user activity
Recently Published Documents


TOTAL DOCUMENTS

445
(FIVE YEARS 162)

H-INDEX

24
(FIVE YEARS 7)

2021 ◽  
Vol 2 (2) ◽  
pp. 127-138
Author(s):  
Rafif Pamenang Imawan

Kajian ini akan mengeksplorasi kekerasan berbasis gender dengan mengeksplorasi pengaturan data pribadi dan solusi dominasi patriarki dalam masalah media online. Dengan menggunakan tinjauan pustaka sistematis, tujuan dari penelitian ini adalah memberikan peta kompleksitas dalam masalah pemanfaatan media sosial online. Harapan dari penelitian ini adalah dapat memberikan informasi kepada pembaca tentang masalah hakikat kekerasan berbasis gender online dengan memberikan peta permasalahan sosial di Indonesia. Selain itu, secara akademis, tulisan ini akan mengeksplorasi teori postmodernisme tentang gender, ruang media sosial dan online serta masalah pola pikir struktural terkait kekerasan berbasis gender. Dalam ranah yang lebih praktis, tulisan ini akan memberikan landasan dasar bagi para pemangku kepentingan untuk merumuskan kebijakan terkait kekerasan berbasis gender secara online. === The COVID-19 forces people to isolate themselves to prevent the spread of the virus. COVID-19 increases the online activities of individuals to meet all their needs and obligations. Not only service-based applications that increased user activity, but also social media applications, which is Twitter. With the various features that Twitter offers, it not only makes it easier for individuals to communicate with people they know, but also opens up opportunities to interact with other users without any restrictions. Twitter allows its users to upload selfies and allows other users to comment on those selfies/uploads. In this research, authors analyzed sexually comments on @dododid_ selfies during the 2020 period. Using Norman Fairclough's critical discourse analysis method, authors found 3 major discourses related to selfies of men with feminine gender expression, that are beautiful discourse = women, objectification discourse and stigma and stereotypes. Through this study the author also found that online-based gender violence can be experienced by anyone in various forms.


2021 ◽  
Vol 2 (2) ◽  
pp. 117-126
Author(s):  
Nara Garini Ayuningrum

Pandemi COVID-19 memaksa masyarakat untuk mengisolasi diri mereka masing-masing demi mencegah penyebaran virus. Hal ini meningkatkan aktivitas daring para individu demi memenuhi segala kebutuhan dan kewajiban. Tidak hanya aplikasi berbasis jasa yang mengalami peningkatan aktivitas pengguna, tetapi juga aplikasi media sosial, salah satunya adalah Twitter. Dengan berbagai fitur yang ditawarkan, Twitter tidak hanya mempermudah individu untuk berkomunikasi dengan orang-orang yang dikenalnya, tetapi juga membuka peluang untuk berinteraksi dengan pengguna lain tanpa adanya batasan. Twitter memungkinkan penggunanya untuk mengunggah swafoto dan membiarkan pengguna lain untuk mengomentari swafoto/unggahan tersebut. Dalam penelitian ini, penulis akan menganalisis komentar-komentar bernada seksual yang ada pada swafoto akun @dododid_ selama periode tahun 2020. Dengan menggunakan metode analisis wacana kritis Norman Fairclough, peneliti menemukan 3 wacana besar terkait swafoto laki-laki berekspresi gender feminin, yaitu wacana cantik = perempuan, wacana objektifikasi dan stigma dan stereotipe. Melalui penelitian ini penulis juga menemukan bahwa kekerasan  gender berbasis online bisa dialami oleh siapa saja dalam bentuk yang bermacam-macam. === The COVID-19 forces people to isolate themselves to prevent the spread of the virus. COVID-19 increases the online activities of individuals to meet all their needs and obligations. Not only service-based applications that increased user activity, but also social media applications, which is Twitter. With the various features that Twitter offers, it not only makes it easier for individuals to communicate with people they know, but also opens up opportunities to interact with other users without any restrictions. Twitter allows its users to upload selfies and allows other users to comment on those selfies/uploads. In this research, authors analyzed sexually comments on @dododid_ selfies during the 2020 period. Using Norman Fairclough's critical discourse analysis method, authors found 3 major discourses related to selfies of men with feminine gender expression, that are beautiful discourse = women, objectification discourse and stigma and stereotypes. Through this study the author also found that online-based gender violence can be experienced by anyone in various forms.


2021 ◽  
Vol 5 (11) ◽  
pp. 65
Author(s):  
Camille Truong-Allié ◽  
Alexis Paljic ◽  
Alexis Roux ◽  
Martin Herbeth

Augmented reality (AR) is widely used to guide users when performing complex tasks, for example, in education or industry. Sometimes, these tasks are a succession of subtasks, possibly distant from each other. This can happen, for instance, in inspection operations, where AR devices can give instructions about subtasks to perform in several rooms. In this case, AR guidance is both needed to indicate where to head to perform the subtasks and to instruct the user about how to perform these subtasks. In this paper, we propose an approach based on user activity detection. An AR device displays the guidance for wayfinding when current user activity suggests it is needed. We designed the first prototype on a head-mounted display using a neural network for user activity detection and compared it with two other guidance temporality strategies, in terms of efficiency and user preferences. Our results show that the most efficient guidance temporality depends on user familiarity with the AR display. While our proposed guidance has not proven to be more efficient than the other two, our experiment hints toward several improvements of our prototype, which is a first step in the direction of efficient guidance for both wayfinding and complex task completion.


2021 ◽  
Author(s):  
Homa Nikbakht ◽  
Michele Wigger ◽  
Shlomo Shamai Shitz ◽  
Jean-Marie Gorce
Keyword(s):  

2021 ◽  
Vol 18 (3) ◽  
pp. 631-649
Author(s):  
Dmitrii S. Kornienko ◽  
Fedor V. Derish ◽  
Elena Yu. Nikitina

The role of factors of individual differences in user activity in the Russian social network VKontakte is analyzed. At the moment, in Russian psychology, there are several directions for the study of user activity in social networks. However, none of them has considered user sex and age differences. There are also limitations due to the predominance of subjective indicators in assessing user activity. The aim of this work is to study sex and age differences through the analysis of objective data on the profiles of social network users. The paper also provides an overview of modern Russian studies on sex and age differences in user activity. Using a comparative analysis of groups and analysis of the structure of relationships between indicators of user activity, the 9699 profiles of users of the social network VKontakte at the ages from 18 to 55 were examined. As a result, multiple individual differences were found in relation to the sex and age of the users. Additionally, the structure of user activity was obtained, consisting of two components: Self-presentation and Utilitarianism. These components characterize the personal orientation in the use of the social network. Sex and age play a significant role as factors of individual differences. The most important thing has turned out to be that men are more focused on expanding the circle of acquaintances, which is an attribute of status. Women, on the contrary, are generally characterized by greater activity in the social network, a greater desire to present themselves and a greater focus on other people. Young people - aged 18-25 years - are less active users, they often use the social network as a source of video content. Users belonging to the older age groups differ slightly from one another.


2021 ◽  
Vol 38 ◽  
pp. 301133
Author(s):  
Xiaoyu Du ◽  
Christopher Hargreaves ◽  
John Sheppard ◽  
Mark Scanlon

2021 ◽  
Author(s):  
Mohammed Al-Shaboti

<p><b>The increasing use of Internet of Things (IoT) devices raises security and privacy concerns. In smart spaces, multiple IoT devices are simultaneously used to fulfil user activity functions. However, these devices exhibit several security vulnerabilities that can compromise smart space security and privacy. The ability of fine-grained control network access in IoT devices and application messages can significantly reduce the risk resulting from the exploitation of IoT vulnerabilities due to unauthorised access, thereby improving smart space security. A well-recognised approach in the literature for IoT access control is to use pre-defined access policies to allow the necessary connections for a device to function correctly. However, these policies allow access to all device functions (i.e. coarse-grained access) including those functions that are not used by any user activity.</b></p> <p>The overall goal of this thesis is to develop an access control framework and techniques to achieve fine-grained access policies by using user inputs. The user inputs will be utilised to select devices to fulfil user activities aiming to build an access policy from the minimum access required for each device function. In this thesis, the use of user inputs to meet user security and privacy requirements in single- and multi-user smart spaces is studied.</p> <p>The main contributions are as follows: first, an access control framework that enables users to tailor IoT device policies to meet their security and privacy requirements is proposed. Validation results of the framework show the effectiveness of integrating user access rules into the existing security countermeasures (i.e. pre-defined policies and intrusion detection systems – IDS) to enforce user security and privacy.</p> <p>Second, the problem of selecting preferable devices to fulfil user activity functions is formulated as an optimisation problem. The optimisation problem is then solved by local and global optimisation searching algorithms that are guided by a developed user preference quantified model. The results show that global optimisation search algorithms such as Genetic Algorithm (GA) find the solution more effectively and efficiently than local search algorithms such as simulated annealing and hill-climbing.</p> <p>Third, sharing access control for multi-user smart spaces is proposed. Traditional access control that considers a single user is not suitable for multi-user smart spaces, where users share their IoT devices. The sharing between multiple users poses challenges different than in single-user access control. For example, users may abuse using shared devices and use vulnerable ones. This thesis addresses these two challenges through two contributions. First, it proposes a novel sharing policy language that enables users to precisely define their sharing policy. Second, this thesis formulates the sharing policies as constraints in the context of an optimisation problem with the objective function that maximises the use of secure devices. Results show that the IoT sharing issue can naturally be translated into an integer linear programming (ILP) problem and effectively solved using off-the-shelf ILP solvers.</p> <p>Fourth, this thesis explores the feasibility and practicality of the fine-grained access policy enforcement through a smart home case study. A case study is built using a hub-based architecture that uses Web of Things (WoT) technology. WoT provides a device semantic description that includes device functions with the corresponding Uniform Resource Identifier (URI) which is used to build access control policies. The case study results show that policy enforcement can be effectively achieved by directing network traffic through a device proxy for each IoT device to enforce application access control without introducing statistically significant overhead on the user activity running time.</p> <p>In summary, this thesis studies the use of user inputs to derive fine-grained access control in smart spaces. For a single-user access control system, this thesis considers using manual rules and user preferences in small and dense smart spaces, respectively. For a multi-user access control system, this thesis proposes a secure sharing system supported by a sharing policy language to share and use IoT devices securely. For each scenario analysed, user input is utilised to derive fine-grained access policies. Enforcement of these policies has been explored by implementing a smart space case study using WoT technology. The overall results show that user preferences and sharing policies can be used to derive fine-grained access policies that are transparent to users and meet their security and privacy requirements.</p>


2021 ◽  
Author(s):  
Mohammed Al-Shaboti

<p><b>The increasing use of Internet of Things (IoT) devices raises security and privacy concerns. In smart spaces, multiple IoT devices are simultaneously used to fulfil user activity functions. However, these devices exhibit several security vulnerabilities that can compromise smart space security and privacy. The ability of fine-grained control network access in IoT devices and application messages can significantly reduce the risk resulting from the exploitation of IoT vulnerabilities due to unauthorised access, thereby improving smart space security. A well-recognised approach in the literature for IoT access control is to use pre-defined access policies to allow the necessary connections for a device to function correctly. However, these policies allow access to all device functions (i.e. coarse-grained access) including those functions that are not used by any user activity.</b></p> <p>The overall goal of this thesis is to develop an access control framework and techniques to achieve fine-grained access policies by using user inputs. The user inputs will be utilised to select devices to fulfil user activities aiming to build an access policy from the minimum access required for each device function. In this thesis, the use of user inputs to meet user security and privacy requirements in single- and multi-user smart spaces is studied.</p> <p>The main contributions are as follows: first, an access control framework that enables users to tailor IoT device policies to meet their security and privacy requirements is proposed. Validation results of the framework show the effectiveness of integrating user access rules into the existing security countermeasures (i.e. pre-defined policies and intrusion detection systems – IDS) to enforce user security and privacy.</p> <p>Second, the problem of selecting preferable devices to fulfil user activity functions is formulated as an optimisation problem. The optimisation problem is then solved by local and global optimisation searching algorithms that are guided by a developed user preference quantified model. The results show that global optimisation search algorithms such as Genetic Algorithm (GA) find the solution more effectively and efficiently than local search algorithms such as simulated annealing and hill-climbing.</p> <p>Third, sharing access control for multi-user smart spaces is proposed. Traditional access control that considers a single user is not suitable for multi-user smart spaces, where users share their IoT devices. The sharing between multiple users poses challenges different than in single-user access control. For example, users may abuse using shared devices and use vulnerable ones. This thesis addresses these two challenges through two contributions. First, it proposes a novel sharing policy language that enables users to precisely define their sharing policy. Second, this thesis formulates the sharing policies as constraints in the context of an optimisation problem with the objective function that maximises the use of secure devices. Results show that the IoT sharing issue can naturally be translated into an integer linear programming (ILP) problem and effectively solved using off-the-shelf ILP solvers.</p> <p>Fourth, this thesis explores the feasibility and practicality of the fine-grained access policy enforcement through a smart home case study. A case study is built using a hub-based architecture that uses Web of Things (WoT) technology. WoT provides a device semantic description that includes device functions with the corresponding Uniform Resource Identifier (URI) which is used to build access control policies. The case study results show that policy enforcement can be effectively achieved by directing network traffic through a device proxy for each IoT device to enforce application access control without introducing statistically significant overhead on the user activity running time.</p> <p>In summary, this thesis studies the use of user inputs to derive fine-grained access control in smart spaces. For a single-user access control system, this thesis considers using manual rules and user preferences in small and dense smart spaces, respectively. For a multi-user access control system, this thesis proposes a secure sharing system supported by a sharing policy language to share and use IoT devices securely. For each scenario analysed, user input is utilised to derive fine-grained access policies. Enforcement of these policies has been explored by implementing a smart space case study using WoT technology. The overall results show that user preferences and sharing policies can be used to derive fine-grained access policies that are transparent to users and meet their security and privacy requirements.</p>


Sign in / Sign up

Export Citation Format

Share Document