14,513 research outputs found

    Liberty versus safety: a design review

    Full text link
    It is our contention that when designing against terrorism, it is important to fully understand both terrorist perpetrator techniques and terrorism prevention principles and to establish the myths and realities about ‘fear of terrorism’, before catalyzing new design innovations. This paper assesses the requirement for designers to mediate issues of user liberty versus security. We assess the troublesome design tradeoffs between accommodation of users and exclusion of terrorist misuse and abuse linked to bicycle parking, using the Conjunction of Terrorism Opportunity framework. We include the case study of the Biceberg automated bike parking system in relation to the fitness for purpose versus resistance to terrorism debate

    Creating a Drug Prevention Program Targeting Inhalant Use in Thai Adolescents

    Get PDF
    The abuse of inhalants among young adolescents is a rising public health concern not sufficiently addressed in Thailand. The lack of education in schools regarding mental and physical effects of inhalants has contributed to this health concern. We worked with the SATI foundation and the Hub in order to recommend a way of raising awareness of inhalant use and its detrimental effects. To accomplish this, we conducted interviews of teachers, surveyed the level of inhalant knowledge in adolescents, and closely examined engaging techniques of drug prevention programs locally and globally. This work culminated in a website deliverable that contains several forms of media targeted towards Thai adolescents, is easily shared, and has the underlying message of volatile substance awareness

    Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying

    Get PDF
    Cyberbullying (harassment on social networks) is widely recognized as a serious social problem, especially for adolescents. It is as much a threat to the viability of online social networks for youth today as spam once was to email in the early days of the Internet. Current work to tackle this problem has involved social and psychological studies on its prevalence as well as its negative effects on adolescents. While true solutions rest on teaching youth to have healthy personal relationships, few have considered innovative design of social network software as a tool for mitigating this problem. Mitigating cyberbullying involves two key components: robust techniques for effective detection and reflective user interfaces that encourage users to reflect upon their behavior and their choices. Spam filters have been successful by applying statistical approaches like Bayesian networks and hidden Markov models. They can, like Google’s GMail, aggregate human spam judgments because spam is sent nearly identically to many people. Bullying is more personalized, varied, and contextual. In this work, we present an approach for bullying detection based on state-of-the-art natural language processing and a common sense knowledge base, which permits recognition over a broad spectrum of topics in everyday life. We analyze a more narrow range of particular subject matter associated with bullying (e.g. appearance, intelligence, racial and ethnic slurs, social acceptance, and rejection), and construct BullySpace, a common sense knowledge base that encodes particular knowledge about bullying situations. We then perform joint reasoning with common sense knowledge about a wide range of everyday life topics. We analyze messages using our novel AnalogySpace common sense reasoning technique. We also take into account social network analysis and other factors. We evaluate the model on real-world instances that have been reported by users on Formspring, a social networking website that is popular with teenagers. On the intervention side, we explore a set of reflective user-interaction paradigms with the goal of promoting empathy among social network participants. We propose an “air traffic control”-like dashboard, which alerts moderators to large-scale outbreaks that appear to be escalating or spreading and helps them prioritize the current deluge of user complaints. For potential victims, we provide educational material that informs them about how to cope with the situation, and connects them with emotional support from others. A user evaluation shows that in-context, targeted, and dynamic help during cyberbullying situations fosters end-user reflection that promotes better coping strategies

    Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e

    Get PDF
    In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible. In those efforts, we focused on reasonable expectations held by “the people” that they will not be subjected to broad and indiscriminate surveillance. These expectations are anchored in Founding-era concerns about the capacity for unfettered search powers to promote an authoritarian surveillance state. Although we also readily acknowledged that there are legitimate and competing governmental and law enforcement interests at stake in the deployment and use of surveillance technologies that implicate reasonable interests in quantitative privacy, we did little more. In this Article, we begin to address that omission by focusing on the legitimate governmental and law enforcement interests at stake in preventing, detecting, and prosecuting cyber-harassment and healthcare fraud

    Privacy & law enforcement

    Get PDF

    Building Effective Responses: An Independent Review of Violence against Women, Domestic Abuse and Sexual Violence Services in Wales

    Get PDF
    Independent researchers from the Connect Centre for International Research on Interpersonal Violence based in the School of Social Work at the University of Central Lancashire were commissioned by the Welsh Government in 2013 to conduct research into violence against women, domestic abuse and sexual violence services in Wales. The research aimed to inform the forthcoming Ending Violence Against Women and Domestic Abuse (Wales) Bill, implementation of the legislation and future policy more generally, as well as informing future funding decisions. The remit of the review covers: Domestic abuse, including that experienced in Lesbian, Gay, Bisexual and Transgender (LGBT) relationships and elder abuse. Violence against women, including female genital mutilation (FGM), forced marriage and honour-based violence. Sexual violence including rape, sexual assault and harassment Sexual exploitation including prostitution and trafficking1 for sexual purposes. Services for women and men who are victims or perpetrators of violence against women, domestic abuse or sexual violence. The review does not encompass criminal justice services or housing services and, with the exception of prevention work, services for children and young people in Wales were also excluded from this study
    corecore