Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Communication

Privacy

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 105

Full-Text Articles in Social and Behavioral Sciences

Boundary Regulation Processes And Privacy Concerns With (Non-)Use Of Voice-Based Assistants, Jessica Vitak, Priya C. Kumar, Yuting Liao, Michael Zimmer Jul 2023

Boundary Regulation Processes And Privacy Concerns With (Non-)Use Of Voice-Based Assistants, Jessica Vitak, Priya C. Kumar, Yuting Liao, Michael Zimmer

Human-Machine Communication

An exemplar of human-machine communication, voice-based assistants (VBAs) embedded in smartphones and smart speakers simplify everyday tasks while collecting significant data about users and their environment. In recent years, devices using VBAs have continued to add new features and collect more data—in potentially invasive ways. Using Communication Privacy Management theory as a guiding framework, we analyze data from 11 focus groups with 65 US adult VBA users and nonusers. Findings highlight differences in attitudes and concerns toward VBAs broadly and provide insights into how attitudes are influenced by device features. We conclude with considerations for how to address boundary regulation …


Hiv Stalks Bodies Like Mine: An Autoethnography Of Self-Disclosure, Stigmatized Identity, And (In)Visibility In Queer Lived Experience, Steven Ryder Mar 2023

Hiv Stalks Bodies Like Mine: An Autoethnography Of Self-Disclosure, Stigmatized Identity, And (In)Visibility In Queer Lived Experience, Steven Ryder

USF Tampa Graduate Theses and Dissertations

This dissertation examines self-disclosure of Human Immunodeficiency Virus (HIV) status within the context of communication between long-standing friends. For the purposes of my study, I define this type of friendship as those who have known me for at least two years and with whom I communicate regularly. These are friends who tend to know a variety of personal details about me, ranging from superficial to private and trivial to essential. I use autoethnography to ground the study in my lived experience. By doing so, I present intimate accounts of my communication with others across my lifespan to function as background …


We're All Friends Here: Examining Transparasocial Interaction On Twitch And Its Effects On Strategic Communications, Alexander Edward Carter Aug 2022

We're All Friends Here: Examining Transparasocial Interaction On Twitch And Its Effects On Strategic Communications, Alexander Edward Carter

Doctoral Dissertations

In this paper, the author examines advertising on the video game live streaming platform, Twitch. Using a 2 (presence/absence of Transparasocial Interaction) x 2 (presence/absence of self-disclosure by the streamer), this study seeks to gain a better understanding of community perceptions of influencers, and advertising on the Twitch platform, a subject that is only recently becoming a topic of interest for advertising scholars.


Bathroom Battlegrounds Book Review, Lauren Carlton Jul 2022

Bathroom Battlegrounds Book Review, Lauren Carlton

Pepperdine Journal of Communication Research

No abstract provided.


Online Privacy Challenges And Their Forensic Solutions, Bandr Fakiha Jun 2022

Online Privacy Challenges And Their Forensic Solutions, Bandr Fakiha

Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث

In the digital age, internet users are exposed to privacy issues online. Few rarely know when someone else is eavesdropping or about to scam them. Companies, governments, and individual internet users are all vulnerable to security breaches due to the challenges of online privacy ranging from trust and hierarchical control to financial losses. As systems advance, people are optimistic that forensic science will provide long-term interventions that surpass the current solutions, including setting stronger passwords and firewall protection. The future of online privacy is changing, and more practical interventions, such as email, malware, mobile, and network forensics, must be integrated, …


Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He May 2022

Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He

Dissertations

Blockchain can be defined as an immutable ledger for recording transactions, maintained in a distributed network of mutually untrusting peers. Blockchain technology has been widely applied to various fields beyond its initial usage of cryptocurrency. However, blockchain itself is insufficient to meet all the desired security or efficiency requirements for diversified application scenarios. This dissertation focuses on two core functionalities that blockchain provides, i.e., robust storage and reliable computation. Three concrete application scenarios including Internet of Things (IoT), cybersecurity management (CSM), and peer-to-peer (P2P) content delivery network (CDN) are utilized to elaborate the general design principles for these two main …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


How The Social Media Phenomena Of Publishing Private And Personal Information About Prominent Public Figures Is Influencing Ethical Decision Making By Legacy Media Editors, Evelyne Nyakiega Kahungu Feb 2022

How The Social Media Phenomena Of Publishing Private And Personal Information About Prominent Public Figures Is Influencing Ethical Decision Making By Legacy Media Editors, Evelyne Nyakiega Kahungu

Theses & Dissertations

The social media revolution continues to impact legacy media’s ethical decision-making protocols, especially when dealing with private and personal information of public figures published on these platforms by non-legacy media actors. The objectives of this study were: to examine the ethical dilemmas that legacy media editors are confronted with when private and confidential information of public figures is reported by non-legacy media content producers; to determine what considerations legacy media journalists make before publishing that information on their platforms; to assess the ethical decision-making protocols that legacy media editors in Kenya follow when dealing with the private information of public …


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


The Implications And Concerns Of Algorithms In The Modern World, Melody Scott, Isabella Kear, Camden Morris, Michaela Dolph Jan 2022

The Implications And Concerns Of Algorithms In The Modern World, Melody Scott, Isabella Kear, Camden Morris, Michaela Dolph

Belmont University Research Symposium (BURS)

In an ever emerging world of technology and advancements, there should be an increase in the importance and awareness of what each user is allowing and agreeing to on the Internet. Algorithms are becoming a part of everyday life, and many individuals don’t know just how much of their data, personal information, and privacy is being violated and collected from different companies and applications that they use. There needs to be an increase in the awareness and acknowledgement of algorithms and the “F.E.A.T” principles that companies should be following. New technologies from companies, like Google and Nimo, that are considered …


A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan Jan 2022

A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan

Dickinson Law Review (2017-Present)

Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.

Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …


Shedding Light On Dark Patterns: A Case Study On Digital Harms, Noreen Y. Whysel Apr 2021

Shedding Light On Dark Patterns: A Case Study On Digital Harms, Noreen Y. Whysel

Publications and Research

You’ve been there before. You thought you could trust someone with a secret. You thought it would be safe, but found out later that they blabbed to everyone. Or maybe they didn’t share it, but the way they used it felt manipulative. You gave more than you got and it didn’t feel fair. But now that it’s out there, do you even have control anymore?

Ok. Now imagine that person was your supermarket. Or your bank. Or your boss.

As designers of digital spaces for consumer products and services, how often do we consider the relationship we have with our …


The Internet Never Forgets: Student Journalists Meet The "Right To Be Forgotten", Emily R. Feek Apr 2021

The Internet Never Forgets: Student Journalists Meet The "Right To Be Forgotten", Emily R. Feek

WWU Honors College Senior Projects

This study examines how journalists at college publications handle unpublishing requests in the context of United States media law, the European Union's Right to be Forgotten and journalistic ethics. Interviews with student editors at Washington state public universities' student newspapers were used to examine how student publications address requests for information or entire articles to be unpublished and what those editors' attitudes toward unpublishing are. This research reveals that this subset of student journalists tended to favor alternatives to unpublishing, although articles could be removed ethically in some select cases, and a lack of consistent guidelines regarding how to manage …


Privacy Inside Soviet Communal Life In The Film Дылда By Kantemir Balagov, Erischa Dwi Shintamega, Thera Widyastuti Jan 2021

Privacy Inside Soviet Communal Life In The Film Дылда By Kantemir Balagov, Erischa Dwi Shintamega, Thera Widyastuti

International Review of Humanities Studies

Russia has a culture of communal living that already existed far before the Soviet era. In the soviet regime, communal living was seen as an instrument to reach Soviet’s utopian objective. In order to minimize dissident movements and rebellions, people are pressed to live together so they can watch each other. As a result, no Russian word could describe privacy, the concept itself did not grow in Russian society. Although consciousness of privacy needs began to grow. In the meantime, people around the world start to fix privacy issues by formulating the law, while Soviet people still dealing with the …


Matthew Potolsky’S The National Security Sublime: On The Aesthetics Of Government Secrecy, Nolan Higdon Jan 2021

Matthew Potolsky’S The National Security Sublime: On The Aesthetics Of Government Secrecy, Nolan Higdon

Secrecy and Society

Matthew Potolsky’s brilliantly woven The National Security Sublime: On the Aesthetics of Government Secrecy offers a powerful and engaging discussion of national security and government secrecy. His findings concerning the influence artists have on citizens’ perception of national security is a major contribution to the field. It highlights Americans false sense of awareness regarding government secrecy, that in itself enables government secrecy. Potolsky has made a massive contribution to the study of government secrecy that is sure to spark future research concerning the intersection of national security and aesthetics.


Effects Of Website Credibility And Brand Trust On Responses To Online Behavioral Advertising, Xiaowen Xu, Tai-Yee Wub, David J. Atkin Jan 2021

Effects Of Website Credibility And Brand Trust On Responses To Online Behavioral Advertising, Xiaowen Xu, Tai-Yee Wub, David J. Atkin

Scholarship and Professional Work - Communication

Online behavioral advertising that tracks user data has witnessed a dramatic increase in popularity. Using Psychological Reactance Theory, this study examines the effects of brand trust and website credibility on responses to behavioral advertising via privacy concerns. A 2 (brand trust: high vs. low) by 2 (website credibility: high vs. low) between-subjects experiment was conducted (N = 424). Results suggest that while brand trust influences purchase intention—as mediated via affective reactance— website credibility only exerts modest effects on the dependent variables. Implications for user perception factors and contextual factors—including ad effectiveness in the digital personalized marketing realm—are discussed.


Uses Unaddressed: How Social Technologies Tacitly Allow Gender-Based Violence, Brooke J. Marston Jan 2021

Uses Unaddressed: How Social Technologies Tacitly Allow Gender-Based Violence, Brooke J. Marston

Honors Theses and Capstones

Growing technological capabilities have enhanced and intensified the potential for surveillance in many areas of life. Particularly, the placement of advanced technology in the hands of everyday people has produced ample opportunities for interpersonal monitoring. This growing capacity to surveil others we know without sophisticated techniques has concerning implications for acts of gender-based violence and intimate partner violence, which often hinge on surveillance, isolation, and control. Often, technology is used to the advantage of abusers in achieving such ends, and the wealth of personal information that is often available online leaves users vulnerable to acts of gender-based violence such as …


Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian Jan 2021

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian

Journal of International Technology and Information Management

Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …


The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo Jan 2021

The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo

All Faculty Scholarship

Recent prominent judicial opinions have assumed that common carriers have few to no First Amendment rights and that calling an actor a common carrier or public accommodation could justify limiting its right to exclude and mandating that it provide nondiscriminatory access. A review of the history reveals that the underlying law is richer than these simple statements would suggest. The principles for determining what constitutes a common carrier or a public accommodation and the level of First Amendment protection both turn on whether the actor holds itself out as serving all members of the public or whether it asserts editorial …


The Consent Of Man: An Examination Of Privacy Awareness, Surveillance, And Privacy Policy (Mis)Use, Will Reilley Silberman Jan 2021

The Consent Of Man: An Examination Of Privacy Awareness, Surveillance, And Privacy Policy (Mis)Use, Will Reilley Silberman

Theses and Dissertations--Communication

The problem of privacy is nuanced, pervasive, and requires an elevated approach. Given the lack of consistency with regard to privacy’s conceptualization and operationalization, research is needed that examines variables related to privacy to better understand how privacy operates in the present day. This dissertation aims to better understand nuances of privacy by gauging knowledge of online privacy, technological affordances related to privacy, and knowledge of surveillance. In this study, human subjects from a large southern University were presented with an opportunity to use a privacy-invasive smartphone application. After doing so, they viewed one of three privacy policies. Finally, they …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton Aug 2020

Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton

Book Chapters

Drawing on a wealth of experience in legal scholarship and publishing, Professor Jacqueline D. Lipton provides a useful legal guide for writers whatever their levels of expertise or categories of work (fiction, nonfiction, academic, journalism, freelance content development). This introductory chapter outlines the key legal and business issues authors are likely to face during the course of their careers, and emphasizes that most legal problems have solutions so law should never be an excuse to avoid writing something that an author feels strongly about creating. The larger work draws from case studies and hypothetical examples to address issues of copyright …


It Is All About Location: Smartphones And Tracking The Spread Of Covid-19, Jordan Frith, Michael Saker Jul 2020

It Is All About Location: Smartphones And Tracking The Spread Of Covid-19, Jordan Frith, Michael Saker

Publications

Mobile phone location data have become tied to understandings of and responses to the COVID-19 pandemic. Data visualizations have used mobile phone data to inform people about how mobility practices may be linked to the spread of the virus, and governments have explored contact tracing that relies upon mobile phone data. This article examines how these uses of location data implicate three particular issues that have been present in the growing body of locative media research: (1) anonymized data are often not anonymous, (2) location data are not always representative and can exacerbate inequality, and (3) location data are a …


Never Secret Enough, James Sheehan Jun 2020

Never Secret Enough, James Sheehan

Quest

The Multiple Genre Argument

Research in progress for ENGL 1301: Composition I

Faculty Mentor: W. Scott Cheney, Ph.D.

The following paper represents exceptional research completed by a student in English 1301, the first course in the two-semester composition sequence at Collin College. Students in ENGL 1301 are introduced to the concept of academic research by learning to ask research-focused questions and then use library databases to find sources that provide answers. Because traditional research writing tends to emphasize sources over context, the following assignment works to disrupt the automatic methods that students have learned and asks them to think creatively …


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


Uses Unaddressed: How Social Technologies Tacitly Allow Gender-Based Violence, Brooke Marston Mar 2020

Uses Unaddressed: How Social Technologies Tacitly Allow Gender-Based Violence, Brooke Marston

Comm-entary

Growing technological capabilities have enhanced and intensified the potential for surveillance in many areas of life. Particularly, the placement of advanced technology in the hands of everyday people has produced ample opportunities for interpersonal monitoring. This growing capacity to surveil others we know without sophisticated techniques has concerning implications for acts of gender-based violence and intimate partner violence, which often hinge on surveillance, isolation, and control. Often, technology is used to the advantage of abusers in achieving such ends, and the wealth of personal information that is often available online leaves users vulnerable to acts of gender-based violence such as …


The Robot Privacy Paradox: Understanding How Privacy Concerns Shape Intentions To Use Social Robots, Christoph Lutz, Aurelia Tamò-Larrieux Feb 2020

The Robot Privacy Paradox: Understanding How Privacy Concerns Shape Intentions To Use Social Robots, Christoph Lutz, Aurelia Tamò-Larrieux

Human-Machine Communication

Conceptual research on robots and privacy has increased but we lack empirical evidence about the prevalence, antecedents, and outcomes of different privacy concerns about social robots. To fill this gap, we present a survey, testing a variety of antecedents from trust, technology adoption, and robotics scholarship. Respondents are most concerned about data protection on the manufacturer side, followed by social privacy concerns and physical concerns. Using structural equation modeling, we find a privacy paradox, where the perceived benefits of social robots override privacy concerns.


Appendix A: Interview Guide With Privacy-Related Questions (Full Version), Anabel Quan-Haase, Dennis Ho Jan 2020

Appendix A: Interview Guide With Privacy-Related Questions (Full Version), Anabel Quan-Haase, Dennis Ho

FIMS Publications

Interview Guide: Networked individualism, East York Project


Security Techniques For Intelligent Spam Sensing And Anomaly Detection In Online Social Platforms, Monther Aldwairi, Lo'ai Tawalbeh Jan 2020

Security Techniques For Intelligent Spam Sensing And Anomaly Detection In Online Social Platforms, Monther Aldwairi, Lo'ai Tawalbeh

All Works

Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due …


Balancing Transparency And Privacy In A University Sexual Misconduct Case: A Legal Public Relations Case Study, Chelsea L. Woods, Shari R. Veil Jan 2020

Balancing Transparency And Privacy In A University Sexual Misconduct Case: A Legal Public Relations Case Study, Chelsea L. Woods, Shari R. Veil

Communication Faculty Publications

In 2016, the University of Kentucky became embroiled in an open records debate with its student newspaper, The Kentucky Kernel. Following a professor’s resignation amid a sexual misconduct investigation, the Kernel asked for records pertaining to the case. The University refused, claiming the information would violate survivors’ privacy. The decision sparked public backlash, forcing the University to combat accusations that it was prioritizing reputation over student safety. This case study provides insight into the crisis management process by exploring how key actors in the case made decisions. Drawing from theoretical perspectives including stakeholder theory and the ethics of care …