articles+ search results
20 articles+ results
1 - 20
Number of results to display per page
-
Algawiaz, Danah, Dobbie, Gillian, and Alam, Shafiq
- 2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE) Intelligent Systems and Knowledge Engineering (ISKE), 2019 IEEE 14th International Conference on. :324-328 Nov, 2019
- Full text View on content provider's site
-
Mizuko Ito, Sonja Baumer, Matteo Bittanti, danah boyd, Rachel Cody, Becky Herr Stephenson, Heather A. Horst, Patricia G. Lange, Dilan Mahendran, Katynka Z. Martínez, C. J. Pascoe, Dan Perkel, Laura Robinson, Christo Sims, Lisa Tripp, Judd Antin, Megan Finn, Arthur Law, Annie Manion, Sarai Mitnick, David Schlossberg, Sarita Yardi, Heather A. Horst, Mizuko Ito, Heather A. Horst, Mizuko Ito, Sonja Baumer, Matteo Bittanti, danah boyd, Rachel Cody, Becky Herr Stephenson, Heather A. Horst, Patricia G. Lange, Dilan Mahendran, Katynka Z. Martínez, C. J. Pascoe, Dan Perkel, Laura Robinson, Christo Sims, Lisa Tripp, Judd Antin, Megan Finn, Arthur Law, Annie Manion, Sarai Mitnick, David Schlossberg, Sarita Yardi, Heather A. Horst, Mizuko Ito, and Heather A. Horst
- Full text View on content provider's site
-
Makhalfih, Asaad, Braik, Amer, Barakat, Danah, and Kahtib, Tamer
- 2017 14th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT (HONET-ICT) Smart Cities: Improving Quality of Life Using ICT & IoT (HONET-ICT), 2017 14th International Conference on. :40-44 Oct, 2017
- Full text View on content provider's site
4. Questioning the legitimacy of data. [2020]
-
boyd, danah and Lawlor, Bonnie
Information Services & Use . 2020, Vol. 40 Issue 3, p259-272. 14p.
- Subjects
-
Acquisition of data and Data quality
- Abstract
-
This paper is based upon the closing keynote presentation that was given by danah boyd at the inaugural NISO Plus conference held from February 23–25, 2020 in Baltimore, MD (USA). It focuses on how data are used, and how they can be manipulated to meet specific objectives – both good and bad. The paper reinforces the importance of understanding the biases and limitations of any data set. Topics covered include data quality, data voids, data infrastructures, alternative facts, and agnotology. The paper stresses that data become legitimate because we collectively believe that those data are sound, valid, and fit for use. This not only means that there is power in collecting and disseminating data, but also that there is power in interpreting and manipulating the data. The struggle over data's legitimacy says more about our society – and our values – than it says about the data itself. [ABSTRACT FROM AUTHOR]
-
KORCHMAROS, Josephine D, YBARRA, Michele L, LANGHINRICHSEN-ROHLING, Jennifer, BOYD, Danah, and LENHART, Amanda
- Cyberpsychology, behavior and social networking (Print). 16(8):561-567
- Subjects
-
Homme, Human, Hombre, Interaction sociale, Social interaction, Interacción social, Adolescent, Adolescente, Communication médiatisée ordinateur, Computer mediated communication, Communicación mediatizada computador, Comportement rendez vous, Dating behavior, Conducta cita, Messagerie instantanée, Instant messaging, Mensajería instantánea, Trouble du comportement social, Social behavior disorder, Trastorno comportamiento social, Violence, Violencia, Sciences exactes et technologie, Exact sciences and technology, Sciences appliquees, Applied sciences, Informatique, automatique theorique, systemes, Computer science, control theory, systems, Logiciel, Software, Systèmes informatiques et systèmes répartis. Interface utilisateur, Computer systems and distributed systems. User interface, Sciences biologiques et medicales, Biological and medical sciences, Sciences medicales, Medical sciences, Psychopathologie. Psychiatrie, Psychopathology. Psychiatry, Etude clinique de l'adulte et de l'adolescent, Adult and adolescent clinical studies, Troubles du comportement social. Comportement criminel. Délinquance, Social behavior disorders. Criminal behavior. Delinquency, Psychologie. Psychanalyse. Psychiatrie, Psychology. Psychoanalysis. Psychiatry, PSYCHOPATHOLOGIE. PSYCHIATRIE, Psychology, psychopathology, psychiatry, and Psychologie, psychopathologie, psychiatrie
- Abstract
-
Teen dating violence (TDV) is a serious form of youth violence that youth fairly commonly experience. Although youth extensively use computer-mediated communication (CMC), the epidemiology of CMC-based TDV is largely unknown. This study examined how perpetration of psychological TDV using CMC compares and relates to perpetration using longer-standing modes of communication (LSMC; e.g., face-to-face). Data from the national Growing up with Media study involving adolescents aged 14―19 collected from October 2010 to February 2011 and analyzed May 2012 are reported. Analyses focused on adolescents with a history of dating (n = 615). Forty-six percent of youth daters had perpetrated psychological TDV. Of those who perpetrated in the past 12 months, 58% used only LSMC, 17% used only CMC, and 24% used both. Use of both CMC and LSMC was more likely among perpetrators who used CMC than among perpetrators who used LSMC. In addition, communication mode and type of psychological TDV behavior were separately related to frequency of perpetration. Finally, history of sexual intercourse was the only characteristic that discriminated between youth who perpetrated using different communication modes. Results suggest that perpetration of psychological TDV using CMC is prevalent and is an extension of perpetration using LSMC. Prevention should focus on preventing perpetration of LSMC-based TDV as doing so would prevent LSMC as well as CMC-based TDV.
- Full text View on content provider's site
-
THAKOR, Mitali, BOYD, Danah, SNAJDR, Edward, and MARCUS, Anthony
- Anti-Anti-Trafficking? Toward Critical Ethnographies of Human TraffickingDialectical anthropology. 37(2):277-290
- Subjects
-
Activisme, Activism, Féminisme, Feminism, Internet, Mouvement, Movement, Notes de terrain, Fieldnotes, Prostitution, Réseau, Network, Trafic, Traffic, Tráfico, Feminist STS, Internet studies, Network studies, Sex trafficking, Ethnologie, Ethnology, Structure et relations sociales, Social structure and social relations, Relations sociales. Relation interculturelles et interethniques. Identité collective, Social relations. Intercultural and interethnic relations. Collective identity, Amérique, America, Cognition, Social anthropology and ethnology, and Anthropologie sociale et ethnologie
- Abstract
-
In this essay, we offer field notes from our ongoing ethnographic research on sex trafficking in the United States. Recent efforts to regulate websites such as Craigslist and Backpage have illuminated activist concerns regarding the role of networked technologies in the trafficking of persons and images for the purposes of sexual exploitation. We frame our understanding of trafficking and technology through a network studies approach, by describing anti-trafficking as a counter-network to the sex trafficking it seeks to address. Drawing from the work of Annelise Riles and other scholars of feminist science and technology studies, we read the anti-trafficking network through the production of expert knowledge and the crafting of anti-trafficking techniques. By exploring anti-trafficking activists' understandings of technology, we situate the activities of anti-trafficking experts and law enforcement as efforts toward network stabilization.
- Full text View on content provider's site
-
LINGEL, Jessa and BOYD, Danah
- Journal of the American Society for Information Science and Technology (Print). 64(5):981-991
- Subjects
-
Sciences exactes et technologie, Exact sciences and technology, Sciences et techniques communes, Sciences and techniques of general use, Sciences de l'information. Documentation, Information science. Documentation, Sciences de l'information et des bibliothèques. Etude d'ensemble, Library and information science. General aspects, Bibliométrie. Scientométrie. Evaluation, Bibliometrics. Scientometrics. Evaluation, Sciences de l'information et de la communication, Information and communication sciences, Bibliométrie. Scientométrie, Bibliometrics. Scientometrics, Cognition, Documentation, Computer science, and Informatique
- Abstract
-
When information practices are understood to be shaped by social context, privilege and marginalization alternately affect not only access to, but also use of information resources. In the context of information, privilege, and community, politics of marginalization drive stigmatized groups to develop collective norms for locating, sharing, and hiding information. In this paper, we investigate the information practices of a subcultural community whose activities are both stigmatized and of uncertain legal status: the extreme body modification community. We use the construct of information poverty to analyze the experiences of 18 people who had obtained, were interested in obtaining, or had performed extreme body modification procedures. With a holistic understanding of how members of this community use information, we complicate information poverty by working through concepts of stigma and community norms. Our research contributes to human information behavior scholarship on marginalized groups and to Internet studies research on how communities negotiate collective norms of information sharing online.
- Full text
View/download PDF
-
YBARRA, Michele L, BOYD, Danah, KORCHMAROS, Josephine D, and OPPENHEIM, Jay
- Journal of adolescent health. 51(1):53-58
- Subjects
-
Homme, Human, Hombre, Adolescent, Adolescente, Harcèlement moral, Psychological harassment, Acoso moral, Internet, Intimidation, Bullying, intimidación, Méthode mesure, Measurement method, Método medida, Méthodologie, Methodology, Metodología, Technologie information communication, Information communication technology, Nueva tecnología información comunicación, Victimisation, Victimization, Victimización, Cyberbullying, Measurement, Sciences biologiques et medicales, Biological and medical sciences, Sciences medicales, Medical sciences, Psychopathologie. Psychiatrie, Psychopathology. Psychiatry, Techniques et méthodes, Techniques and methods, Méthodologie. Expérimentation, Methodology. Experimentation, Psychologie. Psychanalyse. Psychiatrie, Psychology. Psychoanalysis. Psychiatry, PSYCHOPATHOLOGIE. PSYCHIATRIE, Pediatrics, Pédiatrie, Psychology, psychopathology, psychiatry, and Psychologie, psychopathologie, psychiatrie
- Abstract
-
Purpose: To inform the scientific debate about bullying, including cyberbullying, measurement. Methods: Two split-form surveys were conducted online among 6―17-year-olds (n = 1,200 each) to inform recommendations for cyberbullying measurement. Results: Measures that use the word bully result in prevalence rates similar to each other, irrespective of whether a definition is included, whereas measures not using the word bully are similar to each other, irrespective of whether a definition is included. A behavioral list of bullying experiences without either a definition or the word bully results in higher prevalence rates and likely measures experiences that are beyond the definition of bullying. Follow-up questions querying differential power, repetition, and bullying over time were used to examine misclassification. The measure using a definition but not the word bully appeared to have the highest rate of false positives and, therefore, the highest rate of misclassification. Across two studies, an average of 25% reported being bullied at least monthly in person compared with an average of 10% bullied online, 7% via telephone (cell or landline), and 8% via text messaging. Conclusions: Measures of bullying among English-speaking individuals in the United States should include the word bully when possible. The definition may be a useful tool for researchers, but results suggest that it does not necessarily yield a more rigorous measure of bullying victimization. Directly measuring aspects of bullying (i.e., differential power, repetition, over time) reduces misclassification. To prevent double counting across domains, we suggest the following distinctions: mode (e.g., online, in-person), type (e.g., verbal, relational), and environment (e.g., school, home). We conceptualize cyberbullying as bullying communicated through the online mode.
- Full text View on content provider's site
-
BOYD, Danah
- Documentaliste (Paris). 47(1):48-49
- Subjects
-
Réseau social, Social network, Red social, Vie privée, Private life, Vida privada, Vie publique, Sciences exactes et technologie, Exact sciences and technology, Sciences et techniques communes, Sciences and techniques of general use, Sciences de l'information. Documentation, Information science. Documentation, Technologie de la communication et de l'information, Information and communication technologies, Technologies de l'information: supports, équipements, Information technologies: storage media, equipment, Applications (par exemple: numérisation,...), Applications (e.g. Digitizing,...), Ressources internet (portails, blogs, wikis,...), Internet resources (portals, blogs, wikis,...), Sciences de l'information et de la communication, Information and communication sciences, Applications, Ressources internet (portails, blogs, wikis,…), Internet resources (portals, blogs, wikis,…), Sciences de l'information communication, and Documentation
- Abstract
-
[ point de vue ] Les nouveaux médias numériques ontsensiblementmodifiél'acceptiontraditionnelledes concepts de vie privée et de vie publique. Née du développement des réseaux sociaux, cette rupture a généré de nouvelles « sphères publiques médiatées » au sein desquelles se déploie désormais une part de notre vie quotidienne. Une évolution de l'espace public qui appelle un accompagnement des jeunes, particulièrement présents et investis dans ces réseaux numériques.
- Full text View on content provider's site
-
Kálmán, Tibor, Tonne, Danah, and Schmitt, Oliver
New Review of Information Networking . May-Nov2015, Vol. 20 Issue 1/2, p123-136. 14p. 2 Color Photographs, 1 Chart.
- Subjects
-
Digital preservation, Digitization of archival materials, Digital libraries in the humanities, Arts advocacy, Arts in literature, and Standards
- Abstract
-
DARIAH (Digital Research Infrastructure for the Arts and Humanities) aims to support digitally-enabled research across the arts and humanities. The activities and service portfolios are centered around communities to enable transnational, interdisciplinary research. One of the most important goals of DARIAH is the sustainable research data management. Although widely-acknowledged standards and best practices are utilized for essential long-term storage components, offering an interoperable technological solution is challenging due to the heterogeneity of the tools and data. In this article, we analyze these problems, discuss a general concept for long-term storage in DARIAH, and present two implementations of the corresponding preservation services. [ABSTRACT FROM AUTHOR]
- Full text
View/download PDF
12. CRITICAL QUESTIONS FOR BIG DATA. [2012]
-
boyd, danah and Crawford, Kate
Information, Communication & Society . Jun2012, Vol. 15 Issue 5, p662-679. 18p.
- Subjects
-
Digital communications, Digital technology, Social scientists, Behavioral scientists, and Economists
- Abstract
-
The era of Big Data has begun. Computer scientists, physicists, economists, mathematicians, political scientists, bio-informaticists, sociologists, and other scholars are clamoring for access to the massive quantities of information produced by and about people, things, and their interactions. Diverse groups argue about the potential benefits and costs of analyzing genetic sequences, social media interactions, health records, phone logs, government records, and other digital traces left by people. Significant questions emerge. Will large-scale search data help us create better tools, services, and public goods? Or will it usher in a new wave of privacy incursions and invasive marketing? Will data analytics help us understand online communities and political movements? Or will it be used to track protesters and suppress speech? Will it transform how we study human communication and culture, or narrow the palette of research options and alter what ‘research’ means? Given the rise of Big Data as a socio-technical phenomenon, we argue that it is necessary to critically interrogate its assumptions and biases. In this article, we offer six provocations to spark conversations about the issues of Big Data: a cultural, technological, and scholarly phenomenon that rests on the interplay of technology, analysis, and mythology that provokes extensive utopian and dystopian rhetoric. [ABSTRACT FROM AUTHOR]
- Full text View on content provider's site
-
Boyd, Danah, Hargittai, Eszter, Schultz, Jason, and Palfrey, John
First Monday . Nov2011, Vol. 16 Issue 11, Special section p1-22. 22p.
- Subjects
-
Privacy, Right of privacy, Online social networks, and Internet & children
- Abstract
-
Facebook, like many communication services and social media sites, uses its Terms of Service (ToS) to forbid children under the age of 13 from creating an account. Such prohibitions are not uncommon in response to the Children's Online Privacy Protection Act (COPPA), which seeks to empower parents by requiring commercial Web site operators to obtain parental consent before collecting data from children under 13. Given economic costs, social concerns, and technical issues, most general-purpose sites opt to restrict underage access through their ToS. Yet in spite of such restrictions, research suggests that millions of underage users circumvent this rule and sign up for accounts on Facebook. Given strong evidence of parental concern about children's online activity, this raises questions of whether or not parents understand ToS restrictions for children, how they view children's practices of circumventing age restrictions, and how they feel about children's access being regulated. In this paper, we provide survey data that show that many parents know that their underage children are on Facebook in violation of the site's restrictions and that they are often complicit in helping their children join the site. Our data suggest that, by creating a context in which companies choose to restrict access to children, COPPA inadvertently undermines parents' ability to make choices and protect their children's data. Our data have significant implications for policy-makers, particularly in light of ongoing discussions surrounding COPPA and other age-based privacy laws. [ABSTRACT FROM AUTHOR]
14. Facebook privacy settings: Who cares? [2010]
-
Boyd, Danah and Hargittai, Eszter
First Monday . Aug2010, Vol. 15 Issue 8, p1-1. 1p.
- Subjects
-
Privacy, Young adults, Gender differences (Psychology), and Online social networks research
- Abstract
-
With over 500 million users, the decisions that Facebook makes about its privacy settings have the potential to influence many people. While its changes in this domain have often prompted privacy advocates and news media to critique the company, Facebook has continued to attract more users to its service. This raises a question about whether or not Facebook’s changes in privacy approaches matter and, if so, to whom. This paper examines the attitudes and practices of a cohort of 18- and 19-year-olds surveyed in 2009 and again in 2010 about Facebook’s privacy settings. Our results challenge widespread assumptions that youth do not care about and are not engaged with navigating privacy. We find that, while not universal, modifications to privacy settings have increased during a year in which Facebook’s approach to privacy was hotly contested. We also find that both frequency and type of Facebook use as well as Internet skill are correlated with making modifications to privacy settings. In contrast, we observe few gender differences in how young adults approach their Facebook privacy settings, which is notable given that gender differences exist in so many other domains online. We discuss the possible reasons for our findings and their implications. [ABSTRACT FROM AUTHOR]
-
boyd, danah and boyd, danah
- Full text View on content provider's site
17. Detecting spam in a Twitter network. [2010]
-
Yardi, Sarita, Romero, Daniel M., Schoenebeck, Grant, and Boyd, Danah
First Monday . Jan2010, Vol. 15 Issue 1, p1-1. 1p.
- Subjects
-
Spam email, Microblogs, Internet, and Online social networks
- Abstract
-
Spam becomes a problem as soon as an online communication medium becomes popular. Twitter’s behavioral and structural properties make it a fertile breeding ground for spammers to proliferate. In this article we examine spam around a one-time Twitter meme — "robotpickuplines". We show the existence of structural network differences between spam accounts and legitimate users. We conclude by highlighting challenges in disambiguating spammers from legitimate users. [ABSTRACT FROM AUTHOR]
-
Boyd, Danah
First Monday . Dec2006, Issue 12, p1-1. 1p.
- Subjects
-
Friendship, Social groups, Social networks, Social conflict, and Social control
- Abstract
-
‘Are you my friend? Yes or no?’ This question, while fundamentally odd, is a key component of social network sites. Participants must select who on the system they deem to be ‘Friends.’ Their choice is publicly displayed for all to see and becomes the backbone for networked participation. By examining what different participants groups do on social network sites, this paper investigates what Friendship means and how Friendship affects the culture of the sites. I will argue that Friendship helps people write community into being in social network sites. Through these imagined egocentric communities, participants are able to express who they are and locate themselves culturally. In turn, this provides individuals with a contextual frame through which they can properly socialize with other participants. Friending is deeply affected by both social processes and technological affordances. I will argue that the established Friending norms evolved out of a need to resolve the social tensions that emerged due to technological limitations. At the same time, I will argue that Friending supports pre-existing social norms yet because the architecture of social network sites is fundamentally different than the architecture of unmediated social spaces, these sites introduce an environment that is quite unlike that with which we are accustomed. [ABSTRACT FROM AUTHOR]
-
boyd, danah
SIGIR Forum . 2009 Proceedings, p862-862. 1/6p.
- Subjects
-
Conferences & conventions and Online social networks
- Abstract
-
The article offers information on the talk of Denah Boyd of Microsoft Research about networked technologies.
- Full text View on content provider's site
Catalog
Books, media, physical & digital resources
Guides
Course- and topic-based guides to collections, tools, and services.