170 research outputs found

    Privacy For Whom? A Multi-Stakeholder Exploration of Privacy Designs

    Get PDF
    Privacy is considered one of the fundamental human rights. Researchers have been investigating privacy issues in various domains, such as our physical privacy, data privacy, privacy as a legal right, and privacy designs. In the Human-Computer Interaction field, privacy researchers have been focusing on understanding people\u27s privacy concerns when they interact with computing systems, designing and building privacy-enhancing technologies to help people mitigate these concerns, and investigating how people\u27s privacy perceptions and the privacy designs influence people\u27s behaviors. Existing privacy research has been overwhelmingly focusing on the privacy needs of end-users, i.e., people who use a system or a product, such as Internet users and smartphone users. However, as our computing systems are becoming more and more complex, privacy issues within these systems have started to impact not only the end-users but also other stakeholders, and privacy-enhancing mechanisms designed for the end-users can also affect multiple stakeholders beyond the users. In this dissertation, I examine how different stakeholders perceive privacy-related issues and expect privacy designs to function across three application domains: online behavioral advertising, drones, and smart homes. I choose these three domains because they represent different multi-stakeholder environments with varying nature of complexity. In particular, these environments present the opportunities to study technology-mediated interpersonal relationships, i.e., the relationship between primary users (owners, end-users) and secondary users (bystanders), and to investigate how these relationships influence people\u27s privacy perceptions and their desired ways of privacy protection. Through a combination of qualitative, quantitative, and design methods, including interviews, surveys, participatory designs, and speculative designs, I present how multi-stakeholder considerations change our understandings of privacy and influence privacy designs. I draw design implications from the study results and guide future privacy designs to consider the needs of different stakeholders, e.g., cooperative mechanisms that aim to enhance the communication between primary and secondary users. In addition, this methodological approach allows researchers to directly and proactively engage with multiple stakeholders and explore their privacy perceptions and expected privacy designs. This is different from what has been commonly used in privacy literature and as such, points to a methodological contribution. Finally, this dissertation shows that when applying the theory of Contextual Integrity in a multi-stakeholder environment, there are hidden contextual factors that may alter the contextual informational norms. I present three examples from the study results and argue that it is necessary to carefully examine such factors in order to clearly identify the contextual norms. I propose a research agenda to explore best practices of applying the theory of Contextual Integrity in a multi-stakeholder environment

    Annual Report 2016-2017

    Get PDF
    The College of Computing and Digital Media has always prided itself on curriculum, creative work, and research that stays current with changes in our various fields of instruction. As we looked back on our 2016-17 academic year, the need to chronicle the breadth and excellence of this work became clear. We are pleased to share with you this annual report, our first, highlighting our accomplishments. Last year, we began offering three new graduate programs and two new certificate programs. We also planned six degree programs and three new certificate programs for implementation in the current academic year. CDM faculty were published more than 100 times, had their films screened more than 200 times, and participated in over two dozen exhibitions. Our students were recognized for their scholarly and creative work, and our alumni accomplished amazing things, from winning a Student Academy Award to receiving a Pulitzer. We are proud of all the work we have done together. One notable priority for us in 2016-17 was creating and strengthening relationships with industry—including expanding our footprint at Cinespace and developing the iD Lab—as well as with the community, through partnerships with the Chicago Housing Authority, Wabash Lights, and other nonprofit organizations. We look forward to continuing to provide innovative programs and spaces this academic year. Two areas in particular we’ve been watching closely are makerspaces and the “internet of things.” We’ve already made significant commitments to these areas through the creation of our 4,500 square foot makerspace, the Idea Realization Lab, and our new cyber-physical systems bachelor’s program and lab. We are excited to continue providing the opportunities, curriculum, and facilities to support our remarkable students. David MillerDean, College of Computing and Digital Mediahttps://via.library.depaul.edu/cdmannual/1000/thumbnail.jp

    Analysis of Motivational Theories in Crowdsourcing Using Long Tail Theory: A Systematic Literature Review

    Get PDF
    Motivational theories have been extensively studied in a wide range of fields, such as medical sciences, business, management, physiology, sociology, and particularly in the natural sciences. These theories are regarded as crucial in motivating online workers to engage in crowdsourcing. Nevertheless, there is a dearth of research on an overarching review of these theories. We performed a systematic literature review of peer-reviewed published studies focusing on motivational theories to identify popular theories and risks associated with nascent theories presented over the last decade in crowdsourcing. Based on a review of 91 papers from the domain of the natural sciences, we identified 35 motivational theories. The long tail theory helped us to identify the contribution of major influencing theories in a crowdsourcing environment. The results justify the long tail theory based on the Pareto principle of 80/20, which underlines the 20% of the popular motivation theories, namely self-determination, expectancy-value, game, gamification, behavior change, and incentive theory, as a cause of 80%. Similarly, we discussed the risks associated with 10 theories presented over the long tail, which have a frequency equal to 2. Understanding the significant impact, approximately 80%, of widely recognized motivational theories and their role in risk identification is crucial. This understanding can assist researchers in optimizing their results by effectively integrating these theories

    Credibility analysis of textual claims with explainable evidence

    Get PDF
    Despite being a vast resource of valuable information, the Web has been polluted by the spread of false claims. Increasing hoaxes, fake news, and misleading information on the Web have given rise to many fact-checking websites that manually assess these doubtful claims. However, the rapid speed and large scale of misinformation spread have become the bottleneck for manual verification. This calls for credibility assessment tools that can automate this verification process. Prior works in this domain make strong assumptions about the structure of the claims and the communities where they are made. Most importantly, black-box techniques proposed in prior works lack the ability to explain why a certain statement is deemed credible or not. To address these limitations, this dissertation proposes a general framework for automated credibility assessment that does not make any assumption about the structure or origin of the claims. Specifically, we propose a feature-based model, which automatically retrieves relevant articles about the given claim and assesses its credibility by capturing the mutual interaction between the language style of the relevant articles, their stance towards the claim, and the trustworthiness of the underlying web sources. We further enhance our credibility assessment approach and propose a neural-network-based model. Unlike the feature-based model, this model does not rely on feature engineering and external lexicons. Both our models make their assessments interpretable by extracting explainable evidence from judiciously selected web sources. We utilize our models and develop a Web interface, CredEye, which enables users to automatically assess the credibility of a textual claim and dissect into the assessment by browsing through judiciously and automatically selected evidence snippets. In addition, we study the problem of stance classification and propose a neural-network-based model for predicting the stance of diverse user perspectives regarding the controversial claims. Given a controversial claim and a user comment, our stance classification model predicts whether the user comment is supporting or opposing the claim.Das Web ist eine riesige Quelle wertvoller Informationen, allerdings wurde es durch die Verbreitung von Falschmeldungen verschmutzt. Eine zunehmende Anzahl an Hoaxes, Falschmeldungen und irreführenden Informationen im Internet haben viele Websites hervorgebracht, auf denen die Fakten überprüft und zweifelhafte Behauptungen manuell bewertet werden. Die rasante Verbreitung großer Mengen von Fehlinformationen sind jedoch zum Engpass für die manuelle Überprüfung geworden. Dies erfordert Tools zur Bewertung der Glaubwürdigkeit, mit denen dieser Überprüfungsprozess automatisiert werden kann. In früheren Arbeiten in diesem Bereich werden starke Annahmen gemacht über die Struktur der Behauptungen und die Portale, in denen sie gepostet werden. Vor allem aber können die Black-Box-Techniken, die in früheren Arbeiten vorgeschlagen wurden, nicht erklären, warum eine bestimmte Aussage als glaubwürdig erachtet wird oder nicht. Um diesen Einschränkungen zu begegnen, wird in dieser Dissertation ein allgemeines Framework für die automatisierte Bewertung der Glaubwürdigkeit vorgeschlagen, bei dem keine Annahmen über die Struktur oder den Ursprung der Behauptungen gemacht werden. Insbesondere schlagen wir ein featurebasiertes Modell vor, das automatisch relevante Artikel zu einer bestimmten Behauptung abruft und deren Glaubwürdigkeit bewertet, indem die gegenseitige Interaktion zwischen dem Sprachstil der relevanten Artikel, ihre Haltung zur Behauptung und der Vertrauenswürdigkeit der zugrunde liegenden Quellen erfasst wird. Wir verbessern unseren Ansatz zur Bewertung der Glaubwürdigkeit weiter und schlagen ein auf neuronalen Netzen basierendes Modell vor. Im Gegensatz zum featurebasierten Modell ist dieses Modell nicht auf Feature-Engineering und externe Lexika angewiesen. Unsere beiden Modelle machen ihre Einschätzungen interpretierbar, indem sie erklärbare Beweise aus sorgfältig ausgewählten Webquellen extrahieren. Wir verwenden unsere Modelle zur Entwicklung eines Webinterfaces, CredEye, mit dem Benutzer die Glaubwürdigkeit einer Behauptung in Textform automatisch bewerten und verstehen können, indem sie automatisch ausgewählte Beweisstücke einsehen. Darüber hinaus untersuchen wir das Problem der Positionsklassifizierung und schlagen ein auf neuronalen Netzen basierendes Modell vor, um die Position verschiedener Benutzerperspektiven in Bezug auf die umstrittenen Behauptungen vorherzusagen. Bei einer kontroversen Behauptung und einem Benutzerkommentar sagt unser Einstufungsmodell voraus, ob der Benutzerkommentar die Behauptung unterstützt oder ablehnt

    Modern Socio-Technical Perspectives on Privacy

    Get PDF
    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects

    What people study when they study Tumblr:Classifying Tumblr-related academic research

    Get PDF
    Purpose: Since its launch in 2007, research has been carried out on the popular social networking website Tumblr. This paper identifies published Tumblr based research, classifies it to understand approaches and methods, and provides methodological recommendations for others. / Design/methodology/approach: Research regarding Tumblr was identified. Following a review of the literature, a classification scheme was adapted and applied, to understand research focus. Papers were quantitatively classified using open coded content analysis of method, subject, approach, and topic. / Findings: The majority of published work relating to Tumblr concentrates on conceptual issues, followed by aspects of the messages sent. This has evolved over time. Perceived benefits are the platform’s long-form text posts, ability to track tags, and the multimodal nature of the platform. Severe research limitations are caused by the lack of demographic, geo-spatial, and temporal metadata attached to individual posts, the limited API, restricted access to data, and the large amounts of ephemeral posts on the site. / Research limitations/implications: This study focuses on Tumblr: the applicability of the approach to other media is not considered. We focus on published research and conference papers: there will be book content which was not found using our method. Tumblr as a platform has falling user numbers which may be of concern to researchers. / Practical implications: We identify practical barriers to research on the Tumblr platform including lack of metadata and access to big data, explaining why Tumblr is not as popular as Twitter in academic studies. - Social implications This paper highlights the breadth of topics covered by social media researchers, which allows us to understand popular online platforms. / Originality/value: There has not yet been an overarching study to look at the methods and purpose of those who study Tumblr. We identify Tumblr related research papers from the first appearing in July 2011 until July 2015. Our classification derived here provides a framework that can be used to analyse social media research, and in which to position Tumblr related work, with recommendations on benefits and limitations of the platform for researchers

    Modern Socio-Technical Perspectives on Privacy

    Get PDF
    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects

    Copyright law

    Get PDF
    Contents Editorial Research Articles Formats as Media of Cooperation / Axel Volmar Thematic Focus: Copyright Law Editorial: The Reference as Part of the Art Form. A Turning Point in Copyright Law? / Dagmar Hoffmann, Nadine Klass The Concept of “Pastiche” in Directive 2001/29/EC in the Light of the German Case Metall auf Metall / Frédéric Döhl Transformative Works and German Copyright Law as Matters of Boundary Work / Kamila Kempfert, Wolfgang Reißmann Negotiating Legal Knowledge, Community Values, and Entrepreneurship in Fan Cultural Production / Sophie G. Einwächter Referencing in Academia: Video Essay, Mashup, Copyright / Eckart Voigts, Katerina Marshfield Re-Use under US Copyright Law: Fair Use as a Best Practice or Just a Myth of Balance in Copyright? / Sibel Kocatepe Reports Grounded Design in a Value Sensitive Context / Volker Wulf in conversation with Batya Friedma
    corecore