39 research outputs found
A Social Ecological Approach Towards Empowering Foster Youth to be Safer Online
Teens in foster care are some of the most vulnerable youth to encounter serious offline risks, such as sex trafficking. Research shows that children who are vulnerable offline are more likely to be vulnerable online. Therefore, it is important to understand how the internet plays a role in how foster youth are exposed to these risks, so that we may develop effective interventions that empower foster youth against becoming victims of these online risks. A comprehensive review of the literature (Chapter 2) emphasized the unique sets of characteristics and challenges of foster youth that create substantial nuance and require a deeper understanding beyond that of the general population. As such, my dissertation takes on a social ecological approach to adolescent online safety for foster youth by including the following three studies: 1) an interview study with 32 caseworkers that investigates how case managers work with foster families to address concerns of online safety (Chapter 3), 2) an interview study with 29 foster parents that examines how they mediate foster teens\u27 (ages 13-17) technology use at home and the types of risks the teens encounter online (Chapter 4), and 3) co-design sessions with 20 youth and semi-structured interviews with 13 parents to develop best practices for conducting research related to adolescent online risk behaviors, specifically those sexual in nature (Chapter 5). Our findings confirmed that online safety is a great challenge within foster families, particularly as it relates to sexual risks (e.g., unsafe sexual interactions with strangers). Further, case managers and foster parents do not receive the necessary training or guidance to handle situations related to online safety which prevents them from providing the appropriate resources to foster youth. Finally, our research highlighted the importance of focusing ethical practices beyond risk mitigation to protecting youth (e.g., providing help resources, like national crisis hotlines, during our studies could help teens navigate online risks independently)
Exploring Digital Government transformation in the EU
This report presents the findings of the analysis of the state of the art conducted as part of the JRC research on “Exploring Digital Government Transformation in the EU: understanding public sector innovation in a data-driven society” (DIGIGOV), within the framework of the “European Location Interoperability Solutions for eGovernment (ELISE)" Action of the ISA2 Programme on Interoperability solutions for public administrations, businesses and citizens, coordinated by DIGIT. The results of the review of literature, based on almost 500 academic and grey literature sources, as well as the analysis of digital government policies in the EU Member States provide a synthetic overview of the main themes and topics of the digital government discourse. The report depicts the variety of existing conceptualisations and definitions of the digital government phenomenon, measured and expected effects of the application of more disruptive innovations and emerging technologies in government, as well as key drivers and barriers for transforming the public sector. Overall, the literature review shows that many sources appear overly optimistic with regard to the impact of digital government transformation, although the majority of them are based on normative views or expectations, rather than empirically tested insights. The authors therefore caution that digital government transformation should be researched empirically and with a due differentiation between evidence and hope. In this respect, the report paves the way to in-depth analysis of the effects that can be generated by digital innovation in public sector organisations. A digital transformation that implies the redesign of the tools and methods used in the machinery of government will require in fact a significant change in the institutional frameworks that regulate and help coordinate the governance systems in which such changing processes are implemented.JRC.B.6-Digital Econom
Sentiment Analysis and Opinion Mining within Social Networks using Konstanz Information Miner
Evaluations, opinions, and sentiments have become very obvious due to rapid emerging interest in ecommerce which is also a significant source of expression of opinions and analysis of sentiment. In this study, a general introduction on sentiment analysis, steps of sentiment analysis, sentiments analysis applications, sentiment analysis research challenges, techniques used for sentiment analysis, etc., were discussed in detail. With these details given, it is hoped that researchers will engage in opinion mining and sentiment analysis research to attain more successes correlated to these issues. The research is based on data input from web services and social networks, including an application that performs such actions. The main aspects of this study are to statistically test and evaluate the major social network websites: In this case Twitter, because it is has rich data source and easy within social networks tools. In this study, firstly a good understanding of sentiment analysis and opinion mining research based on recent trends in the field is provided. Secondly, various aspects of sentiment analysis are explained. Thirdly, various steps of sentiment analysis are introduced. Fourthly, various sentiment analysis, research challenges are discussed. Finally, various techniques used for sentiment analysis are explained and Konstanz Information Miner (KNIME) that can be used as sentiment analysis tool is introduced. For future work, recent machine learning techniques including big data platforms may be proposed for efficient solutions for opinion mining and sentiment analysi
Developing and applying a constitutional framework for public participation in South Africa
Online public participation platforms have resuscitated the debate globally about whether the Internet can be used to improve the reach of public participation and the quality of comments received during these processes or not. This thesis highlights that this debate is a ruse. Our focus should not be on the mode of participation adopted to engage with interested and affected parties but rather on the manner in which that mode (whether online platforms or more traditional methods) is implemented. Currently in South Africa there is not a standard set of guidelines to assist persons undertaking these modes of participation to ensure that they are adequate or acceptable. This thesis seeks to create such a framework. As all actions in South Africa must comply with the Constitution, it is the starting point for developing this baseline. The Constitution drafters introduced participatory democracy into the South African legal framework. In doing so, they intended that certain principles associated with this notion filter into the legal system. This thesis identifies these principles, drawn from the works of democratic theorists, Constitutional-era South African case law, legislation, practice and administrative process, and proposes a participatory framework ('the Constitutional Framework for Public Participation' or 'CFPP') which, if followed, will ensure that policymaking and administrative participatory processes comply with the Constitutional conception of participatory democracy. In addition, as online participation is most likely to become a prominent tool in engaging interested and affected parties, this thesis considers whether there are any principles relating specifically to online participation which should be included in the CFPP. Following an assessment of online public participation processes, additional principles have been identified but these principles apply equally to offline modes of participation as to online participation. Having incorporated these additional principles into the CFPP, they are applied to the public participation process required in terms of Environmental Impact Assessment ('EIA') to assess whether these processes are being conducted in a Constitutional manner. The findings reveal that the regulations governing the EIA public participation processes fall short of the CFPP. Although the regulations are inadequate, examples of actual EIA public participation processes are examined to determine whether, notwithstanding the inadequate regulations, the implemented public participation process meet the requirements of the CFPP. This also yields a negative outcome, highlighting that public participation processes are not being conducted in a manner required by the Constitution. This thesis suggests that the CFPP can be consulted to assist lawyers, administrators, legislatures, persons responsible for public participation processes, government and others in designing and implementing constitutionally acceptable public participation processes. It is acknowledged that the CFPP will need to be the subject of empirical investigation by subsequent researchers to assess its effectiveness in achieving this objective
E-Governance: Strategy for Mitigating Non-Inclusion of Citizens in Policy Making in Nigeria
The Nigerian federation that currently has 36 states structure adopted the Weberian Public Administrative system
before now as an ideal way of running government, which was characterized with the traditional way of doing things without
recourse to the deployment of Information Communication Technology (ICT). Today e-governance is seen as a paradigm
shift from the previous way of governance. Research has shown that, the adoption and implementation of e-governance is
more likely to bring about effective service delivery, mitigate corruption and ultimately enhance citizens’ participation in
governmental affairs. However, it has been argued that infrastructure such as regular electricity power and access to the
Internet, in addition to a society with high rate of literacy level are required to effectively implement and realize the
potentials of e-governance for improved delivery of services. Due to the difficulties currently experienced, developing nations
need to adequately prepare for the implementation of e-governance on the platform of Information Communication
Technology (ICT). Hence, this study seeks to examine whether the adoption and implementation of e-governance in the
context of Nigeria would mitigate the hitherto non-inclusion of citizens in the formulation and implementation of
government policies aimed at enhanced development. To achieve the objective of the study, data were sourced and analyzed
majorly by examining government websites of 20 states in the Nigerian federation to ascertain if there are venues for citizens
to interact with government in the area of policy making and feedback on government actions, as a way of promoting
participatory governance. The study revealed that the adoption and implementation of e-governance in the country is yet to
fully take place. This is due to lack of infrastructure, low level of literacy rate and government inability to provide the
necessary infrastructure for e-governance to materialize. The paper therefore, recommends among others the need for the
Federal Government to involve a sound and clear policy on how to go about the adoption and implementation of egovernance
through deliberate effort at increasing budgetary allocation towards infrastructural development and mass
education of citizens
The Impact of e-Democracy in Political Stability of Nigeria
The history of the Nigerian electoral process has been hitherto characterized by violence stemming from disputes
in election outcomes. For instance, violence erupted across some states in Northern Nigeria when results indicated that a
candidate who was popular in that part of the country was losing the election leading to avoidable loss of lives. Beside, this
dispute in election outcome lingers for a long time in litigation at the electoral tribunals which distracts effective governance.
However, the increasing penetrating use of ICTs in Nigeria is evident in the electoral processes with consequent shift in the
behavior of actors in the democratic processes, thus changing the ways Nigerians react to election outcomes. This paper
examines the trend in the use ICT in the Nigerian political system and its impact on the stability of the polity. It assesses the
role of ICT in recent electoral processes and compares its impact on the outcome of the process in lieu of previous
experiences in the Nigeria. Furthermore, the paper also examines the challenges and risks of implementing e-Democracy in
Nigeria and its relationship to the economy in the light of the socio-economic situation of the country. The paper adopted
qualitative approach in data gathering and analysis. From the findings, the paper observed that e-democracy is largely
dependent on the level of ICT adoption, which is still at its lowest ebb in the country. It recognizes the challenges in the
provision of ICT infrastructure and argues that appropriate low-cost infrastructure applicable to the Nigerian condition can
be made available to implement e-democracy and thus arouse the interest of the populace in governance, increase the
number of voters, and enhance transparency, probity and accountability, and participation in governance as well as help
stabilize the nascent democrac
Priority Setting, Cost-Effectiveness, and the Affordable Care Act
The Affordable Care Act (ACA) may be the most important health law statute in American history, yet much of the most prominent legal scholarship examining it has focused on the merits of the court challenges it has faced rather than delving into the details of its priority-setting provisions. In addition to providing an overview of the ACA’s provisions concerning priority setting and their developing interpretations, this Article attempts to defend three substantive propositions. First, I argue that the ACA is neither uniformly hostile nor uniformly friendly to efforts to set priorities in ways that promote cost and quality. Second, I argue that the ACA does not take a single, unified approach to priority setting; rather, its guidance varies depending on the aspect of the health care system at issue (Patient Centered Outcomes Research Institute, Medicare, essential health benefits) and the factors being excluded from priority setting (age, disability, life expectancy). Third, I argue that cost-effectiveness can be achieved within the ACA's constraints, but that doing so will require adopting new approaches to cost-effectiveness and priority setting. By limiting the use of standard cost-effectiveness analysis, the ACA makes the need for workable rivals to cost-effectiveness analysis a pressing practical concern rather than a mere theoretical worry
Automated Classification of Argument Stance in Student Essays: A Linguistically Motivated Approach with an Application for Supporting Argument Summarization
This study describes a set of document- and sentence-level classification models designed to automate the task of determining the argument stance (for or against) of a student argumentative essay and the task of identifying any arguments in the essay that provide reasons in support of that stance. A suggested application utilizing these models is presented which involves the automated extraction of a single-sentence summary of an argumentative essay. This summary sentence indicates the overall argument stance of the essay from which the sentence was extracted and provides a representative argument in support of that stance.
A novel set of document-level stance classification features motivated by linguistic research involving stancetaking language is described. Several document-level classification models incorporating these features are trained and tested on a corpus of student essays annotated for stance. These models achieve accuracies significantly above those of two baseline models. High-accuracy features used by these models include a dependency subtree feature incorporating information about the targets of any stancetaking language in the essay text and a feature capturing the semantic relationship between the essay prompt text and stancetaking language in the essay text.
We also describe the construction of a corpus of essay sentences annotated for supporting argument stance. The resulting corpus is used to train and test two sentence-level classification models. The first model is designed to classify a given sentence as a supporting argument or as not a supporting argument, while the second model is designed to classify a supporting argument as holding a for or against stance. Features motivated by influential linguistic analyses of the lexical, discourse, and rhetorical features of supporting arguments are used to build these two models, both of which achieve accuracies above their respective baseline models.
An application illustrating an interesting use-case for the models presented in this dissertation is described. This application incorporates all three classification models to extract a single sentence summarizing both the overall stance of a given text along with a convincing reason in support of that stance
Comparative data protection and security : a critical evaluation of legal standards
This study1 addresses the key information technology issues of the age and
its unintended consequences. The issues include social control by
businesses, governments, and information age Star Chambers. The study
focuses on a comparative analysis of data protection, data security, and
information privacy (DPSIP) laws, regulations, and practices in five countries.
The countries include Australia, Canada, South Africa, the United Kingdom,
and the United States. The study addresses relevant international legal
standards and justifications. This multidisciplinary analysis includes a
systems thinking approach from a legal, business, governmental, policy,
political theory, psychosocial, and psychological perspective. The study
implements a comparative law and sociolegal research strategy. Historic,
linguistic, and statistical strategies are applied. The study concludes with a
next step proposal, based on the research, for the international community,
the five countries in the study, and specifically, South Africa as it has yet to
enact a sound DPSIP approach.LL. D