13,455 research outputs found
Evolution of Privacy Loss in Wikipedia
The cumulative effect of collective online participation has an important and
adverse impact on individual privacy. As an online system evolves over time,
new digital traces of individual behavior may uncover previously hidden
statistical links between an individual's past actions and her private traits.
To quantify this effect, we analyze the evolution of individual privacy loss by
studying the edit history of Wikipedia over 13 years, including more than
117,523 different users performing 188,805,088 edits. We trace each Wikipedia's
contributor using apparently harmless features, such as the number of edits
performed on predefined broad categories in a given time period (e.g.
Mathematics, Culture or Nature). We show that even at this unspecific level of
behavior description, it is possible to use off-the-shelf machine learning
algorithms to uncover usually undisclosed personal traits, such as gender,
religion or education. We provide empirical evidence that the prediction
accuracy for almost all private traits consistently improves over time.
Surprisingly, the prediction performance for users who stopped editing after a
given time still improves. The activities performed by new users seem to have
contributed more to this effect than additional activities from existing (but
still active) users. Insights from this work should help users, system
designers, and policy makers understand and make long-term design choices in
online content creation systems
Privacy in crowdsourcing:a systematic review
The advent of crowdsourcing has brought with it multiple privacy challenges. For example, essential monitoring activities, while necessary and unavoidable, also potentially compromise contributor privacy. We conducted an extensive literature review of the research related to the privacy aspects of crowdsourcing. Our investigation revealed interesting gender differences and also differences in terms of individual perceptions. We conclude by suggesting a number of future research directions.</p
A Corpus of Sentence-level Revisions in Academic Writing: A Step towards Understanding Statement Strength in Communication
The strength with which a statement is made can have a significant impact on
the audience. For example, international relations can be strained by how the
media in one country describes an event in another; and papers can be rejected
because they overstate or understate their findings. It is thus important to
understand the effects of statement strength. A first step is to be able to
distinguish between strong and weak statements. However, even this problem is
understudied, partly due to a lack of data. Since strength is inherently
relative, revisions of texts that make claims are a natural source of data on
strength differences. In this paper, we introduce a corpus of sentence-level
revisions from academic writing. We also describe insights gained from our
annotation efforts for this task.Comment: 6 pages, to appear in Proceedings of ACL 2014 (short paper
The Effect of the Gramm Leach Bliley Act on the Financial Services Industry
The financial services industry has fascinated me since high school when I participated in a University Program focusing on the industry. During this time I became familiar with the Gramm-Leach Bliley Act (GLBA) and other legislation that was reshaping the industry. In this paper I shed light on key events and acts that have transformed the financial services industry with a particular focus on the GLBA. I argue that the GLBA is not revolutionary, but rather evolutionary. Second, I argue that the consumer privacy portion of the GLBA is the most vital part because of the massive amount of personal information available in today’s market. Finally, the Gramm-Leach Bliley Act impacts me directly since I hope to become a Financial Advisor and the provisions of the Act will permit me to sell all types of financial instruments
Using Control Frameworks to Map Risks in Web 2.0 Applications
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development brings its own threats or new ways to deliver old attacks. The objective of this study is to develop a framework to identify the security issues an organisation is exposed to through Web 2.0 applications, with specific focus on unauthorised access. An extensive literature review was performed to obtain an understanding of the technologies driving Web 2.0 applications. Thereafter, the technologies were mapped against Control Objectives for Information and related Technology and Trust Service Principles and Criteria and associated control objectives relating to security risks. These objectives were used to develop a framework which can be used to identify risks and formulate appropriate internal control measures in any organisation using Web 2.0 applications. Every organisation, technology and application is unique and the safeguards depend on the nature of the organisation, information at stake, degree of vulnerability and risks. A comprehensive security program should include a multi-layer approach comprising of a control framework, combined with a control model considering the control processes in order to identify the appropriate control techniques.Web 2.0, Security risks, Control framework, Control Objectives for Information and related Technology (CobiT), Trust Service Principles and Criteria
Appraisal and the Future of Archives in the Digital Era
Discussion of the implications of new technologies, changing public policies, and transformation of culture for how archivists practice and think about appraisal
Weblogs in Higher Education - Why Do Students (Not) Blog?
Positive impacts on learning through blogging, such as active knowledge construction and reflective writing, have been reported. However, not many students use weblogs in informal contexts, even when appropriate facilities are offered by their universities. While motivations for blogging have been subject to empirical studies, little research has addressed the issue of why students choose not to blog. This paper presents an empirical study undertaken to gain insights into the decision making process of students when deciding whether to keep a blog or not. A better understanding of students' motivations for (not) blogging may help decision makers at universities in the process of selecting, introducing, and maintaining similar services. As informal learning gains increased recognition, results of this study can help to advance appropriate designs of informal learning contexts in Higher Education. The method of ethnographic decision tree modelling was applied in an empirical study conducted at the Vienna University of Technology, Austria. Since 2004, the university has been offering free weblog accounts for all students and staff members upon entering school, not bound to any course or exam. Qualitative, open interviews were held with 3 active bloggers, 3 former bloggers, and 3 non‑ bloggers to elicit their decision criteria. Decision tree models were developed out of the interviews. It turned out that the modelling worked best when splitting the decision process into two parts: one model representing decisions on whether to start a weblog at all, and a second model representing criteria on whether to continue with a weblog once it was set up. The models were tested for their validity through questionnaires developed out of the decision tree models. 30 questionnaires have been distributed to bloggers, former bloggers and non‑ bloggers. Results show that the main reasons for students not to keep a weblog include a preference for direct (online) communication, and concerns about the loss of privacy through blogging. Furthermore, the results indicate that intrinsic motivation factors keep students blogging, whereas stopping a weblog is mostly attributable to external factors
- …