Learning to Learn Online prepares you for success in your online journey by introducing you to the unique features of the online learning environment, and providing tools for understanding yourself and your role as a self-directed learner. The first part of the book focuses on three key questions: 1. Who am I as an online learner? 2. Who am I on my online learning journey with? 3. Who are…
The American Literature Scholar in the Digital Age, which features a wide range of practitioner-scholars, is the first of its kind: a gathering of people who are expert in American literary studies and in digital technologies, scholars uniquely able to draw from experience with building digital resources and to provide theoretical commentary on how the transformation to new technologies alters …
Reports on a new generation of Internet controls that establish a new normative terrain in which surveillance and censorship are routine.Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely …
New online technologies have brought with them a great promise of freedom. The computer and particularly the Internet have been represented as enabling technologies, turning consumers into users and users into producers. Furthermore, lay people and amateurs have been enthusiastically greeted as heroes of the digital era. This thoughtful study casts a fresh light on the shaping of user participa…
How have digital tools and networks transformed the far rights strategies and transnational prospects? This volume presents a unique critical survey of the online and offline tactics, symbols and platforms that are strategically remixed by contemporary far-right groups in Europe and the US. It features thirteen accessible essays by an international range of expert scholars, policy advisors and …
research agenda for e-Government. When e-Government was first conceived, it was designed upon basic technologies where the emphasis was only on the simple display of government information for citizens to read. Nowadays, e-Government design comprises many complicated modules such as upload and download consoles, two-way interaction consoles between citizens and government agents, integrated gov…
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence …
"This study explains the concept of network neutrality and its history as an extension of the rights and duties of common carriers, as well as its policy history as examined in US and European regulatory proceedings from 1999. The book compares national and regional legislation and regulation of net neutrality from an interdisciplinary and international perspective. It also examines the future …
Online advertising will soon form the largest share of global advertisement revenues. Google and Facebook netted profits of US $29 billion in 2016. While these two giants control more than 66% of all online advertising revenues complex legal company structures have minimised their tax liabilities. This extended policy report considers where they should be taxed and where the value of their acti…
This open access book looks at how a democracy can devolve into a post-factual state. The media is being flooded by populist narratives, fake news, conspiracy theories and make-believe. Misinformation is turning into a challenge for all of us, whether politicians, journalists, or citizens. In the age of information, attention is a prime asset and may be converted into money, power, and influ…