194,359 research outputs found

    Ethics and social networking sites: A disclosive analysis of Facebook

    Get PDF
    Paper has been accepted for publication in Information, Technology and People.Purpose: This paper provides insights into the moral values embodied by a popular social networking site (SNS), Facebook. We adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site. Design/methodology/approach: This study is based upon qualitative field work, involving participant observation, conducted over a two year period. Findings: Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the Internet, we reveal the complex and diffuse nature of ethical responsibility in our case and the consequent implications for governance of SNS. Research limitations/implications: We situate our research in a body of work known as disclosive ethics and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with other authors in the genre, our work is largely descriptive, but we engage with prior research by Brey and Introna to highlight the scope for theory development. Practical implications: Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. We suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation. Originality/value: Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. We focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases

    An Empirical Study on Android for Saving Non-shared Data on Public Storage

    Get PDF
    With millions of apps that can be downloaded from official or third-party market, Android has become one of the most popular mobile platforms today. These apps help people in all kinds of ways and thus have access to lots of user's data that in general fall into three categories: sensitive data, data to be shared with other apps, and non-sensitive data not to be shared with others. For the first and second type of data, Android has provided very good storage models: an app's private sensitive data are saved to its private folder that can only be access by the app itself, and the data to be shared are saved to public storage (either the external SD card or the emulated SD card area on internal FLASH memory). But for the last type, i.e., an app's non-sensitive and non-shared data, there is a big problem in Android's current storage model which essentially encourages an app to save its non-sensitive data to shared public storage that can be accessed by other apps. At first glance, it seems no problem to do so, as those data are non-sensitive after all, but it implicitly assumes that app developers could correctly identify all sensitive data and prevent all possible information leakage from private-but-non-sensitive data. In this paper, we will demonstrate that this is an invalid assumption with a thorough survey on information leaks of those apps that had followed Android's recommended storage model for non-sensitive data. Our studies showed that highly sensitive information from billions of users can be easily hacked by exploiting the mentioned problematic storage model. Although our empirical studies are based on a limited set of apps, the identified problems are never isolated or accidental bugs of those apps being investigated. On the contrary, the problem is rooted from the vulnerable storage model recommended by Android. To mitigate the threat, we also propose a defense framework

    Engaging through social media. Part 1 social media explained

    Get PDF
    This guide is designed for youth project managers, and has the following aims "To explain social media technologies and functions using simple language. To provide you with the tools to increase interest and attendance at your project by working with young people and promoting your activities through social media.

    The digital glass house - Social networking and privacy

    Get PDF
    Since the explosion of the Internet age, nearly 2 billion people are connected to the World Wide Web, creating seemingly limitless opportunities for communication and collaboration including social networking. Communication is virtually instantaneous and vast amounts of information are available at the touch of a key.In such an open digital environment, we take it for granted that almost any information can be sourced online by anyone with Internet access.The rapid growth of the social networking sites (SNS) such as Facebook, which reaches 500 million users recently, has coincided with an increasing concern over personal privacy.This study examines how Facebook users' perceptions of privacy, frequency of use, and the disclosure of their personal information with other users. This study was guided by two research questions: What are the Facebook users' perceptions of privacy and what is the personal information they disclose to other users? Does the Facebook users' frequency of use affect their disclosure of personal information? 149 respondents from the researcher's own Facebook profile filled up a Web-based questionnaire in August 2010. The data was analyzed using descriptive and inferential statistics.The research hypothesized that higher levels of privacy perception will result in less disclosure of personal information and the more active a user is on Facebook, the greater will be the user's likelihood of maintaining a private profile. The results of chi-square tests and correlation analysis found significant positive relationships between privacy perception and the disclosure of personal information, and no significant relationships between frequency of use and disclosure of personal information. Recommendations for future researchers were also included

    Online Privacy as a Collective Phenomenon

    Full text link
    The problem of online privacy is often reduced to individual decisions to hide or reveal personal information in online social networks (OSNs). However, with the increasing use of OSNs, it becomes more important to understand the role of the social network in disclosing personal information that a user has not revealed voluntarily: How much of our private information do our friends disclose about us, and how much of our privacy is lost simply because of online social interaction? Without strong technical effort, an OSN may be able to exploit the assortativity of human private features, this way constructing shadow profiles with information that users chose not to share. Furthermore, because many users share their phone and email contact lists, this allows an OSN to create full shadow profiles for people who do not even have an account for this OSN. We empirically test the feasibility of constructing shadow profiles of sexual orientation for users and non-users, using data from more than 3 Million accounts of a single OSN. We quantify a lower bound for the predictive power derived from the social network of a user, to demonstrate how the predictability of sexual orientation increases with the size of this network and the tendency to share personal information. This allows us to define a privacy leak factor that links individual privacy loss with the decision of other individuals to disclose information. Our statistical analysis reveals that some individuals are at a higher risk of privacy loss, as prediction accuracy increases for users with a larger and more homogeneous first- and second-order neighborhood of their social network. While we do not provide evidence that shadow profiles exist at all, our results show that disclosing of private information is not restricted to an individual choice, but becomes a collective decision that has implications for policy and privacy regulation

    An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)

    Get PDF
    Social networking sites (SNS) like MySpace, Facebook and LinkedIn now have hundreds of millions of users. In this paper a quantitative approach was used to analyse primary data collected about SNS users. Our findings show that SNS users are dominated by younger adults, higher education levels and higher income levels. SNSs are more likely to be used for maintaining existing friendships as opposed to establishing new friendships and for building business networks. SNS users either have poor levels of privacy and security awareness or high levels of complacency in relation to SNS profile sharing and sharing their identity online

    Gay men, Gaydar and the commodification of difference

    Get PDF
    Purpose To investigate ICT mediated inclusion and exclusion in terms of sexuality through a study of a commercial social networking website for gay men Design/methodology/approach The paper uses an approach based on technological inscription and the commodification of difference to study Gaydar, a commercial social networking site. Findings Through the activities, events and interactions offered by Gaydar, we identify a series of contrasting identity constructions and market segmentations which are constructed through the cyclic commodification of difference. These are fuelled by a particular series of meanings attached to gay male sexualities which serve to keep gay men positioned as a niche market. Research limitations/implications The research centres on the study of one, albeit widely used, website with a very specific set of purposes. The study offers a model for future research on sexuality and ICTs. Originality/value This study places sexuality centre stage in an ICT mediated environment and provides insights into the contemporary phenomenon of social networking. As a sexualized object, Gaydar presents a semiosis of politicized messages that question heteronormativity while simultaneously contributing to the definition of an increasingly globalized, commercialized and monolithic form of gay male sexuality defined against ICT

    XMPP and iDTV or how to make television a social medium

    Get PDF
    Instant Messaging (IM) has the potential to become one of the killer applications for interactive Digital Television (iDTV) [12]. However, several factors make it difficult to provide a good implementation of IM services, among which the limited resources of a set-top box and the different user experience compared to computer environments. This paper proposes the XMPP (Extensible Messaging and Presence Protocol) standard as a solution for implementing IM. When we compare XMPP with other technologies, it reveals itself to be very well adapted to the specific needs of iDTV middleware platforms like the Multimedia Home Platform (MHP) [5]. Moreover, the use of XMPP doesn't limit itself to IM The flexible architecture of XMPP opens a window of opportunities like the ease of adding new interactive services. To demonstrate the possibilities of XMPP on MHP, an IM client -IM4MHP- is presented in this paper

    Good practice guidance for the providers of social networking and other user-interactive services

    Get PDF

    Linked Into a Job?: the Ethical Considerations of Recruiting Through LinkedIn

    Get PDF
    LinkedIn’s goal is to help business professionals meet, make business deals, inquire about jobs, and find careers through connections with people that members already know. This research study will investigate the ethical practices of LinkedIn recruitment. Students’ awareness of the methods for effective use, as well as the damaging elements of a LinkedIn profile will be examined. LinkedIn is an effective, helpful tool for recruiting candidates and for job searching; however, the best results will come to those who use LinkedIn professionally and with caution. Our findings indicate that despite its risks, jobseekers and employers can benefit from using LinkedIn
    • 

    corecore