24,141 research outputs found
Recommended from our members
Couldn't or Wouldn't? the Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection
Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.Radio-Television-Fil
Literature Overview - Privacy in Online Social Networks
In recent years, Online Social Networks (OSNs) have become an important\ud
part of daily life for many. Users build explicit networks to represent their\ud
social relationships, either existing or new. Users also often upload and share a plethora of information related to their personal lives. The potential privacy risks of such behavior are often underestimated or ignored. For example, users often disclose personal information to a larger audience than intended. Users may even post information about others without their consent. A lack of experience and awareness in users, as well as proper tools and design of the OSNs, perpetuate the situation. This paper aims to provide insight into such privacy issues and looks at OSNs, their associated privacy risks, and existing research into solutions. The final goal is to help identify the research directions for the Kindred Spirits project
"If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps
Cloud storage services, like Dropbox and Google Drive, have growing
ecosystems of 3rd party apps that are designed to work with users' cloud files.
Such apps often request full access to users' files, including files shared
with collaborators. Hence, whenever a user grants access to a new vendor, she
is inflicting a privacy loss on herself and on her collaborators too. Based on
analyzing a real dataset of 183 Google Drive users and 131 third party apps, we
discover that collaborators inflict a privacy loss which is at least 39% higher
than what users themselves cause. We take a step toward minimizing this loss by
introducing the concept of History-based decisions. Simply put, users are
informed at decision time about the vendors which have been previously granted
access to their data. Thus, they can reduce their privacy loss by not
installing apps from new vendors whenever possible. Next, we realize this
concept by introducing a new privacy indicator, which can be integrated within
the cloud apps' authorization interface. Via a web experiment with 141
participants recruited from CrowdFlower, we show that our privacy indicator can
significantly increase the user's likelihood of choosing the app that minimizes
her privacy loss. Finally, we explore the network effect of History-based
decisions via a simulation on top of large collaboration networks. We
demonstrate that adopting such a decision-making process is capable of reducing
the growth of users' privacy loss by 70% in a Google Drive-based network and by
40% in an author collaboration network. This is despite the fact that we
neither assume that users cooperate nor that they exhibit altruistic behavior.
To our knowledge, our work is the first to provide quantifiable evidence of the
privacy risk that collaborators pose in cloud apps. We are also the first to
mitigate this problem via a usable privacy approach.Comment: Authors' extended version of the paper published at CODASPY 201
Young people and sexting in Australia: ethics, representation and the law
The Young People and Sexting in Australia report presents the findings of a qualitative study of young peopleâs understandings of, and responses to, current Australian laws, media and educational resources that address sexting.
The project, led by Dr Kath Albury involved a review of both international local and academic research as well as popular media addressing sexting, and a review of educational resources for young people. Three focus groups were conducted with young people aged 16 and 17 in 2012, and a working paper based on those findings was then distributed to adult stakeholders in the fields of law enforcement, youth and childrenâs legal support, education, criminology, media and communications, youth work, youth health care, counseling and youth health promotion
Emerging Opportunities: Monitoring and Evaluation in a Tech-Enabled World
Various trends are impacting on the field of monitoring and evaluation in the area of international development. Resources have become ever more scarce while expectations for what development assistance should achieve are growing. The search for more efficient systems to measure impact is on. Country governments are also working to improve their own capacities for evaluation, and demand is rising from national and community-based organizations for meaningful participation in the evaluation process as well as for greater voice and more accountability from both aid and development agencies and government.These factors, in addition to greater competition for limited resources in the area of international development, are pushing donors, program participants and evaluators themselves to seek more rigorous â and at the same time flexible â systems to monitor and evaluate development and humanitarian interventions.However, many current approaches to M&E are unable to address the changing structure of development assistance and the increasingly complex environment in which it operates. Operational challenges (for example, limited time, insufficient resources and poor data quality) as well as methodological challenges that impact on the quality and timeliness of evaluation exercises have yet to be fully overcome
A qualitative study of children, young people and 'sexting' : English
The purpose of this small scale qualitative research was to respond to and enhance our understandings of the complex nature of sexting and the role of mobile technologies within peer teen networks. It was designed as a pilot study â to investigate a phenomenon whose nature, scale and dimensions were unknown. Thus the research itself also was small in scale and exploratory in nature and also culturally and geographically specific. We conducted focus group interviews with 35 young people years 8 and 10 in two inner city London schools. At the focus groups we asked participants to friend us on Facebook, with a research Facebook profile. We then mapped some of their activities online and returned for 22 individual interviews with selected case study young people. We also interviewed key teachers and staff at the schools. The study found that threats from peers in digital social networks were more problematic for young people that âstranger dangerâ from adults. Digital technologies facilitated new visual cultures of surveillance, in which young women were pressured to send revealing body photos or asked to perform sexual services by text and through social networking sites. In this way, sexting aggravated peer hierarchies and forms of sexual harassment in schools, meaning that sexting was often coercive and was sometimes a form of cyberbullying. Girls were most negatively affected by âsextingâ in cultural contexts of increasing âsexualisationâ shaped by sexual double standards and boys had difficulty in challenging constructions of sexually aggressive masculinity. The research allowed for exploration of when pleasurable sexual flirtation through digital communication moved into sexual coercion and harassment, which was illustrated through narrative examples. Considering the relationship between online and offline risks it found sexual double standards in attitudes to digital sexual communication were linked to incidents of real playground sexual harassment and violence. Finally, it found that children at primary school age were being impacted by the coercive aspects of âsextingâ at an earlier age, than prior research indicated
- âŠ