Nowadays, Social Media Platforms, (SMP) are increasingly central in mediating subjects’ interaction and communication. The flow of information that occurs in these platforms is governed by legal and technological norms. The technological normativity coupled with the syntactical structure of social media influence the way users share personal information in different contexts thus exerting a relevant role in both the management of human relationships and the construction of personal identity. This article analyzes the two sided-normativity that characterize a social media platform (WhatsApp) through the Nissenbaum’s [2004] framework of “Contextual Integrity”, which consider the integrity of information as strictly bound to context, wherein ...
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them ...
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them ...
This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the ...
WhatsApp’s implementation of end-to-end encryption has been celebrated by many. Intriguingly, though...
Nissenbaum's (2010) framework of contextual integrity contends that informational norms, which are c...
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them ...
Privacy is one of the most urgent issues associated with information technology and digital media. T...
Informational privacy is a matter of control; it consists in the ability to control when one’s perso...
In January 2021, Meta (then Facebook) published an update to its WhatsApp privacy policy which inclu...
As online social media grow, it is increasingly important to distinguish between the different threa...
Context plays an important role in shaping users’ privacy attitudes and behaviors. Users manage thei...
Social media platforms capture and trade consumer data for analysis, user profiling and for sale to ...
Nudges comprise a key component of the regulatory toolbox. Both the public and private sectors use n...
The struggle we currently perceive in terms of social media privacy may be the result of the incompa...
This article explores the norms that govern regular users’ acts of sharing content on social network...
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them ...
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them ...
This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the ...
WhatsApp’s implementation of end-to-end encryption has been celebrated by many. Intriguingly, though...
Nissenbaum's (2010) framework of contextual integrity contends that informational norms, which are c...
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them ...
Privacy is one of the most urgent issues associated with information technology and digital media. T...
Informational privacy is a matter of control; it consists in the ability to control when one’s perso...
In January 2021, Meta (then Facebook) published an update to its WhatsApp privacy policy which inclu...
As online social media grow, it is increasingly important to distinguish between the different threa...
Context plays an important role in shaping users’ privacy attitudes and behaviors. Users manage thei...
Social media platforms capture and trade consumer data for analysis, user profiling and for sale to ...
Nudges comprise a key component of the regulatory toolbox. Both the public and private sectors use n...
The struggle we currently perceive in terms of social media privacy may be the result of the incompa...
This article explores the norms that govern regular users’ acts of sharing content on social network...
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them ...
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them ...
This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the ...