42,565 research outputs found
Recommended from our members
Couldn't or Wouldn't? the Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection
Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.Radio-Television-Fil
Data protection, safeguarding and the protection of children's privacy: exploring local authority guidance on parental photography at school events
Should parents be allowed to take photographs at school events? Media reports suggest that increasingly schools are answering no to this question, either prohibiting or imposing stringent restrictions upon such photography. The legal justifications for such restrictions are, however, unclear. Accordingly, in 2013 freedom of information requests were sent to local education authorities across England, Scotland and Wales, the aim being to determine what advice local education authorities provide to schools in relation to parental photography at school events, and to identify how education authorities’ understandings of the law influence the advice they offer. That research reveals that local education authorities’ understandings of the law vary significantly and that where authorities do not fully appreciate the extent of the legal obligations arising this may have significant repercussions for the children concerned
Data protection, safeguarding and the protection of children's privacy: exploring local authority guidance on parental photography at school events
Should parents be allowed to take photographs at school events? Media reports suggest that increasingly schools are answering no to this question, either prohibiting or imposing stringent restrictions upon such photography. The legal justifications for such restrictions are, however, unclear. Accordingly, in 2013 freedom of information requests were sent to local education authorities across England, Scotland and Wales, the aim being to determine what advice local education authorities provide to schools in relation to parental photography at school events, and to identify how education authorities’ understandings of the law influence the advice they offer. That research reveals that local education authorities’ understandings of the law vary significantly and that where authorities do not fully appreciate the extent of the legal obligations arising this may have significant repercussions for the children concerned
Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do
Smartphone apps can harvest very personal details
from the phone with ease. This is a particular privacy concern.
Unthinking installation of untrustworthy apps constitutes risky
behaviour. This could be due to poor awareness or a lack of knowhow:
knowledge of how to go about protecting privacy. It seems
that Smartphone owners proceed with installation, ignoring any
misgivings they might have, and thereby irretrievably sacrifice
their privacy
Building trustworthy e-Commerce wesite
The process of building consumer trust in E-Commerce is based on the presence of trust features or trust attributes in the websites. Consumer may examine e-Commerce websites for the existence of trust attributes. However, to date, which trust attributes contribute to the website’s trustworthiness and which trust attributes give more value to consumer has not been adequately explored. Therefore, the purpose of the paper is to look for the relevant trust attributes for e-Commerce websites and to identify the importance ranking of trust attributes that contribute significantly to the trustworthiness of e-Commerce website. Various journal papers and articles related to e-Commerce field have been referred in order to identify the trust attributes. An online survey that received 1230 respondents was carried out to investigate the importance ranking of ten trust attributes. The paper contributes to the discussion on how to build trust in e-Commerc
- …