Horizon Report > 2013 Higher Education Edition
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Remembering Through Lifelogging: a Survey of Human Memory Augmentation
Remembering through lifelogging: a survey of human memory augmentation Morgan Harveya,∗, Marc Langheinrichb, Geoff Wardc aDepartment of Maths and Information Sciences, Northumbria University, Newcastle, UK morgan. harvey@ northumbria. ac. uk , Tel: +44 (0)191 349 5929 bFaculty of Informatics, Universit`adella Svizzera italiana (USI), Switzerland cDepartment of Psychology, University of Essex, UK Abstract Human memory is unquestionably a vital cognitive ability but one that can often be unreliable. External memory aids such as diaries, photos, alarms and calendars are often employed to assist in remembering important events in our past and fu- ture. The recent trend for lifelogging, continuously documenting ones life through wearable sensors and cameras, presents a clear opportunity to augment human memory beyond simple reminders and actually improve its capacity to remember. This article surveys work from the fields of computer science and psychology to understand the potential for such augmentation, the technologies necessary for realising this opportunity and to investigate what the possible benefits and ethical pitfalls of using such technology might be. Keywords: Lifelogging, Augmented Human Memory, Personal Life Archives 1. Introduction Human memory is a critical cognitive function that we rely on almost con- stantly in our everyday lives. External memory aids are often used to help support memory for past events; photographs help us to remember autobiographical events such as holidays, we use recorded minutes to help us remember the content of meet- ings, and revision notes to remember lectures. Similarly, post-it notes, alarms, and interactive calendars and reminders help us to remember future events. Such aids often require some planning and conscious effort to initiate and record, and provide external support for only a small proportion of all past and future events. -
A Privacy-Aware and Secure System for Human Memory Augmentation
A Privacy-aware and Secure System for Human Memory Augmentation Doctoral Dissertation submitted to the Faculty of Informatics of the Università della Svizzera italiana in partial fulfillment of the requirements for the degree of Doctor of Philosophy presented by Agon Bexheti under the supervision of Prof. Marc Langheinrich September 2019 Dissertation Committee Prof. Antonio Carzaniga Università della Svizzera italiana, Switzerland Prof. Fernando Pedone Università della Svizzera italiana, Switzerland Prof. Cecilia Mascolo University of Cambridge, United Kingdom Prof. Claudio Bettini Università degli Studi di Milano, Italy Dissertation accepted on 06 September 2019 Research Advisor PhD Program Director Prof. Marc Langheinrich Prof. Walter Binder and Prof. Silvia Santini i I certify that except where due acknowledgement has been given, the work presented in this thesis is that of the author alone; the work has not been submit- ted previously, in whole or in part, to qualify for any other academic award; and the content of the thesis is the result of work which has been carried out since the official commencement date of the approved research program. Agon Bexheti Lugano, 06 September 2019 ii Abstract The ubiquity of digital sensors embedded in today’s mobile and wearable devices (e.g., smartphones, wearable cameras, wristbands) has made technology more intertwined with our life. Among many other things, this allows us to seamlessly log our daily experiences in increasing numbers and quality, a process known as “lifelogging”. This practice produces a great amount of pictures and videos that can potentially improve human memory. Consider how a single photograph can bring back distant childhood memories, or how a song can help us reminisce about our last vacation. -
Overview Not Confine the Discussion in This Report to Those Specific Issues Within the Commission’S Regulatory Jurisdiction
television, cable and satellite media outlets operate. Accordingly, we do Overview not confine the discussion in this report to those specific issues within the Commission’s regulatory jurisdiction. Instead, we describe below 1 MG Siegler, Eric Schmidt: Every 2 Days We Create As Much Information a set of inter-related changes in the media landscape that provide the As We Did Up to 2003, TECH CRUNCH, Aug 4, 2010, http://techcrunch. background for future FCC decision-making, as well as assessments by com/2010/08/04/schmidt-data/. other policymakers beyond the FCC. 2 Company History, THomsoN REUTERS (Company History), http://thom- 10 Founders’ Constitution, James Madison, Report on the Virginia Resolu- sonreuters.com/about/company_history/#1890_1790 (last visited Feb. tions, http://press-pubs.uchicago.edu/founders/documents/amendI_ 8, 2011). speechs24.html (last visited Feb. 7, 2011). 3 Company History. Reuter also used carrier pigeons to bridge the gap in 11 Advertising Expenditures, NEwspapER AssoC. OF AM. (last updated Mar. the telegraph line then existing between Aachen and Brussels. Reuters 2010), http://www.naa.org/TrendsandNumbers/Advertising-Expendi- Group PLC, http://www.fundinguniverse.com/company-histories/ tures.aspx. Reuters-Group-PLC-Company-History.html (last visited Feb. 8, 2011). 12 “Newspapers: News Investment” in PEW RESEARCH CTR.’S PRoj. foR 4 Reuters Group PLC (Reuters Group), http://www.fundinguniverse.com/ EXCELLENCE IN JOURNALISM, THE StatE OF THE NEws MEDIA 2010 (PEW, company-histories/Reuters-Group-PLC-Company-History.html (last StatE OF NEws MEDIA 2010), http://stateofthemedia.org/2010/newspa- visited Feb. 8, 2011). pers-summary-essay/news-investment/. -
Public Sector Clinic
SCOTT GALLOWAY NYU Stern DOUG GUTHRIE The George Washington Universit y School of Business NOVEMBER 23, 2010 A THINK TANK for DIGITAL INNOVATION © L2 2010 L2ThinkTank.com 01.20.11 The George Washington University School of Business The Opportunities, Challenges, and Underpinnings of Social Media Programs in the Public Sector Clinic http://l2socialgraphdc.eventbrite.com/ Speakers Include: AMY GANDERSON DAVID WERNER DOUG GUTHRIE PATRICK KERLEY Associate Director Assistant Chief of Information Dean Senior Digital Strategist of Digital Marketing for Communication Integration The George Washington Levick Strategic The Nature Conservancy and Strategy University School of Business Communications US Navy Offi ce of Information ANDREW RASIEJ SCOTT GALLOWAY JOE ROSPARS STEPHANIE Founder Founder Founding Partner & SCHIERHOLZ Personal Democracy Forum L2 Creative Director Social Media Manager Blue State Digital NASA BRANDON KESSLER GREG SHOVE MAUREEN MULLEN Founder Founder Lead Researcher ChallengePost Halogen L2 DIGITAL IQ INDEX: Want to know more about your brand’s ranking? Public Sector CONTACT US INTRODUCTION “Of the People” The advent of the social web has changed our nation’s public sector organizations. Emerging platforms facilitate the transparency that candidates and advocacy groups commit to, and call for, and have ushered in a new era of two-way communication. Constituents now vote in real time with their browsers, opining, advocating, and donating. In addition, these new mediums provide oppor- tunities to generate efficiencies in what will likely be an era of cost cutting. However, while digital empowers our democracy, many of the organizations tasked with tackling our nation’s toughest challenges are still in the early stages of unlocking the potential of these new platforms. -
Guide WELCOME BACK
Hurricane Irene may dampen move-in neWS • PaGe a2 An unexpected homecoming Former Colonial Jessica Thievery Corporation CULTURE Adair is back in the WNBA energizes waterfront PaGe B9 There is no place like home for the D.C. music pioneers SPORTS • PaGe a10 An independent student newspaper • Serving the GW community since 1904 Thursday The GW August 25, 2011 WWW.GWHATCHET.COM Vol. 108 • Iss. 4 HatchetWELCOME BACK Gelman Library Extensive renovation 2011 blueprints unveiled by katherIne rodrIGuez on the library’s first level, in hopes Guide Hatchet Reporter to facilitate social learning. Design of the space will con- Long-awaited upgrades to the tinue throughout the spring, and first floor of Gelman Library are construction, which will begin in Finding inching closer to becoming a reality the summer of 2012, will occur in with the release of detailed design several phases over the next three renderings for the renovations. years. Marking another step toward Numerous technological up- quelling student complaints about grades to existing study areas are your the outdated facility, the newly included in the designs, such as drafted designs, created by architec- laptop bars with outlets, wireless ture firm Cox Graae + Spack Archi- networks and printing capabilities. tects, show more group study spac- GW es rather than individual cubicles See GELMAN: Page B6 stride University seeks to rebrand visual image by PrIya anand his role, the University's communica- Metro News Editor tions arm has become more prominent, and managing messages across GW is a The University has hired two lead- large part of how the University relates to ing public relations firms to fine tune its community. -
Ethics of the Sensor
Ph.D. THESIS Ethics of Lifelog Technology By Tim Jacquemard, B.A., M.A. School of Computing Supervisors: Prof. Bert Gordijn Prof. Alan F. Smeaton September, 2014 Dublin City University Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of Ph.D. is entirely my own work, that I have exercised reasonable care to ensure that the work is original, and does not to the best of my knowledge breach any law of copyright, and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: ID No.: Date: Acknowledgements As I have come to see, a Ph.D. is never the work of one person, but the result of the combined efforts of many. Firstly, I am thankful to my supervisors, Alan and Bert, for their guidance and feedback throughout the process. Special thanks to Bart, Elizabeth, Fiachra, Jurjen, Peter, Renaat, and Wouter for their invaluable contributions as editors and/or technical support. Lastly, I would like to show my warm gratitude to Louise, my parents, my sister, my family and friends in Dublin, the Netherlands, and beyond. I am incredibly fortunate to have such a loving and supportive environment. Contents Abstract ............................................................................................................................................................ i List of Tables ................................................................................................................................................... -
Run of the Red Queen This Page Intentionally Left Blank Run of the Red Queen Government, Innovation, Globalization, and Economic Growth in China
Run of the Red Queen This page intentionally left blank Run of the Red Queen Government, Innovation, Globalization, and Economic Growth in China Dan Breznitz Michael Murphree NEW HAVEN AND LONDON Published with assistance from the foundation established in memory of Philip Hamilton McMillan of the Class of 1894, Yale College. Copyright © 2011 by Dan Breznitz and Michael Murphree. All rights reserved. This book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. Yale University Press books may be purchased in quantity for educational, business, or promotional use. For information, please e-mail [email protected] (U.S. office) or [email protected] (U.K. office). Set in Adobe Garamond type by The Composing Room of Michigan, Inc. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Breznitz, Dan. Run of the red queen : government, innovation, globalization, and economic growth in China / Dan Breznitz, Michael Murphree. p. cm. Includes bibliographical references and index. ISBN 978-0-300-15271-5 (cloth : alk. paper) 1. China—Economic policy. 2. Industrial policy—China. 3. Technological innovations—China. 4. New products—China. 5. Economic development— China. I. Murphree, Michael, 1981– II. Title. HC427.95.B748 2011 338.951—dc22 2010036483 A catalogue record for this book is available from the British Library. This paper meets the requirements of ANSI/NISO Z39.48–1992 (Permanence of Paper). -
Public Interest Comment
PUBLIC INTEREST Bridging the gap between academic ideas and real-world problems COMMENT THE BENEFITS, CHALLENGES, AND POTENTIAL ROLES FOR THE GOVERNMENT IN FOSTERING THE ADVANCEMENT OF THE INTERNET OF THINGS ADAM THIERER Senior Research Fellow, Mercatus Center at George Mason University Agency: National Telecommunications Information Administration, Department of Commerce Proposed: April 5, 2016 Comment period closes: June 2, 2016 Submitted: June 1, 2016 Docket ID: 160331306–6306–01 My name is Adam Thierer, and I am a senior research fellow at the Mercatus Center at George Mason University, where I study technology policy. Along with other Mercatus Center schol- ars, I have conducted extensive research on the questions raised in the NTIA’s Internet of Things (IoT) proceeding. Accordingly, I am pleased to submit for the record two recently published Mercatus Center articles. The first article is a compendium of statistics on the economic impact of the IoT and wearables that I coauthored with Andrea Castillo.1 The second is a law review article I authored for the Richmond Journal of Law and Technology last year.2 1. Adam Thierer and Andrea Castillo, “Projecting the Growth and Economic Impact of the Internet of Things,” Eco- nomic Perspectives, Mercatus Center at George Mason University, June 15, 2015, http://mercatus.org/publication/ projecting-growth-and-economic-impact-internet-things. 2. Adam Thierer, “The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation,” Richmond Journal of Law and Technology 21, no. 6 (2015), http://papers.ssrn.com/sol3/papers. cfm?abstract_id=2494382. For more information, contact Taylor Barkley, Assistant Director of Outreach for Technology Policy 703-993-8205, [email protected] Mercatus Center at George Mason University 3434 Washington Boulevard, 4th Floor, Arlington, VA 22201 There are two key takeaways from these publications. -
001 C1 Janfeb13 Cover.Indd
Why IT Matters to Higher Education EDUCAUSJANUARY/FEBRUARY 2013 E Information Revealed Privacy Merri Beth Lavagnino Privacy, Security, and Compliance Michael Corn and Jane Rosenthal Mentoring, Self-Awareness, and Collaboration Melissa Woo, David G. Swartz, and Earving L. Blythe PLUS EDUCAUSE Values: Community activate learning. An integrated collection of classroom furniture, Verb: for the many modes of learning Verb™ is designed to support a full range of teaching and learning styles on demand. www.steelcase.com/Verb Why IT Matters to Higher Education EDUCAUSr e vıeEw JANUARY/FEBRUARY 2013 VOLUME 48, NUMBER 1 4 EDUCAUSE Values: Community FEATURES 10 Information Privacy Revealed Merri Beth Lavagnino IT senior leaders and IT staff should learn what privacy is, why it is important in higher education today, and 10 how they can identify and address privacy risks. 24 Privacy, Security, and Compliance: Strange Bedfellows or a Marriage Made in Heaven? Michael Corn and Jane Rosenthal The authors examine several campus issues lying at the intersection of privacy, security, and compliance and provide insight for institutional leaders planning 24 strategic directions. 36 Mentoring, Self-Awareness, and Collaboration: The 2012 EDUCAUSE Award Winners Melissa Woo, David G. Swartz, and Earving L. Blythe The 2012 EDUCAUSE Award winners talk about the higher education IT profession and about how their particular interests have influenced and guided their 36 leadership roles. 48 Analytics: Changing the Conversation Diana G. Oblinger The third in a three-article EDUCAUSE Review series exploring analytics. 48 www.educause.edu/ero JANUARY/FEBRUARY 2013 EDUCAUSEreview 1 Why IT Matters to Higher Education EDUCAUr e vıewSE JANUARY/FEBRUARY 2013 VOLUME 48, NUM BER 1 PUBLISHER/EDITOR DEPARTMENTS D. -
Final Program
Final Program 100th Annual Meeting August 13-16, 2005 Philadelphia Marriott, Philadelphia Loews, and Philadelphia Downtown Courtyard by Marriott Philadelphia, Pennsylvania Comparative Perspectives, Competing Explanations Accounting for the Rising and Declining Significance of Sociology This is the centennial for the Association, so the meeting theme should be sufficiently expansive to address a wide historical sweep, and yet have sufficient focus to provide a framework in which to address key aspects of the social history of the discipline—its contemporary situation and its potential future development. Each of the three elements from the title “Comparative Perspectives, Competing Explanations” is designed to produce a fruitful meeting frame: First, the notion of “comparative perspectives” is itself “accordion-like” and can fit a number of purposes and goals. There is the international aspect, so that we can incorporate a comparison of American sociology with international developments. There is the internal evolution of perspectives inside of the United States, which would include the development and emergence of challenging and oppositional perspectives in the discipline, from the Society for the Study of Social Problems, to Sociologists for Women in Society, to the Association of Black Sociologists, to name but a few organizational manifestations of the challenges of the last half century. There are others that will surely surface from the general call. Second, there is the notion of “competing explanations.” Competing explanations -
Life-Swap: How Discussions Around Personal Data Can Motivate Desire for Change
Rowanne Fleck1 (0000-0002-7017-4474) (corresponding author) Marta E. Cecchinato2 (0000-0002-0627-8658) Anna L. Cox3 (0000-0003-2231-2964) Daniel Harrison2 (0000-0002-5710-7349) Paul Marshall4 (0000-0003-2950-8310) Jea Hoo Na5 (0000-0002-0020-1713) Anya Skatova6 (0000-0003-0300-4990) 1. School of Computer Science, University of Birmingham, Edgbaston, Birmingham B15 2TT, UK. [email protected] 0121 414 4789 2. Computer and Information Sciences dept., Northumbria University, 2 Ellison Place, Newcastle upon Tyne, NE1 8ST, UK. 3. UCL Interaction Centre, University College London, 2nd floor 66-72 Gower Street, London WC1E 6BT, UK 4. Department of Computer Science, Merchant Venturers Building, Woodland Road, Clifton, Bristol, United Kingdom 5. Manchester School of Art | Manchester Metropolitan University, 1.02 Righton Building, Cavendish Street Manchester M15 6BG, UK 6. School of Psychological Science, University of Bristol, 12a, Priory Road, Bristol BS8 1TU, UK Life-Swap: How Discussions Around Personal Data Can Motivate Desire for Change Abstract Personal informatics technologies support the collection of and reflection on personal data, but enabling people to learn from and act on this data is still an on-going challenge. Sharing and discussing data is one way people can learn from it, but as yet, little research explores how peer discourses around data can shape understandings and promote action. We ran 3 workshops with 5-week follow-ups, giving 18 people the opportunity to swap their data and discuss it with another person. We found this helped them re-contextualise and better understand their data, identify new strategies for changing their behaviour and motivated people to commit to changes in the future. -
92 an Offensive and Defensive Exposition of Wearable Computing
An Offensive and Defensive Exposition of Wearable Computing PRAKASH SHRESTHA and NITESH SAXENA, University of Alabama at Birmingham, USA Wearable computing is rapidly getting deployed in many—commercial, medical, and personal—domains of day-to-day life. Wearable devices appear in various forms, shapes, and sizes and facilitate a wide variety of applications in many domains of life. However, wearables raise unique security and privacy concerns. Wearables also hold the promise to help enhance the existing security, privacy, and safety paradigms in unique ways while preserving the system’s usability. The contribution of this research literature survey is threefold. First, as a background, we identify a wide range of existing as well as upcoming wearable devices and investigate their broad applications. Second, we provide an exposition of the security and privacy of wearable computing, studying dual aspects, that is, both attacks and defenses. Third, we provide a comprehensive study of the potential security, privacy, and safety enhancements to existing systems based on the emergence of wearable technology. Although several research works have emerged exploring different offensive and defensive uses of wearables, there is a lack of abroad and precise literature review systematizing all those security and privacy aspects and the underlying threat models. This research survey also analyzes current and emerging research trends and provides directions for future research. CCS Concepts: • General and reference → Surveys and overviews;•Security and privacy → Authen- tication; Privacy-preserving protocols; Privacy protections; Additional Key Words and Phrases: Wearable computing, security requirements, side-channel analysis and countermeasures ACM Reference format: Prakash Shrestha and Nitesh Saxena. 2017.