A Trustful attitude towards communicated information is possible insofar there exist cognitive mechanisms, emotional dispositions, inherited norms, institutional cues that make us epistemically responsible.
Chapter 8 big data and privacy - social media 3533Hubbamar
The document discusses privacy issues related to big data and social media. It provides an overview of the historical development of privacy concepts and laws. It then summarizes key policies and practices around data collection and use for major social media platforms like Twitter, Facebook, Tumblr, Instagram, LinkedIn, and Vine. Common topics addressed include what user information is collected, how it is used, stored and shared. The document also discusses some privacy concerns raised by users and changes made by platforms in response.
Is it possible to opt out of technological competence, or at least a reasonable understanding of social media, metadata, or similar? The Professional Code of Conduct raises the bar on what is now a core condition of competency.
Social media – a key component of e discovery litigationJames Cortopassi
The document discusses the importance of including social media in eDiscovery for litigation. It notes that social media posts can provide valuable insights into a person's actions, words, knowledge, personality, opinions, and circumstances. While discovery aims to identify such elements, social media is often overlooked in discovery requests and litigation holds. The document then provides recommendations for identifying prominent social media accounts, eliminating non-relevant posts, and processing useful social media data for inclusion in the discovery process.
The document defines nine elements of digital citizenship: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital law, digital rights and responsibilities, digital health and wellness, and digital security. It provides definitions and examples for each element, such as defining digital access as full electronic participation in society and digital commerce as the buying and selling of goods online.
A escola fundamental Batista Paludo e o núcleo Caraíba produziram um vídeo de dia internacional da mulher com uma música do DJ Luciano e imagens da internet para celebrar a data.
The document discusses the target audience and design choices for a niche music magazine aimed at independent, university-educated women ages 19-25. Key points addressed include the magazine representing its target readership, an established media company being best suited for distribution, and conducting audience research to design the magazine in a way that would attract and address its target demographic.
A escola fundamental Batista Paludo e o núcleo Caraíba produziram um vídeo de dia internacional da mulher com uma música do DJ Luciano e imagens da internet para celebrar a data.
Chapter 8 big data and privacy - social media 3533Hubbamar
The document discusses privacy issues related to big data and social media. It provides an overview of the historical development of privacy concepts and laws. It then summarizes key policies and practices around data collection and use for major social media platforms like Twitter, Facebook, Tumblr, Instagram, LinkedIn, and Vine. Common topics addressed include what user information is collected, how it is used, stored and shared. The document also discusses some privacy concerns raised by users and changes made by platforms in response.
Is it possible to opt out of technological competence, or at least a reasonable understanding of social media, metadata, or similar? The Professional Code of Conduct raises the bar on what is now a core condition of competency.
Social media – a key component of e discovery litigationJames Cortopassi
The document discusses the importance of including social media in eDiscovery for litigation. It notes that social media posts can provide valuable insights into a person's actions, words, knowledge, personality, opinions, and circumstances. While discovery aims to identify such elements, social media is often overlooked in discovery requests and litigation holds. The document then provides recommendations for identifying prominent social media accounts, eliminating non-relevant posts, and processing useful social media data for inclusion in the discovery process.
The document defines nine elements of digital citizenship: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital law, digital rights and responsibilities, digital health and wellness, and digital security. It provides definitions and examples for each element, such as defining digital access as full electronic participation in society and digital commerce as the buying and selling of goods online.
A escola fundamental Batista Paludo e o núcleo Caraíba produziram um vídeo de dia internacional da mulher com uma música do DJ Luciano e imagens da internet para celebrar a data.
The document discusses the target audience and design choices for a niche music magazine aimed at independent, university-educated women ages 19-25. Key points addressed include the magazine representing its target readership, an established media company being best suited for distribution, and conducting audience research to design the magazine in a way that would attract and address its target demographic.
A escola fundamental Batista Paludo e o núcleo Caraíba produziram um vídeo de dia internacional da mulher com uma música do DJ Luciano e imagens da internet para celebrar a data.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
Transcript - DOIs to support citation of grey literatureARDC
24th May 2017
This webinar was the first in a series examining persistent identifiers and their use in research. It begins with a brief introduction on the use of persistent identifiers in research followed by an outline of how UNSW has approached supporting discovery and citation of grey literature.
Watch the full webinar: https://www.youtube.com/watch?v=TLXYwrBu8wc
Hoyos introduces his new identity assertion platform called HoyosID as a solution to what he sees as insanity in the current identity industry. HoyosID uses biometrics on smartphones to allow convenient login without passwords or tokens. Hoyos believes convenience is key for users and that solutions requiring extra hardware tokens will fail. HoyosID stores no biometrics and uses various techniques like liveness detection to prevent spoofing or replay attacks. It also includes an open API to integrate third party biometrics solutions. Hoyos plans to release HoyosID apps in early 2014 supporting major smartphone models.
Presentation by George Roberts on 'Who and how am I online? Personal identity management for professional development – from the end-user’s perspective' at the LLLWFD ID Management assembly, Birmingham, May 2011
The document discusses how digital technologies and quantified self-tracking devices are changing how people understand and monitor their health and lifestyle habits. It provides examples of common uses of self-tracking apps for exercise, nutrition, sleep, and vital signs monitoring. While these tools provide convenience and real health benefits, they also introduce new issues around constant connectivity, information overload, and data privacy as personal data is shared with third parties. Overall, the document examines both the opportunities and challenges introduced by the rise of the quantified self.
This document discusses ethics and social media in physical therapy. It begins by defining social media and networking, and discussing their purposes. It then covers popular social media platforms and statistics. The document identifies key ethical and legal issues around maintaining patient privacy and professional boundaries. It presents a framework for ethical decision making regarding social media use. Finally, it provides recommendations for developing a social media strategy and guidelines on appropriate social media behaviors.
The document provides an overview of legislation and privacy issues related to big data. It discusses the General Data Protection Regulation (GDPR), the new European Union legislation that gives individuals more control over their personal data and how it is used. The GDPR was drafted to update old data protection laws that did not account for how data is currently collected and used. It introduces stricter rules and penalties to improve privacy as data collection and use increases. The document explains key aspects of the GDPR such as its goals, when it will apply, who it applies to, and consequences for non-compliance.
The document discusses how persistent identifiers (PIDs) could enable new services and applications in the future as digital objects and resources are increasingly identified with PIDs. It explores several dimensions of PIDs that may see further development, such as provenance, policies and guarantees around persistence of digital objects, richer metadata, and improved machine-readability of PIDs. The talk suggests that a "PIDvasive" environment where everything has a PID could lead to an explosion of value-added services similar to how the internet enabled new applications through standardized protocols and IP addressing of nodes.
This document discusses managing personal identity online through tools for personal identity projects. It covers how identity is shaped by digital technologies like algorithms, data collection, and social media. Key topics discussed include weak vs strong identity constructs; identity as shaped by economic and social forces; and the concept of habitus. The document also addresses managing hybrid and multiple identities for different audiences, and tools like portfolios and mentoring systems that could help with personal identity management and professional development online.
A new(ish) perspective on knowledge management in small organisations, with a little bit of Frank Zappa and Superman 3 thrown in. Originally delivered at the NCVO Information Management Conference, London, Nov 2008.
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
The document discusses the development of a Trustable Technology Mark (TTM) to help consumers make informed decisions about connected devices and ensure companies prove their products are trustworthy. The TTM would be awarded based on a self-assessment process where companies evaluate their products across 5 dimensions - privacy and data practices, transparency, security, stability, and openness. It is intended to set a high standard and incentivize better practices from companies. The TTM initiative is led by ThingsCon with support from partners like universities and aims to eventually apply similar principles for evaluating technologies in smart cities.
This document summarizes the development of the Web Analyst's Code of Ethics. It started as a conversation that led to emails and the creation of a code of ethics. The code of ethics was published on the WAA blog and generated discussion on social media. Contributors from the web measurement community helped develop the code, which has 5 core tenets: privacy, transparency, consumer control, education, and accountability. The goal is to educate organizations about data collection practices. The WAA aims to grow support for the code and increase awareness of these issues.
Self-sovereign identity (SSI) allows individuals to control their digital identities and data. Current identity systems are centralized and do not give individuals ownership over their data. SSI uses blockchain technology and decentralized identifiers to return control and ownership of digital identities to individuals. The document discusses concepts needed to build decentralized identity systems, including issuers, holders, verifiers, and governance frameworks. It also covers ethics and building systems that improve people's lives.
SSI Meetup – interpersonal data, identity and collective mindsPhilip Sheldrake
Grappling with identity will never be easy — those who consider it “solvable” represent a danger to society. The identity community is entangled in code (the technologically possible), law (the legally available), and norms (the socially acceptable). There is no separation of these societal concerns. No reductionism. Life is complex and will remain so.
And yet such understanding provides, I think, the perfect foundation to create something wonderful together.
Elizabeth Buchanan is the director of the Center for Information Policy Research at the University of Wisconsin-Milwaukee. She gave a presentation at the 2010 OHRP Research Forum in Chicago on internet research ethics and institutional review boards (IRBs). Her presentation discussed how the internet can be both a tool for research and a medium/location of research. It highlighted emerging issues for IRBs around topics like anonymity, consent, and methodology in internet research. Her research with Ess received NSF funding to survey US IRBs on their experiences reviewing internet research.
Data science and analytics have evolved significantly in recent years. While tools and techniques have advanced, failure and frustration remain common in many data science projects. Only 8% of projects are described as successful, despite 73% of executives believing data science will revolutionize their business. Common reasons for failure include high costs, dependence on legacy systems, siloed data, and a lack of clear business objectives or executive support. To improve outcomes, the document argues that data science must apply other disciplines beyond just tools and techniques. It discusses concepts like data philosophy, expertise, networks, identity, and space that could help solve shortcomings if integrated into how problems are approached and teams are structured.
This document discusses ethics and social media in physical therapy. It defines social media and networking, and identifies their purpose of connecting people. Various social media platforms are discussed, along with statistics on their usage. Ethical and legal issues with social media use are identified, including maintaining privacy and confidentiality. Guidelines are provided for physical therapists to make ethical decisions regarding social media use and to develop a professional online presence.
AIIM New England Social Networking PresentationDoug Cornelius
This document discusses social networking for business use. It defines social networks and their value in allowing analysis of relationships rather than just individual attributes. It then covers various aspects of implementing social networking in a business context, including available functionality, ensuring a culture of trust among users, integrating different systems rather than having information silos, establishing appropriate governance, and the infrastructure required. Recommendations focus on taking an iterative approach and balancing controls with allowing open sharing of information.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
More Related Content
Similar to Epistemic Responsibility in the IT Society
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
Transcript - DOIs to support citation of grey literatureARDC
24th May 2017
This webinar was the first in a series examining persistent identifiers and their use in research. It begins with a brief introduction on the use of persistent identifiers in research followed by an outline of how UNSW has approached supporting discovery and citation of grey literature.
Watch the full webinar: https://www.youtube.com/watch?v=TLXYwrBu8wc
Hoyos introduces his new identity assertion platform called HoyosID as a solution to what he sees as insanity in the current identity industry. HoyosID uses biometrics on smartphones to allow convenient login without passwords or tokens. Hoyos believes convenience is key for users and that solutions requiring extra hardware tokens will fail. HoyosID stores no biometrics and uses various techniques like liveness detection to prevent spoofing or replay attacks. It also includes an open API to integrate third party biometrics solutions. Hoyos plans to release HoyosID apps in early 2014 supporting major smartphone models.
Presentation by George Roberts on 'Who and how am I online? Personal identity management for professional development – from the end-user’s perspective' at the LLLWFD ID Management assembly, Birmingham, May 2011
The document discusses how digital technologies and quantified self-tracking devices are changing how people understand and monitor their health and lifestyle habits. It provides examples of common uses of self-tracking apps for exercise, nutrition, sleep, and vital signs monitoring. While these tools provide convenience and real health benefits, they also introduce new issues around constant connectivity, information overload, and data privacy as personal data is shared with third parties. Overall, the document examines both the opportunities and challenges introduced by the rise of the quantified self.
This document discusses ethics and social media in physical therapy. It begins by defining social media and networking, and discussing their purposes. It then covers popular social media platforms and statistics. The document identifies key ethical and legal issues around maintaining patient privacy and professional boundaries. It presents a framework for ethical decision making regarding social media use. Finally, it provides recommendations for developing a social media strategy and guidelines on appropriate social media behaviors.
The document provides an overview of legislation and privacy issues related to big data. It discusses the General Data Protection Regulation (GDPR), the new European Union legislation that gives individuals more control over their personal data and how it is used. The GDPR was drafted to update old data protection laws that did not account for how data is currently collected and used. It introduces stricter rules and penalties to improve privacy as data collection and use increases. The document explains key aspects of the GDPR such as its goals, when it will apply, who it applies to, and consequences for non-compliance.
The document discusses how persistent identifiers (PIDs) could enable new services and applications in the future as digital objects and resources are increasingly identified with PIDs. It explores several dimensions of PIDs that may see further development, such as provenance, policies and guarantees around persistence of digital objects, richer metadata, and improved machine-readability of PIDs. The talk suggests that a "PIDvasive" environment where everything has a PID could lead to an explosion of value-added services similar to how the internet enabled new applications through standardized protocols and IP addressing of nodes.
This document discusses managing personal identity online through tools for personal identity projects. It covers how identity is shaped by digital technologies like algorithms, data collection, and social media. Key topics discussed include weak vs strong identity constructs; identity as shaped by economic and social forces; and the concept of habitus. The document also addresses managing hybrid and multiple identities for different audiences, and tools like portfolios and mentoring systems that could help with personal identity management and professional development online.
A new(ish) perspective on knowledge management in small organisations, with a little bit of Frank Zappa and Superman 3 thrown in. Originally delivered at the NCVO Information Management Conference, London, Nov 2008.
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
The document discusses the development of a Trustable Technology Mark (TTM) to help consumers make informed decisions about connected devices and ensure companies prove their products are trustworthy. The TTM would be awarded based on a self-assessment process where companies evaluate their products across 5 dimensions - privacy and data practices, transparency, security, stability, and openness. It is intended to set a high standard and incentivize better practices from companies. The TTM initiative is led by ThingsCon with support from partners like universities and aims to eventually apply similar principles for evaluating technologies in smart cities.
This document summarizes the development of the Web Analyst's Code of Ethics. It started as a conversation that led to emails and the creation of a code of ethics. The code of ethics was published on the WAA blog and generated discussion on social media. Contributors from the web measurement community helped develop the code, which has 5 core tenets: privacy, transparency, consumer control, education, and accountability. The goal is to educate organizations about data collection practices. The WAA aims to grow support for the code and increase awareness of these issues.
Self-sovereign identity (SSI) allows individuals to control their digital identities and data. Current identity systems are centralized and do not give individuals ownership over their data. SSI uses blockchain technology and decentralized identifiers to return control and ownership of digital identities to individuals. The document discusses concepts needed to build decentralized identity systems, including issuers, holders, verifiers, and governance frameworks. It also covers ethics and building systems that improve people's lives.
SSI Meetup – interpersonal data, identity and collective mindsPhilip Sheldrake
Grappling with identity will never be easy — those who consider it “solvable” represent a danger to society. The identity community is entangled in code (the technologically possible), law (the legally available), and norms (the socially acceptable). There is no separation of these societal concerns. No reductionism. Life is complex and will remain so.
And yet such understanding provides, I think, the perfect foundation to create something wonderful together.
Elizabeth Buchanan is the director of the Center for Information Policy Research at the University of Wisconsin-Milwaukee. She gave a presentation at the 2010 OHRP Research Forum in Chicago on internet research ethics and institutional review boards (IRBs). Her presentation discussed how the internet can be both a tool for research and a medium/location of research. It highlighted emerging issues for IRBs around topics like anonymity, consent, and methodology in internet research. Her research with Ess received NSF funding to survey US IRBs on their experiences reviewing internet research.
Data science and analytics have evolved significantly in recent years. While tools and techniques have advanced, failure and frustration remain common in many data science projects. Only 8% of projects are described as successful, despite 73% of executives believing data science will revolutionize their business. Common reasons for failure include high costs, dependence on legacy systems, siloed data, and a lack of clear business objectives or executive support. To improve outcomes, the document argues that data science must apply other disciplines beyond just tools and techniques. It discusses concepts like data philosophy, expertise, networks, identity, and space that could help solve shortcomings if integrated into how problems are approached and teams are structured.
This document discusses ethics and social media in physical therapy. It defines social media and networking, and identifies their purpose of connecting people. Various social media platforms are discussed, along with statistics on their usage. Ethical and legal issues with social media use are identified, including maintaining privacy and confidentiality. Guidelines are provided for physical therapists to make ethical decisions regarding social media use and to develop a professional online presence.
AIIM New England Social Networking PresentationDoug Cornelius
This document discusses social networking for business use. It defines social networks and their value in allowing analysis of relationships rather than just individual attributes. It then covers various aspects of implementing social networking in a business context, including available functionality, ensuring a culture of trust among users, integrating different systems rather than having information silos, establishing appropriate governance, and the infrastructure required. Recommendations focus on taking an iterative approach and balancing controls with allowing open sharing of information.
Similar to Epistemic Responsibility in the IT Society (20)
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.