10,867 research outputs found

    Privacy in crowdsourcing:a systematic review

    Get PDF
    The advent of crowdsourcing has brought with it multiple privacy challenges. For example, essential monitoring activities, while necessary and unavoidable, also potentially compromise contributor privacy. We conducted an extensive literature review of the research related to the privacy aspects of crowdsourcing. Our investigation revealed interesting gender differences and also differences in terms of individual perceptions. We conclude by suggesting a number of future research directions.</p

    Unproceedings of the Fourth .Astronomy Conference (.Astronomy 4), Heidelberg, Germany, July 9-11 2012

    Full text link
    The goal of the .Astronomy conference series is to bring together astronomers, educators, developers and others interested in using the Internet as a medium for astronomy. Attendance at the event is limited to approximately 50 participants, and days are split into mornings of scheduled talks, followed by 'unconference' afternoons, where sessions are defined by participants during the course of the event. Participants in unconference sessions are discouraged from formal presentations, with discussion, workshop-style formats or informal practical tutorials encouraged. The conference also designates one day as a 'hack day', in which attendees collaborate in groups on day-long projects for presentation the following morning. These hacks are often a way of concentrating effort, learning new skills, and exploring ideas in a practical fashion. The emphasis on informal, focused interaction makes recording proceedings more difficult than for a normal meeting. While the first .Astronomy conference is preserved formally in a book, more recent iterations are not documented. We therefore, in the spirit of .Astronomy, report 'unproceedings' from .Astronomy 4, which was held in Heidelberg in July 2012.Comment: 11 pages, 1 figure, .Astronomy 4, #dotastr

    A hermeneutic inquiry into user-created personas in different Namibian locales

    Get PDF
    Persona is a tool broadly used in technology design to support communicational interactions between designers and users. Different Persona types and methods have evolved mostly in the Global North, and been partially deployed in the Global South every so often in its original User-Centred Design methodology. We postulate persona conceptualizations are expected to differ across cultures. We demonstrate this with an exploratory-case study on user-created persona co-designed with four Namibian ethnic groups: ovaHerero, Ovambo, ovaHimba and Khoisan. We follow a hermeneutic inquiry approach to discern cultural nuances from diverse human conducts. Findings reveal diverse self-representations whereby for each ethnic group results emerge in unalike fashions, viewpoints, recounts and storylines. This paper ultimately argues User-Created Persona as a potentially valid approach for pursuing cross-cultural depictions of personas that communicate cultural features and user experiences paramount to designing acceptable and gratifying technologies in dissimilar locales

    Amplifying Quiet Voices: Challenges and Opportunities for Participatory Design at an Urban Scale

    Get PDF
    Many Smart City projects are beginning to consider the role of citizens. However, current methods for engaging urban populations in participatory design activities are somewhat limited. In this paper, we describe an approach taken to empower socially disadvantaged citizens, using a variety of both social and technological tools, in a smart city project. Through analysing the nature of citizens’ concerns and proposed solutions, we explore the benefits of our approach, arguing that engaging citizens can uncover hyper-local concerns that provide a foundation for finding solutions to address citizen concerns. By reflecting on our approach, we identify four key challenges to utilising participatory design at an urban scale; balancing scale with the personal, who has control of the process, who is participating and integrating citizen-led work with local authorities. By addressing these challenges, we will be able to truly engage citizens as collaborators in co-designing their city

    Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

    Full text link
    Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks. Our approach detects a broad range of cyber-attacks (e.g., distributed denial of service (DDOS) attacks, data breaches, and account hijacking) in an unsupervised manner using just a limited fixed set of seed event triggers. A new query expansion strategy based on convolutional kernels and dependency parses helps model reporting structure and aids in identifying key event characteristics. Through a large-scale analysis over Twitter, we demonstrate that our approach consistently identifies and encodes events, outperforming existing methods.Comment: 13 single column pages, 5 figures, submitted to KDD 201
    • …
    corecore