Consumer Data Research
Big Data collected by customer-facing organisations - such as smartphone logs, store loyalty card transactions, smart travel tickets, social media posts, or smart energy meter readings - account for most of the data collected about citizens today. As a result, they are transforming the practice of social science. Consumer Big Data are distinct from...
Instructional Scaffolding in STEM Education
This book uses meta-analysis to synthesize research on scaffolding and scaffolding-related interventions in STEM (science, technology, engineering, and mathematics) education. Specifically, the volume examines the extent to which study quality, assessment type, and scaffolding characteristics (strategy, intended outcome, fading schedule, scaffoldin...
Microfinance 3.0
This book focuses on the achievements, current trends and further potential of microfinance to scale-up and serve many more clients with financial services that enable them to improve their living conditions. The book asks what it takes to achieve sustainable impact: to know your clients and to understand their needs, to treat them in a fair and tr...
The Everyday Life of an Algorithm
This book begins with an algorithm - a set of IF...THEN rules used in the development of a new, ethical, video surveillance architecture for transport hubs. Readers are invited to follow the algorithm over three years, charting its everyday life. Questions of ethics, transparency, accountability and market value must be grasped by the algorithm in ...
Dissonant Heritages and Memories in Contemporary Europe
This book discusses political, economic, social, and humanitarian challenges that influence both how people deal with their past and how they build their identities in contemporary Europe. Ongoing debates on migration, on local, national, inter- and transnational levels, prove that it is a divisive issue with regards to understanding European integ...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of long...
Foundations of Quantum Theory
This book studies the foundations of quantum theory through its relationship to classical physics. This idea goes back to the Copenhagen Interpretation (in the original version due to Bohr and Heisenberg), which the author relates to the mathematical formalism of operator algebras originally created by von Neumann. The book therefore includes compr...
Programming Languages and Systems
This book constitutes the proceedings of the 27th European Symposium on Programming, ESOP 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. The 36 papers presented in this volume were carefully reviewed and selected from 114 submissions. The ...
The Legacy of Felix Klein
This book provides an overview of Felix Klein's ideas, highlighting developments in university teaching and school mathematics related to Klein's thoughts, stemming from the last century. It discusses the meaning, importance and the legacy of Klein's ideas today and in the future, within an international, global context. Presenting extended version...
Foundations of Software Science and Computation Structures
This book constitutes the proceedings of the 21st International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 31 papers presented in this volume were ca...
Saving for Development
Why should people - and economies - save? This book on the savings problem in Latin America and the Caribbean suggests that, while saving to survive the bad times is important, saving to thrive in the good times is what really counts. People must save to invest in health and education, live productive and fulfilling lives, and make the most of thei...
Risk Communication for the Future
The conventional approach to risk communication, based on a centralized and controlled model, has led to blatant failures in the management of recent safety related events. In parallel, several cases have proved that actors not thought of as risk governance or safety management contributors may play a positive role regarding safety. Building on the...
The Pathologisation of Homosexuality in Fascist Italy
This book investigates the pathologisation of homosexuality during the fascist regime in Italy through an analysis of the case of G., a man with "homosexual tendencies" interned in the Collegno mental health hospital in 1928. No systematic study exists on the possibility that Fascism used internment in an asylum as a tool of repression fo...
Implementation of EU Readmission Agreements
By examining the implementation dynamics of EU Readmission Agreements (EURAs), this book addresses the practical reasons why irregular immigrants cannot be expelled. EURAs are one of the vital legal instruments framing EU external migration law with regard to the expulsion of irregular immigrants, yet their implementation has met with various obsta...
DevOps in Practice
You hear it a lot: DevOps is not just about tools, but also about changing company culture. But just how does an organization firmly rooted in traditional software development go about making that change? This in-depth report shows how two large organizations, Nordstrom and Texas.gov, moved from long-established software development models to the c...
Advancing the Science of Cancer in Latinos
This book gives an overview of the sessions, panel discussions, and outcomes of the Advancing the Science of Cancer in Latinos conference, held in February 2018 in San Antonio, Texas, USA, and hosted by the Mays Cancer Center and the Institute for Health Promotion Research at UT Health San Antonio.Latinos – the largest, youngest, and fastest-grow...
Planar Maps, Random Walks and Circle Packing
This free book focuses on the interplay between random walks on planar maps and Koebe's circle packing theorem. Further topics covered include electric networks, the He–Schramm theorem on infinite circle packings, uniform spanning trees of planar maps, local limits of finite planar maps and the almost sure recurrence of simple random walks on the...
Open and Distance Education in Asia, Africa and the Middle East
This book describes the history, structure and institutions of open and distance education in six countries: China, India, Russia, Turkey, South Africa and South Korea. It describes how open and distance education is evolving in a digital age to reflect the needs and circumstances of the national higher education systems in these countries. It al...
Contextual Process Digitalization
This free book presents an overview and step-by-step explanation of process management. It starts with the individual participants' perspectives on their work in a process and its structuring and harmonization, and then moves on to its specification in a model and how it is embedded in the organizational and IT environment of the company. Lastly, t...
Measure, Integration & Real Analysis
This open access textbook welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible approach, Axler lays the foundations for further study by promoting a deep understanding of key results. Content is carefully curated to suit a single course, or two-semester sequence of courses, creating a v...
Why Do We Quote?
Quoting is all around us. But do we really know what it means? How do people actually quote today, and how did our present systems come about? This book brings together a down-to-earth account of contemporary quoting with an examination of the comparative and historical background that lies behind it and the characteristic way that quoting links pa...
Statistical Learning and Sequential Prediction
This free book will focus on theoretical aspects of Statistical Learning and Sequential Prediction. Until recently, these two subjects have been treated separately within the learning community. The course will follow a unified approach to analyzing learning in both scenarios. To make this happen, we shall bring together ideas from probability and ...
Audacious Education Purposes
This book offers a comparative study of eight ambitious national reforms that sought to create opportunities for students to gain the necessary breath of skills to thrive in a rapidly changing world. It examines how national governments transform education systems to provide students opportunities to develop such skills. It analyses comprehensive e...
Legal Dynamics of EU External Relations
This book offers a concise yet comprehensive review of the principles of EU external relations law. By carefully examining the role of the Union on the global scene, it provides a systematic overview of the relevant rules and competences, reflecting on the legal developments in their political and societal context. In addition to up-to-date analyse...
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
Fundamentals of Business Process Management
This book covers the entire Business Process Management (BPM) lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-discip...
Philosophical and Mathematical Logic
This book was written to serve as an introduction to logic, with in each chapter – if applicable – special emphasis on the interplay between logic and philosophy, mathematics, language and (theoretical) computer science. The reader will not only be provided with an introduction to classical logic, but to philosophical (modal, epistemic, deontic...
Applied Linear Algebra
This book develops the essential tools of linear algebra, with the goal of imparting technique alongside contextual understanding. Applications go hand-in-hand with theory, each reinforcing and explaining the other. This approach encourages students to develop not only the technical proficiency needed to go on to further study, but an appreciation ...
Algorithms
Algorithms are the lifeblood of computer science. They are the machines that proofs build and the music that programs play. Their history is as old as mathematics itself. This book is a wide-ranging, idiosyncratic treatise on the design and analysis of algorithms, covering several fundamental techniques, with an emphasis on intuition and the proble...
Linear Algebra
This book helps students to master the material of a standard US undergraduate first course in Linear Algebra. The material is standard in that the subjects covered are Gaussian reduction, vector spaces, linear maps, determinants, and eigenvalues and eigenvectors. Another standard is book's audience: sophomores or juniors, usually with a backgro...
Enterprise Cloud Strategy
Enterprise Cloud Strategy - Guidance for enterprises looking for proven methods to take their application portfolio to the cloud. What if you were able to achieve both efficiency and innovation in all business domains and applications across your entire portfolio? What if you could take advantage of the cloud and all of its resources and feature...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...

1 2