123,163 research outputs found
Evolutionary Subject Tagging in the Humanities; Supporting Discovery and Examination in Digital Cultural Landscapes
In this paper, the authors attempt to identify problematic issues for subject tagging in the humanities, particularly those associated with information objects in digital formats. In the third major section, the authors identify a number of assumptions that lie behind the current practice of subject classification that we think should be challenged. We move then to propose features of classification systems that could increase their effectiveness. These emerged as recurrent themes in many of the conversations with scholars, consultants, and colleagues. Finally, we suggest next steps that we believe will help scholars and librarians develop better subject classification systems to support research in the humanities.NEH Office of Digital Humanities: Digital Humanities Start-Up Grant (HD-51166-10
A Pedagogy for Original Synners
Part of the Volume on Digital Young, Innovation, and the UnexpectedThis essay begins by speculating about the learning environment of the class of 2020. It takes place entirely in a virtual world, populated by simulated avatars, managed through the pedagogy of gaming. Based on this projected version of a future-now-in-formation, the authors consider the implications of the current paradigm shift that is happening at the edges of institutions of higher education. From the development of programs in multimedia literacy to the focus on the creation of hybrid learning spaces (that combine the use of virtual worlds, social networking applications, and classroom activities), the scene of learning as well as the subjects of education are changing. The figure of the Original Synner is a projection of the student-of-the-future whose foundational literacy is grounded in their ability to synthesize information from multiple information streams
Searching for superspreaders of information in real-world social media
A number of predictors have been suggested to detect the most influential
spreaders of information in online social media across various domains such as
Twitter or Facebook. In particular, degree, PageRank, k-core and other
centralities have been adopted to rank the spreading capability of users in
information dissemination media. So far, validation of the proposed predictors
has been done by simulating the spreading dynamics rather than following real
information flow in social networks. Consequently, only model-dependent
contradictory results have been achieved so far for the best predictor. Here,
we address this issue directly. We search for influential spreaders by
following the real spreading dynamics in a wide range of networks. We find that
the widely-used degree and PageRank fail in ranking users' influence. We find
that the best spreaders are consistently located in the k-core across
dissimilar social platforms such as Twitter, Facebook, Livejournal and
scientific publishing in the American Physical Society. Furthermore, when the
complete global network structure is unavailable, we find that the sum of the
nearest neighbors' degree is a reliable local proxy for user's influence. Our
analysis provides practical instructions for optimal design of strategies for
"viral" information dissemination in relevant applications.Comment: 12 pages, 7 figure
Social Media and the Public Sector
{Excerpt} Social media is revolutionizing the way we live, learn, work, and play. Elements of the private sector have begun to thrive on opportunities to forge, build, and deepen relationships. Some are transforming their organizational structures and opening their corporate ecosystems in consequence. The public sector is a relative newcomer. It too can drive stakeholder involvement and satisfaction.
Global conversations, especially among Generation Y, were born circa 2004. Beginning 1995 until then, the internet had hosted static, one-way websites. These were places to visit passively, retrieve information from, and perhaps post comments about by electronic mail.
Sixteen years later, Web 2.0 enables many-to-many connections in numerous domains of interest and practice, powered by the increasing use of blogs, image and video sharing, mashups, podcasts, ratings, Really Simple Syndication, social bookmarking, tweets, widgets, and wikis, among others. Today, people expect the internet to be user-centric
The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking
In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward
Digital Media and Youth: Unparalleled Opportunity and Unprecedented Responsibility
Part of the Volume on Digital Media, Youth, and Credibility This chapter argues that understanding credibility is particularly complex -- and consequential -- in the digital media environment, especially for youth audiences, who have both advantages and disadvantages due to their relationship with contemporary technologies and their life experience. The chapter explains what is, and what is not, new about credibility in the context of digital media, and discusses the major thrusts of current credibility concerns for scholars, educators, and youth
Web Tracking: Mechanisms, Implications, and Defenses
This articles surveys the existing literature on the methods currently used
by web services to track the user online as well as their purposes,
implications, and possible user's defenses. A significant majority of reviewed
articles and web resources are from years 2012-2014. Privacy seems to be the
Achilles' heel of today's web. Web services make continuous efforts to obtain
as much information as they can about the things we search, the sites we visit,
the people with who we contact, and the products we buy. Tracking is usually
performed for commercial purposes. We present 5 main groups of methods used for
user tracking, which are based on sessions, client storage, client cache,
fingerprinting, or yet other approaches. A special focus is placed on
mechanisms that use web caches, operational caches, and fingerprinting, as they
are usually very rich in terms of using various creative methodologies. We also
show how the users can be identified on the web and associated with their real
names, e-mail addresses, phone numbers, or even street addresses. We show why
tracking is being used and its possible implications for the users (price
discrimination, assessing financial credibility, determining insurance
coverage, government surveillance, and identity theft). For each of the
tracking methods, we present possible defenses. Apart from describing the
methods and tools used for keeping the personal data away from being tracked,
we also present several tools that were used for research purposes - their main
goal is to discover how and by which entity the users are being tracked on
their desktop computers or smartphones, provide this information to the users,
and visualize it in an accessible and easy to follow way. Finally, we present
the currently proposed future approaches to track the user and show that they
can potentially pose significant threats to the users' privacy.Comment: 29 pages, 212 reference
- …