23,307 research outputs found

    Teens, Social Media, and Privacy

    Get PDF
    Teens share a wide range of information about themselves on social media sites; indeed the sites themselves are designed to encourage the sharing of information and the expansion of networks. However, few teens embrace a fully public approach to social media. Instead, they take an array of steps to restrict and prune their profiles, and their patterns of reputation management on social media vary greatly according to their gender and network size

    The Current Status of Social Risks on Educational Systems. An Analysis Through Social Media

    Get PDF
    Este trabajo ha sido publicado en las actas del citado congreso, y revisados los documentos donde ha sido publicado, no se muestran impedimentos legales para que pueda ser publicado el documento.Social Risk in education such as bullying, are usually invisible to teachers and parents, at all educational levels. However, these risks remain a reality everywhere in the world, turning into a problem that is rapidly globalizing due to the widespread access to the Internet. The Internet has permeated our entire society and is now present in almost every activity. The education and most aspects associated with it, such as Social Risks, are not exempt of this new form of communication within our society. This has led to a significant increase in damage Social Risks can exhort on the victims, due to several causes such as their capacity for dissemination, repetition and virality; greater anonymity of aggressors and the chance for more people joining them; continuity over time even when after school hours; display of intimacy before an endless crowd of people; ease of permanent control through geolocation, control of online statuses and connections; and even the risk of easily impersonating a victim. The first step to prevent these issues is to carry out a study on the current state of Social Risks. An updated snapshot would allow to draw up action plans based on reliable data and develop countermeasures to minimize the damage caused by current Social Risks to minors. The objective of this work is to conduct a study on unsolicited data obtained from Social Media on three of the most prominent Social Risks of our society, namely Bullying, Addictions and Xenophobia within the field of education, with the aim of obtaining an updated snapshot of their current status. The study was carried out during the second semester of 2017 and the first semester of 2018, quantifying the presence and emotion of said risks in Social Media, determining the most relevant terms, as well as the most used communication channels

    Trust, opportunism and governance

    Get PDF
    The paper considers a (static) portfolio system that satisfies adding-up contraints and the gross substitution theorem. The paper shows the relationship of the two conditions to the weak dominant diagonal property of the matrix of interest rate elasticities. This enables to investigate the impact of simultaneous changes in interest rates on the asset demands.

    The celebrity entrepreneur on television: profile, politics and power

    Get PDF
    This article examines the rise of the ‘celebrity entrepreneur’ on television through the emergence of the ‘business entertainment format’ and considers the ways in which regular television exposure can be converted into political influence. Within television studies there has been a preoccupation in recent years with how lifestyle and reality formats work to transform ‘ordinary’ people into celebrities. As a result, the contribution of vocationally skilled business professionals to factual entertainment programming has gone almost unnoticed. This article draws on interviews with key media industry professionals and begins by looking at the construction of entrepreneurs as different types of television personalities and how discourses of work, skill and knowledge function in business shows. It then outlines how entrepreneurs can utilize their newly acquired televisual skills to cultivate a wider media profile and secure various forms of political access and influence. Integral to this is the centrality of public relations and media management agencies in shaping media discourses and developing the individual as a ‘brand identity’ that can be used to endorse a range of products or ideas. This has led to policy makers and politicians attempting to mobilize the media profile of celebrity entrepreneurs to reach out and connect with the public on business and enterprise-related issues

    Pretty Private Group Management

    Full text link
    Group management is a fundamental building block of today's Internet applications. Mailing lists, chat systems, collaborative document edition but also online social networks such as Facebook and Twitter use group management systems. In many cases, group security is required in the sense that access to data is restricted to group members only. Some applications also require privacy by keeping group members anonymous and unlinkable. Group management systems routinely rely on a central authority that manages and controls the infrastructure and data of the system. Personal user data related to groups then becomes de facto accessible to the central authority. In this paper, we propose a completely distributed approach for group management based on distributed hash tables. As there is no enrollment to a central authority, the created groups can be leveraged by various applications. Following this paradigm we describe a protocol for such a system. We consider security and privacy issues inherently introduced by removing the central authority and provide a formal validation of security properties of the system using AVISPA. We demonstrate the feasibility of this protocol by implementing a prototype running on top of Vuze's DHT

    Supporting Online Social Networks

    No full text

    Teens, social media, and privacy

    Get PDF
    This report finds that teens are sharing more information about themselves on social media sites than they have in the past, but they are also taking a variety of technical and non-technical steps to manage the privacy of that information. Despite taking these privacy-protective actions, teen social media users do not express a high level of concern about third-parties (such as businesses or advertisers) accessing their data; just 9% say they are “very” concerned. Key findings include: Teens are sharing more information about themselves on their social media profiles than they did when we last surveyed in 2006: 91% post a photo of themselves, up from 79% in 2006. 71% post their school name, up from 49%. 71% post the city or town where they live, up from 61%. 53% post their email address, up from 29%. 20% post their cell phone number, up from 2%. 60% of teen Facebook users set their Facebook profiles to private (friends only), and most report high levels of confidence in their ability to manage their settings. 56% of teen Facebook users say it’s “not difficult at all” to manage the privacy controls on their Facebook profile. 33% Facebook-using teens say it’s “not too difficult.” 8% of teen Facebook users say that managing their privacy controls is “somewhat difficult,” while less than 1% describe the process as “very difficult.” Authored by Mary Madden, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan, and Aaron Smith

    Creating personas for political and social consciousness in HCI design

    Get PDF
    Personas have become an important tool for Human-Computer Interaction professionals. However, they are not immune to limitations and critique, including stereotyping. We suggest that while some of the criticisms to personas are important, the use of personas is open to them in part because of an unquestioned focus on explicating user needs and goals in traditional persona research and creation. This focus, while helping designers, obscures some other potentially relevant aspects. In particular, when the goal of the product or software being designed is associated with social and political goals rather than with bringing a product to the market, it may be relevant to focus personas on political aspirations, social values and the will or capacity of personas to take action. We argue that it is possible when producing personas (and associated scenarios) to partially move away from representing needs and embrace personas which more explicitly represent political or social beliefs and values. We also suggest that a phenomenographic approach to user data analysis is one way to achieve this. We provide empirical evidence for our position from two large-scale European projects, the first one in the area of Social Innovation and the second in the area of eParticipation
    corecore