50,523 research outputs found

    Reliable online social network data collection

    Get PDF
    Large quantities of information are shared through online social networks, making them attractive sources of data for social network research. When studying the usage of online social networks, these data may not describe properly users’ behaviours. For instance, the data collected often include content shared by the users only, or content accessible to the researchers, hence obfuscating a large amount of data that would help understanding users’ behaviours and privacy concerns. Moreover, the data collection methods employed in experiments may also have an effect on data reliability when participants self-report inacurrate information or are observed while using a simulated application. Understanding the effects of these collection methods on data reliability is paramount for the study of social networks; for understanding user behaviour; for designing socially-aware applications and services; and for mining data collected from such social networks and applications. This chapter reviews previous research which has looked at social network data collection and user behaviour in these networks. We highlight shortcomings in the methods used in these studies, and introduce our own methodology and user study based on the Experience Sampling Method; we claim our methodology leads to the collection of more reliable data by capturing both those data which are shared and not shared. We conclude with suggestions for collecting and mining data from online social networks.Postprin

    The Passing of Print

    Get PDF
    This paper argues that ephemera is a key instrument of cultural memory, marking the things intended to be forgotten. This important role means that when ephemera survives, whether accidentally or deliberately, it does so despite itself. These survivals, because they evoke all those other objects that have necessarily been forgotten, can be described as uncanny. The paper is divided into three main sections. The first situates ephemera within an uncanny economy of memory and forgetting. The second focuses on ephemera at a particular historical moment, the industrialization of print in the nineteenth century. This section considers the liminal place of newspapers and periodicals in this period, positioned as both provisional media for information as well as objects of record. The third section introduces a new configuration of technologies – scanners, computers, hard disks, monitors, the various connections between them – and considers the conditions under which born-digital ephemera can linger and return. Through this analysis, the paper concludes by considering digital technologies as an apparatus of memory, setting out what is required if we are not to be doubly haunted by the printed ephemera within the digital archive

    Regrets, I\u27ve Had a Few: When Regretful Experiences Do (and Don\u27t) Compel Users to Leave Facebook

    Get PDF
    Previous work has explored regretful experiences on social media. In parallel, scholars have examined how people do not use social media. This paper aims to synthesize these two research areas and asks: Do regretful experiences on social media influence people to (consider) not using social media? How might this influence differ for different sorts of regretful experiences? We adopted a mixed methods approach, combining topic modeling, logistic regressions, and contingency analysis to analyze data from a web survey with a demographically representative sample of US internet users (n=515) focusing on their Facebook use. We found that experiences that arise because of users\u27 own actions influence actual deactivation of their Facebook account, while experiences that arise because of others\u27 actions lead to considerations of non-use. We discuss the implications of these findings for two theoretical areas of interest in HCI: individual agency in social media use and the networked dimensions of privacy

    Censorship in Cyberspace: Closing the Net on "Revenge Porn"

    Get PDF
    The article reviews current privacy laws in the context of “Revenge Porn”. Given the speed at which images are published online, the article highlights the futility of breach of confidence and other civil actions in preventing publication at the outset. Furthermore, private law is expensive offering little protection against the victim’s humiliation. The article proposes that non-consensual pornography should be criminalised under the Coroners and Justice Act 2009 by way of a Statutory Instrument: Misuse of Private Information 2014

    Building online employability: a guide for academic departments

    Get PDF
    This guide will help academic departments to support students to think about their careers and to use the online environment wisely. Used badly the array of social media and online technologies can seriously disadvantage a students’ career development, but if used well they can support students to find out about and transition into their future career.This work was funded by the University of Derby’s Research for Teaching and Learning programme

    Memory ecologies

    Get PDF
    The individual and collective and also cultural domains have long constituted challenging boundaries for the study of memory. These are often clearly demarcated between approaches drawn from the human and the social sciences and also humanities, respectively. But recent work turns the enduring imagination – the world view – of these domains on its head by treating memory as serving a link between both the individual and collective past and future. Here, I employ some of the contributions from Schacter and Welker’s Special Issue of Memory Studies on ‘Memory and Connection’ to offer an ‘expanded view’ of memory that sees remembering and forgetting as the outcome of interactional trajectories of experience, both emergent and predisposed

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    The Framework Catalogue of Digital Competences

    Get PDF
    The Framework Catalogue of Digital Competences Justyna Jasiewicz, Mirosław Filiciak, Anna Mierzecka, Kamil Śliwowski, Andrzej Klimczuk, Małgorzata Kisilowska, Alek Tarkowski & Jacek Zadrożny Centrum Cyfrowe Projekt: Polska (2015

    Averting Robot Eyes

    Get PDF
    Home robots will cause privacy harms. At the same time, they can provide beneficial services—as long as consumers trust them. This Essay evaluates potential technological solutions that could help home robots keep their promises, avert their eyes, and otherwise mitigate privacy harms. Our goals are to inform regulators of robot-related privacy harms and the available technological tools for mitigating them, and to spur technologists to employ existing tools and develop new ones by articulating principles for avoiding privacy harms. We posit that home robots will raise privacy problems of three basic types: (1) data privacy problems; (2) boundary management problems; and (3) social/relational problems. Technological design can ward off, if not fully prevent, a number of these harms. We propose five principles for home robots and privacy design: data minimization, purpose specifications, use limitations, honest anthropomorphism, and dynamic feedback and participation. We review current research into privacy-sensitive robotics, evaluating what technological solutions are feasible and where the harder problems lie. We close by contemplating legal frameworks that might encourage the implementation of such design, while also recognizing the potential costs of regulation at these early stages of the technology

    User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn

    Get PDF
    We propose a concept called TORPEDO to improve phish detection by providing just-in-time and just-in-place trustworthy tooltips. These help people to identify phish links embedded in emails. TORPEDO's tooltips contain the actual URL with the domain highlighted. Link activation is delayed for a short period, giving the person time to inspect the URL before they click on a link. Furthermore, TORPEDO provides an information diagram to explain phish detection. We evaluated TORPEDO's effectiveness, as compared to the worst case “status bar” as provided by other Web email interfaces. People using TORPEDO performed significantly better in detecting phishes and identifying legitimate emails (85.17% versus 43.31% correct answers for phish). We then carried out a field study with a number of TORPEDO users to explore actual user experiences of TORPEDO. We conclude the paper by reporting on the outcome of this field study and suggest improvements based on the feedback from the field study participants
    corecore