/var/www/htdocs/pustaka-digital/lib/SearchEngine/SearchBiblioEngine.php:688 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\SearchBiblioEngine"
SQL ⚙️: array:2 [ "count" => "select count(sb.biblio_id) from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode)))" "query" => "select sb.biblio_id, sb.title, sb.author, sb.topic, sb.image, sb.isbn_issn, sb.publisher, sb.publish_place, sb.publish_year, sb.labels, sb.input_date, sb.edition, sb.collation, sb.series_title, sb.call_number from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode))) order by sb.last_update desc limit 10 offset 0" ]
Bind Value ⚒️: array:1 [ ":subject" => "'+\"networks\"'" ]
This book provides readers interested in public policy with an explanation and critique of the sharp attacks against social media coming from\r\nacross the political spectrum. It analyses numerous regulatory proposals directed at social media and demonstrates that most are deeply\r\nmisguided from both freespeech and public policy perspectives.
Considers balancing free speech and containing dangerous online content to reduce risks of digital platforms during elections, pandemics or\r\neveryday social interactions. Offers an interdisciplinary approach with insights from different geographies and parallel challenges of managing\r\nglobal phenomena with national policies and regulations.
edited by Katri Eeva, Jaakko Kauko.
This interdisciplinary collection studies the Internet's effects on traditional media. Part 1 deals with the breakdown of trust in the media; Part 2 outlines the changing law of defamation and privacy; Part 3 analyzes the challenge of online content moderation; and Part 4 considers the financial challenges facing journalistic enterprises
This open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, res…
Privacy, in contrast with secrecy, is a relational concept, achieved when personal information is shared appropriately between actors. Viewed in this way, privacy is necessarily contextual and complex because norms about appropriate flows and use of personal information are socially negotiated and often contested. (Nissenbaum, 2009) Privacy is thus a problem of collective action. Moreover, pers…
Missing data is a common occurrence in the time series domain, for instance due to faulty sensors, server downtime or patients not attending their scheduled appointments. One of the best methods to impute these missing values is Multiple Imputations by Chained Equations (MICE) which has the drawback that it can only model linear relationships among the variables in a multivariate time series. T…
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
This open access book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Graph Structures for Knowledge Representation and Reasoning, GKR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 7 revised full papers presented together with 2 invited contributions were revie…
This open access book constitutes the refereed post-conference proceedings of the First IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 12 full papers presented were carefully reviewed and selected from 24 submissions. Also included in this volume are 4 WCC 2018 pl…