183,324 research outputs found

    The Implications of Viral Media & Advocacy: Kony 2012

    Get PDF
    This research paper analyzes the video “Kony 2012” as an example of advocacy film making and viral media. By analyzing critical sources, I draw conclusions as to why this video became the most viral video of all time and how other advocacy groups can use this phenomenon to learn about viral advocacy media. Using data from LexisNexis Academic, I track the popularity of “Kony 2012” via different forms of media (blogs, news articles, etc.) and compare my data to prior research conducted on social media sites. Ultimately, I will find that several key characteristics can be pinpointed as the primary cause for the film’s viral ability; including a pre-existing network of followers and the film’s ability to spread through social and traditional media. Additionally, I will conclude that the film’s inconsistent facts and the organizations behaviors played a role in the film’s demise

    APIs and Your Privacy

    Get PDF
    Application programming interfaces, or APIs, have been the topic of much recent discussion. Newsworthy events, including those involving Facebook’s API and Cambridge Analytica obtaining information about millions of Facebook users, have highlighted the technical capabilities of APIs for prominent websites and mobile applications. At the same time, media coverage of ways that APIs have been misused has sparked concern for potential privacy invasions and other issues of public policy. This paper seeks to educate consumers on how APIs work and how they are used within popular websites and mobile apps to gather, share, and utilize data. APIs are used in mobile games, search engines, social media platforms, news and shopping websites, video and music streaming services, dating apps, and mobile payment systems. If a third-party company, like an app developer or advertiser, would like to gain access to your information through a website you visit or a mobile app or online service you use, what data might they obtain about you through APIs and how? This report analyzes 11 prominent online services to observe general trends and provide you an overview of the role APIs play in collecting and distributing information about consumers. For example, how might your data be gathered and shared when using your Facebook account login to sign up for Venmo or to access the Tinder dating app? How might advertisers use Pandora’s API when you are streaming music? After explaining what APIs are and how they work, this report categorizes and characterizes different kinds of APIs that companies offer to web and app developers. Services may offer content-focused APIs, feature APIs, unofficial APIs, and analytics APIs that developers of other apps and websites may access and use in different ways. Likewise, advertisers can use APIs to target a desired subset of a service’s users and possibly extract user data. This report explains how websites and apps can create user profiles based on your online behavior and generate revenue from advertiser-access to their APIs. The report concludes with observations on how various companies and platforms connecting through APIs may be able to learn information about you and aggregate it with your personal data from other sources when you are browsing the internet or using different apps on your smartphone or tablet. While the paper does not make policy recommendations, it demonstrates the importance of approaching consumer privacy from a broad perspective that includes first parties and third parties, and that considers the integral role of APIs in today’s online ecosystem

    v. 82, issue 15, March 5, 2015

    Get PDF

    Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World

    Get PDF
    Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure

    Fashion\u27s Destruction of Unsold Goods: Responsible Solutions for an Environmentally Conscious Future

    Get PDF
    Over the past two years, headlines of fast-fashion and luxury brands burning their merchandise have flooded media outlets. While this came as a shock to the general public, it has actually been a standard industry practice for decades. As societal norms are leaning more towards environmentally conscious practices, destroying unsold products is no longer viewed as an acceptable option. Brands are facing increased scrutiny related to their environmental impact—such as the amount of textile waste that ends up in a landfill—and how they address the issue. While the media have criticized brands for these practices, they have not suggested long-term solutions to resolve the problem. Brands are left in the dark without a road map showing them how to modernize their systems. Furthermore, when governments introduce new bills focused on textile waste, brands experience added pressure. France is in the process of requiring brands to recycle or reuse their unsold goods by January 2020. However, there is no one-size-fits-all solution for any brand or country: what may work for a fast-fashion brand will not necessarily work for a luxury brand. In the same vein, what may work for France may not work for the United States. This Note explores a number of potential solutions to this problem which range from legal solutions, to reusing, manufacturing, technological, and crisis management solutions. Brands must start to address this issue within their supply chain in a thorough and transparent manner, as this is not a fleeting trend

    Information Outlook, October 2004

    Get PDF
    Volume 8, Issue 10https://scholarworks.sjsu.edu/sla_io_2004/1009/thumbnail.jp

    The Cowl - v.83 - n.8 - Nov 1, 2018

    Get PDF
    The Cowl - student newspaper of Providence College. Vol 83 - No. 8 - November 1, 2018. 24 pages

    Knight News Challenge: Casting the Net Wide for Innovation

    Get PDF
    Reviews the evolution of the Knight News Challenge contest for experimental projects in digital delivery of news and information to local communities, profiles winning projects and explores the grants' impact, and considers issues of sustainability

    Cultivating Lifelong Donors: Stewardship and the Fundraising Pyramid

    Get PDF
    This handbook helps nonprofits build long-term giving programs that span the entire supporter lifecycle, from engagement through the end of life. It highlights strategies for engaging new supporters online, investigates the characteristics of loyal donors, examines the importance of developing personal relationships with transitional giving prospects, and discusses donor cultivation
    • …
    corecore