Abuse and harm to individuals, through harassment and bullying, coexist with Identity Theft as criminal behaviours supported by the ready availability of personal information. Incorporating privacy protection measures into software design requires a thorough understanding about how an individual's privacy is affected by Internet technologies. This research set out to incorporate such an understanding by examining privacy risks for two groups of individuals, for whom privacy was an important issue, domestic abuse survivors and teenagers. The purpose was to examine the reality of the privacy risks for these two groups. This research combined a number of approaches underpinned by a selection of foundation theories from four separate domains: s...
The article addresses strategies to ensure personal integrity and how to protect civil rights from v...
While extant literature on privacy in social networks is plentiful, issues pertaining to information...
This PhD work aimed to better understand how 1) existing and near-future digital technologies are us...
A significant portion of the modern internet is funded by commercial return from customised content ...
Privacy and security tools and strategies are not equally effective for everyone---many high-risk co...
This dissertation reports on the security and privacy challenges of using technology in personal, pr...
Although media reports often warn about risks associated with using privacy-threatening technologies...
The collection of personal data in cyberspace is an invasion of personal privacy. Data collection te...
Privacy, either personal or informational, is increasingly under threats in this digital age. Adult ...
Web systems have become an integral part in daily life of billions of people. Social is a key charac...
In recent years, large-scale computer networks have become an essential aspect of our daily computin...
Information technology includes all types of technology used to exchange, store, use or create infor...
Various security measures are ineffective having been designed without adequate usability and econom...
Cyber-security systems, which protect networks and computers against cyber attacks, are becoming com...
Cyber-security systems, which protect networks and computers against cyber attacks, are becoming com...
The article addresses strategies to ensure personal integrity and how to protect civil rights from v...
While extant literature on privacy in social networks is plentiful, issues pertaining to information...
This PhD work aimed to better understand how 1) existing and near-future digital technologies are us...
A significant portion of the modern internet is funded by commercial return from customised content ...
Privacy and security tools and strategies are not equally effective for everyone---many high-risk co...
This dissertation reports on the security and privacy challenges of using technology in personal, pr...
Although media reports often warn about risks associated with using privacy-threatening technologies...
The collection of personal data in cyberspace is an invasion of personal privacy. Data collection te...
Privacy, either personal or informational, is increasingly under threats in this digital age. Adult ...
Web systems have become an integral part in daily life of billions of people. Social is a key charac...
In recent years, large-scale computer networks have become an essential aspect of our daily computin...
Information technology includes all types of technology used to exchange, store, use or create infor...
Various security measures are ineffective having been designed without adequate usability and econom...
Cyber-security systems, which protect networks and computers against cyber attacks, are becoming com...
Cyber-security systems, which protect networks and computers against cyber attacks, are becoming com...
The article addresses strategies to ensure personal integrity and how to protect civil rights from v...
While extant literature on privacy in social networks is plentiful, issues pertaining to information...
This PhD work aimed to better understand how 1) existing and near-future digital technologies are us...