Search results for "Privacy"

showing 10 items of 402 documents

Mobile Apps and Social Media

2017

1The increasing penetration of smartphones among global population, especially among youth and children, has define a mobile and interactive media use without any precedent. A global connected world is the context in where our offspring are developing self-competences in media literacy because they manage technological devices at very early ages. This context is the state of affairs of this article in which we present two different steps: firstly, a theoretical study, showing the impact of mobile devices, focusing on smartphones and mobile applications where the question arisen is: What are children and young doing while online? Media literacy is also described in order to apply its dimensi…

social networksInternet privacy050801 communication & media studiesContext (language use)primary school03 medical and health sciences0508 media and communications0302 clinical medicineEmpirical researchdigital skills030225 pediatricsSocial mediaSociologymobile appseducationSocial networkbusiness.industryMobile broadband05 social sciencesScopus(2)Advertisingmedia literacyMedia literacybusinessMobile deviceInteractive mediaProceedings of the 5th International Conference on Technological Ecosystems for Enhancing Multiculturality
researchProduct

Leveraging Users' Likes in a Video Streaming P2P Platform

2014

This paper investigates how a p2p television platform can take advantage of the presence of frequent channel viewers to grant them a more satisfying service than to less regular spectators. The idea we explore is to learn beforehand about the users' interests, in order to cluster them in groups that display different behaviors; then, the neighborhood creation strategy and video chunk scheduling algorithm of the overlay is altered, with the aim of serving frequent spectators in a privileged manner, providing them with a faster access to the selected channel without overly penalizing less habitual customers. An analytical model is developed, to capture the difference in startup delay that the…

startup delayWorld Wide WebMultimediaComputer scienceSettore ING-INF/03 - Telecomunicazionip2p streaming FCM clustering startup delayp2p streamingFCM clusteringVideo streamingcomputer.software_genrecomputerprivacy clustering p2p television platform
researchProduct

Online activity traces around a "Boston bomber"

2013

This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.

ta113Social networkbusiness.industryInternet privacyTragedy (event)ComputingMilieux_LEGALASPECTSOFCOMPUTINGThe InternetSocial mediaSociologySuspectbusinessWeb crawlerDigital mediaProceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct

Detection of Fake Profiles in Social Media - Literature Review

2017

ta113identiteettiväärennöksetfalse identitiessocial network analysisverkkoprofiilitComputer sciencebusiness.industrysocial mediaInternet privacysosiaalinen mediafake profilesväärennöksetidentiteettiSocial mediata518businessProceedings of the 13th International Conference on Web Information Systems and Technologies
researchProduct

Identity Use and Misuse of Public Persona on Twitter

2016

Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…

ta113online identity: G20 leaders: Putinbusiness.industryComputer sciencesocial media05 social sciencesInternet privacyTwitterIdentity (social science)sosiaalinen media050801 communication & media studiesPersonafaked accountsG20 leaders: Putin [online identity]ObamaimpersonationErdogan0508 media and communications0502 economics and business050211 marketingta518business
researchProduct

Towards enabling privacy preserving smart city apps

2016

Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …

ta113smart city application platformInformation privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareMultitier architectureInternet privacy020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreprivacylayered architecture020204 information systemsSmart city0202 electrical engineering electronic engineering information engineeringLayer (object-oriented design)ArchitecturebusinessPersonally identifiable informationcomputerpersonally identifiable information
researchProduct

Homing blogs as ambivalent spaces for feminine agency

2017

This article discusses a form of lifestyle blogging where women blog about their homes and everyday lives. In these homing blogs, selfrepresentations are characteristically spatially demarcated within the private sphere of the home. As these repeated representations of women in their homes take place in the public space of the internet, homing blogs work towards naturalizing the home as a women’s sphere. Written and commented on mostly by other women, homing blogs represent a feminine form of self-expression and communication that functions as a discursive expression of ongoing social, economic, and cultural changes in affluent Western societies. In this article, Finnish versions of these h…

ta520Visual Arts and Performing Arts050801 communication & media studiesta6121ComputingMilieux_LEGALASPECTSOFCOMPUTINGAmbivalencebloggingsukupuoliGender StudiesPublic spacePolitics0508 media and communicationsyksityisyysgenderSociologySalonjulkisuusbloggaajatbusiness.industryCommunicationHoming (biology)05 social scienceskotiMedia studiesPrivate spherehomepublic privacyintimate publicsblogit050903 gender studiesta5141The Internet0509 other social sciencesbusiness
researchProduct

Explaining classroom teachers’ attitudes towards inclusive education

2019

Teacher attitudes have been identified as an important resource when striving towards inclusive education as defined in the Salamanca Statement (1994). This study surveyed some key factors associated with teacher attitudes towards inclusion. The participants were 1,456 classroom teachers in Finnish primary schools who were asked about their readiness to include in their classrooms a student with a specified special educational need (SEN). The results were reviewed in association with some background variables, including workload concerns, evaluation of professional skills and the opportunity to get extra support if needed. The results show that classroom teachers’ positive attitudes towards…

teacher attitudesProperty (philosophy)inclusive educationDownloadbusiness.industryWarrantyInternet privacyComputingMilieux_LEGALASPECTSOFCOMPUTINGWorkloadasenteetluokanopettajattyömääräPermissionSpecial educationEducationworkloadTeaching skillsComputingMilieux_COMPUTERSANDEDUCATIONerityiskasvatusPsychologybusinessInclusion (education)Finlandinkluusiospecial education
researchProduct

CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications

2022

The increased, widespread, unwarranted, and unaccountable use of Closed-Circuit TeleVision (CCTV) cameras globally has raised concerns about privacy risks for the last several decades. Recent technological advances implemented in CCTV cameras, such as Artificial Intelligence (AI)-based facial recognition and Internet of Things (IoT) connectivity, fuel further concerns among privacy advocates. Machine learning and computer vision automated solutions may prove necessary and efficient to assist CCTV forensics of various types. In this paper, we introduce and release the first and only computer vision models are compatible with Microsoft common object in context (MS COCO) and capable of accurately…

tekninen rikostutkintasovellukset (soveltaminen)datasetsobject detectiontekoälyprivacykameratcomputer visiontietosuojamachine learningkoneoppiminencamerasyksityisyyskameravalvontavideo surveillancekonenäköCCTVmappingkasvontunnistus (tietotekniikka)2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
researchProduct

CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications

2022

It is estimated that over 1 billion Closed-Circuit Television (CCTV) cameras are operational worldwide. The advertised main benefits of CCTV cameras have always been the same; physical security, safety, and crime deterrence. The current scale and rate of deployment of CCTV cameras bring additional research and technical challenges for CCTV forensics as well, as for privacy enhancements. This paper presents the first end-to-end system for CCTV forensics and feasible privacy-enhancing applications such as exposure measurement, CCTV route recovery, CCTV-aware routing/navigation, and crowd-sourcing. For this, we developed and evaluated four complex and distinct modules (CCTVCV [1], OSRM-CCTV [2],…

tekninen rikostutkintatietosuojamachine learningkoneoppiminenyksityisyyskameravalvontaobject detectionvideo surveillancekonenäkönavigationsovellusohjelmatyksilönsuojaprivacy-enhancing technologies2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
researchProduct