32 research outputs found
INDIGO: a generalized model and framework for performance prediction of data dissemination
According to recent studies, an enormous rise in location-based mobile services is expected in future. People are interested in getting and acting on the localized information retrieved from their vicinity like local events, shopping offers, local food, etc. These studies also suggested that local businesses intend to maximize the reach of their localized offers/advertisements by pushing them to the maxi- mum number of interested people. The scope of such localized services can be augmented by leveraging the capabilities of smartphones through the dissemination of such information to other interested people. To enable local businesses (or publishers) of localized services to take in- formed decision and assess the performance of their dissemination-based localized services in advance, we need to predict the performance of data dissemination in complex real-world scenarios. Some of the questions relevant to publishers could be the maximum time required to disseminate information, best relays to maximize information dissemination etc. This thesis addresses these questions and provides a solution called INDIGO that enables the prediction of data dissemination performance based on the availability of physical and social proximity information among people by collectively considering different real-world aspects of data dissemination process. INDIGO empowers publishers to assess the performance of their localized dissemination based services in advance both in physical as well as the online social world. It provides a solution called INDIGO–Physical for the cases where physical proximity plays the fundamental role and enables the tighter prediction of data dissemination time and prediction of best relays under real-world mobility, communication and data dissemination strategy aspects. Further, this thesis also contributes in providing the performance prediction of data dissemination in large-scale online social networks where the social proximity is prominent using INDIGO–OSN part of the INDIGO framework under different real-world dissemination aspects like heterogeneous activity of users, type of information that needs to be disseminated, friendship ties and the content of the published online activities. INDIGO is the first work that provides a set of solutions and enables publishers to predict the performance of their localized dissemination based services based on the availability of physical and social proximity information among people and different real-world aspects of data dissemination process in both physical and online social networks. INDIGO outperforms the existing works for physical proximity by providing 5 times tighter upper bound of data dissemination time under real-world data dissemination aspects. Further, for social proximity, INDIGO is able to predict the data dissemination with 90% accuracy and differently, from other works, it also provides the trade-off between high prediction accuracy and privacy by introducing the feature planes from an online social networks
Measures of Privacy Protection on Social Environments
Tesis por compendio[EN] Nowadays, online social networks (OSNs) have become a mainstream cultural phenomenon for millions of Internet users. Social networks are an ideal environment for
generating all kinds of social benefits for users. Users share experiences, keep in touch
with their family, friends and acquaintances, and earn economic benefits from the
power of their influence (which is translated into new job opportunities). However,
the use of social networks and the action of sharing information imply the loss of the
users’ privacy.
Recently, a great interest in protecting the privacy of users has emerged. This situation
has been due to documented cases of regrets in users’ actions, company scandals produced by misuse of personal information, and the biases introduced by privacy mechanisms. Social network providers have included improvements in their systems to reduce
users’ privacy risks; for example, restricting privacy policies by default, adding new privacy settings, and designing quick and easy shortcuts to configure user privacy settings.
In the privacy researcher area, new advances are proposed to improve privacy mechanisms, most of them focused on automation, fine-grained systems, and the usage of
features extracted from the user’s profile information and interactions to recommend
the best privacy policy for the user. Despite these advances, many studies have shown
that users’ concern for privacy does not match the decisions they ultimately make in
social networks. This misalignment in the users’ behavior might be due to the complexity of the privacy concept itself. This drawback causes users to disregard privacy risks,
or perceive them as temporarily distant. Another cause of users’ behavior misalignment might be due to the complexity of the privacy decision-making process. This is
because users should consider all possible scenarios and the factors involved (e.g., the
number of friends, the relationship type, the context of the information, etc.) to make
an appropriate privacy decision.
The main contributions of this thesis are the development of metrics to assess privacy
risks, and the proposal of explainable privacy mechanisms (using the developed metrics) to assist and raise awareness among users during the privacy decision process.
Based on the definition of the concept of privacy, the dimensions of information scope
and information sensitivity have been considered in this thesis to assess privacy risks.
For explainable privacy mechanisms, soft paternalism techniques and gamification elements that make use of the proposed metrics have been designed. These mechanisms
have been integrated into the social network PESEDIA and evaluated in experiments
with real users. PESEDIA is a social network developed in the framework of the Master’s
thesis of the Ph.D. student [15], this thesis, and the national projects “Privacy in Social Educational Environments during Childhood and Adolescence” (TIN2014-55206-
R) and “Intelligent Agents for Privacy Advice in Social Networks” (TIN2017-89156-R).
The findings confirm the validity of the proposed metrics for computing the users’ scope
and the sensitivity of social network publications. For the scope metric, the results also
showed the possibility of estimating it through local and social centrality metrics for
scenarios with limited information access. For the sensitivity metric, the results also
remarked the users’ misalignment for some information types and the consensus for a
majority of them. The usage of these metrics as part of messages about potential consequences of privacy policy choices and information sharing actions to users showed
positive effects on users’ behavior regarding privacy. Furthermore, the findings of exploring the users’ trade-off between costs and benefits during disclosure actions of personal information showed significant relationships with the usual social circles (family
members, friends, coworkers, and unknown users) and their properties. This allowed
designing better privacy mechanisms that appropriately restrict access to information and reduce regrets. Finally, gamification elements applied to social networks and
users’ privacy showed a positive effect on the users’ behavior towards privacy and safe
practices in social networks.[ES] En la actualidad, las redes sociales se han convertido en un fenómeno cultural dominante para millones de usuarios de Internet. Las redes sociales son un entorno ideal
para la generación de todo tipo de beneficios sociales para los usuarios. Los usuarios
comparten experiencias, mantienen el contacto con sus familiares, amigos y conocidos,
y obtienen beneficios económicos gracias al poder de su influencia (lo que se traduce en
nuevas oportunidades de trabajo). Sin embargo, el uso de las redes sociales y la acción
de compartir información implica la perdida de la privacidad de los usuarios.
Recientemente ha emergido un gran interés en proteger la privacidad de los usuarios. Esta situación se ha debido a los casos de arrepentimientos documentados en las
acciones de los usuarios, escándalos empresariales producidos por usos indebidos de
la información personal, y a los sesgos que introducen los mecanismos de privacidad.
Los proveedores de redes sociales han incluido mejoras en sus sistemas para reducir los
riesgos en privacidad de los usuarios; por ejemplo, restringiendo las políticas de privacidad por defecto, añadiendo nuevos elementos de configuración de la privacidad, y
diseñando accesos fáciles y directos para configurar la privacidad de los usuarios. En el
campo de la investigación de la privacidad, nuevos avances se proponen para mejorar
los mecanismos de privacidad la mayoría centrados en la automatización, selección de
grano fino, y uso de características extraídas de la información y sus interacciones para
recomendar la mejor política de privacidad para el usuario. A pesar de estos avances,
muchos estudios han demostrado que la preocupación de los usuarios por la privacidad no se corresponde con las decisiones que finalmente toman en las redes sociales.
Este desajuste en el comportamiento de los usuarios podría deberse a la complejidad
del propio concepto de privacidad. Este inconveniente hace que los usuarios ignoren
los riesgos de privacidad, o los perciban como temporalmente distantes. Otra causa
del desajuste en el comportamiento de los usuarios podría deberse a la complejidad
del proceso de toma de decisiones sobre la privacidad. Esto se debe a que los usuarios
deben considerar todos los escenarios posibles y los factores involucrados (por ejemplo, el número de amigos, el tipo de relación, el contexto de la información, etc.) para
tomar una decisión apropiada sobre la privacidad.
Las principales contribuciones de esta tesis son el desarrollo de métricas para evaluar los riesgos de privacidad, y la propuesta de mecanismos de privacidad explicables
(haciendo uso de las métricas desarrolladas) para asistir y concienciar a los usuarios
durante el proceso de decisión sobre la privacidad. Atendiendo a la definición del
concepto de la privacidad, las dimensiones del alcance de la información y la sensibilidad de la información se han considerado en esta tesis para evaluar los riesgos de privacidad. En cuanto a los mecanismos de privacidad explicables, se han diseñado utilizando técnicas de paternalismo blando y elementos de gamificación que hacen uso de
las métricas propuestas. Estos mecanismos se han integrado en la red social PESEDIA
y evaluado en experimentos con usuarios reales. PESEDIA es una red social desarrollada en el marco de la tesina de Master del doctorando [15], esta tesis y los proyectos
nacionales “Privacidad en Entornos Sociales Educativos durante la Infancia y la Adolescencia” (TIN2014-55206-R) y “Agentes inteligentes para asesorar en privacidad en
redes sociales” (TIN2017-89156-R).
Los resultados confirman la validez de las métricas propuestas para calcular el alcance
de los usuarios y la sensibilidad de las publicaciones de las redes sociales. En cuanto
a la métrica del alcance, los resultados también mostraron la posibilidad de estimarla
mediante métricas de centralidad local y social para escenarios con acceso limitado a
la información. En cuanto a la métrica de sensibilidad, los resultados también pusieron
de manifiesto la falta de concordancia de los usuarios en el caso de algunos tipos de información y el consenso en el caso de la mayoría de ellos. El uso de estas métricas como
parte de los mensajes sobre las posibles consecuencias de las opciones de política de
privacidad y las acciones de intercambio de información a los usuarios mostró efectos
positivos en el comportamiento de los usuarios con respecto a la privacidad. Además,
los resultados de la exploración de la compensación de los usuarios entre los costos y
los beneficios durante las acciones de divulgación de información personal mostraron
relaciones significativas con los círculos sociales habituales (familiares, amigos, compañeros de trabajo y usuarios desconocidos) y sus propiedades. Esto permitió diseñar
mejores mecanismos de privacidad que restringen adecuadamente el acceso a la información y reducen los arrepentimientos. Por último, los elementos de gamificación
aplicados a las redes sociales y a la privacidad de los usuarios mostraron un efecto positivo en el comportamiento de los usuarios hacia la privacidad y las prácticas seguras
en las redes sociales.[CA] En l’actualitat, les xarxes socials s’han convertit en un fenomen cultural dominant per
a milions d’usuaris d’Internet. Les xarxes socials són un entorn ideal per a la generació
de tota mena de beneficis socials per als usuaris. Els usuaris comparteixen experiències, mantenen el contacte amb els seus familiars, amics i coneguts, i obtenen beneficis
econòmics gràcies al poder de la seva influència (el que es tradueix en noves oportunitats de treball). No obstant això, l’ús de les xarxes socials i l’acció de compartir
informació implica la perduda de la privacitat dels usuaris.
Recentment ha emergit un gran interès per protegir la privacitat dels usuaris. Aquesta
situació s’ha degut als casos de penediments documentats en les accions dels usuaris,
escàndols empresarials produïts per usos indeguts de la informació personal, i als caires
que introdueixen els mecanismes de privacitat. Els proveïdors de xarxes socials han inclòs millores en els seus sistemes per a reduir els riscos en privacitat dels usuaris; per exemple, restringint les polítiques de privacitat per defecte, afegint nous elements de configuració de la privacitat, i dissenyant accessos fàcils i directes per a configurar la privacitat dels usuaris. En el camp de la recerca de la privacitat, nous avanços es proposen
per a millorar els mecanismes de privacitat la majoria centrats en l’automatització,
selecció de gra fi, i ús de característiques extretes de la informació i les seues interaccions per a recomanar la millor política de privacitat per a l’usuari. Malgrat aquests
avanços, molts estudis han demostrat que la preocupació dels usuaris per la privacitat
no es correspon amb les decisions que finalment prenen en les xarxes socials. Aquesta
desalineació en el comportament dels usuaris podria deure’s a la complexitat del propi
concepte de privacitat. Aquest inconvenient fa que els usuaris ignorin els riscos de privacitat, o els percebin com temporalment distants. Una altra causa de la desalineació
en el comportament dels usuaris podria deure’s a la complexitat del procés de presa de
decisions sobre la privacitat. Això es deu al fet que els usuaris han de considerar tots
els escenaris possibles i els factors involucrats (per exemple, el nombre d’amics, el tipus
de relació, el context de la informació, etc.) per a prendre una decisió apropiada sobre
la privacitat.
Les principals contribucions d’aquesta tesi són el desenvolupament de mètriques per a
avaluar els riscos de privacitat, i la proposta de mecanismes de privacitat explicables
(fent ús de les mètriques desenvolupades) per a assistir i conscienciar als usuaris durant
el procés de decisió sobre la privacitat. Atesa la definició del concepte de la privacitat,
les dimensions de l’abast de la informació i la sensibilitat de la informació s’han considerat en aquesta tesi per a avaluar els riscos de privacitat. Respecte als mecanismes
de privacitat explicables, aquests s’han dissenyat utilitzant tècniques de paternalisme bla i elements de gamificació que fan ús de les mètriques propostes. Aquests mecanismes s’han integrat en la xarxa social PESEDIA i avaluat en experiments amb usuaris
reals. PESEDIA és una xarxa social desenvolupada en el marc de la tesina de Màster del
doctorant [15], aquesta tesi i els projectes nacionals “Privacitat en Entorns Socials Educatius durant la Infància i l’Adolescència” (TIN2014-55206-R) i “Agents Intel·ligents
per a assessorar en Privacitat en xarxes socials” (TIN2017-89156-R).
Els resultats confirmen la validesa de les mètriques propostes per a calcular l’abast de
les accions dels usuaris i la sensibilitat de les publicacions de les xarxes socials. Respecte a la mètrica de l’abast, els resultats també van mostrar la possibilitat d’estimarla mitjançant mètriques de centralitat local i social per a escenaris amb accés limitat
a la informació. Respecte a la mètrica de sensibilitat, els resultats també van posar
de manifest la falta de concordança dels usuaris en el cas d’alguns tipus d’informació
i el consens en el cas de la majoria d’ells. L’ús d’aquestes mètriques com a part dels
missatges sobre les possibles conseqüències de les opcions de política de privacitat i les
accions d’intercanvi d’informació als usuaris va mostrar efectes positius en el comportament dels usuaris respecte a la privacitat. A més, els resultats de l’exploració de la
compensació dels usuaris entre els costos i els beneficis durant les accions de divulgació
d’informació personal van mostrar relacions significatives amb els cercles socials habituals (familiars, amics, companys de treball i usuaris desconeguts) i les seves propietats. Això ha permés dissenyar millors mecanismes de privacitat que restringeixen
adequadament l’accés a la informació i redueixen els penediments. Finalment, els elements de gamificació aplicats a les xarxes socials i a la privacitat dels usuaris van
mostrar un efecte positiu en el comportament dels usuaris cap a la privacitat i les pràctiques segures en les xarxes socials.Alemany Bordera, J. (2020). Measures of Privacy Protection on Social Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/151456TESISCompendi
Communication virale dans la publicité au sein des espaces numériques : Approche critique et expérimentale du phénomène
Our thesis examines the notion of viral communication in digital social spaces both in general and when applied to online video advertisement. Our research revealed a lack of clarity and coherence in its definition and meaning (Beauvisage et al., 2011) that necessited an effort of standardization before planning to pursue our work. Furthermore, our literature review pointed out the complexity of the viral phenomenon and its comprehension. This complexity is due to the number and different factors originating the viral phenomenon (Beauvisage et al., 2011).In order to highlight one of those factors, we make the first hypothesis that the variations in the quality of the definition (high or standard) of a video have an effect over the evaluation of the video (H1). Corollary, we think that the quality of the definition affects this video sharings (H2). More precisely, we think that a video will be more shared if it is watched in high definition rather than in standard definition. In order to meet those hypotheses, we opted for an experimental approach.Notre thèse interroge la notion de communication virale dans les espaces socionumériques de manière générale et plus particulièrement lorsque ce phénomène s’applique aux vidéos publicitaires en ligne. Nos recherches ont révélé un manque évident de clarté et de cohérence au niveau de sa définition et de son acception (Beauvisage et al., 2011) qu’il a fallu corriger par un travail d’harmonisation avant d’envisager la suite de nos travaux. De plus, notre revue de littérature a mis en avant la complexité du phénomène viral et de son appréhension ; complexité nourrie par le nombre et la nature des facteurs à son origine (Beauvisage et al., 2011). Afin de mettre en avant un de ces facteurs, nous émettons pour première hypothèse que les variations de qualité de la définition (haute ou standard) d’une vidéo influencent l’appréciation de la vidéo (H1). Par corollaire, nous pensons que le partage de cette vidéo est affecté par la qualité de la définition (H2). Plus précisément, nous pensons qu’une même vidéo sera plus partagée si elle est visionnée en haute définition plutôt qu’en définition standard. Pour répondre à ces hypothèses nous avons opté pour une approche expérimentale
Recommended from our members
Humility, trauma, and solidarity : the rhetoric of sensitivity
Humility, Trauma, and Solidarity: The Rhetoric of Sensitivity enters a conversation in rhetorical studies about the agency, effectivity, and conditions of possibility for the rhetorical subject. This project is an exploration in several registers of the preoriginary affectability that Diane Davis has called "rhetoricity." Rhetoricity exposes existents to affection from outside in a structure of addressivity that is fundamentally rhetorical. Prior to individuation as a subject, rhetoricity implies that beings are differentiated first through response to an address or call. This extra-symbolic affection brings one into being as the subject of a rhetorical relation. This project aims to inscribe the valences of rhetoricity: its traumatic force, and even violence, but also its generation of the possibility for becoming otherwise. These valences are charted through chapters on reading and addiction, sensitivity, and identification in hypertext video games.
In "Addiction, Humility, and Rhetoricity," I explore the uncontrollable relationality of addiction through a reading of David Foster Wallace's novel Infinite Jest. I argue that an addictive habit, even reading habits, indicate the radical affectability of the subject. Rhetorical exposedness is a route of access to one's interiority that cannot be totally blocked off. The next chapter examines the public controversy over the use of trigger warnings in college classes. "Sensitive Students" argues that students' experiences of trauma mark an exposition to affection that makes teaching possible. In the final chapter, "Twisted Together: Twine Games and Solidarity," I argue that a set of hypertext video games made by transgender women are contesting the dominant values of gamer culture. By confronting players with an alterity internal to identification, these games erode the centrality of identification to rhetoric and forward solidarity as a shared relation to difference instead.
This project traces the ways that gender marks and even constitutes the rhetorical structure of address. Sensitivity, receptivity, and exposedness are sites of gendering marks that persist and reverberate into the very formation of the rhetorical subject. This project opens a way for rhetoricians to frame exposedness as a rhetorical moment of ethicity: as being outside oneself, being beside oneself, and being for others.Englis
Recollecting Turbulence: Catastrophe and Sacrifice in the History of My Life by Henry Darger
This study of The History of My Life the 5,086 page autobiographical text by the outsider artist/author Henry Darger, uses non-linear modes of analysis, such as chaos and complexity theory, to explore the meaning of Darger\u27s epic narrative. Beginning with the idea that turbulence, seemingly chaotic, actually comes about as a compensatory restructuring of inadequate or unstable system dynamics, this study goes on to show that, as both influence and effect, turbulence is found at every level of Darger\u27s life and art, both in theme and structure. My Life is a prime example: an extended narrative describing a cataclysmic tornado, in which the text itself manifests turbulent properties of the storm it describes. Darger\u27s particular narrative madness is, in fact, an attempt to put turbulence into service as an alternative system of meaning, in contrast to failed social and religious systems of which he was the product. Henry Darger\u27s work provides us with the challenge of exploring new ways of finding meaning in narrative. This study uses traditional literary criticism coupled with a pattern analysis of redundancy to explore some of Darger\u27s primary themes
High-Performance Modelling and Simulation for Big Data Applications
This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications
High-Performance Modelling and Simulation for Big Data Applications
This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications