How do people tag pictures? A study with Facebook application

Size: px
Start display at page:

Download "How do people tag pictures? A study with Facebook application"

Transcription

1 COMP3750 Final Report How do people tag pictures? A study with Facebook application Author: Victor Hartanto Wibisono, U Supervisor: Dr. Lexing Xie 1 June 2012

2 Acknowledgements This research would not have been possible without the guidance and the help of several individuals who in one way or another contributed and extended their valuable assistance in the preparation and completion of this study. First and foremost, my utmost gratitude to Dr. Lexing Xie, my research supervisor whose sincerity and encouragement I will never forget. Dr. Xie has been a steady pillar of support as I hurdle all the obstacles in the completion this research work. I would also like to thank Mr. Khoi-Nguyen Tran for his support and guidance in the implementation of the Facebook App. I would also like to thank Dr. Weifa Liang the course coordinator, for his guidance in the course. I am grateful for the assistance of fellow students Amy Zhang and Justin Ho who have provided valuable suggestions in the writing of this report. Last but not least, I also thank the ANU Academic Skills and Learning Centre for providing us ANU students with a comprehensive guide to write a research report. Page 2 of 19

3 Abstract This report documents the implementation of Tag Expert a tool that helps researchers carry out investigations into how being a Facebook friend will affect the words people use to tag. Tag Expert is a Facebook app which allow people to tag Flickr pictures of their friends and strangers. These tags are stored in a database which are then analysed to distinguish what kinds of tags come from the friends of the owner of the pictures, and what kinds come from strangers. While the development of the software is not completed due to time constraint, this report outlines some suggestions on how the application can be improved and how the data gathered can be analysed. The application leverages on Facebook s Graph API, Flickr s Developer API, MySQL database and PHP in order to gather and store the data. Page 3 of 19

4 1 Introduction Facebook is currently the largest social networking platform on the Internet. As of May 2012, Facebook has over 900 million active users, more than half of them are on mobile devices. Every day, there are 200 million photos uploaded on Facebook. Other photo sharing websites such as Flickr receives about 50 million pictures from its users every month. Every time a user uploads a picture, he or she will be asked to put a tag on the picture. An image tag is a word that describes the image. According to Morgan Ames, people tag pictures on photo sharing websites like Flickr in order to let others know about the picture. In the taxonomy of people s motivation for tagging, research has identified that people tag pictures because they are keen to use these keywords to organise and communicate the description of the pictures to themselves and for others. The question of why people tag pictures is addressed by the myriad of research efforts that look into the motivations that moves people to annotate their online multimedia content. In this aspect, research (M. Ames, et al, 2011) has established that the primary motivations for multimedia annotations are for a person s own personal use as well as for social purposes. While there has been a lot of research done in the area of people s tagging motivation and behaviour answering the questions of why people tag there is a lack of research done to answer the question of how people tag pictures. In addressing this question, we would like to know how people s choice of words is dependent on their knowledge of the picture and its owner, as well as where they are coming from their background information. This background information can only come from the personal attributes of the person such as their nationality, gender and age group. For example, in tagging a picture of a place in Australia, an Australian will tag it differently from an Indonesian because of the lack of information that the Indonesian might have of the place. The contributions of this research are two folds. Firstly, this research effort produces a tool in the form of a Facebook App for researchers to investigate the words people use to tag pictures in relation to their personal attributes as mentioned above. We do this by collecting people s tags on pictures as well as their personal information from Facebook. Using this tool, we will also be able to see how friendship on Facebook will affect a person s tag most notably the contextual tags that the person would produce. Page 4 of 19

5 2 Background At the beginning of this research, we hypothesised that being a friend on Facebook will provide a person with some needed information in order to provide a user with some contextual tags to a picture. Contextual tags are tags that provide information on when, where, how and why a photo was taken (Xie, et al, 2010). This is unlike the visual tags that are generic words to describe the relevant picture. This difference is illustrated in the diagram below. Figure 1: Social Network Diagram In the diagram above, we can see how different people will tag a particular picture in different ways. Victor, being an owner of the picture, describes the picture with the words girl, Mary and Italy. Being an owner of the picture, Victor knows that the picture is a painting of his friend Mary that he saw in Italy. Another person who decided to put his tag on the picture was John. John is a friend of Victor and is thus aware that it is a picture of Mary. This eventually causes him to tag the picture with the words girl, Mary and pretty. As we can see in the diagram above, John s tags are very different from that of Sam who is a stranger to this picture. The word stranger here simply means that Sam is not in any way related to the owner of the picture or the picture itself. In the diagram, we saw how Sam tagged the picture with words girl and photo. Sam s tags are purely visual tags because he does not have any contextual knowledge of this picture the fact that the person in the picture is Victor s friend, Mary. Page 5 of 19

6 The above description shows the hypothesis of this research. Through a Facebook app, we aim to prove using empirical data that being a Facebook friend of the owner of the picture will give a person more knowledge than purely visual cues that allow him to produce contextual tags for a picture. Page 6 of 19

7 3 Related Work Problems related to image annotation and descriptions have been tackled from different ends by many communities. The image retrieval and computer vision community has created many algorithms and systems for performing image annotation and object recognition; the web, humancomputer interaction communities have been engaged in studying user intention and usage of social tagging systems; information from social sharing, media content and ontology are then used to improve and revise photo tags (Xie et al, 2010). In the process of finding inspiration for this Facebook app, several apps related to image tagging were explored. Most notable among those explored was the ESP game, which solves the problem of the many untagged pictures online. The ESP game (von Anh, L, 2006) was developed in order to solve the problem of having the many images on the web that are not annotated. Since it is a very engaging game, the user ends up playing it for prolonged periods of time, thus annotating many images. We also looked at the Name-It-Game (C. Snoek and J. Steggink), which adds semantic annotation into the picture tagging game. The Name-It-Game extends the work of ESP game by adding semantic meanings to the words that are used. This is useful because many words can have several different meanings and adding semantic information will improve tagging information. Looking at the above two previous works in this area has helped the research efforts in two areas. Firstly, looking at the applications provides some ideas as to what makes online application popular. The game and score and achievement element of Name-It-Game shows the importance of having similar attributes of scores and players in our app. Secondly, one of the factors that influence the success of the ESP is its unintended social dimension. Even though the two players are not aware of the details of the other, the fact that they would have to agree to a certain tag before they can both move on to the next picture provides them with an element of mystery and surprise that someone they know not who thinks the same way as them. In our application, we would like to leverage Facebook s social networking facilities in order to ensure that there is a social element. This will be explained further in later sections. Page 7 of 19

8 4 Method Step 1: Software design and Human Ethics approval Step 2: Gathering users attributes from Facebook Step 3: Gathering users public photos from Flickr Step 5: Data analysis Step 4: Gathering users tags Figure 2: Research process The diagram above shows the steps taken to conduct the research. As mentioned earlier, the goal of this endeavour is to create a tool, which will allow researchers to investigate how being a friend on Facebook will provide users with more information and lead to the providing of contextual tags. 4.1 Step 1: Software design and approval from the Human Ethics Committee The first step in the research process is to design the app both in the front- and back-end such that it can carry out its mission. As depicted in the diagram below, the app consists of one main screen where the game is played. The idea is to do the data collection in an asynchronous manner using AJAX. Page 8 of 19

9 Figure 3: Application mock design In addition to designing the user interface, we also looked at the data that had to be collected by the application. In addition to that, the tools and technologies used were considered. In the view that the tools have to integrate with Facebook s API (the URL address in the reference section), we decided to use PHP as our programming language in order to leverage on Facebook s PHP SDK. We also decided to use JQuery in order to facilitate the AJAX processes and MySQL as our back-end database. Apart from technical considerations, we also considered the information that we are going to collect from the users. As a standard practice at the university, it is imperative that we seek approval from the Human Ethics Committee before collecting any data. In the application, the pieces of information that we required from the users are: (1) Name (2) Gender (3) Location (4) Hometown (5) Age Page 9 of 19

10 (6) (7) List of their friends Facebook ID There was a bit of a problem with the approval for the list of the users friends Facebook ID. However, it is imperative that we collect this piece of data because it is the only way to know the friendship between the users of the app. Step 1: Allow Tag Expert to access his / her data on Facebook Step 2: Enter his / her Flickr NSID Step 3: Start tagging! Figure 4: Users process when using the app The app is also designed with users simplicity in mind. As shown in the diagram above, to use the app the users have to only undergo a three-step process. For the user, the app itself only consists of one usable screen, though we have other pages to store other information on the app such as the privacy policy, terms and conditions and contact information of the developers. 4.2 Step 2: Gathering user attributes from their Facebook information. The main reason for making it a Facebook app is the consequential ability of the app to extract information about its user from Facebook. These pieces of information are crucial in our analysis of the users personal attributes in relation to their tags. In addition to the personal attributes, the app also gathers the Facebook userid of the friends of the friends of the user. This information is stored in a directed graph. Before storing the information, the app will ask for authorisation, which is a standard practice for all Facebook apps. This is done to ensure that the user has fully consented in getting their personal data captured by the application. The diagram below shows the MySQL database schema that is used in capturing the data from the application. The database schema consists of four tables that stores information about: (1) the users, (2) the friendships of the users, (3) picture details (4) tags Page 10 of 19

11 Table user friend photo tag Field id username name location_name gender hometown_name flickr_nsid flickr_username Purpose to keep the data of the users and their personal attributes to store data about the friends of the users to store data about the photo details to store data of picture tags Table: user Description Users Facebook userid Users Facebook username Users name Users current location Users gender Users hometown Users Flickr NSID Users Flickr username Table: friend Field person1_facebook_id person2_facebook_id Table: photo Field id (auto-incremented) owner_facebook_id owner_flickr_nsid picture_flickr_farm_id picture_flickr_server_id picture_flickr_photo_id picture_flickr_secret picture_type picture_facebook_id picture_facebook_source Figure 5: Database Schema We should note here that before gathering all the information, there would be a standard Facebook authorisation dialog box, which would ask the user if he would authorise the App to extract the relevant data. Due to the lack of Facebook development experience, the author took a long time to learn about Facebook s authorisation system. In addition, Facebook also requires that the server used by the application supports HTTPS functionalities and is configured in a specific manner, which also took quite a while to grasp. Facebook also requires that the app would provide the users with the terms and conditions and privacy policies. Page 11 of 19

12 Figure 6: Facebook s JSON response 3. Request for iframe Client (the User) 1. Initial user request Facebook Server 4. API call request App Server (at ANU) 2. HTML response 5. API response 6. iframe response Figure 7: Architectural Link between Tag Expert, Facebook, and App Server Page 12 of 19

13 In the technical spectrum, we can see in the diagram above how the app will communicate with the servers of Facebook and the client. The application is hosted on our own server and it receives the client s requests. Then it will request to Facebook via the Facebook Graph API and receive a JSON response. This JSON response will then be processed and stored into the app database on our server. 4.3 Step 3: Gathering users public photos from Flickr Facebook Graph API request Flickr API request Facebook Tag Expert Flickr JSON response JSON response Figure 8: How Tag Expert, Facebook and Flickr communicate The next step is to gather the public photos of the user through Tag Expert Facebook App. For the current first version of the application, the user have to enter his / her Flickr NSID (ref. Flickr API). With the NSID, the app will then request to Flickr the public photos of the user. Figure 9: How picture details are stored in the database In the diagram above, we can see how the several pieces information such as the farm id, server id, Flickr picture id and secret of the picture are stored. Using these information, we will be able to retrieve the picture from Flickr s URL which is in the form of (Flickr URL documentation). Page 13 of 19

14 As seen in the diagram above, one of the information stored about the picture is the Facebook userid of its owner. This is done so that when the application starts up, it will look for pictures belonging to the people who are the Facebook friends of the user. 4.4 Step 4: Gathering user tags Figure 10: App design with user tagging facilities As of the current iteration of the app, the tagging facility is under development. As shown in the app design picture above, the aim is to allow the users to insert 4 tags for each picture. Each tag can only be made with one word. Using a PHP function, the server will only take in the first word of each tag. This is only for the first iteration and we will definitely look into improving this function in later releases of the app. Page 14 of 19

15 Field id picture_id owner_id tagger_id tag_type Table: tag Description Tag ID (auto-incremented primary key) ID (generated by Tag Expert) of the picture Facebook ID of the owner Facebook ID of the tagger Either friend or stranger Figure 11: Table to store tag data We can see in the picture above how the app stores the picture tags from the users. As we can see in the above diagram, in addition to the tag-word, the app also stores the Facebook userid of the tagger, the owner of the picture, the picture id and the status of the tagger. This status field is used to indicate whether or not the person who tags is a stranger or a friend of the owner of the picture. This field will make it really easy later on for us to separate the tag data into those coming from the friend and non-friend of the owner. 4.5 Step 5: Data analysis Due to the limited time after development, we were not able to analyse the data gathered through the app. However, the design of the database was such that data analysis was made easier because there would not be too much need for too many SQL inner-joins in order to make queries to the database. A proposed suggestion on conducting the data analysis would be for each picture, we would list down the tags gathered some of them would be purely visual while others will be contextual. We would then only look at the contextual tags and see how the percentage of these tags that comes from friends of the owner of the picture and the percentage that comes from non-friend of the owner of the picture. Page 15 of 19

16 Figure 12: A suggestion on how data analysis can be carried out Page 16 of 19

17 5 Conclusion Figure 13: Tag Expert at its current iteration The original aim of this project was to develop a tool that would allow researchers to investigate how people s friendships might affect the contextual tags that they produce. This project has achieve some parts of it but not all. This is mainly due to the time constraints. It was very hard to estimate the amount of time needed in the beginning, which caused our estimation to be over optimistic. However, in this project we have got a starting point in the form of a tool, which will allow us to begin our investigation. Also, this project has also provided a slight user interface improvement from the last project. Page 17 of 19

18 6 Future work Throughout the descriptions above, there is undoubtedly many parts where effort in furthering this is needed. One of the most prominent areas is data analysis. While this Facebook app facilitates data collection, it does not have any mechanism for data analysis. It would be very helpful to have functions in the app that will allow for query to be processed and the result displayed in a presentable manner. Another area in which improvements can be made in this project is to begin investigation on how Facebook friendship affects tags on specific kinds of pictures. In this project, we have selected the pictures at random. It would be very helpful for researchers to have a way to know what specific kinds of pictures would be most greatly affected by contextual knowledge of the taggers. Page 18 of 19

19 References Z. Qin; How do people tag pictures? A pilot study with Facebook application. June L. Li; How do people tag pictures? A pilot study with mobile application. June Facebook Graph API. Available online at Flickr Developer API. Available online at Flickr URL Documentation. Available online at M. Ames and M. Naaman, Why we tag: Motivations for annotation in mobile and online media. In proc. CHI, pages , Wikipedia (2011), Facebook. Available online: http// L. Xie, A. Natsev, M. Hill, et al; The Accuracy and Value of Machine-Generated Image Tags. In proc. CIVR, von Ahn, L.;, "Games with a purpose." Computer, vol.39, no.6, pp.92-94, June C. Snoek and J. Steggink, Adding semantics to image-region annotations with the Name-It-Game, Multimedia Systems, vol. 17, no. 5, pp , October Page 19 of 19

Building a Facebook application to investigate how people tag pictures

Building a Facebook application to investigate how people tag pictures Building a Facebook application to investigate how people tag pictures Victor Hartanto Wibisono (U4644427) supervised by: Dr. Lexing Xie The Problem Victor s Friend Owner John Stranger Victor Sam COMP3750:

More information

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT A Project Report Presented to The faculty of Department of Computer Science San Jose State University In Partial fulfillment of the Requirements for the

More information

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT Advisor / Committee Members Dr. Chris Pollett, Dr. Sami Khuri, Dr. Teng Moh By Mallika Perepa AGENDA About Project Introduction and preliminary work Features

More information

Speaker Pages For CoMeT System

Speaker Pages For CoMeT System Speaker Pages For CoMeT System Independent Study Report 2930 spring 2013 Name: Yu Xia Supervisors: Dr. Peter Brusilovsky Chirayu Wongchokprasitti The goal for the independent study The website is a talk-

More information

A Developer s Guide to the Semantic Web

A Developer s Guide to the Semantic Web A Developer s Guide to the Semantic Web von Liyang Yu 1. Auflage Springer 2011 Verlag C.H. Beck im Internet: www.beck.de ISBN 978 3 642 15969 5 schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG

More information

Student retention in distance education using on-line communication.

Student retention in distance education using on-line communication. Doctor of Philosophy (Education) Student retention in distance education using on-line communication. Kylie Twyford AAPI BBus BEd (Hons) 2007 Certificate of Originality I certify that the work in this

More information

Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure

Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure Demetris Kyriacou, Hugh C Davis, and Thanassis Tiropanis Learning Societies Lab School of Electronics

More information

Using XACML for access control in Social Networks

Using XACML for access control in Social Networks Using XACML for access control in Social Networks Anna Carreras, Eva Rodríguez, Jaime Delgado Distributed Multimedia Applications Group (DMAG) Universitat Politècnica de Catalunya (UPC) Jordi Girona 1-3,

More information

PORTAL RESOURCES INFORMATION SYSTEM: THE DESIGN AND DEVELOPMENT OF AN ONLINE DATABASE FOR TRACKING WEB RESOURCES.

PORTAL RESOURCES INFORMATION SYSTEM: THE DESIGN AND DEVELOPMENT OF AN ONLINE DATABASE FOR TRACKING WEB RESOURCES. PORTAL RESOURCES INFORMATION SYSTEM: THE DESIGN AND DEVELOPMENT OF AN ONLINE DATABASE FOR TRACKING WEB RESOURCES by Richard Spinks A Master s paper submitted to the faculty of the School of Information

More information

Table of Contents Chapter 3. Creating Your Own Pages...

Table of Contents Chapter 3. Creating Your Own Pages... Table of Contents Chapter 3. Creating Your Own Pages... 1 Welcome to Facebook Pages... 1 Pages from a Marketing Perspective... 2 Viral Marketing with Pages... 0 Page Authenticity... 0 Finding Pages...

More information

If you re a Facebook marketer, you re likely always looking for ways to

If you re a Facebook marketer, you re likely always looking for ways to Chapter 1: Custom Apps for Fan Page Timelines In This Chapter Using apps for Facebook marketing Extending the Facebook experience Discovering iframes, Application Pages, and Canvas Pages Finding out what

More information

Using Deep Links for Growth. Phillip Nelson Director of Product, Quixey

Using Deep Links for Growth. Phillip Nelson Director of Product, Quixey Using Deep Links for Growth Phillip Nelson Director of Product, Quixey Mobile Deep Linking What are deep links? Why are deep links useful for developers? For users? How do I implement deep linking? What

More information

How To Construct A Keyword Strategy?

How To Construct A Keyword Strategy? Introduction The moment you think about marketing these days the first thing that pops up in your mind is to go online. Why is there a heck about marketing your business online? Why is it so drastically

More information

SUPER PANEL: A MULTI-SCREEN AUDIENCE MEASUREMENT

SUPER PANEL: A MULTI-SCREEN AUDIENCE MEASUREMENT SUPER PANEL: A MULTI-SCREEN AUDIENCE MEASUREMENT Elie Aoun, Ipsos Connect Background The ever growing appetite of today s content-hungry consumer, accompanied with the evolution of digital devices, has

More information

How to better promote your physical activities and sports events on your website

How to better promote your physical activities and sports events on your website How to better promote your physical activities and sports events on your website Introduction Your website is a very important medium to ensure the visibility of your physical activities and sports events.

More information

Software Design Description Report

Software Design Description Report 2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...

More information

Online Copywriting Tips and Search Engine Optimisation.

Online Copywriting Tips and Search Engine Optimisation. Online Copywriting Tips and Search Engine Optimisation www.finalsite.co.uk A Bit About Me. Alta Justus, Director of Marketing @ Finalsite UK Over 17 years commercial experience marketing both online and

More information

Nick Terkay CSCI 7818 Web Services 11/16/2006

Nick Terkay CSCI 7818 Web Services 11/16/2006 Nick Terkay CSCI 7818 Web Services 11/16/2006 Ning? Start-up co-founded by Marc Andreeson, the co- founder of Netscape. October 2005 Ning is an online platform for painlessly creating web apps in a jiffy.

More information

Getting started with MyFolio

Getting started with MyFolio Getting started with MyFolio An eportfolio tool for reflection, presentation and collaboration What is MyFolio? MyFolio is an eportfolio system whose features can help you improve your learning, plan for

More information

IOTAP Sharepoint Customizations

IOTAP Sharepoint Customizations Table of Contents Overview... 2 N of M MOSS Workflow... 2 SPitter A Twitter for Sharepoint... 2 Tag Cloud... 3 Recently added documents... 4 Zipping all items from a Sharepoint library... 4 Social book

More information

VIRGINIA TECH. FlickrIDR. A web-based multimodal search interface based on the SuperIDR

VIRGINIA TECH. FlickrIDR. A web-based multimodal search interface based on the SuperIDR VIRGINIA TECH FlickrIDR A web-based multimodal search interface based on the SuperIDR Client: Uma Murthy Class: CS4624 University: Virginia Tech City: Blacksburg, VA Kaslin Fields, James Kaplan, Martin

More information

Mavo Create: A WYSIWYG Editor for Mavo. Francesca Rose Cicileo

Mavo Create: A WYSIWYG Editor for Mavo. Francesca Rose Cicileo Mavo Create: A WYSIWYG Editor for Mavo by Francesca Rose Cicileo Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of

More information

Project Final Report

Project Final Report Project Final Report Automatic Number Plate Recognition BSc (Hons) Software Development Year 4 Student name: Michael Reid Student ID: C00112726 Project supervisor: Mr. Nigel Whyte Table of Contents 1 Introduction...

More information

The power management skills gap

The power management skills gap The power management skills gap Do you have the knowledge and expertise to keep energy flowing around your datacentre environment? A recent survey by Freeform Dynamics of 320 senior data centre professionals

More information

Usability Report for Online Writing Portfolio

Usability Report for Online Writing Portfolio Usability Report for Online Writing Portfolio October 30, 2012 WR 305.01 Written By: Kelsey Carper I pledge on my honor that I have not given or received any unauthorized assistance in the completion of

More information

Integrating Lecture Recordings with Social Networks

Integrating Lecture Recordings with Social Networks Integrating Lecture Recordings with Social Networks Patrick Fox, Johannes Emden, Nicolas Neubauer and Oliver Vornberger Institute of Computer Science University of Osnabru ck Germany, 49069 Osnabru ck

More information

Digitized Engineering Notebook

Digitized Engineering Notebook Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2017 Digitized Engineering Notebook Sandeep Kumar Gudivada Governors State University

More information

Facebook Page Insights

Facebook Page Insights Facebook Product Guide for Facebook Page owners Businesses will be better in a connected world. That s why we connect 845M people and their friends to the things they care about, using social technologies

More information

PROFILE USER MANUAL. Satori Team

PROFILE USER MANUAL. Satori Team PROFILE USER MANUAL Satori Team Table of Contents Profile... 3 1. introduction... 3 2. Description... 4 a) Profile page of current user... 4 b) My Notification... 6 c) My communities.... 6 d) My Apps...

More information

Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience

Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience 1 Photo-sharing report Methodology Americans are concerned about online privacy and security and are taking steps to

More information

Hybrid Recommendation System Using Clustering and Collaborative Filtering

Hybrid Recommendation System Using Clustering and Collaborative Filtering Hybrid Recommendation System Using Clustering and Collaborative Filtering Roshni Padate Assistant Professor roshni@frcrce.ac.in Priyanka Bane B.E. Student priyankabane56@gmail.com Jayesh Kudase B.E. Student

More information

Sukjun Lim Strategic Planning, User interaction, Design research specialist

Sukjun Lim Strategic Planning, User interaction, Design research specialist Sukjun Lim Strategic Planning, User interaction, Design research specialist LINE MUSIC Strategic Planning and Interaction Design Convergence LINE MUSIC is an on-line music streaming service. Japan has

More information

HITEPAPER WHITEPAPER SOCIAL WHITEPAPE HITEPAPER WHITEPAPER WHITEPAPE R WHITEPAPER WHITEPAPER WHITEP EXPANDING THE REACH OF WITH SOCIAL NETWORKS

HITEPAPER WHITEPAPER SOCIAL WHITEPAPE HITEPAPER WHITEPAPER WHITEPAPE R WHITEPAPER WHITEPAPER WHITEP EXPANDING THE REACH OF  WITH SOCIAL NETWORKS HITEPAPER WHITEPAPER WHITEPAPE PER WHITEPAPER WHITEPAPER WHIT EXPANDING THE REACH OF PAPER WHITEPAPER WHITEPAPER W EMAIL WITH SOCIAL NETWORKS R WHITEPAPER WHITEPAPER EMAIL, WHITEP TEPAPER WHITEPAPER MEET

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN: Semi Automatic Annotation Exploitation Similarity of Pics in i Personal Photo Albums P. Subashree Kasi Thangam 1 and R. Rosy Angel 2 1 Assistant Professor, Department of Computer Science Engineering College,

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 07 Tutorial 2 Part 1 Facebook API Hi everyone, welcome to the

More information

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps Position Paper Gökhan Bal, Kai Rannenberg Goethe University Frankfurt

More information

Android Basics Nanodegree Syllabus

Android Basics Nanodegree Syllabus Android Basics Nanodegree Syllabus Before You Start This is an entry-level, single term Nanodegree program with no prior programming experience required. Support Options We are here to support you every

More information

Azureus Plugin for Facebook Integration

Azureus Plugin for Facebook Integration Azureus Plugin for Facebook Integration Mike House-Vording, 100300955 mhvordin@connect.carleton.ca 1. Introduction This project seeks to integrate two major trends currently taking place on the internet:

More information

User Testing Study: Collaborizm.com. Jessica Espejel, Megan Koontz, Lauren Restivo. LIS 644: Usability Theory and Practice

User Testing Study: Collaborizm.com. Jessica Espejel, Megan Koontz, Lauren Restivo. LIS 644: Usability Theory and Practice User Testing Study: Collaborizm.com Jessica Espejel, Megan Koontz, Lauren Restivo LIS 644: Usability Theory and Practice TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 METHODOLOGY... 5 FINDINGS

More information

Making Privacy a Fundamental Component of Web Resources

Making Privacy a Fundamental Component of Web Resources Making Privacy a Fundamental Component of Web Resources Thomas Duebendorfer (Google Switzerland GmbH), Christoph Renner (Google Switzerland GmbH/ETH Zurich), Tyrone Grandison (IBM), Michael Maximilien

More information

A Survey on Secure User Data and Images on Content Sharing Sites implementing APP Scheme and Virtual Password

A Survey on Secure User Data and Images on Content Sharing Sites implementing APP Scheme and Virtual Password A Survey on Secure User Data and Images on Content Sharing Sites implementing APP Scheme and Virtual Password Priyanka M. Lokhande Post Graduate Student, Dept. of Information Technology, RMDSSOE Warje,

More information

AUI EXCHANGE PROGRAM COURSE MANAGEMENT SYSTEM

AUI EXCHANGE PROGRAM COURSE MANAGEMENT SYSTEM SCHOOL OF SCIENCE AND ENGINEERING AUI EXCHANGE PROGRAM COURSE MANAGEMENT SYSTEM Capstone Project April 2017 Prepared by: Amine El Kaissi Supervised by : Dr. Naeem Nisar Sheikh Dr. Sedki Samadi Dr. Abdelkrim

More information

Ning Frequently Asked Questions

Ning Frequently Asked Questions Ning Frequently Asked Questions Ning is a Web tool that allows anyone to create a customizable social network, allowing users to share pictures and videos, maintain blogs, communicate in chat and discussion

More information

Session Booklet Social Media & Facebook

Session Booklet Social Media & Facebook Session Booklet Social Media & Facebook Social networking refers to the use of online social networks such as Facebook to communicate with other people. A social network can include blogs and other ways

More information

Introduction C H A P T E R1. Exercises

Introduction C H A P T E R1. Exercises C H A P T E R1 Introduction Chapter 1 provides a general overview of the nature and purpose of database systems. The most important concept in this chapter is that database systems allow data to be treated

More information

Care provider quality profiles on NHS Choices. Provider user guide

Care provider quality profiles on NHS Choices. Provider user guide Care provider quality profiles on NHS Choices Provider user guide October 2013 Page 1 of 32 User guide Contents Introduction... 3 Background... 4 Obtaining your editing rights... 5 Updating information...

More information

Overview of iclef 2008: search log analysis for Multilingual Image Retrieval

Overview of iclef 2008: search log analysis for Multilingual Image Retrieval Overview of iclef 2008: search log analysis for Multilingual Image Retrieval Julio Gonzalo Paul Clough Jussi Karlgren UNED U. Sheffield SICS Spain United Kingdom Sweden julio@lsi.uned.es p.d.clough@sheffield.ac.uk

More information

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Demetris Kyriacou Learning Societies Lab School of Electronics and Computer Science, University of Southampton

More information

Table of Contents. I) Project Planning. User Analysis. III) Tasks Analysis. IV) Storyboard. V) Function Design. VI) Scenario Design.

Table of Contents. I) Project Planning. User Analysis. III) Tasks Analysis. IV) Storyboard. V) Function Design. VI) Scenario Design. FINAL REPORT Table of Contents I) Project Planning II) User Analysis III) Tasks Analysis IV) Storyboard V) Function Design VI) Scenario Design VII) Database VIII) Usability Questionnaire IX) System Version

More information

Springer Science+ Business, LLC

Springer Science+ Business, LLC Chapter 11. Towards OpenTagging Platform using Semantic Web Technologies Hak Lae Kim DERI, National University of Ireland, Galway, Ireland John G. Breslin DERI, National University of Ireland, Galway,

More information

District 5910 Website Quick Start Manual Let s Roll Rotarians!

District 5910 Website Quick Start Manual Let s Roll Rotarians! District 5910 Website Quick Start Manual Let s Roll Rotarians! All Rotarians in District 5910 have access to the Members Section of the District Website THE BASICS After logging on to the system, members

More information

Joining the BRICKS Network - A Piece of Cake

Joining the BRICKS Network - A Piece of Cake Joining the BRICKS Network - A Piece of Cake Robert Hecht and Bernhard Haslhofer 1 ARC Seibersdorf research - Research Studios Studio Digital Memory Engineering Thurngasse 8, A-1090 Wien, Austria {robert.hecht

More information

How To Change My Wordpress Database

How To Change My Wordpress Database How To Change My Wordpress Database Password On Instagram Account Built by one of the world's largest Instagram browsers INK361, this comprehensive widget that can showcase your Instagram account in the

More information

TEN CONTENT COMMANDMENTS BEST PRACTICES FOR USABLE, ACCESSIBLE CONTENT

TEN CONTENT COMMANDMENTS BEST PRACTICES FOR USABLE, ACCESSIBLE CONTENT TEN CONTENT COMMANDMENTS BEST PRACTICES FOR USABLE, ACCESSIBLE CONTENT Leonard Houx Centre for Technology-Enhanced Learning About Leonard I am an E-Learning Content Developer at the Centre for Technology-Enhanced

More information

Team : Let s Do This CS147 Assignment 7 (Low-fi Prototype) Report

Team : Let s Do This CS147 Assignment 7 (Low-fi Prototype) Report Team : Let s Do This CS147 Assignment 7 (Low-fi Prototype) Report 1. Title, each team member s name & role Title: Let s Do This Roles: Divya - Developer. Eric - Developer, manager. Sami - User testing,

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM THE CODING BOOT CAMP FULL STACK FLEX PROGRAM CURRICULUM OVERVIEW FULL TIME The digital revolution has transformed virtually every area of human activity and you can be part of it as a web development professional.

More information

205CDE Developing the Modern Web. Assignment 2 Server Side Scripting. Scenario D: Bookshop

205CDE Developing the Modern Web. Assignment 2 Server Side Scripting. Scenario D: Bookshop 205CDE Developing the Modern Web Assignment 2 Server Side Scripting Scenario D: Bookshop Introduction This assignment was written using PHP programming language for interactions with the website and the

More information

DESIGN AND IMPLEMENTATION OF TOOL FOR CONVERTING A RELATIONAL DATABASE INTO AN XML DOCUMENT: A REVIEW

DESIGN AND IMPLEMENTATION OF TOOL FOR CONVERTING A RELATIONAL DATABASE INTO AN XML DOCUMENT: A REVIEW DESIGN AND IMPLEMENTATION OF TOOL FOR CONVERTING A RELATIONAL DATABASE INTO AN XML DOCUMENT: A REVIEW Sunayana Kohli Masters of Technology, Department of Computer Science, Manav Rachna College of Engineering,

More information

Automating Unpredictable Processes:

Automating Unpredictable Processes: Automating Unpredictable Processes: Building Responsive Apps using Business Rules By Carl Hewitt, Chief Architect, Decisions and Heath Oderman, CTO, Decisions Copyright 2016 Building Responsive Apps: Comparing

More information

Privacy Policy. When you create an account or use our Service, we collect the following types of information from you:

Privacy Policy. When you create an account or use our Service, we collect the following types of information from you: Privacy Policy Last updated: 24 th July, 2017 Welcome to Kwalee.com (the Site ), provided by Kwalee Ltd. ( Kwalee ). This Kwalee.com Privacy Policy ( Policy ) describes the information we gather from you

More information

Facebook Tutorial. An Introduction to Today s Most Popular Online Community

Facebook Tutorial. An Introduction to Today s Most Popular Online Community Facebook Tutorial An Introduction to Today s Most Popular Online Community Introduction to Facebook Facebook is the most popular social network, in the U.S. and internationally. In October 2011, more than

More information

Social Media. Best practice template and general guidance leaflet

Social Media. Best practice template and general guidance leaflet Social Media Best practice template and general guidance leaflet This leaflet is produced by members of and on behalf of the Marketing, PR and Communications Committee Rotary District 1220, United Kingdom.

More information

Learning and Development. UWE Staff Profiles (USP) User Guide

Learning and Development. UWE Staff Profiles (USP) User Guide Learning and Development UWE Staff Profiles (USP) User Guide About this training manual This manual is yours to keep and is intended as a guide to be used during the training course and as a reference

More information

Project design process by Heartgrenade

Project design process by Heartgrenade Project design process by Heartgrenade The following document aims to familiarize you with the process of software development that we carry out with our Clients. We divided it into subsequent steps and

More information

ITP 342 Mobile App Development. APIs

ITP 342 Mobile App Development. APIs ITP 342 Mobile App Development APIs API Application Programming Interface (API) A specification intended to be used as an interface by software components to communicate with each other An API is usually

More information

Augmented Reality Face Recognition For Mobile Devices

Augmented Reality Face Recognition For Mobile Devices Augmented Reality Face Recognition For Mobile Devices Gerry Hendrickx Faculty of Engineering, Department of Computer Science Katholieke Universiteit Leuven Hendrickx.gerry@gmail.com Abstract This paper

More information

10 TESTED LANDING PAGE ELEMENTS GUARANTEED TO IMPROVE CONVERSIONS

10 TESTED LANDING PAGE ELEMENTS GUARANTEED TO IMPROVE CONVERSIONS 10 TESTED LANDING PAGE ELEMENTS GUARANTEED TO IMPROVE CONVERSIONS CONTENTS 1. INTRODUCTION 2. WHAT IS A LANDING PAGE? 3. WHY IS A LANDING PAGE IMPORTANT? 5. THE 10 ESSENTIAL PAGE ELEMENTS 12. PUTTING IT

More information

What is Facebook? By

What is Facebook? By What is Facebook? By www.digitalunite.com Facebook is probably the best known of the social networking sites. Created in 2004 by Mark Zuckerberg and his friends, originally as a way for students at Harvard

More information

Lero Linx. Work programme Leaders User Guide

Lero Linx. Work programme Leaders User Guide Lero Linx Work programme Leaders User Guide Table of Contents 1 Overview... 3 2 Accessing the system... 3 3 Logging in... 4 4 Home page... 5 4.1 Menus... 5 4.2 Main Window... 6 4.3 View/Edit/Delete actions

More information

A Letting agency s shop window is no longer a place on the high street, it is now online

A Letting agency s shop window is no longer a place on the high street, it is now online A Letting agency s shop window is no longer a place on the high street, it is now online 1 Let s start by breaking down the two ways in which search engines will send you more traffic: 1. Search Engine

More information

A Task-Based Evaluation of an Aggregated Search Interface

A Task-Based Evaluation of an Aggregated Search Interface A Task-Based Evaluation of an Aggregated Search Interface No Author Given No Institute Given Abstract. This paper presents a user study that evaluated the effectiveness of an aggregated search interface

More information

Enterprise Architecture Building a Mobile Vision. David Hunt DCH Technology Services Gill Windall University of Greenwich

Enterprise Architecture Building a Mobile Vision. David Hunt DCH Technology Services Gill Windall University of Greenwich Enterprise Architecture Building a Mobile Vision David Hunt DCH Technology Services Gill Windall University of Greenwich What is Enterprise Architecture? Definition Enterprise Architecture is the practice

More information

Assignment 8 rekindl Local Community (1:30PM) Meet The Team. Ryan C. Amanda L. Sara V. James C.

Assignment 8 rekindl Local Community (1:30PM) Meet The Team. Ryan C. Amanda L. Sara V. James C. Hi-Fi Prototype Assignment 8 rekindl Local Community (1:30PM) Meet The Team Ryan C. Amanda L. Sara V. James C. Introduction Mission Statement: Reignite faded friendships. Problem Overview: Busy schedules

More information

Lo-Fidelity Prototype Report

Lo-Fidelity Prototype Report Lo-Fidelity Prototype Report Introduction A room scheduling system, at the core, is very simple. However, features and expansions that make it more appealing to users greatly increase the possibility for

More information

Information we collect about you: (Rewritten)

Information we collect about you: (Rewritten) Local Search Titan, LLC ( LST, "we", "us" or "our") respects the privacy of our users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. The intention of this

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 12 Tutorial 3 Part 1 Twitter API In this tutorial, we will learn

More information

Flow. Streamlining your creative process so you can pursue your passions. Hi-Fidelity Prototype Report

Flow. Streamlining your creative process so you can pursue your passions. Hi-Fidelity Prototype Report Flow Streamlining your creative process so you can pursue your passions. Problem and Solution Overview: Hi-Fidelity Prototype Report Genie Hyatt: Team Leader and Documentation Trijeet Mukhopadhyay: Designer

More information

EGR 4402 Capstone Design

EGR 4402 Capstone Design School of Science and Engineering SODEXO EGR 4402 Capstone Design Final Report Mohamed Salim Harras Supervised by: Dr. FALAH BOUCHAIB Spring 2015 1 P a g e Table of Contents Acknowledgement... 3 Abstract...

More information

Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden

Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden I. Background Information The mission of Gerri Holden Ministries is to provide academic programs

More information

Keeping your healthcare information secure: Simple security and privacy tips

Keeping your healthcare information secure: Simple security and privacy tips Keeping your healthcare information secure: Simple security and privacy tips This guide provides awareness of privacy settings that you can use to adjust your My Health Record to suit your own requirements.

More information

CSCI 6312 Advanced Internet Programming

CSCI 6312 Advanced Internet Programming CSCI 6312 Advanced Internet Programming Section 01, Spring 2018, W, 5:55pm - 8:25pm Instructor: Emmett Tomai Office: ENGR 3.2100 Phone: 665-7229 Email: emmett.tomai@utrgv.edu Office hours: W 1 3pm, TR

More information

Submission by Facebook Ireland Ltd to the Office of the Irish Data Protection Commissioner

Submission by Facebook Ireland Ltd to the Office of the Irish Data Protection Commissioner Submission by Facebook Ireland Ltd to the Office of the Irish Data Protection Commissioner Response to Complaint(s) Number: 3 & 11 The following submission by Facebook Ireland Ltd is a response to complaints

More information

Travello app: design process report

Travello app: design process report Travello app: design process report AND S The Problem While travelling in itself is a great experience and most people have positive memories from their trips, the planning and logistics can cause a lot

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM THE CODING BOOT CAMP AT UNC CHARLOTTE OVERVIEW: FULL STACK FLEX PROGRAM Prepare for a career as an end-to-end web developer at The Coding Boot Camp at UNC Charlotte. Our Full Stack Flex course gives you

More information

GRAPHICAL USER INTERFACE FOR BULK EDITING OF 3WORLDS ECOLOGICAL MODELS

GRAPHICAL USER INTERFACE FOR BULK EDITING OF 3WORLDS ECOLOGICAL MODELS RESEARCH SCHOOL OF COMPUTER SCIENCE COLLEGE OF ENGINEERING AND COMPUTER SCIENCE GRAPHICAL USER INTERFACE FOR BULK EDITING OF 3WORLDS ECOLOGICAL MODELS COMP6470 SPECIAL TOPICS IN COMPUTING Supervisors Dr.

More information

PROJECT SUMMARY Our group has chosen to conduct a usability study over

PROJECT SUMMARY Our group has chosen to conduct a usability study over LS 560 GROUP 2 Edmund Balzer Michelle Eisele Beth Keene Christine Remenih Usability Study PAGE 4 - CONSENT FORM: REMOTE USABILITY TEST PAGE 5 - SURVEY: QUESTIONS AND GRAPHED RESULTS PAGE 10 - REPORT: OBSERVATIONS,

More information

Data Mining with Elastic

Data Mining with Elastic 2017 IJSRST Volume 3 Issue 3 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Data Mining with Elastic Mani Nandhini Sri, Mani Nivedhini, Dr. A. Balamurugan Sri Krishna

More information

Image Similarity Measurements Using Hmok- Simrank

Image Similarity Measurements Using Hmok- Simrank Image Similarity Measurements Using Hmok- Simrank A.Vijay Department of computer science and Engineering Selvam College of Technology, Namakkal, Tamilnadu,india. k.jayarajan M.E (Ph.D) Assistant Professor,

More information

Programming: Computer Programming For Beginners: Learn The Basics Of Java, SQL & C Edition (Coding, C Programming, Java Programming, SQL

Programming: Computer Programming For Beginners: Learn The Basics Of Java, SQL & C Edition (Coding, C Programming, Java Programming, SQL Programming: Computer Programming For Beginners: Learn The Basics Of Java, SQL & C++ - 3. Edition (Coding, C Programming, Java Programming, SQL Programming, JavaScript, Python, PHP) PDF PLEASE NOTE: You

More information

CHAPTER 5 TESTING AND IMPLEMENTATION

CHAPTER 5 TESTING AND IMPLEMENTATION CHAPTER 5 TESTING AND IMPLEMENTATION 5.1. Introduction This chapter will basically discuss the result of the user acceptance testing of the prototype. The comments and suggestions retrieved from the respondents

More information

MSI Sakib - Blogger, SEO Researcher and Internet Marketer

MSI Sakib - Blogger, SEO Researcher and Internet Marketer About Author: MSI Sakib - Blogger, SEO Researcher and Internet Marketer Hi there, I am the Founder of Techmasi.com blog and CEO of Droid Digger (droiddigger.com) android app development team. I love to

More information

Functional Description Document (Version 1.0) A guide through of the underlying technologies for the semantic tagging application HydroTagger

Functional Description Document (Version 1.0) A guide through of the underlying technologies for the semantic tagging application HydroTagger HYDROTAGGER Functional Description Document (Version 1.0) A guide through of the underlying technologies for the semantic tagging application HydroTagger May 2008 Prepared by: Michael Piasecki Department

More information

A Tagging Approach to Ontology Mapping

A Tagging Approach to Ontology Mapping A Tagging Approach to Ontology Mapping Colm Conroy 1, Declan O'Sullivan 1, Dave Lewis 1 1 Knowledge and Data Engineering Group, Trinity College Dublin {coconroy,declan.osullivan,dave.lewis}@cs.tcd.ie Abstract.

More information

National College of Ireland BSc in Computing 2015/2016. Mahmoud Azzam LocalDeal. Final Report

National College of Ireland BSc in Computing 2015/2016. Mahmoud Azzam LocalDeal. Final Report National College of Ireland BSc in Computing 2015/2016 Mahmoud Azzam 13110241 X13110241@student.ncirl.ie LocalDeal Final Report Table of Contents Table of Contents Executive Summary... 4 1 Introduction...

More information

FB Image Contest. Users Manual

FB Image Contest. Users Manual FB Image Contest Users Manual Table of contents Description.. 3 Step by step installation... 5 The administration interface.. 10 Creating a new contest... 13 Creating a Facebook Application.. 19 Adding

More information

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc.

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc. March 13, 2010 Presented by: Noble Studios, Inc. 1 Communication Timeline 2 Familiar Social Media Sites According to Facebook, more than 1.5 million local businesses have active pages on Facebook According

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,

More information

How Often and What StackOverflow Posts Do Developers Reference in Their GitHub Projects?

How Often and What StackOverflow Posts Do Developers Reference in Their GitHub Projects? How Often and What StackOverflow Posts Do Developers Reference in Their GitHub Projects? Saraj Singh Manes School of Computer Science Carleton University Ottawa, Canada sarajmanes@cmail.carleton.ca Olga

More information

HOW-TO GUIDE. Join or Login. About this Guide!

HOW-TO GUIDE. Join or Login. About this Guide! HOW-TO GUIDE About this Guide In this guide, you will learn about each section of the online community to help you make the best use of all it has to offer. Here you will find information on: Join or Login

More information

Opinion 02/2012 on facial recognition in online and mobile services

Opinion 02/2012 on facial recognition in online and mobile services ARTICLE 29 DATA PROTECTION WORKING PARTY 00727/12/EN WP 192 Opinion 02/2012 on facial recognition in online and mobile services Adopted on 22 March 2012 This Working Party was set up under Article 29 of

More information