This document provides an introduction to research being conducted on feedback methods for privacy-sensitive runtime data leaked by smartphone applications. It discusses the personal information commonly leaked by apps, including name, email, location, and other details. The document outlines the research aim to find novel ways to visualize leaked data and improve user awareness and control. It reviews related work on eco-feedback displays and discusses technological and economic challenges to privacy. The goal is to extend understanding of user expectations and conduct empirical studies to design and evaluate new privacy feedback solutions.
These are the slides from my Keynote at the the Lexis Nexis 2011 Practice Management Annual Conference, which was held in Orlando, Florida (See: http://www.lexisnexis.com/pmac2011/).
Young people today have a near-constant connection to smartphones. 37% of teens have smartphones, and this generation spends up to 7 hours a day on their devices interacting through social media and messaging apps like Instagram, Snapchat, and Facebook. Teens have become so attached to their phones that some feel withdrawal symptoms when separated from them. This constant smartphone use has started to impact teens' behaviors and relationships.
-Identify the uses for mobile devices and the implications it has in today’s classrooms.
-Discover sites, tools, apps and resources
-What critical 21st century skills can be mastered when using mobile devices?
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Dr. Mokter Hossain
This paper presents quantitative and qualitative data that examine the prospective U.S. mathematics teachers’ engagement in the use of the Internet, hand-held cellular devices, and Web 2.0 activities and their perception of using these technologies for the teaching and learning of Euclidean geometry and other mathematics courses. The study revealed that prospective mathematics teachers in the U.S. have massive engagement in accessing the Internet and Web 2.0-based activities through cellular and handheld mobile devices as well as in their self-reported skills in using Internet, without any significant differences based on their gender. Prospective mathematics teachers experienced numerous advantages and a few minor problems of the blogging activity as a supportive tool in the Euclidean Geometry course. They found blogs a supportive and useful tool for collaborative teaching and learning purposes. Thus, they suggest that blogs and other Web 2.0 tools should be incorporated in the middle and high school mathematics education curricula.
Colorado DHSEM: Understanding Social Media and Using it to Your AdvantageTrost, Micki
This presentation was delivered by the DHSEM Communications Specialist at the 2014 Colorado Safe Schools Summit. It discussing using social media to response and monitor in the school setting.
The document summarizes key internet trends from a 2013 conference. It notes that global internet users grew to 2.4 billion in 2012 with 8% annual growth, driven largely by emerging markets like China, India, and Indonesia. Mobile internet access and usage is growing rapidly, surpassing desktop access in some countries. Social media and content sharing across photos, videos, fitness data, and other media is exploding, driven by smartphones and platforms like Facebook, YouTube, and Instagram. Mobile transactions and usage are also rising significantly across many companies.
Since the Pew Research Center's Internet & American Life Project first started tracking teen cell phone use, the age at which American teens acquire their first cell phone has consistently grown younger. In Pew Internet's 2004 survey of teens, 18% of 12-year-olds owned a cell phone. In 2009, 58% of 12 year-olds own a cell phone. We also have found that cell phone ownership increases dramatically with age: 83% of teens age 17 now own a cell phone, up from 64% in 2004.
The document outlines primary and secondary research plans for a documentary on social networking. Primary research will include interviews with an app company, potential Apple employees, students and staff, and vox pops on cyberbullying and privacy issues. Mise-en-scene for interviews will feature relevant backgrounds. Secondary research compiled statistics on social media platforms like YouTube, Twitter, Facebook, and Tumblr on user rates and behaviors. Archive materials also contained statistics on these platforms.
These are the slides from my Keynote at the the Lexis Nexis 2011 Practice Management Annual Conference, which was held in Orlando, Florida (See: http://www.lexisnexis.com/pmac2011/).
Young people today have a near-constant connection to smartphones. 37% of teens have smartphones, and this generation spends up to 7 hours a day on their devices interacting through social media and messaging apps like Instagram, Snapchat, and Facebook. Teens have become so attached to their phones that some feel withdrawal symptoms when separated from them. This constant smartphone use has started to impact teens' behaviors and relationships.
-Identify the uses for mobile devices and the implications it has in today’s classrooms.
-Discover sites, tools, apps and resources
-What critical 21st century skills can be mastered when using mobile devices?
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Dr. Mokter Hossain
This paper presents quantitative and qualitative data that examine the prospective U.S. mathematics teachers’ engagement in the use of the Internet, hand-held cellular devices, and Web 2.0 activities and their perception of using these technologies for the teaching and learning of Euclidean geometry and other mathematics courses. The study revealed that prospective mathematics teachers in the U.S. have massive engagement in accessing the Internet and Web 2.0-based activities through cellular and handheld mobile devices as well as in their self-reported skills in using Internet, without any significant differences based on their gender. Prospective mathematics teachers experienced numerous advantages and a few minor problems of the blogging activity as a supportive tool in the Euclidean Geometry course. They found blogs a supportive and useful tool for collaborative teaching and learning purposes. Thus, they suggest that blogs and other Web 2.0 tools should be incorporated in the middle and high school mathematics education curricula.
Colorado DHSEM: Understanding Social Media and Using it to Your AdvantageTrost, Micki
This presentation was delivered by the DHSEM Communications Specialist at the 2014 Colorado Safe Schools Summit. It discussing using social media to response and monitor in the school setting.
The document summarizes key internet trends from a 2013 conference. It notes that global internet users grew to 2.4 billion in 2012 with 8% annual growth, driven largely by emerging markets like China, India, and Indonesia. Mobile internet access and usage is growing rapidly, surpassing desktop access in some countries. Social media and content sharing across photos, videos, fitness data, and other media is exploding, driven by smartphones and platforms like Facebook, YouTube, and Instagram. Mobile transactions and usage are also rising significantly across many companies.
Since the Pew Research Center's Internet & American Life Project first started tracking teen cell phone use, the age at which American teens acquire their first cell phone has consistently grown younger. In Pew Internet's 2004 survey of teens, 18% of 12-year-olds owned a cell phone. In 2009, 58% of 12 year-olds own a cell phone. We also have found that cell phone ownership increases dramatically with age: 83% of teens age 17 now own a cell phone, up from 64% in 2004.
The document outlines primary and secondary research plans for a documentary on social networking. Primary research will include interviews with an app company, potential Apple employees, students and staff, and vox pops on cyberbullying and privacy issues. Mise-en-scene for interviews will feature relevant backgrounds. Secondary research compiled statistics on social media platforms like YouTube, Twitter, Facebook, and Tumblr on user rates and behaviors. Archive materials also contained statistics on these platforms.
1) Smartphones have become indispensable mobile technology integrated into nearly every aspect of our lives. 2) Canadians own smartphones and have their phones within reach for most of the day, exposing how tethered we are to our devices. 3) Smartphones are so important due to the connectivity, efficiency, functionality, and entertainment they provide by allowing access to social media, apps, information, and media on demand.
This year we have reached the stage where 50% of the world’s population is connected to the Internet, compared to 40% in 2016. And, with more people online than ever before, every minute that goes by witnesses 3.5 million Google search queries, $751,522 spent, 156 million emails sent, 342,000 apps downloaded in mobile app stores and 46,200 posts uploaded to Instagram.
The document summarizes research from the Pew Internet & American Life Project on teen internet usage and content creation. It finds that 97% of teens from households earning $75,000 or more use the internet, while internet usage is lower in lower-income households. It also finds that content creation is more common among older teens and girls. Most writing teens do for school involves taking notes, while writing for fun includes sending emails and using social networks.
The average school district faces the threat of teen suicide about every two weeks. Social media enables cyberbullying, which increases suicidal thoughts and can result in immense tragedy. However, leaving social media open and using tools like Securly's sentiment analysis technology, which detects phrases related to depression and suicide in social media posts, can help schools identify students in need of support and prevent teen suicide by combating its root cause of cyberbullying. The analysis of over 500,000 social media posts found that 1 in 50 posts expressed negative behaviors like cyberbullying or suicidal thoughts, and social media provides an opportunity to help the 60% of cyberbullying victims who do not currently seek adult assistance.
The document discusses the evolution of communication technologies and how boys use them. It summarizes that boys primarily use the internet and technologies like social media to stay connected with friends, but these platforms also present risks like cyberbullying and interacting with strangers. The document also reports on the results of a survey of boys at a private school on their technology use, finding that most use social media daily and text regularly but do not feel addicted to games or messaging.
This document provides an agenda and overview for a presentation on using student cell phones to increase participation and extend learning. The presentation covers topics like using text messaging tools for in-class activities, sending text alerts to students, taking pictures/videos on field trips and submitting them via phone, creating podcasts, and using phones to access the internet and bridge the digital divide. It also includes steps for integrating cell phone use, including surveying students, discussing mobile safety, creating classroom rules via a social contract, and obtaining parent permission. The goal is to demonstrate how cell phones can engage students and improve learning when used appropriately in the classroom.
This document provides guidance for teachers on how to safely and appropriately integrate text messaging and student cell phones into classroom learning. It outlines a 7-step process for teachers that includes: conducting a student survey, discussing mobile safety and appropriate use, creating a social contract with rules and consequences, obtaining parent permission, providing alternatives for students without phones, holding a parent information night, and starting slowly while providing reminders and feedback. Various classroom examples are given for using text messaging and apps in subjects like social studies, science, English, and mathematics. The document emphasizes mobile safety, responsible use, and obtaining necessary approvals before incorporating student cell phones into lessons.
We will interview an app company to understand how they use social media to their advantage. We will also try to interview an Apple store employee. We plan to conduct vox pops on the street to ask people about their social media use and opinions. We will interview some college staff and students to discuss why certain sites are banned and why some students do not use social media. Our documentary will discuss app companies and cyberbullying based on our research findings.
This document discusses the importance of educating students and parents about appropriate and safe use of social media like Facebook. It notes that students often lack awareness of privacy issues and the permanent nature of online posts. Employers now regularly screen candidates' social media, and inappropriate content can hurt job prospects. The document reviews Facebook's privacy policies and shares of user data with third parties. It argues schools must help students build positive digital footprints and social media experiences.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
Students' cell phones can be used to enhance and extend learning both in and outside of the classroom. Three ways this can be done include:
1) Increasing classroom participation through polling apps and discussion boards that allow anonymous student responses.
2) Extending learning beyond the school day through text message assignments over breaks and sending educational videos and pictures from field trips.
3) Bridging the digital divide by allowing students without internet access at home to follow experts on Twitter through text messages and take online quizzes on their phones.
Period 3 Michael Murtaugh The Negative Effects of Technology on Teenagersmrsalcido
The document discusses the negative effects of technology on teenagers. It notes that most teenagers have access to and regularly use cell phones, video games, computers, and the internet. Too much use of these technologies can negatively impact teenagers' health, social lives, and behaviors. Specifically, excessive video game and social media use has been linked to obesity, while sexting and interacting with strangers online raises risks of legal issues and sexual exploitation. The document questions whether the benefits of these technologies outweigh the potential downsides for teenage users.
The document discusses a study on K-12 students' use of social media profiles like Facebook. Some key findings:
- 82% of participants had children under 14 when they created their first social media profile. 59% were ages 11-14.
- 92% of children had a Facebook profile, with Skype being the second most common at 29%.
- Only 13% of parents reported monitoring their child's social media use "every step", while 33% monitored "most of the time".
- The number of active Facebook users grew from 845 million to over 901 million between February and April 2012, indicating the need for an updated study on students' social media usage.
The document summarizes research for a documentary about social networking. It outlines primary research interviews with an app company, Apple staff, students, and vox pops. It discusses filming locations, props, and mise-en-scene. Secondary research covers cyberbullying statistics and privacy issues. Archive research lists usage statistics for YouTube, Twitter, Facebook, and Tumblr.
This document provides information about primary and secondary research conducted for a documentary on social networking and apps. The primary research section outlines planned interviews with an app company, Apple staff, students, and general public. Details are given for filming locations, props, and desired background scenes. The secondary research covers statistics on cyberbullying, privacy issues, and past usage data for YouTube, Twitter, Facebook, and Tumblr. Archive information on each platform includes user numbers, time spent, posts made, and demographics.
This document provides information about primary and secondary research conducted for a documentary on social networking and apps. The primary research section outlines planned interviews with an app company, Apple staff, students, and general public. Details of filming location, props, and desired background scenes are also included. The secondary research section presents statistics on cyberbullying, privacy issues, and popular social media sites like YouTube, Twitter, Facebook, and Tumblr. Archive facts are given on user numbers, minutes spent, posts made, and demographics of users for each site.
This document discusses the use of mobile devices like cell phones and iPods in K-12 classrooms. It provides examples of how teachers have incorporated these tools to engage students and enhance learning. These include having students translate passages from Romeo and Juliet into text speak, create mobile novels, use QR codes to access information on field trips, and send photos from field trips to online sharing sites. The document also addresses concerns around students using their own devices in class and provides examples of classroom mobile use policies.
The document discusses various topics related to technology use in classrooms. It describes how clickers are being used to engage all students in polling questions during lessons, but that overuse of clickers could shift the focus from learning material. iPads are also discussed as beneficial for presenting clear material on a large screen, though they may not be best for long writing assignments. The document addresses debates around filtering the internet in schools to block inappropriate content versus limiting access to educational resources, as well as issues of internet piracy and illegal music/movie downloading.
In this Global Kids training led by Amira Fouad and Rik Panganiban, educators will be engaged in hands on activities using social media tools that have educational applications and hear about successful case studies from a variety of educational settings.
The Social Habit 2011 is a new study from Edison Research and Arbitron that looks at America's usage of Facebook, Twitter, Foursquare and other social networking sites and services. New representative and projectable statistics on the familiarity, usage and consumer behaviors associated with these sites and services is revealed, along with new data on brand following behavior and social commerce. This study was first presented at Blogworld East in New York in May 2011
Preface
Novel Coronavirus COVID-19 has compelled us to quarantine in our home. Apart from the countries in world, India too is badly affected by this phenomenon. Government imposed lockdown so people stay at home and help the humanity to break the chain of Corona virus. As the Covid19 outbreak continues and all communication channels from Government to media is urging people from mid-March to stay home, people now habituated spending time leisurely on their couch, started consuming and creating contents from home on various mediums.
From last 60 days, social distancing and social isolation has become popular habit and it’s no surprise to say that people has started consuming enormous amount of data in creation and dissemination of digital contents. For all of us various mediums including Social media, emerged as a massive communication tool.
National Institute of Mass Communication and Journalism (NIMCJ) took this opportunity to study on the media consumption pattern in this lockdown period and tried to understand how people consumed data and contents in various forms.
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...michellep
The document discusses CIBER's work using deep log analysis (DLA) to understand user behavior in digital environments. DLA transforms digital activity data into information on user satisfaction, impacts, and outcomes. Findings from DLA are used to inform system changes. Benefits of DLA include its ability to analyze massive amounts of direct and real-time user activity data without sampling. CIBER has used DLA in various research projects analyzing digital behavior in fields like health, publishing, and education.
1) Smartphones have become indispensable mobile technology integrated into nearly every aspect of our lives. 2) Canadians own smartphones and have their phones within reach for most of the day, exposing how tethered we are to our devices. 3) Smartphones are so important due to the connectivity, efficiency, functionality, and entertainment they provide by allowing access to social media, apps, information, and media on demand.
This year we have reached the stage where 50% of the world’s population is connected to the Internet, compared to 40% in 2016. And, with more people online than ever before, every minute that goes by witnesses 3.5 million Google search queries, $751,522 spent, 156 million emails sent, 342,000 apps downloaded in mobile app stores and 46,200 posts uploaded to Instagram.
The document summarizes research from the Pew Internet & American Life Project on teen internet usage and content creation. It finds that 97% of teens from households earning $75,000 or more use the internet, while internet usage is lower in lower-income households. It also finds that content creation is more common among older teens and girls. Most writing teens do for school involves taking notes, while writing for fun includes sending emails and using social networks.
The average school district faces the threat of teen suicide about every two weeks. Social media enables cyberbullying, which increases suicidal thoughts and can result in immense tragedy. However, leaving social media open and using tools like Securly's sentiment analysis technology, which detects phrases related to depression and suicide in social media posts, can help schools identify students in need of support and prevent teen suicide by combating its root cause of cyberbullying. The analysis of over 500,000 social media posts found that 1 in 50 posts expressed negative behaviors like cyberbullying or suicidal thoughts, and social media provides an opportunity to help the 60% of cyberbullying victims who do not currently seek adult assistance.
The document discusses the evolution of communication technologies and how boys use them. It summarizes that boys primarily use the internet and technologies like social media to stay connected with friends, but these platforms also present risks like cyberbullying and interacting with strangers. The document also reports on the results of a survey of boys at a private school on their technology use, finding that most use social media daily and text regularly but do not feel addicted to games or messaging.
This document provides an agenda and overview for a presentation on using student cell phones to increase participation and extend learning. The presentation covers topics like using text messaging tools for in-class activities, sending text alerts to students, taking pictures/videos on field trips and submitting them via phone, creating podcasts, and using phones to access the internet and bridge the digital divide. It also includes steps for integrating cell phone use, including surveying students, discussing mobile safety, creating classroom rules via a social contract, and obtaining parent permission. The goal is to demonstrate how cell phones can engage students and improve learning when used appropriately in the classroom.
This document provides guidance for teachers on how to safely and appropriately integrate text messaging and student cell phones into classroom learning. It outlines a 7-step process for teachers that includes: conducting a student survey, discussing mobile safety and appropriate use, creating a social contract with rules and consequences, obtaining parent permission, providing alternatives for students without phones, holding a parent information night, and starting slowly while providing reminders and feedback. Various classroom examples are given for using text messaging and apps in subjects like social studies, science, English, and mathematics. The document emphasizes mobile safety, responsible use, and obtaining necessary approvals before incorporating student cell phones into lessons.
We will interview an app company to understand how they use social media to their advantage. We will also try to interview an Apple store employee. We plan to conduct vox pops on the street to ask people about their social media use and opinions. We will interview some college staff and students to discuss why certain sites are banned and why some students do not use social media. Our documentary will discuss app companies and cyberbullying based on our research findings.
This document discusses the importance of educating students and parents about appropriate and safe use of social media like Facebook. It notes that students often lack awareness of privacy issues and the permanent nature of online posts. Employers now regularly screen candidates' social media, and inappropriate content can hurt job prospects. The document reviews Facebook's privacy policies and shares of user data with third parties. It argues schools must help students build positive digital footprints and social media experiences.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
Students' cell phones can be used to enhance and extend learning both in and outside of the classroom. Three ways this can be done include:
1) Increasing classroom participation through polling apps and discussion boards that allow anonymous student responses.
2) Extending learning beyond the school day through text message assignments over breaks and sending educational videos and pictures from field trips.
3) Bridging the digital divide by allowing students without internet access at home to follow experts on Twitter through text messages and take online quizzes on their phones.
Period 3 Michael Murtaugh The Negative Effects of Technology on Teenagersmrsalcido
The document discusses the negative effects of technology on teenagers. It notes that most teenagers have access to and regularly use cell phones, video games, computers, and the internet. Too much use of these technologies can negatively impact teenagers' health, social lives, and behaviors. Specifically, excessive video game and social media use has been linked to obesity, while sexting and interacting with strangers online raises risks of legal issues and sexual exploitation. The document questions whether the benefits of these technologies outweigh the potential downsides for teenage users.
The document discusses a study on K-12 students' use of social media profiles like Facebook. Some key findings:
- 82% of participants had children under 14 when they created their first social media profile. 59% were ages 11-14.
- 92% of children had a Facebook profile, with Skype being the second most common at 29%.
- Only 13% of parents reported monitoring their child's social media use "every step", while 33% monitored "most of the time".
- The number of active Facebook users grew from 845 million to over 901 million between February and April 2012, indicating the need for an updated study on students' social media usage.
The document summarizes research for a documentary about social networking. It outlines primary research interviews with an app company, Apple staff, students, and vox pops. It discusses filming locations, props, and mise-en-scene. Secondary research covers cyberbullying statistics and privacy issues. Archive research lists usage statistics for YouTube, Twitter, Facebook, and Tumblr.
This document provides information about primary and secondary research conducted for a documentary on social networking and apps. The primary research section outlines planned interviews with an app company, Apple staff, students, and general public. Details are given for filming locations, props, and desired background scenes. The secondary research covers statistics on cyberbullying, privacy issues, and past usage data for YouTube, Twitter, Facebook, and Tumblr. Archive information on each platform includes user numbers, time spent, posts made, and demographics.
This document provides information about primary and secondary research conducted for a documentary on social networking and apps. The primary research section outlines planned interviews with an app company, Apple staff, students, and general public. Details of filming location, props, and desired background scenes are also included. The secondary research section presents statistics on cyberbullying, privacy issues, and popular social media sites like YouTube, Twitter, Facebook, and Tumblr. Archive facts are given on user numbers, minutes spent, posts made, and demographics of users for each site.
This document discusses the use of mobile devices like cell phones and iPods in K-12 classrooms. It provides examples of how teachers have incorporated these tools to engage students and enhance learning. These include having students translate passages from Romeo and Juliet into text speak, create mobile novels, use QR codes to access information on field trips, and send photos from field trips to online sharing sites. The document also addresses concerns around students using their own devices in class and provides examples of classroom mobile use policies.
The document discusses various topics related to technology use in classrooms. It describes how clickers are being used to engage all students in polling questions during lessons, but that overuse of clickers could shift the focus from learning material. iPads are also discussed as beneficial for presenting clear material on a large screen, though they may not be best for long writing assignments. The document addresses debates around filtering the internet in schools to block inappropriate content versus limiting access to educational resources, as well as issues of internet piracy and illegal music/movie downloading.
In this Global Kids training led by Amira Fouad and Rik Panganiban, educators will be engaged in hands on activities using social media tools that have educational applications and hear about successful case studies from a variety of educational settings.
The Social Habit 2011 is a new study from Edison Research and Arbitron that looks at America's usage of Facebook, Twitter, Foursquare and other social networking sites and services. New representative and projectable statistics on the familiarity, usage and consumer behaviors associated with these sites and services is revealed, along with new data on brand following behavior and social commerce. This study was first presented at Blogworld East in New York in May 2011
Preface
Novel Coronavirus COVID-19 has compelled us to quarantine in our home. Apart from the countries in world, India too is badly affected by this phenomenon. Government imposed lockdown so people stay at home and help the humanity to break the chain of Corona virus. As the Covid19 outbreak continues and all communication channels from Government to media is urging people from mid-March to stay home, people now habituated spending time leisurely on their couch, started consuming and creating contents from home on various mediums.
From last 60 days, social distancing and social isolation has become popular habit and it’s no surprise to say that people has started consuming enormous amount of data in creation and dissemination of digital contents. For all of us various mediums including Social media, emerged as a massive communication tool.
National Institute of Mass Communication and Journalism (NIMCJ) took this opportunity to study on the media consumption pattern in this lockdown period and tried to understand how people consumed data and contents in various forms.
David Nicholas, Ciber: Audience Analysis and Modelling, the case of CIBER and...michellep
The document discusses CIBER's work using deep log analysis (DLA) to understand user behavior in digital environments. DLA transforms digital activity data into information on user satisfaction, impacts, and outcomes. Findings from DLA are used to inform system changes. Benefits of DLA include its ability to analyze massive amounts of direct and real-time user activity data without sampling. CIBER has used DLA in various research projects analyzing digital behavior in fields like health, publishing, and education.
The document discusses the concept of a "digital tattoo" which refers to one's online presence and digital identity. It notes that Facebook would be the third largest country by population. It then provides perspectives from UBC students on searching for people online and managing one's digital footprint. The rest of the document discusses scenarios where one's digital identity could impact them, such as for new immigrants, in the job hiring process, and how content online can spread widely and be hard to remove. It raises questions about digital citizenship and managing one's online reputation.
Netnography online course part 1 of 3 17 november 2016suresh sood
The document discusses findings from two studies on social media usage in Australia. The first study found that Australians send an average of 234 million tweets per month, with females more likely to retweet than males. The second study was the first analysis of Instagram usage in Australia. It also discusses a social media research project called "Datafication" that analyzed Twitter data to understand user motivations and behaviors. Software created by Dr. Suresh Sood then analyzed the data to produce insights into what people do on Twitter.
The Future of the Internet - The Next 30 YearsRahul Singh
What will the future look like? What role does the Internet play in your life today, and how will it affect you in the future. This paper expands on current trends and extrapolates what our world will look like in the next thirty years.
Hindsight Imbalance Online and Offline Life: Qualitative Feedback from Online...Dr Poonsri Vate-U-Lan
The document summarizes the proceedings of the International e-Learning Conference 2015, which was held in Bangkok, Thailand on July 20-21, 2015. The conference was organized by the Thailand Cyber University Project to bring together Thai and international educators and researchers to exchange knowledge and experiences in e-learning.
The conference aimed to be a platform for sharing innovative e-learning practices and expanding e-learning knowledge through publications and other means. It covered various topics related to its theme of "Global Trends in Digital Learning," including MOOCs, educational technology, mobile learning, social media in education, emerging technologies, and learning analytics. Events included keynote speeches and paper presentations. Over 800 participants attended the two-day event
- The document presents information on how consumers use the internet and how technology impacts their lives. It includes statistics on global internet usage, popular online activities/platforms, devices used to access the internet, and online shopping trends. Some key findings are that internet usage and speeds are increasing worldwide, Google is the dominant search engine, and mobile devices are most commonly used for online shopping. The future of business is predicted to be fully digital.
This document discusses the potential for using students' personal cell phones in K-12 classrooms for educational purposes. It notes that most students now have cell phones and use them regularly outside of school. One middle school implemented a policy allowing educational use of cell phones and found increased participation and fewer discipline issues. The school set rules around appropriate use and discussed digital safety and privacy with students. Overall, the document argues that banning cell phones has not worked and that schools should consider policies integrating students' own technologies into learning.
The document discusses challenges and opportunities for technology-mediated social participation. It outlines a framework with three stages of participation: readers, contributors, and collaborators/leaders. It also discusses theories of how online social networks evolve and factors that motivate different levels of participation, such as usability, sociability, and recognition features. The goal is to harness online communities to address national priorities like disaster response, health issues, education and more.
Getting to the Edge of the Future - Tools & Trends of Foresight to Nowcastingsuresh sood
The document discusses tools and trends in foresight and nowcasting. It covers topics such as a quick history of foresight, nowcasting using social media and predictive capabilities, the Recorded Future architecture for collecting time-tagged facts from over 70,000 real-time sources, and new and innovative information sources like social media and the Internet of Things. Examples of using these tools and data sources to predict events, trends, and innovations are also provided.
This document is a thesis submitted by Samuel Ayokunle Adekanmbi in partial fulfillment of a Master of Science degree in computer science from the University of Ibadan in February 2014. It investigates filtering offensive language in online communities using grammatical relations. The thesis acknowledges various individuals who provided support and dedicates the work to promoting a shared vision. It then provides an abstract that overviews developing and implementing a sentence-level semantic filtering system to remove offensive content while maintaining readability. The literature review covers topics like offensive language in online communities, cyberbullying, and using grammatical analysis for semantic filtering.
The document discusses trends in mobile phone usage in Australia and globally. Some key points:
- Mobile phone and smartphone ownership is rising rapidly in Australia, with over half the population now owning a smartphone. Australians have the second highest smartphone adoption globally.
- Android phones have surpassed Apple's iOS as the most popular mobile operating system in Australia. Mobile applications are the most popular usage on smartphones.
- People are using their smartphones frequently throughout the day and are becoming dependent on them. Four main smartphone personality types have emerged: Zookeeper, COP, FOMO, and Social Creator.
- Mobile internet usage and time spent on apps is growing quickly while desktop internet usage declines. The mobile web, responsive design
Experts expect that apps and the web will converge in the cloud, driven by trends in mobile devices, cloud computing, and app usage. While apps provide simplicity, some worry this could come at the cost of losing aspects of an open web. A survey of technology experts found that most believed the web would remain strong, but others felt apps would dominate users' online experiences by 2020. The outcomes may involve elements of both scenarios.
IEEE is the world's largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. It has over 425,000 members across more than 160 countries. IEEE inspires a global community through publications, conferences, technology standards, and professional and educational activities to advance innovation. Kuncoro Wastuwibowo is the Chair of the IEEE Indonesia Section and provided information on IEEE's activities and membership.
IEEE is the world's largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. It has over 425,000 members across more than 160 countries. IEEE inspires a global community through publications, conferences, technology standards, and professional and educational activities. The chair of the IEEE Indonesia Section provided an overview of IEEE's global reach and impact.
(1) As technology usage increases, personal privacy will diminish completely as applications and devices constantly collect user data through location tracking, social media activity monitoring, and facial recognition software.
(2) Many parents also engage in "cyberparenting" by spying on their children's online activities like monitoring which websites they visit, accessing their social media accounts, and reading their phone calls and messages without consent.
(3) To maintain some privacy, individuals should read companies' privacy policies, use strong and unique passwords for accounts, and be cautious about what personal information they share online or click on.
This document presents a research study on who uses apps frequently on vacation. It begins with an introduction on mobile app usage worldwide and previous related research focusing on how tourists use apps and how apps affect travel experiences. It then discusses the research gap in lack of empirical evidence on additional variables. The study aims to determine what types of people frequently use apps on vacation and relevant indicators. It develops hypotheses based on a theoretical background including the technology acceptance model. The hypotheses predict relationships between frequent app use and tendency for internet use on vacation, employment status, age, gender, and tourist origin. The document concludes with a description of the study's method, results which support most hypotheses, and implications for service providers.
This document discusses a discussion forum assignment in a comm120 week 6 class. The goal is to discuss contemporary privacy and security issues. Students are split into two conversation groups, one on security. They are asked to locate a credible source on digital privacy or security, summarize the key issue, and discuss how it impacts lives. Two students post their 250+ word responses. The first discusses new Facebook security features for the 2020 election to prevent foreign interference. The second discusses an OECD report on protecting children online from various technology, consumer and privacy risks and the need for coordinated policy approaches.
This document discusses a discussion forum assignment in a comm120 week 6 class. The goal is to discuss contemporary privacy and security issues. Students are split into two conversation groups, one on security. They are asked to locate a credible source on digital privacy or security, summarize the key issue, and discuss how it impacts lives. Two students post their 250+ word responses. The first discusses new Facebook security features for the 2020 election to prevent foreign interference. The second discusses an OECD report on protecting children online from various technology, consumer and privacy risks.
Similar to Introduction to privacy feedback research @ DesRes2016 (20)
Informed consent is a basic requirement for accessing any digital service which gathers personal data. However, the way people are requested to give consent often exposes them to the extensive collection of their personal information which, in turn, poses threats for personal freedom. This calls for new approaches to design more effective consent experiences.
The proposed workshop is conceived as hands-on UX brainstorm which employs tools derived from the field of service design to generate new consent solutions. Attendees will learn how to use simple design tools to improve the experience of managing consent and privacy online. New insights on how to design for consent will be generated throughout the workshop activity by reflecting together upon the outcomes.
Informed consent is a basic requirement for accessing any digital service which gathers personal data. However, the way people are requested to give consent often exposes them to the extensive collection of their personal information which, in turn, poses threats for personal freedom. This calls for new approaches to design more effective consent experiences.
The proposed workshop is conceived as hands-on UX brainstorm which employs tools derived from the field of service design to generate new consent solutions. Attendees will learn how to use simple design tools to improve the experience of managing consent and privacy online. New insights on how to design for consent will be generated throughout the workshop activity by reflecting together upon the outcomes.
#7 THINGS YOU MAY WANT TO CONSIDER FOR YOUR NEXT 3D PRINTED PROJECT | INNOVAD...Alessandro Carelli
The document outlines 7 things to consider for a 3D printed project: 1) using 3D printing to enable new designs, 2) considering how the design can be embedded in other objects or systems, 3) focusing on good design principles, 4) using digital design tools, 5) leveraging user-generated content, 6) exploring on-demand distribution models, and 7) considering open source designs and licenses. The document was presented by Alessandro Carelli at InnovaDay on December 18, 2013.
Oggi assistiamo a radicali trasformazioni che investono il settore manifatturiero delle economie avanzate.
L’ondata di “democratizzazione”, che ha favorito la diffusione di strumenti di fabbricazione digitale - fino a poco tempo fa generalmente relegati alle sole grandi imprese - ha reso appetibile la digital fabrication anche alle piccolissime e alle micro realtà produttive, contribuendo, al contempo, alla nascita di nuove giovani start up manifatturiere, integrate all’interno di un nuovo ecosistema produttivo locale o, per meglio dire, urbano.
Propongo una riflessione sull’emergere di questo promettente fenomeno attraverso la sintesi del mio progetto di laurea magistrale in design, presso il Politecnico di Milano.
ARENA - Young adults in the workplace (Knight Moves).pdfKnight Moves
Presentations of Bavo Raeymaekers (Project lead youth unemployment at the City of Antwerp), Suzan Martens (Service designer at Knight Moves) and Adriaan De Keersmaeker (Community manager at Talk to C)
during the 'Arena • Young adults in the workplace' conference hosted by Knight Moves.
Architectural and constructions management experience since 2003 including 18 years located in UAE.
Coordinate and oversee all technical activities relating to architectural and construction projects,
including directing the design team, reviewing drafts and computer models, and approving design
changes.
Organize and typically develop, and review building plans, ensuring that a project meets all safety and
environmental standards.
Prepare feasibility studies, construction contracts, and tender documents with specifications and
tender analyses.
Consulting with clients, work on formulating equipment and labor cost estimates, ensuring a project
meets environmental, safety, structural, zoning, and aesthetic standards.
Monitoring the progress of a project to assess whether or not it is in compliance with building plans
and project deadlines.
Attention to detail, exceptional time management, and strong problem-solving and communication
skills are required for this role.
Fonts play a crucial role in both User Interface (UI) and User Experience (UX) design. They affect readability, accessibility, aesthetics, and overall user perception.
Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...Designforuminternational
India’s architectural landscape is a vibrant tapestry that weaves together the country's rich cultural heritage and its modern aspirations. From majestic historical structures to cutting-edge contemporary designs, the work of Indian architects is celebrated worldwide. Among the many firms shaping this dynamic field, Design Forum International stands out as a leader in innovative and sustainable architecture. This blog explores some of the best Indian architects, highlighting their contributions and showcasing the most famous architects in India.
International Upcycling Research Network advisory board meeting 4Kyungeun Sung
Slides used for the International Upcycling Research Network advisory board 4 (last one). The project is based at De Montfort University in Leicester, UK, and funded by the Arts and Humanities Research Council.
Introduction to privacy feedback research @ DesRes2016
1. What, why, how
Introduction to feedback privacy sensitive runtime data
leaked by smartphone applications
Alessandro Carelli Ph.D. student
Supervisors
Dr M. Sinclair and Dr D. J. Southee
DesRes 2016
13/04/2016
5. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
What
Personal information most frequently leaked by apps
PII Address; birthday; email;
gender; name; password; phone
info; phone number; zip code.
Behaviour Employment; friend; medical
info; post; search; username
Location Location{Source:
Zang, J. et al., 2015. Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third ParOes by Mobile
Apps. Technology Science. Available at: hRp://techscience.org/a/2015103001/
6. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
How can runtime privacy-sensitive data leaked by smartphone
devices be visualised in order to rise users’ awareness and
control over unintended information disclosure?
Froehlich, J. et al., 2012. The Design and EvaluaOon of Prototype Eco-
feedback Displays for Fixture-level Water Usage Data. In Proceedings of the
SIGCHI Conference on Human Factors in Compu<ng Systems. CHI ’12. New
York, NY, USA: ACM, pp. 2367–2376.
From eco-feedback To privacy feedback
7. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why
Research aim, gap, originality
Research aim The aim of this research is to find novel and effective solutions to feeding back
privacy-sensitive runtime data to users in order to
• improve awareness and understanding of personal data leakage taking
place on their smartphones;
• allow users to have more control over the data disclosure.
Research gap While there are many available methods to collect and analyse runtime data
leaked from smartphone devices, there is currently a lack in understanding how
smartphone users might benefits from this information. This, therefore,
represents the gap in knowledge this research strives to fill.
Research
originality
The original aspects of this research are twofold:
• Extending the knowledge from previous works on gap in users’ expectation
about apps behaviour, with a focus on personal feelings and behavioural
reaction;
• Conducting empirical work on designing and evaluating novel ways to feed
back leaked personal information to users that has not been done before.
9. Android dominates the mobile OS market
• 82.8% share in 2015 Q21 ;
Google play is the biggest content provider for mobile applications
• one billion active users in the 2015 2;
• approximately 2 million apps 3;
Android is an OS for the next wave of technologies
• “from phones and tablets to watches, TV, cars and more to come”4.
Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why
Android
Source:
1 hRp://www.idc.com/prodserv/smartphone-os-market-share.jsp
2 hRp://social.techcrunch.com/2015/05/27/google-io-2015-keynote-live-blogsee
3 hRp://mashable.com/2015/01/15/google-play-more-apps-than-ios/#qqY5LYTJAOql
4 hRp://www.android.com/
{
10. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why
Feedback
{
Privacy is part of UX
• 90% of smartphone owners (N=461 Americans adults Ages 18+) say
that knowing how their personal data will be used is “very” or
“somewhat” important when choosing whether or not to install an
app1;
Current privacy information tools are largely ineffective
• Similarly to EULA and privacy notices, users have been found to pay
low attention to the permission list as well as to do not understand in
full the meaning behind permissions (Shklovski et al. 2014; Balebako
et al. 2013; Felt et al. 2012a; Kelley et al. 2012);
Relevance of runtime data to users
• Different studies have empirically tested the relevance of privacy-
sensitive information held in runtime data to users as they may show
the real applications behaviour (Almuhimedi et al. 2015; Balebako et
al. 2013; Jung et al. 2012).
Source:
1 hRp://www.pewinternet.org/2015/11/10/apps-permissions-in-the-google-play-store/
12. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why is to be in control of personal information so difficult?
Technological determinants
{
Data disclosed by smartphone devices allow re-identification of users
• […]in a dataset where the location of an individual is specified hourly, and
with a spatial resolution equal to that given by the carrier’s antennas, four
spatio-temporal points are enough to uniquely identify 95% of the [half
million] individuals (de Montjoye et al. 2013).
• […] previous research has shown that as of the year 2000, 63% of the US
population could be uniquely identified by gender, zip code, and date of
birth, without reference to other factors (Golle 2006 in Book 2015)
Source:
Book, T.R., 2015. Privacy Concerns in Android Adver<sing Libraries. Thesis. Available at: hRps://scholarship.rice.edu/handle/1911/87711
Golle, P., 2006. RevisiOng the Uniqueness of Simple Demographics in the US PopulaOon. In Proceedings of the 5th ACM Workshop on Privacy in Electronic
Society. WPES ’06. New York, NY, USA: ACM, pp. 77–80. Available at: hRp://doi.acm.org/10.1145/1179601.1179615
De Montjoye, Y.-A. et al., 2013. Unique in the Crowd: The privacy bounds of human mobility. Scien<fic Reports, 3. Available at: hRp://www.nature.com/
doifinder/10.1038/srep01376
13. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why is to be in control of personal information so difficult?
Economic determinants
{
Abundance of free available contents (no up-front costs)
• Rougly 90% of android applications on the Google Play Store are free;
Developers need to find alternative revenue-model (mostly by
advertisement)
• Targeted advertising uses users’ personal data to increase the odds that an
advertisement presented to the user will result in a return (perhaps as a result
of a sale) to the advertiser (Evans 2014)
Source:
Evans, D.S., 2014. Rivals for ACen<on: How Compe<<on for Scarce Time Drove the Web Revolu<on, What it Means for the Mobile Revolu<on, and the Future
of Adver<sing, Rochester, NY: Social Science Research Network. Available at: hRp://papers.ssrn.com/abstract=2391833 [Accessed February 8, 2016].
14. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why is to be in control of personal information so difficult?
Enomic determinants
0
500000
1000000
1500000
2000000
2500000
March 19 2011
July 6 2011
August 27 2011
September 23 2011
October 16 2011
November 23 2011
December 24 2011
January 23 2012
February 25 2012
March 16 2012
April 7 2012
May 16 2012
June 28 2012
August 16 2012
September 24 2012
October 28 2012
January 22 2013
April 15 2013
June 25 2013
September 15 2013
October 21 2013
January 22 2014
July 6 2014
October 6 2014
February 14 2015
March 31 2015
April 30 2015
August12 2015
September 5 2015
December 23 2015
February 18 2016
n° of apps
Reference period
The growth of applica5ons in the Google Play Store from 2011 to 2016
paid
free
Source:
ElaboraOon using data from Appbrain.com
15. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why is to be in control of personal information so difficult?
Enomic determinants
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Composi5on of the marketplace
Reference period
The distribu5on of free and paid apps in the Google Play Store from 2011 to 2016
paid
free
Source:
ElaboraOon using data from Appbrain.com
16. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why is to be in control of personal information so difficult?
Enomic determinants
Source:
hRp://www.lumapartners.com/lumascapes/mobile-lumascape
hRps://www.linkedin.com/pulse/20140616180457-72245968-mobile-ad-lingo-dsp-ssp-dmp-rtb-and-programmaOc-all-explained
The mobile marketing
ecosystem (MME) is the network
of interconnected operators and
subsidiaries platforms which
collaborate and compete for the
delivery of targeted ads.
17. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why is to be in control of personal information so difficult?
Enomic determinants
Source:
www.amobee.com
Book, T.R., 2015. Privacy Concerns in Android Adver<sing Libraries. Thesis. Available at:
hRps://scholarship.rice.edu/handle/1911/87711
“[…] it is "clear that the privacy impact of mobile ads extends well beyond the
realm of mobile ad targeting” (Book 2015: 99)
18. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why is to be in control of personal information so difficult?
Political determinants
Conflicting interests between govs and citizens
NSA slide on the agency's 'perfect scenario' for
obtaining data from mobile apps.
Conflicting interests between users and
platform owner
Google is both the owner of the Google Play
Store, the official Android’s applications
marketplace and ADMob, the largest AD
network for mobile devices.
Source: http://www.theguardian.com/world/2014/jan/27/nsa-gchq-
smartphone-app-angry-birds-personal-data
19. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why is to be in in control of personal information so difficult?
Behavioural determinants
{
Unawareness
• Users have limited level of awareness about the collection of personal
information;
• Leakage of personal data is invisible and information often incomplete;
• EULA and privacy policy fail to inform users about relevant threats for
privacy;
• Privacy permissions do not help users to understand implications for privacy.
Secondary concern
• App’s functionalities and the desire to own it for free are often more relevant
to users than their implications for privacy;
• Outcomes of the data disclosure are often unknown;
• The desire to share is a powerful motivator than possible privacy threats;
Limited rationality
• Privacy paradox;
• Control Paradox;
• Personalisation paradox
21. Why
Research methodology
Methodology
(or research
approach)
philosophical
framework and the
fundamental
assumptions of
research*
Research through design (RtD)
• RtD is a research approach based on the assumption that designing often
lead to generalizable knowledge which employs methods and processes
from design practice as a legitimate method of inquiry (third wave of HCI)
(Zimmerman et al. 2010; Steppers 2006);
• In RtD prototypes can play a number of roles and are the core means by
which the designer builds the connection between fields of knowledge, and
iterates toward a product (Sanders & Stappers 2014; Steppers 2006);
• RtD is the results of the shift of the HCI community from actual problem
and usability to Wicked Problems (Zimmerman et al. 2010; Steppers
2006);
Research
design
plan of action that links
the philosophical
assumptions to specific
methods*
Mixed methods
• “As a method, it focuses on collecting, analyzing, and mixing both
quantitative and qualitative data in a single study or series of studies”
Creswell & Plano Clark (2011:5);
• Mixed method research is common in HCI (van Turnhout et al. 2014).
Source:
*Creswell, J.W. & Plano Clark, V.L., 2011. Designing and conducting mixed methods research 2nd ed.., Los Angeles: SAGE
Publications.
22. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Why
Research design | Validating solution design research pattern
{
• Starting point for this approach can be an
unsolved problem, deficiencies in existing
solutions, or the need to illustrate a novel vision
or idea with concrete examples;
• [it] is an effective way to further the state of
the art and to ‘push’ new ideas and
interaction techniques;
• It can efficiently bridge rigor and relevance,
although some lab studies fail to touch the ‘real’
application domain if this is not clearly defined
upfront.
Source:
Van Turnhout, K. et al., 2014. Design Patterns for Mixed-method Research in HCI. In Proceedings of the 8th Nordic
Conference on Human-Computer Interaction: Fun, Fast, Foundational. NordiCHI ’14. New York, NY, USA: ACM, pp. 361–370.
Available at: http://doi.acm.org/10.1145/2639189.2639220
25. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
How
Collecting and analysing
Objective • to build a dataset of personal information
shared by applications in order to be used
in the following phase of the research.
Research
questions
• What are the typologies of personal
information that can be collected and
shared by the applications installed on
the phone without users awareness?
Methods • Systematic literature review of studies
concerning data leakage from
smartphone applications using dynamic
analysis approach;
• Collecting and analysing applications
data leakage from 65 Android
applications using the MITM approach;
{
31. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
How
Privacy feed
1 Traffic interception
Any outgoing traffic such as GET / POST requests by
applications and third-party libraries to external servers
are being intercepted using MITM proxy server.
2 Log collection, normalisation and storage
The different components of the logs (e.g. url,
parameters, values) are stored in the relational DB
3 Adding metadata information (tagging)
Labels (e.g. privacy-sensitiveness, data typology, data
category, privacy rank) can be manually added to each
parameter contained in the logs.
{
34. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
How
Privacy feed
1 Traffic interception
Any outgoing traffic such as GET / POST requests by
applications and third-party libraries to external servers
are being intercepted using MITM proxy server.
2 Log collection, normalisation and storage
The different components of the logs (e.g. url,
parameters, values) are stored in the relational DB
3 Adding metadata information (tagging)
Labels (e.g. privacy-sensitiveness, data typology, data
category, privacy rank) can be manually added to each
parameter contained in the logs.
4 Metadata restitution
{
36. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
How
Study 1 – Longitudinal analysis of 65 free and paid
Android’s Apps
{
Longitudinal study with 65 popular Androids applications (25 free,
20 freemium, 20 preemium) from 8 Google play categories.
n" Objectives"
01" Privacy2sensitive"data"typologies"leaked"by"applications"
02" Frequency"of"the"data"leakage"
03" Destination"of"the"data"leakage"(third2parties"typologies)"
04" To"rank"leaked"privacy2sensitive"data"according"to"their"privacy2sensitiveness"
05" Overview"of"the"data"leakage"per"application"categories"
06" Data"leaked"while"using"the"application"vs"data"leaked"in"background"
07" Data"leaked"by"freemium"(free)"vs"premium"(paid)"apps"
"
37. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
How
Understanding and ranking
Objective To understand people’s opinion and feelings about
privacy-sensitive information leaked by
applications.
Research
question
What type of information are smart phone users
most concerned about being leaked from their
phones?What would they feel in case such
information have been shared by applications?
What would they do if this happened?
Methods • Online large-scale survey;
• Semi-structured interviews.
{
38. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
How
Understanding and ranking
Objective To design and evaluate visualisation solutions using
runtime data that can improve users’ awareness and
control over data disclosed by applications installed on
the smartphone.
Research
question
How does runtime data collected from applications
can be provided to users in order to improve their
awareness about information disclosure as well as to
support them in the decision-making?
Methods • Design diary;
• Online survey;
• Semi-structured interviews;
{
39. Alessandro Carelli Ph.D student | Loughborough Design School | DesRes 2016 | 13/04/2016
Summary and conclusions
What, why, how
What The aim of this research is to find novel and effective solutions to
feeding back privacy-sensitive runtime data to users in order to
raise their awareness and improve their control over unintended
data disclosure.
Why While smartphone privacy-sensitive runtime data has been proved
to be effective in order to raise users’ awareness and understanding
about the apps’ behaviour, there is a gap in knowledge on how such
information can be visualised and fed back;
How Using the research through design (RtD) approach and mixed
method research design to develop and assess novel data
visualisation interfaces.