Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (5)
- Computer Engineering (4)
- Engineering (4)
- Technology and Innovation (4)
- Communication Technology and New Media (3)
-
- Computer and Systems Architecture (3)
- E-Commerce (3)
- Management Information Systems (3)
- Science and Technology Studies (3)
- Business Intelligence (2)
- Data Storage Systems (2)
- Digital Communications and Networking (2)
- Information Literacy (2)
- Library and Information Science (2)
- Management Sciences and Quantitative Methods (2)
- Operational Research (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Computer Sciences (1)
- Defense and Security Studies (1)
- Information Security (1)
- Law (1)
- Marketing (1)
- Other Computer Engineering (1)
- Other Engineering (1)
- Physical Sciences and Mathematics (1)
- Public Affairs, Public Policy and Public Administration (1)
- Science and Technology Law (1)
- Institution
Articles 1 - 7 of 7
Full-Text Articles in Social Media
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
What To Do When Privacy Is Gone, James Brusseau
What To Do When Privacy Is Gone, James Brusseau
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction. It considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, transient existence responds to privacy’s loss by ceaselessly generating new personal identities, which translates into constantly producing temporarily unviolated private information. The …
An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law
An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law
Journal of International Technology and Information Management
Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Journal of International Technology and Information Management
The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu
Virginia Journal of Science
The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Will "Smarter" Marketing End Social Discrimination? A Critical Review, Frances Grodzinsky, Andra Gumbus, Stephen J. Lilley
Will "Smarter" Marketing End Social Discrimination? A Critical Review, Frances Grodzinsky, Andra Gumbus, Stephen J. Lilley
School of Computer Science & Engineering Faculty Publications
Purpose - There are two claims made by the web marketing/advertising industry. 1) By collecting, managing, and mining data, companies serve consumer’s best interests and 2) by adopting sophisticated analytics web marketers avoid discriminations that disserve individuals. Although we share an interest in ending social discrimination, we are more circumspect about pronounced individualism and technological fixes. Despite its appeal, or perhaps because of it, we should not accept the claim at face value. In this paper we argue that social discrimination may not disappear under smarter marketing; more overt forms may wane only to be replaced by more subtle forms. …