Results for 'user data'

971 found
Order:
  1. A user profiling component with the aid of user ontologies.Nébel István-Tibor, Barry Smith & Paschke Ralf - 2003 - In Nébel István-Tibor, Barry Smith & Paschke Ralf (eds.), Learning – Teaching – Knowledge – Adaptivity (LLWA), University of Karlsruhe (2003). Karlsruhe, Germany:
    Abstract: What follows is a contribution to the field of user modeling for adaptive teaching and learning programs especially in the medical field. The paper outlines existing approaches to the problem of extracting user information in a form that can be exploited by adaptive software. We focus initially on the so-called stereotyping method, which allocates users into classes adaptively, reflecting characteristics such as physical data, social background, and computer experience. The user classifications of the stereotyping method (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Users’ Guide to the Use of Dictionary.Christopher Okeke Ajah - 2019 - GNOSI: An Interdisciplinary Journal of Human Theory and Praxis 2 (1).
    Dictionary making is the preoccupation of a lexicographer (dictionary compiler) and the art of making it (dictionary) is called lexicography. Dictionary can either be in printing or electronic form. It is no doubt a vital tool for language learning and usage. The importance of a dictionary in learning and usage of a language cannot be neglected because its role in learning generally which includes among others: word meaning, word usage, pronunciation, spelling, origin and parts of speech are fundamental in communication. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Digital Rights and Freedoms: A Framework for Surveying Users and Analyzing Policies.Todd Davies - 2014 - In Luca Maria Aiello & Daniel McFarland (eds.), Social Informatics: Proceedings of the 6th International Conference (SocInfo 2014). Springer Lecture Notes in Computer Science Vol. 8851. pp. 428-443.
    Interest has been revived in the creation of a "bill of rights" for Internet users. This paper analyzes users' rights into ten broad principles, as a basis for assessing what users regard as important and for comparing different multi-issue Internet policy proposals. Stability of the principles is demonstrated in an experimental survey, which also shows that freedoms of users to participate in the design and coding of platforms appear to be viewed as inessential relative to other rights. An analysis of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Digitale Entmündigung und User Experience Design. Wie digitale Geräte uns nudgen, tracken und zur Unwissenheit erziehen.Rainer Mühlhoff - 2018 - Leviathan - Berliner Zeitschrift Für Sozialwissenschaft 46 (4).
    Der vorliegende Artikel untersucht moderne Mensch-Maschine-Interaktion im Kontext verbreiteter Hard- und Softwareoberflächen und diskutiert davon ausgehend die Frage nach Aufklärung und Gegenaufklärung im digitalen Zeitalter. Er nimmt das Feld des »User Experience Designs« in den Blick - dies ist ein stilprägender Fachdiskurs, in dem verhaltenswissenschaftliche Erkenntnisse und massendatenbasierte Analysen zur Optimierung von Benutzeroberflächen und Interaktionsdesigns eingesetzt werden. Anhand von Beispielstudien wird argumentiert, dass dieser Gestaltung systematisch drei implizite anthropologische Annahmen zugrunde liegen: Nutzerverhalten gilt als durch prä-reflexive Stimuli beeinflussbar; es (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  7. Reconciling Data Actionability and Accountability in Global Health Research.Nathanael Sheehan & Sabina Leonelli - manuscript
    All too often, the requirements for actionability and accountability of data infrastructures are conceptualised as incompatible and leading to a trade-off situation where increasing one will unavoidably decrease the other. Through a comparative analysis of two data infrastructures used to share genomic data about the SARS-COV-2 virus, we argue that making data actionable for knowledge development involves a commitment to ensuring that the data in question are representative of the phenomena being studied and accountable to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. “In Flow”! Why Do Users Share Fake News about Environmentally Friendly Brands on Social Media?Daniel-Rareș Obadă & Dan-Cristian Dabija - 2022 - International Journal of Environmental Research and Public Health 19 (8).
    Social media has triggered an increase in fake news spread about different aspects of modern lives, society, politics, societal changes, etc., and has also affected companies’ reputation and brands’ trust. Therefore, this paper is aimed at investigating why social media users share fake news about environmentally friendly brands. To examine social media users’ behavior towards environmentally friendly brands, a theoretical research model proposed and analyzed using structural equations modeling in SmartPLS on a convenience sample consisting of 922 questionnaires. Data (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Performance development and its relationship to demographic variables among users of computerized management information systems in Gaza electricity Distribution Company.Mazen J. Al Shobaki & Samy S. Abu Naser - 2016 - International Journal of Humanities and Social Science Research 2 (10):21-30.
    This paper aims to identify Performance development and its relationship to demographic variables among users of computerized management information systems in Gaza Electricity Distribution Company. This research used two dimensions. The first dimension is demographic variables among users of computerized management information systems and the second dimension the Development of Performance. The control sample was (360) questioners were distributed and (306) were retrieved back with a percentage of (85%). Several statistical tools were used for data analysis and hypotheses testing, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  88
    Smart Homes with Augmented Reality and IoT Integration for Enhanced User Experience and Automation.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The proposed system allows users to monitor and control various home appliances, security systems, and environmental controls through AR interfaces, which overlay digital information on the physical environment. IoT devices communicate with each other and with the AR system, providing real-time data and enabling automated responses based on user preferences or environmental conditions. This synergy between AR and IoT facilitates a more responsive and intelligent home environment that adapts to the needs of its occupants.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Reliability of users as a key factor in Pakistan's long-term e- service adoption: An empirical study (2nd edition).Abdul Rahim Chandio - 2024 - International Journal of Academic Multidisciplinary Research (Ijamr) Issn: 2643-9670 8 (2):111-117.
    Abstract- This study's objective is to examine how people perceive about the technology. Use by public employees via interpreting the intentional approach of users in Pakistan context. The prevailing research inculcates the behavioral constructs such as "perceived usefulness" (PU), " Trust in technology (TIT), "intention to utilize (ITU)," and "perceived ease of use" (PEOU), together with other relevant considerations, affect how an employee feels about their employer's tendency to utilize modern technology in the public sector. TAM and Technology Acceptance Model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  32
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Reasons for endorsing or rejecting ‘self-binding directives’ in bipolar disorder: a qualitative study of survey responses from UK service users.Tania Gergel, Preety Das, Lucy Stephenson, Gareth Owen, Larry Rifkin, John Dawson, Alex Ruck Keene & Guy Hindley - 2021 - The Lancet Psychiatry 8.
    Summary Background Self-binding directives instruct clinicians to overrule treatment refusal during future severe episodes of illness. These directives are promoted as having potential to increase autonomy for individuals with severe episodic mental illness. Although lived experience is central to their creation, service users’ views on self-binding directives have not been investigated substantially. This study aimed to explore whether reasons for endorsement, ambivalence, or rejection given by service users with bipolar disorder can address concerns regarding self-binding directives, decision-making capacity, and human (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  22
    Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
    Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short- Term Memory (LSTM) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Improving Bayesian statistics understanding in the age of Big Data with the bayesvl R package.Quan-Hoang Vuong, Viet-Phuong La, Minh-Hoang Nguyen, Manh-Toan Ho, Manh-Tung Ho & Peter Mantello - 2020 - Software Impacts 4 (1):100016.
    The exponential growth of social data both in volume and complexity has increasingly exposed many of the shortcomings of the conventional frequentist approach to statistics. The scientific community has called for careful usage of the approach and its inference. Meanwhile, the alternative method, Bayesian statistics, still faces considerable barriers toward a more widespread application. The bayesvl R package is an open program, designed for implementing Bayesian modeling and analysis using the Stan language’s no-U-turn (NUTS) sampler. The package combines the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  17. Social Distancing, Lockdown Obligatory, and Response Satisfaction During COVID-19 Pandemic: Perception of Nigerian Social Media Users.Olalekan Seun Olagunju, Obasanjo Afolabi Bolarinwa & Tesleem Babalola - 2020 - Advanced Journal of Social Sciences 7:44-53.
    Background: Pandemics are challenging for clinical and public health agencies and policymakers because of the scientific and medical uncertainty that accompanies novel viruses like COVID-19 makes an increase of morbidity and mortality prominent. Consequently, there is a need to evaluate the public perception of social distancing, lockdown obligatory, and response satisfactory during the pandemic. Methods: This cross-sectional survey used an anonymous online google based questionnaire to collect data from respondents via social media platforms. The online survey was conducted among (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. “Giving something back”: a systematic review and ethical enquiry into public views on the use of patient data for research in the United Kingdom and the Republic of Ireland.Jessica Stockdale, Jackie Cassell & Elizabeth Ford - 2019 - Wellcome Open Research 3 (6).
    Background: Use of patients’ medical data for secondary purposes such as health research, audit, and service planning is well established in the UK. However, the governance environment, as well as public understanding about this work, have lagged behind. We aimed to systematically review the literature on UK and Irish public views of patient data used in research, critically analysing such views though an established biomedical ethics framework, to draw out potential strategies for future good practice guidance and inform (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. PREDICTION OF EDUCATIONAL DATA USING DEEP CONVOLUTIONAL NEURAL NETWORK.K. Vijayalakshmi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):93-111.
    : One of the most active study fields in natural language processing, web mining, and text mining is sentiment analysis. Big data is an important research component in education that is used to advance the value of education by watching students' performance and understanding their learning habits. Real-time student feedback will enable teachers and students to understand teaching and learning challenges in the most user-friendly manner for students. By linking learning analytics to grounded theory, the proposed Deep Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Online Education System for Undergraduate Students.K. Madhuri - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-13.
    The proposed system will be implemented as an online website equipped with a user-friendly interface designed to cater to the intuitive navigation needs of undergraduate students. The frontend technologies selected will prioritize usability and responsiveness, ensuring seamless interaction across devices. Meanwhile, robust backend and database technologies will be employed to securely store and efficiently retrieve educational content and user data.
    Download  
     
    Export citation  
     
    Bookmark  
  21. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. (1 other version)Accessing Online Data for Youth Mental Health Research: Meeting the Ethical Challenges.Elvira Perez Vallejos, Ansgar Koene, Christopher James Carter, Daniel Hunt, Christopher Woodard, Lachlan Urquhart, Aislinn Bergin & Ramona Statache - 2019 - Philosophy and Technology 32 (1):87-110.
    This article addresses the general ethical issues of accessing online personal data for research purposes. The authors discuss the practical aspects of online research with a specific case study that illustrates the ethical challenges encountered when accessing data from Kooth, an online youth web-counselling service. This paper firstly highlights the relevance of a process-based approach to ethics when accessing highly sensitive data and then discusses the ethical considerations and potential challenges regarding the accessing of public data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. IoT-Integrated Smart Home Technologies with Augmented Reality for Improved User Experience.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The paper also discusses the technical architecture, including the network protocols, data management strategies, and user interface design considerations necessary to implement such a system. Additionally, it addresses the challenges related to data security, privacy, and system interoperability. Finally, the paper outlines potential future enhancements, such as the incorporation of AI-driven predictive analytics and advanced AR features, to further elevate the smart home experience.
    Download  
     
    Export citation  
     
    Bookmark  
  24. #c3t the command & control of Twitter : on a socially constructed Twitter & applications of the philosophy of data.Brian Ballsun-Stanton & Kate Carruthers - 2010 - In Franz Ko & Yunji Na (eds.), Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on. iEEE. pp. 161-165.
    This paper explores the transformation of Twitter from the traditional developer based command and control into something strangely democratic: a social construction of utility, a twisting of this once unique service to serve the needs and desires, ever evolving, of its users. We explore changes in the social constructions of Twitter and use recent research in the Philosophy of Data to suggest potential explanations.
    Download  
     
    Export citation  
     
    Bookmark  
  25. Evaluating the perceptions of E-learning users during the COVID-19 outbreak in Pakistan: An empirical study.Chandio Abdul Rahim - 2024 - International Journal of Academic Management Science Research (Ijamsr) Issn: 2643-900X 8 (3):1-8.
    Abstract: The use of the technology in the way of teaching and learning in the higher educational institutions sustained a significant position during the pandemic emergency in Pakistan and across the world to continue the educational activities. The extant study investigates the pedagogical challenges in which proposed factors used to discover the intention of the users in the form of their ease of the technological use and assessing the social influence of people regarding the innovative digital adoption in the online (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Hacking the social life of Big Data.Tobias Blanke, Mark Coté & Jennifer Pybus - 2015 - Big Data and Society 2 (2).
    This paper builds off the Our Data Ourselves research project, which examined ways of understanding and reclaiming the data that young people produce on smartphone devices. Here we explore the growing usage and centrality of mobiles in the lives of young people, questioning what data-making possibilities exist if users can either uncover and/or capture what data controllers such as Facebook monetize and share about themselves with third-parties. We outline the MobileMiner, an app we created to consider (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  27. NEUTROSOPHIC THEORY AND SENTIMENT ANALYSIS TECHNIQUE FOR MINING AND RANKING BIG DATA FROM ONLINE EVALUATION.C. Manju Priya - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):124-142.
    A huge amount of data is being generated everyday through different transactions in industries, social networking, communication systems etc. Big data is a term that represents vast volumes of high speed, complex and variable data that require advanced procedures and technologies to enable the capture, storage, management, and analysis of the data. Big data analysis is the capacity of representing useful information from these large datasets. Due to characteristics like volume, veracity, and velocity, big (...) analysis is becoming one of the most challenging research problems. Semantic analysis is method to better understand the implied or practical meaning of the input dataset. It is mostly applied with ontology to analyze content mainly in web resources. This field of research combines text analysis and Semantic Web technologies. The use semantic knowledge is to aid sentiment analysis of queries like emotion mining, popularity analysis, recommendation systems, user profiling, etc. A new method has been proposed to extract semantic relationships between different data attributes of big data which can be applied to a decision system. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Attitude and Electricity-Saving Behaviors among Household Users of Electricity in Nsukka, Nigeria.Chinyere Theresa Ogbuanya - 2023 - International Journal of Home Economics, Hospitality and Allied Research 2 (2):275-285.
    Household electricity consumption rates are increasing globally. However, saving electricity can decrease energy use, avoid wastage, and save financial resources for households. Therefore, this study was conducted to determine how attitude influences electricity-saving behaviors among household users in Nsukka District, Enugu State, Nigeria. The study adopted a descriptive survey design. A research question with corresponding null hypotheses was formulated and tested at a 0.05 level of significance. Stratified random sampling was used to select 400 household users, consisting of 206 females (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Relationship between accounting benefits and ERP user satisfaction in the context of the fourth industrial revolution.Alain Vilard Ndi Isoh - 2020 - International Journal of Scientific Research and Management (IJSRM) 8 (2).
    The importance of corporate social responsibility is shaping investment decisions and entrepreneurial actions in diverse perspectives. The rapid growth of SMEs has tremendous impacts on the environment. Nonetheless, the economic emergence plan of Cameroon has prompted government support of SMEs through diverse projects. This saw economic growth increased to 3.8% and unemployment dropped to 4.3% caused by the expansion of private sector investments. The dilemma that necessitated this study is the response strategy of SMEs operators towards environmental sustainability. This study, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. COVID-19 MYTHOLOGY AND NETIZENS PARRHESIA IDEOLOGICAL EFFECTS OF CORONAVIRUS MYTHS ON SOCIAL MEDIA USERS.Muhammad Hasyim - 2020 - Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17 (4):1398-1409.
    Social Media is a new media of information flow gateway that can be accessed by the public, easily and freely. Social Media is an interactive information technology which not only can netizens access information, but they can also make news (information, comments, etc.) and share it on the internet. Easy access to information has caused ideological effects on society. This research aims to examine the ideological effects of the myths about COVID-19 on social media. The data collection was done (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. A reference to the US News graduate school ranking and NRC data.Kiyoung Kim - manuscript
    The purpose of college and university ranking mainly resides to assist with the students in choosing their schools and programs at the level they wish to study. The US News and World Report (USNWR) graduate programs ranking is notable that evaluates the graduate level programs uniquely and in contrast with other general subject rankings. Along with the reputation of source, this specificity enables to enjoy a number of subscribers in making an application decision about which school or program is competitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Scopus at 15: Part 3 – Elsevier Gets Some Advice From Users.Nancy Herther - 2020 - ATG Original 2020 (5):1-8.
    As information professionals know, the use of citation data and author metrics has become standard across the research landscape. Against the Grain contacted a number of citation research experts to get their perspectives on Scopus today, as well as suggestions for Elsevier in the future.
    Download  
     
    Export citation  
     
    Bookmark  
  36. The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral responsibilities (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  37. Social Media and its Negative Impacts on Autonomy.Siavosh Sahebi & Paul Formosa - 2022 - Philosophy and Technology 35 (3):1-24.
    How social media impacts the autonomy of its users is a topic of increasing focus. However, much of the literature that explores these impacts fails to engage in depth with the philosophical literature on autonomy. This has resulted in a failure to consider the full range of impacts that social media might have on autonomy. A deeper consideration of these impacts is thus needed, given the importance of both autonomy as a moral concept and social media as a feature of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  38. Streamlined Book Rating Prediction with Neural Networks.Lana Aarra, Mohammed S. Abu Nasser, Mohammed A. Hasaballah & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (10):7-13.
    Abstract: Online book review platforms generate vast user data, making accurate rating prediction crucial for personalized recommendations. This research explores neural networks as simple models for predicting book ratings without complex algorithms. Our novel approach uses neural networks to predict ratings solely from user-book interactions, eliminating manual feature engineering. The model processes data, learns patterns, and predicts ratings. We discuss data preprocessing, neural network design, and training techniques. Real-world data experiments show the model's effectiveness, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. What Do Technology and Artificial Intelligence Mean Today?Scott H. Hawley & Elias Kruger - forthcoming - In Hector Fernandez (ed.), Sociedad Tecnológica y Futuro Humano, vol. 1: Desafíos conceptuales. pp. 17.
    Technology and Artificial Intelligence, both today and in the near future, are dominated by automated algorithms that combine optimization with models based on the human brain to learn, predict, and even influence the large-scale behavior of human users. Such applications can be understood to be outgrowths of historical trends in industry and academia, yet have far-reaching and even unintended consequences for social and political life around the world. Countries in different parts of the world take different regulatory views for the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of data and this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Four Facets of Privacy and Intellectual Freedom in Licensing Contracts for Electronic Journals.Alan Rubel & Mei Zhang - 2015 - College and Research Libraries 4 (76):427-449.
    This is a study of the treatment of library patron privacy in licenses for electronic journals in academic libraries. We begin by distinguishing four facets of privacy and intellectual freedom based on the LIS and philosophical literature. Next, we perform a content analysis of 42 license agreements for electronic journals, focusing on terms for enforcing authorized use and collection and sharing of user data. We compare our findings to model licenses, to recommendations proposed in a recent treatise on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The Karl Marx Problem in Contemporary New Media Economy: A Critique of Christian Fuchs’ Account.Kaan Kangal - 2016 - Television and New Media 17 (5):416– 428.
    This article focuses on five flaws of Christian Fuchs’ approach of Web 2.0 economy. Here, Fuchs’ views on immaterial production, productivity of labor, commodification of users’ data, underestimation of financial aspects of digital economy, and the violation of Marx’s laws of value production, rate of exploitation, fall tendency of profit rate, and overproduction crisis are put into question. This article defends the thesis Fuchs fails to apply Marxian political economy to the contemporary phenomena of Web 2.0 economy. It is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Key ethical challenges in the European Medical Information Framework.Luciano Floridi, Christoph Luetge, Ugo Pagallo, Burkhard Schafer, Peggy Valcke, Effy Vayena, Janet Addison, Nigel Hughes, Nathan Lea, Caroline Sage, Bart Vannieuwenhuyse & Dipak Kalra - 2019 - Minds and Machines 29 (3):355-371.
    The European Medical Information Framework project, funded through the IMI programme, has designed and implemented a federated platform to connect health data from a variety of sources across Europe, to facilitate large scale clinical and life sciences research. It enables approved users to analyse securely multiple, diverse, data via a single portal, thereby mediating research opportunities across a large quantity of research data. EMIF developed a code of practice to ensure the privacy protection of data subjects, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. A phenomenology and epistemology of large language models: transparency, trust, and trustworthiness.Richard Heersmink, Barend de Rooij, María Jimena Clavel Vázquez & Matteo Colombo - 2024 - Ethics and Information Technology 26 (3):1-15.
    This paper analyses the phenomenology and epistemology of chatbots such as ChatGPT and Bard. The computational architecture underpinning these chatbots are large language models (LLMs), which are generative artificial intelligence (AI) systems trained on a massive dataset of text extracted from the Web. We conceptualise these LLMs as multifunctional computational cognitive artifacts, used for various cognitive tasks such as translating, summarizing, answering questions, information-seeking, and much more. Phenomenologically, LLMs can be experienced as a “quasi-other”; when that happens, users anthropomorphise them. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  46. Drugie Życie, czyli problemy z przedłużaniem rzeczywistości.Andrzej Klimczuk - manuscript
    Linden Lab studies massive online game "Second Life" unexpectedly gained worldwide fame after a few years after release. To the surprise of many game has met with great interest, despite the lack of promotional campaigns. It can be assumed that the reason why "second life" reached a wider audience was a special type of offered entertainment. Network game proved to be no longer a game that was known so far, but an example of a mass media, whose central element is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Workshop Report: Creating a Citizens’ Information Pack on Ethical and Legal Issues Around Icts: What Should Be Included?Janice Asine, Corelia Baibarac-Duignan, Elisabetta Broglio, Alexandra Castańeda, Helen Feord, Linda Freyburg, Marcel Leppée, Andreas Matheus, Marta Camara Oliveira, Christoforos Pavlakis, Jaume Peira, Karen Soacha, Gefion Thuermer, Katrin Vohland, Katherin Wagenknecht, Tim Woods, Katerina Zourou, Federico Caruso, Annelies Duerinckx, Andrzej Klimczuk, Mieke Sterken & Anna Berti Suman - 2020 - European Citizen Science Association.
    The aim of this workshop was to ask potential end-users of the citizens’ information pack on legal and ethical issues around ICTs the following questions: What is your knowledge of the EU’s General Data Protection Regulation, and what actions have you taken in response to these regulations? What challenges are you experiencing in ensuring the protection and security of your project data, and compliance with the GDPR, within existing data management processes/systems? What information/tools/resources do you need to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may be (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  49. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  97
    VIRTUAL LANDSCAPE IN SERIOUS GAMES: A FRAMEWORK FOR ENHANCING THE PLAYER INTERACTION FOCUSING ON THE LEARNING RATE.Sepehr Vaez Afshar - 2021 - Dissertation, Istanbul Technical University
    Throughout history, education has always been essential for humanity's justice and fundamental for the creation of a free and satisfying society with the dissemination of knowledge. Hence, in addition to the life occurrences educating people, traditional higher education methods have played an important role for a long period. However, the age of technology has changed the educational system along with the people's lifestyles to meet the continuously changing conditions. During the past twenty years, the Information and Communication Technologies (ICTs) led (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 971