Search results for "Privacy"
showing 10 items of 402 documents
Mobile Apps and Social Media
2017
1The increasing penetration of smartphones among global population, especially among youth and children, has define a mobile and interactive media use without any precedent. A global connected world is the context in where our offspring are developing self-competences in media literacy because they manage technological devices at very early ages. This context is the state of affairs of this article in which we present two different steps: firstly, a theoretical study, showing the impact of mobile devices, focusing on smartphones and mobile applications where the question arisen is: What are children and young doing while online? Media literacy is also described in order to apply its dimensi…
Leveraging Users' Likes in a Video Streaming P2P Platform
2014
This paper investigates how a p2p television platform can take advantage of the presence of frequent channel viewers to grant them a more satisfying service than to less regular spectators. The idea we explore is to learn beforehand about the users' interests, in order to cluster them in groups that display different behaviors; then, the neighborhood creation strategy and video chunk scheduling algorithm of the overlay is altered, with the aim of serving frequent spectators in a privileged manner, providing them with a faster access to the selected channel without overly penalizing less habitual customers. An analytical model is developed, to capture the difference in startup delay that the…
Online activity traces around a "Boston bomber"
2013
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.
Detection of Fake Profiles in Social Media - Literature Review
2017
Identity Use and Misuse of Public Persona on Twitter
2016
Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…
Towards enabling privacy preserving smart city apps
2016
Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …
Homing blogs as ambivalent spaces for feminine agency
2017
This article discusses a form of lifestyle blogging where women blog about their homes and everyday lives. In these homing blogs, selfrepresentations are characteristically spatially demarcated within the private sphere of the home. As these repeated representations of women in their homes take place in the public space of the internet, homing blogs work towards naturalizing the home as a women’s sphere. Written and commented on mostly by other women, homing blogs represent a feminine form of self-expression and communication that functions as a discursive expression of ongoing social, economic, and cultural changes in affluent Western societies. In this article, Finnish versions of these h…
Explaining classroom teachers’ attitudes towards inclusive education
2019
Teacher attitudes have been identified as an important resource when striving towards inclusive education as defined in the Salamanca Statement (1994). This study surveyed some key factors associated with teacher attitudes towards inclusion. The participants were 1,456 classroom teachers in Finnish primary schools who were asked about their readiness to include in their classrooms a student with a specified special educational need (SEN). The results were reviewed in association with some background variables, including workload concerns, evaluation of professional skills and the opportunity to get extra support if needed. The results show that classroom teachers’ positive attitudes towards…
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications
2022
The increased, widespread, unwarranted, and unaccountable use of Closed-Circuit TeleVision (CCTV) cameras globally has raised concerns about privacy risks for the last several decades. Recent technological advances implemented in CCTV cameras, such as Artificial Intelligence (AI)-based facial recognition and Internet of Things (IoT) connectivity, fuel further concerns among privacy advocates. Machine learning and computer vision automated solutions may prove necessary and efficient to assist CCTV forensics of various types. In this paper, we introduce and release the first and only computer vision models are compatible with Microsoft common object in context (MS COCO) and capable of accurately…
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications
2022
It is estimated that over 1 billion Closed-Circuit Television (CCTV) cameras are operational worldwide. The advertised main benefits of CCTV cameras have always been the same; physical security, safety, and crime deterrence. The current scale and rate of deployment of CCTV cameras bring additional research and technical challenges for CCTV forensics as well, as for privacy enhancements. This paper presents the first end-to-end system for CCTV forensics and feasible privacy-enhancing applications such as exposure measurement, CCTV route recovery, CCTV-aware routing/navigation, and crowd-sourcing. For this, we developed and evaluated four complex and distinct modules (CCTVCV [1], OSRM-CCTV [2],…