Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

The Impact Of User Control And Transparency In App Design On Privacy Concerns And Behavior Of Mobile App Users, Arwa Alawajy Jun 2021

The Impact Of User Control And Transparency In App Design On Privacy Concerns And Behavior Of Mobile App Users, Arwa Alawajy

Dissertations, Theses, and Capstone Projects

Mobile apps have unprecedented access to sensitive personal information. The increasing commodification of mobile-user data motivates us to explore the vital role of app developers in protecting users’ privacy. This dissertation examines the privacy of mobile app users from the perspective of HCI. According to Communication Privacy Management (CPM) theory, people believe they own their personal information and have the right to control how or with whom they share this information. In practice, individuals manage their privacy system and the boundaries between the public and private domain. Users make privacy disclosure decisions according to their individual characteristics and the perceptions …


Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian Jan 2021

Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian

Journal of International Technology and Information Management

Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …