Understanding Disengagement from Social Media: A Research AgendaUniversity of Sydney
Digital disengagement presentation for the Alfred Deakin Institute International Conference, Recovery, reconfiguration, and repair
Mobilising the social sciences and humanities for a post-pandemic world
11–12 November 2021
Research seminar Queen Mary University of London (CogSci)Miriam Fernandez
Research Seminar at Queen Mary University of London (CogSci) 2nd December 2020. In this talk, we present and discuss various research and development projects focused on addressing some of the societal challenges of today’s world (misinformation spreading, extremism, child grooming) by means of social data science. These problems are complex, dynamic and heterogeneous, and cannot be looked at from a single lens. We will discuss how these problems are addressed from a multidisciplinary angle, combining theories, models and methods from social science, computer science, or psychology; bringing a deeper understanding of the problems, and their relations to users and their behaviours, to the proposed solutions.
Miriam Fernandez presents her vision for the Semantic Web (SW), called the SOS-Web or Socially-Obligated Semantic Web. She notes that the current web spreads extremism and misinformation, threatening democracy and public health. Similarly, the current SW may perpetuate biases and promote "alternative facts". Her vision is for the SOS-Web to undergo clinical trials to study side effects of existing knowledge and technologies, develop methods to prevent undesirable outcomes, and ensure technologies are safe for users. The SOS-Web would use multidisciplinary and diverse teams to envision mitigating dystopian futures, develop novel ontology methodologies, and create context-aware and explainable technologies that consider human needs,
Biases in Social Media Research (NoBias EU project)Miriam Fernandez
Biases that emerge in Social Media Research. Talk presented at the NoBias EU project. Inspired by Olteanou et al. Social Data: Biases, Methodological Pitfalls, and Ethical Boundaries (2019)
The document discusses the knowledge gap hypothesis and digital divide. It summarizes previous research showing that those with higher socioeconomic status tend to acquire information from mass media at a faster rate, widening the knowledge gap between higher and lower socioeconomic groups. It also discusses four levels of the digital divide related to motivation, access, skills, and usage. Several studies from different countries find support for both the knowledge gap and usage gap, with those of higher education engaging in more advanced online activities. The document calls for future research to consider additional factors beyond just socioeconomic status that may influence online knowledge acquisition and activities.
Libraries, telecenters, and cybercafés play a critical role in extending the benefits of information and communication technologies (ICTs) to a diverse range of people worldwide. However, their ability to contribute to development agendas has come into question in recent times. The Global Impact Study was designed to address this debate by generating evidence about the scale, character, and impacts of public access ICTs in eight countries: Bangladesh, Botswana, Brazil, Chile, Ghana, Lithuania, the Philippines, and South Africa. This PowerPoint slidedeck provides an overview of the Global Impact Study, research design and methodology, and the study's key findings. The results show that a central impact of public access is the promotion of digital inclusion through technology access, information access, and development of ICT skills. Both users and non-users report positive impacts in various social and economic areas of their lives. This PowerPoint is available for others to use, adapt, and remix through a Creative Commons Attribution Share-Alike license.
Präsentation der Studienergebnisse bei einer Sitzung der UN-Frauenrechtskommission unter dem Hauptthema „Women’s economic empowerment in the changing world of work“ in New York
This document discusses the opportunities and challenges facing social media. While social media enables greater social connections and empowerment, it also faces threats from changing business models, technical issues, problematic user behavior, and increasing regulation. The author argues that over-regulation risks undermining the democratic potential of social media. Researchers should study social media impacts, inform debates, and help develop more appropriate regulatory models to address issues while preserving social media's vitality.
Understanding Disengagement from Social Media: A Research AgendaUniversity of Sydney
Digital disengagement presentation for the Alfred Deakin Institute International Conference, Recovery, reconfiguration, and repair
Mobilising the social sciences and humanities for a post-pandemic world
11–12 November 2021
Research seminar Queen Mary University of London (CogSci)Miriam Fernandez
Research Seminar at Queen Mary University of London (CogSci) 2nd December 2020. In this talk, we present and discuss various research and development projects focused on addressing some of the societal challenges of today’s world (misinformation spreading, extremism, child grooming) by means of social data science. These problems are complex, dynamic and heterogeneous, and cannot be looked at from a single lens. We will discuss how these problems are addressed from a multidisciplinary angle, combining theories, models and methods from social science, computer science, or psychology; bringing a deeper understanding of the problems, and their relations to users and their behaviours, to the proposed solutions.
Miriam Fernandez presents her vision for the Semantic Web (SW), called the SOS-Web or Socially-Obligated Semantic Web. She notes that the current web spreads extremism and misinformation, threatening democracy and public health. Similarly, the current SW may perpetuate biases and promote "alternative facts". Her vision is for the SOS-Web to undergo clinical trials to study side effects of existing knowledge and technologies, develop methods to prevent undesirable outcomes, and ensure technologies are safe for users. The SOS-Web would use multidisciplinary and diverse teams to envision mitigating dystopian futures, develop novel ontology methodologies, and create context-aware and explainable technologies that consider human needs,
Biases in Social Media Research (NoBias EU project)Miriam Fernandez
Biases that emerge in Social Media Research. Talk presented at the NoBias EU project. Inspired by Olteanou et al. Social Data: Biases, Methodological Pitfalls, and Ethical Boundaries (2019)
The document discusses the knowledge gap hypothesis and digital divide. It summarizes previous research showing that those with higher socioeconomic status tend to acquire information from mass media at a faster rate, widening the knowledge gap between higher and lower socioeconomic groups. It also discusses four levels of the digital divide related to motivation, access, skills, and usage. Several studies from different countries find support for both the knowledge gap and usage gap, with those of higher education engaging in more advanced online activities. The document calls for future research to consider additional factors beyond just socioeconomic status that may influence online knowledge acquisition and activities.
Libraries, telecenters, and cybercafés play a critical role in extending the benefits of information and communication technologies (ICTs) to a diverse range of people worldwide. However, their ability to contribute to development agendas has come into question in recent times. The Global Impact Study was designed to address this debate by generating evidence about the scale, character, and impacts of public access ICTs in eight countries: Bangladesh, Botswana, Brazil, Chile, Ghana, Lithuania, the Philippines, and South Africa. This PowerPoint slidedeck provides an overview of the Global Impact Study, research design and methodology, and the study's key findings. The results show that a central impact of public access is the promotion of digital inclusion through technology access, information access, and development of ICT skills. Both users and non-users report positive impacts in various social and economic areas of their lives. This PowerPoint is available for others to use, adapt, and remix through a Creative Commons Attribution Share-Alike license.
Präsentation der Studienergebnisse bei einer Sitzung der UN-Frauenrechtskommission unter dem Hauptthema „Women’s economic empowerment in the changing world of work“ in New York
This document discusses the opportunities and challenges facing social media. While social media enables greater social connections and empowerment, it also faces threats from changing business models, technical issues, problematic user behavior, and increasing regulation. The author argues that over-regulation risks undermining the democratic potential of social media. Researchers should study social media impacts, inform debates, and help develop more appropriate regulatory models to address issues while preserving social media's vitality.
This is Walden University (DPS Y 5121-1 and 8121-1) Week 9 Discussion 2. It is written in APA, has references, and graded by Dr. Essel (A). Most education communities submit scholarly writings to Turnitin; so, remember to paraphrase.
This document summarizes a study on the relationship between internet use and participation in protests across 42 countries. The study tested two hypotheses: 1) probability of protest participation is higher for citizens who use the internet as an information resource, and 2) probability is higher for certain citizen demographics (unemployed, middle-income, politically interested, educated) who use the internet. Regression analysis found the probability of protest participation was 52% higher for citizens who read news online. However, interactive effects of demographics and internet use were mostly insignificant. The internet's effect on protest participation was positive in most countries but coefficients varied greatly between countries.
Final survey report on multistakeholder concept and its practice by shreedeep...Shreedeep Rayamajhi
It's a survey report about the current practice of Multistakeholder practice in developing nation in internet ecosystem. This reports highlights the challenges and problems of multistakeholder practice and highlights the various indicators that directly affects the process.
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
This is a lecture for PhD students at a summer school hosted by Information Systems for Crisis Response and Management, ISCRAM www.iscram.org. This lecture covers social media and the information systems concepts that show how social media can support emergency management.
Web 20 (Social Media) Policies in Higher EducationAnne Arendt
This paper summarizes the social media and Web 2.0 field in regard to policies from the perspective of a Web resource director. The paper is 50 pages and was created specifically for the Best Practices in Policy Management Conference sponsored by the UVU Policy Office on November 6, 2009.
View the 'official' report at http://works.bepress.com/anne_arendt/7/
This document summarizes a study that analyzed the relationship between internet use and participation in protests across 40 countries. The study used data from the World Value Survey and multilevel logistic regression modeling. The results found that internet use significantly increases the probability of protest participation by 52% on average. However, the effect varied widely by country, from a slight positive effect to a strong positive effect in some developing countries. The study aims to further analyze how country-level factors like internet penetration and human rights influence the relationship between internet use and protest participation.
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
The document discusses the role of information and communication technologies (ICT) in advocacy and social change. It provides examples from the Philippines of how social media and ICT were used during protests like the People Power Revolution and Million People March to organize large numbers of people and raise awareness of issues. The document also discusses concepts like digital citizenship, the global digital divide, and how social media can empower citizens in developing countries by giving them a platform to voice their concerns and perspectives.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding Internet of Things.
Future opportunities in social communicationsPawan Gupta
The document discusses frameworks for analyzing the success of communication technologies and their alignment with human behaviors. It argues that successful internet communication products must closely reflect popular analog human communication behaviors. A framework is presented that examines behaviors based on their complexity, popularity, and whether technologies implement them well. The document advocates applying this framework by categorizing the features of existing messaging technologies based on dimensions like "how", "when", and "who" they support to understand their alignment with historical human behaviors.
Enhancing transparency and accountability mechanisms that directly empower citizens to better participate in decision-making processes of government and international donors is an imperative to achieving better and more sustainable development results on the ground. This paper analyzes the emerging Open Development Paradigm and investigates to what extent such a new approach towards citizen-centered development can make development programs more effective, responsive and inclusive. It provides concrete case studies of open governance programs that enhance the transparency and accountability of development agencies and foster the collaboration among all development actors in order to achieve better development outcomes and enhance the well-being of the poor.
Presentation about the impact of amount of Internet use and digital skills on political information seeking behavior at Harvard Kennedy School, October 2017.
The document discusses the digital divide, which refers to unequal access to technology between those who can afford computers and internet ("information haves") and those who cannot ("information have-nots"). It provides statistics on internet access in the US and factors affecting global access such as education, income, and political and economic conditions. It also examines efforts to close the digital divide through public access points, partnerships, and innovation in developing countries.
Pew Internet Director Lee Rainie delivered the keynote presentation at WorldFuture 2012 in Toronto on Friday, July 27. The presentation, based on his latest book, Networked: The New Social Operating System (co-authored with Barry Wellman), discussed the findings of the most recent expert surveys on the future of teens’ brains, the future of universities, the future of money, the impact of Big Data, the battle between apps and the Web, the spread of gamification, and the impact of smart systems on consumers.
The document summarizes how new technologies have affected arts and audiences. It discusses the growth of internet and mobile access over time. Today's teens are highly engaged online through social media and user-generated content. The document provides lessons for arts organizations, including embracing creativity, starting online conversations, reinforcing relationships, and cultivating semi-public spaces. Arts audiences and participation remain broad, though those who frequently attend arts events are more engaged with digital media.
The New Era of News: How Social Media is Impacting The U.S Presidential ElectionMadison Marcello
Social media has become a primary source of news for many Americans, especially millennials. It has changed how political campaigns operate and how voters receive information about candidates. Millennials now make up a significant portion of eligible voters, and their views are influenced by political discussions on social media. However, there is a lack of certainty about the factual accuracy of news shared on social media platforms. The 2016 presidential election has highlighted the large role social media now plays in how voters learn about candidates and political issues.
"Understanding Broadband from the Outside" - ARNIC Seminar April1 08ARNIC
The document discusses various approaches to understanding broadband and technology from a community perspective, including:
1. Starting with community needs and involving local stakeholders.
2. Considering multiple perspectives from fields like development, education, and natural resource management.
3. Using systems thinking and participatory action research to understand complex relationships and emergent behaviors.
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
Since the Pew Research Center's Internet & American Life Project first started tracking teen cell phone use, the age at which American teens acquire their first cell phone has consistently grown younger. In Pew Internet's 2004 survey of teens, 18% of 12-year-olds owned a cell phone. In 2009, 58% of 12 year-olds own a cell phone. We also have found that cell phone ownership increases dramatically with age: 83% of teens age 17 now own a cell phone, up from 64% in 2004.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. The downsides: challenges to personal privacy, over-hyped expectations, and boggling tech complexity. Lee Rainie shares the latest research from Pew about libraries and puts it into context with the expanding Internet of Things.
The document provides an abstract and details for 9 talks being considered for two tracks at BSidesLondon13. It includes information about each talk such as the title, presenter, abstract, level of difficulty, and whether the talk has been previously presented or can be filmed. The talks cover a range of cybersecurity topics such as pentesting techniques, malware analysis, security metrics, and targeted attacks. Participants in the event will vote electronically to select the top 10 talks to be included in the schedule.
Outline
Digital Project Planning
What is the goal of your Digital Scholarship project?
We will discuss Digital Humanities projects as Digital Scholarship Project
Learn what the components or layers of a Digital Humanities project are.
How do you find data to use to answer research questions?
Understand descriptive metadata and the rationale for its use
Digital Pedagogy
If you are involving students how does that affect your planning plan?
How do you incorporate Digital Pedagogy into a Digital Project?
This document discusses digital literacy and presents information from a workshop on the topic. It defines digital literacy as the ability to locate, organize, understand, evaluate and analyze information using digital technology. It emphasizes skills like collaborating online, networking, creating and curating content. The document asserts that digitally literate students will use technology effectively for academic and professional purposes, engage in online communities, and develop communication skills for interacting online while ensuring privacy and security. It provides exercises for attendees to discuss aspects of digital literacy relevant to their work.
This is Walden University (DPS Y 5121-1 and 8121-1) Week 9 Discussion 2. It is written in APA, has references, and graded by Dr. Essel (A). Most education communities submit scholarly writings to Turnitin; so, remember to paraphrase.
This document summarizes a study on the relationship between internet use and participation in protests across 42 countries. The study tested two hypotheses: 1) probability of protest participation is higher for citizens who use the internet as an information resource, and 2) probability is higher for certain citizen demographics (unemployed, middle-income, politically interested, educated) who use the internet. Regression analysis found the probability of protest participation was 52% higher for citizens who read news online. However, interactive effects of demographics and internet use were mostly insignificant. The internet's effect on protest participation was positive in most countries but coefficients varied greatly between countries.
Final survey report on multistakeholder concept and its practice by shreedeep...Shreedeep Rayamajhi
It's a survey report about the current practice of Multistakeholder practice in developing nation in internet ecosystem. This reports highlights the challenges and problems of multistakeholder practice and highlights the various indicators that directly affects the process.
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
This is a lecture for PhD students at a summer school hosted by Information Systems for Crisis Response and Management, ISCRAM www.iscram.org. This lecture covers social media and the information systems concepts that show how social media can support emergency management.
Web 20 (Social Media) Policies in Higher EducationAnne Arendt
This paper summarizes the social media and Web 2.0 field in regard to policies from the perspective of a Web resource director. The paper is 50 pages and was created specifically for the Best Practices in Policy Management Conference sponsored by the UVU Policy Office on November 6, 2009.
View the 'official' report at http://works.bepress.com/anne_arendt/7/
This document summarizes a study that analyzed the relationship between internet use and participation in protests across 40 countries. The study used data from the World Value Survey and multilevel logistic regression modeling. The results found that internet use significantly increases the probability of protest participation by 52% on average. However, the effect varied widely by country, from a slight positive effect to a strong positive effect in some developing countries. The study aims to further analyze how country-level factors like internet penetration and human rights influence the relationship between internet use and protest participation.
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
The document discusses the role of information and communication technologies (ICT) in advocacy and social change. It provides examples from the Philippines of how social media and ICT were used during protests like the People Power Revolution and Million People March to organize large numbers of people and raise awareness of issues. The document also discusses concepts like digital citizenship, the global digital divide, and how social media can empower citizens in developing countries by giving them a platform to voice their concerns and perspectives.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding Internet of Things.
Future opportunities in social communicationsPawan Gupta
The document discusses frameworks for analyzing the success of communication technologies and their alignment with human behaviors. It argues that successful internet communication products must closely reflect popular analog human communication behaviors. A framework is presented that examines behaviors based on their complexity, popularity, and whether technologies implement them well. The document advocates applying this framework by categorizing the features of existing messaging technologies based on dimensions like "how", "when", and "who" they support to understand their alignment with historical human behaviors.
Enhancing transparency and accountability mechanisms that directly empower citizens to better participate in decision-making processes of government and international donors is an imperative to achieving better and more sustainable development results on the ground. This paper analyzes the emerging Open Development Paradigm and investigates to what extent such a new approach towards citizen-centered development can make development programs more effective, responsive and inclusive. It provides concrete case studies of open governance programs that enhance the transparency and accountability of development agencies and foster the collaboration among all development actors in order to achieve better development outcomes and enhance the well-being of the poor.
Presentation about the impact of amount of Internet use and digital skills on political information seeking behavior at Harvard Kennedy School, October 2017.
The document discusses the digital divide, which refers to unequal access to technology between those who can afford computers and internet ("information haves") and those who cannot ("information have-nots"). It provides statistics on internet access in the US and factors affecting global access such as education, income, and political and economic conditions. It also examines efforts to close the digital divide through public access points, partnerships, and innovation in developing countries.
Pew Internet Director Lee Rainie delivered the keynote presentation at WorldFuture 2012 in Toronto on Friday, July 27. The presentation, based on his latest book, Networked: The New Social Operating System (co-authored with Barry Wellman), discussed the findings of the most recent expert surveys on the future of teens’ brains, the future of universities, the future of money, the impact of Big Data, the battle between apps and the Web, the spread of gamification, and the impact of smart systems on consumers.
The document summarizes how new technologies have affected arts and audiences. It discusses the growth of internet and mobile access over time. Today's teens are highly engaged online through social media and user-generated content. The document provides lessons for arts organizations, including embracing creativity, starting online conversations, reinforcing relationships, and cultivating semi-public spaces. Arts audiences and participation remain broad, though those who frequently attend arts events are more engaged with digital media.
The New Era of News: How Social Media is Impacting The U.S Presidential ElectionMadison Marcello
Social media has become a primary source of news for many Americans, especially millennials. It has changed how political campaigns operate and how voters receive information about candidates. Millennials now make up a significant portion of eligible voters, and their views are influenced by political discussions on social media. However, there is a lack of certainty about the factual accuracy of news shared on social media platforms. The 2016 presidential election has highlighted the large role social media now plays in how voters learn about candidates and political issues.
"Understanding Broadband from the Outside" - ARNIC Seminar April1 08ARNIC
The document discusses various approaches to understanding broadband and technology from a community perspective, including:
1. Starting with community needs and involving local stakeholders.
2. Considering multiple perspectives from fields like development, education, and natural resource management.
3. Using systems thinking and participatory action research to understand complex relationships and emergent behaviors.
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
Since the Pew Research Center's Internet & American Life Project first started tracking teen cell phone use, the age at which American teens acquire their first cell phone has consistently grown younger. In Pew Internet's 2004 survey of teens, 18% of 12-year-olds owned a cell phone. In 2009, 58% of 12 year-olds own a cell phone. We also have found that cell phone ownership increases dramatically with age: 83% of teens age 17 now own a cell phone, up from 64% in 2004.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. The downsides: challenges to personal privacy, over-hyped expectations, and boggling tech complexity. Lee Rainie shares the latest research from Pew about libraries and puts it into context with the expanding Internet of Things.
The document provides an abstract and details for 9 talks being considered for two tracks at BSidesLondon13. It includes information about each talk such as the title, presenter, abstract, level of difficulty, and whether the talk has been previously presented or can be filmed. The talks cover a range of cybersecurity topics such as pentesting techniques, malware analysis, security metrics, and targeted attacks. Participants in the event will vote electronically to select the top 10 talks to be included in the schedule.
Outline
Digital Project Planning
What is the goal of your Digital Scholarship project?
We will discuss Digital Humanities projects as Digital Scholarship Project
Learn what the components or layers of a Digital Humanities project are.
How do you find data to use to answer research questions?
Understand descriptive metadata and the rationale for its use
Digital Pedagogy
If you are involving students how does that affect your planning plan?
How do you incorporate Digital Pedagogy into a Digital Project?
This document discusses digital literacy and presents information from a workshop on the topic. It defines digital literacy as the ability to locate, organize, understand, evaluate and analyze information using digital technology. It emphasizes skills like collaborating online, networking, creating and curating content. The document asserts that digitally literate students will use technology effectively for academic and professional purposes, engage in online communities, and develop communication skills for interacting online while ensuring privacy and security. It provides exercises for attendees to discuss aspects of digital literacy relevant to their work.
Ensuring the end product is inclusive can be a challenge, but so can also be the process that was used to design it. How do we make sure that design is just and that people and communities are not inadvertently harmed, on the basis of aspects such as age, background, gender, and race, in the design process by the choices we make as designers? How do we do this especially for new innovative technologies, which we might not know much about? In this session, the speaker will review the common pitfalls of typical design research and development. Then, the speaker will walk through a framework for better design work that is more inclusive and minimizes potential social harm.
A Framework for Analysing, Designing and Evaluating Persuasive Technologies.pdfKayla Smith
This document is the thesis submitted by Isaac Wiafe to the University of Reading for the degree of Doctor of Philosophy. It presents a framework called the Unified Framework for Analysing, Designing and Evaluating persuasive technology (U-FADE). The framework expands on the Persuasive Systems Design model to provide steps for developing persuasive technology applications. It incorporates the 3-Dimensional Relationship between Attitude and Behaviour model, which analyzes the levels of cognitive dissonance of users to identify their state and craft persuasive messages. The thesis was validated through a case study demonstrating the U-FADE and 3D-RAB models are effective for persuasive technology design.
The document provides an overview of an event on emerging trends in data science given by Dr. Joanne Luciano. It discusses the data science workflow and various processes involved. Some key trends highlighted include increased use of AI and machine learning in data management and reporting, growth of natural language processing, advances in deep learning, emphasis on data privacy and ethics. The document also promotes the new minor in data science offered at University of the Virgin Islands, covering required courses and examples of course sequences for different disciplines.
DigComp - Konferens om skolans digitalisering, 8 sep, StockholmRiina Vuorikari
The document discusses digital competence and the DigComp framework. It summarizes:
1) DigComp identifies and describes the key components of digital competence, including knowledge, skills, and attitudes. It provides a common European understanding and guidelines to support digital policies.
2) Research shows that young children are acquiring digital skills in a patchy, haphazard way through observing others and trial and error. Their skills are influenced by their family's skills and attitudes.
3) Tools like the DigComp framework and materials can help schools and teachers support students' development of digital competence from a young age in a balanced way.
Bloxx Survey: IT executives shared their concerns with BYOD & Social Media use in educational environments
Overcome barriers to ensure success in rolling out a BYOD initiative
Support safe and secure BYOD learning through technology
Develop an Acceptable Use Policy to keep staff and students safe and secure online
Understand how to utilise Social Media as an educational resource
Educate staff and students in best practices for social networking
BYOD & Social Media: The Risks and Benefits for EducationBloxx
This document discusses the benefits and risks of Bring Your Own Device (BYOD) policies and social media use in education based on a survey conducted by Bloxx Ltd. The key findings were that the top concerns about BYOD were access to inappropriate content and lack of formal BYOD policies. Regarding social media, the top concern was students and staff accessing inappropriate content. The document advocates for addressing these issues through a comprehensive approach involving technology, education, and clear, enforced policies.
This document provides an overview of a blended learning course on Introduction to Cybersecurity. The course is targeted at level 8 students in business information systems programs. It will be delivered over 5 weeks, with one face-to-face session per week along with pre-and post-activities. The expected time commitment is 5-8 hours per week. This presentation provides an overview of the first pillar - Cybersecurity Fundamentals. The course aims to introduce students to cybersecurity theory and applications. It will cover fundamentals, societal considerations, the state of the art, business opportunities, and more over the 5 weeks.
This document discusses visualization for software analytics and identifies three key trends: 1) developers moving from solo coders to social coders, 2) software development shifting from code-centric to data-centric, and 3) visualization becoming ubiquitous rather than standalone. It provides examples of visualizations for software design, code, dynamic behavior, architecture, and human activities. It discusses how visualization can provide insights, support tasks, and communicate knowledge. It also outlines opportunities and challenges for visual analytics and ubiquitous visualization in software engineering.
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteCori Faklaris
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with “infinite interns.” (2) Give people permission & guardrails to learn what works with these “interns” and what doesn’t. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
This document summarizes a research paper that proposes a framework called SecureWall to implement fine-grained access controls on online social networks to mitigate privacy leaks. The framework combines multiple security models - Chinese Wall policy for community privacy, Biba model for integrity, and Bell-LaPadula (BLP) model for confidentiality. It was implemented on a prototype social network and evaluated based on information flow metrics and user surveys. Results found the framework reduced information leakage compared to popular social networks while maintaining usability and sociability according to majority of user feedback.
Digital Competence framework for citizens (DIGCOMP )Riina Vuorikari
The document discusses the European Digital Competence Framework for citizens. It defines digital competence as the set of knowledge, skills, and attitudes required to use information and communication technologies. The framework identifies 5 areas of competence: 1) information, 2) communication, 3) content creation, 4) safety, and 5) problem solving. It then describes each area and the specific competences within each one. The framework was developed to provide a common understanding and guidelines for developing and assessing digital skills across Europe.
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGIRJET Journal
This document discusses the development of a cyberharassment detection system to identify abusive content on social media platforms. It reviews related works that have used machine learning techniques like convolutional neural networks and transfer learning models to detect cyberbullying. The authors investigate four neural network optimizers - Rmsprop, Adam, Adadelta, and Adagrad - and find that Rmsprop achieved the highest accuracy of 98.45% at classifying harassing content. The goal of this research is to create an effective model for automatically detecting cyberharassment online.
Guest presentation: SASUF Symposium: Digital Technologies, Big Data, and Cybersecurity, Vaal University of Technology, Vanderbijlpark, South Africa, 15 May 2018
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
Information security is at a critical juncture. How do we solve the weakest link - human psychology? Insight from cyberpsychology into leadership, power and persuasion are essential. These slides are from Dr Ciarán Mc Mahon's keynote at (ISC)² Security Congress EMEA, Sofitel Munich, October 2015
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
This document presents a research paper that proposes a privacy-preserving deep learning framework for CNN-based fake face detection. The framework aims to develop a robust CNN model to accurately detect fake faces in images and videos while preserving user privacy. The researchers train their CNN model on a dataset of authentic and synthetic facial images representing techniques like deepfakes, morphing, and facial reenactment. Their evaluation shows the CNN model achieves state-of-the-art performance in fake face detection with 98% accuracy, addressing an important challenge while balancing detection capabilities with privacy concerns. The proposed approach could serve as a valuable tool for content verification, privacy protection, and ensuring trust in applications using digital media.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
1. Pavithren (Viren), November 3rd 2021 (GMT-6)
Accessible Privacy and Security
COMP 3/4732 - Human-Centered Data Security and Privacy
1
2. Bio
Pavithren (Viren) is currently a research
associate at Telehealth Core, Saw Swee Hock
School of Public Health at the National
University of Singapore.
Viren’s research has been largely multi-
disciplinary, across Human-Computer
Interaction (HCI), Inclusive Design and Privacy
and Security.
He is passionate about bridging multiple
disciplines to tackle complex socio-technical
problems.
2
3. Content Page
1. Introduction
2. Accessibility in Privacy and Security
3. Case study - Inclusive Mobile Privacy and Security
4. Working with Vulnerable/Underrepresented Populations
3
4. Inclusive Design: from the pixel to the city
by the British Design Council
https://www.youtube.com/watch?
v=U5hRXwPE5a4
4
6. What is Inclusive Design?
Let’s get the de
fi
nitions right.
Inclusive Design is a
design methodology
which aims to
consider the full
range of human
diversity while
designing.
Image from https://dribbble.com/shots/10481307-Eventbrite-New-Illustration-System
6
7. What is Accessibility?
Accessibility is
about allowing
your product to
be usable by as
many people as
possible. Image from https://uxdesign.cc/thinking-like-a-developer-
part-ii-design-the-edge-cases-fe5f21516d20
7
8. What is Accessibility?
Accessibility is
about allowing
your product to
be usable by as
many people as
possible. Image from https://uxdesign.cc/thinking-like-a-developer-
part-ii-design-the-edge-cases-fe5f21516d20
7
12. Who benefits from Inclusive Design?
• Older adults
• Physical Disabilities - Deaf, Blind, Mobility
Impaired Individuals
• Cognitive Disabilities - ASD/ADHD, Down
syndrome
• People with lower SES or have poorer
network connection
• Non-WEIRD* Populations
• And the list goes on…
Image from https://dribbble.com/shots/4169845-Inclusive-Design-at-Microsoft
*WEIRD = Western, educated, industrialized, rich and democratic 10
13. Who benefits from Inclusive Design?
• Older adults
• Physical Disabilities - Deaf, Blind, Mobility
Impaired Individuals
• Cognitive Disabilities - ASD/ADHD, Down
syndrome
• People with lower SES or have poorer
network connection
• Non-WEIRD* Populations
• And the list goes on…
Image from https://dribbble.com/shots/4169845-Inclusive-Design-at-Microsoft
*WEIRD = Western, educated, industrialized, rich and democratic 10
14. Situational Impairment
When designing for
someone with disability,
someone else with a
temporary and situational
impairment would bene
fi
t
as well. Image from https://www.microsoft.com/design/inclusive/
11
15. The curb cut effect
Source: https://sketchplanations.com/the-curb-cut-e
ff
ect
“Solve for One,
Extend to Many.”
- Microsoft Inclusive design guide
12
17. State of the art - Inclusive Privacy and Security
“From 2005 to 2017, less
than 10 percent of papers at
Symposium on Usable
Privacy and Security
(SOUPS*) had studied under
represented population.”
-Yang Wang (2018
)
Sex Workers
Older adults
PwDs
Asian Middle
Eastern
*https://www.usenix.org/conference/soups2021/
Children
14
18. The issues with CAPTCHA
*https://nfb.org//sites/default/
fi
les/images/nfb/publications/bm/bm09/bm0901/bm090108.htm
15
19. The issues with CAPTCHA
*https://nfb.org//sites/default/
fi
les/images/nfb/publications/bm/bm09/bm0901/bm090108.htm
15
20. The issues with CAPTCHA
A visually
impaired person
can solve an
audio captcha
only 46 percent
of the time. *
*https://nfb.org//sites/default/
fi
les/images/nfb/publications/bm/bm09/bm0901/bm090108.htm
15
21. How about other Privacy and
Security tools/mechanisms?
Password
Generation
2FA
Biometric
Authentication
Secure WiFi
Security
Updates
Secure Messaging
Transmission of
Healthcare Data
App permissions
Privacy Policies
Cookies
Certi
fi
cates
Encryption
Tools
16
23. Increase in Greying Smartphone Users
Accelerated adoption
of Smartphone
amongst older adults.
⁺https://www.pewresearch.org/internet/2017/05/17/tech-adoption-climbs-among-older-adults/pi_2017-05-17_older-americans-tech_0-01/
17
24. Increase in Greying Smartphone Users
Accelerated adoption
of Smartphone
amongst older adults.
Are mobile privacy
and security
mechanisms/tools
catching up in terms
of meeting their
needs?
Photo by Anastasia Shuraeva from Pexels
17
25. A Case Study
How might we design mobile privacy and security
inclusively for older adults in Singapore?
18
32. Discovery
Understanding the problem
What’s happening in Singapore?
• Smart Nation Initiative to digitise
services
• Increasing smartphone adoption among
older adults in Singapore.
• Increasing number of phishing scams.
Image from https://abc7news.com/
grandparents-seniors-assisted-living-nursing-
homes/6119545/
Why is it a problem?
• Older adults are at higher risks to privacy
and security threats
Image from https://www.smartnation.gov.sg/
21
34. Discovery
Main
fi
ndings*
1. Reliance on Social Support for
P&S
2. Attitude and Culture A
ff
ected
Learning and awareness about
P&S
3. Contextualized P&S preferences
*https://www.usenix.org/conference/soups2020/presentation/pakianathan
23
35. Discovery
Understanding the problem
Common threat models
1. Password Management
2. Understanding of URLs
3. Reading Terms and Conditions
4. Changing privacy settings
5. Risk of Falling for phishing scams
6. Icon/Terminologies not understandable
7. Unaware of Data collection by Apps
8. Installing apps unknowingly
Image from https://blogs.windriver.com/wind_river_blog/
2017/09/tackling-iot-security-with-new-wind-river-
services-o
ff
ering/
24
37. Define
Reframing and concretising the problem
• Online Survey to identify the top
threats faced by older adults in
Singapore
• Adults (n=35)
• Older adults (n=15)
Common threat models
1. Password Management
2. Understanding of URLs
3. Reading Terms and Conditions
4. Changing privacy settings
5. Falling for phishing
6. Icon/Terminologies not understandable
7. Unaware of Data collection by Apps
8. Installing apps unknowingly
26
38. Define
Reframing and concretising the problem
• Online Survey to identify the top
threats faced by older adults in
Singapore
• Adults (n=35)
• Older adults (n=15)
Top 3 threat models
1. Password Management
2. Understanding of URLs
3. Reading Terms and Conditions
4. Changing privacy settings
5. Falling for phishing
6. Icon/Terminologies not understandable
7. Unaware of Data collection by Apps
8. Installing apps unknowingly
26
52. Develop
Morphological Matrix
A structured
way used to
create large
numbers of
ideas.
Sub-System
Functions
Concept 1 Concept 2 Concept 3 Concept 4
Check Unknown
Link/URL within
social ecosystem
Verify URL
How might we redesign the detection of
malicious URLs to prevent phishing?
35
53. Develop
Morphological Matrix
A structured
way used to
create large
numbers of
ideas.
Sub-System
Functions
Concept 1 Concept 2 Concept 3 Concept 4
Check Unknown
Link/URL within
social ecosystem
Verify URL
How might we redesign the detection of
malicious URLs to prevent phishing?
35
67. Deliver
Think aloud activity
DBS Digibank Real vs Dummy URL
Activity
Participants were randomly
shown 1 genuine and 1 fake
banking/government website.
41
68. Deliver
Think aloud activity
DBS Digibank Real vs Dummy URL
Activity
Participants were randomly
shown 1 genuine and 1 fake
banking/government website.
Results
None of 30 participants
could identify the fake
website!
41
69. Deliver
Insights from navigating Certi
fi
cate UI in Chrome
“/spauth looks suspicious”
P19, 65-74 y.o
Genuine Government
Website
“Normal person won’t know
[content in circle]”
P26, 65-74 y.o.
Genuine Banking website “I don’t know Entrust.”
P28, 25-34 y.o
Genuine Banking website
42
70. Deliver
A multimodal approach to reducing Phishing attacks - SoCiAI*
*Social Circle + Crowdsourcing + Arti
fi
cial Intelligence = > SoCiAI, a hypothetical application design to solve web trust issues using multiple modalities
43
72. Deliver
Results
Mixed preferences amongst older
adults and adults regarding their
preferred modality - Social Circle,
Crowdsourcing or AI.
AI?
Crowdsourcing?
Social Circle?
44
73. Deliver
Results
Mixed preferences amongst older
adults and adults regarding their
preferred modality - Social Circle,
Crowdsourcing or AI.
AI?
Crowdsourcing?
Social Circle?
Mean SUS Scores
Adult Older Adults
Existing
Mechanism
45.29 28.96
SoCiAI 71.03 77.91
Considerably higher usability
Score (SUS) for SoCiAI compared
to current Android Chrome
browser certification UI by both
adults and older adults.
44
75. Research Challenges Considerations
• Ethics - Belmont Report,
Nuremberg Code, the Common
Rule, CITI certification, etc.
• Access to population - elderly
home, remote areas, red light
district etc.
• Mode of study - online, face to
face, phone call, online survey,
in the wild, group interview etc.
Photo by Startup Stock Photos from Pexels
46
76. Learnings from working with Older adults
1. Build a relationship with participants
2. Be mindful of social desirability bias
3. Keep interview on track and limit digression
4. Use simple language and terminologies
5. Avoid lengthy studies to reduce fatigue
6. Run pilot studies to assess readability of questions
47
77. Taking action
• Adopt Inclusive Design/Universal
Design Methodologies in your
next project from day 1.
• Follow or contribute to
Accessibility Guidelines (e.g.
WCAG 2.1)
• Encourage Govts. to mandate
policies to ensure that
organisations follow guidelines
and reduce discrimination (for e.g.
American Disabilities Act )
Image from https://www.shutterstock.com/image-photo/
woman-jumping-over-abyss-front-sunset-1039137214
48
78. Recap
What did we learn today?
1. Intro to Accessibility and Inclusive Design
2. Intro Accessible Privacy and Security
3. Case Study - Inclusive Mobile Privacy and Security
4. Working with Vulnerable or Under represented Population groups
49
80. Design for the young and you exclude the old.
Design for the old and you include everyone.
- Bernard Issacs
51
81. References and guides
Related Works and Accompanying Materials
Vitak J, Shilton K, editors. Trust, Privacy and Security, and Accessibility Considerations When Conducting Mobile Technologies Research
With Older Adults. In: National Academies of Sciences, Engineering, and Medicine; Division of Behavioral and Social Sciences and
Education; Board on Behavioral, Cognitive, and Sensory Sciences. Mobile Technology for Adaptive Aging: Proceedings of a Workshop.
Washington (DC): National Academies Press (US); 2020 Sep 25. 1. Available from: https://www.ncbi.nlm.nih.gov/books/NBK563116/
Y. Wang, "Inclusive Security and Privacy," in IEEE Security & Privacy, vol. 16, no. 4, pp. 82-87, July/August 2018, doi: 10.1109/
MSP.2018.3111237.
Yao Ma, Jinjuan Feng, Libby Kumin, and Jonathan Lazar. 2013. Investigating User Behavior for Authentication Methods: A Comparison
between Individuals with Down Syndrome and Neurotypical Users. ACM Trans. Access. Comput. 4, 4, Article 15 (July 2013), 27 pages.
DOI:https://doi.org/10.1145/2493171.2493173
V S Pakianathan, P. and Perrault, S., 2020. Towards Inclusive Design for Privacy and Security: Perspectives from an Aging Society.
[online] Available at: <https://www.usenix.org/conference/soups2020/presentation/pakianathan> [Accessed 25 October 2021].
Design Tools/Kits/Guides/Misc.
Usability Toolkit for working with at-risk populations - https://usable.tools/
Cambridge Inclusive Design Toolkit - http://www.inclusivedesigntoolkit.com/
Microsoft Inclusive Design Guide - https://www.microsoft.com/design/inclusive/
Accessibility Guidelines - https://www.w3.org/TR/WCAG21/
Conducting studies with Sex workers - https://elissaredmiles.com/research/swmethods.pdf
Belmont Report - https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/read-the-belmont-report/index.html
Nurembery Code - https://history.nih.gov/download/attachments/1016866/nuremberg.pdf
52