Skip to main content

Home/ DGL RJC Group/ Group items tagged Digital Literacy

Rss Feed Group items tagged

1More

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History | WIRED - 0 views

  •  
    Malware detective work
1More

Viral Video Cell-Phone Scare - CSI - 0 views

  •  
    In June 2009 a new urban legend was born-that the power generated by cell phones can cook popcorn. A series of videos on YouTube appeared to show four users popping a table full of corn kernels simply by pointing their ringing phones at them. The implication for the casual observer was clear: if cell phones emit enough radiation to pop corn, imagine what they are doing to your brain!
1More

http://www.andrew.cmu.edu/user/lshea/Interesting_Articles/Bed_Intruder_Song.pdf - 0 views

  •  
    From Viral Video To Billboard 100
1More

http://ndn-newpol.civicactions.net/sites/ndn-newpol.civicactions.net/files/ViralVideoin... - 0 views

  •  
    VIRAL VIDEO IN POLITICS CASE STUDIES ON CREATING COMPELLING VIDEO
1More

http://www.ra.ethz.ch/CDStore/www2008/airweb.cse.lehigh.edu/2005/proceedings.pdf#page=11 - 0 views

  •  
    We present an approach for detecting link spam common in blog comments by comparing the language models used in the blog post, the comment, and pages linked by the com- ments. In contrast to other link spam filtering approaches, our method requires no training, no hard-coded rule sets, and no knowledge of complete-web connectivity. Prelimi- nary experiments with identification of typical blog spam show promising results.
5More

Enabling Management Oversight in Corporate Blog Space.pdf - 0 views

  • Analysis of a corpus of tens of thousands of blogs –incorporating close to 300 million words – indicates significant differences in writing style and content between male and female bloggers as well as among authors of different ages. Such differences can be exploited to determine an unknown author’s age and gender on the basis of a blog’s vocabulary.
  • UTOMATED AUTHOR PROFILINGWhile we have found significant differences among bloggers of different ages and genders, the truest test of the significance of these differences is the extent to which they enable us to correctly predict an author’s age and gender
  • Learning AlgorithmWe use the learning algorithm Multi-Class Real Winnow (MCRW) to learn models that classify blogs according to author gender and age, respectively. Since this algorithm is not well known, we describe it briefly
  • ...2 more annotations...
  • 40.0%50.0%60.0%70.0%80.0%90.0%100.0%genderagestyle contentallFigure 1 10-fold cross validation results for the age and gender classifiersClassed as 10's20's30's10's7036102717720's916632684430's17814651351Table 7 Confusion matrix for the age classifier using all featuresFor age, content proves to be slightly more useful than style, but – as in gender – the combination is most useful. The confusion matrix indicates that, using content and style features together, 10s are distinguishable from 30’s with accuracy above 96% and distinguishing 10s from 20s is also achievable with accuracy of 87.3%. Many 30s are mis-classed as 20s, however, yielding overall accuracy is 76.2%CONCLUSIONSWe have assembled a large corpus of blogs labeled for a variety of demographic attributes. This large sample permits us insight into the demographic distribution of bloggers. We have found that teenage bloggers are predominantly female, while older bloggers are predominantly male. Moreover, within each age group, male and female bloggers blog about different thing and use different blogging styles
  • We have assembled a large corpus of blogs labeled for a variety of demographic attributes. This large sample
1More

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.156.7392&rep=rep1&type=pdf#pag... - 0 views

    • qilabs
       
      Weblogs, or blogs as they are affectionately termed, are frequently updated websites, usually personal, with commentary and links. Link lists are as old as home pages, but a blog is far from a static link list or home page. A blog consists of many relatively short posts, usually time-stamped, and organised in reverse chronology so that a reader will always see the most recent post first. 
1More

http://www.aaai.org/Papers/Symposia/Spring/2006/SS-06-03/SS06-03-020.pdf - 0 views

  •  
    Watching specific information sources and summarizing the newly discovered opinions are important for governments to improve their services and for companies to improve their products (Dave et al., 2003 and Morinaga et al., 2002).
1More

Doninger v. Niehoff, 514 F. Supp. 2d 199 - Dist. Court, D. Connecticut 2007 - Google Sc... - 0 views

  •  
    Frustrated at school officials over developments regarding a music festival she had been planning, Avery posted a public message to her fellow students on a social networking site. Just about everyone but Avery agrees that the manner in which Avery expressed her frustration was offensive and inappropriate. For the message used a vulgar, slang term to describe school officials, it contained at best misleading and at worse false information regarding the music festival, and it called on students and their parents to write the school superintendent in order to "piss her off more." When school officials - who had advised Avery before she made her blog posting about the proper way for student leaders to address issues of concern with the administration - discovered the message, they disqualified Avery from running for class secretary for her senior year. According to school officials, Avery's conduct in posting the blog message failed to display the qualities of civility and citizenship that the school expected of class officers and leaders.
1More

http://www.suffolk.es/documents/jhtl_book_reviews/samuels.pdf - 0 views

  •  
    The Illustrated Story of Copyright
1More

A & M RECORDS, INC. v. Napster, Inc., 239 F. 3d 1004 - Court of Appeals, 9th Circuit 20... - 0 views

  •  
    Napster against the world...almost. To me this is one of the most fascinating stories in the last twenty years. How Napster disrupted the music distribution business and their impact on copyright laws.
1More

U.S. Copyright Office - Copyright Law: Chapter 1 - 0 views

  •  
    . Subject matter of copyright: In general28 (a) Copyright protection subsists, in accordance with this title, in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. Works of authorship include the following categories: (1) literary works; (2) musical works, including any accompanying words; (3) dramatic works, including any accompanying music; (4) pantomimes and choreographic works; (5) pictorial, graphic, and sculptural works; (6) motion pictures and other audiovisual works; (7) sound recordings; and (8) architectural works.
1More

http://copyright.gov/history/lore/2005/042005-lore.pdf - 0 views

  •  
    April 29 marks the 203rd anni- versary of the first amendment to the copyright law of the United States. Enacted in 1790, the initial copyright law provided protec- tion to maps, charts, and books.
1More

http://copyright.gov/history/lore/2004/march04-lore.pdf - 0 views

  •  
    First Song Published in 20th Century
1More

http://copyright.gov/history/lore/2004/feb04-lore.pdf - 0 views

  •  
    Coca Cola Copyright Label
1More

YOU HAVE BEEN HACKED! - Hold Security - 0 views

  •  
    ver the past 18 months, this was our conversation starter with many companies and individuals. Helping our clients prevent breaches or find their stolen data is our business. If you have been following information security, or even if you haven't, you have probably heard of Hold Security and our work. In October 2013, we identified a data breach with Adobe Systems. Later in December that year, we independently identified and tracked the Target breach and in February 2014 we identified over 360 million stolen credentials trafficked on the black market. Overall, Hold Security played a role in identifying and helping victims with most of the largest breaches.
1More

Database America v. Bellsouth Advertising & Pub., 825 F. Supp. 1216 - Dist. Court, D. N... - 0 views

  •  
    Lawsuit about database information sold by Database America that was "stolen" from the yellow pages.
1More

Justice Department working on national car-tracking database | Fox News - 0 views

  •  
    Justice Department working on national car-tracking database
‹ Previous 21 - 40 of 91 Next › Last »
Showing 20 items per page