1,949 research outputs found

    Prospect of Threads in Contrast to Twitter as an Online Social Network Tool for Conflict Resolution

    Get PDF
    A new online social network service – Threads – was recently created and launched by Mark Zuckerberg to compete with Twitter. The rate at which people throughout the world accepted and created accounts on this new social network within hours of its creation and launching was prodigious. Conflicts have been inevitable in the world. As one of the Sustainable Development Goals of the United Nations (SDGs) (Goal 16) has to do with peaceful coexistence by the year 2030, this paper aims at comparing the features of Twitter that can be used for conflict resolution to the emerging features of Threads. The paper gives the origin and acceptance of Threads. The discussion in the paper is based on the review of some selected literature, Public Sphere as a Theory of social media, an empirical review of a previous study, and comparisons of some features of Twitter with those of Threads. The paper concluded by giving a recommendation that while Twitter as a social network should not be jettisoned especially in resolving conflicts, the new social network – Threads – should be studied more to discover how it can be used better to resolve conflicts and promote peaceful coexistence in society thereby achieving Goal 16 of the SDGs by the year 2030

    Protecting Children Online?

    Get PDF
    This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author’s research evaluates the policies companies develop to protect themselves and users. This includes interviews with NGO and social media company reps in the US and the EU. She triangulates these findings against news, policy reports, evaluations and interviews with e-safety experts. This book raises questions about the legitimacy of expecting companies to balance the tension between free speech and child protection without publicly revealing their decision-making processes. In an environment where e-safety is part of the corporate business model, this book unveils the process through which established social media companies receive less government scrutiny than start-ups. The importance of this research for law and policy argues for an OA edition to ensure the work is widely and globally accessible to scholars and decision makers

    Supporting lay users in privacy decisions when sharing sensitive data

    Get PDF
    The first part of the thesis focuses on assisting users in choosing their privacy settings, by using machine learning to derive the optimal set of privacy settings for the user. In contrast to other work, our approach uses context factors as well as individual factors to provide a personalized set of privacy settings. The second part consists of a set of intelligent user interfaces to assist the users throughout the complete privacy journey, from defining friend groups that allow targeted information sharing; through user interfaces for selecting information recipients, to find possible errors or unusual settings, and to refine them; up to mechanisms to gather in-situ feedback on privacy incidents, and investigating how to use these to improve a user’s privacy in the future. Our studies have shown that including tailoring the privacy settings significantly increases the correctness of the predicted privacy settings; whereas the user interfaces have been shown to significantly decrease the amount of unwanted disclosures.Insbesondere nach den jĂŒngsten Datenschutzskandalen in sozialen Netzwerken wird der Datenschutz fĂŒr Benutzer immer wichtiger. Obwohl die meisten Benutzer behaupten Wert auf Datenschutz zu legen, verhalten sie sich online allerdings völlig anders: Sie lassen die meisten Datenschutzeinstellungen der online genutzten Dienste, wie z. B. von sozialen Netzwerken oder Diensten zur Standortfreigabe, unberĂŒhrt und passen sie nicht an ihre Datenschutzanforderungen an. In dieser Arbeit werde ich einen Ansatz zur Lösung dieses Problems vorstellen, der auf zwei verschiedenen SĂ€ulen basiert. Der erste Teil konzentriert sich darauf, Benutzer bei der Auswahl ihrer Datenschutzeinstellungen zu unterstĂŒtzen, indem maschinelles Lernen verwendet wird, um die optimalen Datenschutzeinstellungen fĂŒr den Benutzer abzuleiten. Im Gegensatz zu anderen Arbeiten verwendet unser Ansatz Kontextfaktoren sowie individuelle Faktoren, um personalisierte Datenschutzeinstellungen zu generieren. Der zweite Teil besteht aus einer Reihe intelligenter BenutzeroberflĂ€chen, die die Benutzer in verschiedene Datenschutzszenarien unterstĂŒtzen. Dies beginnt bei einer OberflĂ€che zur Definition von Freundesgruppen, die im Anschluss genutzt werden können um einen gezielten Informationsaustausch zu ermöglichen, bspw. in sozialen Netzwerken; ĂŒber BenutzeroberflĂ€chen um die EmpfĂ€nger von privaten Daten auszuwĂ€hlen oder mögliche Fehler oder ungewöhnliche Datenschutzeinstellungen zu finden und zu verfeinern; bis hin zu Mechanismen, um In-Situ- Feedback zu Datenschutzverletzungen zum Zeitpunkt ihrer Entstehung zu sammeln und zu untersuchen, wie diese verwendet werden können, um die PrivatsphĂ€reeinstellungen eines Benutzers anzupassen. Unsere Studien haben gezeigt, dass die Verwendung von individuellen Faktoren die Korrektheit der vorhergesagten Datenschutzeinstellungen erheblich erhöht. Es hat sich gezeigt, dass die BenutzeroberflĂ€chen die Anzahl der Fehler, insbesondere versehentliches Teilen von Daten, erheblich verringern

    The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

    Get PDF
    During a decade of global counterterrorism operations and two extended counterinsurgency campaigns, the United States was confronted with a new kind of adversary. Without uniforms, flags, and formations, the task of identifying and targeting these combatants represented an unprecedented operational challenge for which Cold War era doctrinal methods were largely unsuited. This monograph examines the doctrinal, technical, and bureaucratic innovations that evolved in response to these new operational challenges. It discusses the transition from a conventionally focused, Cold War-era targeting process to one optimized for combating networks and conducting identity-based targeting. It analyzes the policy decisions and strategic choices that were the catalysts of this change and concludes with an in depth examination of emerging technologies that are likely to shape how this mode of warfare will be waged in the future.https://press.armywarcollege.edu/monographs/1436/thumbnail.jp

    An exploration of smartphone microblogging supporting the device, learner and social aspects of mobile learning within post primary Religious Education

    Get PDF
    Within Religious Education in the Irish post primary sector, there is little evidence of smartphone use for supporting mobile learning. This research aims to address this shortcoming by exploring our experience of smartphone microblogging supporting mobile learning. A participatory action research (PAR) methodology was employed. Research participants involved one teacher-researcher and a hundred and five first year post primary students of Religious Education from an Educational Training Board (ETB) school. A mixed method design was employed using both quantitative and qualitative data from pre and post online surveys, pre and post-research questionnaires, focus groups, online posts from Edmodo and the teacher-researcher’s own reflective journal. The research question was ‘What were our experiences of smartphone microblogging supporting mobile learning on ‘Images of God?’ ‘Images of God’ is a module from the Junior Certificate Religious Education syllabus. Mobile learning was defined as consisting of three aspects: the device, learner and social aspect as theorised in Koole’s (2009) Framework for the Rational Analysis of Mobile Education (FRAME) model. First, the device aspect of mobile learning examined Edmodo’s technical challenges and conveniences as well as measuring research participants’ perceptions through the Technology Acceptance Model (TAM) research instrument (Davis 1989). Second, the learner aspect of mobile learning explored students’ use of Edmodo for supporting cognitive learning, collaborative learning and deeper learning within post primary Religious Education. Third, the social aspect of mobile learning investigated Edmodo as a virtual learning community and a safe space for the students to disclose and discuss their personal images of God that included agnostic and atheist worldviews. The social aspect also provided an insight into suitable pedagogy stemming from relevant mobile learning theories for supporting smartphone microblogging. This research concluded with recommendations for practising smartphone microblogging for supporting mobile learning within post primary Religious Education
    • 

    corecore