Purpose: The purpose of this feasibility pilot project was to observe Alzheimer ' s disease (AD) and mild cognitive impairment (MCI) patients ' responses to personalized multimedia biographies (MBs). We developed a procedure for using digital video technology to construct DVD-based MBs of persons with AD or MCI, documented their responses to observing their MBs, and evaluated the psychosocial benefi ts. Methods: An interdisciplinary team consisting of multimedia biographers and social workers interviewed 12 family members of persons with AD and MCI and collected archival materials to best capture the families ' and patients ' life histories. We fi lmed patients ' responses to watching the MBs and conducted follow-up interviews with the families and patients at 3 and 6 months following the initial viewing. Qualitative analytic strategies were used for extracting themes and key issues identifi ed in both the fi lmed and the interview response data. Results: Analysis of the interview and video data showed how evoked long-term memories stimulated reminiscing, brought mostly joy but occasionally moments of sadness to the persons with cognitive impairments, aided family members in remembering and better understanding their loved ones, and stimulated social interactions with family members and with formal caregivers. Implication: This study demonstrates the feasibility of using readily available digital video technology to produce MBs that hold special meaning for individuals experiencing AD or MCI and their families.
Products used for managing network traffic and restricting access to Web content represent a dual-use technology. While they were designed to improve performance and protect users from inappropriate content, these products are also used to censor the Web by authoritarian regimes around the globe. This dual use has not gone unnoticed, with Western governments placing restrictions on their export.Our contribution is to present methods for identifying installations of URL filtering products and confirming their use for censorship. We first present a methodology for identifying externally visible installations of URL filtering products in ISPs around the globe. Further, we leverage the fact that many of these products accept user-submitted sites for blocking to confirm that a specific URL filtering product is being used for censorship. Using this method, we are able to confirm the use of McAfee SmartFilter in Saudi Arabia and the United Arab Emirates (UAE) and Netsweeper in Qatar, the UAE, and Yemen. Our results show that these products are being used to block a range of content, including oppositional political speech, religious discussion and gay and lesbian material, speech generally protected by international human rights norms.
While the rhetoric of cyber war is often exaggerated, there have been recent cases of international conflict in which cyberspace has played a prominent role. In this article, we analyze the impact of cyberspace in the conflict between Russia and Georgia over the disputed territory of South Ossetia in August 2008. We examine the role of strategic communications, information operations, operations in and through cyberspace, and conventional combat to account for the political and military outcomes of the conflict. The August 2008 conflict reveals some emergent issues in cyber warfare that can be generalized for further comparative research: the importance of control over the physical infrastructure of cyberspace, the strategic and tactical importance of information denial, the emergence of cyber-privateering, the unavoidable internationalization of cyber conflicts, and the tendency towards magnifying unanticipated outcomes in cyber conflicts – a phenomenon we call ‘cyclones in cyberspace’.
In this study, we take another look at 5 years of web censorship data gathered by the OpenNet Initiative in 77 countries using user-based testing with locally relevant content. Prior to our work, this data had been analyzed with little automation, focusing on what content had been blocked, rather than how blocking was carried out. In this study, we use more rigorous automation to obtain a longitudinal, global view of the technical means used for web censorship. We also identify blocking that had been missed in prior analyses. Our results point to considerable variability in the technologies used for web censorship, across countries, time, and types of content, and even across ISPs in the same country. In addition to characterizing web censorship in countries that, thus far, have eluded technical analysis, we also discuss the implications of our observations on the design of future network measurement platforms and circumvention technologies.
In this paper, we present an analysis of over one year and a half of data from tracking the censorship and surveillance keyword lists of two instant messaging programs used in China. Through reverse engineering of TOM-Skype and Sina UC, we were able to obtain the URLs and encryption keys for various versions of these two programs and have been downloading the keyword blacklists daily. This paper examines the social and political contexts behind the contents of these lists, and analyzes those times when the list has been updated, including correlations with current events.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.