This interdisciplinary collection studies the Internet's effects on traditional media. Part 1 deals with the breakdown of trust in the media; Part 2 outlines the changing law of defamation and privacy; Part 3 analyzes the challenge of online content moderation; and Part 4 considers the financial challenges facing journalistic enterprises
This open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, res…
This innovative book considers the cost of cognitive overload and psychological distress on human sustainability, and suggests ways to prevent employees from becoming a psychologically depleted workforce. Employee attentional processing capacity is maxed out, and psychological distress is at an all-time high. Alexander D. Stajkovic and Kayla S. Stajkovic explain how human cognitive ‘broadban…
Privacy, in contrast with secrecy, is a relational concept, achieved when personal information is shared appropriately between actors. Viewed in this way, privacy is necessarily contextual and complex because norms about appropriate flows and use of personal information are socially negotiated and often contested. (Nissenbaum, 2009) Privacy is thus a problem of collective action. Moreover, pers…
During the last two decades, we have witnessed the spreading of shared spaces of work and production in different urban contexts, attracting attention from both policymakers and scholars in economic geography and urban studies. In particular, Fablabs are considered open workshops for grassroots innovation, which is enabled by the availability of shared digital fabrication machines and by the po…
Missing data is a common occurrence in the time series domain, for instance due to faulty sensors, server downtime or patients not attending their scheduled appointments. One of the best methods to impute these missing values is Multiple Imputations by Chained Equations (MICE) which has the drawback that it can only model linear relationships among the variables in a multivariate time series. T…
In the near future, the high volume of content together with new emerging and mission critical applications is expected to stress the Internet to such a degree that it will possibly not be able to respond adequately to its new role. This challenge has motivated many groups and research initiatives worldwide to search for structural modifications to the Internet architecture in order to be able …
This open access book carefully explores the relationship between social democracy and its working-class electorate in Western Europe. Relying on different indicators, it demonstrates an important transformation in the class basis of social democracy. At the beginning of the twenty-first century, the working-class vote is strongly fragmented and social democratic parties face competition on mul…
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
This open access book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Graph Structures for Knowledge Representation and Reasoning, GKR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 7 revised full papers presented together with 2 invited contributions were revie…