47 resultados para privacy


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract 1: Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets’ content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty- five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner’s Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities. Abstract2: The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerbated by the difficulties of creating a policy that is both concise and compliant. Standardization addresses many of these issues, providing benefits for users and SNS, although it is only possible if policies share attributes which can be standardized. This investigation used thematic analysis and cross- document structure theory, to assess the similarity of attributes between the privacy policies (as available in August 2014), of the six most frequently visited SNS globally. Using the Jaccard similarity coefficient, two types of attribute were measured; the clauses used by SNS and the coverage of forty recommendations made by the UK Information Commissioner’s Office. Analysis showed that whilst similarity in the clauses used was low, similarity in the recommendations covered was high, indicating that SNS use different clauses, but to convey similar information. The analysis also showed that low similarity in the clauses was largely due to differences in semantics, elaboration and functionality between SNS. Therefore, this paper proposes that the policies of SNS already share attributes, indicating the feasibility of standardization and five recommendations are made to begin facilitating this, based on the findings of the investigation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lecture 2: Personal Privacy and State Interference Lecture slides and video by Danny Weitzner.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Slides used in lecture, explaining coursework and providing an introduction to the Data Protection Act. Students should use these resources as guidance for the forthcoming coursework (annotated bibliography). Like all materials you can expect slides to address issues which come up future assessment activities

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reference List for UK Computing Law

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Group Poster for UK Computing Law

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Zip file containing source code and database dump for the resource

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collection of poster, reference list and resource source and database dump

Relevância:

10.00% 10.00%

Publicador:

Resumo:

INFO 2009 Peanut Butter Jelly Website

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The workings of Team Peanut Butter Jelly for INFO2009.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This resource contains an interactive tutorial slide, a set of multiple choice questions and a poster that Group 11 composed for INFO2009 Assignment 2. The topic area for the resource is Digital Rights Management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Your Digital Identity is everything you create on the Web, but also what other people might say about you there. Photographs on social networking sites, logs of chatroom conversations, newspaper articles about your role in a play, or your sporting victory. Even if you don't post material to the Web yourself, there is a good chance somebody else does, and we believe it is worth knowing about some of the issues. This workbook is designed to help you raise your level of awareness and to think about some of the ways your DI might be affected. There are two workbooks linked here; one for students generally and one for students studying for the health professions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The revision slides for our Social Media course, contains major lessons learned throughout the course, and an example exam question (on trust).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

INFO2009 2011/2012 Session, Group 20 (One Direction) resource on surveillance

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Informative website about Anonymous/LulzSec and Denial of Service attacks