45,318 research outputs found

    Cyberpsychology and Human Factors

    Get PDF
    The online environment has become a significant focus of the everyday behaviour and activities of individuals and organisations in contemporary society. The increasing mediation of communication has led to concerns about the potential risks and associated negative experiences which can occur to users, particularly children and young people. This is related to the emergence of the online environment as a location for criminal and abusive behaviour (e.g., harassment, sexual exploitation, fraud, hacking, malware). One of the key aspects of understanding online victimisation and engagement in criminal behaviours is the characteristics of online communication that are related to the affordances of the technologies, services and applications which constitute digital environments. The aim of this paper is to examine the influence of these characteristics on individual and group behaviour, as well as the associated opportunities for victimisation and criminal behaviour. These issues are of relevance for those involved in the design and implementation of technologies and services, as the ability to assess their potential use in this way can enhance strategies for improving the security of systems and users. It can also inform educational strategies for increasing user understanding of potential informational, privacy and personal risks, and associated steps to improve their security and privacy. Each of the main characteristics of mediated communication is examined, as well as their potential impact on individual and group behaviour, and associated opportunities for victimisation and offending. The article ends by considering the importance of recognising these issues when designing and implementing new technologies, services and applications

    Familiarity with Big Data, Privacy Concerns, and Self-disclosure Accuracy in Social Networking Websites: An APCO Model

    Get PDF
    Social networking websites have not only become the most prevalent communication tools in today’s digital age but also one of the top big data sources. Big data advocates promote the promising benefits of big data applications to both users and practitioners. However, public polls show evidence of heightened privacy concerns among Internet and social media users. We review the privacy literature based on protection motivation theory and the theory of planned behavior to develop an APCO model that incorporates novel factors that reflect users’ familiarity with big data. Our results, which we obtained from using a cross-sectional survey design and structural equation modeling (SEM) techniques, support most of our proposed hypotheses. Specifically, we found that that awareness of big data had a negative impact on and awareness of big data implications had a positive impact on privacy concerns. In turn, privacy concerns impacted self-disclosure concerns positively and self-disclosure accuracy negatively. We also considered other antecedents of privacy concerns and tested other alternative models to examine the mediating role of privacy concerns, to control for demographic variables, and to investigate different roles of the trust construct. Finally, we discuss the results of our findings and the theoretical and practical implications

    Examining the use of informal networks by NGOs in Azerbaijan and Georgia

    Get PDF
    To date little is known about the non-governmental organizations' (NGOs) use of informal networks, contacts and connections, as well as about the ‘informalization’ of post-communist civil society in the former Soviet Union. Research on the subject has been mostly restricted to the study of civil society organizations in Central Eastern Europe, the Balkans and Russia, leaving the use and significance of informality among the South Caucasus's NGOs largely ignored. Drawing on qualitative in-depth elite interviews, this study examines the importance of informal networking within the NGO sectors of post-Soviet-rule Azerbaijan and Georgia. The findings of this study document that in Azerbaijan and Georgia the practices of using informal networks of relying on patron–client relations with donors and of individuals using their positions within organizations for profit-making are widespread among the NGOs included in this research

    Namibia research situation analysis on orphans and other vulnerable children

    Full text link
    This item is archived in the repository for materials published for the USAID supported Orphans and Vulnerable Children Comprehensive Action Research Project (OVC-CARE) at the Boston University Center for Global Health and Development.Addressing the needs of orphans and vulnerable children (OVC) and mitigating negative outcomes of the growing OVC population worldwide is a high priority for national governments and international stakeholders across the globe that recognizes this as an issue with social, economic, and human rights dimensions. Assembling the relevant available data on OVC in one place, and acknowledging the gaps that still exist in our knowledge will assist policy makers and program implementers to make evidence-based decisions about how best to direct funding and program activities and maximize positive outcomes for children and their caretakers. This Research Situation Analysis, Namibia Country Brief presents a program-focused summary of available information on: • The number of orphans and vulnerable children in Namibia. • Current policies, programs and interventions designed and implemented to assist them. • Gaps in these policies, programs and interventions. • OVC research conducted between 2004-2008. • Gaps in the Namibian OVC evidence base.The Brief analyzes the available data for critical gaps in the national response and our understanding about whether current interventions are fulfilling the needs and improving the lives of vulnerable children. The report then recommends actions required to increase the knowledge base for improving the effectiveness and impact of OVC programs.The USAID | Project SEARCH, Orphans and Vulnerable Children Comprehensive Action Research (OVC-CARE) Task Order, is funded by the U.S. Agency for International Development under Contract No. GHH-I-00-07-00023-00, beginning August 1, 2008. OVC-CARE Task Order is implemented by Boston University. The opinions expressed herein are those of the authors and do not necessarily reflect the views of the funding agency

    Experimental investigations of #authenticity online

    Get PDF
    The concept of 'authenticity' is highly valued on social media sites (SMSes), despite its ambiguous nature and definition. One interpretation of 'authenticity' by media scholars is a human's congruence with online portrayals of themselves (e.g. posting spontaneous photographs from their lives, or using real biodata online). For marketers and 'influencers', these patterns of behaviour can achieve certain gains: sales for a business, or success of a campaign. For existentialist philosophers, using 'authenticity' as a means to an end is against its very definition. In this paper, I investigate what SMS users are looking for by their supposed 'authentic' portrayal online. My experimental approach draws upon empirical data from the Instagram social media site. Using machine learning techniques, descriptions and features of posts - including subjects, captions, and contexts - will be categorised and aggregated. I will then interpret these findings, drawing upon work by Taylor, Golomb, and Guignon, whose works on authenticity are based on mid-20th century existentalists. I argue that the existentialist ideals on authenticity are not necessarily present in contemporary SMS use. I will also argue that the popular interpretation of authenticity on SMSes can be self-defeating, when it seeks to turn the 'for-itself' into an 'in-itself'

    Vulnerability to social engineering in social networks : a proposed user-centric framework

    Get PDF
    Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays. Social engineering is an attacker technique to manipulate and deceive users in order to access or gain privileged information. Such attacks are continuously developed to deceive a high number of potential victims. The number of social engineering attacks has risen dramatically in the past few years, causing unpleasant damage both to organizations and individuals. Yet little research has discussed social engineering in the virtual environments of social networks. One approach to counter these exploits is through research that aims to understand why people fall victim to such attacks. Previous social engineering and deception research have not satisfactory identified the factors that influence the users' ability to detect attacks Characteristics that influence users' vulnerability must be investigated to address this issue and help to build a profile for vulnerable users in order to focus on increasing the training programs and education for those users. In this context, the present study proposes a user-centric framework to understand the user's susceptibility, relevant factors and dimensions

    The Importance of Transparency and Willingness to Share Personal Information

    Get PDF
    This study investigates the extent to which individuals are willing to share their sensitive personal information with companies. The study examines whether skepticism can influence willingness to share information. Additionally, it seeks to determine whether transparency can moderate the relationship between skepticism and willingness to share and whether 1) companies perceived motives, 2) individual’s prior privacy violations, 3) individuals’ propensity to take risks, and 4) individuals self-efficacy act as antecedents of skepticism. Partial Least Squares (PLS) regression is used to examine the relationships between all the factors. The findings indicate that skepticism does have a negative impact on willingness to share personal information and that transparency can reduce skepticis

    Measuring internet activity: a (selective) review of methods and metrics

    Get PDF
    Two Decades after the birth of the World Wide Web, more than two billion people around the world are Internet users. The digital landscape is littered with hints that the affordances of digital communications are being leveraged to transform life in profound and important ways. The reach and influence of digitally mediated activity grow by the day and touch upon all aspects of life, from health, education, and commerce to religion and governance. This trend demands that we seek answers to the biggest questions about how digitally mediated communication changes society and the role of different policies in helping or hindering the beneficial aspects of these changes. Yet despite the profusion of data the digital age has brought upon us—we now have access to a flood of information about the movements, relationships, purchasing decisions, interests, and intimate thoughts of people around the world—the distance between the great questions of the digital age and our understanding of the impact of digital communications on society remains large. A number of ongoing policy questions have emerged that beg for better empirical data and analyses upon which to base wider and more insightful perspectives on the mechanics of social, economic, and political life online. This paper seeks to describe the conceptual and practical impediments to measuring and understanding digital activity and highlights a sample of the many efforts to fill the gap between our incomplete understanding of digital life and the formidable policy questions related to developing a vibrant and healthy Internet that serves the public interest and contributes to human wellbeing. Our primary focus is on efforts to measure Internet activity, as we believe obtaining robust, accurate data is a necessary and valuable first step that will lead us closer to answering the vitally important questions of the digital realm. Even this step is challenging: the Internet is difficult to measure and monitor, and there is no simple aggregate measure of Internet activity—no GDP, no HDI. In the following section we present a framework for assessing efforts to document digital activity. The next three sections offer a summary and description of many of the ongoing projects that document digital activity, with two final sections devoted to discussion and conclusions
    • …
    corecore