, Philipp K. Berger measures the amount of fear for different groups of entrepreneurs. He draws parallels to Prospect Theory revealing the components of fear and shows, that entrepreneurial fear is a rather rational subconscious evaluation of the situation. Furthermore, he identifies the root causes of this fear – the fear of failure – and the underlyi…
OCLC-licensed vendor bibliographic record.
In this book, Christopher Baber uses embodied cognition as a lens through which to view both how designers engage in creative practices and how people use designed artifacts. This view of cognition as enactive, embedded, situated, or distributed, without recourse to internal representations, provides a theoretical grounding that makes possible a richer account of human interaction with technolo…
How America used its technological leadership in the 1950s and the 1960s to foster European collaboration and curb nuclear proliferation, with varying degrees of success.OCLC-licensed vendor bibliographic record.
In a July 2017 piece in Inside Higher Ed, Joshua Kim asked: “Why is it that books about technological-induced economic change tend to focus on every other information industry except for higher education?” The answer is because no one knows quite what is happening yet. It is too new. The automation economy, resulting from the technologies of the fourth industrial revolution (4IR), is changi…
"Today almost every aspect of life for which data exists can be rendered as a network. Financial data, social networks, biological ecologies: all are visualized in links and nodes, lines connecting dots. A network visualization of a corporate infrastructure could look remarkably similar to that of a terrorist organization. In An Aesthesia of Networks, Anna Munster argues that this uniformity ha…
Interdisciplinary perspectives on the role of new information technologies, including mobile phones, wireless networks, and biometric identification, in the global refugee crisis.OCLC-licensed vendor bibliographic record.