7,689 research outputs found
Recommended from our members
Rethinking privacy in social networks: A case study of beacon
Popular online social network sites (SNS) such as Facebook and Bebo are technological platforms that are posing questions about personal privacy. This paper contributes to our understanding of the nature and form of online privacy by critically analysing the issues surrounding the failed launch of Facebook’s advertising tool Beacon. Beacon is an interesting case study because it highlighted the complexity of information ownership in an online social network. Qualitative data was gathered from 29 weblogs (blogs) representing user opinions published between 6th November 2007(when Beacon was launched) and 28th February 2008 (when commentary had dwindled). A thematic analysis of the blogs suggest that concerns such as commercialism, terms of service (TOS), lack of user control, lack of user awareness and data protection are factors that influence user perceptions of information ownership as a subset of online privacy
Recommended from our members
A heuristic evaluation of the Facebook's advertising tool beacon
Interface usability is critical to the successful adoption of information systems. The aim of this study is to evaluate interface of Facebook's advertising tool Beacon by using privacy heuristics [4]. Beacon represents an interesting case study because of the negative media and user backlash it received. The findings of heuristic evaluation suggest violation of privacy heuristics [4]. Here, analysis identified concerns about user choice and consent, integrity and security of data, and awareness and notice. Beacon was an innovative tool, therefore, its systematic evaluation was needed in order to identify privacy problems, their causes and subsequent consequences. The study provides useful insights to human computer interaction (HCI) designers of online social networks
Mining social network data for personalisation and privacy concerns: A case study of Facebook’s Beacon
This is the post-print version of the final published paper that is available from the link below.The popular success of online social networking sites (SNS) such as Facebook is a hugely tempting resource of data mining for businesses engaged in personalised marketing. The use of personal information, willingly shared between online friends' networks intuitively appears to be a natural extension of current advertising strategies such as word-of-mouth and viral marketing. However, the use of SNS data for personalised marketing has provoked outrage amongst SNS users and radically highlighted the issue of privacy concern. This paper inverts the traditional approach to personalisation by conceptualising the limits of data mining in social networks using privacy concern as the guide. A qualitative investigation of 95 blogs containing 568 comments was collected during the failed launch of Beacon, a third party marketing initiative by Facebook. Thematic analysis resulted in the development of taxonomy of privacy concerns which offers a concrete means for online businesses to better understand SNS business landscape - especially with regard to the limits of the use and acceptance of personalised marketing in social networks
The Demand for Money in a Simultaneous-Equation Framework
This paper estimates the demand for money in the U.S. within a model where the money supply function is also considered simultaneously. The explanatory variables for the money demand function include a measure of the interest rate, real income and the exchange rate. The explanatory variables for the money supply function include the output gap and the inflation gap in addition to an interest rate. The parameters estimated for the two equations avoid being biased or inconsistent. The results should be useful to both macroeconomic researchers and policy makers.Money demand, money supply, simultaneous-equation model, output gap, inflation gap, three stage least squares
Circular frame fixation for calcaneal fractures risks injury to the medial neurovascular structures: a cadaveric description
Aim: There is a risk of iatrogenic injury to the soft tissues of the calcaneus and this study assesses the risk of injury to these structures in circular frame calcaneal fracture fixation.
Materials and Methods: After olive tip wires were inserted, an L-shaped incision on the lateral and medial aspects of 5 formalin fixed cadaveric feet was performed to expose the underlying soft tissues. The calcaneus was divided into zones corresponding to high, medium and low risk using a grading system.
Results: Structures at high risk included the posterior tibial artery, posterior tibial vein and posterior tibial nerve on the medial aspect. Soft tissue structures on the lateral side that were shown to be at lower risk of injury were the small saphenous vein and the sural nerve and the tendons of fibularis longus and fibularis brevis.
Conclusion: The lateral surface of the calcaneus provides a lower risk area for external fixation. The risk of injury to significant soft tissues using a circular frame fixation approach has been shown to be greater on the medial aspect.
Clinical Relevance: This study highlights the relevant anatomical relations in circular frame fixation for calcaneal fractures to minimize damage to these structures
Improving route discovery in on-demand routing protocols using local topology information in MANETs
Most existing routing protocols proposed for MANETs use flooding as a broadcast technique for the propagation of network control packets; a particular example of this is the dissemination of route requests (RREQs), which facilitate route discovery. In flooding, each mobile node rebroadcasts received packets, which, in this manner, are propagated network-wide with considerable overhead. This paper improves on the performance of existing routing protocols by reducing the communication overhead incurred during the route discovery process by implementing a new broadcast algorithm called the adjusted probabilistic flooding on the Ad-Hoc on Demand Distance Vector (AODV) protocol. AODV [3] is a well-known and widely studied algorithm which has been shown over the past few years to maintain an overall lower routing overhead compared to traditional proactive schemes, even though it uses flooding to propagate RREQs. Our results, as presented in this paper, reveal that equipping AODV with fixed and adjusted probabilistic flooding, instead, helps reduce the overhead of the route discovery process whilst maintaining comparable performance levels in terms of saved rebroadcasts and reachability as achieved by conventional AODV\@. Moreover, the results indicate that the adjusted probabilistic technique results in better performance compared to the fixed one for both of these metrics
From RHIC to EIC: Nuclear Structure Functions
We study the nuclear structure function and its logarithmic
derivative in the high energy limit (small region) using the Color Glass
Condensate formalism. In this limit the structure function depends on the
quark anti-quark dipole-target scattering cross section . The same dipole cross section appears in single hadron and hadron-photon
production cross sections in the forward rapidity region in deuteron
(proton)-nucleus collisions at high energy, i.e. at RHIC and LHC. We use a
parameterization of the dipole cross section, which has successfully been used
to describe the deuteron-gold data at RHIC, to compute the nuclear structure
function and its log derivative (which is related to gluon
distribution function in the double log limit). We provide a quantitative
estimate of the nuclear shadowing of and the gluon distribution
function in the kinematic region relevant to a future Electron-Ion Collider.Comment: 13 pages, 6 figure
Aplikasi Monitoring Manajemen Kuangan Di Madrasah Diniyah PP. Ibnu Kholdun A-Hasyimi Berbasis Web dan Bot Telegram
Manajemen keuangan meliputi segala kegiatan yang berhubungan dengan perolehan, pendanaan serta untuk mengolah aktivitas dengan tujuan semua aktivitas, Termasuk pengolahan manajemen keuangan sekolah dalam sebuah institusi pendidikan merupakan kegiatan penting yang dilaksanakan secara periodik ataupun setiap saat, data-data keuangan tersebut selalu berubah setiap bulan atau setiap tahun, pengeluaran dan pemasukan. Sedangkan informasi dituntut untuk selalu aktual, sehingga dibutuhkan suatu sistem informasi yang bisa mengolah data-data secara cepat dan efektif, diketahui bahwa sistem manajemen keuagan yang sedang berjalan pada Madrasah Diniyah PP.Ibnu kholdun Al-hasyimi masih dilakukan secara manual yang membuat aliran informasi yang lambat, proses pencarian data yang lambat, perhitungan data dalam jumlah banyak sulit dilakukan, minimnya pemantauan yang dilakukan atasan. Berdasarkan latar belakang permasalahan diatas dapat ditarik kesimpulan bahwa permasalahan yang dihadapi yaitu bagaimana merancang sebuah Aplikasi Monitoring manajemen Keuangan di Madrasah Diniyah PP.Ibnu kholdun Al-Hasyimi Berbasis Web Dan Bot Telegram. Dari hasil perancangan Aplikasi Monitoring Manajemen Keuangan di Madrasah Diniyah PP.Ibnu kholdun Al-Hasyimi Berbasis Web Dan Bot Telegram. Berdasarkan hasil perhitungan, disimpulkan bahwa pengujian eksternal dengan berjumlah 6 pertanyaan dan 10 penguji, maka dihasilkan persentase yang diperoleh skor 77,5% dengan kategori baik
- …