281 research outputs found

    Utilizing Data Analytics for Optimum Urban Transportation System

    Get PDF
    This study addresses the challenges associated with urban transportation by providing a framework for exploiting data analytics, with application to transportation data, to achieve an effective and time-efficient metropolitan city transportation system. We aim to understand traffic in different areas of the city, as well as trying to categorize the various zones within numerous areas in the city, such as: business destination, residential destination, or touristic destination according to its popularity given both the time-range and the day of the week. In this project, a logistic regression classification model is built to classify locations into hotspots/non-hotspots

    Phantom Patterns and Online Misinformation with Megan Fritts

    Get PDF
    Overview & Shownotes We take in massive amounts of information on a daily basis. Our brains use something called pattern-recognition to try and sort through and make sense of this information. My guest today, the philosopher Megan Fritts, argues that in many cases, the stories we tell ourselves about the patterns we see arenā€™t actually all that meaningful. And worse, these so-called phantom patterns can amplify the problem of misinformation. For the episode transcript, download a copy or read it below. Contact us at [email protected]. Links to people and ideas mentioned in the show ā€œOnline Misinformation and ā€˜Phantom Patternsā€™: Epistemic Exploitation in the Era of Big Dataā€ by Megan Fritts and Frank Cabrera The Right to Know by Lani Watson Definition of the term ā€œepistemicā€ Section 230 of the Communications Decency Act Credits Thanks to Evelyn Brosius for our logo. Music featured in the show: ā€œGolden Grassā€ by Blue Dot Sessions ā€œPintle 1 Minā€ by Blue Dot Session

    Blockchainā€™s roles in strengthening cybersecurity and protecting privacy

    Get PDF
    This paper evaluates blockchain's roles in strengthening cybersecurity and protecting privacy. Since most of the data is currently stored in cloud data centers, it also compares how blockchain performs vis-vis the cloud in various aspects of security and privacy. Key underlying mechanisms related to the blockchain's impacts on the Internet of Things (IoT) security are also covered. From the security and privacy considerations, it highlights how blockchain-based solutions could possibly be, in many aspects, superior to the current IoT ecosystem, which mainly relies on centralized cloud servers through service providers. Using practical applications and real-world examples, the paper argues that blockchain's decentralized feature is likely to result in a low susceptibility to manipulation and forgery by malicious participants. Special consideration is also given to how blockchain-based identity and access management systems can address some of the key challenges associated with IoT security. The paper provides a detailed analysis and description of blockchain's roles in tracking the sources of insecurity in supply chains related to IoT devices. The paper also delves into how blockchain can make it possible to contain an IoT security breach in a targeted way after it is discovered. It discusses and evaluates initiatives of organizations, inter-organizational networks and industries on this front. A number of policy implications are discussed. First, in order to strengthen IoT, regulators can make it obligatory for firms to deploy blockchain in supply chain, especially in systems that are mission critical, and have substantial national security and economic benefits. Second, public policy efforts directed at protecting privacy using blockchain should focus on providing training to key stakeholders and increasing investment in this technology. Third, one way to enrich the blockchain ecosystem would be to turn attention to publicā€“private partnerships. Finally, national governments should provide legal clarity and more information for parties to engage in smart contracts that are enforceable

    Persuasion strategies: use of negative forces in scam e-mails

    Get PDF
    The 21st century globalisation strongly influences the world as a result of highly improved technology and communications which made it possible for everyone involved to have equal access to a global market and information exchange via English. As a result, electronic communication has become part of the present-day multinational professionals of all fields who work daily in front of their digital monitors. At times, these professionals may receive Nigerian 419 scam e-mails in which fraudsters target victims to make advance payments for financial gains that do not materialise. In these e-mails, situations in which persuasion techniques are intertwined are well crafted. As a result, the victim who is susceptible to the offer is more likely to respond and be lured into losing money eventually. The present study, consequently, analysed a corpus of 50 Nigerian 419 scam e-mails through a textual analysis to examine language aspects in terms of persuasion strategies fraudsters used as a compelling force to achieve their communicative purposes of lures and deceits. The study has revealed two major types of deceptive techniques which are used in combination, namely framing-rhetoric triggers, disguised as the traditional genre of electronic communications and human weakness-exploiting triggers, intended as incitement of recipients' emotions. Finally, the paper includes not only pedagogical suggestions for business English teachers when implementing classroom activities, but also warnings for either pre-experienced or experienced business professionals in relation to interpreting the unknown e-mails' messages they receive with great caution

    The Role of Conceptions of Value in Data Practices: A Multi-Case Study of Three Small Teams of Ecological Scientists.

    Full text link
    This dissertation examines the role of conceptions of data's value in data practices. Based on a study of three small teams of scientists carrying out ecological research at a biological station, my study addresses the following main question: How do scientists conceive of the value of their data, and how do scientists enact conceptions of value in their data practices? I relied on interviews and participant observations for my study and analyzed my data through the lens of theories of value and meaning. I found that scientists were primarily concerned with data's value for their team's own, relatively narrow uses: addressing a gap in knowledge and producing the outputs that would garner them credit and prestige. When asked about their data's potential value beyond their studies, scientists regularly cited metaanalysis, cross-site comparison, and time-based studies as worthy secondary uses for data and assessed data's value according to how well they thought the data could serve those ends. As they collected data and conducted their studies, scientists did not think about data's value beyond whether or not they were good as resources for addressing a gap in knowledge. However, when asked to make their data more openly available, researchers indicated that their decision to share was based strongly on data's value for producing publications for the team. Data that teams were still working with and planned to publish were regarded as too valuable to the team to make widely available. Conversely, when scientists thought data's publication value had been fully exploited for the team, they saw little threat in sharing. In addition to publication potential, scientists also suggested that study type influenced their decision to share data and told me that they felt less compelled to share data from controlled studies because they assumed such data had inherently limited value.PHDInformationUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/107162/1/dharmrae_1.pd
    • ā€¦
    corecore