11 resultados para location privacy

em Helda - Digital Repository of University of Helsinki


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study is to examine the relationship of the Roman villa to its environment. The villa was an important feature of the countryside intended both for agricultural production and for leisure. Manuals of Roman agriculture give instructions on how to select a location for an estate. The ideal location was a moderate slope facing east or south in a healthy area and good neighborhood, near good water resources and fertile soils. A road or a navigable river or the sea was needed for transportation of produce. A market for selling the produce, a town or a village, should have been nearby. The research area is the surroundings of the city of Rome, a key area for the development of the villa. The materials used consist of archaeological settlement sites, literary and epigraphical evidence as well as environmental data. The sites include all settlement sites from the 7th century BC to 5th century AD to examine changes in the tradition of site selection. Geographical Information Systems were used to analyze the data. Six aspects of location were examined: geology, soils, water resources, terrain, visibility/viewability and relationship to roads and habitation centers. Geology was important for finding building materials and the large villas from the 2nd century BC onwards are close to sources of building stones. Fertile soils were sought even in the period of the densest settlement. The area is rich in water, both rainfall and groundwater, and finding a water supply was fairly easy. A certain kind of terrain was sought over very long periods: a small spur or ridge shoulder facing preferably south with an open area in front of the site. The most popular villa resorts are located on the slopes visible from almost the entire Roman region. A visible villa served the social and political aspirations of the owner, whereas being in the villa created a sense of privacy. The area has a very dense road network ensuring good connectivity from almost anywhere in the region. The best visibility/viewability, dense settlement and most burials by roads coincide, creating a good neighborhood. The locations featuring the most qualities cover nearly a quarter of the area and more than half of the settlement sites are located in them. The ideal location was based on centuries of practical experience and rationalized by the literary tradition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cell transition data is obtained from a cellular phone that switches its current serving cell tower. The data consists of a sequence of transition events, which are pairs of cell identifiers and transition times. The focus of this thesis is applying data mining methods to such data, developing new algorithms, and extracting knowledge that will be a solid foundation on which to build location-aware applications. In addition to a thorough exploration of the features of the data, the tools and methods developed in this thesis provide solutions to three distinct research problems. First, we develop clustering algorithms that produce a reliable mapping between cell transitions and physical locations observed by users of mobile devices. The main clustering algorithm operates in online fashion, and we consider also a number of offline clustering methods for comparison. Second, we define the concept of significant locations, known as bases, and give an online algorithm for determining them. Finally, we consider the task of predicting the movement of the user, based on historical data. We develop a prediction algorithm that considers paths of movement in their entirety, instead of just the most recent movement history. All of the presented methods are evaluated with a significant body of real cell transition data, collected from about one hundred different individuals. The algorithms developed in this thesis are designed to be implemented on a mobile device, and require no extra hardware sensors or network infrastructure. By not relying on external services and keeping the user information as much as possible on the user s own personal device, we avoid privacy issues and let the users control the disclosure of their location information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The parasitic wasps are one of the largest insect groups and their life histories are remarkably variable. Common to all parasitic wasps is that they kill their hosts, which are usually beetles, butterflies and sometimes spiders. Hosts are often at a larval or pupal stage and live in concealed conditions, such as in plant tissue. Parasitic wasps have two main ways of finding their host. 1) They can detect chemical compounds emitted by damaged plant material or released by larvae living in plant tissue, and 2) detect the larvae by sound vibrations. Even though pupae are immobile and silent, and therefore do not cause vibration, parasitoids have, however, adapted to find passive developmental stages by producing vibration themselves by knocking the substrate with their antennae, and then detecting the echoes with their legs. This echolocation allows a parasitoid to locate its potential hosts that are deeply buried in wood. This study focuses on the relationships of the subfamily Cryptinae (Hymenoptera: Ichneumonidae) and related taxa, and the evolution of host location mechanism. There are no earlier studies of the phylogeny of the Cryptinae, and the position of related taxa are unclear. According to the earlier classification, which is entirely intuitional, the Cryptinae is divided into three tribes: Cryptini, Hemigasterini and Phygadeuontini. Further, these tribes are subdiveded into numerous subtribes. This work, based on molecular characters, shows that the cryptine tribes Cryptini, Phygadeuon¬tini and Hemigasterini come out largely as monophyletic groups, thus agreeing with the earlier classification. The earlier subtribal classification had no support. In addition, it is shown that modified antennal structures are associated with host usage of wood-boring coleopteran hosts. The cryptines have a clear modification series on their antennal tips from a simply tip to a hammer-like structure. The species with strongly modified antennae belong mostly to the tribe Cryptini and they utilise wood-boring beetles as hosts. Also, field observations on insect behaviour support this result.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inter-enterprise collaboration has become essential for the success of enterprises. As competition increasingly takes place between supply chains and networks of enterprises, there is a strategic business need to participate in multiple collaborations simultaneously. Collaborations based on an open market of autonomous actors set special requirements for computing facilities supporting the setup and management of these business networks of enterprises. Currently, the safeguards against privacy threats in collaborations crossing organizational borders are both insufficient and incompatible to the open market. A broader understanding is needed of the architecture of defense structures, and privacy threats must be detected not only on the level of a private person or enterprise, but on the community and ecosystem levels as well. Control measures must be automated wherever possible in order to keep the cost and effort of collaboration management reasonable. This article contributes to the understanding of the modern inter-enterprise collaboration environment and privacy threats in it, and presents the automated control measures required to ensure that actors in inter-enterprise collaborations behave correctly to preserve privacy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is suggested that the ability and practices of how the multinational corporation (MNC) manages knowledge transfer among its geographically dispersed subsidiary units are crucial for the building and development of firm competitive advantage. However, cross-border transfer of valuable organizational knowledge is likely to be problematic and laborious, especially within diversified and differentiated MNCs. Using data collected from 164 western multinational companies’ subsidiary units located in China and Finland, this study aims to investigate cross-border knowledge transfer within the MNC. It explores a number of factors that influence the transfer of knowledge among units in the differentiated MNC. The study consists of five individual papers. Paper 1 investigates a range of organizational mechanisms that may positively influence a subsidiary’s propensity to undertake knowledge transfers to other parts of the corporation. Paper 2 explores the impact of subsidiary location on the motivational dispositions of knowledge receiving units to value and accept knowledge from subsidiaries located in economically less advanced countries. Paper 3 examines the influence of social capital variables on knowledge transfer in dyadic relationships between foreign-owned subsidiaries and their sister and patent units. Paper 4 provides some initial insights into potentially different effects of trust and shared vision in intra-organizational vs. inter-organizational relationships. Using a case study setting, Paper 5 explores means and mechanisms used in transferring human resource management practices to Western MNCs’ business units in China from a cultural perspective. The results of the study show that MNC management through choices regarding organizational controls can encourage and enhance corporate-internal knowledge transfer. It also finds evidence that more knowledge is transferred from subsidiaries located in an industrialized country (e.g., Finland) than subsidiaries located in a developing country (e.g., China). While the study has highlighted the importance of social capital in promoting knowledge transfer, it has also uncovered some new findings that the effect of trust and shared vision may be contingent upon different contexts. Finally, in Paper 5, a number of mechanisms used in transferring selected HRM practices and competences to the Chinese business units have been identified. The findings suggest that cultural differences should be taken into consideration in the choice and use of different transfer mechanisms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the emergence of service marketing, the focus of service research has evolved. Currently the focus of research is shifting towards value co-created by the customer. Consequently, value creation is increasingly less fixed to a specific time or location controlled by the service provider. However, present service management models, although acknowledging customer participation and accessibility, have not considered the role of the empowered customer who may perform the service at various locations and time frames. The present study expands this scope and provides a framework for exploring customer perceived value from a temporal and spatial perspective. The framework is used to understand and analyse customer perceived value and to explore customer value profiles. It is proposed that customer perceived value can be conceptualised as a function of technical, functional, temporal and spatial value dimensions. These dimensions are suggested to have value-increasing and value-decreasing facets. This conceptualisation is empirically explored in an online banking context and it is shown that time and location are more important value dimensions relative to the technical and functional dimensions. The findings demonstrate that time and location are important not only in terms of having the possibility to choose when and where the service is performed. Customers also value an efficient and optimised use of time and a private and customised service location. The study demonstrates that time and location are not external elements that form the service context, but service value dimensions, in addition to the technical and functional dimensions. This thesis contributes to existing service management research through its framework for understanding temporal and spatial dimensions of perceived value. Practical implications of the study are that time and location need to be considered as service design elements in order to differentiate the service from other services and create additional value for customers. Also, because of increased customer control and the importance of time and location, it is increasingly relevant for service providers to provide a facilitating arena for customers to create value, rather than trying to control the value creation process. Kristina Heinonen is associated with CERS, the Center for Relationship Marketing and Service Management at the Swedish School of Economics and Business Administration

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Housepits have a remarkably short research history as compared to Fennoscandian archaeological research on the Stone Age in general. The current understanding of the numbers and the distribution of Stone Age housepits in the Nordic countries has, for the most part, been shaped by archaeological studies carried out over the last twenty to thirty years. The main subjects of this research are Neolithic housepits, which are archaeological remains of semi-subterranean pithouses. This dissertation consists of five peer-reviewed articles and a synthesis paper. The articles deal with the development of housepits as seen in the data gathered from Finland (the Lake Saimaa area and south-eastern Finland) and Russia (the Karelian Isthmus). This synthesis expands the discussion of the changes observed in the Papers to include Fennoscandian housepit research as a whole. Certain changes in the size, shape, environmental location, and clustering of housepits extended into various cultures and ecological zones in northern Fennoscandia. Previously, the evolution of housepits has been interpreted to have been caused by the adaptation of Neolithic societies to prevailing environmental circumstances or to re-organization following contacts with the agrarian Corded Ware/Battle Axe Cultures spreading to North. This dissertation argues for two waves of change in the pithouse building tradition. Both waves brought with them certain changes in the pithouses themselves and in the practices of locating the dwellings in the environment/landscape. The changes in housepits do not go hand in hand with other changes in material culture, nor are the changes restricted to certain ecological environments. Based on current information, it appears that the changes relate primarily to the spread of new concepts of housing and possibly to new technology, as opposed to representing merely a local response to environmental factors. This development commenced already before the birth of the Corded Ware/Battle Axe Cultures. Therefore, the changes are argued to have resulted from the spreading of new ideas through the same networks that actively distributed commodities, exotic goods, and raw materials over vast areas between the southern Baltic Sea, the north-west Russian forest zone, and Fennoscandia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A local algorithm with local horizon r is a distributed algorithm that runs in r synchronous communication rounds; here r is a constant that does not depend on the size of the network. As a consequence, the output of a node in a local algorithm only depends on the input within r hops from the node. We give tight bounds on the local horizon for a class of local algorithms for combinatorial problems on unit-disk graphs (UDGs). Most of our bounds are due to a refined analysis of existing approaches, while others are obtained by suggesting new algorithms. The algorithms we consider are based on network decompositions guided by a rectangular tiling of the plane. The algorithms are applied to matching, independent set, graph colouring, vertex cover, and dominating set. We also study local algorithms on quasi-UDGs, which are a popular generalisation of UDGs, aimed at more realistic modelling of communication between the network nodes. Analysing the local algorithms on quasi-UDGs allows one to assume that the nodes know their coordinates only approximately, up to an additive error. Despite the localisation error, the quality of the solution to problems on quasi-UDGs remains the same as for the case of UDGs with perfect location awareness. We analyse the increase in the local horizon that comes along with moving from UDGs to quasi-UDGs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thunderstorm is a dangerous electrical phenomena in the atmosphere. Thundercloud is formed when thermal energy is transported rapidly upwards in convective updraughts. Electrification occurs in the collisions of cloud particles in the strong updraught. When the amount of charge in the cloud is large enough, electrical breakdown, better known as a flash, occurs. Lightning location is nowadays an essential tool for the detection of severe weather. Located flashes indicate in real time the movement of hazardous areas and the intensity of lightning activity. Also, an estimate for the flash peak current can be determined. The observations can be used in damage surveys. The most simple way to represent lightning data is to plot the locations on a map, but the data can be processed in more complex end-products and exploited in data fusion. Lightning data serves as an important tool also in the research of lightning-related phenomena, such as Transient Luminous Events. Most of the global thunderstorms occur in areas with plenty of heat, moisture and tropospheric instability, for example in the tropical land areas. In higher latitudes like in Finland, the thunderstorm season is practically restricted to the summer season. Particular feature of the high-latitude climatology is the large annual variation, which regards also thunderstorms. Knowing the performance of any measuring device is important because it affects the accuracy of the end-products. In lightning location systems, the detection efficiency means the ratio between located and actually occurred flashes. Because in practice it is impossible to know the true number of actually occurred flashes, the detection efficiency has to be esimated with theoretical methods.