The European Union‘s General Data Protection Regulation, or GDPR, goes into effect on May 25
The objective of the regulation, which passed in 2016, is to simplify and consolidate rules that companies need to follow in order to protect their data and to return control to EU citizens and residents over their personal information.
Individuals in the EU will have the right to access or request that companies erase or migrate their data elsewhere. When asked, companies must prove to authorities that they have satisfactory policies and procedures in place to protect their data, or they will face huge fines. How huge? If your company’s not compliant, the fines could be as large as 20 million Euros (about $24 million) or four percent of your annual global revenue, whichever is higher.
“A U.S. tourist who visits Germany for one day and returns to the U.S. has rights under the law if that person used [a service like] Facebook while on the trip,” Alex Stern, an attorney wrote on his firm’s blog.
Social media platforms are using the same techniques as gambling firms to create psychological dependencies and ingrain their products in the lives of their users, experts warn.
atasha Schüll, the author of Addiction by Design, which reported how slot machines and other systems are designed to lock users into a cycle of addiction.
Whether it’s Snapchat streaks, Facebook photo-scrolling, or playing CandyCrush, Schüll explained, you get drawn into “ludic loops” or repeated cycles of uncertainty, anticipation and feedback — and the rewards are just enough to keep you going.
Like gambling, which physically alters the brain’s structure and makes people more susceptible to depression and anxiety, social media use has been linked to depression and its potential to have an adverse psychological impact on users cannot be overlooked or underestimated.
However, the number of monthly active users of Facebook hit 2.13 billion earlier this year, up 14% from a year ago. Despite the furore around its data privacy issues, the social media monolith posted record revenues for the first quarter of 2018, making $11.97bn, up 49% on last year.
Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
Access both the front and the back camera.
Record you at any time the app is in the foreground.
Take pictures and videos without telling you.
Upload the pictures and videos without telling you.
Upload the pictures/videos it takes immediately.
Run real-time face recognition to detect facial features or expressions.
Livestream the camera on to the internet.
Detect if the user is on their phone alone, or watching together with a second person.
Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
The government
Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
Install whatever software/app they like on the user’s device.
Use a keylogger to grab all of their passwords.
Steal all documents from the device.
Take pictures and stream videos from their camera.
Capture past or live audio from the microphone.
Upload incriminating images/documents to their PC, and notify the police.
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.
Throw in LinkedIn, Twitter, Pinterest, Instagram and region specific social networks like Vkontakte and Sina Weibo and WeChat, and you’d be hard pressed to find anyone who’s online but isn’t on social media.
What has led to the rise of these social networks? What kind of people do they attract?
What is their psychology? What kind of content do they like to consume? And most importantly for bloggers and marketers – what works, what doesn’t on social media?
Facebook has become the ‘home base’ for most people online. While they may or may not use other networks, a majority maintain a presence on Facebook.
Popular: Used by 72% of all adult internet users in America.
More women users: 77% of online female users are on Facebook.
Younger audience: 82% of all online users between 18-29 are on Facebook
USA (14%), India (9%) and Brazil (7%) form the three largest markets.
Twitter’s quick flowing ‘info stream’ attracts an audience that swings younger and is mostly urban/semi-urban.
Younger: Used by 37% of all online users between 18 and 29.
Educated: 54% of users have either graduated college, or have some college experience.
Richer: 54% of online adults who make over $50,000+ are on Twitter.
More women than men: 29% of all online women are on Instagram, vs. only 22% of all men.
Overwhelmingly younger: 53% of all 18-29 year olds are on Instagram.
Less educated: Only 24% of Instagram users are college graduates, while 31% have some college experience – fitting since its audience is largely younger.
Google+ is a mysterious beast. It is ubiquitous, yet doesn’t attract nearly a tenth of the attention as Instagram or Facebook. Some marketers swear by it, while others are busy proclaiming its death.
Younger users: 27% of all 16-24 year olds online are active members of Google+. In contrast, only 18% and 14% of 45-54 and 55-64 year olds are active on Google+ at the moment.
Large non-US user base: Only 55% of Google+ users are American. 18% are Indian and 6% are Brazilian. One reason for this international user base is Android’s popularity outside the US (since Google+ is baked right into Android).
Even income distribution: According to GlobalWebIndex.net, 22% of people in bottom 25% of income earners are on Google+. For the top 25% of income earners, this number is 24%, while for the mid 50% earners, this number is 23%. This means that nearly all levels of income earners are nearly equally represented on Google+.
Pinterest’s visual nature makes it a fantastic marketing tool for B2C businesses. And it’s got the potential to drive a large amount of traffic to your blog if you have a solid strategy.
Here’s what you should know about Pinterest demographics:
Overwhelmingly female: 42% of all online female users are on Pinterest, vs. only 13% of men.
Older audience: 72% of Pinterest’s audience are 30 years or older. Only 34% are between 18 and 29. Significantly, 17% are over 65 years old.
Distinctly suburban: Suburban and rural users form the largest share – 29% and 30% respectively. This is distinctly different from other networks where urban users rule.
Higher income: Given the higher average age, Pinterest users also have higher disposable income, with 64% of all adults making $50,000+ on Pinterest.
The professional networking site LinkedIn attracts an older audience that is largely urban, wealthier, and more educated.
Older: Only 23% of users are between 18-29 years old. 21% are over 65 years, and 31% are between 30 and 49 years of age.
Urban: Very limited number of rural users – only 14%. 61% are either urban or suburban.
Wealthier: 75% of users earn over $50,000.
Highly educated: 50% of LinkedIn users are college graduates. Another 22% have some college experience.
Snapchat is the newest social networks on this list, but also one of the fastest growing. Here’s what you need to know about its demographics:
Dominated by women: 70% of Snapchat’s users are females.
Overwhelmingly young: 71% of users are younger than 25.
Limited income: 62% earn under $50,000 – fitting given the average age of Snapchat’s users.
ere’s what you should take away from all these stats:
If you’re targeting younger users, stick to Instagram, Twitter and Snapchat.
If you’re targeting women with disposable income, head over to Pinterest.
For professionals with better education and income, use LinkedIn.
For everyone, go with Facebook.
The psychology of social media users
Facebook is a ‘closed’ network where your friends list will usually be limited to family, friends and acquaintances you’ve met in real life. Privacy is a big concern for Facebook’s users, and all posts are private by default.
This ultimately affects the way users interact with each other and with businesses on Facebook.
Facebook users are more trusting (since the network is closed).
Facebook users have more close relationships. Pew found that heavy users of the platform are more likely to have a higher number of close relationships.
Facebook users are politically engaged and active.
To understand why people share or follow on Twitter, researchers at Georgia Tech and UMichigan analysed over 500M tweets over 15-months. They found that the three biggest reasons why people share/follow on Twitter are:
Network overlap: Your network is similar to your followers’ network.
User tweet-RT ratio: The number of tweets vs. the number of RTs for a user.
Informational content: The more informative the content, the better.
As per one study, a person’s Pinterest boards represent his/her “ideal self”. That is, it is a representation of everything the user would want to be or have. This is in opposition to Facebook that represents the user’s “real self”.
keep the following in mind:
Instead of marketing yourself on every network, pick the network whose demographics matches your target audience’s.
Positivity always wins – unless you’re deliberately trying to create controversy (not a good option for most non-media businesses).
Rules of content: Informative content on Twitter and LinkedIn, aspirational content on Instagram and Pinterest, fun/positive/uplifting content on Facebook.
A similar strategy was used in 2008, Dewes said, to deanonymise a set of ratings published by Netflix to help computer scientists improve its recommendation algorithm: by comparing “anonymous” ratings of films with public profiles on IMDB, researchers were able to unmask Netflix users – including one woman, a closeted lesbian, who went on to sue Netflix for the privacy violation.
how data is produced, collected and analyzed. make accessible all kind of data and info
ask good q/s and find good answers, share finding in meaningful ways. this is where digital literacy overshadows information literacy and this the fact that SCSU library does not understand; besides teaching students how to find and evaluate data, I also teach them how to communicate effectively using electronic tools.
connecting people tools and resources and making it easier for everybody. building collaborative, open and interdisciplinary
robust data computational literates. developing workshops, project and events to practice new skills. to position the library as the interdisciplinary nexus
what are data: definition. items of information, facts, traces of content and form. higher level, conception discussion about data in terms of social effects: matadata capturing information about the world, social political and economic changes. move away the mystic conceptions about data. nothing objective about data.
the emergence of IoT – digital meets physical. cyber physical systems. smart objects driven by industry. . proliferation of sensor and device – smart devices.
what does privacy looks like ? what is netneutrality when IoT? library must restructure : collaborate across institutions about collections of data in opien and participatory ways. put IoT in the hands of make and break things (she is maker space aficionado)
make and break things hackathons – use cheap devices such as Arduino and Pi.
data literacy programs with higher level conception exploration; libraries empower the campus in data collection. data science norms, store and share data to existing repositories and even catalogs. commercial services to store and connect data, but very restrictive and this is why libraries must be involved.
linked data and dark data
linked data – draw connections around online data most of the data are locked. linked data uses metadata to link related information in ways computers can understand.
libraries take advantage of link data. link data opportunity for semantics, natural language processing etc. if hidden data is relative to our communities, it is a library responsibility to provide it. community data practitioners
dark data
massive data, which cannot be analyzed by relational processing. data not yield significant findings. might be valuable for researchers: one persons trash is another persons’ treasure. preserving data and providing access to info. collaborate with researchers across disciplines and assist decide what is worth keeping and what discarding and how to study.
rich learning experience working with lined and dark data enable fresh perspective and learning how to work with data architecture. data literacy programming.
in context of data is different from open source and open projects. the social side of data science . advising researchers on navigation data, ethical compilations.
open science movement .https://cos.io/ pushing beyond licences and reframe, position ourselves as collaborators
analysis and publishing ; use tools that can be shared and include data, code and executable files.
reproducibility and contestability https://www.lib.ncsu.edu/events/series/summer-of-open-science
In the age of Big Data, there is an abundance of free or cheap data sources available to libraries about their users’ behavior across the many components that make up their web presence. Data from vendors, data from Google Analytics or other third-party tracking software, and data from user testing are all things libraries have access to at little or no cost. However, just like many students can become overloaded when they do not know how to navigate the many information sources available to them, many libraries can become overloaded by the continuous stream of data pouring in from these sources. This session will aim to help librarians understand 1) what sorts of data their library already has (or easily could have) access to about how their users use their various web tools, 2) what that data can and cannot tell them, and 3) how to use the datasets they are collecting in a holistic manner to help them make design decisions. The presentation will feature examples from the presenters’ own experience of incorporating user data in decisions related to design the Bethel University Libraries’ web presence.
silos, IT barrier, focusing on student success, retention, server space is cheap, if
promotion and tenure for faculty can include incentive to work with the librarian
lack of fear, changing the mindset.
deep collaboration both within and cross-consortia
don’t rely on vendor solutions. changing mindset
development = oppty (versus development as “work”)
private higher education is PALNI
3d virtual picture of disastrous areas. unlock the digital information to be digitally accessible to all people who might be interested.
they opened the maps of Katmandu for the local community and they were coming up with the strategies to recover. democracy in action
i can’t stop thinking that the keynote speaker efforts are mere follow up of what Naomi Klein explains in her Shock Doctrine: http://www.naomiklein.org/shock-doctrine: a government country seeks reasons to destroy another country or area and then NGOs from the same country go to remedy the disasters
A question from a librarian from the U about the use of drones. My note: why did the SCSU library have to give up its drone?
Douglas County Library model. too resource intensive to continue
Marmot Library Network
ILS integrated library system – shared with other counties, same sever for the entire consortium. they have a programmer, viewfind, open source, discovery player, he customized viewfind community to viewfind plus. instead of using the ILS public access catalogue, they are using the Vufind interface
Caiifa Enki. public library – single access collection. they purchase ebooks from the publisher and they are using also the viewfind interface. but not integrated with the library catalogs. Kansas public library went from OverDrive to Viewfind. CA State library is funding for the time being this effort.
types of content – publisher will not understand issue, which clear for librarians
PDF and epub formats
purchase content –
title by title selection – academia is tired of selections. although it is intended to buy also collections
library – owned ( and shared collections)
host content from libraries – papers in academic lib, genealogy in pub lib.
options in license models .
e resource content. not only ebooks, after it is taken care of, add other types of digital objects.
instead of replicate, replacement of the commercial aggregators,
Amigos Shelf interface is the product of the presenter
instead of having a young reader collection as SCSU has on the third floor, an academic library is outsourcing through AMigos shelf ebooks for young readers
Harper Collins is too cumbersome and the reason to avoid working with them.
security issues. some of the material sent over ftp and immediately moved to sftp
decisions – use of internal resources only, if now – amazon
programmer used for the pilot. contracted programmers. lack of the ability to see the large picture. eventually hired a full time person, instead of outsourcing. RDA compliant MARC.
ONIX, spreadsheet MARC.
Decision about who to start with : public or academic.
attempt to keep pricing down –
own agreement with the customers, separate from the agreement with the Publisher
current development: web-based online reading, shared-consortial collections and SIP2 authentication
why you might want to clean up some (or all) of the social media trail you’ve left behind you in one go. Here are the tools you need to do it on Facebook and Twitter.
Another browser extension, this time for Firefox. Get Greasemonkey installed, and you can then install Facebook Timeline Cleaner—it’s not the most sophisticated tool in the world, but it gets the job done.
Facebook Timeline Cleaner with Chrome then Tampermonkey
So much for that bipartisan Senate bid to prevent the FBI from gaining expanded hacking powers. Senators Ron Wyden, Chris Coons and Steve Daines have failed to block changes to the US’ criminal procedure rules (specifically, Rule 41) that would let the FBI hack computers in any jurisdiction provided they have a search warrant. Texas Senator John Cornyn and other Republican leaders thwarted the measure. The rule change should take effect on December 1st, barring surprises.