5 research outputs found

    Trust-aware Privacy Control for Social Media

    Get PDF
    Due to the huge exposure of personal information in social media, a challenge now is to design effective privacy mechanisms that protect against unauthorized access to social data. In this paper, a trust model for social media is first presented. Based on the trust model, a trust-aware privacy control protocol is proposed, that exploits the underlying inter-entity trust information. The objective is to design a fine-grained privacy scheme that ensures a user’s online information is disclosed only to sufficiently trustworthy parties

    Community-driven & Work-integrated Creation, Use and Evolution of Ontological Knowledge Structures

    Get PDF

    Closing Information Gaps with Need-driven Knowledge Sharing

    Get PDF
    Informationslücken schließen durch bedarfsgetriebenen Wissensaustausch Systeme zum asynchronen Wissensaustausch – wie Intranets, Wikis oder Dateiserver – leiden häufig unter mangelnden Nutzerbeiträgen. Ein Hauptgrund dafür ist, dass Informationsanbieter von Informationsuchenden entkoppelt, und deshalb nur wenig über deren Informationsbedarf gewahr sind. Zentrale Fragen des Wissensmanagements sind daher, welches Wissen besonders wertvoll ist und mit welchen Mitteln Wissensträger dazu motiviert werden können, es zu teilen. Diese Arbeit entwirft dazu den Ansatz des bedarfsgetriebenen Wissensaustauschs (NKS), der aus drei Elementen besteht. Zunächst werden dabei Indikatoren für den Informationsbedarf erhoben – insbesondere Suchanfragen – über deren Aggregation eine fortlaufende Prognose des organisationalen Informationsbedarfs (OIN) abgeleitet wird. Durch den Abgleich mit vorhandenen Informationen in persönlichen und geteilten Informationsräumen werden daraus organisationale Informationslücken (OIG) ermittelt, die auf fehlende Informationen hindeuten. Diese Lücken werden mit Hilfe so genannter Mediationsdienste und Mediationsräume transparent gemacht. Diese helfen Aufmerksamkeit für organisationale Informationsbedürfnisse zu schaffen und den Wissensaustausch zu steuern. Die konkrete Umsetzung von NKS wird durch drei unterschiedliche Anwendungen illustriert, die allesamt auf bewährten Wissensmanagementsystemen aufbauen. Bei der Inversen Suche handelt es sich um ein Werkzeug das Wissensträgern vorschlägt Dokumente aus ihrem persönlichen Informationsraum zu teilen, um damit organisationale Informationslücken zu schließen. Woogle erweitert herkömmliche Wiki-Systeme um Steuerungsinstrumente zur Erkennung und Priorisierung fehlender Informationen, so dass die Weiterentwicklung der Wiki-Inhalte nachfrageorientiert gestaltet werden kann. Auf ähnliche Weise steuert Semantic Need, eine Erweiterung für Semantic MediaWiki, die Erfassung von strukturierten, semantischen Daten basierend auf Informationsbedarf der in Form strukturierter Anfragen vorliegt. Die Umsetzung und Evaluation der drei Werkzeuge zeigt, dass bedarfsgetriebener Wissensaustausch technisch realisierbar ist und eine wichtige Ergänzung für das Wissensmanagement sein kann. Darüber hinaus bietet das Konzept der Mediationsdienste und Mediationsräume einen Rahmen für die Analyse und Gestaltung von Werkzeugen gemäß der NKS-Prinzipien. Schließlich liefert der hier vorstellte Ansatz auch Impulse für die Weiterentwicklung von Internetdiensten und -Infrastrukturen wie der Wikipedia oder dem Semantic Web

    Personal Learning with Social Media:Reputation, Privacy and Identity Perspectives

    Get PDF
    Social media platforms are increasingly used in recent years to support learning activities, especially for the construction of activity- and learner-centric personal learning environments (PLEs). This thesis investigates the solutions to four essential design requirements for social media based PLEs: support for help seeking, privacy protection, identity management and activity monitoring, as well as context awareness. Three main components of the thesis, reputation, privacy, and identity, are built upon these four design requirements. We investigate the three components through the following research questions. How do we help learners to find suitable experts or peers who they can learn from or collaborate with in a particular learning context? How can we design a proper privacy mechanism to make sure the information shared by learners is only disclosed to the intended audience in a given context? What identity scheme should be used to preserve the privacy of learners while also providing personalized learning experience, especially for teenage learners? To tackle the design requirement of support for help seeking, we address the reputation dimension in the context of personal learning for doctoral studies, where doctoral students need to find influential experts or peers in a particular domain. We propose an approach to detect a domain-specific community in academic social media platforms. Based on that, we investigate the influence of scholars taking both their academic and social impact into account. We propose a measure called R-Index that aggregates the readership of a scholar's publications to assess her academic impact. Furthermore, we add the social dimension into the influence measure by adopting network centrality metrics in a domain-specific community. Our results show that academic influence and social influence measures do not strongly correlate with each other, which implies that, adding the social dimension could enhance the traditional impact metrics that only take academic influence into account. Moreover, we tackle the privacy dimension of designing a PLE in the context of higher education. To protect against unauthorized access to learners' data, we propose a privacy control approach that allows learners to specify the audience, action, and artifact for their sharing behavior. Then we introduce the notion of privacy protocol with which learners can define fine-grained sharing rules. To provide a usable application of the privacy protocol in social media based PLEs, we exploit the space concept that provides an easy way for users to define the privacy protocols within a particular context. The proposed approach is evaluated through two user studies. The results reveal that learners confirm the usefulness and usability of the privacy enhanced sharing scheme based on spaces. In the last part of the thesis, we study the identity dimension in the context of STEM education at secondary and high schools. To support personalization while also preserving learners' privacy, we propose a classroom-like pseudonymity scheme that allows tracking of learners' activities while keeping their real identities undisclosed. In addition, we present a data storage mechanism called Vault that allows apps to store and exchange data within the scope of a Web-based inquiry learning space

    Contextual Authority Tagging: Expertise Location via Social Labeling

    Get PDF
    This study investigates the possibility of a group of people making explicit their tacit knowledge about one another's areas of expertise. Through a design consisting of a modified Delphi Study, group members are asked to label both their own and each others' areas of expertise over the course of five rounds. Statistical analysis and qualitative evaluation of 10 participating organizations suggest they were successful and that, with simple keywords, group members can convey the salient areas of expertise of their colleagues to a degree that is deemed similar'' and of high quality by both third parties and those being evaluated. More work needs to be done to make this information directly actionable, but the foundational aspects have been identified. In a world with a democratization of voices from all around and increasing demands on our time and attention, this study suggests that simple, aggregated third-party expertise evaluations can augment our ongoing struggle for quality information source selection. These evaluations can serve as loose credentials when more expensive or heavyweight reputation cues may not be viable
    corecore