Stalking and Other Forms of Dating Violence: Lessons Learned from You in Relation to Cyber Safety

2020 ◽  
pp. 088626052096667
Author(s):  
Ritesh Chugh ◽  
Marika Guggisberg

Often, individuals share private information on social media, being unaware of online dangers. You, a popular psychological thriller series on Netflix, raises issues of stalking behaviors through social media as part of a pattern of dating violence. Using a qualitative content analysis approach, this study examined how social media is used for erotic stalking, dating violence, and cyber safety awareness (or lack thereof) in You. The researchers analyzed all 10 episodes of the first season of You independently, taking notes. A combined in-depth analysis included discussions of messages and meanings resulting in three overarching themes: obsessive online and in-person erotic stalking, controlling behaviors in the context of the dating relationship, and an apparent indifference about cyber safety with oversharing of personal information on social media, which was exploited by the lead protagonist. You raises important concerns including inappropriate dating behaviors such as stalking, coercive control, violence, and questionable masculine attitudes, which are interwoven with an apparent lack of knowledge and understanding in relation to cyber safety. We concluded that raising awareness of the importance of online safety and security in the context of a dating relationship is imperative and that You can be used as an educational tool.

2010 ◽  
pp. 2057-2068
Author(s):  
Lemi Baruh ◽  
Levent Soysal

In recent years, social media have become an important avenue for self-expression. At the same time, the ease with which individuals disclose their private information has added to an already heated debate about the privacy implications of interactive media. This chapter investigates the relationship between disclosure of personal information in social media and two related trends: the increasing value of subjective or private experience as a social currency and the evolving nature of automated dataveillance. The authors argue that the results of the extended ability of individuals to negotiate their identity through social media are contradictory. The information revealed to communicate the complexity of one’s identity becomes an extensive source of data about individuals, thereby contributing to the functioning of a new regime of surveillance.


2017 ◽  
Author(s):  
Josette Jones ◽  
Meeta Pradhan ◽  
Masoud Hosseini ◽  
Anand Kulanthaivel ◽  
Mahmood Hosseini

BACKGROUND The increasing use of social media and mHealth apps has generated new opportunities for health care consumers to share information about their health and well-being. Information shared through social media contains not only medical information but also valuable information about how the survivors manage disease and recovery in the context of daily life. OBJECTIVE The objective of this study was to determine the feasibility of acquiring and modeling the topics of a major online breast cancer support forum. Breast cancer patient support forums were selected to discover the hidden, less obvious aspects of disease management and recovery. METHODS First, manual topic categorization was performed using qualitative content analysis (QCA) of each individual forum board. Second, we requested permission from the Breastcancer.org Community for a more in-depth analysis of the postings. Topic modeling was then performed using open source software Machine Learning Language Toolkit, followed by multiple linear regression (MLR) analysis to detect highly correlated topics among the different website forums. RESULTS QCA of the forums resulted in 20 categories of user discussion. The final topic model organized >4 million postings into 30 manageable topics. Using qualitative analysis of the topic models and statistical analysis, we grouped these 30 topics into 4 distinct clusters with similarity scores of ≥0.80; these clusters were labeled Symptoms & Diagnosis, Treatment, Financial, and Family & Friends. A clinician review confirmed the clinical significance of the topic clusters, allowing for future detection of actionable items within social media postings. To identify the most significant topics across individual forums, MLR demonstrated that 6 topics—based on the Akaike information criterion values ranging from −642.75 to −412.32—were statistically significant. CONCLUSIONS The developed method provides an insight into the areas of interest and concern, including those not ascertainable in the clinic. Such topics included support from lay and professional caregivers and late side effects of therapy that consumers discuss in social media and may be of interest to clinicians. The developed methods and results indicate the potential of social media to inform the clinical workflow with regards to the impact of recovery on daily life.


2022 ◽  
pp. 205943642110608
Author(s):  
Janet Hui Xue

Social media platforms (SMPs) generate revenue from the automatic propertisation of data contributed by users (i.e. they process these data algorithmically to feed products and services they sell to other customers, especially advertisers). This comparative study of the UK and China builds on key law and policy documents as well as in-depth interviews with 25 experts. We find that neither the human rights–based regulatory approach in the UK nor the impact-based approach of China provides users with economically meaningful forms of redress for harm suffered due to insufficient protection of their rights as data subjects. The study reveals the reasons for this: (1) by analysing data subjects’ rights in data protection law and establishing whether these rights preserve the economic interests of data subjects pertaining to their data; (2) by spelling out the conditions under which users can exercise their rights and (3) through an in-depth analysis of the existing mechanisms, which are not suitable to protect data subjects’ economic interests during automatic propertisation. This also helps us to understand the social impacts of China’s recently approved Personal Information Protection Law. Finally, it suggests two possible ways to improve the balance between the economic interests of data controllers and data subjects.


2017 ◽  
Vol 6 (6) ◽  
pp. 91 ◽  
Author(s):  
Ahmet Erdem ◽  
Rukiye Sahin

In this research, whether the undergraduates’ attitude levels towards the dating violence differed in terms of gender, dating relationship status, being exposed to the dating violence and resorting to the dating violence was investigated. The sample of the study was composed of 1171 undergraduates. In the research, “The Attitudes toward Dating Violence Scales, Ambivalent Sexism Scale, Ambivalence toward Men Scale, Narcissistic Personality Inventory, and Personal Information Form” were used as the data collection tools. In conclusion, significant differences were determined in the university students’ attitudes towards the dating violence according to the different demographic variables (gender, dating relationship status, being exposed to the dating violence and resorting to the dating violence). Moreover, university students’ attitudes towards dating violence were determined to positively and significantly correlate with their ambivalence sexism levels. Ambivalence toward men was determined to positively and significantly correlate with their attitudes towards dating violence. In addition, university students’ narcissistic personality traits were found to positively and significantly correlate with their attitudes towards dating violence. 


2018 ◽  
Vol 4 (02) ◽  
pp. 149
Author(s):  
Ievansyah Ievansyah ◽  
Teguh Priyo Sadono

<p>ABSTRACT<br />Abang None is a designation for Jakarta Tourism Ambassador. Researchers saw a phenomenon of self-transformation from a tourism ambassador to a celebrity. This phenomenon refers to case studies experienced by Maudy Koesnaedi, Bangpen, and Shabina Gianti. Researchers want to know the personal branding management process they want to form, and convey it to the public through Instagram social media. This study uses qualitative methods, with descriptive case studies, which depart from the Post Positivism paradigm. The concept used is personal branding, and is sharpened by the theory of Communication Private Management (CPM Theory). Data collection techniques are observation, interviews, and documentation analysis. The concept of personal branding proposed by Peter Montoya, refers to eight laws, namely the law of specialization, the law of leadership, the law of personality, the law of distinctiveness. , the law of appearance (the law of visibility), the law of unity, the law of persistence, and the law of good intentions. From these eight laws, the researcher saw that the three sources had different features, were consistent in managing personal branding, and were able to demonstrate good ethics in using social media. The theory of Communication Private Management (CPM Theory), proposed by Sandra Petronio, has five basic assumptions to see how they manage personal information in the public domain. The five assumptions are private information, private boundaries, control and ownership, rule-based management systems, and management dialectics. The three informants in general have known the limitations of their privacy with the public, so they understand the information that is allowed and not to be shared with the public. They have good management, between them and netizens. Researchers hope that further research can further develop the concept of personal branding, and CPM theory. Hopefully this research can be a reference, to be better developed from all aspects.<br /><strong>Keywords:</strong> Personal Branding, Abang None, Celebrity, Instagram</p><p><br />ABSTRAK<br />Abang None merupakan sebutan untuk Duta Pariwisata DKI Jakarta. Peneliti melihat adanya fenomena transformasi diri dari duta pariwisata menjadi seorang selebritis. Fenomena ini mengacu pada studi kasus yang dialami oleh Maudy Koesnaedi, Bangpen, dan Shabina Gianti. Peneliti ingin mengetahui proses pengelolaan personal branding yang ingin mereka bentuk, dan sampaikan ke publik lewat media sosial Instagram. Penelitian ini menggunakan metode kualitatif, dengan studi kasus deskriptif, yang berangkat dari paradigma Post Positivisme. Konsep yang digunakan adalah personal branding, dan dipertajam dengan teori Communication Private Management (CPM Theory). Teknik pengumpulan datanya ialah observasi, wawancara, dan analisis dokumentasi. Konsep personal branding yang dikemukakan oleh Peter Montoya, mengacu pada delapan hukum, yaitu hukum spesialisasi (the law of specialization), hukum kepemimpinan (the law of leadership), hukum kepribadian (the law of personality), hukum perbedaan (the law of distinctiveness), hukum kenampakan (the law of visibility), hukum kesatuan (the law of unity), hukum keteguhan (the law of persistence), dan hukum maksud baik (the law of good will). Dari kedelapan hukum ini, peneliti melihat bahwa ketiga narsumber memiliki keistimewaan yang berbeda-beda, konsisten dalam mengelola personal branding, dan mampu menunjukkan etika yang baik dalam sosial. Teori Communication Private Management (CPM Theory), yang dikemukakan oleh Sandra Petronio, memiliki lima asumsi dasar untuk melihat bagaimana mereka mengelola informasi yang bersifat pribadi di wilayah publik. Lima asumsi itu ialah informasi privat, batasan privat, kontrol dan kepemilikan, sistem manajemen berdasarkan aturan, dan dialektika manajemen. Ketiga narasumber secara garis besar sudah mengetahui batasan privasi mereka dengan publik, sehingga mereka memahami informasi yang boleh dan tidak untuk dibagikan kepada publik. Mereka memiliki manajemen yang baik, antara mereka dan netizen. Peneliti berharap semoga penelitian selanjutnya bisa lebih mengembangkan konsep personal branding, dan teori CPM. Semoga penelitian ini bisa menjadi rujukan, untuk dikembangkan lebih baik lagi dari segala aspek.</p><p><strong>Kata Kunci:</strong> Personal Branding, Abang None, Selebritis, Instagram</p>


Author(s):  
Lemi Baruh ◽  
Levent Soysal

In recent years, social media have become an important avenue for self-expression. At the same time, the ease with which individuals disclose their private information has added to an already heated debate about the privacy implications of interactive media. This chapter investigates the relationship between disclosure of personal information in social media and two related trends; the increasing value of subjective or private experience as a social currency and the evolving nature of automated dataveillance. The author argues that the results of the extended ability of individuals to negotiate their identity through social media are contradictory. The information revealed to communicate the complexity of one’s identity becomes an extensive source of data about individuals, thereby contributing to the functioning of a new regime of surveillance.


2015 ◽  
Vol 77 (19) ◽  
Author(s):  
Md. Nabil Ahmad Zawawi

Social media is playing an important role to most people these days. People are using it to be connected among peers, updated with the latest information and also for e-commerce purposes. However, apart from its benefits there are others who would use the information obtained from social media in a malicious way such as harvesting personal information for black mailing, information manipulation and tele-marketing. This threat coupled with unsafe social media practice could expose the social media users to being manipulate into sharing sensitive and revealing information about them. In this paper, a preliminary investigation to identify distinct characterizations of unsafe social media habits is presented. For this study, we focused on one particular social engineering attack known as gatekeeper friending. In this attack, a would--be attacker or manipulator of information could exploit information shared over a social network and how an unsafe social media habits could expose its users to such attacks and exploitation. By identifying this habits we hope that a more secure and cautious code of conduct could be established to prevent unwanted disclosure of private information for malicious intention.


2015 ◽  
Vol 19 (3) ◽  
pp. 270-287 ◽  
Author(s):  
Michael C Porter ◽  
Betsy Anderson ◽  
Mary Nhotsavang

Purpose – The purpose of this paper is to take the results of two studies to hypothesize about practice and recommend research/debate on business leaders’ use and perceptions of social media. Data were considered under the umbrella of current senior management practice, with the purpose to make suggestions for better practice, but primarily to theorize about the probable evolution of social media value and credibility for executives. Design/methodology/approach – The first study presents results from a qualitative content analysis of Fortune and Inc. 500 CEOs’ use of Twitter in terms of: activity and engagement; tweet subject matter; frequency of opinions expressed; and level of formality. The second considers the credibility of social media against traditional media and personal information sources within one quantitative survey. Findings – Senior executives using social media (Twitter) tend to engage in one-sided conversations in a two-way medium. Further, most CEOs appear to be using more formal language than general Twitter users. These factors, combined with the low credibility and value of social media by senior managers, may indicate the best future hope for social media credibility with executives will be neutral. Practical implications – In examining a combination of current literature and the data from these separate studies, the authors posit a number of underlying challenges in realizing the potential of the evolving social media environment that may deserve specific research. Originality/value – Discussion touches on implications for future adoption of social media tools by business leaders, as well as one-way vs two-way communication tendencies. This paper proposes a starting-point for theory development regarding this significant emerging area of communication.


2020 ◽  
Vol 26 (1) ◽  
pp. 151-156
Author(s):  
Andrei Șandor

AbstractSince the emergence of Internet and social media, new Intelligence branches have flourished, like CYBERINT (Cyber Intelligence), OSINT (Open Source Intelligence) or SOCMINT (Social Media Intelligence), with the aim to exploit different dimensions of the virtual world. These Intelligence-related disciplines may inquire personal information, statements and conversations posted voluntarily on websites or social platforms in order to profile people, identify social networks and organizational structures, and uncover vulnerabilities and threats/risks that can jeopardize the security of individuals or organizations. In this respect, the Internet - as environment - can provide valuable information from both technical and social side. This is why the World Wide Web is and will remain an important place to search for data and information that can be processed into Intelligence, and represents the reason why people working in sensitive domains (e.g. Intelligence) should be aware of their vulnerabilities and the risks and threats posed by this environment.DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence.


2020 ◽  
Vol 25 (2) ◽  
pp. 319-333
Author(s):  
Edina Ajanovic ◽  
Beykan Çizel

Considering the significant influence of online hotel reviews on both tourism demand and supply side, these may be considered as a successful persuasive tool. Accordingly, it is necessary to investigate the broader context in which reviews are generated and what are the components that contribute to their effectiveness. The main goal of this study was to analyze the communication occurring on hotel review platforms from a social psychological perspective through understanding structure, characteristics, and functions of attitudes expressed in guests' reviews. In addition, it aims to identify how persuasive cues in review responses should be defined. Following this aim, the authors applied multiple case study design and collected data in several stages through document analysis, participant observation, netnography, and interviews with different stakeholders involved in online review management process. Results of the qualitative content analysis showed that, in order to use the full persuasive potential of review platforms, it is necessary for hotel management to define its presence and visibility on these platforms, to conduct in-depth analysis of structure, characteristics, and functions of attitudes expressed in reviews, and to establish a systematic approach towards use of central and peripheral cues in review responses to induce desired cognitive processing of these messages.


Sign in / Sign up

Export Citation Format

Share Document