-
Learning about Data, Algorithms, and Algorithmic Justice on TikTok in Personally Meaningful Ways
Authors:
Luis Morales-Navarro,
Yasmin B. Kafai,
Ha Nguyen,
Kayla DesPortes,
Ralph Vacca,
Camillia Matuk,
Megan Silander,
Anna Amato,
Peter Woods,
Francisco Castro,
Mia Shaw,
Selin Akgun,
Christine Greenhow,
Antero Garcia
Abstract:
TikTok, a popular short video sharing application, emerged as the dominant social media platform for young people, with a pronounced influence on how young women and people of color interact online. The application has become a global space for youth to connect with each other, offering not only entertainment but also opportunities to engage with artificial intelligence/machine learning (AI/ML)-dr…
▽ More
TikTok, a popular short video sharing application, emerged as the dominant social media platform for young people, with a pronounced influence on how young women and people of color interact online. The application has become a global space for youth to connect with each other, offering not only entertainment but also opportunities to engage with artificial intelligence/machine learning (AI/ML)-driven recommendations and create content using AI/M-powered tools, such as generative AI filters. This provides opportunities for youth to explore and question the inner workings of these systems, their implications, and even use them to advocate for causes they are passionate about. We present different perspectives on how youth may learn in personally meaningful ways when engaging with TikTok. We discuss how youth investigate how TikTok works (considering data and algorithms), take into account issues of ethics and algorithmic justice and use their understanding of the platform to advocate for change.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Managing Dynamic User Communities in a Grid of Autonomous Resources
Authors:
R. Alfieri,
R. Cecchini,
V. Ciaschini,
L. dell'Agnello,
A. Gianoli,
F. Spataro,
F. Bonnassieux,
P. Broadfoot,
G. Lowe,
L. Cornwall,
J. Jensen,
D. Kelsey,
A. Frohner,
D. L. Groep,
W. Som de Cerff,
M. Steenbakkers,
G. Venekamp,
D. Kouril,
A. McNab,
O. Mulmo,
M. Silander,
J. Hahkala,
K. Lhorentey
Abstract:
One of the fundamental concepts in Grid computing is the creation of Virtual Organizations (VO's): a set of resource consumers and providers that join forces to solve a common problem. Typical examples of Virtual Organizations include collaborations formed around the Large Hadron Collider (LHC) experiments. To date, Grid computing has been applied on a relatively small scale, linking dozens of u…
▽ More
One of the fundamental concepts in Grid computing is the creation of Virtual Organizations (VO's): a set of resource consumers and providers that join forces to solve a common problem. Typical examples of Virtual Organizations include collaborations formed around the Large Hadron Collider (LHC) experiments. To date, Grid computing has been applied on a relatively small scale, linking dozens of users to a dozen resources, and management of these VO's was a largely manual operation. With the advance of large collaboration, linking more than 10000 users with a 1000 sites in 150 counties, a comprehensive, automated management system is required. It should be simple enough not to deter users, while at the same time ensuring local site autonomy. The VO Management Service (VOMS), developed by the EU DataGrid and DataTAG projects[1, 2], is a secured system for managing authorization for users and resources in virtual organizations. It extends the existing Grid Security Infrastructure[3] architecture with embedded VO affiliation assertions that can be independently verified by all VO members and resource providers. Within the EU DataGrid project, Grid services for job submission, file- and database access are being equipped with fine- grained authorization systems that take VO membership into account. These also give resource owners the ability to ensure site security and enforce local access policies. This paper will describe the EU DataGrid security architecture, the VO membership service and the local site enforcement mechanisms Local Centre Authorization Service (LCAS), Local Credential Map** Service(LCMAPS) and the Java Trust and Authorization Manager.
△ Less
Submitted 13 June, 2003; v1 submitted 30 May, 2003;
originally announced June 2003.
-
Next-Generation EU DataGrid Data Management Services
Authors:
Diana Bosio,
James Casey,
Akos Frohner,
Leanne Guy,
Peter Kunszt,
Erwin Laure,
Sophie Lemaitre,
Levi Lucio,
Heinz Stockinger,
Kurt Stockinger,
William Bell,
David Cameron,
Gavin McCance,
Paul Millar,
Joni Hahkala,
Niklas Karlsson,
Ville Nenonen,
Mika Silander,
Olle Mulmo,
Gian-Luca Volpato,
Giuseppe Andronico
Abstract:
We describe the architecture and initial implementation of the next-generation of Grid Data Management Middleware in the EU DataGrid (EDG) project.
The new architecture stems out of our experience and the users requirements gathered during the two years of running our initial set of Grid Data Management Services. All of our new services are based on the Web Service technology paradigm, very mu…
▽ More
We describe the architecture and initial implementation of the next-generation of Grid Data Management Middleware in the EU DataGrid (EDG) project.
The new architecture stems out of our experience and the users requirements gathered during the two years of running our initial set of Grid Data Management Services. All of our new services are based on the Web Service technology paradigm, very much in line with the emerging Open Grid Services Architecture (OGSA). We have modularized our components and invested a great amount of effort towards a secure, extensible and robust service, starting from the design but also using a streamlined build and testing framework.
Our service components are: Replica Location Service, Replica Metadata Service, Replica Optimization Service, Replica Subscription and high-level replica management. The service security infrastructure is fully GSI-enabled, hence compatible with the existing Globus Toolkit 2-based services; moreover, it allows for fine-grained authorization mechanisms that can be adjusted depending on the service semantics.
△ Less
Submitted 12 June, 2003; v1 submitted 30 May, 2003;
originally announced May 2003.