Nội dung được dịch bởi AI, chỉ mang tính chất tham khảo
Hướng tới việc khám phá email cá nhân đã được lưu trữ với nhận thức về quyền riêng tư
Tóm tắt
Bài báo này xem xét cách các biện pháp quyền riêng tư, chẳng hạn như việc ẩn danh và quy trình tổng hợp cho các bộ sưu tập email, có thể ảnh hưởng đến sự hữu ích được cảm nhận của các hình ảnh hóa email trong nghiên cứu, đặc biệt là trong các ngành nhân văn và khoa học xã hội. Công việc này nhằm mục đích cung cấp thông tin cho các nhà lưu trữ và quản lý dữ liệu phải đối mặt với thách thức trong việc tiếp nhận và xem xét các bộ sưu tập kỹ thuật số cá nhân ngày càng lớn và phức tạp. Nghiên cứu trong bài báo này cung cấp một nghiên cứu người dùng tập trung để điều tra sự hữu ích của hình ảnh hóa dữ liệu như một cầu nối giữa việc quản lý dữ liệu có nhận thức về quyền riêng tư và việc tối đa hóa giá trị nghiên cứu của dữ liệu. Nghiên cứu được thực hiện với các nhà nghiên cứu và nhà lưu trữ có mối quan tâm trong việc sử dụng, hiểu và/hoặc lưu trữ dữ liệu để đạt được kết quả có ý nghĩa. Các tham gia có xu hướng cảm nhận rằng hình ảnh hóa email là hữu ích, với mức đánh giá trung bình là 4.281 (trên thang điểm 7) cho tất cả các hình ảnh hóa trong nghiên cứu, với mức đánh giá trên trung bình cho biểu đồ miền và cây từ. Nghiên cứu cho thấy trong khi các tham gia bày tỏ mong muốn mạnh mẽ về thông tin xác định cá nhân trong dữ liệu email, họ cảm nhận rằng hình ảnh hóa cũng hữu ích gần như tương đương cho nghiên cứu và/hoặc công việc của họ khi áp dụng quy trình tổng hợp bên cạnh việc ẩn danh.
Từ khóa
#quyền riêng tư #ẩn danh #hình ảnh hóa dữ liệu #nghiên cứu xã hội học #nghiên cứu nhân vănTài liệu tham khảo
Scerri, S., Handschuh, S., Decker, S.: Semantic email as a communication medium for the social semantic desktop. In: European Semantic Web Conference, pp. 124–138 (2008). Springer
Hangal, S., Chan, P., Lam, M.S., Heer, J.: Processing email archives in special collections. In: DH, pp. 208–211 (2012)
Schneider, J., Adams, C., DeBauche, S., Echols, R., McKean, C., Moran, J., Waugh, D.: Appraising, processing, and providing access to email in contemporary literary archives. Arch. Manuscr. 47(3), 305–326 (2019)
Jaillant, L.: After the digital revolution: working with emails and born-digital records in literary and publishers’ archives. Taylor & Francis (2019)
Noonan, D.W.: Email: an appraisal approach. J. Arch. Organ. 13(3–4), 146–151 (2016)
Prom, C.J.: Preserving Email. Digital Preservation Coalition Heslington (2011)
Baker, F.: E-mails to an editor: safeguarding the literary correspondence of the twenty-first century at the university of manchester library. New Rev. Acad. Librariansh. 21(2), 216–224 (2015)
Decker, S., Kirsch, D.A., Kuppili Venkata, S., Nix, A.: Finding light in dark archives: using ai to connect context and content in email. AI & SOCIETY, 1–14 (2021)
Koven, J., Bertini, E., Dubois, L., Memon, N.: Invest: intelligent visual email search and triage. Digit. Investig. 18, 138–148 (2016)
Bendersky, M., Wang, X., Najork, M., Metzler, D.: Search and discovery in personal email collections. Found. Trends® Inf. Retriv. 15(1), 1–133 (2021)
Bartliff, Z., Kim, Y., Hopfgartner, F.: A survey on email visualisation research to address the conflict between privacy and access. Arch. Sci., 1–22 (2022)
Doss, E., Loui, M.C.: Ethics and the privacy of electronic mail. Inf. Soc. 11(3), 223–235 (1995). https://doi.org/10.1080/01972243.1995.9960194
Jakobi, T., von Grafenstein, M., Smieskol, P., Stevens, G.: A taxonomy of user-perceived privacy risks to foster accountability of data-based services. J. Responsib. Technol. 10, 100029 (2022)
Gharib, M., Giorgini, P., Mylopoulos, J.: Copri v. 2-acore ontology for privacy requirements. Data Knowl. Eng. 133, 101888 (2021)
Moss, M., Gollins, T.: Our digital legacy: an archival perspective. J. Contemp. Arch. Stud.4 (2017)
Jaillant, L.: Introduction. In: Jaillant, L. (ed.) Archives, Access and Artificial Intelligence: Working with Born-digital and Digitized Archival Collections, pp. 7–28. Bielefeld University Press (2022)
Biber, K., Luker, T.: Evidence and the archive: Ethics, aesthetics, and emotion. Taylor & Francis (2014)
Li, J., Hu, X., Xiong, P., Zhou, W., et al.: The dynamic privacy-preserving mechanisms for online dynamic social networks. IEEE Trans. Knowl. Data Eng. (2020)
Carpenter, L., Jackson, T.W., Matthews, G., Thomas, D., Spencer, A.: The role of it in email preservation and archiving. In: 18th International Conference on Automation and Computing (ICAC), pp. 1–6 (2012). IEEE
Hendery, R., Burrell, A.: Playful interfaces to the archive and the embodied experience of data. Journal of Documentation (2019)
Louis, A., Engelbrecht, A.P.: Unsupervised discovery of relations for analysis of textual data. Digit. Investig. 7(3–4), 154–171 (2011)
Kaczmarek, J., West, B.: Email preservation at scale: Preliminary findings supporting the use of predictive coding. Open Sci. Framew. (2019). https://doi.org/10.17605/OSF.IO/6YP9J
Moss, M., Thomas, D., Gollins, T.: Artificial fibers-the implications of the digital for archival access. Front. Digit. Hum. 5, 20 (2018)
Stadlinger, J., Dewald, A.: A forensic email analysis tool using dynamic visualization. J. Digit. Forensics Secur. Law 12(1), 6 (2017)
Hangal, S., Lam, M.S., Heer, J.: Muse: Reviving memories using email archives. In: Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, pp. 75–84 (2011)
Hangal, S., Piratla, V., Manovit, C., Chan, P., Edwards, G., Lam, M.S.: Historical research using email archives. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, pp. 735–742 (2015)
Borden, B.B., Baron, J.R.: Opening up dark digital archives through the use of analytics to identify sensitive content. In: 2016 IEEE International Conference on Big Data (big Data), pp. 3224–3229 (2016). IEEE
Nix, A., Decker, S.: Using digital sources: the future of business history? Bus. Hist. 1–24 (2021)
Langdon, J.: Describing the digital: the archival cataloguing of born-digital personal papers. Arch. Rec. 37(1), 37–52 (2016)
Srivastava, S.B., Goldberg, A.: Language as a window into culture. Calif. Manag. Rev. 60(1), 56–69 (2017)
Dabbish, L.A., Kraut, R.E.: Email overload at work: An analysis of factors associated with email strain. In: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, pp. 431–440 (2006)
Whittaker, S., Sidner, C.: Email overload: exploring personal information management of email. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 276–283 (1996)
Stolfo, S.J., Hershkop, S., Hu, C.-W., Li, W.-J., Nimeskern, O., Wang, K.: Behavior-based modeling and its application to email analysis. ACM Trans. Internet Technol. (TOIT) 6(2), 187–221 (2006)
Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: Proceedings of the 2006 International Workshop on Mining Software Repositories, pp. 137–143 (2006)
Golbeck, J., Hendler, J.A.: Reputation network analysis for email filtering. In: CEAS, pp. 1–8 (2004)
Chapanond, A., Krishnamoorthy, M.S., Yener, B.: Graph theoretic and spectral analysis of enron email data. Comput. Math. Org. Theory 11(3), 265–281 (2005)
Rowe, R., Creamer, G., Hershkop, S., Stolfo, S.J.: Automated social hierarchy detection through email network analysis. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, pp. 109–117 (2007)
Pszota, D.: Email communication transformation into knowledge base. Published on: Dec (2012)
Bellotti, V., Ducheneaut, N., Howard, M., Smith, I.: Taking email to task: the design and evaluation of a task management centered email tool. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 345–352 (2003)
Garriss, S., Kaminsky, M., Freedman, M.J., Karp, B., Mazieres, D., Yu, H.: Re: Reliable email. In: NSDI, vol. 6, pp. 22–22 (2006)
Zou, C.C., Towsley, D., Gong, W.: Email virus propagation modeling and analysis. Department of Electrical and Computer Engineering, Univ. Massachusetts, Amherst, Technical Report: TR-CSE-03-04 (2003)
Hershkop, S.: Behavior-based Email Analysis with Application to Spam Detection. Citeseer (2006)
Kennedy, R.: Affecting evidence: Edith thompson’s epistolary archive. Aust. Fem. Law J. 40(1), 15–34 (2014)
Golbeck, J., Gerhard, J., O’Colman, F., O’Colman, R.: Scaling up integrated structural and content-based network analysis. Inf. Syst. Front. 20(6), 1191–1202 (2018)
Heibi, I.: A visual framework for graph and text analytics in email investigation. Master’s thesis, University of Bologna (2017)
Magalingam, P., Rao, A., Davis, S.: Identifying a criminal’s network of trust. In: 2014 Tenth International Conference on Signal-Image Technology and Internet-Based Systems, pp. 309–316 (2014). https://doi.org/10.1109/SITIS.2014.64
Park, P., Weber, I., Macy, M.: The mesh of civilizations in the global network of digital communication. PLoS ONE 10(5), 0122543 (2015)
Smilkov, D.: Understanding email communication patterns. PhD thesis, Massachusetts Institute of Technology (2014)
Straub, K.M.: Data mining academic emails to model employee behaviors and analyze organizational structure. Master’s thesis, Virginia Tech (2016)
Tsetini, M.: Computer forensics on financial crimes. PhD thesis, Thessaloniki - Greece (2015)
Štorga, M., Mostashari, A., Stanković, T.: Visualisation of the organisation knowledge structure evolution. J. Knowl. Manag. (2013)
Wen, Q., Gloor, P.A., Fronzetti Colladon, A., Tickoo, P., Joshi, T.: Finding top performers through email patterns analysis. J. Inf. Sci. 46(4), 508–527 (2020)
Zhang, J.: Miteams: quick organizational mapping by combining email and survey data. Master’s thesis, Massachusetts Institute of Technology (2018)
Bulkley, N.: Email and output: Communication effects on productivity. PhD thesis, University of Michigan (2006)
Mondal, S., Shukla, M., Lodha, S.: Privacy aware temporal profiling of emails in distributed setup. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 1229–1238 (2017)
Perer, A., Shneiderman, B., Oard, D.W.: Using rhythms of relationships to understand e-mail archives. J. Am. Soc. Inform. Sci. Technol. 57(14), 1936–1948 (2006)
Lu, Q., Zhang, Q., Luo, X., Fang, F.: An email visualization system based on event analysis. In: CCF Conference on Computer Supported Cooperative Work and Social Computing, pp. 658–669 (2019). Springer
Perer, A., Smith, M.A.: Contrasting portraits of email practices: visual approaches to reflection and analysis. In: Proceedings of the Working Conference on Advanced Visual Interfaces, pp. 389–395 (2006)
Viégas, F.B., Golder, S., Donath, J.: Visualizing email content: portraying relationships from conversational histories. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 979–988 (2006)
Cadman, R., MacDonald, B.H., Soomai, S.S.: Sharing victories: characteristics of collaborative strategies of environmental non-governmental organizations in canadian marine conservation. Mar. Policy 115, 103862 (2020)
Luo, S.J., Huang, L.T., Chen, B.Y., Shen, H.W.: Emailmap: Visualizing event evolution and contact interaction within email archives. In: 2014 IEEE Pacific Visualization Symposium, pp. 320–324 (2014). IEEE
King, V.: Self-portrait with mortar board: a study of academic identity using the map, the novel and the grid. Higher Educ. Res. Dev. 32(1), 96–108 (2013)
Thanh Tung, V., et al.: Email search visualization: An efficient way for searching email. Master’s thesis, Helsingfors universitet (2014)
Schreck, T.: Visual-interactive analysis with self-organizing maps-advances and research challenges. In: Self-Organizing Maps, pp. 83–96. IntechOpen (2010)
Mandic, M., Kerne, A.: Visualizing rhythms of intimacy in email communication. Interface Ecology Lab, Center for Digital Libraries (2004)
Viégas, F.B.: Revealing individual and collective pasts: Visualizations of online social archives. PhD thesis, Massachusetts Institute of Technology (2005)
Save, M.V., et al.: People oriented email: A social approach to email interfaces. Master’s thesis, North Carolina State University (2020)
Whittaker, S., Jones, Q., Nardi, B.A., Terveen, L.G., Creech, M., Isaacs, E., Hainsworth, J.: Contactmap: using personal social networks to organize communication in a social desktop. In: CSCW Videos, p. 7 (2002)
Weisgerber, C., Butler, S.: Visualizing the future of interaction studies: Data visualization applications as a research, pedagogical, and presentational tool for interaction scholars. Electron. J. Commun. 19(1–2) (2009)
Butavicius, M.A., Lee, M.D., Pincombe, B.M., Mullen, L.G., Navarro, D.J., Parsons, K.M., McCormac, A.: An assessment of email and spontaneous dialog visualizations. Int. J. Hum. Comput. Stud. 70(6), 432–449 (2012)
Sperr, E.: Word Trees for Visualizing PubMed Search Results (2019)
Vane, O.: Text visualisation tool for exploring digitised historical documents. In: Proceedings of the 2018 ACM Conference Companion Publication on Designing Interactive Systems, pp. 153–158 (2018). http://hdl.handle.net/10724/38661
Scells, H., Zuccon, G.: Searchrefiner: A query visualisation and understanding tool for systematic reviews. In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management, pp. 1939–1942 (2018)
Cuper, M.: Researching pandemics through time: A covid-19 inspired data-driven approach to explore historical newspapers. In: International Conference on Theory and Practice of Digital Libraries, pp. 227–231 (2021). Springer
Shen, H., Bednarz, T., Nguyen, H., Feng, F., Wyeld, T., Hoek, P.J., Lo, E.H.: Information visualisation methods and techniques: state-of-the-art and future directions. J. Ind. Inf. Integr. 16, 100102 (2019)
Schneier, B.: Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World, 1st edn. W. W. Norton & Company (2015)
Ellen, L.: Breaking rules for good? How archivists manage privacy in large-scale digitisation projects. Arch. Manuscr. 46(3), 289–308 (2019). https://doi.org/10.1080/01576895.2018.1547653
Jaillant, L.: More data, less process: a user-centered approach to email and born-digital archives. Am. Archiv. 85(2), 533–555 (2022). https://doi.org/10.17723/2327-9702-85.2.533
Crossen-White, H.L.: Using digital archives in historical research: What are the ethical concerns for a ‘forgotten’ individual? Res. Ethics 11(2), 108–119 (2015). https://doi.org/10.1177/1747016115581724
DeCew, J.W.: In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Cornell University Press (1997)
Buchanan, T., Paine, C., Joinson, A.N., Reips, U.-D.: Development of measures of online privacy concern and protection for use on the internet. J. Am. Soc. Inform. Sci. Technol. 58(2), 157–165 (2007)
Mujtaba, G., Shuib, L., Raj, R.G., Majeed, N., Al-Garadi, M.A.: Email classification research trends: review and open issues. IEEE Access 5, 9044–9064 (2017)
Jaillant, L., Caputo, A.: Unlocking digital archives: cross-disciplinary perspectives on ai and born-digital data. AI Soc. 1–13 (2022)
Liu, P., Wang, L.-e., Li, X.: Randomized perturbation for privacy-preserving social network data publishing. In: 2017 IEEE International Conference on Big Knowledge (ICBK), pp. 208–213 (2017). IEEE
Majeed, A., Lee, S.: Anonymization techniques for privacy preserving data publishing: a comprehensive survey. IEEE Access 9, 8512–8545 (2020)
Bourahla, S., Laurent, M., Challal, Y.: Privacy preservation for social networks sequential publishing. Comput. Netw. 170, 107106 (2020)
Chong, K.M., Malip, A.: Trace me if you can: an unlinkability approach for privacy-preserving in social networks. IEEE Access 9, 143950–143968 (2021)
Fang, Y., Zhao, C., Huang, C., Liu, L.: Sankeyvis: visualizing active relationship from emails based on multiple dimensions and topic classification methods. Forensic Sci. Int. Digit. Investig. 35, 300981 (2020)
Okoli, C., Pawlowski, S.D.: The Delphi method as a research tool: an example, design considerations and applications. Inf. Manag. 42(1), 15–29 (2004)
Ashokan, A., Haas, C.: Fairness metrics and bias mitigation strategies for rating predictions. Inf. Process. Manag. 58(5), 102646 (2021)
Johnson, V., Ranade, S., Thomas, D.: Size matters: The implications of volume for the digital archive of tomorrow—a case study from the UK national archives. Rec. Manag. J. (2014)
Sloyan, V.: Born-digital archives at the wellcome library: appraisal and sensitivity review of two hard drives. Arch. Rec. 37(1), 20–36 (2016)
Gooding, P., Smith, J., Mann, J.: The forensic imagination: interdisciplinary approaches to tracing creativity in writers’ born-digital archives. Arch. Manuscr. 47(3), 374–390 (2019)
Özdemir, L.: The inevitability of digital transfer: How prepared are UK public bodies for the transfer of born-digital records to the archives? Rec. Manag. J. 29(1–2), 224–239 (2019)
Moretti, F.: Distant Reading. Verso Books (2013)
Buurma, R.S., Heffernan, L.: Search and replace: Josephine miles and the origins of distant reading. Modern. Modernity 3(1) (2018)
Martos Núñez, E., Martos García, A.: Categorizations of reading and cultural praxis in the digital age: distant reading vs. close reading. Investigación bibliotecológica 32(74), 19–33 (2018)
Murrieta-Flores, P., Howell, N.: Contested spaces: Creating computational approaches for the holistic analysis of space and place in digital humanities. In: DH (2017)
Joo, S., Hootman, J., Katsurai, M.: Exploring the digital humanities research agenda: a text mining approach. J. Doc. (2021)
Dobson, J.E.: Critical Digital Humanities: the Search for a Methodology. University of Illinois Press (2019)
Bartliff, Z., Kim, Y., Hopfgartner, F., Baxter, G.: Leveraging digital forensics and data exploration to understand the creative work of a filmmaker: a case study of Stephen Dwoskin’s digital archive. Inf. Process. Manag. 57(6) (2020)
Lastilla, L., Ammirati, S., Firmani, D., Komodakis, N., Merialdo, P., Scardapane, S.: Self-supervised learning for medieval handwriting identification: a case study from the vatican apostolic library. Inf. Process. Manag. 59(3), 102875 (2022)
Kirschenbaum, M.G.: The remaking of reading: data mining and the digital humanities (2007)
Bassett, C., Berry, D.M., Fazi, B., Pay, J., Roberts, B.: Critical digital humanities and machine-learning. In: ADHO 2017-Montréal (2017)
Task Force on Technical Approaches for Email Archives: The Future of Email Archives: A Report from the Task Force on Technical Approaches for Email Archives. Council on Library and Information Resources (2018). www.clir.org/pubs/reports/pub175/
Misztal-Radecka, J., Indurkhya, B.: Bias-aware hierarchical clustering for detecting the discriminated groups of users in recommendation systems. Inf. Process. Manag. 58(3), 102519 (2021)
Seyedhoseinzadeh, K., Rahmani, H.A., Afsharchi, M., Aliannejadi, M.: Leveraging social influence based on users activity centers for point-of-interest recommendation. Inf. Process. Manag. 59(2), 102858 (2022)
Bag, S., Kumar, S.K., Tiwari, M.K.: An efficient recommendation generation using relevant Jaccard similarity. Inf. Sci. 483, 53–64 (2019)
Silveira, T., Zhang, M., Lin, X., Liu, Y., Ma, S.: How good your recommender system is? A survey on evaluations in recommendation. Int. J. Mach. Learn. Cybern. 10(5), 813–831 (2019)
Bobadilla, J., Serradilla, F., Bernal, J.: A new collaborative filtering metric that improves the behavior of recommender systems. Knowl.-Based Syst. 23(6), 520–528 (2010)
Kenderdine, S.: Experimental museology: immersive visualisation and cultural (big) data. Exp. Museol. 15 (2021)
Rehm, G., Lee, M., Moreno-Schneider, J., Bourgonje, P.: Curation technologies for cultural heritage archives: Analysing and transforming a heterogeneous data set into an interactive curation workbench. In: Proceedings of the 3rd International Conference on Digital Access to Textual Cultural Heritage, pp. 117–122 (2019)
