Personal Data Access Based on Trust Assessment in Mobile Social Networking

Author(s):  
Zheng Yan ◽  
Xueyun Li ◽  
Raimo Kantola
2015 ◽  
Vol 67 (1) ◽  
pp. 94-115 ◽  
Author(s):  
David Haynes ◽  
Lyn Robinson

Purpose – The purpose of this paper is to identify the risks faced by users of online social networking services (SNSs) in the UK and to develop a typology of risk that can be used to assess regulatory effectiveness. Design/methodology/approach – An initial investigation of the literature revealed no detailed taxonomies of risk in this area. Existing taxonomies were reviewed and merged with categories identified in a pilot survey and expanded in purposive sample survey directed at the library and information services (LIS) community in the UK. Findings – Analysis of the relationships between different risk categories yielded a grouping of risks by their consequences. This aligns with one of the objectives of regulation, which is to mitigate risks. Research limitations/implications – This research offers a tool for evaluation of different modes of regulation of social media. Practical implications – Awareness of the risks associated with use of online SNSs and wider social media contributes to the work of LIS professionals in their roles as: educators; intermediaries; and users of social media. An understanding of risk also informs the work of policy makers and legislators responsible for regulating access to personal data. Originality/value – A risk-based view of regulation of personal data on social media has not been attempted in such a comprehensive way before.


Author(s):  
NAMRATA PAWAR ◽  
SONALI CHIKHALE

With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of our daily lives. These devices have evolved rapidly from simple phones and SMS capable devices to Smartphone’s and now with android phones that we use to connect, interact and share information with our social circles. The Smartphone’s are used for traditional two-way messaging such as voice, SMS, multimedia messages, instant messaging or email. Moreover, the recent advances in the mobile application development frameworks and application stores have encouraged third party developers to create a huge number of mobile applications that allow users to interact and share information in many novel ways. In this paper, we elaborate a flexible system architecture based on the service-oriented specification to support social interactions in campus-wide environments using Wifi. In the client side, we designed a mobile middleware to collect social contexts such as the messaging, creating group, accessing emails etc. The server backend, on the other hand, aggregates such contexts, analyses social connections among users and provides social services to facilitate social interactions. A prototype of mobile social networking system is deployed on campus, and several applications are implemented based on the proposed architecture to demonstrate the effectiveness of the architecture.


2013 ◽  
Vol 5 (1) ◽  
pp. 69-73 ◽  
Author(s):  
Sanjeev Kulkarni ◽  
Kirna Kumari ◽  
Naheeda Kittur

Future shopping applications collect basic profile information of the person and provide great service on recommending books, electronics and other products based on user profile, previous shopping history and relationships between the items categories derived from purchases of all the users on the site. E.g. if someone is looking at action movies it can recommend similar category or a category that the shopper is likely to be associated with. The mining of user's profile greatly enhances a person's shopping experience on modern online shops. The main purpose of this paper is solving the privacy and security issues.


Author(s):  
Dário Elias Félix Oliveira Rodrigues

The digital technologies open a virtual world where making successful business over the Internet and especially on social networks imply unusual ethical dilemmas. This chapter will seek to handle this problem, characteristic of the information age, highlighting ethical challenges surrounding the participation in a new electronic dimension which quickly became ubiquitous. In the same line of the marketing model entitled “Marketing-mix”1, a new mnemonical model is presented. This model will be designated as “Cyberethics2-mix”, and is composed by four elements, all of them having the initial letter “P”. These elements represent the following ethical issues that should be carefully taken into account when practicing business on the Internet: Property of intellectual rights over digitized contents; Precision of the content and data made available on the www 3; Possibility to access the on-line information flow; Privacy of personal data on Internet networking /


2019 ◽  
pp. 978-1002
Author(s):  
Zdenek Smutny ◽  
Vaclav Janoscik ◽  
Radim Cermak

This chapter addresses the issue of privacy settings with a focus on Generation Y from a technological, social, generational, cultural and philosophical point of view. After introducing the issue of Internet privacy and other relevant areas—generational and cultural differences, the philosophical framework, the postinternet condition, the possibilities of processing and (mis)using personal data, and privacy policy—the authors present their perspective on the issue, drawing implications for individuals and organizations based on their own research and other relevant studies. The authors discuss the possible implications in terms of a prospective use of personal data by companies (e.g. for marketing and management) and possibility of processing user data. Such perspective will allow them to formulate a critical basis for further assessment of social networking and Generation Y's attitudes to privacy. The chapter concludes by outlining several recommendations concerning the commercialization of social networking services with respect to the constantly changing conception of privacy.


Sign in / Sign up

Export Citation Format

Share Document