Remove tag psychology
article thumbnail

Success of AI in academic libraries depends on underlying data

CILIP

s Life Tags project is a searchable archive of Life magazine photographs that used artificial intelligence to attach hundreds of tags to organize the archive. Pattern recognition is studied in many fields, including psychology, ethology, cognitive science and computer science. Article continues below advertisement.

article thumbnail

California Consumer Privacy Act: GDPR-like definition of personal information

Data Protection Report

In addition, the Act specifies that any “inferences drawn” from various data elements of PI “to create a profile about a consumer reflecting the consumer’s preference, characteristics, psychological trends, preferences, predispositions, behavior, attitudes, intelligence, abilities and aptitudes” constitutes PI.

GDPR 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recommended reading for Knowledge Audits

ChiefTech

1997, ‘The information audit' , Journal of Managerial Psychology , Vol. Technorati Tags: KM , Knowledge Management , Knowledge Audits 2003, ‘From Unstructured Data to Actionable Intelligence' [PDF], IT Pro, Nov-Dec 2003, pp.29-35. Wexler, M.N., 5, Number 3, pp.249-263.

article thumbnail

The Power of the Record

Brandeis Records Manager

Facebook recently added “disputed” tags to bogus social media news that users flag, or that sniff test sites like snopes.com debunk. By the fifth night, he realized he had to do something, psychologically, before losing his mind. In our “Is not!” “Is,

article thumbnail

Information Architecture for Audio: Doing It Right - Boxes and Arrows: The design behind the design

ChiefTech

The most important professions we can learn from include: Information Architecture Journalism Educational Psychology Usability Engineering Interface Design Information Architecture for Audio The principles of information architecture are exactly what you need to create usable audio. Conclusion (i.e. Include metadata (i.e.

article thumbnail

A Soccer Field on the Data Center, Chickens in the Parking Lot - in Northern Virginia

Interactive Information Management

They become (and currently are) an attractant for other data centers, service providers and a well-educated workforce, a magnet, the "cool factor", a "symbol of transformation", generating tons of political capital and psychological benefit – which tends to be very desirable and valuable in this area near Washington DC.

article thumbnail

How DMARC Can Protect Against Ransomware

eSecurity Planet

The costs of ransomware attacks can be massive, including downtime, data loss, and significant psychological damages for the teams. Every DMARC record must have at least two tag-value pairs: v=DMARC1. Cyber extortion is a common concern. You can use easydmarc tools to check if you have a valid DKIM record. DMARC Policy.