An examination of the use of digital badges as a reward for both casual online music evaluators and professional musicians.Professional and amateur musicians alike use social media as a platform for showcasing and promoting their music. Social media evaluation practices—rating, ranking, voting, “liking,” and “friending” by ordinary users, peers, and critics—have become essential pro…
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of …
This book summarizes work being undertaken within the collaborative MODAClouds research project, which aims to facilitate interoperability between heterogeneous Cloud platforms and remove the constraints of deployment, portability, and reversibility for end users of Cloud services. Experts involved in the project provide a clear overview of the MODAClouds approach and explain how it operates in…
Electronic publishing is continuously changing; new technologies open new ways for individuals, scholars, communities and networks to establish contacts, exchange data, produce information and share knowledge on a variety of devices, from personal computers to mobile media. There is an urgent need to rethink electronic publishing in order to develop and use new communication paradigms and techn…
This book presents a Facebook study on members of the Cusp Generation, or those born before the “great digital divide” of 1995. This delineation allows for a discussion on the possible socio-cultural implications of Facebook use for people of all ages. Members of the Cusp Generation are in a unique position as “part digital natives” to easily acquire and use new media technologies, whil…
From Mah-Jong, to the introduction of Prussian war-games, through to the emergence of location-based play: maps and play share a long and diverse history. This monograph shows how mapping and playing unfold in the digital age, when the relations between these apparently separate tropes are increasingly woven together. Fluid networks of interaction have encouraged a proliferation of hybrid forms…
Siapa saja para pemain yang memiliki kekuatan untuk membentuk internet dan apa saja yang dipertaruhkan di masa mendatang? Anda akan diajak menelusuri lansekap digital dan memahami peran berbagai pemangku kepentingan—pemerintah, operator jaringan, dan para raksasa teknologi di balik layanan internet yang kita nikmati. Di lapisan konten, para pengguna juga memiliki kekuatan untuk membentuk inte…
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classification and processing; stochastic modelling; p…
Over the past few decades, various types of hate material have caused increasing concern. Today, the scope of hate is wider than ever, as easy and often-anonymous access to an enormous amount of online content has opened the Internet up to both use and abuse. By providing possibilities for inexpensive and instantaneous access without ties to geographic location or a user identification system, …
Winner of the 2017 Sweetland Digital Rhetoric Collaborative Book Prize Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which softw…
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to under…
"Since its launch in 2006, Twitter has served as a major platform for political performance, social justice activism, and large-scale public debates over race, ethnicity, gender, sexuality, and nationality. It has empowered minoritarian groups to organize protests, articulate often-underrepresented perspectives, and form community. It has also spread hashtags that have been used to bully and si…
This open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, res…
Since the growth of social media, human communication has become much more visual. This book presents a scholarly analysis of the images people post on a regular basis to Facebook. By including hundreds of examples, readers can see for themselves the differences between postings from a village north of London, and those from a small town in Trinidad. Why do women respond so differently to becom…
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment…
This ground-breaking collection of essays examines the scope and consequences of digital vigilantism – a phenomenon emerging on a global scale, which sees digital audiences using social platforms to shape social and political life. Longstanding forms of moral scrutiny and justice seeking are disseminated through our contemporary media landscape, and researchers are increasingly recognising th…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases o…
‘The Internet is broken and Paolo Bory knows how we got here. In a powerful book based on original research, Bory carefully documents the myths, imaginaries, and ideologies that shaped the material and cultural history of the Internet. As important as this book is to understand our shattered digital world, it is essential for those who would fix it.’ — Vincent Mosco, author of The Smart C…
"This boldly original book traces the evolution of documentary film and photography as they migrated onto digital platforms during the first decades of the twenty-first century. Kris Fallon examines the emergence of several key media forms—social networking and crowdsourcing, video games and virtual environments, big data and data visualization—and demonstrates the formative influence of po…
Over the last five years, widespread concern about the effects of social media on democracy has led to an explosion in research from different disciplines and corners of academia. This book is the first of its kind to take stock of this emerging multi-disciplinary field by synthesizing what we know, identifying what we do not know and obstacles to future research, and charting a course for the …
In September 2020, researchers from Armenia, Chile, Germany and Japan met at the American University of Armenia for a virtual conference to discuss technologies with applications in smart cities, data science and information theory approaches for intelligent systems, technical challenges for intelligent environments, smart human centered computing, artificial neural networks, and deep learning.…
This open access book focuses on the interplay between random walks on planar maps and Koebe’s circle packing theorem. Further topics covered include electric networks, the He–Schramm theorem on infinite circle packings, uniform spanning trees of planar maps, local limits of finite planar maps and the almost sure recurrence of simple random walks on these limits. One of its main goals is t…
This volume, LNAI 13385, constitutes the refereed proceedings of the 11th International Joint Conference on Automated Reasoning, IJCAR 2022, held in Haifa, Israel, in August 2022. The 32 full research papers and 9 short papers presented together with two invited talks were carefully reviewed and selected from 85 submissions. The papers focus on the following topics: Satisfiability, SMT Solving…
This revised textbook motivates and illustrates the techniques of applied probability by applications in electrical engineering and computer science (EECS). The author presents information processing and communication systems that use algorithms based on probabilistic models and techniques, including web searches, digital links, speech recognition, GPS, route planning, recommendation systems, c…