Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Science and Technology Studies

Are You Really Anonymous Online? Your Friends On Twitter May Give You Away, Jessica T. Su Jan 2017

Are You Really Anonymous Online? Your Friends On Twitter May Give You Away, Jessica T. Su

FDLA Journal

As you browse the internet, online advertisers track nearly every site you visit, amassing a trove of information on your habits and preferences. When you visit a news site, they might see you’re a fan of basketball, opera and mystery novels, and accordingly select ads tailored to your tastes.

Advertisers use this information to create highly personalized experiences, but they typically don’t know exactly who you are. They observe only your digital trail, not your identity itself, and so you might feel that you’ve retained a degree of anonymity.


Social Grief: A Grounded Theory Of Utilizing Status Updates On Facebook As A Contemporary Ritual, Celese Catania-Opris Jan 2016

Social Grief: A Grounded Theory Of Utilizing Status Updates On Facebook As A Contemporary Ritual, Celese Catania-Opris

Department of Family Therapy Dissertations and Applied Clinical Projects

The popular Social Networking Site, Facebook, offers its users the ability tocommunicate with others from all over the globe. Individuals can create a virtual identity for themselves enabling members to call, message, and locate others in a matter of seconds. The number of Facebook users appears to increase; yet, the number of members who die daily is not normally accounted. Facebook now permits the memorialization ofthe deceased’s profile. This allows members to continue commenting, sharing photos and videos, and visiting the deceased’s Facebook page. This trend led to the central question of this study, “What benefits, if any, are individuals …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …