271,096 research outputs found

    2007 AMA Nonprofit Marketing Conference: Overview

    Get PDF

    Semi-autonomous, context-aware, agent using behaviour modelling and reputation systems to authorize data operation in the Internet of Things

    Full text link
    In this paper we address the issue of gathering the "informed consent" of an end user in the Internet of Things. We start by evaluating the legal importance and some of the problems linked with this notion of informed consent in the specific context of the Internet of Things. From this assessment we propose an approach based on a semi-autonomous, rule based agent that centralize all authorization decisions on the personal data of a user and that is able to take decision on his behalf. We complete this initial agent by integrating context-awareness, behavior modeling and community based reputation system in the algorithm of the agent. The resulting system is a "smart" application, the "privacy butler" that can handle data operations on behalf of the end-user while keeping the user in control. We finally discuss some of the potential problems and improvements of the system.Comment: This work is currently supported by the BUTLER Project co-financed under the 7th framework program of the European Commission. published in Internet of Things (WF-IoT), 2014 IEEE World Forum, 6-8 March 2014, Seoul, P411-416, DOI: 10.1109/WF-IoT.2014.6803201, INSPEC: 1425565

    Profiles of social networking sites users in the Netherlands

    Get PDF
    Online social networking has become a reality and integral part of the daily personal, social and business life. The extraordinary increase of the user numbers of Social Networking Sites (SNS) and the rampant creation of online communities presents businesses with many challenges and opportunities. From the commercial perspective, the SNS are an interesting and promising field: online social networks are important sources of market intelligence and also offer interesting options for co-operation, networking and marketing. For SMEs especially the Social Networking Sites represent a simple and low cost solution for listening the customer’s voice, reaching potential customers and creating extensive business networks. This paper presents the results of a national survey mapping the demographic, social and behavioral characteristics of the Dutch users of SNS. The study identifies four different user profiles and proposes a segmentation framework as basis for better understanding the nature and behavior of the participants in online communities. The findings present new insights to marketing strategists eager to use the communication potential of such communities; the findings are also interesting for businesses willing to explore the potential of online networking as a low cost yet very efficient alternative to physical, traditional networking

    Asegúrate: an intervention program against cyberbullying based on teachers' commitment and on design of its instructional materials

    Get PDF
    This article presents the impact on cyberbullying of the Asegúrate program. This educational program is based on the theory of normative social behavior, self-regulation skills,and the beliefs held by adolescents and consists in a whole package of strategies and resources to help teachers to include in the ordinary curricula. The evaluation of Asegúrate was carried out with a sample of 4779 students (48.9% girls) in 5th and 6th grade in primary education and compulsory secondary education (M = 12.76; SD = 1.67) through a quasi-experimental methodology, with two measures over time. The instrument used was the European Cyberbullying Intervention Project Questionnaire. The results show that the involvement in cyberbullying as cyber-victim,cyber-aggressor, and cyber-bully-victim increase without intervention, whereas it diminishes when intervention is carried out by the teachers who have received specific training and have used the didactic Asegúrate package. Additionally, the impact of the intervention on the different types of behaviors was analyzed, and the results show that Asegúrate is more effective with some forms than with others. Consequently, the Asegúrate program is effective for decreasing the prevalence of cyberbullying, but some modifications need to be made to impact on all the different forms it can take.Gobierno de España PSI2017-86723-RGobierno de España PSI2016-74871-

    Distributed Hybrid Simulation of the Internet of Things and Smart Territories

    Full text link
    This paper deals with the use of hybrid simulation to build and compose heterogeneous simulation scenarios that can be proficiently exploited to model and represent the Internet of Things (IoT). Hybrid simulation is a methodology that combines multiple modalities of modeling/simulation. Complex scenarios are decomposed into simpler ones, each one being simulated through a specific simulation strategy. All these simulation building blocks are then synchronized and coordinated. This simulation methodology is an ideal one to represent IoT setups, which are usually very demanding, due to the heterogeneity of possible scenarios arising from the massive deployment of an enormous amount of sensors and devices. We present a use case concerned with the distributed simulation of smart territories, a novel view of decentralized geographical spaces that, thanks to the use of IoT, builds ICT services to manage resources in a way that is sustainable and not harmful to the environment. Three different simulation models are combined together, namely, an adaptive agent-based parallel and distributed simulator, an OMNeT++ based discrete event simulator and a script-language simulator based on MATLAB. Results from a performance analysis confirm the viability of using hybrid simulation to model complex IoT scenarios.Comment: arXiv admin note: substantial text overlap with arXiv:1605.0487
    corecore