31 |
Ontologiebasierte Indexierung und Kontextualisierung multimedialer Dokumente für das persönliche WissensmanagementMitschick, Annett 26 February 2010 (has links)
Die Verwaltung persönlicher, multimedialer Dokumente kann mit Hilfe semantischer Technologien und Ontologien intelligent und effektiv unterstützt werden. Dies setzt jedoch Verfahren voraus, die den grundlegenden Annotations- und Bearbeitungsaufwand für den Anwender minimieren und dabei eine ausreichende Datenqualität und -konsistenz sicherstellen. Im Rahmen der Dissertation wurden notwendige Mechanismen zur semi-automatischen Modellierung und Wartung semantischer Dokumentenbeschreibungen spezifiziert. Diese bildeten die Grundlage für den Entwurf einer komponentenbasierten, anwendungsunabhängigen Architektur als Basis für die Entwicklung innovativer, semantikbasierter Lösungen zur persönlichen Dokumenten- und Wissensverwaltung. / Personal multimedia document management benefits from Semantic Web technologies and the application of ontologies. However, an ontology-based document management system has to meet a number of challenges regarding flexibility, soundness, and controllability of the semantic data model. The first part of the dissertation proposes necessary mechanisms for the semi-automatic modeling and maintenance of semantic document descriptions. The second part introduces a component-based, application-independent architecture which forms the basis for the development of innovative, semantic-driven solutions for personal document and information management.
|
32 |
Multidimensional epidemiological transformations : addressing location-privacy in public health practiceAbdel Malik, Philip January 2011 (has links)
The ability to control one’s own personally identifiable information is a worthwhile human right that is becoming increasingly vulnerable. However just as significant, if not more so, is the right to health. With increasing globalisation and threats of natural disasters and acts of terrorism, this right is also becoming increasingly vulnerable. Public health practice – which is charged with the protection, promotion and mitigation of the health of society and its individuals – has been at odds with the right to privacy. This is particularly significant when location privacy is under consideration. Spatial information is an important aspect of public health, yet the increasing availability of spatial imagery and location-sensitive applications and technologies has brought location-privacy to the forefront, threatening to negatively impact the practice of public health by inhibiting or severely limiting data-sharing. This study begins by reviewing the current relevant legislation as it pertains to public health and investigates the public health community’s perceptions on location privacy barriers to the practice. Bureaucracy and legislation are identified by survey participants as the two greatest privacy-related barriers to public health. In response to this clash, a number of solutions and workarounds are proposed in the literature to compensate for location privacy. However, as their weaknesses are outlined, a novel approach - the multidimensional point transform - that works synergistically on multiple dimensions, including location, to anonymise data is developed and demonstrated. Finally, a framework for guiding decisions on data-sharing and identifying requirements is proposed and a sample implementation is demonstrated through a fictitious scenario. For each aspect of the study, a tool prototype and/or design for implementation is proposed and explained, and the need for further development of these is highlighted. In summary, this study provides a multi-disciplinary and multidimensional solution to the clash between privacy and data-sharing in public health practice.
|
33 |
A Personal Documenation System for Scholars: A Tool for ThinkingBurkett, Leslie Stewart 12 1900 (has links)
This exploratory research focused on a problem stated years ago by Vannevar Bush: "The problem is how creative men think, and what can be done to help them think." The study explored the scholarly work process and the use of computer tools to augment thinking. Based on a review of several related literatures, a framework of 7 major categories and 28 subcategories of scholarly thinking was proposed. The literature was used to predict problems scholars have in organizing their information, potential solutions, and specific computer tool features to augment scholarly thinking. Info Select, a personal information manager with most of these features (text and outline processing, sophisticated searching and organizing), was chosen as a potential tool for thinking. The study looked at how six scholars (faculty and doctoral students in social science fields at three universities) organized information using Info Select as a personal documentation system for scholarly work. These multiple case studies involved four in-depth, focused interviews, written evaluations, direct observation, and analysis of computer logs and files collected over a 3- to 6-month period. A content analysis of interviews and journals supported the proposed AfFORD-W taxonomy: Scholarly work activities consisted of Adding, Filing, Finding, Organizing, Reminding, and Displaying information to produce a Written product. Very few activities fell outside this framework, and activities were distributed evenly across all categories. Problems, needs, and likes mentioned by scholars, however, clustered mainly in the filing, finding, and organizing categories. All problems were related to human memory. Both predictions and research findings imply a need for tools that support information storage and retrieval in personal documentation systems, for references and notes, with fast and easy input of source material. A computer tool for thinking should support categorizing and organizing, reorganizing and transporting information. It should provide a simple search engine and support rapid scanning. The research implies the need for tools that provide better affordances for scholarly thinking activities.
|
34 |
Selecting Online Vendors by Privacy RisksRaza, Syed Qamar 01 January 2012 (has links)
Many people have growing concerns about privacy issues, especially the treatment of personal information. Other researchers have demonstrated that consumers do not effectively use privacy policies while shopping online. Current research tends to focus on the contents of Online Privacy Policy (OPP). Often the OPP contains items to meet vendor interests rather than consumer concerns, such as how well the OPP reduces privacy risk. Moreover, various approaches interpret the contents of the OPP rather than the OPP effects on reducing privacy risk. These approaches have not made a substantial impact on consumer selection of a vendor.
The research distinguished two types of Privacy Protection Information (PPI): the level of Vendor Privacy Risk (V) added by vendor practices allowed by the OPP and the level of Online Privacy Risk (O) not reduced by the OPP. A survey presented for each vendor the two types of PPI together with a product price.
The results indicate that the respondents readily used PPI and preferred to have no Online Privacy Risk rather than no Vendor Privacy Risk. Of the six demographics attributes of the respondent, only the frequency of online shopping and the concern for privacy significantly increased the use of PPI. Recommendations were made for future research.
|
35 |
Från en ung kvinnas synsätt : En kvalitativ studie om personlig integritet på sociala medier / From a young woman's perspective : A qualitative study about personal integrity on social mediaOhlsson, Annie January 2016 (has links)
Even though lots of social media companies do not utilize all the information collected by the end-users today, no one knows what type of information they may want in the future. Accepting an End-User License Agreement (EULA) may imply that the company has the permission to gather any personal information, without having to ask for the end-users permission again as the information is already being stored in the database of the company. Young women is today one of the groups that is sharing, publishing and consuming the most information on social media. For that reason it is intreguing to study how young women are relating to the personal integrity on social media. The study concludes that there is a wide variation of how the women relates to integrity on the social media.
|
36 |
Building an application for the writing processLele, Amod Jayant 18 November 2016 (has links)
The idea that writing is a process and not a product is now generally accepted in writing education, but discussions of digital scholarly communication often neglect the idea, in theory and in practice. This thesis report introduces a Mac OS X software package to support the early stages of the writing process, called Brouillon. Brouillon’s features include: the concatenation of discrete note files into notebooks; notes appearing in multiple notebooks; note intake from mobile devices via Dropbox; and an open standard file format. The report also provides a model of the organization of products of the writing process, with a focus on Brouillon’s most unusual feature, multi-notebook notes. It discusses difficulties in implementation and identifies possibilities for future improvement.
|
37 |
Security, Privacy, and Transparency Guarantees for Machine Learning SystemsLecuyer, Mathias January 2019 (has links)
Machine learning (ML) is transforming a wide range of applications, promising to bring immense economic and social benefits. However, it also raises substantial security, privacy, and transparency challenges. ML workloads indeed push companies toward aggressive data collection and loose data access policies, placing troves of sensitive user information at risk if the company is hacked. ML also introduces new attack vectors, such as adversarial example attacks, which can completely nullify models’ accuracy under attack. Finally, ML models make complex data-driven decisions, which are opaque to the end-users, and difficult to inspect for programmers. In this dissertation we describe three systems we developed. Each system addresses a dimension of the previous challenges, by combining new practical systems techniques with rigorous theory to achieve a guaranteed level of protection, and make systems easier to understand. First we present Sage, a differentially private ML platform that enforces a meaningful protection semantic for the troves of personal information amassed by today’s companies. Second we describe PixelDP, a defense against adversarial examples that leverages differential privacy theory to provide a guaranteed level of accuracy under attack. Third we introduce Sunlight, a tool to enhance the transparency of opaque targeting services, using rigorous causal inference theory to explain targeting decisions to end-users.
|
38 |
Samlingen som verktyg : Personal Information Management och konstnärers personliga samlingar / The Collection as Tool : Personal Information Management and Artists’ Personal CollectionsEriksen, Jon January 2012 (has links)
The study set out to find how artists organize and use their personal collections from a Personal Information Management (PIM) perspective, and how that use affects their practice and their art production. A secondary object of the study was to articulate the ways that personal collections are utilized as tools by creative users. The empirical data consisted of five qualitative, semi-structured interviews with Swedish and Norwegian sound artists. The constant comparative method was used for analysis, and Activity Theory was used as a theore- tical framework for the study. The study concluded that artists’ personal collections, while diverse in content and structure, serve the same functions as tools in creative processes, and that attention to the uses of personal collections highlight needs that could be better met by integrated PIM-functionality. The study also concluded that artists constitute an underutilized resource for future PIM-research and that artists’ personal collection use provides insight into creative use of collections, and highlights potential direc- tions for future development of PIM tools. This paper is a two years master’s thesis in Library and Information Science.
|
39 |
Ett förlorat kulturarv? : Digitala personarkiv – problem, lösningar och framtid / A Lost Cultural Heritage? : Digital Personal Archives – Problems, Solutions and FutureJansson, Ina-Maria January 2012 (has links)
This thesis has focused on digital born personal archives; how they are different from analog paper archives and possible ways to overbridge these differences. It is also studied how archivists and librarians are dealing with digital archives, what they think about new proactive solutions when collecting private papers and collections and positive and negative effects with this way to work. The thesis is delimitated to only private collections and digital created material. It do not concern digitized material or electronic documents in government or business organizations. The challenges in digital curation and administration are discussed in aspect of the Records Continuum Model. The empirical material is also put in relation to research in Personal Information Management and identity theory. Two qualitative methods have been used, a case study of an authors personal electronic archive and five deep-going interviews with archivists and librarians working with personal collections in university libraries. This study shows that many difficulties and problems displayed in the electronic archive could be solved in the future with a more proactive approach and early cooperation with the collector. By educating and informing creators of personal records about file formats, archival structure and the need of them to engage in their own collection, more personal digital records could be preserved. Librarians and archivists are imagining more proactive work in the future but are also asking for other solutions. A lot of the challenges united with electronic personal archives are associated with lacking continuity which is a reason to use the Records Continuum Model to explain and work with personal digital collections. This is a two year master’s thesis in archival science.
|
40 |
Copyright in Social Media : A Preparatory Study in Access to Protected YouTube ClipsVintersvärd, Anna January 2011 (has links)
Social media, such as YouTube, contain different types of information provided by the users. Because of the popularity and ability to reach out to others, coprorations might want to use this information in its advertising. However, some of the information is copyright protected works. How can a coproration use the limitations in the copyright protection to its advantage? Even when it is allowed to use the work with regard to the limitations in the copyright protection, attention must be paid to personal information and marketing provisions. This bachelor's thesis disclosures the method by which a work or the information is legally eccessed for advertising purposes.
|
Page generated in 0.1319 seconds