Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
285,151
result(s) for
"Personal information"
Sort by:
Privacy
\"Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising and cellular location data. Important questions are raised such as: How much information will we be allowed to keep private through the use of encryption on our computational devices? What rights do we have to secure and personalized channels of communication, and how should those be balanced by the state's interests in maintaining order and degrading the capacity of criminals and rival state actors to organize through data channels? What new regimes may be required for states to conduct digital searches, and how does encryption act as counter-surveillance? How have key debates relied on racialized social constructions in their discourse? What transformations in journalistic media and practices have occurred with the development of encryption tools? How are the digital footprints of consumers tracked and targeted? Scholars and students from many backgrounds, as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to questions of privacy and encryption encompassing research from Communication, Sociology, Critical Data Studies, and Advertising and Public Relations\"-- Provided by publisher.
Gender Differentials on Information Sharing and Privacy Concerns on Social Networking Sites: Perspectives From Users
by
Almuqrin, Abdullah
,
Mutambik, Ibrahim
,
Qintash, Fatmah Hussain
in
Academic staff
,
Data collection
,
Gender
2021
This paper undertakes to explore the perceptions of academics regarding information sharing on social network sites (SNS) and related privacy issues. Specifically, the paper was designed targeting academics using SNS to disseminate information and/or for other academic purposes. The paper is based on a mixed method research, the exploratory stage consequential for the confirmatory stage of the research. The findings of the research highly the complex relationships between personal information collection and usage (PICU) factors, personal information control (PIC) factors, and awareness of the effectiveness of privacy policy (AEPP) factors. This culminates in the formulation of a research model based on the theory of reasoned action. Given that the research took place within a context where gender is significant in shaping the worldview of the individual, groups, and society, the paper also seeks to contribute to the existing gender-based narrative on information sharing and privacy issues on SNS, mainly demystifying gender-based stereotypes.
Journal Article
Outlook 2019 for dummies
Of the millions of people who use Outlook, most only use about two percent of its features. Don't stay in the dark! Outlook 2019 For Dummies shows you how to take advantage of often-overlooked tips and tricks to make it work even better for you. Inside, you'll find information on navigating the user interface; utilizing the To-Do bar; filtering junk email; smart scheduling; RSS support; using electronic business cards; accessing data with two-way sync and offline and cloud based access, and much more!
Social aspects of personal information organization
2021
PurposeThe purpose of this paper is to examine how individuals' personal information organization reflects their social environments in order to understand social aspects of personal information organization.Design/methodology/approachBy using a cognitive sociological approach and based on the personal information organization process (PIOP) model (Oh, 2019), this study investigates the social aspects of personal information organization by analyzing the pre-diary interview, a diary, and two post-diary interviews conducted with each of the 18 information users in social science academic environments.FindingsSocial dimensions of personal information organization were found in differences between organizing academic and non-academic files, the way participants identified and made distinctions among files, common folders they created, and with the impact of participants' professional age on personal information organization. This study shows that information organization is a process of construction and that the participants' social foundations are reflected in the way they view and organize their files.Originality/valueThis study makes a unique contribution to the field by explaining the social aspects of personal information organization. The findings of this study deepen our knowledge of personal information organization by providing different ways to understand how and why people organize their files in certain ways, and by showing that this is not just individual behavior. In practice, this study provides insight into the design of applications and tools that support personal information management of people in specific social environments.
Journal Article
Trafficking data : how China is winning the battle for digital sovereignty
\"Trafficking Data argues that the movement of human data across borders for political and financial gain is disenfranchising consumers, eroding national autonomy, and destabilizing sovereignty. Focusing on the United States and China, it traces how US government leadership failures, Silicon Valley's disruption fetish, and Wall Street's addiction to growth have yielded an unprecedented opportunity for Chinese firms to gather data in the United States and quietly send it back to China, and by extension, the Chinese government. Such \"data trafficking,\" as the book names this insidious phenomenon, is enabled by the competing governance models of the world's two largest economies: mass government data aggregation in China and impenetrable corporate data management policies in the United States. China is stepping up its data trafficking efforts through national regulations, soft power persuasion, and tech investment, extending the scope of state control over domestic and international data and tech infrastructure, and thereby expanding its global influence. The United States, by contrast, is retreating from participation in foreign alliances, international organizations, and the systemic regulation of the tech industry-practices with the potential to counter data trafficking. Confronting data trafficking as the defining international competition of the twenty-first century, this book ultimately advocates for an alternative future of data stabilization. To stem data trafficking and stabilize data flows, it shows, policymakers can synthesize tools from across the private sector, public sector, multi-national organizations, and consumers to protect users, secure national sovereignty, and establish valuable international standards\"-- Provided by publisher.
Organizing personal digital information: an analysis of faculty member activities
2021
PurposeThe objective of this paper is to document and analyze the organizational activities of faculty members using a personal information management (PIM) framework developed by Jacques (2016).Design/methodology/approachInterviews were carried out with seven faculty members, focusing on their personal information organization practices as they relate to their academic activities. These interviews took the form of a guided tour of informants' digital workspaces.FindingsAnalyses focused on PIM activities make it possible to identify the different strategies adopted by faculty members to organize their academic personal information. This qualitative approach highlights four activities involved in the organization of personal information: inclusion, exclusion, apprehension and implementation. It also reveals differences in the ability of faculty members to analyze their own practices. Finally, the relationship to time and memory of PIM practices is examined through the lens of the concepts of virtualization and actualization.Originality/valueThis research provides a more nuanced understanding of PIM practices, specifically of organizational activities, by considering the meaning of these practices for individuals as part of their daily lives. It aims to foster literacy by facilitating the interactions of individuals with their personal information through educational activities.
Journal Article
Protecting your privacy in a data-driven world
\"At what point does the sacrifice to our personal information outweigh the public good? If public policymakers had access to our personal and confidential data, they could make more evidence-based, data-informed decisions that could accelerate economic recovery and improve COVID-19 vaccine distribution. However, access to personal data comes at a steep privacy cost for contributors, especially underrepresented groups. Protecting Your Privacy in a Data-Driven World is a practical, nontechnical guide that explains the importance of balancing these competing needs and calls for careful consideration of how data are collected and disseminated by our government and the private sector. Not addressing these concerns can harm the same communities policymakers are trying to protect through data privacy and confidentiality legislation. Claire McKay Bowen is the Lead Data Scientist for Privacy and Data Security at the Urban Institute. Her research focuses on assessing the quality of differentially private data synthesis methods and science communication. In 2021, the Committee of Presidents of Statistical Societies identified her as an emerging leader in statistics for her technical contributions and leadership to statistics and the field of data privacy and confidentiality\"-- Provided by publisher.
Mood and personal information management: how we feel influences how we organize our information
2020
Two studies explore whether people’s digital filing behaviors are affected by emotional factors when engaging in personal information management (PIM). Cognitive science research shows that people’s information categorization behaviors are mood-dependent, so that positive moods induce larger, more inclusive organizational categories, whereas negative moods elicit more fine-grained organization. However, such mood-dependent organization has not been directly studied in the context of PIM. Our first, naturalistic study examines relations between people’s overall filing habits and a personality trait, neuroticism, which is commonly associated with negative mood. Our results reveal the expected mood-dependency effects; participants who report more prevalent negative mood patterns when surveyed, also create different organizational structures. Overall, they make more folders that contain fewer files and store these in deeper folder structures. The second, experimental study directly manipulated mood and examined how this affects organization of a controlled file collection. Again as predicted, participants experiencing negative moods created significantly more folders containing fewer files, and there was a trending effect of negative mood on folder depth. We discuss theoretical and practical implications for PIM arising from these novel results.
Journal Article
OneNote 2013 for dummies
OneNote lets you organize, access, and share notes on multiple devices. This guide shows you how to take full advantage of everything it offers-- text recognition, the ability to include data from other Office apps, and more!
The things we carry: migrants' personal collection management and use
by
Krtalic, Maja
,
Ihejirika, Kingsley T.
in
Acculturation
,
Archives & records
,
Behavioral Science Research
2023
PurposeThis paper explores personal collection management and use in the context of migration. The paper further investigates how migrants use items in personal collections to reflect their self-identity and learn about their heritage.Design/methodology/approachInterviews were used to collect data from 14 immigrants in New Zealand.FindingsFindings show how migrants perceive the value of their personal collections, manage their personal collections during migration and use their personal collections as instruments of identity formation, self-awareness, and connections to cultural heritage.Originality/valueInsights presented in this study increase an understanding of the critical role personal information plays in the migration and integration process.
Journal Article