Research on the Influence of Internet Privacy Setting Structure on User Privacy Decision

2021 ◽  
Author(s):  
Shulin Tang ◽  
Zhikai Song ◽  
Qiujie Wang
2005 ◽  
Vol 52 (2) ◽  
pp. 227-237 ◽  
Author(s):  
J.B. Earp ◽  
A.I. Anton ◽  
L. Aiman-Smith ◽  
W.H. Stufflebeam

Author(s):  
Sathasivam Mathiyalakan ◽  
George E Heilman ◽  
Sharon D White

Because of Facebook’s ubiquitous nature, users who fail to properly configure their Facebook account privacy settings could be unintentionally revealing personal information to millions of people. This study analyzes data collected from African American and Hispanic college students regarding Facebook privacy setting attitudes and use. The findings indicate African American students have been members of Facebook longer and have more “Friends” than Hispanic students. Both ethnic groups spend about the same amount of time on Facebook during each session, although Hispanics log on more frequently. Virtually all the students claim awareness and use Facebook privacy settings. Hispanics have more restrictive Facebook privacy settings than African Americans. Neither ethnic group trusts Facebook to protect privacy, but African Africans show less concern while Hispanics indicate greater worry about Facebook privacy and data security. Both ethnic groups are more concerned about Internet privacy than Facebook privacy, Hispanics significantly more so.


2018 ◽  
Vol 3 (1) ◽  
pp. 40-53 ◽  
Author(s):  
Daniela Fernandez Espinosa ◽  
Lu Xiao

Abstract Purpose In this paper, we describe how gender recognition on Twitter can be used as an intelligent business tool to determine the privacy concerns among users, and ultimately offer a more personalized service for customers who are more likely to respond positively to targeted advertisements. Design/methodology/approach We worked with two different data sets to examine whether Twitter users’ gender, inferred from the first name of the account and the profile description, correlates with the privacy setting of the account. We also used a set of features including the inferred gender of Twitter users to develop classifiers that predict user privacy settings. Findings We found that the inferred gender of Twitter users correlates with the account’s privacy setting. Specifically, females tend to be more privacy concerned than males. Users whose gender cannot be inferred from their provided first names tend to be more privacy concerned. In addition, our classification performance suggests that inferred gender can be used as an indicator of the user’s privacy preference. Research limitations It is known that not all twitter accounts are real user accounts, and social bots tweet as well. A major limitation of our study is the lack of consideration of social bots in the data. In our study, this implies that at least some percentage of the undefined accounts, that is, accounts that had names non-existent in the name dictionary, are social bots. It will be interesting to explore the privacy setting of social bots in the Twitter space. Practical implications Companies are investing large amounts of money in business intelligence tools that allow them to know the preferences of their consumers. Due to the large number of consumers around the world, it is very difficult for companies to have direct communication with each customer to anticipate market changes. For this reason, the social network Twitter has gained relevance as one ideal tool for information extraction. On the other hand, users’ privacy preference needs to be considered when companies consider leveraging their publicly available data. This paper suggests that gender recognition of Twitter users, based on Twitter users’ provided first names and their profile descriptions, can be used to infer the users’ privacy preference. Originality/value This study explored a new way of inferring Twitter user’s gender, that is, to recognize the user’s gender based on the provided first name and the user’s profile description. The potential of this information for predicting the user’s privacy preference is explored.


MIS Quarterly ◽  
2013 ◽  
Vol 37 (1) ◽  
pp. 275-298 ◽  
Author(s):  
Weiyin Hong ◽  
◽  
James Y. L. Thong ◽  
◽  

2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


Author(s):  
Мадина Усенбай ◽  
Акмарал Иманбаева

Конфиденциальность является одним из важных параметров для повышения безопасности в сети, цель которого - сохранить секретную информацию. Рассмотрена модель доверия, состоящая из текущих и прошлых оценок на основе репутации объекта в сети. В модели используется параметр времени для защиты конфиденциальности пользователя для статических и динамических объектов, например, в IoT или облачной технологии. Confidentiality is one of the important parameters for increasing security on the network, the coal of which is to keep secret information. A trust model consisting of current and past assessments based on the object reputation in the network is considered. The model uses a time parameter to protect user privacy for static and dynamic objects, for example, in IoT or cloud technology.


2020 ◽  
Author(s):  
Alex Akinbi ◽  
Ehizojie Ojie

BACKGROUND Technology using digital contact tracing apps has the potential to slow the spread of COVID-19 outbreaks by recording proximity events between individuals and alerting people who have been exposed. However, there are concerns about the abuse of user privacy rights as such apps can be repurposed to collect private user data by service providers and governments who like to gather their citizens’ private data. OBJECTIVE The objective of our study was to conduct a preliminary analysis of 34 COVID-19 trackers Android apps used in 29 individual countries to track COVID-19 symptoms, cases, and provide public health information. METHODS We identified each app’s AndroidManifest.xml resource file and examined the dangerous permissions requested by each app. RESULTS The results in this study show 70.5% of the apps request access to user location data, 47% request access to phone activities including the phone number, cellular network information, and the status of any ongoing calls. 44% of the apps request access to read from external memory storage and 2.9% request permission to download files without notification. 17.6% of the apps initiate a phone call without giving the user option to confirm the call. CONCLUSIONS The contributions of this study include a description of these dangerous permissions requested by each app and its effects on user privacy. We discuss principles that must be adopted in the development of future tracking and contact tracing apps to preserve the privacy of users and show transparency which in turn will encourage user participation.


2021 ◽  
pp. 1-31
Author(s):  
Sarah E. Lageson ◽  
Elizabeth Webster ◽  
Juan R. Sandoval

Digitization and the release of public records on the Internet have expanded the reach and uses of criminal record data in the United States. This study analyzes the types and volume of personally identifiable data released on the Internet via two hundred public governmental websites for law enforcement, criminal courts, corrections, and criminal record repositories in each state. We find that public disclosures often include information valuable to the personal data economy, including the full name, birthdate, home address, and physical characteristics of arrestees, detainees, and defendants. Using administrative data, we also estimate the volume of data disclosed online. Our findings highlight the mass dissemination of pre-conviction data: every year, over ten million arrests, 4.5 million mug shots, and 14.7 million criminal court proceedings are digitally released at no cost. Post-conviction, approximately 6.5 million current and former prisoners and 12.5 million people with a felony conviction have a record on the Internet. While justified through public records laws, such broad disclosures reveal an imbalance between the “transparency” of data releases that facilitate monitoring of state action and those that facilitate monitoring individual people. The results show how the criminal legal system increasingly distributes Internet privacy violations and community surveillance as part of contemporary punishment.


2021 ◽  
Vol 29 (3) ◽  
Author(s):  
Péter Orosz ◽  
Tamás Tóthfalusi

AbstractThe increasing number of Voice over LTE deployments and IP-based voice services raise the demand for their user-centric service quality monitoring. This domain’s leading challenge is measuring user experience quality reliably without performing subjective assessments or applying the standard full-reference objective models. While the former is time- and resource-consuming and primarily executed ad-hoc, the latter depends upon a reference source and processes the voice payload that may offend user privacy. This paper presents a packet-level measurement method (introducing a novel metric set) to objectively assess network and service quality online. It is accomplished without inspecting the voice payload and needing the reference voice sample. The proposal has three contributions: (i) our method focuses on the timeliness of the media traffic. It introduces new performance metrics that describe and measure the service’s time-domain behavior from the voice application viewpoint. (ii) Based on the proposed metrics, we also present a no-reference Quality of Experience (QoE) estimation model. (iii) Additionally, we propose a new method to identify the pace of the speech (slow or dynamic) as long as voice activity detection (VAD) is present between the endpoints. This identification supports the introduced quality model to estimate the perceived quality with higher accuracy. The performance of the proposed model is validated against a full-reference voice quality estimation model called AQuA, using real VoIP traffic (originated in assorted voice samples) in controlled transmission scenarios.


Sign in / Sign up

Export Citation Format

Share Document