Submit Search
Upload
Privacy Management and the Social Web
•
Download as PPT, PDF
•
2 likes
•
448 views
Jan Schmidt
Follow
Presentation at the General Online Research (GOR) Conference, 12th march 2008, Hamburg
Read less
Read more
Technology
Report
Share
Report
Share
1 of 19
Download now
Recommended
These are the slides from my part of the panel presentation at the College of Law Practice Management Futures Conference at Georgetown Law, October 26, 2012.
Consumer Law Revolution - Online Marketing Tools
Consumer Law Revolution - Online Marketing Tools
Stephanie Kimbro Dolin
NCSU MGD thesis proposal
Thesis proposal v3
Thesis proposal v3
lroddesign
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
IJMER
On Social Websites
On Social Websites
Avani Shah
Slides from the event on Researching Social Media: A Theoretical & Practical Overview, May 2017, #smsheff
Researching social media
Researching social media
Chrysi Dagoula
Summary of my Doctoral Research, Interests
Summary of my Doctoral Research, Interests
Meena Nagarajan
11 info architecture
11 info architecture
Dr. V Vorvoreanu
Survey of the social networks with strengths and weaknesses for business application. 2/09
Future or Fad: Social Networks for Business Applications
Future or Fad: Social Networks for Business Applications
bidbetter
Recommended
These are the slides from my part of the panel presentation at the College of Law Practice Management Futures Conference at Georgetown Law, October 26, 2012.
Consumer Law Revolution - Online Marketing Tools
Consumer Law Revolution - Online Marketing Tools
Stephanie Kimbro Dolin
NCSU MGD thesis proposal
Thesis proposal v3
Thesis proposal v3
lroddesign
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
IJMER
On Social Websites
On Social Websites
Avani Shah
Slides from the event on Researching Social Media: A Theoretical & Practical Overview, May 2017, #smsheff
Researching social media
Researching social media
Chrysi Dagoula
Summary of my Doctoral Research, Interests
Summary of my Doctoral Research, Interests
Meena Nagarajan
11 info architecture
11 info architecture
Dr. V Vorvoreanu
Survey of the social networks with strengths and weaknesses for business application. 2/09
Future or Fad: Social Networks for Business Applications
Future or Fad: Social Networks for Business Applications
bidbetter
Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1
Ram Srivastava
project in Ethec
The social media
The social media
mitchaygwapahay
Learn the key SEC, FINRA & FTC + more regulations governing the financial services industry, the growing use of online properties in litigation, and how to accurately collect your website & social media records for full compliance and litigation preparation.
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
Michael Riedijk
The application of netnography to the online dating service experiences of female users
Netnography in online dating services
Netnography in online dating services
Danish Ilyas
This presentation describes theories & advantages of Web 2.0 Marketing
Web 2.0 marketing
Web 2.0 marketing
Darshana891107
This is an introduction to social media for early career researchers. Free MP3 Podcast reveals how to use social media to sell more stuff. Find out more at www.sociamigo.com/mp3
Social Media for Researchers
Social Media for Researchers
sociamigo
Presentation at 1st World Summit on the Knowledge Society, Athens, Greece, Sept 2008
Inclusive Social Tagging
Inclusive Social Tagging
Michael Derntl
Social network
Social network
Kishob K Krishnan
Overview of the C2PA technical specifications and the harms and misuse assessment
C2PA Specifications and Harms and Misuse Assessment
C2PA Specifications and Harms and Misuse Assessment
JacoboCastellanos2
ISOJ 2011
Bachmann harlow2011
Bachmann harlow2011
Knight Center
iwer4uj46 ryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhw ryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhw
Web 2thtrtgrst
Web 2thtrtgrst
Only1Sam
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
dariphagen
Review of a paper presented to EECE 519 class.
Footprints: History-Rich Tools for Information Foraging (Wexelblat & Maes, 1999)
Footprints: History-Rich Tools for Information Foraging (Wexelblat & Maes, 1999)
desy
by Clara Ko
Introduction to Web 2.0
Introduction to Web 2.0
EPWN
Presentation for the panel discussion at the 5th AIS SIGPrag International Pragmatic Web Conference Track of I-SEMANTICS, Graz, Austria, Sep 1 2010 http://bit.ly/9U31KO
What's up with the Pragmatic Web?
What's up with the Pragmatic Web?
CommunitySense
The growth of social media—online sites driven by the public sharing on personal information with a wide audience—raises new questions related to how individuals manage their privacy and self-presentation. The technical features of sites such as Facebook, Google Plus, and Twitter lower the transaction costs of connecting and interacting with a large and diverse audience. At the same time, they may raise the costs of managing self-presentation across different contexts and ensuring that private information is not shared with unintended audiences. Discussions related to self-presentation and privacy have featured prominently in the social sciences for more than half a century. For example, Goffman (1959) argued that individuals’ self-presentation varies based on the audience for whom they are performing. Likewise, Altman (1975) viewed privacy not as a static process, but one of dynamic boundary regulation, in which individuals make decisions regarding which pieces of personal information to share with whom, as well as the context in which that information is disclosed. In online social networking communities, additional social and technical features make the process of managing privacy and self-presentation more complicated. Unlike anonymous forums, where users can create virtual identities not connected to their “real” selves, SNSs are tied to real identities, and because users often share a significant amount of personal information through these sites (Nosko et al., 2010), privacy becomes a critical element to determining both who to connect with and what to disclose. Boyd (2008) characterizes SNSs as “networked publics,” and describes three features that differentiate them from other publics: invisible audiences, context collapse, and the blurring of public and private. Each of these factors is critical in evaluating how individuals can regulate boundaries and get the most out of their use of these sites. Context collapse—the flattening of multiple distinct audiences into a homogeneous group—offers benefits and barriers to individuals. The average American adult has 229 Facebook “friends” (Hampton et al., 2011) who comprise a variety of personal and professional contexts. While Facebook enables users to quickly diffuse information across their entire network, communicating with such a diverse set of others through the same channel (e.g., status updates) may become problematic when it prevents individuals from varying their self-presentation for different audiences or when their full audience is unclear. When facing these challenges, individuals have a number of options. Bernie Hogan (2010) suggests that users employ a “lowest common denominator” approach, whereby only content appropriate for all audiences is shared on the site. On the other hand, users may employ advanced privacy settings to segregate audiences, so they can still share relevant content with their various connections.
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook Age
Jessica Vitak
BY TOMLIVRE
Planeta terra
Planeta terra
G. Gomes
ABSTRACT: One of the most interesting features of social media sites is that they provide both private and public contexts in which to share messages. Studies have suggested that people perceive interpersonal messages differently based on this characteristic, but less is known about how people may intend to respond to messages based on their access exclusivity. Building upon a previous study in this area, the current study examined people’s responses to a hypothetical situation in which they received a negative interpersonal disclosure of varying intensity either publicly or privately through Facebook. Data suggest that privately-disclosed messages elicited more uncertainty and more uncertainty reduction behaviors. Publicly-disclosed messages caused recipients to feel more offended about the content, express privacy violation concerns, and delete the offending content. These findings are discussed for their theoretical value, and limitations and directions for future research are as well. Goldman, Z., Bowman, N. D., & Westerman, D. (2013, April).“You need to back off:” Utilizing communication privacy management theory to explore responses to public and private interpersonal disclosures on Facebook. Paper presented at the Broadcast Education Association Research Symposium “Media and Social Life: The Self, Relationships, and Society,” Las Vegas.
“You Need to Back Off”: Utilizing Communication Privacy Management Theory to ...
“You Need to Back Off”: Utilizing Communication Privacy Management Theory to ...
West Virginia University - Department of Communication Studies
"Youth Communication and Privacy in the Social Media Age" presentation given at the American Library Association's youth privacy conference in Chicago on March 24, 2011.
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media Age
Nathan Wright
Communication privacy management theory_day
Communication privacy management theory_day
kelseyday
Presentasi Communication Privacy Management Theory oleh Nabila Ashriyanti Mankom A Fikom Unpad
Communication Privacy Management Theory
Communication Privacy Management Theory
mankoma2012
Lindsay's Theory Presentation for Comm 201.
Communication Privacy Management Theory
Communication Privacy Management Theory
mlodom
More Related Content
What's hot
Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1
Ram Srivastava
project in Ethec
The social media
The social media
mitchaygwapahay
Learn the key SEC, FINRA & FTC + more regulations governing the financial services industry, the growing use of online properties in litigation, and how to accurately collect your website & social media records for full compliance and litigation preparation.
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
Michael Riedijk
The application of netnography to the online dating service experiences of female users
Netnography in online dating services
Netnography in online dating services
Danish Ilyas
This presentation describes theories & advantages of Web 2.0 Marketing
Web 2.0 marketing
Web 2.0 marketing
Darshana891107
This is an introduction to social media for early career researchers. Free MP3 Podcast reveals how to use social media to sell more stuff. Find out more at www.sociamigo.com/mp3
Social Media for Researchers
Social Media for Researchers
sociamigo
Presentation at 1st World Summit on the Knowledge Society, Athens, Greece, Sept 2008
Inclusive Social Tagging
Inclusive Social Tagging
Michael Derntl
Social network
Social network
Kishob K Krishnan
Overview of the C2PA technical specifications and the harms and misuse assessment
C2PA Specifications and Harms and Misuse Assessment
C2PA Specifications and Harms and Misuse Assessment
JacoboCastellanos2
ISOJ 2011
Bachmann harlow2011
Bachmann harlow2011
Knight Center
iwer4uj46 ryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhw ryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhwryhuet4w4ujhw
Web 2thtrtgrst
Web 2thtrtgrst
Only1Sam
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
dariphagen
Review of a paper presented to EECE 519 class.
Footprints: History-Rich Tools for Information Foraging (Wexelblat & Maes, 1999)
Footprints: History-Rich Tools for Information Foraging (Wexelblat & Maes, 1999)
desy
by Clara Ko
Introduction to Web 2.0
Introduction to Web 2.0
EPWN
Presentation for the panel discussion at the 5th AIS SIGPrag International Pragmatic Web Conference Track of I-SEMANTICS, Graz, Austria, Sep 1 2010 http://bit.ly/9U31KO
What's up with the Pragmatic Web?
What's up with the Pragmatic Web?
CommunitySense
What's hot
(15)
Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1
The social media
The social media
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
Netnography in online dating services
Netnography in online dating services
Web 2.0 marketing
Web 2.0 marketing
Social Media for Researchers
Social Media for Researchers
Inclusive Social Tagging
Inclusive Social Tagging
Social network
Social network
C2PA Specifications and Harms and Misuse Assessment
C2PA Specifications and Harms and Misuse Assessment
Bachmann harlow2011
Bachmann harlow2011
Web 2thtrtgrst
Web 2thtrtgrst
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
Footprints: History-Rich Tools for Information Foraging (Wexelblat & Maes, 1999)
Footprints: History-Rich Tools for Information Foraging (Wexelblat & Maes, 1999)
Introduction to Web 2.0
Introduction to Web 2.0
What's up with the Pragmatic Web?
What's up with the Pragmatic Web?
Viewers also liked
The growth of social media—online sites driven by the public sharing on personal information with a wide audience—raises new questions related to how individuals manage their privacy and self-presentation. The technical features of sites such as Facebook, Google Plus, and Twitter lower the transaction costs of connecting and interacting with a large and diverse audience. At the same time, they may raise the costs of managing self-presentation across different contexts and ensuring that private information is not shared with unintended audiences. Discussions related to self-presentation and privacy have featured prominently in the social sciences for more than half a century. For example, Goffman (1959) argued that individuals’ self-presentation varies based on the audience for whom they are performing. Likewise, Altman (1975) viewed privacy not as a static process, but one of dynamic boundary regulation, in which individuals make decisions regarding which pieces of personal information to share with whom, as well as the context in which that information is disclosed. In online social networking communities, additional social and technical features make the process of managing privacy and self-presentation more complicated. Unlike anonymous forums, where users can create virtual identities not connected to their “real” selves, SNSs are tied to real identities, and because users often share a significant amount of personal information through these sites (Nosko et al., 2010), privacy becomes a critical element to determining both who to connect with and what to disclose. Boyd (2008) characterizes SNSs as “networked publics,” and describes three features that differentiate them from other publics: invisible audiences, context collapse, and the blurring of public and private. Each of these factors is critical in evaluating how individuals can regulate boundaries and get the most out of their use of these sites. Context collapse—the flattening of multiple distinct audiences into a homogeneous group—offers benefits and barriers to individuals. The average American adult has 229 Facebook “friends” (Hampton et al., 2011) who comprise a variety of personal and professional contexts. While Facebook enables users to quickly diffuse information across their entire network, communicating with such a diverse set of others through the same channel (e.g., status updates) may become problematic when it prevents individuals from varying their self-presentation for different audiences or when their full audience is unclear. When facing these challenges, individuals have a number of options. Bernie Hogan (2010) suggests that users employ a “lowest common denominator” approach, whereby only content appropriate for all audiences is shared on the site. On the other hand, users may employ advanced privacy settings to segregate audiences, so they can still share relevant content with their various connections.
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook Age
Jessica Vitak
BY TOMLIVRE
Planeta terra
Planeta terra
G. Gomes
ABSTRACT: One of the most interesting features of social media sites is that they provide both private and public contexts in which to share messages. Studies have suggested that people perceive interpersonal messages differently based on this characteristic, but less is known about how people may intend to respond to messages based on their access exclusivity. Building upon a previous study in this area, the current study examined people’s responses to a hypothetical situation in which they received a negative interpersonal disclosure of varying intensity either publicly or privately through Facebook. Data suggest that privately-disclosed messages elicited more uncertainty and more uncertainty reduction behaviors. Publicly-disclosed messages caused recipients to feel more offended about the content, express privacy violation concerns, and delete the offending content. These findings are discussed for their theoretical value, and limitations and directions for future research are as well. Goldman, Z., Bowman, N. D., & Westerman, D. (2013, April).“You need to back off:” Utilizing communication privacy management theory to explore responses to public and private interpersonal disclosures on Facebook. Paper presented at the Broadcast Education Association Research Symposium “Media and Social Life: The Self, Relationships, and Society,” Las Vegas.
“You Need to Back Off”: Utilizing Communication Privacy Management Theory to ...
“You Need to Back Off”: Utilizing Communication Privacy Management Theory to ...
West Virginia University - Department of Communication Studies
"Youth Communication and Privacy in the Social Media Age" presentation given at the American Library Association's youth privacy conference in Chicago on March 24, 2011.
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media Age
Nathan Wright
Communication privacy management theory_day
Communication privacy management theory_day
kelseyday
Presentasi Communication Privacy Management Theory oleh Nabila Ashriyanti Mankom A Fikom Unpad
Communication Privacy Management Theory
Communication Privacy Management Theory
mankoma2012
Lindsay's Theory Presentation for Comm 201.
Communication Privacy Management Theory
Communication Privacy Management Theory
mlodom
Powerpoint
Powerpoint
kelseywoj
Portfolio
Portfolio
Lauren Mathis
The slide is all about Healthcare Marketing. How you can develop marketing strategies in healthcare market. Healthcare is booming industry & in accordance with marketing concepts it is very necessary to do marketing of services.
PPT on Health care marketing
PPT on Health care marketing
Aalok Chauhan
Comm201_Presentation_Chappell
Comm201_Presentation_Chappell
ChristaC29
Viewers also liked
(11)
Managing Privacy and Context Collapse in the Facebook Age
Managing Privacy and Context Collapse in the Facebook Age
Planeta terra
Planeta terra
“You Need to Back Off”: Utilizing Communication Privacy Management Theory to ...
“You Need to Back Off”: Utilizing Communication Privacy Management Theory to ...
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media Age
Communication privacy management theory_day
Communication privacy management theory_day
Communication Privacy Management Theory
Communication Privacy Management Theory
Communication Privacy Management Theory
Communication Privacy Management Theory
Powerpoint
Powerpoint
Portfolio
Portfolio
PPT on Health care marketing
PPT on Health care marketing
Comm201_Presentation_Chappell
Comm201_Presentation_Chappell
Similar to Privacy Management and the Social Web
Presentation/Lecture given at Center for Industrial Production - November 2008
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0
Thomas Ryberg
http://www.iosrjournals.org/iosr-jce/pages/v10i6.html
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
Presentation at the "Media Logics Revisited" Conference, Bonn, 22.09.2015
Modelling the Media Logic of Software Systems
Modelling the Media Logic of Software Systems
Jan Schmidt
Do we have online privacy? And what is privacy anyway in an online context? This work aim at discovering what footprints users leave online and how these represent a threat to privacy.
Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.
Silvia Puglisi
Short Presentation for the Facebook Developer Garage in Hamburg
Facebook_Developer_Garage_Hamburg_2008
Facebook_Developer_Garage_Hamburg_2008
Jan Schmidt
COMMENTARY Virtual Boundaries: Ethical Considerations for Use of Social Media in Social Work Ericka Kimball and JaeRan Kim S ociety has become more interactive through increased access and use of the Internet and social media tools. Web 2.0 moved the Internet beyond information storage to a place where discourse takes place (Sawmiller, 2010). Social media, Internet tools that facUitate online interactions, have the potential to further expand such discourses. Social networks (for example, Facebook, Google + , Linkedin), blogs (for exam- ple, Wordpress, Typepad), and microblogs (for example. Twitter, Tumblr) are types of social media tools that allow people to connect and share infomiation in an onhne space. People use social media tools to report information, present opin- ions, and solicit convenation through their own domains or dedicated websites. All of this online interaction, enabled further by increases in smart- phone and networked tablet devise usage, poses the potential for personal and professional lives to cross in social media spaces. Existing literature has focused on the ethical challenges of social media in professional practice with clients, use of social media as an expansion of research, and for online learning (Eccles, 2010; Giffords, 2009; NASW & Associarion of Social Work Boards [ASWB], 2005). However, the con- versation around ethical use of social media, out- side the client—professional relationship, is missing. Areas in which greater discussion is needed include advising students and setting agency pohcies on ethical uses of social media and on the effects of personal use of social media among professional relationships. This article is about creating virtual boundaries— the limits social workers place to guide their social media use—to create intentional online personas and about the effects of social media use in the intemiingling of personal and professional lives. Social workers need to be aware of the identities they create and maintain in the realm of social media because of ethical codes and policies. The various forms and uses of social media are discussed to provide an understanding of the benefits and consequences of social media. An overview of eth- ical considerations is presented along with recom- mendations on creating virtual boundaries for personal and professional use of social media. FORMS AND USES OF SOCIAL MEDIA Although the forms and uses of social media are constantly changing, blogs, microblogs, and social networking sites have proved to be some of the more popular social media tools over the last sev- eral years. Other social media tools, such as virtual world games, photo sharing, and information management sites, may be lesser-used tools but are StiU important to consider when setting virtual boundaries. Blog and Microblog A blog (or Weblog) is defined as an online journal of personal reñections, opinions, and comments. Microblog content may also include personal reflec- tions, opin.
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
drandy1
COMMENTARY Virtual Boundaries: Ethical Considerations for Use of Social Media in Social Work Ericka Kimball and JaeRan Kim S ociety has become more interactive through increased access and use of the Internet and social media tools. Web 2.0 moved the Internet beyond information storage to a place where discourse takes place (Sawmiller, 2010). Social media, Internet tools that facUitate online interactions, have the potential to further expand such discourses. Social networks (for example, Facebook, Google + , Linkedin), blogs (for exam- ple, Wordpress, Typepad), and microblogs (for example. Twitter, Tumblr) are types of social media tools that allow people to connect and share infomiation in an onhne space. People use social media tools to report information, present opin- ions, and solicit convenation through their own domains or dedicated websites. All of this online interaction, enabled further by increases in smart- phone and networked tablet devise usage, poses the potential for personal and professional lives to cross in social media spaces. Existing literature has focused on the ethical challenges of social media in professional practice with clients, use of social media as an expansion of research, and for online learning (Eccles, 2010; Giffords, 2009; NASW & Associarion of Social Work Boards [ASWB], 2005). However, the con- versation around ethical use of social media, out- side the client—professional relationship, is missing. Areas in which greater discussion is needed include advising students and setting agency pohcies on ethical uses of social media and on the effects of personal use of social media among professional relationships. This article is about creating virtual boundaries— the limits social workers place to guide their social media use—to create intentional online personas and about the effects of social media use in the intemiingling of personal and professional lives. Social workers need to be aware of the identities they create and maintain in the realm of social media because of ethical codes and policies. The various forms and uses of social media are discussed to provide an understanding of the benefits and consequences of social media. An overview of eth- ical considerations is presented along with recom- mendations on creating virtual boundaries for personal and professional use of social media. FORMS AND USES OF SOCIAL MEDIA Although the forms and uses of social media are constantly changing, blogs, microblogs, and social networking sites have proved to be some of the more popular social media tools over the last sev- eral years. Other social media tools, such as virtual world games, photo sharing, and information management sites, may be lesser-used tools but are StiU important to consider when setting virtual boundaries. Blog and Microblog A blog (or Weblog) is defined as an online journal of personal reñections, opinions, and comments. Microblog content may also include personal reflec- tions, opin.
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
cargillfilberto
Over the past few decades social networking connections through individuals and open publishing in general have rapidly became a popular tool for maintaining relationships, communicating and expanding businesses. Individuals invest hours in building social capital and their social identify (SID) via online engagements. We present a methodology to quantify the multitude of artifacts that can be derived from online social engagements and develop a framework that measures the value of an individual's online social engagements. ASID value is used to deliver a score for each individual user; a score that will assist you in understanding your return on investment (ROI)and social capital from your online social networking activities. The framework creates a score to support and determine which specific engagements add and increase your personal value chain. This score can provide benefit to users for career, personal, and business opportunities.
Determining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social Engagements
inventionjournals
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Jx2517481755
Jx2517481755
IJERA Editor
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Jx2517481755
Jx2517481755
IJERA Editor
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
MS Proposal
Proposal.docx
Proposal.docx
AmitabhSrivastava23
Presentation to WARC and ESOMAR digital conference on Web2.0. Processes for research innovation, technology and collective intelligence. Dr Mariann Hardey, Lecturer in Social Media Marketing, Durham Business School, University of Durham.
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.
Dr Mariann Hardey
BarCamp Galway / DERI, National University of Ireland, Galway / 22nd September 2007
The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for Semantics
John Breslin
Researching Social Media – Big Data and Social Media Analysis, presentation for the Social Media for Researchers: A Sheffield Universities Social Media Symposium, 23 September 2014
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
Farida Vis
few things about social networking
Social networking-overview
Social networking-overview
sakshicherry
Slides developed as part of DEVELOP project, focusing on political and sociological analysis of social capital, by David Barnard-Wills.
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
Trilateral Research
social media app
2_Doc5_2.pdf
2_Doc5_2.pdf
Ashishpal342837
Giuseppe Lugano, Jorma Kyppö and Pertti Saariluoma University of Jyväskylä, P.O.Box 35, (Agora), Jyväskylä, FINLAND
Designing People’s Interconnections in Mobile Social Networks
Designing People’s Interconnections in Mobile Social Networks
inscit2006
Assignment: Process Recordings A process recording is a written tool used by field education experience students, field instructors, and faculty to examine the dynamics of social work interactions in time. Process recordings can help in developing and refining interviewing and intervention skills. By conceptualizing and organizing ongoing activities with social work clients, you are able to clarify the purpose of interviews and interventions, identify personal and professional strengths and weaknesses, and improve self-awareness. The process recording is also a useful tool in exploring the interpersonal dynamics and values operating between you and the client system through an analysis of filtering the process used in recording a session. For this Assignment, you will submit a process recording of your field education experiences specific to diversity and cultural competence. The Assignment should be 3 to 4 pages using the process recordings template in the attachments. Make sure to use the Process Recordings Template in the attachments. Each question below needs to be answered.: · Provide a transcript of what happened during your field education experience, including a dialogue of interaction with a client. (Create a made up dialogue and scenario of interaction between Daniel the case worker and the family mentioned at the bottom of the instructions. Details of the family are at the bottom of the page.) · Explain your interpretation of what occurred in the dialogue, including social work practice theories, and explain how it might relate to diversity or cultural competence covered this week. · Describe your reactions and/or any issues related to your interaction with a client during your field education experience. (Use client’s at bottom of instructions.) · Explain how you applied social work practice skills when performing the activities during your process recording. Support your Assignment with specific references to the resources below to support your information. Be sure to provide full APA citations for your references. Gallina, N. (2010). Conflict between professional ethics and practice demands: Social workers' perceptions. Journal of Social Work Values and Ethics, 7(2), 1–9. Retrieved from http://www.socialworker.com/jswve/fall2010/f10conflict.pdf (IN ATTACHMENTS) Kimball, E., & Kim, J. (2013). Virtual boundaries: Ethical considerations for use of social media in social work. Social Work, 58(2), 185–188. (IN ATTACHMENTS) National Association of Social Workers. (2017). Code of ethics of the National Association of Social Workers. Retrieved from https://www.socialworkers.org/About/Ethics/Code-of-Ethics/Code-of-Ethics-English (VISIT WEBSITE) Information on Family to create dialogue for: Service to be Provided: Supervised visitation of Chistopher Cook and Luci Cook Spending time with their daughter Lucy Cook who is 8 months old. Christopher Cook is a 30 year old Somoan/Hawaiian male from a small town in I.
Assignment Process RecordingsA process recording is a written t.docx
Assignment Process RecordingsA process recording is a written t.docx
lynettearnold46882
Similar to Privacy Management and the Social Web
(20)
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
Modelling the Media Logic of Software Systems
Modelling the Media Logic of Software Systems
Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.
Facebook_Developer_Garage_Hamburg_2008
Facebook_Developer_Garage_Hamburg_2008
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
COMMENTARYVirtual Boundaries Ethical Considerations for.docx
Determining Strategic Value of Online Social Engagements
Determining Strategic Value of Online Social Engagements
Jx2517481755
Jx2517481755
Jx2517481755
Jx2517481755
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Proposal.docx
Proposal.docx
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.
The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for Semantics
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
Social networking-overview
Social networking-overview
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
2_Doc5_2.pdf
2_Doc5_2.pdf
Designing People’s Interconnections in Mobile Social Networks
Designing People’s Interconnections in Mobile Social Networks
Assignment Process RecordingsA process recording is a written t.docx
Assignment Process RecordingsA process recording is a written t.docx
More from Jan Schmidt
Lecture in the "IKMZ Speaker Series", 25.03.2019, University of Zurich
How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?
Jan Schmidt
Input Presentation at the „Computational Communication Science: Towards a Strategic Roadmap” conference in Hannover (http://ccsconf.com/), 15th Feb 2018
Big Data and Research Ethics
Big Data and Research Ethics
Jan Schmidt
Keynote bei der Herbsttagung der Sektion Medienpädagogik in der Deutschen Gesellschaft für Erziehungswissenschaft, 22.9.2017, Magdeburg
Kommunikationswissenschaftliche Onlineforschung
Kommunikationswissenschaftliche Onlineforschung
Jan Schmidt
Vortrag beim FSF Sommerforum, 15.6.2016, Berlin
Soziale Medien als Intermediäre der Meinungsbildung und Nachrichtenvermittlung
Soziale Medien als Intermediäre der Meinungsbildung und Nachrichtenvermittlung
Jan Schmidt
Vortrag beim Workshop "Bedeutung, Chancen und Risiken der sozialen Medien für die Wissenschaftskommunikation", Berlin, 18.3.2016
Soziale Medien als Intermediäre in der Wissenschaftskommunikation
Soziale Medien als Intermediäre in der Wissenschaftskommunikation
Jan Schmidt
Vortrag bei der Konferenz „Grenzenlose Sicherheit? – Gesellschaftliche Dimensionen der Sicherheitsforschung“ am 7.5.2015 in Berlein
Soziale Medien in Krisen und Katastrophenfällen
Soziale Medien in Krisen und Katastrophenfällen
Jan Schmidt
Results from a scientific study looking at petition data 2008-2013. Working Paper available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2444672
The E-Petition Platform of the German Bundestag
The E-Petition Platform of the German Bundestag
Jan Schmidt
Folien zur 12. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 4.7.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 13, Fazit
Vernetzte Öffentlichkeiten 2013, Sitzung 13, Fazit
Jan Schmidt
Folien zur 12. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 4.7.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 12, "Messen, Methoden, Big Data"
Vernetzte Öffentlichkeiten 2013, Sitzung 12, "Messen, Methoden, Big Data"
Jan Schmidt
Folien zur 11. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 27.6.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 11, "Vernetzte Öffentlichkeiten und ...
Vernetzte Öffentlichkeiten 2013, Sitzung 11, "Vernetzte Öffentlichkeiten und ...
Jan Schmidt
Folien zur 10. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 20.6.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 10, "Vernetzte Öffentlichkeiten und ...
Vernetzte Öffentlichkeiten 2013, Sitzung 10, "Vernetzte Öffentlichkeiten und ...
Jan Schmidt
Folien zur 9. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 13.6.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 9, "Kompetenzen in und für vernetzte...
Vernetzte Öffentlichkeiten 2013, Sitzung 9, "Kompetenzen in und für vernetzte...
Jan Schmidt
Folien zur 8. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 6.6.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 8, "Informationsfluss in vernetzten ...
Vernetzte Öffentlichkeiten 2013, Sitzung 8, "Informationsfluss in vernetzten ...
Jan Schmidt
Folien zur 7. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 30.5.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 7, Vernetzte Öffentlichkeiten und Jo...
Vernetzte Öffentlichkeiten 2013, Sitzung 7, Vernetzte Öffentlichkeiten und Jo...
Jan Schmidt
Folien zur 6. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 15.5.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 6, "Vernetzte Identitäten"
Vernetzte Öffentlichkeiten 2013, Sitzung 6, "Vernetzte Identitäten"
Jan Schmidt
Folien zur 4. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 15.4.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
Jan Schmidt
Folien zur 3. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 18.4.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 3, "Episoden Praktiken Strukturen"
Vernetzte Öffentlichkeiten 2013, Sitzung 3, "Episoden Praktiken Strukturen"
Jan Schmidt
Vernetzte Öffentlichkeiten 2013, Sitzung 2, Öffentlichkeit und Netzwerke
Vernetzte Öffentlichkeiten 2013, Sitzung 2, Öffentlichkeit und Netzwerke
Jan Schmidt
Folien zur 1. Sitzung der Vorlesung "Vernetzte Öffentlichkeiten", 4.4.2013, Uni Hamburg, http://www.schmidtmitdete.de/lehrwiki/index.php/Vernoeff13
Vernetzte Öffentlichkeiten 2013, Sitzung 1
Vernetzte Öffentlichkeiten 2013, Sitzung 1
Jan Schmidt
Poster by Sonja Utz & Jan-Hinrik Schmidt, European Communications Conference 2012, 25. October 2012, Istanbul
Audience management in social media: Affordances, cultural differences, and i...
Audience management in social media: Affordances, cultural differences, and i...
Jan Schmidt
More from Jan Schmidt
(20)
How do intermediaries shape information management and opinion formation online?
How do intermediaries shape information management and opinion formation online?
Big Data and Research Ethics
Big Data and Research Ethics
Kommunikationswissenschaftliche Onlineforschung
Kommunikationswissenschaftliche Onlineforschung
Soziale Medien als Intermediäre der Meinungsbildung und Nachrichtenvermittlung
Soziale Medien als Intermediäre der Meinungsbildung und Nachrichtenvermittlung
Soziale Medien als Intermediäre in der Wissenschaftskommunikation
Soziale Medien als Intermediäre in der Wissenschaftskommunikation
Soziale Medien in Krisen und Katastrophenfällen
Soziale Medien in Krisen und Katastrophenfällen
The E-Petition Platform of the German Bundestag
The E-Petition Platform of the German Bundestag
Vernetzte Öffentlichkeiten 2013, Sitzung 13, Fazit
Vernetzte Öffentlichkeiten 2013, Sitzung 13, Fazit
Vernetzte Öffentlichkeiten 2013, Sitzung 12, "Messen, Methoden, Big Data"
Vernetzte Öffentlichkeiten 2013, Sitzung 12, "Messen, Methoden, Big Data"
Vernetzte Öffentlichkeiten 2013, Sitzung 11, "Vernetzte Öffentlichkeiten und ...
Vernetzte Öffentlichkeiten 2013, Sitzung 11, "Vernetzte Öffentlichkeiten und ...
Vernetzte Öffentlichkeiten 2013, Sitzung 10, "Vernetzte Öffentlichkeiten und ...
Vernetzte Öffentlichkeiten 2013, Sitzung 10, "Vernetzte Öffentlichkeiten und ...
Vernetzte Öffentlichkeiten 2013, Sitzung 9, "Kompetenzen in und für vernetzte...
Vernetzte Öffentlichkeiten 2013, Sitzung 9, "Kompetenzen in und für vernetzte...
Vernetzte Öffentlichkeiten 2013, Sitzung 8, "Informationsfluss in vernetzten ...
Vernetzte Öffentlichkeiten 2013, Sitzung 8, "Informationsfluss in vernetzten ...
Vernetzte Öffentlichkeiten 2013, Sitzung 7, Vernetzte Öffentlichkeiten und Jo...
Vernetzte Öffentlichkeiten 2013, Sitzung 7, Vernetzte Öffentlichkeiten und Jo...
Vernetzte Öffentlichkeiten 2013, Sitzung 6, "Vernetzte Identitäten"
Vernetzte Öffentlichkeiten 2013, Sitzung 6, "Vernetzte Identitäten"
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
Vernetzte Öffentlichkeiten 2013, Sitzung 4, "Technische Grundlagen"
Vernetzte Öffentlichkeiten 2013, Sitzung 3, "Episoden Praktiken Strukturen"
Vernetzte Öffentlichkeiten 2013, Sitzung 3, "Episoden Praktiken Strukturen"
Vernetzte Öffentlichkeiten 2013, Sitzung 2, Öffentlichkeit und Netzwerke
Vernetzte Öffentlichkeiten 2013, Sitzung 2, Öffentlichkeit und Netzwerke
Vernetzte Öffentlichkeiten 2013, Sitzung 1
Vernetzte Öffentlichkeiten 2013, Sitzung 1
Audience management in social media: Affordances, cultural differences, and i...
Audience management in social media: Affordances, cultural differences, and i...
Recently uploaded
In this talk, we are going to cover the use-case of food image generation at Delivery Hero, its impact and the challenges. In particular, we will present our image scoring solution for filtering out inappropriate images and elaborate on the models we are using.
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Presented by Mike Hicks
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Effective data discovery is crucial for maintaining compliance and mitigating risks in today's rapidly evolving privacy landscape. However, traditional manual approaches often struggle to keep pace with the growing volume and complexity of data. Join us for an insightful webinar where industry leaders from TrustArc and Privya will share their expertise on leveraging AI-powered solutions to revolutionize data discovery. You'll learn how to: - Effortlessly maintain a comprehensive, up-to-date data inventory - Harness code scanning insights to gain complete visibility into data flows leveraging the advantages of code scanning over DB scanning - Simplify compliance by leveraging Privya's integration with TrustArc - Implement proven strategies to mitigate third-party risks Our panel of experts will discuss real-world case studies and share practical strategies for overcoming common data discovery challenges. They'll also explore the latest trends and innovations in AI-driven data management, and how these technologies can help organizations stay ahead of the curve in an ever-changing privacy landscape.
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
ICT role in 21 century education. How to ICT help in education
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Passkeys: Developing APIs to enable passwordless authentication Cody Salas, Sr Developer Advocate | Solutions Architect - Yubico Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
ICT role in education and it's challenges. In which we learn about ICT, it's impact, benefits and challenges.
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Workshop Build With AI - Google Developers Group Rio Verde
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Corporate and higher education. Two industries that, in the past, have had a clear divide with very little crossover. The difference in goals, learning styles and objectives paved the way for differing learning technologies platforms to evolve. Now, those stark lines are blurring as both sides are discovering they have content that’s relevant to the other. Join Tammy Rutherford as she walks through the pros and cons of corporate and higher ed collaborating. And the challenges of these different technology platforms working together for a brighter future.
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving. A report by Poten & Partners as part of the Hydrogen Asia 2024 Summit in Singapore. Copyright Poten & Partners 2024.
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
In the thrilling conclusion to 2023, ransomware groups had a banner year, really outdoing themselves in the "make everyone's life miserable" department. LockBit 3.0 took gold in the hacking olympics, followed by the plucky upstarts Clop and ALPHV/BlackCat. Apparently, 48% of organizations were feeling left out and decided to get in on the cyber attack action. Business services won the "most likely to get digitally mugged" award, with education and retail nipping at their heels. Hackers expanded their repertoire beyond boring old encryption to the much more exciting world of extortion. The US, UK and Canada took top honors in the "countries most likely to pay up" category. Bitcoins were the currency of choice for discerning hackers, because who doesn't love untraceable money?
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
DBX 1Q24 Investor Presentation
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Presentation from Melissa Klemke from her talk at Product Anonymous in April 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Following the popularity of “Cloud Revolution: Exploring the New Wave of Serverless Spatial Data,” we’re thrilled to announce this much-anticipated encore webinar. In this sequel, we’ll dive deeper into the Cloud-Native realm by uncovering practical applications and FME support for these new formats, including COGs, COPC, FlatGeoBuf, GeoParquet, STAC, and ZARR. Building on the foundation laid by industry leaders Michelle Roby of Radiant Earth and Chris Holmes of Planet in the first webinar, this second part offers an in-depth look at the real-world application and behind-the-scenes dynamics of these cutting-edge formats. We will spotlight specific use-cases and workflows, showcasing their efficiency and relevance in practical scenarios. Discover the vast possibilities each format holds, highlighted through detailed discussions and demonstrations. Our expert speakers will dissect the key aspects and provide critical takeaways for effective use, ensuring attendees leave with a thorough understanding of how to apply these formats in their own projects. Elevate your understanding of how FME supports these cutting-edge technologies, enhancing your ability to manage, share, and analyze spatial data. Whether you’re building on knowledge from our initial session or are new to the serverless spatial data landscape, this webinar is your gateway to mastering cloud-native formats in your workflows.
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Dubai, often portrayed as a shimmering oasis in the desert, faces its own set of challenges, including the occasional threat of flooding. Despite its reputation for opulence and modernity, the emirate is not immune to the forces of nature. In recent years, Dubai has experienced sporadic but significant floods, testing the resilience of its infrastructure and communities. Among the critical lifelines in this bustling metropolis is the Dubai International Airport, a bustling hub that connects the city to the world. This article explores the intersection of Dubai flood events and the resilience demonstrated by the Dubai International Airport in the face of such challenges.
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
When you’re building (micro)services, you have lots of framework options. Spring Boot is no doubt a popular choice. But there’s more! Take Quarkus, a framework that’s considered the rising star for Kubernetes-native Java. It always depends on what's best for your situation, but how to choose the best solution if you're comparing 2 frameworks? Both Spring Boot and Quarkus have their positives and negatives. Let us compare the two by live coding a couple of common use cases in Spring Boot and Quarkus. After this talk, you’ll be ready to get started with Quarkus yourself, and know when to select Quarkus or Spring Boot.
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
AXA XL - Insurer Innovation Award 2024
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Scaling API-first – The story of a global engineering organization Ian Reasor, Senior Computer Scientist - Adobe Radu Cotescu, Senior Computer Scientist - Adobe Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Webinar Recording: https://www.panagenda.com/webinars/why-teams-call-analytics-is-critical-to-your-entire-business Nothing is as frustrating and noticeable as being in an important call and being unable to see or hear the other person. Not surprising then, that issues with Teams calls are among the most common problems users call their helpdesk for. Having in depth insight into everything relevant going on at the user’s device, local network, ISP and Microsoft itself during the call is crucial for good Microsoft Teams Call quality support. To ensure a quick and adequate solution and to ensure your users get the most out of their Microsoft 365. But did you know that ‘bad calls’ are also an excellent indicator of other problems arising? Precisely because it is so noticeable!? Like the canary in the mine, bad calls can be early indicators of problems. Problems that might otherwise not have been noticed for a while but can have a big impact on productivity and satisfaction. Join this session by Christoph Adler to learn how true Microsoft Teams call quality analytics helped other organizations troubleshoot bad calls and identify and fix problems that impacted Teams calls or the use of Microsoft365 in general. See what it can do to keep your users happy and productive! In this session we will cover - Why CQD data alone is not enough to troubleshoot call problems - The importance of attributing call problems to the right call participant - What call quality analytics can do to help you quickly find, fix-, and prevent problems - Why having retrospective detailed insights matters - Real life examples of how others have used Microsoft Teams call quality monitoring to problem shoot problems with their ISP, network, device health and more.
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
💥 You’re lucky! We’ve found two different (lead) developers that are willing to share their valuable lessons learned about using UiPath Document Understanding! Based on recent implementations in appealing use cases at Partou and SPIE. Don’t expect fancy videos or slide decks, but real and practical experiences that will help you with your own implementations. 📕 Topics that will be addressed: • Training the ML-model by humans: do or don't? • Rule-based versus AI extractors • Tips for finding use cases • How to start 👨🏫👨💻 Speakers: o Dion Morskieft, RPA Product Owner @Partou o Jack Klein-Schiphorst, Automation Developer @Tacstone Technology
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Recently uploaded
(20)
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Privacy Management and the Social Web
1.
2.
3.
e.g. blogging
4.
e.g. Social Network
Sites (1)
5.
e.g. Social Network
Sites (2)
6.
7.
Visualizing social networks
8.
9.
Personal publics in
Facebook
10.
11.
12.
Rules: Different routines
for identity- and relationship management
13.
Rules: Different routines
for identity- and relationship management
14.
Code assisting privacy
management
15.
Code assisting formation
of personal publics
16.
17.
18.
Facets of digital
identity http://www.flickr.com/photos/fredcavazza/278973402/
19.
Editor's Notes
Notizen:
Download now