6,431 research outputs found

    Design Principals of Social Navigation

    Get PDF
    8th Delos Workshop on "User Interfaces for Digital Libraries" (on 21 October it will be held in conjuction with the 4th ERCIM Workshop on "User Interfaces for All"), SICS, Kista, Sweden, 21-23 October 1998PERSON

    Care of the Self and Social Bonding in Seneca: Recruiting Readers for a Global Network of Progressor Friends

    Get PDF
    This paper interprets the demonstrative retreat from public life and the promotion of self-improvement in Seneca’s later works as a political undertaking. Developing arguments by THOMAS HABINEK, MATTHEW ROLLER and HARRY HINE, it suggests that Seneca promoted the political vision of a cosmic community of progressors toward virtue constituted by a special form of progressor friendship, a theoretical innovation made in the Epistulae morales. This network of like-minded individuals spanning time and space is open to anyone who shares the other members’ commitment to the improvement of one’s own self and that of others. By advertising such self-care and courting his readers as prospective friends, the author of the Epistulae morales aims to recruit new members for that community, in particular in the first nine letters

    Experimental investigations of #authenticity online

    Get PDF
    The concept of 'authenticity' is highly valued on social media sites (SMSes), despite its ambiguous nature and definition. One interpretation of 'authenticity' by media scholars is a human's congruence with online portrayals of themselves (e.g. posting spontaneous photographs from their lives, or using real biodata online). For marketers and 'influencers', these patterns of behaviour can achieve certain gains: sales for a business, or success of a campaign. For existentialist philosophers, using 'authenticity' as a means to an end is against its very definition. In this paper, I investigate what SMS users are looking for by their supposed 'authentic' portrayal online. My experimental approach draws upon empirical data from the Instagram social media site. Using machine learning techniques, descriptions and features of posts - including subjects, captions, and contexts - will be categorised and aggregated. I will then interpret these findings, drawing upon work by Taylor, Golomb, and Guignon, whose works on authenticity are based on mid-20th century existentalists. I argue that the existentialist ideals on authenticity are not necessarily present in contemporary SMS use. I will also argue that the popular interpretation of authenticity on SMSes can be self-defeating, when it seeks to turn the 'for-itself' into an 'in-itself'

    RELATIONSHIP BETWEEN PERSONALITY AND VALUE STRUCTURE

    Get PDF
    Humankind has been interested in the study of individual differences throughout recorded history. Plato discussed the issue of individual variations in aptitudes and suggested having tests for selecting those persons most suited for the military, artisans and rulers (Tyler, 1965). Hippocrates proposed a two-fold classification system of body builds which he called ”habitus apoplecticus” and ”habitus phthisicus” (Tyler, 1965). The nineteenth century German astronomer, Bessel, discovered discrepancies among individuals in recording the time of the passage of stars across the meridian at the Royal Observatory at Greenwich. This source of error, due to individual differences, became known as the ”personal equation (Murphy & Kovach, 1972). The founder of modern experimental psychology, Wilhelm Wundt, was strongly interested in physiological variations and developed various indices of human differences in sensation and perception (Sheridan, 1971). The field of psychological studies” (Koch, 1976) has been vitally concerned with individual differences since its inception including variations in intelligence, achievement, aptitude, creativity, interests, cognitive style, personality and values. It is these latter two areas and the implicit relationship between them which have specific interest for this investigator

    Context for Confusion: Understanding Babel in the Book of Beginnings

    Get PDF
    The meaning of the Tower of Babel episode in Genesis 11 proves to be continually elusive for both biblical scholars and pastors. While the results of this momentous event in world history seem obvious, owing to the racial and linguistic diversity present in the world today, the reason for God\u27s judgment over the unified peoples who attempted to build together is far less clear. This has even led some to question the justice and wisdom of God, considering the challenges posed by racial division throughout history. As with most questions of biblical interpretation, however, the key to interpretation lies within the unity of the text itself. The Babel passage stands as the climax to the primeval history section of Genesis and, therefore, relies heavily on the literary themes and motifs which are presented in earlier chapters. Relying on these clues along with supplemental material from the contemporary cultures of the Genesis account, this study will probe the meaning of the Babel narrative in light of man\u27s descending spiral into sin, just before God decisively re-enters history to begin his redemptive master plan

    Re-Identification Attacks – A Systematic Literature Review

    Get PDF
    The publication of increasing amounts of anonymised open source data has resulted in a worryingly rising number of successful re-identification attacks. This has a number of privacy and security implications both on an individual and corporate level. This paper uses a Systematic Literature Review to investigate the depth and extent of this problem as reported in peer reviewed literature. Using a detailed protocol ,seven research portals were explored, 10,873 database entries were searched, from which a subset of 220 papers were selected for further review. From this total, 55 papers were selected as being within scope and to be included in the final review. The main review findings are that 72.7% of all successful re-identification attacks have taken place since 2009. Most attacks use multiple datasets. The majority of them have taken place on global datasets such as social networking data, and have been conducted by US based researchers. Furthermore, the number of datasets can be used as an attribute. Because privacy breaches have security, policy and legal implications (e.g. data protection, Safe Harbor etc.), the work highlights the need for new and improved anonymisation techniques or indeed, a fresh approach to open source publishing

    Spartan Daily, June 7, 1937

    Get PDF
    Volume 25, Issue 150https://scholarworks.sjsu.edu/spartandaily/2634/thumbnail.jp
    • …
    corecore