163,016 research outputs found

    Virtual learning environments – help or hindrance for the ‘disengaged’ student?

    Get PDF
    The introduction of virtual learning environments (VLEs) has been regarded by some as a panacea for many of the problems in today’s mass numbers modular higher education system. This paper demonstrates that VLEs can help or hinder student engagement and performance, and that they should be adapted to the different types of learner. A project is described that aimed to investigate whether the introduction of a VLE can assist ‘disengaged’ students, drawing on click count tracking data and student performance. The project took place in the context of two very large undergraduate modules (850 and 567 students) in a Business School of a new university in the UK. In an adaptation of a model of learner engagement in Web-enhanced environments, four distinct learner types have emerged: model, traditionalist, geek and disengaged. There was evidence that use of the VLE exacerbated, rather than moderated, the differences between these learner types

    Online advertising: analysis of privacy threats and protection approaches

    Get PDF
    Online advertising, the pillar of the “free” content on the Web, has revolutionized the marketing business in recent years by creating a myriad of new opportunities for advertisers to reach potential customers. The current advertising model builds upon an intricate infrastructure composed of a variety of intermediary entities and technologies whose main aim is to deliver personalized ads. For this purpose, a wealth of user data is collected, aggregated, processed and traded behind the scenes at an unprecedented rate. Despite the enormous value of online advertising, however, the intrusiveness and ubiquity of these practices prompt serious privacy concerns. This article surveys the online advertising infrastructure and its supporting technologies, and presents a thorough overview of the underlying privacy risks and the solutions that may mitigate them. We first analyze the threats and potential privacy attackers in this scenario of online advertising. In particular, we examine the main components of the advertising infrastructure in terms of tracking capabilities, data collection, aggregation level and privacy risk, and overview the tracking and data-sharing technologies employed by these components. Then, we conduct a comprehensive survey of the most relevant privacy mechanisms, and classify and compare them on the basis of their privacy guarantees and impact on the Web.Peer ReviewedPostprint (author's final draft

    Evidence-informed regulatory practice: an adaptive response, 2005‑15

    Get PDF
    Overview: In this occasional paper, the ACMA reflects on its regulatory practice over the past 10 years; specifically, the role of research in evidence-informed decision-making and regulation. It looks at how the ACMA has used research in an environment of ongoing change to document and build evidence, inform public debate about regulation, and build capability among our stakeholders to make communications and media work in Australia’s national interest

    Challenges of digital innovations : a set-top box based approach

    Get PDF
    The chapter analyses the challenges of digital technology for television audience measurement systems. First, the current state of audience measurement in Belgium is described. In the Belgian case, the traditional television audience measurement system is contested by small broadcasters and challenged by the opportunities that the emergence of digital television and, more specifically, the widespread diffusion of set-top boxes provide. Second, three major challenges for traditional measurement techniques are analysed. This section deals with people’s changing viewing habits, for example on-demand and time-shifted viewing, the provision of more accurate data by set-top boxes, and the increasing interests of platform operators acting as gatekeepers to access to this data. In the final section, conclusions are made

    Big Brother is Listening to You: Digital Eavesdropping in the Advertising Industry

    Get PDF
    In the Digital Age, information is more accessible than ever. Unfortunately, that accessibility has come at the expense of privacy. Now, more and more personal information is in the hands of corporations and governments, for uses not known to the average consumer. Although these entities have long been able to keep tabs on individuals, with the advent of virtual assistants and “always-listening” technologies, the ease by which a third party may extract information from a consumer has only increased. The stark reality is that lawmakers have left the American public behind. While other countries have enacted consumer privacy protections, the United States has no satisfactory legal framework in place to curb data collection by greedy businesses or to regulate how those companies may use and protect consumer data. This Article contemplates one use of that data: digital advertising. Inspired by stories of suspiciously well-targeted advertisements appearing on social media websites, this Article additionally questions whether companies have been honest about their collection of audio data. To address the potential harms consumers may suffer as a result of this deficient privacy protection, this Article proposes a framework wherein companies must acquire users\u27 consent and the government must ensure that businesses do not use consumer information for harmful purposes

    Unilateral Invasions of Privacy

    Get PDF
    Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory of unilateral invasions of privacy rooted in the incentives of potential outside invaders. It first briefly describes the different kinds of information flows that can result in losses of privacy and the private costs and benefits to the participants in these information flows. It argues that in many cases the relevant costs and benefits are those of an outsider deciding whether certain information flows occur. These outside invaders are more likely to act when their own private costs and benefits make particular information flows worthwhile, regardless of the effects on information subjects or on social welfare. And potential privacy invaders are quite sensitive to changes in these costs and benefits, unlike information subjects, for whom transaction costs can overwhelm incentives to make information more or less private. The Article then turns to privacy regulation, arguing that this unilateral-invasion theory sheds light on how effective privacy regulations should be designed. Effective regulations are those that help match the costs and benefits faced by a potential privacy invader with the costs and benefits to society of a given information flow. Law can help do so by raising or lowering the costs or benefits of a privacy invasion, but only after taking account of other costs and benefits faced by the potential privacy invader
    • 

    corecore