Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Business

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian Jan 2021

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian

Journal of International Technology and Information Management

Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton Aug 2020

Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton

Book Chapters

Drawing on a wealth of experience in legal scholarship and publishing, Professor Jacqueline D. Lipton provides a useful legal guide for writers whatever their levels of expertise or categories of work (fiction, nonfiction, academic, journalism, freelance content development). This introductory chapter outlines the key legal and business issues authors are likely to face during the course of their careers, and emphasizes that most legal problems have solutions so law should never be an excuse to avoid writing something that an author feels strongly about creating. The larger work draws from case studies and hypothetical examples to address issues of copyright …


Of Promoting Networking And Protecting Privacy: Effects Of Defaults And Regulatory Focus On Social Media Users’ Preference Settings, Hichang Cho, Sungjong Roh, Byungho Park Dec 2019

Of Promoting Networking And Protecting Privacy: Effects Of Defaults And Regulatory Focus On Social Media Users’ Preference Settings, Hichang Cho, Sungjong Roh, Byungho Park

Research Collection Lee Kong Chian School Of Business

Privacy research has debated whether privacy decision-making is determined by users' stable preferences (i.e., individual traits), privacy calculus (i.e., cost-benefit analysis), or “responses on the spot” that vary across contexts. This study focuses on two factors—default setting as a contextual factor and regulatory focus as an individual difference factor—and examines the degree to which these factors affect social media users' decision-making when using privacy preference settings in a fictitious social networking site. The results, based on two experimental studies (study 1, n = 414; study 2, n = 213), show that default settings significantly affect users' privacy preferences, such that …


Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir Jan 2018

Americans, Marketers, And The Internet: 1999-2012, Joseph Turow, Amy Bleakley, John Bracken, Michael X. Delli Carpini, Nora A. Draper, Lauren Feldman, Nathaniel Good, Jens Grossklags, Michael Hennessy, Chris Jay Hoofnagle, Rowan Howard-Williams, Jennifer King, Su Li, Kimberly Meltzer, Deirdre K. Mulligan, Lilach Nir

Chris Jay Hoofnagle

This is a collection of the reports on the Annenberg national surveys that explored Americans' knowledge and opinions about the new digital-marketing world that was becoming part of their lives. So far we’ve released seven reports on the subject, in 1999, 2000, 2003, 2005, 2009, 2010, and 2012. The reports raised or deepened a range of provocative topics that have become part of public, policy, and industry discourse. In addition to these reports, I’ve included three journal articles — from I/S, New Media & Society and the Journal of Consumer Affairs — that synthesize some of the findings and place …


An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law Jan 2018

An Examination Of The Impact Of Gender And Culture On Facebook Privacy And Trust In Guam, Sathasivam Mathiyalakan, George Heilman, Kevin K.W. Ho, Wai Law

Journal of International Technology and Information Management

Facebook, the world’s largest social network, allows users to develop a profile containing personal information. Users may choose privacy settings to control information access, but improper settings risk personal exposure. Several US studies examining gender differences in privacy management found that females have more privacy concerns. This study investigates gender differences in Facebook privacy settings among college students in Guam, a US territory whose ethnicity and culture differ from mainland US. Results show that neither gender trusts Facebook nor feels Facebook protects them. Significant differences in number and type of privacy settings indicate females are more security conscious. Gender differences …


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte Jan 2014

Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte

Journal of Business & Technology Law

No abstract provided.


The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer Dec 2013

The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer

Graduate Theses and Dissertations

With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …


Will "Smarter" Marketing End Social Discrimination? A Critical Review, Frances Grodzinsky, Andra Gumbus, Stephen J. Lilley Jan 2013

Will "Smarter" Marketing End Social Discrimination? A Critical Review, Frances Grodzinsky, Andra Gumbus, Stephen J. Lilley

School of Computer Science & Engineering Faculty Publications

Purpose - There are two claims made by the web marketing/advertising industry. 1) By collecting, managing, and mining data, companies serve consumer’s best interests and 2) by adopting sophisticated analytics web marketers avoid discriminations that disserve individuals. Although we share an interest in ending social discrimination, we are more circumspect about pronounced individualism and technological fixes. Despite its appeal, or perhaps because of it, we should not accept the claim at face value. In this paper we argue that social discrimination may not disappear under smarter marketing; more overt forms may wane only to be replaced by more subtle forms. …