28 research outputs found

    Privacidade em comunicações de dados para ambientes contextualizados

    Get PDF
    Doutoramento em InformáticaInternet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed through data mining techniques and put to use by enabling personalized and tailored services as well as business intelligence practices, fueling the digital economy. However, the ever-expanding information gathering and use undermines the privacy conceptions of the past. Natural social practices of managing privacy in daily relations are overridden by socially-awkward communication tools, service providers struggle with security issues resulting in harmful data leaks, governments use mass surveillance techniques, the incentives of the digital economy threaten consumer privacy, and the advancement of consumergrade data-gathering technology enables new inter-personal abuses. A wide range of fields attempts to address technology-related privacy problems, however they vary immensely in terms of assumptions, scope and approach. Privacy of future use cases is typically handled vertically, instead of building upon previous work that can be re-contextualized, while current privacy problems are typically addressed per type in a more focused way. Because significant effort was required to make sense of the relations and structure of privacy-related work, this thesis attempts to transmit a structured view of it. It is multi-disciplinary - from cryptography to economics, including distributed systems and information theory - and addresses privacy issues of different natures. As existing work is framed and discussed, the contributions to the state-of-theart done in the scope of this thesis are presented. The contributions add to five distinct areas: 1) identity in distributed systems; 2) future context-aware services; 3) event-based context management; 4) low-latency information flow control; 5) high-dimensional dataset anonymity. Finally, having laid out such landscape of the privacy-preserving work, the current and future privacy challenges are discussed, considering not only technical but also socio-economic perspectives.Quem usa a Internet vê publicidade direccionada com base nos seus hábitos de navegação, e provavelmente partilha voluntariamente informação pessoal em redes sociais. A informação disponível nos novos telemóveis é amplamente acedida e utilizada por aplicações móveis, por vezes sem razões claras para isso. Tal como acontece hoje com os telemóveis, no futuro muitos tipos de dispositivos elecónicos incluirão sensores que permitirão captar dados do ambiente, possibilitando o surgimento de ambientes inteligentes. O valor dos dados captados, se não for óbvio, pode ser derivado através de técnicas de análise de dados e usado para fornecer serviços personalizados e definir estratégias de negócio, fomentando a economia digital. No entanto estas práticas de recolha de informação criam novas questões de privacidade. As práticas naturais de relações inter-pessoais são dificultadas por novos meios de comunicação que não as contemplam, os problemas de segurança de informação sucedem-se, os estados vigiam os seus cidadãos, a economia digital leva á monitorização dos consumidores, e as capacidades de captação e gravação dos novos dispositivos eletrónicos podem ser usadas abusivamente pelos próprios utilizadores contra outras pessoas. Um grande número de áreas científicas focam problemas de privacidade relacionados com tecnologia, no entanto fazem-no de maneiras diferentes e assumindo pontos de partida distintos. A privacidade de novos cenários é tipicamente tratada verticalmente, em vez de re-contextualizar trabalho existente, enquanto os problemas actuais são tratados de uma forma mais focada. Devido a este fraccionamento no trabalho existente, um exercício muito relevante foi a sua estruturação no âmbito desta tese. O trabalho identificado é multi-disciplinar - da criptografia à economia, incluindo sistemas distribuídos e teoria da informação - e trata de problemas de privacidade de naturezas diferentes. À medida que o trabalho existente é apresentado, as contribuições feitas por esta tese são discutidas. Estas enquadram-se em cinco áreas distintas: 1) identidade em sistemas distribuídos; 2) serviços contextualizados; 3) gestão orientada a eventos de informação de contexto; 4) controlo de fluxo de informação com latência baixa; 5) bases de dados de recomendação anónimas. Tendo descrito o trabalho existente em privacidade, os desafios actuais e futuros da privacidade são discutidos considerando também perspectivas socio-económicas

    Perceptions of Educators on Motivational Strategies Influencing Middle School Students in Mathematics Courses

    Get PDF
    This qualitative study examined educators\u27 perceptions of motivational strategies influencing and motivating middle school students to comprehend and perform in mathematics courses. This study used interview data from 15 participants with 2 to 30 years of teaching experience. Educators may utilize this information in multiple settings within the classroom to influence and motivate students in mathematics courses. Data collection strategies included one-on-one semi-structured middle school educator interviews. Analysis of data occurred in three phases: (a) categorization of data under the five organizational factors, (b) building the explanation in narrative form, and (c) re-examination of the data. The analysis of the phenomenological study data was based on the theoretical framework of the achievement goal theories - the differences in how people judge their perceptions of competence (Nicholls, 1984) and TARGET structures (Task, Authority, Rewards, Grouping, Evaluation, and Time) (Epstein, 1989). The credibility of the analysis was protected by triangulation of data through multiple sources of evidence, establishment of a chain of evidence, and member checking. The results revealed that current and innovative motivational strategies influenced students in middle school mathematics. The results revealed how educators motivate middle school students through traditional and non-traditional strategies. Five themes emerged from the interview data analysis that contribute to the motivation of middle school students: (1) internal motivation, (2) external motivation, (3) building thinking classrooms, (4) student choice, and (5) building relationships

    Clean U: Cleanliness, Social Difference and the Dirty Work of Everyday Hygiene

    Get PDF
    Being clean takes work. That work – waged, unwaged, or somewhere in-between -- is generally overlooked, despite the importance of cleanliness to modern industrial social life. To better understand the power of cleanliness to the production of individual subjects and institutional power, this project compares the everyday cleanliness practices and hygiene norms of students at the University of Chapel Hill to the administrative organization of the 400+ housekeepers currently employed to maintain UNC's campus. Students experience a campus tuned to their body's every need. But, the intensifyng demands of the cleanliness Zeitgeist mediate the newfound freedoms that are characteristic of college life. By way of contrast, UNC's housekeepers are structurally and culturally excluded from the campus communities their labor produces, despite the fact that their work is an animating necessity of the most intimate components of everyday student life and practice. This research explores the production and unevenly distributed cost of this overlapping system of hygienic exclusions, particularly its connection to contested categories of social identity.  I combine ethnographic data from one-on-one interviews with students, housekeepers, campus staff, labor activists, and community service providers with a close reading of the policies and organizational metrics governing housekeeping work practice. Tracing the connections between students, housekeepers and organizational administration reveals the dependence of institutional systems on the uneven distribution of value through the production of raced, classed, and gendered social difference. This research explores the necessary dependence of students and housekeepers, revealing institutional investment in the production students' bodies at the expense of those who make that production possible.Doctor of Philosoph

    Proceedings of the 22nd Conference on Formal Methods in Computer-Aided Design – FMCAD 2022

    Get PDF
    The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing

    Proxies: the cultural work of standing in

    Get PDF
    How those with the power to design technology, in the very moment of design, are allowed to imagine who is included—and who is excluded—in the future. The open access edition of this book was made possible by generous funding from Arcadia – a charitable fund of Lisbet Rausing and Peter Baldwin. Our world is built on an array of standards we are compelled to share. In Proxies, Dylan Mulvin examines how we arrive at those standards, asking, “To whom and to what do we delegate the power to stand in for the world?” Mulvin shows how those with the power to design technology, in the very moment of design, are allowed to imagine who is included—and who is excluded—in the future. For designers of technology, some bits of the world end up standing in for other bits, standards with which they build and calibrate. These “proxies” carry specific values, even as they disappear from view. Mulvin explores the ways technologies, standards, and infrastructures inescapably reflect the cultural milieus of their bureaucratic homes. Drawing on archival research, he investigates some of the basic building-blocks of our shared infrastructures. He tells the history of technology through the labor and communal practices of, among others, the people who clean kilograms to make the metric system run, the women who pose as test images, and the actors who embody disease and disability for medical students. Each case maps the ways standards and infrastructure rely on prototypical ideas of whiteness, able-bodiedness, and purity to control and contain the messiness of reality. Standards and infrastructures, Mulvin argues, shape and distort the possibilities of representation, the meaning of difference, and the levers of change and social justice

    The Design and Use of a Smartphone Data Collection Tool and Accompanying Configuration Language

    Get PDF
    Understanding human behaviour is key to understanding the spread of epidemics, habit dispersion, and the efficacy of health interventions. Investigation into the patterns of and drivers for human behaviour has often been facilitated by paper tools such as surveys, journals, and diaries. These tools have drawbacks in that they can be forgotten, go unfilled, and depend on often unreliable human memories. Researcher-driven data collection mechanisms, such as interviews and direct observation, alleviate some of these problems while introducing others, such as bias and observer effects. In response to this, technological means such as special-purpose data collection hardware, wireless sensor networks, and apps for smart devices have been built to collect behavioural data. These technologies further reduce the problems experienced by more traditional behavioural research tools, but often experience problems of reliability, generality, extensibility, and ease of configuration. This document details the construction of a smartphone-based app designed to collect data on human behaviour such that the difficulties of traditional tools are alleviated while still addressing the problems faced by modern supplemental technology. I describe the app's main data collection engine and its construction, architecture, reliability, generality, and extensibility, as well as the programming language developed to configure it and its feature set. To demonstrate the utility of the tool and its configuration language, I describe how they have been used to collect data in the field. Specifically, eleven case studies are presented in which the tool's architecture, flexibility, generality, extensibility, modularity, and ease of configuration have been exploited to facilitate a variety of behavioural monitoring endeavours. I further explain how the engine performs data collection, the major abstractions it employs, how its design and the development techniques used ensure ongoing reliability, and how the engine and its configuration language could be extended in the future to facilitate a greater range of experiments that require behavioural data to be collected. Finally, features and modules of the engine's encompassing system, iEpi, are presented that have not otherwise been documented to give the reader an understanding of where the work fits into the larger data collection and processing endeavour that spawned it
    corecore