259,231 research outputs found

    DH Benelux Journal 3. DH Benelux Online

    Get PDF
    The third volume of the DH Benelux Journal. This volume includes six full-length, peer-reviewed articles that are based on accepted contributions to the 2020 virtual DH Benelux conference. Contents: 1. Editor's Preface (Wout Dillen, Marijn Koolen, Marieke van Erp); 2. Introduction: Digital Humanities Online (Antske Fokkens, Christian Gosvig Olesen); 3. I Catching. Computationally Operationalising Narrative Perspective for Stylometric Analysis (Lisanne M. van Rossum, Joris J. van Zundert, Karina van Dalen-Oskam); 4. Reconstructing Gavin Douglas’s Translation Practice in the Eneados Using a Corpus Linguistic-Based Method (Megan Bushnell); 5. Using Linked Data to Track and Trace Processes of Canonization in Early Modern Dutch Literature (Harm Nijboer, Lieke van Deinsen, Leon van Wissen, Judith Brouwer, Ton van Strien, Frans Blom); 6. Vehemence and Victims: Emotion Mining Historical Parliamentary Debates on War Victims in the Netherlands (Milan van Lange and Ralf Futselaar); 7. #Bookstagram and Beyond. The Presence and Depiction of the Bachmann Literary Prize on Social Media (2007-2017) (Lore De Greve, Gunther Martens); 8. The Digital Humanities Classroom as a “Node”. From Toolbox to Mindset? (Florentina Armaselu)

    Locational wireless and social media-based surveillance

    Get PDF
    The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years. Numerous native features built into contemporary smart devices enable highly accurate digital fingerprinting techniques. Furthermore, software developers have been taking advantage of locational capabilities of these devices by building applications and social media services that enable convenient sharing of information tied to geographical locations. Mass online sharing resulted in a large volume of locational and personal data being publicly available for extraction. A number of researchers have used this opportunity to design and build tools for a variety of uses – both respectable and nefarious. Furthermore, due to the peculiarities of the IEEE 802.11 specification, wireless-enabled smart devices disclose a number of attributes, which can be observed via passive monitoring. These attributes coupled with the information that can be extracted using social media APIs present an opportunity for research into locational surveillance, device fingerprinting and device user identification techniques. This paper presents an in-progress research study and details the findings to date

    Mining Mobile Youth Cultures

    Get PDF
    In this short paper we discuss our work on coresearch devices with a young coder community, which help investigate big social data collected by mobile phones. The development was accompanied by focus groups and interviews on privacy attitudes, and aims to explore how youth cultures are tracked in mobile phone data

    Serving higher education with technology – disrupting higher education with technology

    Get PDF
    Technology is increasingly serving higher education by enabling student-centred learning and concerted social learning, extended reach to content anytime and everywhere, insights for educators into progress tracking and learning trends, and cross-institutional academic collaboration. At the same time, technology is providing evidence of negative disruption to the core purpose of education, which is human development and individual preparation for the future. Technology is gradually diminishing the capacity of individuals to critically think and reason, to expand into unfamiliar knowledge domains, and to exploit the learning experience to fulfil the market needs after graduation. In this paper, a review is presented on how technology is disrupting higher education, both positively and negatively. Some recommendations are given with respect to these disruption

    Self-tracking modes: reflexive self-monitoring and data practices

    Get PDF
    The concept of ‘self-tracking’ (also referred to as life-logging, the quantified self, personal analytics and personal informatics) has recently begun to emerge in discussions of ways in which people can voluntarily monitor and record specific features of their lives, often using digital technologies. There is evidence that the personal data that are derived from individuals engaging in such reflexive self-monitoring are now beginning to be used by actors, agencies and organisations beyond the personal and privatised realm. Self-tracking rationales and sites are proliferating as part of a ‘function creep’ of the technology and ethos of self-tracking. The detail offered by these data on individuals and the growing commodification and commercial value of digital data have led government, managerial and commercial enterprises to explore ways of appropriating self-tracking for their own purposes. In some contexts people are encouraged, ‘nudged’, obliged or coerced into using digital devices to produce personal data which are then used by others. This paper examines these issues, outlining five modes of self-tracking that have emerged: private, communal, pushed, imposed and exploited. The analysis draws upon theoretical perspectives on concepts of selfhood, citizenship, biopolitics and data practices and assemblages in discussing the wider sociocultural implications of the emergence and development of these modes of self-tracking

    Performance of grassed swale as stormwater quantity control in lowland area

    Get PDF
    Grassed swale is a vegetated open channel designed to attenuate stormwater through infiltration and conveying runoff into nearby water bodies, thus reduces peak flows and minimizes the causes of flood. UTHM is a flood-prone area due to located in lowland area, has high groundwater level and low infiltration rates. The aim of this study is to assess the performance of grassed swale as a stormwater quantity control in UTHM. Flow depths and velocities of swales were measured according to Six-Tenths Depth Method shortly after a rainfall event. Flow discharges of swales (Qswale) were evaluated by Mean- Section Method to determine the variations of Manning’s roughness coefficients (ncalculate) that results between 0.075 – 0.122 due to tall grass and irregularity of channels. Based on the values of Qswale between sections of swales, the percentages of flow attenuation are up to 54%. As for the flow conveyance of swales, Qswale were determined by Manning’s equation that divided into Qcalculate, evaluated using ncalculate, and Qdesign, evaluated using roughness coefficient recommended by MSMA (ndesign), to compare with flow discharges of drainage areas (Qpeak), evaluated by Rational Method with 10-year ARI. Each site of study has shown Qdesign is greater than Qpeak up to 59%. However, Qcalculate is greater than Qpeak only at a certain site of study up to 14%. The values of Qdesign also greater than Qcalculate up to 52% where it shows that the roughness coefficients as considered in MSMA are providing a better performance of swale. This study also found that the characteristics of the studied swales are comparable to the design consideration by MSMA. Based on these findings, grassed swale has the potential in collecting, attenuating, and conveying stormwater, which suitable to be applied as one of the best management practices in preventing flash flood at UTHM campus

    Shopping For Privacy: How Technology in Brick-and-Mortar Retail Stores Poses Privacy Risks for Shoppers

    Get PDF
    As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy practices, I call upon the Federal Trade Commission, the de facto privacy regulator in the United States, to increase its policing of physical retail stores to protect the shopper from any further harm

    Social spending: investing in social media marketing (SMM)

    Get PDF
    • 

    corecore