Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (3)
- Law (3)
- Business (2)
- Communication (2)
- Communication Technology and New Media (2)
-
- Computer Sciences (2)
- Data Storage Systems (2)
- Internet Law (2)
- Physical Sciences and Mathematics (2)
- Science and Technology Studies (2)
- Arts and Humanities (1)
- Business Analytics (1)
- Business Law, Public Responsibility, and Ethics (1)
- Communications Law (1)
- Computer Law (1)
- Computer and Systems Architecture (1)
- Databases and Information Systems (1)
- Digital Communications and Networking (1)
- Ethics and Political Philosophy (1)
- Gaming Law (1)
- Genetics (1)
- Genetics and Genomics (1)
- Genomics (1)
- Graphics and Human Computer Interfaces (1)
- Human Factors Psychology (1)
- Journalism Studies (1)
- Law and Society (1)
- Life Sciences (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Publications and Research
According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …
The Impact Of User Control And Transparency In App Design On Privacy Concerns And Behavior Of Mobile App Users, Arwa Alawajy
The Impact Of User Control And Transparency In App Design On Privacy Concerns And Behavior Of Mobile App Users, Arwa Alawajy
Dissertations, Theses, and Capstone Projects
Mobile apps have unprecedented access to sensitive personal information. The increasing commodification of mobile-user data motivates us to explore the vital role of app developers in protecting users’ privacy. This dissertation examines the privacy of mobile app users from the perspective of HCI. According to Communication Privacy Management (CPM) theory, people believe they own their personal information and have the right to control how or with whom they share this information. In practice, individuals manage their privacy system and the boundaries between the public and private domain. Users make privacy disclosure decisions according to their individual characteristics and the perceptions …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …