• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1258
  • 168
  • 137
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 21
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2416
  • 656
  • 566
  • 527
  • 514
  • 353
  • 337
  • 309
  • 299
  • 240
  • 236
  • 221
  • 212
  • 199
  • 186
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
551

The social significance of home networking : public surveillance and social management

Wilson, Kevin G., 1952- January 1985 (has links)
This thesis analyzes the social significance of the integration of the home into computer networks. The social significance of home networking is grasped when these systems are understood in their relationship to emerging forms of electronic social control. The thesis establishes this connection through an analysis of structural trends in the videotex industry which demonstrates the value to the corporate sector of cybernetic information generated by interactive systems. The North American tradition of privacy policy is reviewed and demonstrated as inadequate for the protection of personal privacy in home networking. It is further shown that privacy policy does not represent an adequate theorization of social control in computer networking, since it does not account for practices of aggregate social control, which have been termed in the thesis "social management," so vital to the cybernetic economy of late capitalism. Finally, the thesis argues that current conceptual frameworks and policy mechanisms cannot assure the socially beneficial development of home networking, given the tendency towards the integration of such systems into structures of social control.
552

Watching workers: a critical review of the law regarding electronic employee monitoring in non-unionized workplaces in Canada

Bueckert, Melanie R. 15 September 2008 (has links)
This thesis addresses the topic of electronic employee monitoring in non-unionized workplaces in Canada. Electronic employee monitoring is defined as including (1) the use of electronic devices to review and evaluate employees’ performance; (2) ‘electronic surveillance’; and (3) employers’ use of computer forensics. Detailed consideration is given to a variety of technologies, including computer, internet and e-mail monitoring, location awareness technologies (such as global positioning systems and radio frequency identification), as well as biometrics, and the developing case law surrounding these innovations. Analogies are drawn to the jurisprudence developing with respect to unionized workplaces and under statutory unjust dismissal regimes. This analysis leads to the conclusion that legislative reform is necessary, either through (1) the creation of parallel private sector privacy regimes, such as those in British Columbia and Alberta, mirroring existing federal legislation; (2) amendments to existing employment standards legislation; or (3) the enactment of a stand-alone surveillance statute.
553

THE MISMANGEMENT OF MARITAL DISCLOSURES IN THE REAL HOUSEWIVES OF BEVERLY HILLS

Campbell, Randi Cariella 01 January 2012 (has links)
Reality television is unique from other television programming because its format is less scripted than typical entertainment television programs, but not as candid as documentary style shows. Aspects of cast members’ private lives are publicly aired as “real.” The consequences for airing one’s private life in the public sphere are unclear. This may be especially important to study when the private disclosures reveal activities that may be unethical, immoral, illegal, or abusive. Petronio’s (date) communication privacy management theory was used to examine the martial disclosures that occurred between Taylor and Russell Armstrong, cast members of the reality television show The Real Housewives of Beverly Hills. Two seasons of the show were analyzed and coded according to the five suppositions of CPM. Results revealed several aspects of Walker’s cycle of violence theory being played out in the public sphere without consequence. Additionally, co-ownership of information appeared to constitute a license to gossip freely about private disclosures shared in confidence between certain individuals with any and all other cast members.
554

Audit Games

Sinha, Arunesh 01 July 2014 (has links)
Modern organizations (e.g., hospitals, banks, social networks, search engines) hold large volumes of personal information, and rely heavily on auditing for enforcement of privacy policies. These audit mechanisms combine automated methods with human input to detect and punish violators. Since human audit resources are limited, and often not sufficient to investigate all potential violations, current state-of-the -art audit tools provide heuristics to guide human effort. However, numerous reports of privacy breaches caused by malicious insiders bring to question the effectiveness of these audit mechanisms. Our thesis is that effective audit resource allocation and punishment levels can be efficiently computed by modeling the audit process as a game between a rational auditor and a rational or worst-case auditee. We present several results in support of the thesis. In the worst-case adversary setting, we design a game model taking into account organizational cost of auditing and loss from violations. We propose the notion of low regret as a desired audit property and provide a regret minimizing audit algorithm that outputs an optimal audit resource allocation strategy. The algorithm improves upon prior regret bounds in the partial information setting. In the rational adversary setting, we enable punishments by the auditor, and model the adversary's utility as a trade-off between the benefit from violations and loss due to punishment when detected. Our Stackelberg game model generalizes an existing deployed security game model with punishment parameters. It applies to natural auditing settings with multiple auditors where each auditor is restricted to audit a subset of the potential violations. We provide novel polynomial time algorithms to approximate the non-convex optimization problem used to compute the Stackelberg equilibrium. The algorithms output optimal audit resource allocation strategy and punishment levels. We also provide a method to reduce the optimization problem size, achieving up to 5x speedup for realistic instances of the audit problem, and for the related security game instances.
555

Empowering bystanders to facilitate Internet censorship measurement and circumvention

Burnett, Samuel Read 27 August 2014 (has links)
Free and open exchange of information on the Internet is at risk: more than 60 countries practice some form of Internet censorship, and both the number of countries practicing censorship and the proportion of Internet users who are subject to it are on the rise. Understanding and mitigating these threats to Internet freedom is a continuous technological arms race with many of the most influential governments and corporations. By its very nature, Internet censorship varies drastically from region to region, which has impeded nearly all efforts to observe and fight it on a global scale. Researchers and developers in one country may find it very difficult to study censorship in another; this is particularly true for those in North America and Europe attempting to study notoriously pervasive censorship in Asia and the Middle East. This dissertation develops techniques and systems that empower users in one country, or bystanders, to assist in the measurement and circumvention of Internet censorship in another. Our work builds from the observation that there are people everywhere who are willing to help us if only they knew how. First, we develop Encore, which allows webmasters to help study Web censorship by collecting measurements from their sites' visitors. Encore leverages weaknesses in cross-origin security policy to collect measurements from a far more diverse set of vantage points than previously possible. Second, we build Collage, a technique that uses the pervasiveness and scalability of user-generated content to disseminate censored content. Collage's novel communication model is robust against censorship that is significantly more powerful than governments use today. Together, Encore and Collage help people everywhere study and circumvent Internet censorship.
556

The Collaborative Self: From Collectivity to Individuality and What Blogs Can Teach Us About Identity

Hagenah, Nathan January 2013 (has links)
This paper uses blogs as a starting point for an examination of how identity is constructed collaboratively through a series of linguistically mediated social processes. The goal is to establish a theoretical framework for understanding individual identity as rooted in media, language, and society and the result of collective social processes as opposed to their genesis. It draws together conceptual models from theorists in sociology, media studies, and genre theory to explore how selves are created in the online contexts of blogs and how those concepts relate to wider cultural concerns and anxieties related to the construction of individual identity. By examining issues of privacy, anonymity, and authenticity as they relate to blogs and bloggers, this paper aims to provide a view of individual identity as contextually situated yet continuous across social contexts and which is the result of collaborative, collective social processes.
557

Watching workers: a critical review of the law regarding electronic employee monitoring in non-unionized workplaces in Canada

Bueckert, Melanie R. 15 September 2008 (has links)
This thesis addresses the topic of electronic employee monitoring in non-unionized workplaces in Canada. Electronic employee monitoring is defined as including (1) the use of electronic devices to review and evaluate employees’ performance; (2) ‘electronic surveillance’; and (3) employers’ use of computer forensics. Detailed consideration is given to a variety of technologies, including computer, internet and e-mail monitoring, location awareness technologies (such as global positioning systems and radio frequency identification), as well as biometrics, and the developing case law surrounding these innovations. Analogies are drawn to the jurisprudence developing with respect to unionized workplaces and under statutory unjust dismissal regimes. This analysis leads to the conclusion that legislative reform is necessary, either through (1) the creation of parallel private sector privacy regimes, such as those in British Columbia and Alberta, mirroring existing federal legislation; (2) amendments to existing employment standards legislation; or (3) the enactment of a stand-alone surveillance statute.
558

Room for Thought: Privacy and the Private Home in Mrs Dalloway and To the Lighthouse

Koivunen, Johanna January 2015 (has links)
Modernism is often connected to the public sphere due to its associations with urbanity and technological changes. But interiority and private life was as important to modernity and, in particular, in Virginia Woolf’s writing. This essay explores the protagonists’ access to and experience of privacy in Woolf’s novels To the Lighthouse (1927) and Mrs Dalloway (1925), which both centre on women in a domestic environment. The reading combines modernist reactions against Victorian domesticity, which was structured on the private/public dichotomy and which limited women’s access to privacy, and combines it with modernist views of interiority, informed, more specifically, by Freud’s model of the unconscious and the spatial features of it. Privacy and interiority are imagined with spatial metaphors, but privacy is not necessarily connected to physical place and being alone, but rather having the ability to control the social situation and to choose what one reveals about oneself. Both novels re-imagine privacy and its ties to physical as well as mental space. This essay argues that To the Lighthouse is centred on a traditional Victorian home which reflects how its protagonist experiences interior privacy, and Mrs Dalloway explores a more modern domesticity that challenges Victorian organisation of the home and in turn, women’s access to privacy and solitude. With modernity public life was made available for women to a larger extent, but just as public life is coded by power relations, so is private life, which determines what sort of life could be lived by, for example, women.
559

Graph anonymization through edge and vertex addition

Srivastava, Gautam 20 December 2011 (has links)
With an abundance of social network data being released, the need to protect sensitive information within these networks has become an important concern of data publishers. In this thesis we focus on the popular notion of k-anonymization as applied to social network graphs. Given such a network N, the problem we study is to transform N to N', such that some property P of each node in N' is attained by at least k-1 other nodes in N'. We study edge-labeled, vertex-labeled and unlabeled graphs, since instances of each occur in real-world social networks. Our main contributions are as follows 1. When looking at edge additions, we show that k-label sequence anonymity of arbitrary edge-labeled graphs is NP-complete, and use this fact to prove hardness results for many other recently introduced notions of anonymity. We also present interesting hardness results and algorithms for labeled and unlabeled bipartite graphs. 2. When looking at node additions, we show that on vertex-labeled graphs, the problem is NP-complete. For unlabeled graphs, we give an efficient (near-linear) algorithm and show that it gives solutions that are optimal modulo k, a guarantee that is novel in the literature. We examine anonymization both from its theoretical foundations and empirically, showing that our proposed algorithms for anonymization maintain structural properties shown to be necessary for graph analysis. / Graduate
560

Psychology of Ownership and Asset Defense: Why People Value their Personal Information Beyond Privacy

Spiekermann, Sarah, Korunovska, Jana, Bauer, Christine 12 1900 (has links) (PDF)
Analysts, investors and entrepreneurs have for long recognized the value of comprehensive user profiles. While there is a market for trading such personal information among companies, the users, who are actually the providers of such information, are not asked to the negotiations table. To date, there is little information on how users value their personal information. In an online survey-based experiment 1059 Facebook users revealed how much they would be willing to pay for keeping their personal information. Our study reveals that as soon as people learn that some third party is interested in their personal information (asset consciousness prime), the value their information to a much higher degree than without this prime and start to defend their asset. Furthermore, we found that people develop a psychology of ownership towards their personal information. In fact, this construct is a significant contributor to information valuation, much higher than privacy concerns. (author's abstract)

Page generated in 0.0551 seconds