Learn More
The aim of this research is to investigate the role of social networks in computer science education. The Internet shows great potential for enhancing collaboration between people and the role of social software has become increasingly relevant in recent years. This research focuses on analyzing the role that social networks play in students' learning(More)
Most Semantic Web data visualization tools structure the representation according to the concept definitions and interrelations that constitute the ontology's vocabulary. Instances are often treated as somewhat peripheral information, when considered at all. These instances, that populate ontologies, represent an essential part of any knowledge base, and(More)
The aim of this research was to understand what affects people's privacy preferences in smartphone apps. We ran a four-week study in the wild with 34 participants. Participants were asked to answer questions, which were used to gather their personal context and to measure their privacy preferences by varying app name and purpose of data collection. Our(More)
Smartphones are being used for a wide range of activities including messaging, social networking, calendar and contact management as well as location and context-aware applications. The ubiquity of handheld computing technology has been found to be especially useful in disaster management and relief operations. Our focus is to enable developers to quickly(More)
—Social apps usually require a lot of personal information in order to be tailored to the needs of individual users. However, the inherent social exchange of data exposes a user's personal data to other app users or publicly for anyone to see. In this paper, we present an app that enables users to determine the optimal location and time to meet without(More)
This paper investigates how Wikibooks authors collaborate to create high-quality books. We combined Information Retrieval and statistical techniques to examine the complete multi-year lifecycle of over 50 high-quality Wikibooks. We found that: 1. The presence of redundant material is negatively correlated with collaboration mechanisms; 2. For most books,(More)
—Social networking sites provide role-or group-based access controls to help users specify their privacy settings. However, information posted on these sites is often intentionally or unintentionally leaked and has caused harm or distress to users. In this paper, we investigate possible improvements to existing implementations by introducing content-based(More)