1. The document discusses balancing privacy and disclosure on Facebook through analyzing what types of personal information (e.g. education, location) 1,323 Facebook users disclose to the Facebook community at large versus just to their social circles of friends.
2. Through applying a statistical model called Item Response Theory, the researchers found that those who share more sensitive information tend to be male, younger, more open to new experiences, and more active on Facebook.
3. Different types of personal information have different levels of sensitivity and social currency regarding what is considered acceptable to disclose publicly versus conceal privately. Understanding these dynamics could help design improved privacy and disclosure models for social media.
Distributive Justice and Gender in Intimate Relationships: A Relational ApproachKate Galloway
In 'performing property' the common law courts enact a market based, transactional understanding of property distribution. This approach is ill-suited to ascertaining distribution within a marriage (or marriage-like) relationship. This paper suggests ways of contesting such claims to property, applying a relational approach to intention as to property distribution.
This is a presentation that I designed for parents to use in conjunction with their children to ensure that they stay safe on Facebook, but can still enjoy it.
Distributive Justice and Gender in Intimate Relationships: A Relational ApproachKate Galloway
In 'performing property' the common law courts enact a market based, transactional understanding of property distribution. This approach is ill-suited to ascertaining distribution within a marriage (or marriage-like) relationship. This paper suggests ways of contesting such claims to property, applying a relational approach to intention as to property distribution.
This is a presentation that I designed for parents to use in conjunction with their children to ensure that they stay safe on Facebook, but can still enjoy it.
A step-by-step guide to your Facebook privacy settings. Easy instructions to help you safeguard your privacy while enjoying the benefits of socializing online.
A perspective on Facebook in 2012 from Publicis Modem London.
The report has been authored by Tyler Turnbull (Joint Head of Planning) and Damien Le Castrec (Planner).
A term paper for a strategy class at the Asian Institute of Management. It talks about the competitive advantages of Facebook and how presents an industry model for the social media space.
(if you use this ppt - please give credit. thank you)
Social Media Marketing for Real Estate Agents: 21 TipsWishpond
Are you a real estate agent? Does social media scare you?
Realtors are some of the best marketers in an offline person-to-person environment. You’re incredibly brilliant at getting to know your clients on a very personal level, getting involved in your community, and connecting with your local market.
What you’re not very good at is applying this to your social media. (Well, most of you aren’t!)
You need to think of social online like you do social offline!
Social media provides a way to further connect with your local clients and groups. Social can build trust, and spread your marketing through friends of friends. But how do you do it?
In this presentation, I’ll give you tips for Facebook, Twitter and Pinterest (and a few more) on how real estate agents can use them for social media marketing.
Read more at: blog.wishpond.com
There are many Problems what a user face while using facebook. These problems could be related to hacking, unwanted users, spamming etc. These problems can be resolved using "facebook security and privacy settings" which is offered by the facebook itself. In this presentation, you will be having a fair view of how to configure your facebook security and privacy settings and what facebook is Exactly!
For more details, you can visit here: http://bit.ly/2kEkIrU
Measuring Success on Facebook, Twitter & LinkedInBrian Honigman
Third session of my NYU class on Social Media Analytics discussing the framework for measuring any social channel as well as the specifics for approaching Facebook, Twitter and LinkedIn.
Presenter: Julian Scaff, Design Director, Interactivism
In the field of psychology, curiosity is a cognitive and behavioral quality that is critical in the investigation of emotion and motivation. The phenomenology of curiosity has wide-ranging implications on a variety of human-centered fields, particularly UX design, because it is such a powerful motivating factor. People will take great risks and endure negative repercussions just to satisfy urges of curiosity, and thus it is crucial for UX designers and researchers to understand the phenomenon in greater detail. In this talk, I will present a five dimensional curiosity matrix developed by neuroscientists, and how I adopted this matrix as a tool for UX research and design. I will also illustrate how I adapted and implemented the matrix in several real world case studies to design more coherent and compelling experiences for users.
Psychology, persuasion and digital communication Ricardo Fonseca
Every costumer journey should ask the right questions. Using system 1 / system 2 approach, the psychology of persuasion here presented discusses the role of heuristics in persuasive communication.
Flexing Content Strategy to Reach Millennials and Gen ZCarolyn Kent
Steps to craft a foundational content strategy that is still flexible enough to connect with Millennials and Gen Z in spite of their mindset differences.
Designing effective user research to discover the truth PeakXD
The truth doesn't cost you anything but a lie could cost you everything. Tania Lang's presentation at UX Australia's Design Research conference March 2019
A step-by-step guide to your Facebook privacy settings. Easy instructions to help you safeguard your privacy while enjoying the benefits of socializing online.
A perspective on Facebook in 2012 from Publicis Modem London.
The report has been authored by Tyler Turnbull (Joint Head of Planning) and Damien Le Castrec (Planner).
A term paper for a strategy class at the Asian Institute of Management. It talks about the competitive advantages of Facebook and how presents an industry model for the social media space.
(if you use this ppt - please give credit. thank you)
Social Media Marketing for Real Estate Agents: 21 TipsWishpond
Are you a real estate agent? Does social media scare you?
Realtors are some of the best marketers in an offline person-to-person environment. You’re incredibly brilliant at getting to know your clients on a very personal level, getting involved in your community, and connecting with your local market.
What you’re not very good at is applying this to your social media. (Well, most of you aren’t!)
You need to think of social online like you do social offline!
Social media provides a way to further connect with your local clients and groups. Social can build trust, and spread your marketing through friends of friends. But how do you do it?
In this presentation, I’ll give you tips for Facebook, Twitter and Pinterest (and a few more) on how real estate agents can use them for social media marketing.
Read more at: blog.wishpond.com
There are many Problems what a user face while using facebook. These problems could be related to hacking, unwanted users, spamming etc. These problems can be resolved using "facebook security and privacy settings" which is offered by the facebook itself. In this presentation, you will be having a fair view of how to configure your facebook security and privacy settings and what facebook is Exactly!
For more details, you can visit here: http://bit.ly/2kEkIrU
Measuring Success on Facebook, Twitter & LinkedInBrian Honigman
Third session of my NYU class on Social Media Analytics discussing the framework for measuring any social channel as well as the specifics for approaching Facebook, Twitter and LinkedIn.
Presenter: Julian Scaff, Design Director, Interactivism
In the field of psychology, curiosity is a cognitive and behavioral quality that is critical in the investigation of emotion and motivation. The phenomenology of curiosity has wide-ranging implications on a variety of human-centered fields, particularly UX design, because it is such a powerful motivating factor. People will take great risks and endure negative repercussions just to satisfy urges of curiosity, and thus it is crucial for UX designers and researchers to understand the phenomenon in greater detail. In this talk, I will present a five dimensional curiosity matrix developed by neuroscientists, and how I adopted this matrix as a tool for UX research and design. I will also illustrate how I adapted and implemented the matrix in several real world case studies to design more coherent and compelling experiences for users.
Psychology, persuasion and digital communication Ricardo Fonseca
Every costumer journey should ask the right questions. Using system 1 / system 2 approach, the psychology of persuasion here presented discusses the role of heuristics in persuasive communication.
Flexing Content Strategy to Reach Millennials and Gen ZCarolyn Kent
Steps to craft a foundational content strategy that is still flexible enough to connect with Millennials and Gen Z in spite of their mindset differences.
Designing effective user research to discover the truth PeakXD
The truth doesn't cost you anything but a lie could cost you everything. Tania Lang's presentation at UX Australia's Design Research conference March 2019
Y&R Study Results: Secrets and lies sept 19Leonard Murphy
Are some iconic brands actually less popular than we think?
According to a new study from Y&R, the answer may well be yes. The study measured traditional brand ratings using a survey -- but it added a twist by also measuring emotional response on an unconscious level using a technique called Implicit Association. Featured in Malcolm Gladwell’s book Blink, this technique has been used in academia to uncovered hidden biases like racism.
The major finding: In the USA, brands like Google and Apple– while popular on a stated basis – are less well liked unconsciously. Other brands like Exxon, The National Inquirer and Facebook are actually liked more than consumers readily admit.
Y&R partnered with noted psychologist Dr. Joel Weinberger of Adelphi University, an expert in unconscious motivation, to design and analyze the results of this study.
WHAT I SAID AND WHAT I MEANT: IMPROVING CROSS-CULTURAL COMMUNICATIONS:
Humans communicate on many levels: spoken language, tone, body language, style and personality. The fact that we have complex cultural identities and a host of differing past experiences
increases the probability of cross-cultural miscommunications. This workshop presents major cross-cultural communication theories, ways that cultural values, power, privilege and differences affect the way we communicate, tools for questioning assumptions, and ways to improve cross-cultural communications skills.
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...Daniele Quercia
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile Pictures
Miriam Redi, Daniele Quercia, Lindsay Graham, Samuel Gosling
paper http://arxiv.org/abs/1505.07522
Trend Makers and Trend Spotters in a Mobile ApplicationDaniele Quercia
WHO creates trends in a mobile sharing app? accidentals or influentials?
Answer: influentials DO exist, yet they are not few but many!
http://profzero.org/publications/trend13sha.pdf
Social computing broadly refers to supporting social behaviours using computational systems. In the last decade, the advent of Web 2.0 and its social networking services, wikis, blogs, and social bookmarking has revolutionised social computing, creating new online contexts within which people interact socially (social networking). With the pervasiveness of mobile devices and embedded sensors, we stand at the brink of another major revolution, where the boundary between online and offline social behaviours blurs, providing opportunities for (re)defining social conventions and contexts once again. But opportunities come with challenges: can middleware foster the engineering of social software? We identify three societal grand challenges that are likely to drive future research in social computing and elaborate on how the middleware community can help address them.
Auralist: Introducing Serendipity into Music RecommendationDaniele Quercia
Recommendation systems exist to help users discover content in a large body of items. An ideal recommendation system should mimic the actions of a trusted friend or expert, producing a personalised collection of recommendations that balance between the desired goals of accuracy, diversity, novelty and serendipity. We introduce the Auralist recommendation framework, a system that - in contrast to previous work - attempts to balance and improve all four factors simultaneously. Using a collection of novel algorithms inspired by principles of ‘serendipitous discovery’, we demonstrate a method of successfully injecting serendipity, novelty and diversity into recommendations whilst limiting the impact on accuracy. We evaluate Auralist quantitatively over a broad set of metrics and, with a user study on music recommendation, show that Auralist’s emphasis on serendipity indeed improves user satisfaction.
Recommending Social Events from Mobile Phone Location Data
A city offers thousands of social events a day, and it is difficult for dwellers to make choices. The combination of mobile phones and recommender systems can change the way one deals with such abundance. Mobile phones with positioning technology are now widely available, making it easy for people to broadcast their whereabouts; recommender systems can now identify patterns in people’s movements in order to, for example, recommend events. To do so, the system relies on having mobile users who share their attendance at a large number of social events: cold-start users, who have no location history, cannot receive recommendations. We set out to address the mobile cold-start problem by answering the following research question: how can social events be recommended to a cold-start user based only on his home location?
To answer this question, we carry out a study of the rela- tionship between preferences for social events and geography, the first of its kind in a large metropolitan area. We sample location estimations of one million mobile phone users in Greater Boston, combine the sample with social events in the same area, and infer the social events attended by 2,519 residents. Upon this data, we test a variety of algorithms for recommending social events. We find that the most effective algorithm recommends events that are popular among residents of an area. The least effective, instead, recommends events that are geographically close to the area. This last result has interesting implications for location-based services that emphasize recommending nearby events.
"FriendSensing: Recommending Friends Using Mobile Phones" - Talk for this RecSys paper
http://web.mit.edu/quercia/www/publications/friendSensing_short.pdf
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
12. The Social World of Twitter WEDNESDAY 12:10
1. Brokers tend to cover diverse topics
2. Users have a “typical” geo span
3. “Happy” (“sad”) users do cluster together
22. Our way: Item Response Theory (IRT)
Traditional Goal:
respondent’s disposition to answer difficult questions
Goal here:
user’s disposition to disclose(conceal) what is private(public)
23. Our way: Item Response Theory (IRT)
fields
( )
users
1..0..
field i discriminative power
field i sensitive score
user j disclosure attitude
24. DATA representative for age, gender, #contacts, distribution of traits
N=1,323 Facebook Users in US (58% women)
Age [18,60] median 24
#contacts [32,998]
Apply IRT to what’s disclosed to
* Facebook Community at large
* Facebook Friends (one’s Social Circle)
26. 1 Smart Privacy Mob
Previously: Westin has divided people in
1. privacy fundamentalists
2. pragmatic majority
3. marginally concerned
27. 1 Smart Privacy Mob
Previously: Westin has divided people in
1. privacy fundamentalists
2. pragmatic majority
3. marginally concerned
We
28. 2 Who are they?
Those who share more sensitive info are:
• Open to new experience
• Self-monitoring
• Male
• More Active
• Younger
29. 2 Who are they?
Those who share more sensitive info are:
• Open to new experience • Open to new experience
• Self-monitoring
• Male • Male
• More Active
• Younger
30. 2 Who are they?
Those who share more sensitive info are:
• Open to new experience • Open to new experience
• Self-monitoring
• Male • Male
• More Active
• Younger
31. 2 Who are they?
Those who share more sensitive info are:
• Open to new experience • Open to new experience
• Self-monitoring
• Male • Male
• More Active
• Younger
32. 2 Who are they?
Those who share more sensitive info are:
Results: Good new experience analysis; not for (linear) prediction
• Open to
for descriptive
• Open to new experience
BUT… • Self-monitoring
• Male • Male
• More Active • More Active
• Younger