Maurizio Naldi

Maurizio Naldi
LUMSA Università Maria SS. Assunta di Roma | Lumsa · Dept. of Law, Economics, Politics and Modern Languages

Full Professor

About

232
Publications
52,906
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,753
Citations
Citations since 2017
73 Research Items
1072 Citations
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
Introduction
I'm currently working on the following topics: - Risk management in communications networks and services - Network economics - Privacy (anonymization) - Social network analysis in fiction, TV series, and online communities
Additional affiliations
October 2019 - present
LUMSA Università Maria SS. Assunta di Roma
Position
  • Professor (Full)
January 2014 - present
LUISS Guido Carli, Libera Università Internazionale degli Studi Sociali
Position
  • Professor
Description
  • Professor of Computer Science
October 2010 - July 2013
Education
October 1995 - October 1998
University of Rome Tor Vergata
Field of study
  • Telecommunications Engineering

Publications

Publications (232)
Article
Full-text available
Purpose Though the circular economy (CE) is a current buzzword, this still lacks a precise definition. In the absence of a clear notion of what that term includes, actions taken by the government and companies may not be well informed. In particular, those actions need to consider what people mean when people talk about the CE, either to refocus pe...
Article
Full-text available
The ongoing deployment of 5G is accompanied by architecture and pricing decisions. Network sharing is a critical feature, allowing operators to reduce their costs, but introducing a mixed partnering/competition situation, where the infrastructure owner, renting out their infrastructure to virtual operators (who act as customers), also provides serv...
Article
Full-text available
The correct detection of negations is essential to the performance of sentiment analysis tools. The evaluation of such tools is currently conducted through the use of corpora as an opportunistic approach. In this paper, we advocate using a different evaluation approach based on a set of intentionally built sentences that include negations, which ai...
Article
Full-text available
Cybersecurity breach probability functions describe how cybersecurity investments impact the actual vulnerability to cyberattacks through the probability of success of the attack. They essentially use mathematical models to make cyber-risk management choices. This paper provides an overview of the breach probability models that appear in the litera...
Article
Parallel to the increasing use of smart speakers (aka virtual assistants), privacy concerns emerge. In this article, we provide a systematic review of the literature on privacy issues in smart speakers. Both Scopus and Web of Science databases are examined, as well as the preprint repository arXiv, to take into account the most recent contributions...
Article
Full-text available
The use of the cloud to store personal/company data and to run programs is gaining wide acceptance as it is more efficient and cost-effective. However, cloud services may not always be available, which could lead to losses for customers and the cloud provider (the provider is typically obligated to compensate its customers). It can protect itself f...
Article
Full-text available
In the context of growing vulnerabilities, cyber-risk management cannot rely on a one-off approach, instead calling for a continuous re-assessment of the risk and adaptation of risk management strategies. Under the mixed investment–insurance approach, where both risk mitigation and risk transfer are employed, the adaptation implies the re-computati...
Article
Full-text available
Discussions about wind energy and its environmental impact take place routinely over Twitter. Twitterers with a strong interest in the matter may also retweet their own tweets (aka self-reposting) as a means to increase their visibility and push their message across. Identifying the features that make self-reposted tweets different from tweets that...
Article
Smart speakers equipped with intelligent voice processing functions, like Siri and Amazon Echo, have become widespread globally. However, their recording and networking capabilities spur concerns about users’ privacy. In this research, we report the results of a text-mining analysis of customers’ perception of privacy in smart speakers. The corpus...
Article
Full-text available
Investors usually resort to financial advisors to improve their investment process until the point of complete delegation on investment decisions. Surely, financial advice is potentially a correcting factor in investment decisions but, in the past, the media and regulators blamed biased advisors for manipulating the expectations of naive investors....
Article
Full-text available
The Industry 4.0 paradigm represents the fourth industrial revolution, embodied by the marriage between information and communication technologies and manufacturing. Assessment campaigns are conducted to examine the status of deployment of that paradigm, mostly through self-assessment questionnaires. Each campaign is typically limited in scope, inv...
Chapter
The insurgence of the COVID pandemic calls for mass vaccination campaigns worldwide. Pharmaceutical companies struggle to ramp up their production to meet the demand for vaccines but cannot always guarantee a perfectly regular delivery schedule. On the other hand, governments must devise plans to have most of their population vaccinated in the shor...
Article
Full-text available
Investments in security and cyber-insurance are two cyber-risk management strategies that can be employed together to optimize the overall security expense. In this paper, we provide a closed form for the optimal investment under a full set of insurance liability scenarios (full liability, limited liability, and limited liability with deductibles)...
Chapter
Online forums represent a widely used means of getting information and taking decision concerning personal finance. The dynamics of conversations taking place in the forum may be examined through a social network analysis (SNA). Two major personal finance forums are analysed here though an SNA approach, also borrowing metrics from Industrial Econom...
Chapter
Dialogues in a TV series (especially in sitcoms) represent the main interaction among characters. Dialogues may exhibit concentration, with some characters dominating, or showing instead a choral action, where all characters contribute equally to the conversation. The degree of concentration represents a distinctive feature (a signature) of the TV...
Chapter
Full-text available
Current anonymization techniques for statistical databases exhibit significant limitations, related to the utility-privacy trade-off, the introduction of artefacts, and the vulnerability to correlation. We propose an anonymization technique based on the whitening/recolouring procedure that considers the database as an instance of a random populatio...
Article
Full-text available
By Asian digital economy, we refer to high-tech developments, business and social transformations, and information-driven changes in the region's growth. We discuss its background and foundations, significance in Asia and contribution to removal of historical barriers in traditional business. We assess how new value chains are transforming country-...
Article
Full-text available
The determination of node centrality is a fundamental topic in social network studies. As an addition to established metrics, which identify central nodes based on their brokerage power, the number and weight of their connections, and the ability to quickly reach all other nodes, we introduce five new measures of Distinctiveness Centrality. These n...
Article
Full-text available
The expected utility principle is often used to compute the insurance premium through a second-order approximation of the expected value of the utility of losses. We investigate the impact of using a more accurate approximation based on the fourth-order statistics of the expected loss and derive the premium under this expectedly more accurate appro...
Article
The sharing economy proposes a new approach to designing and delivering products and services, that aims at avoiding waste, improving efficiency, and favouring a bottom-up change. In this research commentary, we survey the current state of things and propose some directions for research. We first describe the industries, products, and services curr...
Article
Cyber-physical data from wearable and other data-sensing devices have been rapidly changing the landscape of opportunity for the conduct of computational social science (CSS) studies. We now have the opportunity to include in our research wearable healthcare data sensors, global positioning system (GPS) data, as well as a range of other digital dat...
Book
This book constitutes the refereed conference proceedings of the 8th Annual Privacy Forum, APF 2020, held in Lisbon, Portugal, in October 2020. The 12 revised full papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on impact assessment; privacy by design; data protection and security; and t...
Preprint
Full-text available
The determination of node centrality is a fundamental topic in social network studies. In contrast to established metrics, which identify central nodes based on their brokerage power, the number and weight of their connections, and the ability to quickly reach all other nodes, we introduce five new measures of Distinctiveness Centrality. Those new...
Article
Full-text available
TV series represent a growing sector of the entertainment industry. Being able to predict their performance allows a broadcasting network to better focus the high investment needed for their preparation. In this paper, we consider a well known TV series—The Big Bang Theory—to identify factors leading to its success. The factors considered are mostl...
Article
Full-text available
An integrated risk management strategy, combining insurance and security investments, where the latter contribute to reduce the insurance premium, is investigated to assess whether it can lead to reduced overall security expenses. The optimal investment for this mixed strategy is derived under three insurance policies, covering, respectively, all t...
Preprint
Investors usually resort to financial advisors to improve their investment process until the point of complete delegation on investment decisions. Surely, financial advice is potentially a correcting factor in investment decisions but, in the past, the media and regulators blamed biased advisors for manipulating the expectations of naive investors....
Article
Full-text available
The kinds of interactions taking place in an online personal finance forum and the sentiments expressed in its posts may influence the diffusion and usefulness of those forums. We explore a set of major threads on a personal finance forum to assess the degree of participation of posters and the prevailing sentiments. The participation appears to be...
Article
Full-text available
Service Level Agreements are employed to set availability commitments in cloud services. When a violation occurs as in an outage, cloud providers may be called to compensate customers for the losses incurred. Such compensation may be so large as to erode cloud providers’ profit margins. Insurance may be used to protect cloud providers against such...
Conference Paper
Full-text available
Personal finance decisions emerge from a complex network of human connections, where the nodes or agents-banks, investors, financial advisors-take their choices on the basis of a variety of factors. All these agents form a society, which we modeled as an Agent-Based Model (ABM) on a scale-free network. In this paper, we will consider: honest agents...
Article
Full-text available
Agent-based models are now largely adopted to describe how opinions emerge in a group of people. This survey provides an analysis of the literature on the subject, highlighting the major characteristics of such models. Over the last decade, the number of papers has grown at an overall annual rate of 16%, though not continually. Two communities cont...
Article
Full-text available
We formulate a facility location problem where the demand of any single client must be allocated to a single facility and a prize is obtained by allocating the demand of a client to a certain facility, i.e. a prize-based variant of the Single Source Capacitated Facility Location Problem. For this problem we pursue both an exact approach through Int...
Preprint
Full-text available
An anonymization technique for databases is proposed that employs Principal Component Analysis. The technique aims at releasing the least possible amount of information, while preserving the utility of the data released in response to queries. The general scheme is described, and alternative metrics are proposed to assess utility, based respectivel...
Article
This paper analyzes the economic feasibility of a market for data-based services, which is a scenario envisioned in sectors that are adopting Internet of Things and/or Big Data technologies. A business model for the provision of a data-based service is proposed. In this model, service providers build services from data that is collected and sold by...
Article
Full-text available
The transformation of empirical research due to the arrival of big data analytics and data science, as well as the new availability of methods that emphasize causal inference, are moving forward at full speed. In this Research Commentary, we examine the extent to which this has the potential to influence how e-commerce research is conducted. China...
Preprint
Full-text available
Four packages in R are analyzed to carry out sentiment analysis. All packages allow to define custom dictionaries. Just one - Sentiment R - properly accounts for the presence of negators.
Article
Full-text available
A business model for sensor-based services is proposed where a platform creates a multi-sided market. The business model comprises a platform that serves as an intermediary between human users, app developers, and sensor networks, so that the users use the apps and the apps process the data supplied by the sensor networks. The platform, acting as a...
Chapter
An ongoing project is described that aims at developing a computer-assisted translation tool in collaborative language learning, using a wiki approach. The technology stack makes extensive use of Mediawiki and relies on a Ubuntu-powered machine. The GUI closely resembles the familiar Wikipedia environment. Its integration in the syllabus of a unive...
Book
This book constitutes the refereed proceedings of the 16th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2019, held in Leeds, UK, in September 2019. The 12 full papers and 10 short papers presented in this book were carefully reviewed and selected from 48 submissions. This GECON 2019 proceedings was structur...
Chapter
We study an agent-based model to describe the formation of opinions within a group, where agents belong to classes. In the model any agent influences all the other agents at the same time, and the influence is proportional to the difference of opinions through interaction coefficients. We find that the interaction coefficients must lie within a tet...
Article
Full-text available
Allocating the overall budget to projects is a major decision for an organization. Taking that decision by looking at the overall profit only may result in an unfair treatment of departments, with some departments overloaded and others underemployed (and dissatisfied). We consider an alternative approach, where the budget allocation is accomplished...
Article
Full-text available
The concentration of market power is typically measured by the Hirschman–Herfindahl Index (HHI). When a new company enters the market, the changes in the HHI reflect the change in concentration and may elicit a regulatory intervention. In this paper, we evaluate the potential benefits (HHI decrease) or harms (HHI increase) in advance of the new ent...
Conference Paper
Full-text available
Interactions on a personal finance forum are investigated as a conversation, with post submitters acting as speakers. The presence of dominant positions is analysed through concentration indices. Patterns in replies are analysed through the graph of replies and the distribution of reply times.
Chapter
Full-text available
A transformation of data in statistical databases is proposed to hide the presence of an individual. The transformation employs a cascade of spectral whitening and colouring (named recolouring for brevity) that preserves the first- and second-order statistical properties of the true data (i.e. mean and correlation). A measure of practical indisting...
Article
Full-text available
The possible scarcity of copper (and the likely resulting pressure on prices) is an issue of concern, especially in the light of its importance for the ever growing networking industry. Also for that reason, copper is the nonferrous metal most traded in the markets. Therefore, assessing the nature of its price fluctuations is an important task. Sev...
Article
Full-text available
Energy commodity prices have been examined over the last 20 years to detect the presence of chaos as an alternative to stochastic models, with contrasting results. In this paper, we wish to reassess the chaotic paradigm in the light of two new pieces of information with respect to the literature: the appearance of noise-aware estimation methods for...
Article
Full-text available
Though cloud providers claim to provide a very high reliability, outages of few hours are not uncommon and may provide significant harm to the business operations of cloud customers. In addition to improving the reliability of the cloud infrastructure through redundancy and technical means, the cloud provider can protect itself from the damaging co...
Article
Full-text available
The Hirschman–Herfindahl Index (HHI) is a well known measure of market concentration. However, its exact computation would require the knowledge of the market share of all the companies. In this paper, accurate estimates of the HHI are computed even if just the market shares of the top companies are known (or just the top company and a few scattere...
Article
Full-text available
The Learned Hand’s rule, comparing security investments against the expected loss from data breaches, can be used as a simple tool to determine the negligence of the company holding the data. On the other hand, companies may have several incentives to distribute their data over a cloud. In order to analyze the conflict between the sanctioning behav...
Conference Paper
Full-text available
In a group of individuals aiming for a collective decision, that decision is influenced by individual competences, but these are in turn subject to a reciprocal influence. Such an influence may lead to less competent agents exerting an unduly influence, a phenomenon known as equality bias. In this paper an agent-based model is proposed to investiga...
Conference Paper
Full-text available
Cloud outages may cause heavy economic losses for customers, who may ask the cloud provider for compensation. Cloud providers may therefore wish to insure themselves against that risk. Considering a scenario where outages take place according to a Poisson process and their duration follows a generalized Pareto model, we provide formulas to properly...
Conference Paper
Full-text available
Cloud services may suffer from outages, which interrupt customers’ activities and result in economic losses. A linear model is proposed here to translate outages into economic losses, accounting for both the frequency and the duration of outages. Two tools, the exceedance loss probability and the Value-at-Risk, are employed to assess the maximum ec...
Article
Full-text available
The estimation of project completion time is to be repeated several times in the project planning phase to reach the optimal tradeoff between time, cost, and quality. Estimation procedures provide either an interval or a point estimate. The computational load of several estimation procedures is reviewed. A multiple polynomial regression model is pr...
Conference Paper
Full-text available
The application of differential privacy requires the addition of Laplace noise, whose level must be measured out to achieve the desired level of privacy. However, the protection of the data concerning a Mr. X, i.e., its privacy level, also depends on the other data contained in the database: a negative externality is recognized. In this paper we sh...
Article
Full-text available
This paper proposes a business model for providing services based on the Internet of Things through a platform that intermediates between human users and Wireless Sensor Networks (WSNs). The platform seeks to maximize its profit through posting both the price charged to each user and the price paid to each WSN. A complete analysis of the profit max...
Article
The advent of the Internet of Things (IoT) is expected to bring major benefits to a wide range of areas. However, the successful deployment of the IoT calls for the existence of sustainable and well-understood business models. In this paper, we propose and analyze a business model for a likely scenario in the IoT, which is made up of WSNs, service...
Article
Full-text available
Cloud availability is an important parameter present in a typical Service Level Agreement (SLA). In order to check compliance with SLA commitments, a third party availability measurement is strongly needed. An availability estimation methods is evaluated here, based on the periodic repetition of sequence of probing packets in ICMP. Majority Voting,...
Conference Paper
Full-text available
Each company continually has to choose the projects in which to invest, among the numerous proposals submitted by company departments. Just a few projects among those put forward for funding can be actually accepted, due to the unavoidable discrepancy between available money and required investments. Though overall profit maximization could appear...
Conference Paper
Full-text available
The upcoming Internet of things will generate a massive amount of data. Much of them will be distributed and traded in a marketplace. Brokering third-parties may ease the relationship between data producers and data consumers. Brokers take care of bundling data coming from different sources and delivering them to consumers within a single commercia...