Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (21)
- Communication (11)
- Communication Technology and New Media (10)
- Law (8)
- Computer Sciences (6)
-
- Life Sciences (6)
- Physical Sciences and Mathematics (6)
- Public Affairs, Public Policy and Public Administration (6)
- Science and Technology Policy (6)
- Bioinformatics (5)
- Computer Law (5)
- Databases and Information Systems (5)
- OS and Networks (5)
- Privacy Law (5)
- Internet Law (4)
- Library and Information Science (4)
- Science and Technology Law (4)
- Sociology (4)
- Communications Law (3)
- Computer Engineering (3)
- Digital Communications and Networking (3)
- Law and Economics (3)
- Law and Society (3)
- Arts and Humanities (2)
- Computer and Systems Architecture (2)
- Constitutional Law (2)
- Economics (2)
- First Amendment (2)
- Institution
- Publication Year
- Publication
-
- Faculty of Engineering and Information Sciences - Papers: Part A (15)
- Kno.e.sis Publications (5)
- All Faculty Scholarship (3)
- Faculty of Engineering and Information Sciences - Papers: Part B (3)
- Ethics in Science and Engineering National Clearinghouse (2)
-
- Open Educational Resources (2)
- Articles (1)
- Book Chapters (1)
- FIMS Publications (1)
- Faculty Scholarship (1)
- Information Science Faculty Publications (1)
- MBA Faculty Conference Papers & Journal Articles (1)
- School of Information Studies - Post-doc and Student Scholarship (1)
- Senior Honors Projects (1)
- Works of the FIU Libraries (1)
Articles 31 - 39 of 39
Full-Text Articles in Science and Technology Studies
Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant
Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant
Kno.e.sis Publications
Users of traditional microblogging platforms such as Twitter face drawbacks in terms of (1) Privacy of status updates as a followee - reaching undesired people (2) Information overload as a follower - receiving uninteresting microposts from followees. In this paper we demonstrate distributed and user-controlled dissemination of microposts using SMOB (semantic microblogging framework) and Semantic Hub (privacy-aware implementation of PuSH3 protocol) . The approach leverages users' Social Graph to dynamically create group of followers who are eligible to receive micropost. The restrictions to create the groups are provided by the followee based on the hastags in the micropost. Both SMOB …
Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi
Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi
Kno.e.sis Publications
No abstract provided.
Determining The Effects Of Technology On Children, Kristina E. Hatch
Determining The Effects Of Technology On Children, Kristina E. Hatch
Senior Honors Projects
Determining the Effects of Technology on Children
Kristina Hatch
Faculty Sponser: Timothy Henry, Computer Science and Statistics
Technology has become an essential part of Americans’ daily lives, affecting our communications, mail, relationships, the management of our bills and finances. As we have become more immersed in the benefits and capabilities of these constantly developing technologies, children as well as adults have become avid users. Laptops and cell phones are specially developed for preteens. Software and game companies have been targeting children in their game development. Video games have become common entertainment for children as young as four. Children today can …
Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant
Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant
Kno.e.sis Publications
Centralized social networking websites raise scalability issues - due to the growing number of participants - and, as well as, policy concerns - such as control, privacy and ownership over the user's published data. Distributed Social Networks aim to solve this issue by enabling architecture where people own their data and share it their own way. However, the privacy and scalability challenge is still to be tackled. This paper presents a privacy-aware extension to Google's PubSubHubbub protocol, using Semantic Web technologies, solving both the scalability and the privacy issues in Distributed Social Networks. We enhanced the traditional feature of PubSubHubbub …
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
All Faculty Scholarship
In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
All Faculty Scholarship
The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …
Four Billion Little Brothers?: Privacy, Mobile Phones, And Ubiquitous Data Collection, Katie Shilton
Four Billion Little Brothers?: Privacy, Mobile Phones, And Ubiquitous Data Collection, Katie Shilton
Ethics in Science and Engineering National Clearinghouse
No abstract provided.
Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava
Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava
Ethics in Science and Engineering National Clearinghouse
Urban sensing systems that use mobile phones enable individuals and communities to collect and share data with unprecedented speed, accuracy and granularity. But employing mobile handsets as sensor nodes poses new challenges for privacy, data security, and ethics. To address these challenges, CENS is developing design principles based upon understanding privacy regulation as a participatory process. This paper briefly reviews related literature and introduces the concept of participatory privacy regulation. PPR reframes negotiations of social context as an important part of participation in sensing-supported research. It engages participants in ethical decision-making and the meaningful negotiation of personal boundaries and …
Formal Security Definition And Efficient Construction For Roaming With A Privacy-Preserving Extension, Guomin Yang, Duncan S. Wong, Xiaotie Deng
Formal Security Definition And Efficient Construction For Roaming With A Privacy-Preserving Extension, Guomin Yang, Duncan S. Wong, Xiaotie Deng
Faculty of Engineering and Information Sciences - Papers: Part A
In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages exchanged between them. U may also want to travel anonymously so that no one including V can find out its identity or trace its whereabouts except its home server H. There have been many key establishment protocols proposed for secure roaming. A typical application of these protocols is the mobile roaming service which may be deployed to interconnected WLAN and 3G networks. Despite the importance of …