There is incredible and intrinsic, though hidden, power in technology settings, including those set by online platforms. The hidden levers of control embedded within the default settings influence users’ overall experience on platforms and with technology, especially in regard to issues of privacy and security. This paper examines the embedded assumptions and implications of technology and technical design on society. To this end, this study addresses the role and power of social media platforms in developing and applying privacy and security policies and norms for their users. The privacy and security choices by social media platforms affect billions of users worldwide. Further, this study will consider how platforms’ public-facing rhetori...
Available at SSRN: http://ssrn.com/abstract=2220454 or http://dx.doi.org/10.2139/ssrn.2220454The deb...
In the United States, notice and choice remain the most commonly used mechanisms to protect people’s...
In the 21st century, ubiquitous technologies strengthen ubiquitous surveillance. Although the right ...
Purpose: The purpose of this paper is to explain the effect of trust, knowledge, and control on priv...
The proliferation of social media websites has led to concerns over privacy breaches, as these sites...
Social media sites are key mediators of online communication. Yet the privacy controls for these sit...
Privacy is a complex concept involving dimensions of access and control of shared information, expec...
While research has been conducted on social media, few comparisons have been made in regards to the ...
Social media platforms capture and trade consumer data for analysis, user profiling and for sale to ...
The paper assesses the gap between actual and perceived privacy features of smartphones, exploring p...
Can we live in a free society without personal privacy? The question is worth pondering, not only in...
Mobile technology has accelerated the pace at which people access, acquire and generate data. Users’...
Social media platforms capture and trade consumer data for analysis, user profiling and for sale to ...
People value their privacy; however, they typically do not make the protection of their privacy a pr...
The article discusses challenges to privacy protection in social media platforms, focusing in partic...
Available at SSRN: http://ssrn.com/abstract=2220454 or http://dx.doi.org/10.2139/ssrn.2220454The deb...
In the United States, notice and choice remain the most commonly used mechanisms to protect people’s...
In the 21st century, ubiquitous technologies strengthen ubiquitous surveillance. Although the right ...
Purpose: The purpose of this paper is to explain the effect of trust, knowledge, and control on priv...
The proliferation of social media websites has led to concerns over privacy breaches, as these sites...
Social media sites are key mediators of online communication. Yet the privacy controls for these sit...
Privacy is a complex concept involving dimensions of access and control of shared information, expec...
While research has been conducted on social media, few comparisons have been made in regards to the ...
Social media platforms capture and trade consumer data for analysis, user profiling and for sale to ...
The paper assesses the gap between actual and perceived privacy features of smartphones, exploring p...
Can we live in a free society without personal privacy? The question is worth pondering, not only in...
Mobile technology has accelerated the pace at which people access, acquire and generate data. Users’...
Social media platforms capture and trade consumer data for analysis, user profiling and for sale to ...
People value their privacy; however, they typically do not make the protection of their privacy a pr...
The article discusses challenges to privacy protection in social media platforms, focusing in partic...
Available at SSRN: http://ssrn.com/abstract=2220454 or http://dx.doi.org/10.2139/ssrn.2220454The deb...
In the United States, notice and choice remain the most commonly used mechanisms to protect people’s...
In the 21st century, ubiquitous technologies strengthen ubiquitous surveillance. Although the right ...