4,683 research outputs found

    After the Gold Rush: The Boom of the Internet of Things, and the Busts of Data-Security and Privacy

    Get PDF
    This Article addresses the impact that the lack of oversight of the Internet of Things has on digital privacy. While the Internet of Things is but one vehicle for technological innovation, it has created a broad glimpse into domestic life, thus triggering several privacy issues that the law is attempting to keep pace with. What the Internet of Things can reveal is beyond the control of the individual, as it collects information about every practical aspect of an individualā€™s life, and provides essentially unfettered access into the mind of its users. This Article proposes that the federal government and the state governments bend toward consumer protection while creating a cogent and predictable body of law surrounding the Internet of Things. Through privacy-by-design or self-help, it is imperative that the Internet of Thingsā€”and any of its unforeseen progenyā€”develop with an eye toward safeguarding individual privacy while allowing technological development

    A Hermeneutic Phenomenological Study of School Administratorsā€™ Participation in Personal Learning Networks and Privacy Issues

    Get PDF
    Title from PDF of title page, viewed on July 18, 2014Dissertation advisor: Loyce CaruthersVitaIncludes bibliographical references (pages 222-253)Thesis (Ed. D.)--School of Education. University of Missouri--Kansas City, 2014The purpose of this hermeneutic phenomenological study was to understand how school administrators made sense of their experience utilizing social networking tools to participate in personal learning networks (PLN) while managing privacy. As school administrators digitally collaborate with PLN colleagues, they must construct an online identity and develop and cultivate relationships. Additionally, to engage in a PLN one must decide how much information to disclose on the internet as well as determine methods to regulate online privacy. The potential impact of disclosing too much information could cause undue professional or personal harm against an individual. However, failure to disclose information to PLN members could negatively impact relationships and compromise othersā€™ perception of trust. For this study, interpretive phenomenological analysis (IPA) methods were used with six educational administrators. Data were collected through semi-structured interviews; written documents of participantsā€™ experience and perception of PLNs; and analysis of participantsā€™ Tweets over a thirty day span. Interviews were analyzed according to a four-part analytical process. Written documents and Tweets were coded using enumerative and thematic data analysis methods. The findings of the study revealed three emergent themes that explained school administratorsā€™ understanding of PLN participation and privacy issues, which were titled: (1) Must Share and Exchange Resources; Help Others Grow; (2) Power of the People; Personal and Professional Benefits, Powered by PLN; and (3) Privacy Should Not Be the Priority. The findings affirmed school administratorsā€™ understanding of participating in a personal learning network utilizing social networking tools as being solely motivated by the sharing of information and resources, with little to no regard of privacy issues. The results of this study have implications for school leaders as well as digital learning community facilitatorsAbstract -- List of tables -- List of illustrations -- Glossary -- Acknowledgements -- Introduction -- Review of literature -- Methodology -- Findings -- Discussion -- Appendix -- Consent for participation in a research study -- Verbal consent script -- Interview schedule of questions -- Reference

    Computer-based communication in support of scientific and technical work

    Get PDF
    Results are reported of the first experiments for a computer conference management information system at the National Aeronautics and Space Administration. Between August 1975 and March 1976, two NASA projects with geographically separated participants (NASA scientists) used the PLANET computer conferencing system for portions of their work. The first project was a technology assessment of future transportation systems. The second project involved experiments with the Communication Technology Satellite. As part of this project, pre- and postlaunch operations were discussed in a computer conference. These conferences also provided the context for an analysis of the cost of computer conferencing. In particular, six cost components were identified: (1) terminal equipment, (2) communication with a network port, (3) network connection, (4) computer utilization, (5) data storage and (6) administrative overhead

    Facebook, the Media and Democracy

    Get PDF
    Facebook, the Media and Democracy examines Facebook Inc. and the impact that it has had and continues to have on media and democracy around the world. Drawing on interviews with Facebook users of different kinds and dialogue with politicians, regulators, civil society and media commentators, as well as detailed documentary scrutiny of legislative and regulatory proposals and Facebookā€™s corporate statements, the book presents a comprehensive but clear overview of the current debate around Facebook and the global debate on the regulation of social media in the era of ā€˜surveillance capitalism.ā€™ Chapters examine the business and growing institutional power of Facebook as it has unfolded over the fifteen years since its creation, the benefits and meanings that it has provided for its users, its disruptive challenge to the contemporary media environment, its shaping of conversations, and the emerging calls for its further regulation. The book considers Facebookā€™s alleged role in the rise of democratic movements around the world as well as its suggested role in the election of Donald Trump and the UK vote to leave the European Union. This book argues that Facebook, in some shape or form, is likely to be with us into the foreseeable future and that how we address the societal challenges that it provokes, and the economic system that underpins it, will define how human societies demonstrate their capacity to protect and enhance democracy and ensure that no corporation can set itself above democratic institutions. This is an important research volume for academics and researchers in the areas of media studies, communications, social media and political science

    Verifiable Differential Privacy

    Full text link
    Differential Privacy (DP) is often presented as a strong privacy-enhancing technology with broad applicability and advocated as a de-facto standard for releasing aggregate statistics on sensitive data. However, in many embodiments, DP introduces a new attack surface: a malicious entity entrusted with releasing statistics could manipulate the results and use the randomness of DP as a convenient smokescreen to mask its nefariousness. Since revealing the random noise would obviate the purpose of introducing it, the miscreant may have a perfect alibi. To close this loophole, we introduce the idea of \textit{Verifiable Differential Privacy}, which requires the publishing entity to output a zero-knowledge proof that convinces an efficient verifier that the output is both DP and reliable. Such a definition might seem unachievable, as a verifier must validate that DP randomness was generated faithfully without learning anything about the randomness itself. We resolve this paradox by carefully mixing private and public randomness to compute verifiable DP counting queries with theoretical guarantees and show that it is also practical for real-world deployment. We also demonstrate that computational assumptions are necessary by showing a separation between information-theoretic DP and computational DP under our definition of verifiability

    Re-Framing and Exploring Online Suicidal Games as a Specific Form of Cyberbullying

    Get PDF
    This article discusses online suicide games as a part of cyberbullying with the game called ā€œBlue Whale Challengeā€ as an empirical case. The three-fold aim is to (i) identify key social mechanisms related to participation and engagement, (ii) discuss the phenomena in a broader sociological and criminological framework, and (iii) compare social mechanisms in BWC with mechanisms in cyberbullying. The analysis was conducted in two steps, firstly a case study based on a combination of media reports and extracts from different social media posts related to BWC was conducted. Secondly, the result from the case study was re-analyzed in relation to key elements identified in cyberbullying, to conclude if and how BWC can be defined as a form of cyberbullying. The results show that BWC can be defined as a specific form of cyberbullying, but victimization is created differently in BWC compared to victimization in cyberbullying

    Re-framing and exploring online suicidal games as a specific form of cyberbullying

    Get PDF
    This article discusses online suicide games as a part of cyberbullying with the game called "Blue Whale Challenge"as an empirical case. The three-fold aim is to (i) identify key social mechanisms related to participation and engagement, (ii) discuss the phenomena in a broader sociological and criminological framework, and (iii) compare social mechanisms in BWC with mechanisms in cyberbullying. The analysis was conducted in two steps, firstly a case study based on a combination of media reports and extracts from different social media posts related to BWC was conducted. Secondly, the result from the case study was re-analyzed in relation to key elements identified in cyberbullying, to conclude if and how BWC can be defined as a form of cyberbullying. The results show that BWC can be defined as a specific form of cyberbullying, but victimization is created differently in BWC compared to victimization in cyberbullying

    Older peopleā€™s experiences of living with, responding to and managing sensory loss

    Get PDF
    (1) Background: Ageing is associated with a decline in sensory function (sight, hearing, taste, touch and smell), which play an important role in the maintenance of an older personā€™s health, independence and well-being. (2) Methods: This qualitative study obtained data through face-to-face semi-structured interviews with a convenience sample of thirteen community-dwelling adults 65 years and older. Themes were derived inductively, guided by semi-structured interviews. (3) Results: Twelve participants had two or more sensory impairments, mainly concurrent hearing and vision, which became apparent when a situation/individual alerted them to change/s occurring. They were less aware of impaired smell, taste and touch. Sensory changes impacted on important life functions, prompting many participants to take measured risks in maintaining their independence. Half (seven) of the participants lacked motivation to manage sensory function through goal-directed behaviour, taking remedial actions only when this was relevant to lifestyle preferences. (4) Con-clusions: Internal and/or external triggers of sensory changes did not generally motivate remedial action. Health professionals can help to improve older peopleā€™s attention to sensory impairment by routinely discussing sensory function with them, screening for sensory changes and facilitating early intervention and support

    Facebook, the Media and Democracy

    Get PDF
    Facebook, the Media and Democracy examines Facebook Inc. and the impact that it has had and continues to have on media and democracy around the world. Drawing on interviews with Facebook users of different kinds and dialogue with politicians, regulators, civil society and media commentators, as well as detailed documentary scrutiny of legislative and regulatory proposals and Facebookā€™s corporate statements, the book presents a comprehensive but clear overview of the current debate around Facebook and the global debate on the regulation of social media in the era of ā€˜surveillance capitalism.ā€™ Chapters examine the business and growing institutional power of Facebook as it has unfolded over the fifteen years since its creation, the benefits and meanings that it has provided for its users, its disruptive challenge to the contemporary media environment, its shaping of conversations, and the emerging calls for its further regulation. The book considers Facebookā€™s alleged role in the rise of democratic movements around the world as well as its suggested role in the election of Donald Trump and the UK vote to leave the European Union. This book argues that Facebook, in some shape or form, is likely to be with us into the foreseeable future and that how we address the societal challenges that it provokes, and the economic system that underpins it, will define how human societies demonstrate their capacity to protect and enhance democracy and ensure that no corporation can set itself above democratic institutions. This is an important research volume for academics and researchers in the areas of media studies, communications, social media and political science
    • ā€¦
    corecore