8 research outputs found

    Untangling the Web: A Guide To Internet Research

    Get PDF
    [Excerpt] Untangling the Web for 2007 is the twelfth edition of a book that started as a small handout. After more than a decade of researching, reading about, using, and trying to understand the Internet, I have come to accept that it is indeed a Sisyphean task. Sometimes I feel that all I can do is to push the rock up to the top of that virtual hill, then stand back and watch as it rolls down again. The Internet—in all its glory of information and misinformation—is for all practical purposes limitless, which of course means we can never know it all, see it all, understand it all, or even imagine all it is and will be. The more we know about the Internet, the more acute is our awareness of what we do not know. The Internet emphasizes the depth of our ignorance because our knowledge can only be finite, while our ignorance must necessarily be infinite. My hope is that Untangling the Web will add to our knowledge of the Internet and the world while recognizing that the rock will always roll back down the hill at the end of the day

    Detecting, Modeling, and Predicting User Temporal Intention

    Get PDF
    The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, elections, war, disasters, and others as shown in this work. The user sharing the resource has an implicit temporal intent: either the state of the resource at the time of sharing, or the current state of the resource at the time of the reader \clicking . In this research, we propose a model to detect and predict the user\u27s temporal intention of the author upon sharing content in the social network and of the reader upon resolving this content. To build this model, we first examine the three aspects of the problem: the resource, time, and the user. For the resource we start by analyzing the content on the live web and its persistence. We noticed that a portion of the resources shared in social media disappear, and with further analysis we unraveled a relationship between this disappearance and time. We lose around 11% of the resources after one year of sharing and a steady 7% every following year. With this, we turn to the public archives and our analysis reveals that not all posted resources are archived and even they were an average 8% per year disappears from the archives and in some cases the archived content is heavily damaged. These observations prove that in regards to archives resources are not well-enough populated to consistently and reliably reconstruct the missing resource as it existed at the time of sharing. To analyze the concept of time we devised several experiments to estimate the creation date of the shared resources. We developed Carbon Date, a tool which successfully estimated the correct creation dates for 76% of the test sets. Since the resources\u27 creation we wanted to measure if and how they change with time. We conducted a longitudinal study on a data set of very recently-published tweet-resource pairs and recording observations hourly. We found that after just one hour, ~4% of the resources have changed by ≄30% while after a day the change rate slowed to be ~12% of the resources changed by ≄40%. In regards to the third and final component of the problem we conducted user behavioral analysis experiments and built a data set of 1,124 instances manually assigned by test subjects. Temporal intention proved to be a difficult concept for average users to understand. We developed our Temporal Intention Relevancy Model (TIRM) to transform the highly subjective temporal intention problem into the more easily understood idea of relevancy between a tweet and the resource it links to, and change of the resource through time. On our collected data set TIRM produced a significant 90.27% success rate. Furthermore, we extended TIRM and used it to build a time-based model to predict temporal intention change or steadiness at the time of posting with 77% accuracy. We built a service API around this model to provide predictions and a few prototypes. Future tools could implement TIRM to assist users in pushing copies of shared resources into public web archives to ensure the integrity of the historical record. Additional tools could be used to assist the mining of the existing social media corpus by derefrencing the intended version of the shared resource based on the intention strength and the time between the tweeting and mining

    Tematski zbornik radova međunarodnog značaja. Tom 3 / Međunarodni naučni skup “Dani Arčibalda Rajsa”, Beograd, 3-4. mart 2015.

    Get PDF
    In front of you is the Thematic Collection of Papers presented at the International Scientific Confer-ence “Archibald Reiss Days”, which was organized by the Academy of Criminalistic and Police Studies in Belgrade, in co-operation with the Ministry of Interior and the Ministry of Education, Science and Techno-logical Development of the Republic of Serbia, National Police University of China, Lviv State University of Internal Affairs, Volgograd Academy of the Russian Internal Affairs Ministry, Faculty of Security in Skopje, Faculty of Criminal Justice and Security in Ljubljana, Police Academy “Alexandru Ioan Cuza“ in Bucharest, Academy of Police Force in Bratislava and Police College in Banjaluka, and held at the Academy of Crimi-nalistic and Police Studies, on 3 and 4 March 2015.International Scientific Conference “Archibald Reiss Days” is organized for the fifth time in a row, in memory of the founder and director of the first modern higher police school in Serbia, Rodolphe Archibald Reiss, PhD, after whom the Conference was named.The Thematic Collection of Papers contains 168 papers written by eminent scholars in the field of law, security, criminalistics, police studies, forensics, informatics, as well as members of national security system participating in education of the police, army and other security services from Spain, Russia, Ukraine, Bela-rus, China, Poland, Armenia, Portugal, Turkey, Austria, Slovakia, Hungary, Slovenia, Macedonia, Croatia, Montenegro, Bosnia and Herzegovina, Republic of Srpska and Serbia. Each paper has been reviewed by two reviewers, international experts competent for the field to which the paper is related, and the Thematic Conference Proceedings in whole has been reviewed by five competent international reviewers.The papers published in the Thematic Collection of Papers contain the overview of contemporary trends in the development of police education system, development of the police and contemporary secu-rity, criminalistic and forensic concepts. Furthermore, they provide us with the analysis of the rule of law activities in crime suppression, situation and trends in the above-mentioned fields, as well as suggestions on how to systematically deal with these issues. The Collection of Papers represents a significant contribution to the existing fund of scientific and expert knowledge in the field of criminalistic, security, penal and legal theory and practice. Publication of this Collection contributes to improving of mutual cooperation between educational, scientific and expert institutions at national, regional and international level

    Internet marketing communications : a content analysis of the web sites of graded South African Lodges

    Get PDF
    Marketing communications is regarded as a common function of all Web sites, even if this is not the express objective of the site. As no previous research specifically considered these issues, this study examined the extent to which lodges graded by the Tourism Grading Council of South Africa effectively use their Web sites as online marketing communications tools. A content analysis was used to investigate the Web sites of graded lodges according to a list of evaluation criteria based on the elements of the marketing communications mix (i.e., advertising, sales promotion, public relations, direct marketing and personal selling). A number of specific online marketing communications techniques that could be employed in a tourism firm’s Web site were identified from an extensive literature review for each element of the marketing communications mix. The extent to which these specific techniques were employed in the Web sites of the graded lodges was then determined. The findings show that the graded lodges are not using their Web sites effectively as online marketing communications tools for communications with their target audiences. Comparisons were also made between the three, four and five star lodges to determine whether differences were present in their Web sites based on their star grading. Overall, the lodges did not differ much in terms of the online marketing communications techniques that they employed and only slight differences existed. The main recommendation for this study is that the managers of South African graded lodges include as many of the 30 online marketing communications techniques investigated as possible in their Web sites. This study was limited as it only focused on lodges that have been graded by the Tourism Grading Council of South Africa and the findings cannot be generalised to all South African lodges or to other types of accommodation establishments. Potential reasons for the inclusion/exclusion of these techniques, whether the lodges maintain their Web sites themselves, what specific techniques Web site visitors regard as important and the fact that the researcher was the only coder of the sites were also limitations of this study that could be overcome in future research. CopyrightDissertation (MCom)--University of Pretoria, 2007.Marketing ManagementMComUnrestricte

    Jornadas Nacionales de InvestigaciĂłn en Ciberseguridad: actas de las VIII Jornadas Nacionales de InvestigaciĂłn en ciberseguridad: Vigo, 21 a 23 de junio de 2023

    Get PDF
    Jornadas Nacionales de InvestigaciĂłn en Ciberseguridad (8ÂȘ. 2023. Vigo)atlanTTicAMTEGA: Axencia para a modernizaciĂłn tecnolĂłxica de GaliciaINCIBE: Instituto Nacional de Cibersegurida

    Proceedings of the European Conference on Agricultural Engineering AgEng2021

    Get PDF
    This proceedings book results from the AgEng2021 Agricultural Engineering Conference under auspices of the European Society of Agricultural Engineers, held in an online format based on the University of Évora, Portugal, from 4 to 8 July 2021. This book contains the full papers of a selection of abstracts that were the base for the oral presentations and posters presented at the conference. Presentations were distributed in eleven thematic areas: Artificial Intelligence, data processing and management; Automation, robotics and sensor technology; Circular Economy; Education and Rural development; Energy and bioenergy; Integrated and sustainable Farming systems; New application technologies and mechanisation; Post-harvest technologies; Smart farming / Precision agriculture; Soil, land and water engineering; Sustainable production in Farm buildings

    Striking a balance between the secrecy of online communication and online criminal investigation in South Africa

    Get PDF
    In the Republic of South Africa (‘RSA’), there are exponentially increasing and indeterminable consequential risks and breaches involved in the spontaneous and indispensable personal, official and general anatomic uses of the quicksilver, complex and delicate conscriptive, interoperable, non-compartmentalised and non-passworded compartmentalised online communication devices, technologies, networks, applications, and services. These risks and breaches result in a disequilibrium in the following antithetical legal vector argument. On the one hand, these risks and breaches are attributed to the non-recognition, and inadequate protection of the independent and unique right in online communication, the concept of which originates from the jurisprudence of the broad gamut of the right to privacy. On the other hand, these risks are exacerbated by the increasing, unrestrictive and perpetual techno-legal abuse of online communication by law enforcement agencies or officers (‘LEAs’ or ‘LEOs’) of the alternative conduct of the covert online criminal investigation (‘OCI’) of serious offences, arising from the dearth of and non-compliance with the regulation for the conduct of an OCI. This dual study clinically examines the irreconcilable conflict between the protection of the right in online communication and the public criminal mandate of the State to conduct an OCI of serious offences. Firstly, this study investigates the existence of the levels of risks involved in the conscriptive, interoperable, non-compartmentalised and non-passworded compartmentalised continua of privacy interests in online communication, requiring a corresponding protective and secure regime in the conduct of an OCI. Secondly, it probes into the various substantive and procedural thresholds required in the limitation of the right in online communication when conducting an OCI. Lastly, it examines the mechanisms for institutional and structural independence, competence, due process, separation of powers and checks and balances in the conduct and oversight of the conduct of an OCI in the RSA. Consequently, the examination of the above issues reveals the absence, inadequacy of, and non-compliance with the substantive and procedural constitutional, legislative and policy framework that caters for the protection of the right in online communication and the conduct of an OCI in the RSA. Accordingly and specifically, this study proposes that the RSA adopts an adequate constitutional and single legislative framework to address the contemporary societal techno-legal tapestry in the conflict between the right in online communication and the conduct of an OCI of serious offences in the RSA as follows. Firstly, it is imperative to unequivocally, in the legal framework in the RSA, including the Constitution, consider the existence of higher levels of risks and the simultaneous or consequential recognition of the higher levels of protection of the invaluability in online communication —including the emerging quantum computing— in contrast with non-online communications. This contrast hierarchically compels the unimpeachable protection of the independent right to the secrecy of online communication (‘SOC’), which is inadequately and incongruously protected as mere online privacy in section 14 of the Constitution of the RSA. Secondly, it is equally crucial to consider the application of or compliance with adequate substantive and procedural scientific threshold requirements to conduct an OCI of serious offences in the RSA. These requirements include the application of: online conscription; section 205 of the Criminal Procedure Act; ‘no server, but law’ principle as opposed to the U.S. ‘no server, no law’ principle; robotic and non-robotic OCI; ex-parte and non-ex-parte verbal and written quadripartite techno-legal individual and mass online criminal investigation of privileged and non-privileged online communications by ghost and non-ghost applicants; pre and post OCI data management procedure and admissibility of void and voidable evidence. Furthermore, it is of great importance to apply the all-embracing proportionality principle in section 36 of the Constitution in which this study, from a contrarian belief, classifies serious offences into six categories under four criteria and propounds some definite and functional Popoola mathematical and non-mathematical formulae in the standard of proof required to conduct an OCI, the procedure of which should be incorporated in a legislation. Thirdly and finally, it is of utmost significance to, in the legal framework in the RSA, including the Constitution, consider the application of or compliance with safeguard mechanisms in the conduct of an OCI. These mechanisms are to ensure the inviolability of the principles or requirements of structural and institutional independence, competence, due process, separation of powers and checks and balances in the conduct and oversight of the conduct of an OCI of serious offences by LEAs or LEOs and other stakeholders respectively.Public, Constitutional, and International LawLL. D
    corecore