1,442 research outputs found

    Ethics and social networking sites: A disclosive analysis of Facebook

    Get PDF
    Paper has been accepted for publication in Information, Technology and People.Purpose: This paper provides insights into the moral values embodied by a popular social networking site (SNS), Facebook. We adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site. Design/methodology/approach: This study is based upon qualitative field work, involving participant observation, conducted over a two year period. Findings: Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the Internet, we reveal the complex and diffuse nature of ethical responsibility in our case and the consequent implications for governance of SNS. Research limitations/implications: We situate our research in a body of work known as disclosive ethics and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with other authors in the genre, our work is largely descriptive, but we engage with prior research by Brey and Introna to highlight the scope for theory development. Practical implications: Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. We suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation. Originality/value: Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. We focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases

    Addressing the cyber safety challenge: from risk to resilience

    Get PDF
    Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs. Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to: Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach Keep risk in perspective – the risks and benefits of digital participation go hand in hand Broaden the focus from awareness-raising to long-term behaviour change. As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved. Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services

    Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.

    Get PDF
    This report gives an overview of the most relevant organisational and\ud behavioural aspects regarding user profiling. It discusses not only the\ud most important aims of user profiling from both an organisation’s as\ud well as a user’s perspective, it will also discuss organisational motives\ud and barriers for user profiling and the most important conditions for\ud the success of user profiling. Finally recommendations are made and\ud suggestions for further research are given

    Resolving Multi-party Privacy Conflicts in Social Media

    Get PDF
    Items shared through Social Media may affect more than one user's privacy --- e.g., photos that depict multiple users, comments that mention multiple users, events in which multiple users are invited, etc. The lack of multi-party privacy management support in current mainstream Social Media infrastructures makes users unable to appropriately control to whom these items are actually shared or not. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for an item can help solve this problem. However, merging multiple users' privacy preferences is not an easy task, because privacy preferences may conflict, so methods to resolve conflicts are needed. Moreover, these methods need to consider how users' would actually reach an agreement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the item to be shared. Current approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. In this paper, we propose the first computational mechanism to resolve conflicts for multi-party privacy management in Social Media that is able to adapt to different situations by modelling the concessions that users make to reach a solution to the conflicts. We also present results of a user study in which our proposed mechanism outperformed other existing approaches in terms of how many times each approach matched users' behaviour.Comment: Authors' version of the paper accepted for publication at IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Knowledge and Data Engineering, 201

    Familiars: representing Facebook users’ social behaviour through a reflective playful experience

    Get PDF
    In this paper, we describe the design and development of a social game called Familiars. Inspired by the daemons in Pullman’s “Dark Material” trilogy, Familiars are animal companions that sit on your Facebook profile and change into different animal forms based on your social activity within the social network of Facebook. . Familiars takes advantage of the powerful capabilities of the developers platform of Facebook to build a multi-dimensional picture of a player’s state based on social activity, facial expression analysis on photographs and suggestions from friends. This rich information is then distilled and presented to the player in the form of animal that the familiar chooses to take. We show how the types of animals and personalities were associated in a cross-cultural user study, and present quantitative results from the social behaviours of the players within the game in addition to qualitative data gathered from questionnaire responses

    The Evaluation of Route Guidance Systems

    Get PDF
    BACKGROUND We were commissioned by the Transport and Road Research Laboratory to: "collaborate with the German government and their representatives who are responsible for conducting the LISB trial in Berlin in order to produce an agreed methodology, which is acceptable in both Germany and the UK, for assessing the automatic route guidance systems which will be provided in Berlin and London." The brief suggested a number of aspects to be included, and required detailed proposals, timescales and costs for implementation in London. 1.1.2 The background to the brief lies in decisions to introduce pilot automatic route guidance systems in the two cities. The principles of the systems are similar, and have been described in detail elsewhere (Jeffery, 1987). In brief, they involve : (i) a central computer which retains information on a specified road network, which is updated using real time information from the equipment users; (ii) infra red beacons at selected junctions which transmit information to equipped vehicles and receive information from those vehicles; (iii) in-vehicle equipment which includes a dead-reckoning system for position finding, a device for requesting guidance and specifying the destination, a micro-computer which selects the optimal route, and a display which indicates when a turn is required on the main network, and the compass direction and distance to the final destination; iv) transmission from the equipped vehicles of origin, requested destination, links used since passing the last beacon and, for each link, the time of entry and departure and time spent delayed. It is this travel time information which is used to update the central computer's knowledge of the best routes. (Continues..

    Understanding patterns of library use among undergraduate students from different disciplines

    Get PDF
    Objective The objective of this study was to test whether routinely-generated library usage data could be linked with information about students to understand patterns of library use among students from different disciplines at the University of Huddersfield. This information is important for librarians seeking to demonstrate the value of the library, and to ensure that they are providing services which meet user needs. The study seeks to join two strands of library user research which until now have been kept rather separate – an interest in disciplinary differences in usage, and a methodology which involves large-scale routinely-generated data. Methods The study uses anonymised data about individual students derived from two sources: routinely-generated data on various dimensions of physical and electronic library resource usage, and information from the student registry on the course studied by each student. Courses were aggregated at a subject and then disciplinary level. Kruskal-Wallis and Mann Whitney tests were used to identify statistically significant differences between the high-level disciplinary groups, and within each disciplinary group at the subject level. Results The study identifies a number of statistically significant differences on various dimensions of usage between both high-level disciplinary groupings and lower subject-level groupings. In some cases, differences are not the same as those observed in earlier studies, reflecting distinctive usage patterns and differences in the way that disciplines or subjects are defined and organised. Arts students at Huddersfield use library resources less than those in social science disciplines, contradicting findings from studies at other institutions, although music students are high users within the arts subject-level grouping. Computing and engineering students were relatively similar, although computing students were more likely to download PDFs, and engineering students were more likely to use the physical library. Conclusions The technique introduced in this study represents an effective way of understanding distinctive usage patterns at an individual institution. There may be potential to aggregate findings across several institutions to help universities benchmark their own performance and usage; this would require a degree of collaboration and standardisation. This study found that students in certain disciplines at Huddersfield use the library in different ways to students in those same disciplines at other institutions: further investigation is needed to understand exactly why these differences exist, but some hypotheses are offered

    Collusion in Peer-to-Peer Systems

    Get PDF
    Peer-to-peer systems have reached a widespread use, ranging from academic and industrial applications to home entertainment. The key advantage of this paradigm lies in its scalability and flexibility, consequences of the participants sharing their resources for the common welfare. Security in such systems is a desirable goal. For example, when mission-critical operations or bank transactions are involved, their effectiveness strongly depends on the perception that users have about the system dependability and trustworthiness. A major threat to the security of these systems is the phenomenon of collusion. Peers can be selfish colluders, when they try to fool the system to gain unfair advantages over other peers, or malicious, when their purpose is to subvert the system or disturb other users. The problem, however, has received so far only a marginal attention by the research community. While several solutions exist to counter attacks in peer-to-peer systems, very few of them are meant to directly counter colluders and their attacks. Reputation, micro-payments, and concepts of game theory are currently used as the main means to obtain fairness in the usage of the resources. Our goal is to provide an overview of the topic by examining the key issues involved. We measure the relevance of the problem in the current literature and the effectiveness of existing philosophies against it, to suggest fruitful directions in the further development of the field
    • 

    corecore