- Table View
- List View
Perl for System Administration
by David N. Blank-EdelmanPerl for System Administrationis for anyone who needs to use Perl for administrative tasks and needs to hit the ground running.
Perl for Web Site Management
by John CallenderLearn to do everyday tasks on your web site using Perl--even if you have no programming background. Perl for Web Site Managementshows how to write CGI scripts, incorporate search engines, convert multiple text files to HTML, monitor log files, and track visitors to your site. Whether you're a developer, a designer, or simply a dabbler on the Web, this is the hands-on introduction to Perl you've been waiting for.
Perl in a Nutshell: A Desktop Quick Reference
by Ellen Siever Stephen Spainhour Nathan PatwardhanThis complete guide to the Perl programming language ranges widely through the Perl programmer's universe, gathering together in a convenient form a wealth of information about Perl itself and its application to CGI scripts, XML processing, network programming, database interaction, and graphical user interfaces. The book is an ideal reference for experienced Perl programmers and beginners alike.With more than a million dedicated programmers, Perl is proving to be the best language for the latest trends in computing and business, including network programming and the ability to create and manage web sites. It's a language that every Unix system administrator and serious web developer needs to know. In the past few years, Perl has found its way into complex web applications of multinational banks, the U.S. Federal Reserve, and hundreds of large corporations.In this second edition, Perl in a Nutshell has been expanded to include coverage of Perl 5.8, with information on Unicode processing in Perl, new functions and modules that have been added to the core language, and up-to-date details on running Perl on the Win32 platform. The book also covers Perl modules for recent technologies such as XML and SOAP.Here are just some of the topics contained in this book:Basic Perl referenceQuick reference to built-in functions and standard modulesCGI.pm and mod_perlXML::* modulesDBI, the database-independent API for PerlSockets programmingLWP, the library for Web programming in PerlNetwork programming with the Net modulesPerl/Tk, the Tk extension to Perl for graphical interfacesModules for interfacing with Win32 systemsAs part of the successful "in a Nutshell" book series from O'Reilly & Associates, Perl in a Nutshell is for readers who want a single reference for all their needs."In a nutshell, Perl is designed to make the easy jobs easy, without making the hard jobs impossible."-- Larry Wall, creator of Perl
Perl. Mistrzostwo w programowaniu
by Brian D FoyProfesjonalne programowanie na mistrzowskim poziomie Jak wykrywa? b??dy, których Perl nie raportuje? Jak pisa? programy jako modu?y? Jak ?ledzi? dzia?anie programu za pomoc? Log4perl? Perl jest j?zykiem o szerokim zastosowaniu, mo?na go skompilowa? na prawie wszystkich architekturach i systemach operacyjnych. Wszechstronno?? Perla pozwala na programowanie w ró?nych modelach: proceduralnym, funkcyjnym czy obiektowym. Jest doskona?ym narz?dziem do analizy plików tekstowych oraz tworzenia raportów, aplikacji, modu?ów i programów. Umo?liwia powi?zanie systemów i struktur danych, których wspó?praca nie by?a przewidywana w momencie projektowania. Twórcy Perla twierdz?, ?e j?zyk ten sprawia, i? rzeczy ?atwe pozostaj? ?atwymi, a trudne staj? si? mo?liwe do wykonania. "Perl. Mistrzostwo w programowaniu" to wyj?tkowa ksi??ka pomagaj?ca w samodzielnej nauce, przeznaczona dla programistów, którzy u?ywali ju? Perla i znaj? jego podstawy. Pod??aj?c za radami z tego przewodnika, nauczysz si? definiowa? procedury i odwraca? zwyk?y model programowania proceduralnego. B?dziesz wiedzia?, jak zapisywa? dane, aby wykorzysta? je w innym programie, a tak?e jak poprawia? kod bez modyfikowania pierwotnego kodu ?ród?owego. Dowiesz si? tak?e, jak u?ywa? operacji na bitach oraz wektorów bitowych do efektywnego przechowywania danych. Czytaj?c "Perl. Mistrzostwo w programowaniu", zmierzasz prost? drog? do mistrzostwa. Tworzenie i zast?powanie nazwanych procedur Modyfikowanie i rozszerzanie modu?ów Konfigurowanie programów Perla Rejestrowanie b??dów i innych informacji Utrwalanie danych Praca z formatem Pod Tworzenie podklas modu?u Pod::Simple Operatory bitowe Przechowywanie ?a?cuchów bitowych Testowanie programu Do??cz do klasy mistrzów -- twórz profesjonalne programy w Perlu!
Permanent Magnet Spherical Motors: Model And Field Based Approaches For Design, Sensing And Control (Research on Intelligent Manufacturing)
by Kun Bai Kok-Meng LeeThis book introduces and illustrates modeling, sensing, and control methods for analyzing, designing, and developing spherical motors. It systematically presents models for establishing the relationships among the magnetic fields, position/orientation and force/torque, while also providing time-efficient solutions to assist researchers and engineers in studying and developing these motors. In order to take full advantage of spherical motors’ compact structure in practical applications, sensing and control methods that utilize their magnetic fields and eliminate the need to install external sensors for feedback are proposed. Further, the book investigates for the first time spherical motors’ force/torque manipulation capability, and proposes algorithms enabling the ball-joint-like end-effector for haptic use based on these motors’ hybrid position/force actuation modes. While systematically presenting approaches to their design, sensing and control, the book also provides many examples illustrating the implementation issues readers may encounter.
Persistence in PHP with the Doctrine ORM
by Kévin DunglasPersistence in PHP with the Doctrine ORM is a concise, fast, and focused guide to build a blog engine with advanced features such as native queries and lifecycle callbacks. This book is primarily intended for PHP developers and architects who want to increase their skills in the field of Persistence and ORM to map the data they are working on to objects they are using in programming. Basic knowledge of databases and PDO and working knowledge of PHP namespaces is a prerequisite.
Persistent Work-related Technology Use, Recovery and Well-being Processes
by Lenka Ďuranová Sandra OhlyTheaim of this work is to provide insight into the process of employee recoveryand well-being in regard to work-related ICT use during after-hours. Therefore,we discuss (1) theories that help us to understand the determinants andoutcomes of this behavior, (2) our core concepts recovery and well-being, and(3) previous empirical findings on ICT use after hours for work purposes. Onthe basis of literature review, we propose a new conceptual overall frameworkof ICT use after hours for work purposes with the focus on employee recoveryand well-being processes. Thereby, we posit ICT use after hours for workpurposes as potential stressor, resource, or demand (see action theory byHacker, 1998, 2003; Frese and Zapf 1994), depending on many personal and environmentalfactors, but primarily on cognitive appraisals (see transactional model ofstress by Lazarus and Folkman 1984). This three-way division enables us topropose various linear and non-linear associations to focused outcomes. Weconclude with an overall discussion on further research concerning theidentified research gaps.
Person Re-Identification
by Shaogang Gong Marco Cristani Shuicheng Yan Chen Change LoyThe first book of its kind dedicated to the challenge of person re-identification, this text provides an in-depth, multidisciplinary discussion of recent developments and state-of-the-art methods. Features: introduces examples of robust feature representations, reviews salient feature weighting and selection mechanisms and examines the benefits of semantic attributes; describes how to segregate meaningful body parts from background clutter; examines the use of 3D depth images and contextual constraints derived from the visual appearance of a group; reviews approaches to feature transfer function and distance metric learning and discusses potential solutions to issues of data scalability and identity inference; investigates the limitations of existing benchmark datasets, presents strategies for camera topology inference and describes techniques for improving post-rank search efficiency; explores the design rationale and implementation considerations of building a practical re-identification system.
Person, Thing, Robot: A Moral and Legal Ontology for the 21st Century and Beyond
by David J. GunkelWhy robots defy our existing moral and legal categories and how to revolutionize the way we think about them.Robots are a curious sort of thing. On the one hand, they are technological artifacts—and thus, things. On the other hand, they seem to have social presence, because they talk and interact with us, and simulate the capabilities commonly associated with personhood. In Person, Thing, Robot, David J. Gunkel sets out to answer the vexing question: What exactly is a robot? Rather than try to fit robots into the existing categories by way of arguing for either their reification or personification, however, Gunkel argues for a revolutionary reformulation of the entire system, developing a new moral and legal ontology for the twenty-first century and beyond.In this book, Gunkel investigates how and why efforts to use existing categories to classify robots fail, argues that &“robot&” designates an irreducible anomaly in the existing ontology, and formulates an alternative that restructures the ontological order in both moral philosophy and law. Person, Thing, Robot not only addresses the issues that are relevant to students, teachers, and researchers working in the fields of moral philosophy, philosophy of technology, science and technology studies (STS), and AI/robot law and policy but it also speaks to controversies that are important to AI researchers, robotics engineers, and computer scientists concerned with the social consequences of their work.
Personal Brand Creation in the Digital Age: Theory, Research And Practice
by Mateusz GrzesiakPresenting a scientific exploration of personal branding and digital communication, this ground-breaking book aims to fill a gap between theory and practice. Describing how social media can increase brand profiles online, it explains basic terms before investigating the cultural context for online personal branding. With a special focus on YouTube, the author provides a comparative analysis of two countries (USA and Poland) to open further avenues for research into this growing area. An essential read for management and marketing scholars, this study outlines and explores the evolution of media in the digital age from a business perspective, and offers a thought-provoking analysis for those interested in social media.
Personal Cybersecurity
by Marvin WaschkeDiscover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.
Personal Finance with Python: Using Pandas, Requests, And Recurrent
by Max HumberDeal with data, build up financial formulas in code from scratch, and evaluate and think about money in your day-to-day life. This book is about Python and personal finance and how you can effectively mix the two together. In Personal Finance with Python you will learn Python and finance at the same time by creating a profit calculator, a currency converter, an amortization schedule, a budget, a portfolio rebalancer, and a purchase forecaster. Many of the examples use pandas, the main data manipulation tool in Python. Each chapter is hands-on, self-contained, and motivated by fun and interesting examples.Although this book assumes a minimal familiarity with programming and the Python language, if you don't have any, don't worry. Everything is built up piece-by-piece and the first chapters are conducted at a relaxed pace. You'll need Python 3.6 (or above) and all of the setup details are included.What You'll LearnWork with data in pandasCalculate Net Present Value and Internal Rate ReturnQuery a third-party API with RequestsManage secretsBuild efficient loopsParse English sentences with RecurrentWork with the YAML file formatFetch stock quotes and use Prophet to forecast the futureWho This Book Is ForAnyone interested in Python, personal finance, and/or both! This book is geared towards those who want to manage their money more effectively and to those who just want to learn or improve their Python.
Personal Identification: Modern Development and Security Implications
by David J. HaasPersonal Identification: Modern Development and Security Implications, Second Edition explains how personal identification – and REAL ID – became part of the American fabric along with their past century’s historical ID development. The development of the “trusted and secure” personal identification documents began with passports and has continued as social changes made IDs more essential. This book describes the convergence of technologies and hundreds of patents that produced our “trusted and secure” documents and IDs from our past right up through to today.Key factors, that created today’s need for public-issued mass ID, are addressed: Chronicles the effects of large and mobile populations beginning a century ago Chronicles the effects of “impersonal” electronic & computer communications at a distance, and not face-to-face The distribution of services and money by government agencies based on a person’s identity – including “age” and “group” criteria Describes recent national security and terrorism concerns that necessitates the need to know: “You are who you say you are.” Personal identification documents (IDs) and the societal need for “trusted” identification by the public is a relatively new social phenomenon. In 1900, most people did not need or have any IDs until passports, with a photograph of the individual, became mandatory when Great Britain entered World War I in 1914. In the United States, the State-issued driver’s license is probably the only trusted ID in one’s wallet today, but they became “trusted and secure” documents only recently with the requirement for REAL ID. With the first photo driver’s license issued by the State of Colorado in 1959, it took until 1984 for the last State (New York, 25 years later) to comply.As a direct result of 9/11, where terrorists used fake driver’s licenses to board planes, Congress passed the Real ID Act in 2005 to make all State-issued driver’s licenses more trusted, uniform, and tamper-resistant – what is now called the Enhanced Driver’s License with non-drivers being issued Enhanced Identification Cards. And with this, every US citizen can now possess a trusted and secure personal identification document.Personal Identification, Second Edition chronicles the path of personal identification measures – including the latest developments of Real ID. Scholars and professional security managers understand that stability, security, and safety necessitate these identity measures to ensure a safer America. The book explains the various stages and advances, providing readers with a unique study of this fascinating history of the relationship between identity and the means by which one validates and proves their own identity. The enactment of the REAL ID Act of 2005, with more secure and tamper-resistant documents for each citizen of the United States, is being instituted so that one can trust: “you are who you say you are.” The State-issued driver’s license is not a National ID Card – it is a Nationally Recognized ID for each citizen.
Personal Media and Everyday Life: A Networked Lifeworld
by Terje RasmussenThis book addresses the widespread use of digital personal media in daily life. With a sociological and historical perspective, it explores the media-enhanced individualization and rationalization of the lifeworld, discussing the dramatic mediatization of daily life and calling on theorists such as McLuhan, Habermas and Goffman.
Personal Multimedia Preservation
by Vasileios Mezaris Claudia Niederée Robert H. LogieThis unique text/reference advocates a novel forgetful approach to dealing with personal multimedia content in the long run, which is inspired by the effectiveness of human forgetting as a mechanism for helping us to stay focused on important things. The text presents theoretical foundations, technologies, applications, and case study results that help the reader to understand the problems and challenges associated with personal digital preservation, and the solutions that can be developed in response to these challenges.Topics and features: Highlights the value of an intelligent and selective approach to personal multimedia preservation, involving managed forgetting and contextualized remembering; considers how a conceptual understanding of human memory function can be used to inspire the design of digital managed preservation and forgetting; discusses methods that endow computers with capabilities to understand digital content, in order to support intelligent preservation decisions; examines the assessment of the importance of information items, introducing the concepts of memory buoyancy and preservation value; reviews methods for preserving the context associated with a digital item, and for assessing how this context evolves over time; proposes a reference model for the Preserve-or-Forget (PoF) approach which is integrative, value-driven, brain-inspired, forgetful, and evolution-aware; describes the integration of preservation functionalities in a Personal Information Management (PIM) application; presents a user study on a photo selection task, using the results to design methods for automatically selecting important photos from personal collections.This interdisciplinary volume provides significant insights from computer science, engineering and psychology that will be of great interest to researchers involved in multimedia and software engineering, multimedia preservation, cultural informatics, digital heritage, and the digital humanities.
Personal Power: The iOS Edition
by Michael FeirPersonal Power; The iOS Edition is a guide for blind people who either own or are interested in using iOS devices made by Apple. Namely, iPHONEs, iPAds and iPODs. No prior experience is presumed.
Personal Productivity Secrets
by Maura Nevel ThomasLearn tried-and-tested methods for optimal personal productivity!Ever find yourself more than a bit overwhelmed by the constant influx of e-mail and reminders as well as the ever-present calendars, to-do lists, miscellaneous paper, and sticky notes? Add to that, myriad devices that were originally intended to make us more efficient, but in reality, only end up forcing us to juggle even more. Our brains aren't wired for all this, but we can learn to be productive. Personal Productivity Secrets gives you everything you need to know to be organized, in control, and to get things done:Understand how your brain absorbs, organizes, and filters the daily deluge of information, and learn to trick your brain into being more productive Appreciate the difference between "Time Management" and "Attention Management" and create workflow processes that help you defend your attention Create a plan for navigating endless technology options, and implement tools that will keep you productive, focused and in control Personal Productivity Secrets reveals updated and vital information for achieving your significant results, and being as productive as you can be in a fast-paced, technology-driven society.
Personal Robotics: Real Robots to Construct, Program, and Explore the World
by Richard RaucciMany companies are now offering robots that are geared to the casual electronics hobbyist, both in kit form and as fully assembled models. This book gives an overview of available robot products, ranging from the simple to the complex. Interested readers will be able to find the robot kit that matches their skill level and pocketbook. Beginners may want to try a robot that is already fully assembled, or a kit with pre-assembled electronics. Other readers may opt for kits that require soldering and electronic experience. Other criteria a reader will be able to review include motion systems (robots that roll on wheels, or walk on legs, or robot arms), available sensors (from none to a wide range), and programming complexity (how the robot is programmed). If its not really a robot, its not in this book.
Personalinformationssysteme in der Personalentwicklung und im Talent-Management: Eine empirische Untersuchung zum strategischen Einsatz und zur Rolle von Stakeholder*innen (Personalmanagement und Arbeitsorganisation)
by Jasmin MichlJasmin Michl realisiert eine tiefgehende Untersuchung zum Einsatz von Personalinformationssystemen in der Personalentwicklung und im Talent-Management mit besonderem Fokus auf strategische Einsatzgebiete und die Rolle von Stakeholder*innen. Im Rahmen ihrer Analyse verbindet die Autorin Perspektiven unterschiedlicher Interessengruppen, um die zentralen Herausforderungen digitaler Einführungsvorhaben im Personalbereich für Unternehmen und ihre Mitarbeitenden herauszuarbeiten. Hierbei wird auf Grundlage eines Mixed-Methods-Ansatzes deutlich, dass die erfolgreiche Bewältigung von technologischen Einführungsprojekten in HR keine rein technische Frage darstellt, sondern vielmehr eine der organisationalen Rahmenbedingungen und der sozialen Transformation. Die Erkenntnisse der Untersuchung bieten einen Einblick in transformationale Bewältigungs- und Positionierungsprobleme von und in Organisationen und bieten eine Grundlage zur Erarbeitung von möglichen Handlungs- und Zielfeldern für die Praxis.
Personalising Human-Robot Interactions in Social Contexts (Springer Tracts in Advanced Robotics #159)
by Carme Torras Antonio Andriella Guillem AlenyàThis book offers an insightful exploration of the pivotal role of robots in our ever-changing society. As intelligent machines become increasingly integrated into various aspects of our lives, their impact on how we live, work, and interact becomes undeniable. Within these pages, the book delves into the key concept of personalisation, unravelling the profound importance of tailoring robotic interactions to meet the unique needs and preferences of individuals. This exploration seeks to foster a deeper understanding of how robots can enhance our lives and potentially be a worthwhile technology to address some important societal issues. To showcase that, the book centres on a practical use case that is built upon collaboration with healthcare experts: designing personalised robots for assisting patients affected by cognitive decline. With over 50 million people affected by dementia worldwide and an expected tripling of this number by 2050, the need for effective and accessible treatments is more pressing than ever. While there are no pharmacological treatments for this syndrome, cognitive training has shown promise for maintaining and even improving cognitive functioning among dementia patients. However, the shortage of healthcare professionals capable of delivering such therapy presents a significant challenge. This is where the potential of robots comes into play. This book delves into the potential of robotic technology designed to bridge this societal gap. By taking a therapist-oriented approach, it investigates the insights that can be gleaned from involving therapists in the entire pipeline of the design process as well as in the automatisation of the robots' assistive behaviour. Specifically, this book aims to address personalisation from two complementary perspectives by designing robots that are both adaptable and adaptive.
Personalising Learning in Teacher Education
by Mellita Jones Karen McLeanThis volume sheds light on debates about personalised learning in teacher education by exploring the popular emergence of personalising learning in education and hence its significance in teacher education in the 21st century. It examines personalising learning theory and explores the tenets of this theory and its recent trends in international settings. The theory is explored in relation to both general and higher education pedagogy, and in a range of examples within a teacher education context. The examples from practice provide insights into maximising the potential for personalising learning theory to enhance teaching, learning and assessment in teacher education. The book includes case studies involving pre-service teachers working in communities of practice with one another, with schools and with the wider community. Examples of technology for personalising learning are also described. All the case studies demonstrate how the learner is made central to the teaching and assessment approaches adopted and contributes to a lifelong learning continuum. Providing insights into a new pedagogy for teacher education that leads to an enriched student experience, the book presents a model for personalising learning in teacher education that offers support for 21st century teacher educators.
Personality Capture and Emulation
by William Sims BainbridgePersonality Capture and Emulation is the gateway to an amazing future that actually may be achieved, enabling the preservation and simulation of human personalities at progressively higher levels of fidelity. This challenge is no longer the province merely of uninhibited visionaries, but has become a solid field of research, drawing upon a wide range of information technologies in human-centered computing and cyber-human systems. Even at modest levels of accomplishment, research in this emerging area requires convergence of cognitive, social, and cultural sciences, in cooperation with information engineering and artificial intelligence, thus stimulating new multidisciplinary perspectives. Therefore this book will inspire many specific research and development projects that will produce their own valuable outcomes, even as the totality of the work moves us closer to a major revolution in human life. Will it ever really be possible to transfer a human personality at death to a technology that permits continued life? Or will people come to see themselves as elements in a larger socio-cultural system, for which a societal information system can provide collective immortality even after the demise of individuals? A large number and variety of pilot studies and programming projects are offered as prototypes for research that innovators in many fields may exploit for the achievement of their own goals. Together, they provide an empirical basis to strengthen the intellectual quality of several current debates at the frontiers of the human and information sciences.
Personality Traits and Drug Consumption: A Story Told by Data (SpringerBriefs in Statistics)
by Alexander N. Gorban Jeremy Levesley Elaine Fehrman Vincent Egan Evgeny M. Mirkes Awaz K. MuhammadThis book discusses the psychological traits associated with drug consumption through the statistical analysis of a new database with information on 1885 respondents and use of 18 drugs. After reviewing published works on the psychological profiles of drug users and describing the data mining and machine learning methods used, it demonstrates that the personality traits (five factor model, impulsivity, and sensation seeking) together with simple demographic data make it possible to predict the risk of consumption of individual drugs with a sensitivity and specificity above 70% for most drugs. It also analyzes the correlations of use of different substances and describes the groups of drugs with correlated use, identifying significant differences in personality profiles for users of different drugs. The book is intended for advanced undergraduates and first-year PhD students, as well as researchers and practitioners. Although no previous knowledge of machine learning, advanced data mining concepts or modern psychology of personality is assumed, familiarity with basic statistics and some experience in the use of probabilities would be helpful. For a more detailed introduction to statistical methods, the book provides recommendations for undergraduate textbooks.
Personality and Data Protection Rights on the Internet: Brazilian and German Approaches (Ius Gentium: Comparative Perspectives on Law and Justice #96)
by Marion Albers Ingo Wolfgang SarletThis book focuses on protection needs and new aspects of personality and data protection rights on the Internet, presenting a comprehensive review that discusses and compares international, European and national (Brazilian, German, Pakistani) perspectives. It deals with overarching questions, such as whether universal minimum standards of privacy protection can be developed or how regional data protection rights can be safeguarded and enforced extraterritorially, given the conditions of the Internet. Furthermore, the book addresses new challenges and novel rights, e. g., data retention and protection against mass surveillance, the right to be forgotten, rights to anonymity, legal issues of the digital estate or rights relating to algorithmic decision-making. Furthermore, the book explores how well-known paradigms, such as liability for personality rights violations or damages, have to be adapted in view of the significant role of intermediaries.
Personality in Speech
by Tim PolzehlThis work combines interdisciplinary knowledge and experience from research fields of psychology, linguistics, audio-processing, machine learning, and computer science. The work systematically explores a novel research topic devoted to automated modeling of personality expression from speech. For this aim, it introduces a novel personality assessment questionnaire and presents the results of extensive labeling sessions to annotate the speech data with personality assessments. It provides estimates of the Big 5 personality traits, i. e. openness, conscientiousness, extroversion, agreeableness, and neuroticism. Based on a database built on the questionnaire, the book presents models to tell apart different personality types or classes from speech automatically.