Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Library and Information Science

“The Same Information Is Given To Everyone”: Algorithmic Awareness Of Online Platforms, Meghan Lindsey Dowell May 2023

“The Same Information Is Given To Everyone”: Algorithmic Awareness Of Online Platforms, Meghan Lindsey Dowell

Theses and Dissertations

After years of discourse surrounding the concept of “filter bubbles,” information seekers still find themselves in echo chambers of their own thoughts and ideas. This study is an exploratory, mixed methods analysis of platform privacy/data policies and user awareness of the personal and usage data collected and user awareness of how platforms use this data to moderate and serve online content. Utilizing Bucher’s (2018) framework to research algorithms through the black box heuristic, this project learns how users inform themselves about data collection and use policies, and their awareness of algorithmic curation. The algorithmic systems that return search results or …


A Forward-Looking Conceptualization Of Information Privacy, David Kallemeyn Jan 2023

A Forward-Looking Conceptualization Of Information Privacy, David Kallemeyn

CGU Theses & Dissertations

Privacy is a fluid and ever-evolving concept, studied across multiple fields and with numerous definitions. Privacy research in information systems (IS) is extensive yet has not traveled far beyond the IS realm and fully engaged in the broader conversations being had with regards to privacy. This research seeks to define a larger sense of privacy that integrates the many working definitions across fields, along with related concepts, and to develop an alternative framework that can account for the constant technological and socio-technical changes through which to engage in privacy research. One such framework is developed and tested, grounded in the …


Cheating Detection In A Privacy Preserving Driving Style Recognition Protocol, Ethan Sprissler Jan 2022

Cheating Detection In A Privacy Preserving Driving Style Recognition Protocol, Ethan Sprissler

Legacy Theses & Dissertations (2009 - 2024)

The growth of cloud-based services collecting user data for online analytical processing (OLAP), machine learning, and applications relating to the Internet of Things (IoT) has also increased concern with data privacy. Privacy-preserving data sharing using Secure Multiparty Communication (SMC) enables the exchange of encrypted data between parties to perform calculations while maintaining data privacy for both parties simultaneously. This research builds on established work that proposed a privacy-preserving driving style recognition protocol designed to work well with semi-honest actors. In this protocol, both parties follow the established algorithms and do not overtly attempt to deceive the other party into revealing …


Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib Nov 2020

Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib

USF Tampa Graduate Theses and Dissertations

Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.

To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …


Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii Jan 2020

Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii

Walden Dissertations and Doctoral Studies

Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This study’s …


Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly Jul 2019

Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly

Computer Science Theses & Dissertations

Web archives preserve the live Web for posterity, but the content on the Web one cares about may not be preserved. The ability to access this content in the future requires the assurance that those sites will continue to exist on the Web until the content is requested and that the content will remain accessible. It is ultimately the responsibility of the individual to preserve this content, but attempting to replay personally preserved pages segregates archived pages by individuals and organizations of personal, private, and public Web content. This is misrepresentative of the Web as it was. While the Memento …


Searching For Health Information On The Internet : The Experiences Of Western Australian Adolescents, Lee-Anne Martins Jan 2013

Searching For Health Information On The Internet : The Experiences Of Western Australian Adolescents, Lee-Anne Martins

Theses : Honours

Adolescents readily engage in online entertainment pursuits, however, it is their online social activities and health information searches that encourage psychosocial development and influence identity formation and autonomy. Considerable research has been completed on various aspects of adolescents’ encounters with online health information (for example, see Percheski & Hargittai, 2011), yet minimal research has been conducted using Australian adolescents. This study extends existing research utilising Western Australian adolescents who have used the Internet to obtain health information. The areas explored include how Western Australian adolescents search for online health information, by means of which devices, and their experiences of using …