Abstract
This chapter discusses the design challenges of the Integral Communication Framework (ICF) and describes a conceptual model of the ICF developed through Design Science Research (DSR) methodology. The ICF is an information system based on an integral digital identity that supports personalised communication. An integral digital identity consists of a uniform set of keywords or tags that can be evaluated in different ways and additionally enriched with metadata (e.g., location data). Integral tag is a specific type of hashtag that can be described by metadata, translated into multiple languages, and evaluated by users or tests. Integral identity is a set of digital records that describes social actors in all aspects of their personhood and promotes integral communication in digitally enabled interactions. Integral identity has past, present, and future dimensions described by preferences. Integral mapping involves the assignment, visualisation, and analysis of integral tags that facilitate integral communication. When used within the ICF, integral mapping enables automatic identification of compatible and complementary positions. The SWOT analysis of the ICF has identified social perceptibility as the key strength, sustainable and inclusive development as the key opportunities, addictive behaviour as the key weakness, and autocratic and unauthorised control as the key threats. Today’s society needs a communication framework that promotes sustainability, assertiveness and inclusion by providing equal access to opportunities and resources for social actors who would otherwise be excluded or marginalised.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abdelal, R., Herrera, Y. M., Johnston, A. I., & McDermott, R. (2006). Identity as a variable. Harvard Business Review, 4(4), 695–711. https://www.hbs.edu/ris/Publication%20Files/Identity%20as%20a%20Variable_15cfe909-8570-4669-8e11-480c95e8a885.pdf
Ackland, P., Resnikoff, S., & Bourne, R. (2017). World blindness and visual impairment: despite many successes, the problem is growing. Community Eye Health, 30(100), 71–73. PMID: 29483748; PMCID: PMC5820628.
Alashoor, T., Han, S., & Joseph, R. C. (2017). Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: An APCO model. Communications of the Association for Information Systems, 41, 62–96. https://doi.org/10.17705/1cais.04104
Anant, V., Donchak, L., Kaplan, J., & Soller, H. (2020). The consumer-data opportunity and the privacy imperative. McKinsey. Retrieved July15, 2023., from https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/the-consumer-data-opportunity-and-the-privacy-imperative
Andreassen, C. S., Billieux, J., Griffiths, M. D., Kuss, D. J., Demetrovics, Z., Mazzoni, E., & Pallesen, S. (2016). The relationship between addictive use of social media and video games and symptoms of psychiatric disorders: A large-scale cross-sectional study. Psychology of Addictive Behaviors, 30(2), 252–262. https://doi.org/10.1037/adb0000160
Anrig, B., Benoist, E., & Jaquet-Chiffelle, D. O. (2006). Virtual persons applied to authorization, individual authentication and identification. In D.-O. Jaquet-Chiffelle, E. Benoist, & B. Anrig (Eds.), FIDIS: Future of Identity in the Information Society – Identity in a Networked World: Use Cases and Scenarios. VIP – Virtual Identity and Privacy Research Center, Berne University of Applied Sciences. http://www.fidis.net/fileadmin/fidis/deliverables/booklet/fidis.booklet.Identity_in_a_Networked_World.d26.pdf
Ashforth, B. E. (2014). Identity, personal; role transitions. In P. C. Flood & Y. Freeney (Eds.), Wiley encyclopedia of management (Organizational Behavior) (Vol. 11, 3rd ed., pp. 1–2). Wiley. https://doi.org/10.1002/9781118785317.weom110163
Ashforth, B. E., & Mael, F. (1989). Social identity theory and the organization. The Academy of Management Review, 14(1), 20–39. https://doi.org/10.2307/258189
Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30(1), 13–28. https://doi.org/10.2307/25148715
Badr, A., & Abdul-Hassan, A. (2020). A review on voice-based interface for human-robot interaction. Iraqi Journal for Electrical and Electronic Engineering, 16(2), 1–12. https://doi.org/10.37917/ijeee.16.2.10
Bailenson, J. N., Beall, A. C., Loomis, J., Blascovich, J., & Turk, M. (2004). Transformed social interaction: Decoupling representation from behavior and form in collaborative virtual environments. Presence: Teleoperators and Virtual Environments, 13(4), 428–441. https://doi.org/10.1162/1054746041944803
Bansal, H., & Kohli, S. (2019). Trust evaluation of websites: A comprehensive study. International Journal of Advanced Intelligence Paradigms, 13(1/2), 101. https://doi.org/10.1504/ijaip.2019.099946
Bargh, J. A., & Mckenna, K. Y. (2004). The internet and social life. Annual Review of Psychology, 55(1), 573–590. https://doi.org/10.1146/annurev.psych.55.090902.141922
Batmunkh, A. (2022). Carbon footprint of the most popular social media platforms. Sustainability, 14(4), 2195. https://doi.org/10.3390/su14042195
Beduschi, A. (2019). Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights. Big Data & Society, 6(2), 205395171985509. https://doi.org/10.1177/2053951719855091
Benbasat, I., & Zmud, R. W. (1999). Empirical research in information systems: The practice of relevance. Management Information Systems Quarterly, 23(1), 3–16. https://doi.org/10.2307/249403
Bozdag, E., & van den Hoven, J. (2015). Breaking the filter bubble: Democracy and design. Ethics and Information Technology, 17(4), 249–265. https://doi.org/10.1007/s10676-015-9380-y
Burbach, L., Halbach, P., Ziefle, M., & Calero Valdez, A. (2019). Bubble Trouble: Strategies Against Filter Bubbles in Online Social Networks. In: Duffy, V. (eds) Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Healthcare Applications. HCII 2019. Lecture Notes in Computer Science, vol 11582. Springer. https://doi.org/10.1007/978-3-030-22219-2_33.
Buttle, F., & Maklan, S. (2019). Customer relationship management: Concepts and technologies. Routledge.
Canales, K. (2021, December 24). China’s ‘social credit’ system ranks citizens and punishes them with throttled internet speeds and flight bans if the Communist Party deems them untrustworthy. Business insider. Retrieved May 3, 2023, from https://www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4
Chan, M. J. (2007, June 14). Identity in a virtual world. CNN. Retrieved May 15, 2023, from http://edition.cnn.com/2007/TECH/06/07/virtual_identity/index.html
Chen, L., Stankovski, V., Shi, Z., & Watson, P. (2008). Semantic-enabled and agent-based environment aware agile service utilities. In 2008 fourth international conference on semantics, knowledge and grid, Beijing (pp. 461–464). https://doi.org/10.1109/SKG.2008.109
Code, J. R., & Zaparyniuk, N. E. (2009). Social identities, group formation, and the analysis of online communities. In S. Hatzipanagos & S. Warburton (Eds.), Handbook of research on social software and developing community ontologies. IGI Global. https://doi.org/10.4018/978-1-60566-984-7.ch086
Collins, G. R. (2020). Improving human–robot interactions in hospitality settings. International Hospitality Review, 34(1), 61–79. https://doi.org/10.1108/ihr-09-2019-0019
Cufoglu, A. (2014). User profiling – a short review. International Journal of Computer Applications, 108(3), 1–9. https://doi.org/10.5120/18888-0179
Deloitte. (2023). Connecting with meaning Hyper-personalizing the customer experience using data, analytics, and AI. Deloitte. Retrieved July 14, 2023. from https://www2.deloitte.com/content/dam/Deloitte/ca/Documents/deloitte-analytics/ca-en-omnia-ai-marketing-pov-fin-jun24-aoda.pdf
Deuerlein, C., Langer, M., Seßner, J., Heß, P., & Franke, J. (2021). Human-robot-interaction using cloud-based speech recognition systems. Procedia CIRP, 97, 130–135. https://doi.org/10.1016/j.procir.2020.05.214
Dietrich, F., & List, C. (2012). Where do preferences come from? International Journal of Game Theory, 42(3), 613–637. https://doi.org/10.1007/s00182-012-0333-y
Domingo, A. I. S., & Enríquez, Á. M. (2018). Digital identity: The current state of affairs – BBVA research. BBVA Research, Retrieved January 14, 2023, from https://www.bbvaresearch.com/wp-content/uploads/2018/02/Digital-Identity_the-current-state-of-affairs.pdf
Drury, B., Drury, S. M., Rahman, M. A., & Ullah, I. (2022). A social network of crime: A review of the use of social networks for crime and the detection of crime. Online Social Networks and Media, 30, 100211. https://doi.org/10.1016/j.osnem.2022.100211
Eurostat. (2022). How do EU citizens manage their personal data online? European Commission. Retrieved July 12, 2023, from https://ec.europa.eu/eurostat/web/products-eurostat-news/-/edn-20220127-1
Eurostat. (2023). Food waste and food waste prevention – estimates. European Commission. Retrieved July 18, 2023, from https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Food_waste_and_food_waste_prevention_-_estimates
FAO. (2019). 2019 the state of food and agriculture - moving forward on food loss and waste reduction. Food and Agriculture Organization of the United Nations. Retrieved July 20, 2023, from https://food.ec.europa.eu/system/files/2019-10/fw_lib_fao-2019_en.pdf
Fearon, J. D. (1999). What is identity (As we now use the word) (draft)? Department of Political Science Stanford University, Stanford, Retrieved January11, 2023, from http://www.web.stanford.edu/group/fearon-research/cgi-bin/wordpress/wp-content/uploads/2013/10/What-is-Identity-as-we-now-use-the-word-.pdf
Fisher, J. H. N., Caldwell, J., Price, B, Price, E. (2016). Technology addiction: Concern, controversy, and finding balance. Common sense media. Retrieved November 11, 2022, from https://www.commonsensemedia.org/sites/default/files/research/report/csm_2016_technology_addiction_research_brief_0.pdf
Gardner, H., & Davis, K. (2014). The app generation: How Today’s youth navigate identity, intimacy, and imagination in a digital world: With a new preface. Yale University Press.
Geddes, D., & Baron, R. A. (1997). Workplace aggression as a consequence of negative performance feedback. Management Communication Quarterly, 10(4), 433–454. https://doi.org/10.1177/0893318997104002
Godoy, D., & Amandi, A. (2005). User profiling in personal information agents: A survey. The Knowledge Engineering Review, 20(4), 329–361. https://doi.org/10.1017/s0269888906000397
Goitein, E. (2019). How the FBI violated the privacy rights of tens of thousands of Americans. Brennan Center. Retrieved June 10, 2023, from https://www.brennancenter.org/our-work/analysis-opinion/how-fbi-violated-privacy-rights-tens-thousands-americans
Hevner, A., & Chatterjee, S. (2010). Design research in information systems. In Theory and practice. Springer. https://doi.org/10.1007/978-1-4419-5653-8
Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. Management Information Systems Quarterly, 28(1), 75–105. https://doi.org/10.2307/25148625
Holi, M., & Hyvönen, E. (2006). Modelling uncertainty in semantic web taxonomies. Soft Computing in Ontologies and Semantic Web, 31–46. https://doi.org/10.1007/978-3-540-33473-6_2
Hudson Institute. (2018, October 4). Vice president Mike Pence’s remarks on the Administration’s policy towards China. Hudson. Retrieved June 5, 2023, from https://www.hudson.org/events/1610-vice-president-mike-pence-s-remarks-on-the-administration-s-policy-towards-china102018
Hussain, Z., & Pontes, H. M. (2019). Personality, internet addiction, and other technological addictions: A psychological examination of personality traits and technological addictions. In I. Management Association (Ed.), Internet and technology addiction: Breakthroughs in research and practice (pp. 335–361). IGI Global. https://doi.org/10.4018/978-1-5225-8900-6.ch020
ITU. (2018). Digital identity roadmap guide. International Telecommunication Union. Retrieved February 5, 2023, from Applications/Documents/Guides/Digital_Identity_Roadmap_Guide-2018-E.pdf
Jenkins, R. (2014). Social identity. Routledge.
Johnson, D. W., Johnson, R. T., & Holubec, E. J. (2008). Cooperation in the classroom. Interaction Book.
Kamberg, M.-L. (2019). Digital identity: Your reputation online. Rosen Publishing.
Khaewratana, W., Veinott, E. S., & Ramkumar, S. M. (2020). Development of a generalised voice-controlled human-robot interface: One automatic speech recognition system for all robots. In 2020 3rd international conference on control and robots (ICCR) (pp. 38–42). https://doi.org/10.1109/iccr51572.2020.9344123
Koole, M. L., & Parchoma, G. (2012). The web of identity. Digital Identity and Social Media, 1–15. https://doi.org/10.4018/978-1-4666-1915-9.ch002
Korte, R. F. (2007). A review of social identity theory with implications for training and development. Journal of European Industrial Training, 31(3), 166–180. https://doi.org/10.1108/03090590710739250
Kull, K. (2019). Steps towards the natural meronomy and taxonomy of semiosis: Emotin between index and symbol? Sign Systems Studies, 47(1/2), 88–104. https://doi.org/10.12697/sss.2019.47.1-2.03
Laurent, M., & Bouzefrane, S. (2015). Digital identity management. Elsevier Science.
Leary, M. R., & Kowalski, R. M. (1995). Social anxiety. Guilford Press.
Luo, W., Song, L. J., Gebert, D. R., Zhang, K., & Feng, Y. (2016). How does leader communication style promote employees’ commitment at times of change? Journal of Organizational Change Management, 29(2), 242–262. https://doi.org/10.1108/jocm-11-2014-0204
Manancourt, V. (2022, July 7). Europe faces a Facebook blackout. Politico. Retrieved June 10, 2023, from https://www.politico.eu/article/europe-faces-facebook-blackout-instagram-meta-data-protection/
Marge, M., Espy-Wilson, C. Y., & Ward, N. G. (2020). Spoken language interaction with Robots: Research Issues and Recommendations. Report from the NSF Future Directions Workshop. https://doi.org/10.48550/arXiv.2011.05533
Martic, K. (2022). Top 13 communication barriers and how to tackle them. Haiilo. Retrieved March 5, 2023 from https://haiilo.com/blog/communication-barriers/
Masseno, M. D., & Santos, C. T. (2019). Personalization and profiling of tourists in smart tourism destinations - a data protection perspective. International Journal of Information Systems and Tourism (IJIST), 4(2), 7–23. http://www.uajournals.com/ijist-tourism/journal/4/2/1.pdf
McKinsey. (2013). Using customer analytics to boost corporate performance. Key insights from McKinsey’s DataMatics 2013 survey. McKinsey. Retrieved July 3, 2023. from https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/Marketing%20and%20Sales/Our%20Insights/Five%20facts%20How%20customer%20analytics%20boosts%20corporate%20performance/Datamatics.pdf
Mildebrath, H. (2022). The future of data protection and privacy. How the European Parliament is responding to citizens’ expectations. Members’ research service, PE 729.396. European Parliament. Retrieved May 15, 2023 from https://www.europarl.europa.eu/RegData/etudes/BRIE/2022/729396/EPRS_BRI(2022)729396_EN.pdf
Molina, B. (2017). Want to feel #old? This is the first tweet with a hashtag. USA Today. Retrieved May 20, 2023, from https://eu.usatoday.com/story/tech/talkingtech/2017/08/23/twitter-hashtag-turns-10/592868001/
Morris, C. W. (1945). Foundations of the theory of signs. University of Chicago Press.
Munson, S. A., & Resnick, P. (2010). Presenting diverse political opinions. In Proceedings of the 28th international conference on human factors in computing systems – CHI ‘10 (pp. 1457–1466). https://doi.org/10.1145/1753326.1753543
Naeem, B., Hassan, S. U., & Yousuf, N. (2023). An AI Based Voice Controlled Humanoid Robot [Unpublished manuscript]. https://doi.org/10.21203/rs.3.rs-2424215/v1
Nagulendra, S., & Vassileva, J. (2014). Understanding and controlling the filter bubble through interactive visualization. In Proceedings of the 25th ACM conference on hypertext and social media (pp. 107–115). https://doi.org/10.1145/2631775.2631811
Oliveira, N., Argyres, N., & Lumineau, F. (2022). The role of communication style in adaptation to Interorganizational project disruptions. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4090335
Paljak, I. (2018). Modeli za izgradnju semantičke taksonomije iz debatnih rasprava [Semantic Taxonomy Learning from Online Debates] (thesis). University of Zagreb, Faculty of Electrical Engineering and Computing. https://urn.nsk.hr/urn:nbn:hr:168:399034
Panko, B. (2017, August 23). A decade ago, the hashtag reshaped the internet. Smithsonian magazine. Retrieved January 11, 2023, from https://www.smithsonianmag.com/smart-news/decade-ago-hashtag-reshaped-internet-180964605/
Papa, V., & Photiadis, T. (2021). Algorithmic curation and users’ civic attitudes: A study on facebook news feed results. Information, 12(12), 522. https://doi.org/10.3390/info12120522
Pariser, E. (2011). The filter bubble: What the internet is hiding from you. The Penguin Press.
Paulsen, K. (2011). Moving media storage technologies: Applications & workflows for video and media server platforms. Elsevier.
Pipitone, A., & Chella, A. (2021). What robots want? Hearing the inner voice of a robot. iScience, 24(4), 102371. https://doi.org/10.1016/j.isci.2021.102371
Pontes, H. M. (2017). Investigating the differential effects of social networking site addiction and internet gaming disorder on psychological health. Journal of Behavioral Addictions, 6(4), 601–610. https://doi.org/10.1556/2006.6.2017.075
Pratt, M. G., Schultz, M., Ashforth, B. E., & Ravasi, D. (2016). The Oxford handbook of organizational identity. Oxford University Press. https://doi.org/10.1093/oxfordhb/9780199689576.001.0001
Purao, S. (2002). Design research in the Technology of Information Systems: Truth or dare. Semantic scholar. Retrieved June 13, 2022, from https://www.semanticscholar.org/paper/Design-Research-in-the-Technology-of-Information-or-Purao/2cad8bcab1990dd536724bbc97331d67b25cf4ed
Rafajac, O., & Jakupović, A. (2017). Integral communication tool: What it is, how it works, where it helps? The International Journal of e-Collaboration, 13(3), 1–20. https://doi.org/10.4018/IJeC.2017070101
Rahnama, H. & Pentland, A. (2022, February 25). The new rules of data privacy. Harvard Business Review. Retrieved July 6, 2023, from https://hbr.org/2022/02/the-new-rules-of-data-privacy
Ranjan, P., & Tarasia, N. (2013). Challenges in password memorization for multiple accounts of single user. International Journal of Science and Research, 2(3), 284–286.
Razis, G., Anagnostopoulos, I., & Zhou, H. (2021). Identifying dominant nodes in semantic taxonomies. In 16th international workshop on semantic and Social Media Adaptation & Personalization (SMAP). https://doi.org/10.1109/smap53521.2021.9610779
Reuters. (2022). Irish regulator moves closer to ban on Facebook EU-U.S. data flows. Reuters. Retrieved July 12, 2023, from https://www.reuters.com/technology/irish-regulator-moves-closer-possible-ban-facebook-instagram-eu-us-data-flows-2022-07-07/
Revell, T. (2018, September 26). Mind-reading devices can now access your thoughts and dreams using AI. New Scientist. Retrieved July 14, 2023, from https://www.newscientist.com/article/mg23931972-500-mind-reading-devices-can-now-access-your-thoughts-and-dreams-using-ai/
Riihimaa, J. (2004). Taxonomy of information and communication technology system innovations adopted by small and medium sized enterprises. University of Tampere. Department of Computer Sciences. https://trepo.tuni.fi/bitstream/handle/10024/67404/951-44-6027-8.pdf?sequence=1
Rogers, R., & Niederer, S. (2020). The politics of social media manipulation. The Politics of Social Media Manipulation, 19–70. https://doi.org/10.2307/j.ctv1b0fvs5.3
Rosemann, M., & Vessey, I. (2008). Toward improving the relevance of information systems research to practice: The role of applicability checks. Management Information Systems Quarterly, 32(1), 1–22. https://doi.org/10.2307/25148826
Sathyavenkateshwaren, S., & Malathi, S. (2018). Humanoid robot: A survey on communication, tracking and voice recognition. In 3rd international conference on inventive computation technologies (ICICT) (pp. 555–560). https://doi.org/10.1109/icict43934.2018.9034329
Segment. (2022). The State of Personalization 2022. Segment. Retrieved January 28, 2023, from https://segment.com/pdfs/State-of-Personalization-Report-Twilio-Segment-2022.pdf
Stojanović, N., Mentaz, G., & Apostolu, D. (2006). Semantic-enabled agile knowledge-based e-government. American Association for Artificial Intelligence. https://www.aaai.org/Papers/Symposia/Spring/2006/SS-06-06/SS06-06-022.pdf
Sullivan, C. (2011). Digital identity: An emergent legal concept. University of Adelaide Press.
Ta’amneh, I. M., & Al-Ghazo, A. (2021). The importance of using hashtags on raising awareness about social issues. International Journal of Learning and Development, 11(4), 10–24. https://doi.org/10.5296/ijld.v11i4.19139
Tada, Y., Hagiwara, Y., Tanaka, H., & Taniguchi, T. (2020). Robust understanding of robot-directed speech commands using sequence to sequence with noise injection. Frontiers in Robotics and AI, 6, 1–12. https://doi.org/10.3389/frobt.2019.00144
Thibodeau, K. (2021). Discerning meaning and producing information: Semiosis in knowing the past. Information, 12(9), 1–21. https://doi.org/10.3390/info12090363
Thomson, W. (1st Baron Kelvin). (1883). “Lecture on electrical units of measurement”, in popular lectures and addresses (Vol. 1). Macmillan.
Toomey, P. (2018, August 22). The NSA Continues to Violate Americans’ Internet Privacy Rights. ACLU. Retrieved March 1, 2023, from https://www.aclu.org/blog/national-security/privacy-and-surveillance/nsa-continues-violate-americans-internet-privacy
Walther, J. B. (2007). Selective self-presentation in computer-mediated communication: Hyperpersonal dimensions of technology, language, and cognition. Computers in Human Behavior, 23(5), 2538–2557. https://doi.org/10.1016/j.chb.2006.05.002
Warren, C., McGraw, A., & Van Boven, L. (2010). Values and preferences: Defining preference construction. Wiley Interdisciplinary Reviews: Cognitive Science, 2(2), 193–205. http://leeds-faculty.colorado.edu/mcgrawp/pdf/warren.mcgraw.vanboven.inpress.pdf
Windley, P. J. (2023). Learning digital identity: Design, deploy, and manage identity architectures. O’Reilly Media, Inc.
World Bank. (2018). Technology landscape for digital identification. World Bank. Retrieved February 14, 2023, from https://documents1.worldbank.org/curated/en/199411519691370495/Technology-Landscape-for-Digital-Identification.pdf
Yee, N., & Bailenson, J. (2007). The Proteus effect: The effect of transformed self-representation on behavior. Human Communication Research, 33(3), 271–290. https://doi.org/10.1111/j.1468-2958.2007.00299.x
Zauderer, S. (2023, June 30). 33 dyslexia statistics & facts: How many people have dyslexia?. Life-changing ABA therapy – Cross River therapy. Retrieved July 1, 2023, from https://www.crossrivertherapy.com/research/dyslexia-statistics
Zhang, X., & Zhou, M. (2021). An exploration of Chinese students’ perceived barriers to effective intercultural communication. Journal of Language and Cultural Education, 9(2), 11–31. https://doi.org/10.2478/jolace-2021-0008
Zuboff, S. (2019). The age of surveillance capitalism: The fight for human future at the New Frontier of Power. PublicAffairs.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rafajac, O., Jakupović, A. (2024). Integral Communication Framework. In: Rafajac, O., Jakupović, A. (eds) Integral Communication and Digital Identity . Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-47460-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-47460-6_3
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-031-47459-0
Online ISBN: 978-3-031-47460-6
eBook Packages: Literature, Cultural and Media StudiesLiterature, Cultural and Media Studies (R0)