29,564 research outputs found

    Social justice and an information democracy with free and open source software

    Get PDF
    This paper includes some thoughts on the implications of proprietary software versus free and open source software with regards to social justice, capital, and notions of an information society versus an information democracy. It outlines what free and open source software is and why it is important for social justice, and it offers three cases that highlight two salient themes. This includes a case about preference ordering and decision-making and two cases about knowing and knowledge

    Culture and disaster risk management - citizens’ reactions and opinions during Citizen Summit in Lisbon, Portugal

    Get PDF
    The analyses and results in this document are based on the data collected during the fifth Citizen Summit held in Lisbon, Portugal on April 14th 2018. Like the previous four Citizen Summits held in Romania, Malta, Italy and Germany, this Citizen Summit was designed as a one-day event combining public information with feedback gathering through different methods of data collection. In the morning session, the event started with a presentation of the CARISMAND project and its main goals and concepts, and the planned CARISMAND Toolkit functionalities. Then, overall 27 questions with pre-defined answer options were posed to the audience and responses collected via an audience response system. As in the previous Citizen Summits, all questions in this part of the event aimed to explore citizens’ attitudes, perceptions and intended behaviours related to disaster risks. Comparing and contrasting the respective results of all six Citizen Summits in the final synthesised analysis will aim to provide additional insight into cultural factors that may affect disaster-related preparedness and response. Between these questions, additional presentations where held that informed the audience about state-of-the-art disaster preparedness and response topics (e.g., large-scale disaster scenario exercises, use of social media, and mobile phone apps). Furthermore, this last round of Citizen Summits was organised and specifically designed to discuss and collect feedback on recommendations for citizens, which have all been formulated on the basis of Work Packages 2-8 results and in coordination with the Work Package 11 brief. These Toolkit recommendations are envisaged to form one of the core elements of the Work Package 9 CARISMAND Toolkit. Additionally, following the cyclical design of CARISMAND events (and wherever meaningful and possible), they “mirror” the respective recommendations for practitioners, which were discussed in the last (third) CARISMAND Stakeholder Assembly held in Lisbon in February 2018, and they are structured in two, main “sets”: A. Developing a personal “culture of preparedness” B. Taking part in disaster preparedness and response activities. These two sets of recommendations were also presented in detail during the morning session to the participating citizens. In the afternoon session, small moderated group discussions of approximately 2 hours duration were held, which aimed to gather the citizens’ direct feedback on the two sets of Toolkit recommendations presented in the morning, following a detailed discussion guideline. For a detailed overview of all questions asked and topics discussed please see Appendix A. Overall, 102 citizens participated in the Portugal event. The total sample shows a relatively even gender and age distribution, which is unsurprising given the target quotas that were requested from the recruiting local market research agency. The lower number of senior citizens aged 65 and above was expected and reflects mobility issues. Participants were asked about three key aspects of experience of disasters and disaster risk perception that could potentially have an impact on how other questions were answered. More than nine out of ten respondents (92.8%) indicated that they, or a close friend or family member, have experienced a disaster, more than half (56.7%) felt that they are currently living in an area that is specifically prone to disasters, and 57.8% answered that they know other people in the area where they live who they think are particularly vulnerable or exposed to disasters. Slight gender and age-related differences in the responses to these questions were found to be not statistically significant (p>=.05). The rest of this report presents the results of the fifth CARISMAND Citizen Summit and is structured in five main sections. After this introduction, the second section will provide an overview of the different methods applied. The third section, based on the quantitative data collected via the audience response system, presents the results from questions on general disaster risk perceptions, disaster preparedness, and behaviours in disaster situations with a particular focus on the use of mobile phone apps and social media. In the fourth section, based on the qualitative data collected in the ten discussion groups, the analyses will provide detailed insight into the participants’ feedback on the two sets of recommendations for citizens presented in the morning session. The final section compares and contrasts the results from sections 3 and 4, draws conclusions, and presents proposed changes and amendments to the Work Package 9 Toolkit recommendations based on the participating citizens’ suggestions.The project was co-funded by the European Commission within the Horizon2020 Programme (2014-2020).peer-reviewe

    Case study:exploring children’s password knowledge and practices

    Get PDF
    Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous password, and this might well be a suboptimal choice. Designing authentication for children requires acknowledgement of child-specific developmental challenges related to literacy, cognitive abilities and differing developmental stages. Understanding the current state of play is essential, to deliver insights that can inform the development of child-centred authentication mechanisms and processes. We carried out a systematic literature review of all research related to children and authentication since 2000. A distinct research gap emerged from the analysis. Thus, we designed and administered a survey to school children in the United States (US), so as to gain insights into their current password usage and behaviors. This paper reports preliminary results from a case study of 189 children (part of a much larger research effort). The findings highlight age-related differences in children’s password understanding and practices. We also discovered that children confuse concepts of safety and security. We conclude by suggesting directions for future research. This paper reports on work in progress.<br/

    Information Outlook, May 2001

    Get PDF
    Volume 5, Issue 5https://scholarworks.sjsu.edu/sla_io_2001/1004/thumbnail.jp

    Exploring haptic interfacing with a mobile robot without visual feedback

    Get PDF
    Search and rescue scenarios are often complicated by low or no visibility conditions. The lack of visual feedback hampers orientation and causes significant stress for human rescue workers. The Guardians project [1] pioneered a group of autonomous mobile robots assisting a human rescue worker operating within close range. Trials were held with fire fighters of South Yorkshire Fire and Rescue. It became clear that the subjects by no means were prepared to give up their procedural routine and the feel of security they provide: they simply ignored instructions that contradicted their routines

    BlogForever D3.3: Development of the Digital Rights Management Policy

    Get PDF
    This report presents a set of recommended practices and approaches that a future BlogForever repository can use to develop a digital rights management policy. The report outlines core legal aspects of digital rights that might need consideration in developing policies, and what the challenges are, in particular, in relation to web archives and blog archives. These issues are discussed in the context of the digital information life cycle and steps that might be taken within the workflow of the BlogForever platform to facilitate the gathering and management of digital rights information. Further, the reports on interviews with experts in the field highlight current perspectives on rights management and provide empirical support for the recommendations that have been put forward

    Information Outlook, May 2004

    Get PDF
    Volume 8, Issue 5https://scholarworks.sjsu.edu/sla_io_2004/1004/thumbnail.jp

    The Influence of an Individual’s Disposition to Value Privacy in a Non-Contrived Study

    Get PDF
    Unexpected usage of user data has made headlines as both governments and commercial entities have encountered privacy-related issues. Like other social networking sites, LinkedIn provides users to restrict access to their information or allow for public viewing; information available in the public view was used unexpectedly (i.e., profiling). A non-profit entity called ICWATCH used tools to gather information on government mass surveillance programs by scraping publicly accessible user data from LinkedIn. Previous research has shown that privacy concerns influence behavior intention in contrived scenarios. What remains unclear is whether LinkedIn users, whose data was scraped by ICWATCH (an actual situation), would have similar privacy concerns and subsequently express the intent to take privacy-preserving action. This study proposed to answer three research questions in the context of an actual privacy-centric situation, using an explanatory sequential mixed methods design. First, what is the user\u27s disposition towards privacy? Second, to what extent does this influence users\u27 privacy concerns regarding the inclusion of their LinkedIn profile information within ICWATCH? Third, to what extent do these concerns influence their stated intention to modify their LinkedIn profile/settings to minimize/eliminate this inclusion? The two-phase approach performed quantitative analysis on collected survey data, followed by analysis on follow-up interview data to provide context. The resulting analyses found significant support for each hypothesis and divergence of underlying factors between degrees of the hypotheses and variable representations. Those participants who were not inclined to privacy and were not concerned with the situation, as expected, did not intend to modify their LinkedIn profile. However, they did express underlying factors such as control and privacy risk belief, unlike their counterparts. Those participants who were more inclined and more concerned about the situation did express an intent to modify their profile and revealed underlying factors such as regulations and usage. The findings support the extension of the existing literature onto actual privacy-centric situations. The results also highlight challenges with population demographics in actual situations and suggestions for construct prioritization when investigating future situations
    • …
    corecore