Switch to: References

Add citations

You must login to add citations.
  1. Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Being “Stresslessly Invisible”: The Rise and Fall of Videophony in David Foster Wallace’s Infinite Jest.Christoph Ribbat - 2010 - Bulletin of Science, Technology and Society 30 (4):252-258.
    In a satiric chapter of David Foster Wallace’s novel Infinite Jest, a mock media expert reports how American consumers of the near future recoil from a new communication device known as “videophony” and return to the voice-only telephone of the Bell Era. This article explores the said chapter in the framework of media theories reading the telephone as a “synecdoche of technology,” considering Wallace’s vision of videophony’s rise and fall in a future society from two angles: It discusses the antitechnological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Persistence and Change in Social Media.Anabel Quan-Haase & Bernie Hogan - 2010 - Bulletin of Science, Technology and Society 30 (5):309-315.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Theoretical conceptualization of online privacy-related decision making – Introducing the tripartite self-disclosure decision model.Sina Ostendorf & Matthias Brand - 2022 - Frontiers in Psychology 13.
    Self-disclosures on online social networks have received increased attention in the last two decades. Researchers from different disciplines investigated manifold influencing variables, and studies applied different theories to explain why many users share very sensitive and personal information despite potential risks and negative consequences, whereas others do not. Oftentimes, it is argued that self-disclosure decisions result from a kind of rational “calculus” of risks and benefits. However, such an assumption of rationality can and has been criticized. Nevertheless, fundamental cognitive and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Neglecting Long-Term Risks: Self-Disclosure on Social Media and Its Relation to Individual Decision-Making Tendencies and Problematic Social-Networks-Use.Sina Ostendorf, Silke M. Müller & Matthias Brand - 2020 - Frontiers in Psychology 11.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.Dorota Mokrosinska - 2014 - Journal of Social Philosophy 45 (3):369-389.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Information technology and privacy: conceptual muddles or privacy vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.
    ABSTRACT:The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals purport to value privacy yet still disclose information to firms. The goal of this paper is to empirically examine the conceptualization of privacy postdisclosure assumed in the privacy paradox. Contrary to the privacy paradox, the results here suggest consumers retain strong privacy expectations even after disclosing information. Privacy violations are valued akin to security violations in (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Impact of privacy, trust and user activity on intentions to share Facebook photos.Aqdas Malik, Kari Hiekkanen, Amandeep Dhir & Marko Nieminen - 2016 - Journal of Information, Communication and Ethics in Society 14 (4):364-382.
    Purpose The popularity of Facebook photo sharing has not only seen a surge in the number of photos shared but also has raised various issues concerning user privacy and self-disclosure. Recent literature has documented the increasing interest of the research community in understanding various privacy issues concerning self-disclosures on Facebook. However, little is known about how different privacy issues, trust and activity influence users’ intentions to share photos on Facebook. To bridge this gap, a research model was developed and tested (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • eID policy in a turbulent environment: is there a need for a new regulatory framework? [REVIEW]Wainer Lusoli, Ioannis Maghiros & Margherita Bacigalupo - 2008 - Identity in the Information Society 1 (1):173-187.
    There is increasing interest in the EU about the central place of eIdentity (eID) in people’s lives. eID is increasingly seen as a bridge between the commercial viability of models based on large-scale provision of e-services and users’ need for privacy and security in online transactions. This paper examines technological, social and legal developments in the field of eID and asks whether there is the need for a new regulatory framework that both preserves users’ identity and enables the provision of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy concerns and identity in online social networks.Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva - 2009 - Identity in the Information Society 2 (1):39-63.
    Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 subjects, we find (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Treating sensitive topics online: a privacy dilemma.Paula Helm - 2018 - Ethics and Information Technology 20 (4):303-313.
    This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Do Instagram Profiles Accurately Portray Personality? An Investigation Into Idealized Online Self-Presentation.Elspbeth Harris & Aurore C. Bardey - 2019 - Frontiers in Psychology 10.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Areas of Privacy in Facebook.Katherina Glac, Dawn R. Elm & Kirsten Martin - 2014 - Business and Professional Ethics Journal 33 (2-3):147-176.
    Privacy issues surrounding the use of social media sites have been apparent over the past ten years. Use of such sites, particularly Facebook, has been increasing and recently business organizations have begun using Facebook as a means of connecting with potential customers or clients. This paper presents an empirical study of perceived privacy violations to examine factors that influence the expectations of privacy on Facebook. Results of the study suggest that the more important Facebook is to users, the more likely (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • ‘I make the rules on my Wall’: Privacy and identity management practices on Facebook.Mariza Georgalou - 2016 - Discourse and Communication 10 (1):40-64.
    Much significant work on the topic of privacy and identity on social network sites stems from the realms of media, information and cultural studies, and sociology eschewing language-based disciplines almost entirely. To redress the balance, this article draws on discourse-centred online ethnography, an approach which blends online ethnography with discourse analysis, to explore how self-presentation on Facebook is regulated by means of privacy. To this end, I analyse a dataset of statuses, comments, links, photographs and interviews from five Greek users. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • studiVZ: social networking in the surveillance society. [REVIEW]Christian Fuchs - 2010 - Ethics and Information Technology 12 (2):171-185.
    This paper presents some results of a case study of the usage of the social networking platform studiVZ by students in Salzburg, Austria. The topic is framed by the context of electronic surveillance. An online survey that was based on questionnaire that consisted of 35 (single and multiple) choice questions, 3 open-ended questions, and 5 interval-scaled questions, was carried out (N = 674). The knowledge that students have in general was assessed with by calculating a surveillance knowledge index, the critical (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Modeling Reality: The Connection Between Behavior on Reality TV and Facebook.Margaret E. Duffy, Edson C. Tandoc & Patrick Ferrucci - 2014 - Bulletin of Science, Technology and Society 34 (3-4):99-107.
    This study investigates how reality television viewing is linked to Facebook. Utilizing a survey of 736 students in a school of journalism at a large Midwestern university, researchers examined whether viewers of different genres of reality television were more prone to problematic information sharing on Facebook. The study found that all viewers of reality were prone to problematic information sharing. However, viewers of drama-, competition-, and crime-based shows were most likely to share problematic information. These results are interpreted using social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Defining Objectives for Preventing Cyberstalking.Gurpreet Dhillon & Kane J. Smith - 2019 - Journal of Business Ethics 157 (1):137-158.
    Cyberstalking is a significant challenge in the era of Internet and technology. When dealing with cyberstalking, institutions and governments struggle in how to manage it and where to allocate resources. Therefore, it is important to understand how individuals feel about the problem of cyberstalking and how it can be managed. In this paper, we use Nissenbaum’s :119–158, 2004) contextual integrity as a theoretical framework for applying Keeney’s value-focused thinking technique to develop actionable objectives aimed at the prevention of cyberstalking. By (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Contesting methodologies.Danijela Bogdanovic, Michael Dowd, Eileen Wattam & Alison Adam - 2012 - Journal of Information, Communication and Ethics in Society 10 (4):208-221.
    PurposeThe purpose of this paper is to report on and evaluate focus groups and privacy diary/interview methods used in a qualitative study of on‐line privacy.Design/methodology/approachThe paper is a discursive evaluation of two methods employed to study on‐line privacy, informed by and situated in interpretive and constructivist approaches to knowledge.FindingsThe paper argues for the value of qualitative research methods in study of on‐line privacy. It confronts the positivist paradigm that informs much of the work in the field by foregrounding the need (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Information and friend segregation for online social networks: a user study.Javed Ahmed, Serena Villata & Guido Governatori - 2019 - AI and Society 34 (4):753-766.
    Online social networks captured the attention of the masses by offering attractive means of sharing personal information and developing social relationships. People expose personal information about their lives on OSNs. This may result in undesirable consequences of users’ personal information leakage to an unwanted audience and raises privacy concerns. The issue of privacy has received a significant attention in both the research literature and the mainstream media. In this paper, we present results of an empirical study that measure users’ attitude (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Uses and Gratifications of Social Media: A Comparison of Facebook and Instant Messaging.Alyson L. Young & Anabel Quan-Haase - 2010 - Bulletin of Science, Technology and Society 30 (5):350-361.
    Users have adopted a wide range of digital technologies into their communication repertoire. It remains unclear why they adopt multiple forms of communication instead of substituting one medium for another. It also raises the question: What type of need does each of these media fulfill? In the present article, the authors conduct comparative work that examines the gratifications obtained from Facebook with those from instant messaging. This comparison between media allows one to draw conclusions about how different social media fulfill (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Correspondents theory 1800/2000: philosophical reflections upon epistolary technics and praxis in the analogue and digital. [REVIEW]Anthony John Charles Ross - unknown
    When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean? What do we lose and what do we gain as we move towards digital ways of being in the world? Critically engaging with many of the canonical writers in the philosophy of technology , and following what has been termed the 'empirical turn' in that discipline, this thesis answers such questions by means of a philosophical, comparative study of epistolary technics (...)
    Download  
     
    Export citation  
     
    Bookmark