4,155 research outputs found

    Mobile Privacy and Business-to-Platform Dependencies: An Analysis of SEC Disclosures

    Get PDF
    This Article systematically examines the dependence of mobile apps on mobile platforms for the collection and use of personal information through an analysis of Securities and Exchange Commission (SEC) filings of mobile app companies. The Article uses these disclosures to find systematic evidence of how app business models are shaped by the governance of user data by mobile platforms, in order to reflect on the role of platforms in privacy regulation more generally. The analysis of SEC filings documented in the Article produces new and unique insights into the data practices and data-related aspects of the business models of popular mobile apps and shows the value of SEC filings for privacy law and policy research more generally. The discussion of SEC filings and privacy builds on regulatory developments in SEC disclosures and cybersecurity of the last decade. The Article also connects to recent regulatory developments in the U.S. and Europe, including the General Data Protection Regulation, the proposals for a new ePrivacy Regulation and a Regulation of fairness in business-to-platform relations

    Why Do People Adopt, or Reject, Smartphone Password Managers?

    Get PDF
    People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time consuming and arduous on small devices. Many of the memory- and inconvenience-related issues can be ameliorated by using a password manager app. Such an app can generate, remember and automatically supply passwords to websites and other apps on the phone. Given this potential, it is unfortunate that these applications have not enjoyed widespread adoption. We carried out a study to find out why this was so, to investigate factors that impeded or encouraged password manager adoption. We found that a number of factors mediated during all three phases of adoption: searching, deciding and trialling. The study’s findings will help us to market these tools more effectively in order to encourage future adoption of password managers

    Opportunities and threats for the launch of a smartphone app

    Get PDF
    Field lab: Entrepreneurial and innovative venturesThe following work project illustrates the opportunities and threats of the industry for the launch of a smartphone app. In the first part, the technological and economic contextual drivers are analyzed in-depth through the study of key variables for the proliferation of the industry. In the second part, the characteristics of the market are exposed through a market assessment including an analysis of the industry rivalry and industry mapping. The political, legal and ethical concerns emergent from the launch of a new smartphone app are then illustrated with the use of two case studies

    Why Do They Post? Motivations and Uses of Snapchat, Instagram and Twitter among Kuwait College Students

    Get PDF
    This study explores the differences between Snapchat, Instagram, and Twitter in terms of intensity of use and use motivations. Grounded in the theory of Uses and Gratifications, the current research compares the three platforms with exploratory factor analysis. A cross-sectional survey methodology of college students in Kuwait (N=692) asked respondents to identify the time they spend using social media, satisfaction with social media content, the intensity of using Instagram, Snapchat and Twitter as well as seven use motivations. The analysis of the data indicated that Instagram is the most popular platform among social media users, while Snapchat intensity of use is the highest. Based on the factor analysis results, motivations to use Snapchat are passing the time, self-expression, self-presentation, and entertainment. While the motivations to use Twitter are self-presentation, entertainment, and social interaction. Finally, passing time, social interaction, self-presentation, and entertainment are the motivations to use Instagram

    Jealousy due to social media? A systematic literature review and framework of social media-induced jealousy

    Get PDF
    Purpose The association between social media and jealousy is an aspect of the dark side of social media that has garnered significant attention in the past decade. However, the understanding of this association is fragmented and needs to be assimilated to provide scholars with an overview of the current boundaries of knowledge in this area. This systematic literature review (SLR) aims to fulfill this need. Design/methodology/approach The authors undertake an SLR to assimilate the current knowledge regarding the association between social media and jealousy, and they examine the phenomenon of social media-induced jealousy (SoMJ). Forty-five empirical studies are curated and analyzed using stringent protocols to elucidate the existing research profile and thematic research areas. Findings The research themes emerging from the SLR are (1) the need for a theoretical and methodological grounding of the concept, (2) the sociodemographic differences in SoMJ experiences, (3) the antecedents of SoMJ (individual, partner, rival and platform affordances) and (4) the positive and negative consequences of SoMJ. Conceptual and methodological improvements are needed to undertake a temporal and cross-cultural investigation of factors that may affect SoMJ and acceptable thresholds for social media behavior across different user cohorts. This study also identifies the need to expand current research boundaries by developing new methodologies and focusing on under-investigated variables. Originality/value The study may assist in the development of practical measures to raise awareness about the adverse consequences of SoMJ, such as intimate partner violence and cyberstalking.publishedVersio

    Understanding Youth Image-Based Sexual Abuse: The Role of Context and Police Discretion

    Get PDF
    There has been much written about youth image-sharing and particularly ‘sexting’ over the years. Academics have explored different facets of these experiences including the role of consent, its gendered nature and proximity to relationship abuse. However, even with these investigations, there is a need to identify and understand harmful image-sharing in more depth, specifically, what is described in this research as youth image-based sexual abuse. Using knowledge about child sexual abuse images and image-based sexual abuse, this thesis intends to explore in more detail how youth image-based sexual abuse is experienced, focusing in on two themes, context, and police discretion. A mixed methods approach was utilised, including an analysis of Freedom of Information responses from Police forces in England and Wales and semi-structured interviews. Findings collated from the Freedom of Information responses provided details on different youth image-based sexual abuse offences, including the gender and age of victims and suspects. A total of 26 participants were interviewed, 18 police officers of different ranks and 8 practitioners, whose professions ranged from specialist sex and relationships educators to youth workers. The interviews shed light on the complexities of youth image-based sexual abuse, such as which cases are encountered by police and practitioners, what challenges are presented as well as how decision-making is navigated. Further themes were identified when quantitative and qualitative findings were analysed collectively, such as the impact of the situational and individual context on youth image-based sexual abuse, the degree to which police discretion is applied thematically throughout these cases, and the many challenges which police, practitioners and young people face. This thesis makes an original contribution by examining in depth the nature of youth image-based sexual abuse, as well as highlighting the influence policing and police discretion has

    Web Social Media Privacy Preferences and Perception

    Get PDF
    The proliferation of social media websites has led to concerns over privacy breaches, as these sites have access to users' sensitive and personal data. This study sought to investigate users' perceptions and concerns for social media websites, with the aim of developing a system that meets their requirements. To achieve this, a questionnaire was designed for privacy permissions on eight popular social media websites, and 425 completed answers were analyzed. The results revealed that users' concerns were diverse and differed across different social media platforms. Gender, age, education level, and IT proficiency were found to be weakly correlated with privacy concerns. Women expressed greater concerns than men, particularly for Twitter and Snapchat, while older users expressed greater levels of concern for Snapchat and Instagram. As education levels increased, users tended to express greater levels of concern, especially on WhatsApp and Snapchat. Furthermore, this study identified four hierarchical clusters of users based on their preferences and concerns regarding permission privacy for social media websites. The results revealed that the majority of participants (214 users) were highly concerned about privacy on social media, indicating that they were aware of the potential risks associated with sharing personal information online which represents the third cluster. The first and fourth clusters were the most unconcerned groups regarding permission privacy, consisting of a small number of users. The second cluster, comprising 124 participants, had an average score of 1.6, indicating that they were the second most concerned about privacy. Overall, the findings of this study could be useful for social media platforms in developing privacy policies and settings that align with users' concerns and preferences
    • 

    corecore