10,867 research outputs found
Privacy in crowdsourcing:a systematic review
The advent of crowdsourcing has brought with it multiple privacy challenges. For example, essential monitoring activities, while necessary and unavoidable, also potentially compromise contributor privacy. We conducted an extensive literature review of the research related to the privacy aspects of crowdsourcing. Our investigation revealed interesting gender differences and also differences in terms of individual perceptions. We conclude by suggesting a number of future research directions.</p
Unproceedings of the Fourth .Astronomy Conference (.Astronomy 4), Heidelberg, Germany, July 9-11 2012
The goal of the .Astronomy conference series is to bring together
astronomers, educators, developers and others interested in using the Internet
as a medium for astronomy. Attendance at the event is limited to approximately
50 participants, and days are split into mornings of scheduled talks, followed
by 'unconference' afternoons, where sessions are defined by participants during
the course of the event. Participants in unconference sessions are discouraged
from formal presentations, with discussion, workshop-style formats or informal
practical tutorials encouraged. The conference also designates one day as a
'hack day', in which attendees collaborate in groups on day-long projects for
presentation the following morning. These hacks are often a way of
concentrating effort, learning new skills, and exploring ideas in a practical
fashion. The emphasis on informal, focused interaction makes recording
proceedings more difficult than for a normal meeting. While the first
.Astronomy conference is preserved formally in a book, more recent iterations
are not documented. We therefore, in the spirit of .Astronomy, report
'unproceedings' from .Astronomy 4, which was held in Heidelberg in July 2012.Comment: 11 pages, 1 figure, .Astronomy 4, #dotastr
Recommended from our members
Evidence Cafés and Practitioner Cafés supported by online resources: A route to innovative training in practice based approaches
Current radical changes in the Police service internationally and in England and Wales are being driven by movements to adopt an Evidence-Based Practice (EBP) approach to policing. However this poses a challenge as early adopters have experienced resistance to EBP, a relatively unknown, and more importantly misunderstood approach for policing (Sherman, 2015). This resistance is not limited to police with international research highlighting implementation issues for evidence based medicine (Altman, 1996; Fairhurst & Dowrick, 1996; Murphy and Adams, 2005), evidence based management (Adams & Sasse, 1999; Rousseau, 2012), and evidence based teaching (Beista, 2007, Perry & Smart, 2007; Adams & Clough, 2015). One reason is the lack of training in EBP, which is coupled with recent concerns over the general quality of training and level of professionalism within UK police organisation (Davies et al, 1996). There have been international initiatives aimed at increasing learning around evidence based practice (Rousseau, 2012; Hall and Roussel, 2014). Some UK police forces have adopted approaches from other domains to counteract these problems (e.g. champions, enquiry visits). Mapping clear pathways that link training, experience and evidence-based practice is crucial to developing the capacity for an evidence-based workforce. This paper presents evidence from recent research that used Evidence Cafés and Practitioner Cafés connected to online resources as a route to increase understanding and awareness of evidence based practice amongst frontline police officers. Evidence Cafés are coordinated by a knowledge exchange expert with an academic and a police practitioner who facilitate the translation of research into practice. This paper presents evidence of the benefit and limitations of these events. Analytics and learning analytics of events’ online resources also provide insights into these approaches and identify triggers for increased engagement across a wide geographical context
A hermeneutic inquiry into user-created personas in different Namibian locales
Persona is a tool broadly used in technology design to support communicational interactions between designers and users. Different Persona types and methods have evolved mostly in the Global North, and been partially deployed in the Global South every so often in its original User-Centred Design methodology. We postulate persona conceptualizations are expected to differ across cultures. We demonstrate this with an exploratory-case study on user-created persona co-designed with four Namibian ethnic groups: ovaHerero, Ovambo, ovaHimba and Khoisan. We follow a hermeneutic inquiry approach to discern cultural nuances from diverse human conducts. Findings reveal diverse self-representations whereby for each ethnic group results emerge in unalike fashions, viewpoints, recounts and storylines. This paper ultimately argues User-Created Persona as a potentially valid approach for pursuing cross-cultural depictions of personas that communicate cultural features and user experiences paramount to designing acceptable and gratifying technologies in dissimilar locales
Amplifying Quiet Voices: Challenges and Opportunities for Participatory Design at an Urban Scale
Many Smart City projects are beginning to consider the role of citizens. However, current methods for engaging urban populations in participatory design activities are somewhat limited. In this paper, we describe an approach taken to empower socially disadvantaged citizens, using a variety of both social and technological tools, in a smart city project. Through analysing the nature of citizens’ concerns and proposed solutions, we explore the benefits of our approach, arguing that engaging citizens can uncover hyper-local concerns that provide a foundation for finding solutions to address citizen concerns. By reflecting on our approach, we identify four key challenges to utilising participatory design at an urban scale; balancing scale with the personal, who has control of the process, who is participating and integrating citizen-led work with local authorities. By addressing these challenges, we will be able to truly engage citizens as collaborators in co-designing their city
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as
disease outbreaks, protests, and elections. We describe the use of social media
as a crowdsourced sensor to gain insight into ongoing cyber-attacks. Our
approach detects a broad range of cyber-attacks (e.g., distributed denial of
service (DDOS) attacks, data breaches, and account hijacking) in an
unsupervised manner using just a limited fixed set of seed event triggers. A
new query expansion strategy based on convolutional kernels and dependency
parses helps model reporting structure and aids in identifying key event
characteristics. Through a large-scale analysis over Twitter, we demonstrate
that our approach consistently identifies and encodes events, outperforming
existing methods.Comment: 13 single column pages, 5 figures, submitted to KDD 201
- …