80 research outputs found

    Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review

    Full text link
    Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft

    Why We Don’t Block 3rd Party Trackers: An Attributional Theory Perspective

    Get PDF
    Research on online consumer privacy typically relies on the trust-risk framework to explain users’ reactions to perceived privacy threats. However, little is known about such reactions in the context of third party tracking, where there is no explicitly defined agent to be trusted. In this research-in-progress, we propose an that in these situations users rely to the their attributional styles to shape their future actions. We present a model that predicts behavioral intentions based on traditional protection motivation theory and complements it with the construct of attributional style

    SocBridge: Bridging the gap between Online Social Networks

    Get PDF

    Web 2.0 and Internet Social Networking: A New tool for Disaster Management? - Lessons from Taiwan

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Internet social networking tools and the emerging web 2.0 technologies are providing a new way for web users and health workers in information sharing and knowledge dissemination. Based on the characters of immediate, two-way and large scale of impact, the internet social networking tools have been utilized as a solution in emergency response during disasters. This paper highlights the use of internet social networking in disaster emergency response and public health management of disasters by focusing on a case study of the typhoon Morakot disaster in Taiwan.</p> <p>Discussion</p> <p>In the case of typhoon disaster in Taiwan, internet social networking and mobile technology were found to be helpful for community residents, professional emergency rescuers, and government agencies in gathering and disseminating real-time information, regarding volunteer recruitment and relief supplies allocation. We noted that if internet tools are to be integrated in the development of emergency response system, the accessibility, accuracy, validity, feasibility, privacy and the scalability of itself should be carefully considered especially in the effort of applying it in resource poor settings.</p> <p>Summary</p> <p>This paper seeks to promote an internet-based emergency response system by integrating internet social networking and information communication technology into central government disaster management system. Web-based networking provides two-way communication which establishes a reliable and accessible tunnel for proximal and distal users in disaster preparedness and management.</p

    Privacy and Online Social Networks: A Systematic Literature Review of Concerns, Preservation, and Policies

    Get PDF
    Background: Social media usage is one of the most popular online activities, but with it comes privacy concerns due to how personal data are handled by these social networking sites. Prior literature aimed at identifying users’ privacy concerns as well as user behavior associated with privacy mitigation strategies and policies. However, OSN users continue to divulge private information online and privacy remains an issue. Accordingly, this review aims to present extant research on this topic, and to highlight any potential research gaps. Method: The paper presents a systematic literature review for the period 2006 - 2021, in which 33 full papers that explored privacy concerns in online social networks (OSN), users’ behavior associated with privacy preservation strategies and OSN privacy policies were examined. Results: The findings indicate that users are concerned about their identity being stolen, the disclosure of sensitive information by third-party applications and through data leakage and the degree of control users have over their data. Strategies such as encryption, authentication, and privacy settings configuration, can be used to address users’ concerns. Users generally do not leverage privacy settings available to them, or read the privacy policies, but will opt to share information based on the benefits to be derived from OSNs. Conclusion: OSN users have specific privacy concerns due primarily to the inherent way in which personal data are handled. Different preservation strategies are available to be used by OSN users. Policies are provided to inform users, however, these policies at times are difficult to read and understand, but studies show that there is no direct effect on the behavior of OSN users. Further research is needed to elucidate the correlation between the relative effectiveness of different privacy preservation strategies and the privacy concerns exhibited by users. Extending the research to comparatively assess different social media sites could help with better awareness of the true influence of privacy policies on user behavior

    #DeathToFreedomOfSpeech

    Get PDF
    In this analysis the author sets out to examine the concept of freedom of speech on the internet, drawing upon the development of the World Wide Web, the Big-Data-Trade-Off-Dilemma and the nothing-to-hide argument fallacy. A key finding is the observation of a multitude of emerging challenges in the field of ethics, privacy, law and security. Furthermore the most recent exertion of influence on the freedom of speech, that is to say astroturfing should adduce as an instance to demonstrate the possibilities of manipulating public opinion. Further on, the analysis of governmental military enhancement programmes and the example of a recent entertainment programme production shall serve as a visualisation that the research on unprecedented signal resolution and datatransfer bandwidth between the brain and electronics might be far more close to reality than one might be expecting. The results suggest that the freedom of speech is preceded by the freedom of thinking. Its manipulation on a bigger scale (e.g. national elections) could serve as a new way of psychological warfare and therefore the freedom of thinking, or the right to a free mind should remain unviolated
    • …
    corecore