Andrea Perego

Andrea Perego

Researcher at European Commission, Joint Research Centre

Location
Varese Area, Italy
Industry
Research

As a LinkedIn member, you'll join 300 million other professionals who are sharing connections, ideas, and opportunities.

  • See who you and Andrea Perego know in common
  • Get introduced to Andrea Perego
  • Contact Andrea Perego directly

View Andrea's full profile

Andrea Perego's Overview

Current
Past
Education
Connections

258 connections

Websites

Andrea Perego's Summary

Specialties: Data security, Semantic Web, Social Web, Linked Open Data, Geospatial (Linked) Open Data, Interoperability, eGovernment

Andrea Perego's Experience

Scientific / Technical Project Officer

European Commission, Joint Research Centre

Government Agency; 1001-5000 employees; Government Administration industry

March 2014Present (7 months)

PostDoc Research Associate

European Commission, Joint Research Centre

Government Agency; 1001-5000 employees; Government Administration industry

March 2011March 2014 (3 years 1 month) Varese Area, Italy

Member of the JRC team in charge of the technical coordination of the INSPIRE Directive of the EU, with a specific focus on semantics, cross-domain interoperability, and (Linked) Open Data.

Educational Institution; 501-1000 employees; Research industry

September 2008April 2012 (3 years 8 months) Varese Area, Italy

- Web 2.0 - Module B: http://dawsec.dicom.uninsubria.it/blogs/web2/
- Database Management Systems

IT Consultant

Ecoh Media Srl

Privately Held; 11-50 employees; Information Technology and Services industry

November 2009March 2011 (1 year 5 months) Varese Area, Italy

Government Agency; 1001-5000 employees; Government Administration industry

December 2009December 2010 (1 year 1 month) Varese Area, Italy

Design and development of Web services and applications dealing with scientific data (especially, geophysical data acquisition, processing, and management)

Invited Expert

W3C

Nonprofit; 51-200 employees; Internet industry

March 2007July 2010 (3 years 5 months)

Member and editor of the Protocol for Web Description Resources (POWDER) Working Group of the W3C (http://www.w3.org/2007/powder/).

Educational Institution; 501-1000 employees; Research industry

January 2006December 2009 (4 years) Varese Area, Italy

Research in the area of policy frameworks for the Social and Semantic Web, access control and privacy protection in Web-based social networks.

Educational Institution; 501-1000 employees; Research industry

January 20062008 (2 years) Como Area, Italy

Database Management Systems

Educational Institution; 1001-5000 employees; Research industry

November 2002March 2006 (3 years 5 months) Milan Area, Italy

Research in the area of policy frameworks for distributed and multimedia systems (e.g., digital libraries), Web content filtering, and personalised access to multimedia content.

Educational Institution; 1001-5000 employees; Research industry

20022005 (3 years) Milan Area, Italy

Fondamenti di Topografia e Cartografia Automatica - Module B: http://homes.dico.unimi.it/ftca/

Educational Institution; 1001-5000 employees; Research industry

April 20012005 (4 years) Milan Area, Italy

Fondamenti dell'Informatica per le Scienze Umanistiche: http://homes.dico.unimi.it/fisu/

Educational Institution; 1001-5000 employees; Research industry

April 2001October 2002 (1 year 7 months) Milan Area, Italy

Research in the area of policy frameworks for distributed and multimedia systems (e.g., digital libraries) and Web content filtering.

Andrea Perego's Projects

Andrea Perego's Skills & Expertise

  1. Semantic Web
  2. Linux
  3. XML
  4. Programming
  5. PostgreSQL
  6. MySQL
  7. Web Development
  8. Web Services
  9. Web 2.0
  10. Web Applications
  11. Distributed Systems
  12. Research
  13. Computer Science
  14. Access Control
  15. Data Privacy
  16. Linked Data
  17. Social Web
  18. Geospatial Data
  19. Interoperability
  20. Ontologies
  21. Ontology Engineering
  22. Thesauruses
  23. Metadata
  24. XSD
  25. XSLT
  26. RDF
  27. RDFS
  28. OWL
  29. SKOS
  30. SPARQL
  31. JavaScript
  32. HTML
  33. jQuery
  34. LaTeX
  35. Databases
  36. PostGIS
  37. Standards Development
  38. Open Data
  39. Research Data
  40. Social Data
  41. Government Data
  42. Teaching
  43. Personalization
  44. PHP
  45. SQL
  46. CSS
  47. AJAX
  48. Artificial Intelligence

View All (48) Skills View Fewer Skills

Andrea Perego's Languages

  • Italian

    (Native or bilingual proficiency)
  • English

    (Full professional proficiency)

Andrea Perego's Publications

  • Privacy-Preserving Enhanced Collaborative Tagging

    • IEEE Transactions on Knowledge & Data Engineering, 2012 (preprint). DOI: 10.1109/TKDE.2012.248
    • December 31, 2012

    Collaborative tagging is one of the most popular services available online, and it allows end user to loosely classify either online or offline resources based on their feedback, expressed in the form of free-text labels (i.e., tags). Although tags are not per se sensitive information, the wide use of collaborative tagging services increases the risk of cross referencing, thereby seriously compromising user privacy. In this paper, we make a first contribution in this direction by showing how a specific privacy-enhancing technology, namely tag suppression, can be used to protect end-user privacy. Moreover, we analyze how our approach can affect the effectiveness of a policy-based collaborative tagging system which supports enhanced Web access functionalities, like content filtering and discovery, based on preferences specified by end users.

  • A Multi-layer Framework for Personalized Social Tag-based Applications

    • Data & Knowledge Engineering, 79-80:62–86, 2012. DOI: 10.1016/j.datak.2012.06.002
    • July 4, 2012

    Recent years have seen an increasing diffusion of online communities giving their members the ability of specifying and sharing metadata concerning online resources. Such practice, also known as social or collaborative tagging, has the purpose of collecting and sharing opinions about Web resources and simplifying their retrieval. In this paper, we go one step further and show how tags can have more enhanced applications to be exploited for customizing Web content fruition. More precisely, we propose a multi-layer framework where data collected by social tagging communities are complemented with additional services. Such services provide users the ability of expressing their dis/agreement with existing tags, denoting the members they trust based on their characteristics and relationships, or specifying policies on which “quality” assessment of resources should be returned. Besides providing the formal specification of the proposed framework, we illustrate two case studies we have implemented and the experiments we have carried out in order to verify the feasibility of our approach.

  • Harmonization and Interoperability of EU Environmental Information and Services

    • IEEE Intelligent Systems, 27(3):33–39, 2012. DOI: 10.1109/MIS.2012.22
    • May 6, 2012

    The cultural, historic, and natural diversity in the European Union creates a fertile ground for both policies and innovation that aim at removing obstacles to the integration and interoperability of data on Europe’s natural environment. In fact, the sharing of resources across multiple information communities raises the need of new technologies that support resource discovery and (re-)use. The aim of this paper is to provide a better understanding of the issues related to semantic interoperability in the context of environmental data management in the European Union, and of measures and activities that are addressing these problems. It does so by providing the policy context, and by highlighting activities and best practices of selected EU-funded research projects and activities, especially in relation to Linked Open Data principles.

  • A General Framework for Web Content Filtering

    • World Wide Web, 13(3):215-249, 2010. DOI: 10.1007/s11280-009-0073-5.
    • September 2010

    Web content filtering is a means to make end-users aware of the ‘quality’ of Web resources by evaluating their contents and/or characteristics against users’ preferences. Although they can be used for a variety of purposes, Web content filtering tools are mainly deployed as a service for parental control purposes, and for regulating the access to Web content by users connected to the networks of enterprises, libraries, schools, etc. Current Web filtering tools are based on well established techniques, such as data mining and firewall blocking, and they typically cater to the filtering requirements of very specific end-user categories. Therefore, what is lacking is a unified filtering framework able to support all the possible application domains, and making it possible to enforce interoperability among the different filtering approaches and the systems based on them. In this paper, a multi-strategy approach is described, which integrates the available techniques and focuses on the use of metadata for rating and filtering Web information. Such an approach consists of a filtering meta-model, referred to as MFM (Multi-strategy Filtering Model), which provides a general representation of the Web content filtering domain, independently from its possible applications, and of two prototype implementations, partially carried out in the framework of the EU projects EUFORBIA and QUATRO, and designed for different application domains: user protection and Web quality assurance, respectively.

  • The Quality Social Network: A Collaborative Environment for Personalizing Web Access

    • In: 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009), Wahington DC, USA, 11-14 Nov. 2009. IEEE CS Press, 2009. DOI: 10.4108/ICST.COLLABORATECOM2009.8368.
    • December 28, 2009

    In this paper, we present a collaborative social networking environment, referred to as quality social network (QSN), which enhances the social tagging paradigm by using it as a basis to evaluate the quality of Web resources, on the basis of the user preferences specified by each QSN member. Such features give end users the ability of being aware of the "quality" of the resources they are accessing, based on the opinions of the members of their community, and of being informed whether such resources can be safely used, according to the requirements specified by end users themselves. Besides illustrating the main characteristics of the QSN and its architecture, we describe its prototype implementation, carried out in the framework of the QUATRO Plus EU project, and its application to a use case scenario, involving groups of teenagers from three different European countries, acting as Youth Panels of the Safer Internet EU Programme.

  • Enforcing Access Control in Web-based Social Networks

    • ACM Transactions on Information & System Security, 13(1):6, 2009. DOI: 10.1145/1609956.1609962
    • October 2009

    In this article, we propose an access control mechanism for Web-based social networks, which adopts a rule-based approach for specifying access policies on the resources owned by network participants, and where authorized users are denoted in terms of the type, depth, and trust level of the relationships existing between nodes in the network. Different from traditional access control systems, our mechanism makes use of a semidecentralized architecture, where access control enforcement is carried out client-side. Access to a resource is granted when the requestor is able to demonstrate being authorized to do that by providing a proof. In the article, besides illustrating the main notions on which our access control model relies, we present all the protocols underlying our system and a performance study of the implemented prototype.

  • Protocol for Web Description Resources (POWDER): Description Resources

    • W3C Recommendation, World Wide Web Consortium, 1 Sep. 2009
    • September 1, 2009

    The purpose of the Protocol for Web Description Resources (POWDER) is to provide a means for individuals or organizations to describe a group of resources through the publication of machine-readable metadata, as motivated by the POWDER Use Cases. This document details the creation and lifecycle of Description Resources (DRs), which encapsulate such metadata. These are typically represented in a highly constrained XML dialect that is relatively human-readable. The meaning of such DRs are underpinned by formal semantics, accessible by performing a GRDDL Transform.

  • Protocol for Web Description Resources (POWDER): Grouping of Resources

    • W3C Recommendation, World Wide Web Consortium, 1 Sep. 2009
    • September 1, 2009

    The Protocol for Web Description Resources (POWDER) facilitates the publication of descriptions of multiple resources such as all those available from a Web site. This document describes how sets of IRIs can be defined such that descriptions or other data can be applied to the resources obtained by dereferencing IRIs that are elements of the set. IRI sets are defined as XML elements with relatively loose operational semantics. This is underpinned by the formal semantics of POWDER which include a semantic extension, defined separately. A GRDDL transform is associated with the POWDER namespace that maps the operational to the formal semantics.

  • QUATRO Plus: Quality You Can Trust?

    • In: ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, Greece, 1 June 2009. CEUR Workshop Proceedings, vol. 447, 2009.
    • May 1, 2009

    The QUATRO Plus project, a follow on from the original QUATRO Project, aims to balance the wisdom of the crowds with the knowledge of the experts. It uses a mixture of authenticated data sources and the opinions of end users expressed through social networking software to build a dataset that is authoritative and trustworthy. The dataset describes online resources using RDF with the upcoming W3C Recommendation, POWDER, as the underlying transport and storage mechanism. Data can be added to or queried through a variety of tools provided by the project, some of which are described in detail in this paper.

  • Combining Social Networks and Semantic Web Technologies for Personalizing Web Access

    • In: Collaborative Computing: Networking, Applications and Worksharing. Proc. of the 4th International ICST Conference, CollaborateCom 2008, Orlando, FL, USA, November 2008. Revised Selected Papers. Springer (LNICST 10), 2009, pp. 126-144. DOI: 10.1007/97
    • July 25, 2009

    The original purpose of Web metadata was to protect end-users from possible harmful content and to simplify search and retrieval. However they can also be exploited in more enhanced applications, such as Web access personalization on the basis of end-users' preferences. In order to achieve this, it is however necessary to address several issues. One of the most relevant is how to assess the trustworthiness of Web metadata. In this paper, we discuss how such issue can be addressed through the use of collaborative and Semantic Web technologies. The system we propose is based on a Web-based Social Network, where members are able not only to specify labels, but also to rate existing labels. Both labels and ratings are then used to assess the trustworthiness of resources' descriptions and to enforce Web access personalization.

  • A Decentralized Security Framework for Web-based Social Networks

    • International Journal of Information Security and Privacy, 2(4):22–53, 2008. DOI: 10.4018/jisp.2008100102.
    • November 2008

    The wide diffusion and usage of social networking Web sites in the last years have made publicly available a huge amount of possible sensitive information, which can be used by third-parties with purposes different from the ones of the owners of such information. Currently, this issue has been addressed by enforcing into Web-based Social Networks (WBSNs) very simple protection mechanisms, or by using anonymization techniques, thanks to which it is possible to hide the identity of WBSN members while performing analysis on social network data. However, we believe that further solutions are needed, to allow WBSN members themselves to decide who can access their personal information and resources. To cope with this issue, in this article we illustrate a decentralized security framework for WBSNs, which provide both access control and privacy protection mechanisms. In our system, WBSN members can denote who is authorized to access the resources they publish and the relationships they participate in, in terms of the type, depth, and trust level of the relationships existing between members of a WBSN. Cryptographic techniques are then used to provide a controlled sharing of resources while preserving relationship privacy.

  • Security and Privacy in Social Networks

    • In: Encyclopedia of Information Science and Technology, 2nd Edition. IGI Publishing, vol. VII, Chap. 535, pp. 3369–3376, 2008. DOI: 10.4018/978-1-60566-026-4.ch535.
    • September 8, 2008

    Web-based social networks (WBSNs) are online communities that allow users to publish resources (e.g., personal data, annotations, blogs) and to establish relationships, possibly of a different type (“friend,” “colleague,” etc.) for purposes that may concern business, entertainment, religion, dating, and so forth. In the last few years, the usage and diffusion of WBSNs has been increasing, with about 300 Web sites collecting the information of more than 400 million registered users. As a result, the “net model” is today used more and more to communicate, share information, make decisions, and ‘do business’ by companies and organizations. Regardless of the purpose of a WBSN, one of the main reasons for participating in social networking is to share and exchange information with other users. Recently, thanks to the adoption of Semantic Web technologies such as FOAF and other RDF-based vocabularies, accessing and disseminating information over multiple WBSNs has been made simpler. If this has been quite a relevant improvement towards an easier sharing of information, it makes more urgent that content owners have control over information access. In fact, making available possibly sensitive and private data and resources implies that they can be used by third parties for purposes different from the intended ones. It is then a challenging issue to devise security mechanisms for social networks, able to protect private information and regulate access to shared resources. In this article, besides providing an overview of the characteristics of the WBSN environment and its protection requirements, we illustrate the current approaches and future trends to social network security, with particular attention paid to the emerging technologies related to the so-called Web 2.0.

  • Integrated Authoring, Annotation, Retrieval, Adaptation, Personalization, and Delivery for Multimedia

    • In: Digital Libraries: Research and Development First International DELOS Conference, Pisa, Italy, February 13-14, 2007, Revised Selected Papers. Springer (LNCS 4877), 2007, pp. 87–103. DOI: 10.1007/978-3-540-77088-6_9
    • November 25, 2007

    In this paper we present CoCoMA, an integrated platform, developed in the framework of the DELOS II European Network of Excellence on Digital Libraries, aiming at the unification of the most important aspects of multimedia management and multimedia presentation. The paramount goal of CoCoMA is to maximize the added value from task and data integration by the identification and exploitation of connection points and inherent workflow similarities. The paper provides a brief description of the involved research fields, suggests an architecture for integrated multimedia consumption and presentation, and discusses the most prominent connection points. Problems and solutions are discussed jointly, and illustrated by the components of the application prototype developed for the DELOS project.

  • Advanced Techniques for Web Content Filtering

    • In: Encyclopedia of Internet Technologies and Applications. IGI Publishing, Chap. 6, pp. 36–44, 2007. DOI: 10.4018/978-1-59140-993-9.ch006
    • October 11, 2007

    In this chapter, besides discussing the current strategies for Web content filtering, outlining their advantages and drawbacks, we present an approach, formerly developed in the framework of the EU project EUFORBIA, which, besides addressing the main drawbacks of the existing systems, can be applied for purposes comprising both users’ protection and quality assurance. The main features of such an approach are the support for multiple metadata vocabularies for the rating and filtering of Web resources, and the possibility of specifying policies which allow the system to decide whether a resource is appropriate or not for a given user based on his/her preferences and characteristics.

  • Private Relationships in Social Networks

    • In: 2007 IEEE 23rd International Conference on Data Engineering Workshops, Instanbul, Turkey, 17-20 Apr. 2007. IEEE CS Press, 2007, pp. 63-71. 10.1109/ICDEW.2007.4400987
    • December 10, 2007

    Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be either public or accessible only by him/herself (or, at most, by users with whom he/she has a direct relationship). This is not enough, in that there is the need of more flexible mechanisms, making a user able to decide which network participants are authorized to access his/her resources and personal information. With this aim, in a previous paper we have proposed an access control model where authorized users are denoted based on the relationships they participate in. Nonetheless, we believe that this is just a first step towards a more comprehensive privacy framework for social networks. Indeed, besides users' resources and personal data, also users' relationships may convey sensitive information. For this reason, in this paper we focus on relationship protection, by proposing a strategy exploiting cryptographic techniques to enforce a selective dissemination of information concerning relationships across a social network.

  • Semantic, Constraint & Preference Based Multimedia Presentation Authoring

    • Journal of Digital Information Management, 4(4):207–213, 2006.
    • December 2006

    We present in this paper an integrated system that allows the management and annotation of multimedia objects stored in MPEG-7/21 repositories, and the specification and semi-automatic generation of multimedia presentations based on the content relationships that exist between the multimedia objects. This system is the outcome of the collaboration between the Technical University of Crete (TUC-MUSIC) and the University of Milan (UNIMI) in the CoCoMA project of the DELOS II European Network of Excellence on Digital Libraries. The resulting system is one of the main components of the CoCoMA infrastructure that aims to provide content- and context-aware rich interactive multimedia presentations by controlling data fusion and metadata reuse. The integrated system utilizes the SyMPA management and presentation authoring system developed by UNIMI and the DS-MIRF framework developed by TUC-MUSIC.

  • Rule-based Access Control for Social Networks

    • In: OTM Workshops 2006, Montpellier (France), 29 Oct. – 3 Nov. 2006, Springer (LNCS 4278), 2006, pp. 1734-1744. DOI: 10.1007/11915072_80
    • November 30, 2006

    Web-based social networks (WBSNs) are online communities where participants can establish relationships and share resources across the Web with other users. In recent years, several WBSNs have been adopting Semantic Web technologies, such as FOAF, for representing users' data and relationships, making it possible to enforce information interchange across multiple WBSNs. Despite its advantages in terms of information diffusion, this raised the need of giving content owners more control on the distribution of their resources, which may be accessed by a community far wider than they expected. In this paper, we present an access control model for WBSNs, where policies are expressed as constraints on the type, depth, and trust level of existing relationships. Relevant features of our model are the use of certificates for granting relationships' authenticity, and the client-side enforcement of access control according to a rule-based approach, where a subject requesting to access an object must demonstrate that it has the rights of doing that.

  • Quality Labeling of Web Content: The QUATRO Approach

    • In: WWW'06 Workshop on Models of Trust for the Web (MTW'06). Edinburgh, Scotland, May 22, 2006. CEUR Workshop Proceedings, vol. 190, 2006.
    • June 29, 2006

    QUATRO is an on-going EC-funded project which aims to provide a common vocabulary and machine readable schema for quality labeling of Web content, as well as ways to automatically show the contents of the label(s) found in a Web resource, and functionalities for checking the validity of these labels. The paper presents the QUATRO processes for label validation and user notification, and outlines the architecture of QUATRO system.

  • Web Content Filtering

    • In: Web and Information Security. IDEA Group, Chap. 6, pp. 113–133, 2005. DOI: 10.4018/978-1-59140-588-7.ch006
    • October 19, 2005

    The need to filter online information in order to protect users from possible harmful content can be considered as one of the most compelling social issues derived from the transformation of the Web into a public information space. Despite that Web rating and filtering systems have been developed and made publicly available quite early, no effective approach has been established so far, due to the inadequacy of the proposed solutions. Web filtering is then a challenging research area, needing the definition and enforcement of new strategies, considering both the current limitations and the future developments of Web technologies—in particular, the upcoming Semantic Web. In this chapter, we provide an overview of how Web filtering issues have been addressed by the available systems, bringing in relief both their advantages and shortcomings, and outlining future trends. As an example of how a more accurate and flexible filtering can be enforced, we devote the second part of this chapter to describing a multi-strategy approach, of which the main characteristics are the integration of both list- and metadata-based techniques and the adoption of sophisticated metadata schemes (e.g., conceptual hierarchies and ontologies) for describing both users' characteristics and Web pages content.

  • A Multi-Strategy Approach to Rating and Filtering Online Resources

    • In: Sixteenth International Workshop on Database and Expert Systems Applications, 2005. Copenhagen, Denmark, 26-26 Aug. 2005. IEE CS Press, 2005, pp. 519-523. DOI: 10.1109/DEXA.2005.21
    • September 19, 2005

    This paper illustrates some of the Semantic Web techniques used in the framework of the EU project EUFORBIA, which deals with the rating and filtering of ‘questionable’ Web sites concerned with racism, violence, pornography, etc. The rationale for using a high-level semantic approach in this domain is linked with the assumption that an in-depth description of the ‘semantic content’ of Web sites should allow the implementation of filtering strategies more flexible, accurate and (neatly) sophisticated than the current ones. From a technical point of view, the final result of the project consists of two integrated prototypes that communicate through a common ontology.

  • A Constraint-based Approach for the Authoring of Multi-topic Multimedia Presentations

    • In: IEEE International Conference on Multimedia and Expo, 2005. ICME 2005. 6-8 July 2005, Amsterdam, The Netherlands. IEEE CS Press, 2005, pp. 578-581. DOI: 10.1109/ICME.2005.1521489
    • October 24, 2005

    Synchronized multimedia applications play an important role in a Digital Library environment, since they allow one to efficiently disseminate knowledge among differently skilled users through an approach which is more direct than the classic ‘static’ documents. In this paper, we propose a new authoring approach based on an innovative presentation structure and a new class of contentbased constraints. Thanks to a flexible heuristic process, such features allow the author to easily combine several multimedia objects into a multi-topic presentation, whose different contents can be freely chosen by end users according to their preferences or skills.

  • Content-based Filtering of Web documents: The MaΧ System and the EUFORBIA Project

    • International Journal of Information Security, 2(1):45–58, 2003. DOI: 10.1007/s10207-003-0024-6
    • October 8, 2003

    Internet filtering has particular requirements which traditional access control approaches cannot satisfy. In this paper, we present a multi-strategy filtering model tailored specifically to both digital library and Web environments whose key features are the support for credential and content-based filtering and its full integration with standard Internet rating systems. Moreover, we describe the prototype system implementing our model and developed in the framework of the European project EUFORBIA.

  • MaΧ: An Access Control System for Digital Libraries and the Web

    • In: 26th Annual International Computer Software and Applications Conference, 2002. COMPSAC 2002. IEEE CS Press, 2002, pp. 945-590. DOI: 10.1109/CMPSAC.2002.1045127.
    • December 10, 2002

    Digital Libraries (DLs) introduce several challenging requirements with respect to the formulation, specification and enforcement of adequate access control policies. Unlike conventional database environments, a DL typically is characterised by a dynamic subject population, often making accesses from remote locations, and by an extraordinarily large amount of information, stored in a variety of formats. Additionally, protecting a DL does not only means protecting documents that reside at the DL site, but also protecting accesses that the DL subscribers made to external Web documents. In this paper we present MaΧ, a comprehensive system for enforcing access control, specifically tailored to both DL and Web environments. Key features of MaΧ are the support for credential and content-based access control to DL and Web documents, and its full integration with standard Internet rating systems.

Andrea Perego's Education

Università degli Studi di Milano

PhD, Computer Science

Università degli Studi di Milano

Master, Computer Science and Communication for the Humanities

Andrea Perego's Additional Information

Websites:
Groups and Associations:

Contact Andrea for:

  • career opportunities
  • expertise requests

View Andrea Perego’s full profile to...

  • See who you and Andrea Perego know in common
  • Get introduced to Andrea Perego
  • Contact Andrea Perego directly

View Andrea's full profile

Not the Andrea Perego you were looking for? View more »

Viewers of this profile also viewed...