6 research outputs found

    Web Social Media Privacy Preferences and Perception

    Get PDF
    The proliferation of social media websites has led to concerns over privacy breaches, as these sites have access to users' sensitive and personal data. This study sought to investigate users' perceptions and concerns for social media websites, with the aim of developing a system that meets their requirements. To achieve this, a questionnaire was designed for privacy permissions on eight popular social media websites, and 425 completed answers were analyzed. The results revealed that users' concerns were diverse and differed across different social media platforms. Gender, age, education level, and IT proficiency were found to be weakly correlated with privacy concerns. Women expressed greater concerns than men, particularly for Twitter and Snapchat, while older users expressed greater levels of concern for Snapchat and Instagram. As education levels increased, users tended to express greater levels of concern, especially on WhatsApp and Snapchat. Furthermore, this study identified four hierarchical clusters of users based on their preferences and concerns regarding permission privacy for social media websites. The results revealed that the majority of participants (214 users) were highly concerned about privacy on social media, indicating that they were aware of the potential risks associated with sharing personal information online which represents the third cluster. The first and fourth clusters were the most unconcerned groups regarding permission privacy, consisting of a small number of users. The second cluster, comprising 124 participants, had an average score of 1.6, indicating that they were the second most concerned about privacy. Overall, the findings of this study could be useful for social media platforms in developing privacy policies and settings that align with users' concerns and preferences

    [How] Can Pluralist Approaches to Computational Cognitive Modeling of Human Needs and Values Save our Democracies?

    Get PDF
    In our increasingly digital societies, many companies have business models that perceive users’ (or customers’) personal data as a siloed resource, owned and controlled by the data controller rather than the data subjects. Collecting and processing such a massive amount of personal data could have many negative technical, social and economic consequences, including invading people’s privacy and autonomy. As a result, regulations such as the European General Data Protection Regulation (GDPR) have tried to take steps towards a better implementation of the right to digital privacy. This paper proposes that such legal acts should be accompanied by the development of complementary technical solutions such as Cognitive Personal Assistant Systems to support people to effectively manage their personal data processing on the Internet. Considering the importance and sensitivity of personal data processing, such assistant systems should not only consider their owner’s needs and values, but also be transparent, accountable and controllable. Pluralist approaches in computational cognitive modelling of human needs and values which are not bound to traditional paradigmatic borders such as cognitivism, connectionism, or enactivism, we argue, can create a balance between practicality and usefulness, on the one hand, and transparency, accountability, and controllability, on the other, while supporting and empowering humans in the digital world. Considering the threat to digital privacy as significant to contemporary democracies, the future implementation of such pluralist models could contribute to power-balance, fairness and inclusion in our societies

    Is Metaverse in education a blessing or a curse: a combined content and bibliometric analysis

    Get PDF
    The Metaverse has been the centre of attraction for educationists for quite some time. This field got renewed interest with the announcement of social media giant Facebook as it rebranding and positioning it as Meta. While several studies conducted literature reviews to summarize the findings related to the Metaverse in general, no study to the best of our knowledge focused on systematically summarizing the finding related to the Metaverse in education. To cover this gap, this study conducts a systematic literature review of the Metaverse in education. It then applies both content and bibliometric analysis to reveal the research trends, focus, and limitations of this research topic. The obtained findings reveal the research gap in lifelogging applications in educational Metaverse. The findings also show that the design of Metaverse in education has evolved over generations, where generation Z is more targeted with artificial intelligence technologies compared to generation X or Y. In terms of learning scenarios, there have been very few studies focusing on mobile learning, hybrid learning, and micro learning. Additionally, no study focused on using the Metaverse in education for students with disabilities. The findings of this study provide a roadmap of future research directions to be taken into consideration and investigated to enhance the adoption of the Metaverse in education worldwide, as well as to enhance the learning and teaching experiences in the Metaverse

    Personal Data Stores (PDS): A Review

    Get PDF
    Internet services have collected our personal data since their inception. In the beginning, the personal data collection was uncoordinated and was limited to a few selected data types such as names, ages, birthdays, etc. Due to the widespread use of social media, more and more personal data has been collected by different online services. We increasingly see that Internet of Things (IoT) devices are also being adopted by consumers, making it possible for companies to capture personal data (including very sensitive data) with much less effort and autonomously at a very low cost. Current systems architectures aim to collect, store, and process our personal data in the cloud with very limited control when it comes to giving back to citizens. However, Personal Data Stores (PDS) have been proposed as an alternative architecture where personal data will be stored within households, giving us complete control (self-sovereignty) over our data. This paper surveys the current literature on Personal Data Stores (PDS) that enable individuals to collect, control, store, and manage their data. In particular, we provide a comprehensive review of related concepts and the expected benefits of PDS platforms. Further, we compare and analyse existing PDS platforms in terms of their capabilities and core components. Subsequently, we summarise the major challenges and issues facing PDS platforms’ development and widespread adoption

    The information / guarantees balance - protecting informational privacy interests within the European data protection framework.

    Get PDF
    The goal of this thesis is to study the notion of informational privacy, and how it is protected both by the right to privacy and the right to data protection. The age of Big Data has brought with it new ways of creating and processing data, which has led to challenges to the way that individuals are protected from the use of that data. This thesis shows that a new approach is emerging in European data protection law, which is based on protecting informational privacy specifically instead of the existing approaches which have been developed so far. We attempt to study and develop this new approach, and propose a framework based on it and how this might handle the challenges to informational privacy brought about by the age of Big Data. This new approach is based on two core concepts. First, that there is a difference between “data” and “Information”, the second being the combination of “data” and human agency into a new entity, which includes not just data but also human intelligence, biases and imperfections. We assert that the absence of distinction between the two in EU data protection has led to the notion of “personal data” and “identifiability” as defined in the GDPR having challenges in handling data in the information age. The second core concept is what we describe as “Guarantees”. The new approach being developed in data protection law attempts to restrict the processing of personal data by implementing measures which limit what data controllers can do when processing data. These measures all attempt not to prevent all possibility of harmful consequences occurring, but only to ensure that reasonable guarantees are in place to make these consequences unlikely. We thus call those measures “Guarantees”, and build a taxonomy of such Guarantees based on Lawrence Lessig’s four modalities: legal norms, social norms, market forces, and architecture. As such, this thesis asserts that data protection is moving towards an approach having the protection of informational privacy as its core goal, protecting it through a balance between Information and Guarantees binding that Information

    Les opérateurs sauront-ils survivre dans un monde en constante évolution? Considérations techniques conduisant à des scénarios de rupture

    Get PDF
    Le secteur des télécommunications passe par une phase délicate en raison de profondes mutations technologiques, principalement motivées par le développement de l'Internet. Elles ont un impact majeur sur l'industrie des télécommunications dans son ensemble et, par conséquent, sur les futurs déploiements des nouveaux réseaux, plateformes et services. L'évolution de l'Internet a un impact particulièrement fort sur les opérateurs des télécommunications (Telcos). En fait, l'industrie des télécommunications est à la veille de changements majeurs en raison de nombreux facteurs, comme par exemple la banalisation progressive de la connectivité, la domination dans le domaine des services de sociétés du web (Webcos), l'importance croissante de solutions à base de logiciels et la flexibilité qu'elles introduisent (par rapport au système statique des opérateurs télécoms). Cette thèse élabore, propose et compare les scénarios possibles basés sur des solutions et des approches qui sont technologiquement viables. Les scénarios identifiés couvrent un large éventail de possibilités: 1) Telco traditionnel; 2) Telco transporteur de Bits; 3) Telco facilitateur de Plateforme; 4) Telco fournisseur de services; 5) Disparition des Telco. Pour chaque scénario, une plateforme viable (selon le point de vue des opérateurs télécoms) est décrite avec ses avantages potentiels et le portefeuille de services qui pourraient être fournisThe telecommunications industry is going through a difficult phase because of profound technological changes, mainly originated by the development of the Internet. They have a major impact on the telecommunications industry as a whole and, consequently, the future deployment of new networks, platforms and services. The evolution of the Internet has a particularly strong impact on telecommunications operators (Telcos). In fact, the telecommunications industry is on the verge of major changes due to many factors, such as the gradual commoditization of connectivity, the dominance of web services companies (Webcos), the growing importance of software based solutions that introduce flexibility (compared to static system of telecom operators). This thesis develops, proposes and compares plausible future scenarios based on future solutions and approaches that will be technologically feasible and viable. Identified scenarios cover a wide range of possibilities: 1) Traditional Telco; 2) Telco as Bit Carrier; 3) Telco as Platform Provider; 4) Telco as Service Provider; 5) Telco Disappearance. For each scenario, a viable platform (from the point of view of telecom operators) is described highlighting the enabled service portfolio and its potential benefitsEVRY-INT (912282302) / SudocSudocFranceF
    corecore