Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Privacy

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 16 of 16

Full-Text Articles in Social and Behavioral Sciences

Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant Oct 2011

Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant

Kno.e.sis Publications

Users of traditional microblogging platforms such as Twitter face drawbacks in terms of (1) Privacy of status updates as a followee - reaching undesired people (2) Information overload as a follower - receiving uninteresting microposts from followees. In this paper we demonstrate distributed and user-controlled dissemination of microposts using SMOB (semantic microblogging framework) and Semantic Hub (privacy-aware implementation of PuSH3 protocol) . The approach leverages users' Social Graph to dynamically create group of followers who are eligible to receive micropost. The restrictions to create the groups are provided by the followee based on the hastags in the micropost. Both SMOB …


How Does The Use Of Trademarks By Third-Party Sellers Affect Online Search?, Lesley Chiou, Catherine Tucker Sep 2011

How Does The Use Of Trademarks By Third-Party Sellers Affect Online Search?, Lesley Chiou, Catherine Tucker

Lesley Chiou

Firms that sell via a direct channel and indirect channels have to decide whether to allow third-party sellers to use the trademarked brand name of the product in their advertising. This question has been particularly controversial for advertising on search engines. In June 2009, Google started allowing any third-party reseller for a product to use a trademark, such as `Doubletree,' in the text of its ad, even if the reseller did not have the trademark holder's permission. We study the effects of this change empirically within the hotel industry. We find some evidence that allowing third-party sellers to use a …


Precaution And Privacy Impact Assessment As Modes Towards Risk Governance, David Wright, RaphaëL Gellert, Serge Gutwirth, Michael Friedewald Aug 2011

Precaution And Privacy Impact Assessment As Modes Towards Risk Governance, David Wright, RaphaëL Gellert, Serge Gutwirth, Michael Friedewald

Michael Friedewald

No abstract provided.


Aids/Hiv Denialism: Patients' Privacy Rights, Fadia Abdullah, Guadalupe Medrano Aug 2011

Aids/Hiv Denialism: Patients' Privacy Rights, Fadia Abdullah, Guadalupe Medrano

Undergraduate Research Opportunities Program (UROP)

HIV is a sexually transmitted disease that develops into AIDS. There is no cure for it, only treatment. In this poster, we look at the pros and cons of disclosing this type of information. People who decide to disclose their HIV status may have various reasons for doing so, but most do it for emotional support and for prevention of spreading the disease. Those who decide to keep it private primarily do it to not face rejection, discrimination, degradation, and loss of respect. (Petronio Page 72) The problem with creating a public database is that many organizations are against the …


Ethical Considerations In Web 2.0 Archives, Antoinette E. Baker Jul 2011

Ethical Considerations In Web 2.0 Archives, Antoinette E. Baker

School of Information Student Research Journal

In April 2010, the Internet company Twitter announced that it had granted its entire archive of “Tweets” to the Library of Congress. These Tweets are typically generated by public users, who may or may not understand or expect that their submissions will be archived by a government agency. Archives of Web 2.0 material raise new ethical considerations for archivists, who must balance interests in preserving material with privacy interests of users who generated the content. Archivists can address these concerns by requiring corporate donors to fully disclose the nature of the archive to users and by allowing users to opt-out …


Data Security On Mobile Devices- A Higher Education Perspective, David Reis Jul 2011

Data Security On Mobile Devices- A Higher Education Perspective, David Reis

Academic Commons and Scott Memorial Library Staff Papers and Presentations

Mobile devices, both personal and Jefferson-owned, are being used everywhere on campus. Everyone knows that patient health information should not be stored on mobile devices, but did you know there are similar restrictions for student information?

If you access your Jefferson email from your mobile device and it contains student email on it, or in your address book, you need to know the requirements to protect that data.

Is your device secure?

AISR and JeffIT are hosting a presentation that will address important data security steps you should take to protect the information on your mobile device.


Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi Jun 2011

Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi

Kno.e.sis Publications

No abstract provided.


Zach's News, Georgia Southern University, Zach S. Henderson Library May 2011

Zach's News, Georgia Southern University, Zach S. Henderson Library

University Libraries News Online (2008-2023)

  • Welcome to choose Privacy Week!
  • Hot Doc: President Obama's birth certificate


Determining The Effects Of Technology On Children, Kristina E. Hatch May 2011

Determining The Effects Of Technology On Children, Kristina E. Hatch

Senior Honors Projects

Determining the Effects of Technology on Children

Kristina Hatch

Faculty Sponser: Timothy Henry, Computer Science and Statistics

Technology has become an essential part of Americans’ daily lives, affecting our communications, mail, relationships, the management of our bills and finances. As we have become more immersed in the benefits and capabilities of these constantly developing technologies, children as well as adults have become avid users. Laptops and cell phones are specially developed for preteens. Software and game companies have been targeting children in their game development. Video games have become common entertainment for children as young as four. Children today can …


Aids/Hiv Denialism: Patients’ Privacy Rights, Fadia Abdullah, Guadalupe Medrano Apr 2011

Aids/Hiv Denialism: Patients’ Privacy Rights, Fadia Abdullah, Guadalupe Medrano

Festival of Communities: UG Symposium (Posters)

HIV is a sexually transmitted disease that develops into AIDS. There is no cure for it, only treatment. In this poster, we look at the pros and cons of disclosing this type of information. People who decide to disclose their HIV status may have various reasons for doing so, but most do it for emotional support and for prevention of spreading the disease. Those who decide to keep it private primarily do it to not face rejection, discrimination, degradation, and loss of respect. (Petronio Page 72) The problem with creating a public database is that many organizations are against the …


Fourteen Reasons Privacy Matters: A Multidiscipinary Review Of Scholarly Literature, Trina J. Magi Apr 2011

Fourteen Reasons Privacy Matters: A Multidiscipinary Review Of Scholarly Literature, Trina J. Magi

University Libraries Faculty and Staff Publications

Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians may question whether privacy is worth protecting. This article reviews some of the extensive scholarly literature on privacy from disciplines outside the field of library science, including anthropology, law, philosophy, political science, psychology, and sociology, and it identifies fourteen reasons privacy matters to individuals, relationships, and to society. It …


Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo Apr 2011

Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …


Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant Jan 2011

Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant

Kno.e.sis Publications

Centralized social networking websites raise scalability issues - due to the growing number of participants - and, as well as, policy concerns - such as control, privacy and ownership over the user's published data. Distributed Social Networks aim to solve this issue by enabling architecture where people own their data and share it their own way. However, the privacy and scalability challenge is still to be tackled. This paper presents a privacy-aware extension to Google's PubSubHubbub protocol, using Semantic Web technologies, solving both the scalability and the privacy issues in Distributed Social Networks. We enhanced the traditional feature of PubSubHubbub …


Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen Jan 2011

Associational Privacy And The First Amendment: Naacp V. Alabama, Privacy And Data Protection, Anita L. Allen

All Faculty Scholarship

No abstract provided.


There's An App For That: The Ways Young Adults Access Digital Information, Cydney Lauren Palmer Jan 2011

There's An App For That: The Ways Young Adults Access Digital Information, Cydney Lauren Palmer

LSU Master's Theses

Despite the popular use of smartphones and mobile applications (apps) and their potential impacts in the near future, only scant academic attention has been paid to mobile apps, especially in respect to the gratifications sought from accessing digital information via apps. This exploratory study investigated the relationship between young adults and their use of mobile apps in accessing digital information, particularly in comparison to the current go-to digital information access device, Internet browsers. In addition, this study examined how levels of perceived privacy concern influence digital information use and how the use of digital information access modalities and the level …


Newsgathering And Privacy: Expanding Ethics Codes To Reflect Change In The Digital Media Age, Ginny Whitehouse Dec 2010

Newsgathering And Privacy: Expanding Ethics Codes To Reflect Change In The Digital Media Age, Ginny Whitehouse

Ginny Whitehouse

Media ethics codes concerning privacy must be updated considering the ease with which information now can be gathered from social networks and disseminated widely. Existing codes allow for deception and privacy invasion in cases of overriding public need when no alternate means are available but do not adequately define what constitutes need or alternate means, or weigh in the harm such acts do to the public trust and the profession. Building on the ethics theories of Sissela Bok and Helen Nissenbaum, balancing tests can be developed under a mixed-rule deontology that confines online misrepresentation and exposing the private information of …