scholarly journals CHOICE AND CONTROL: AN ANALYSIS OF PRIVACY VALUES AND PRIVACY CONTROLS

Author(s):  
Chelsea Leigh Horne

There is incredible and intrinsic, though hidden, power in technology settings, including those set by online platforms. The hidden levers of control embedded within the default settings influence users’ overall experience on platforms and with technology, especially in regard to issues of privacy and security. This paper examines the embedded assumptions and implications of technology and technical design on society. To this end, this study addresses the role and power of social media platforms in developing and applying privacy and security policies and norms for their users. The privacy and security choices by social media platforms affect billions of users worldwide. Further, this study will consider how platforms’ public-facing rhetoric aligns or differs with the actual implementation of privacy policies and privacy and security user settings. The implications of this research may have profound impact in the governance, policy, and regulation of platforms.

2021 ◽  
Vol 4 (3) ◽  
pp. 432-437
Author(s):  
Sarah Gambo ◽  
Woyopwa Shem

Background: Amidst the recent outbreak of the Covid-19 pandemic, there seems to be an avalanche of conspiracy theories that abound on social media platforms, and this subject attracted a lot of research interest. This study aimed to examine the "social media and the spread Covid-19 conspiracy theories in Nigeria" in light of the above.  Methods: The study adopted a qualitative design in order to explore the subject matter thoroughly. Thirty-five participants were conveniently sampled, and interviews were conducted to retrieved data from the participants. Results: Findings of this study revealed that there is a prevalence of conspiracy theories that have saturated social media ever since the outbreak of the Covid-19 pandemic. It was also found that ignorance, religious fanaticism, lack of censorship, and insufficient counter information on social media platforms are some of the possible factors that aided the spread of Covid-19 conspiracy theories among Nigerian social media users. Conclusion: This study recommends, among other things, that there is a swift need to curtail the spread of conspiracy theories through consistent dissemination of counter-information by both individuals and agencies like the National Orientation Agency (NOA) and the Nigerian Centre for Disease and Control (NCDC).


2021 ◽  
Vol 14 (1) ◽  
pp. 410-419
Author(s):  
Mohammed Jabardi ◽  
◽  
Asaad Hadi ◽  

One of the most popular social media platforms, Twitter is used by millions of people to share information, broadcast tweets, and follow other users. Twitter is an open application programming interface and thus vulnerable to attack from fake accounts, which are primarily created for advertisement and marketing, defamation of an individual, consumer data acquisition, increase fake blog or website traffic, share disinformation, online fraud, and control. Fake accounts are harmful to both users and service providers, and thus recognizing and filtering out such content on social media is essential. This study presents a new approach to detect fake Twitter accounts using ontology and Semantic Web Rule Language (SWRL) rules. SWRL rules-based reasoner is utilized under predefined rules to infer whether the profile is trust or fake. This approach achieves a high detection accuracy of 97%. Furthermore, ontology classifier is an interpretable model that offers straightforward and human-interpretable decision rules.


2022 ◽  
pp. 385-410
Author(s):  
Časlav Kalinić ◽  
Miroslav D. Vujičić

The rise of social media allowed greater people participation online. Platforms such as Facebook, Twitter, Instagram, or TikTok enable visitors to share their thoughts, opinions, photos, locations. All those interactions create a vast amount of data. Social media analytics, as a way of application of big data, can provide excellent insights and create new information for stakeholders involved in the management and development of cultural tourism destinations. This chapter advocates for the employment of the big data concept through social media analytics that can contribute to the management of visitors in cultural tourism destinations. In this chapter, the authors highlight the principles of big data and review the most influential social media platforms – Facebook, Twitter, Instagram, and TikTok. On that basis, they disclose opportunities for the management and marketing of cultural tourism destinations.


Author(s):  
Desi Tri Kurniawati ◽  
Nadiyah Hirfiyana Rosita ◽  
Rila Anggraeni

Donations through social media or any online platforms are becoming a new trend these days, thanks to the use of emotional marketing through narrations and visual depictions showing the real condition of people who need supports. Organizations are led to raise people’s emotions to increase their intention to make donations. This study aims to examine the effect of emotional marketing on donation intention through social media platforms and people’s willingness to use technology (UTAUT). This is explanatory research was conducted through a survey on 365 respondents of Malang city who had seen a crowdfunding commercial of Kitabisa.com. The structural equation analysis has led to findings that emotional marketing significantly influences people’s donation intention, implying that the commercial is able to affect people’s emotion into empathy and willingness to make donations through the charity campaign. Furthermore, this study also finds that UTAUT has a significant effect on the intention. The findings are useful for Kitabisa.com in their effort to increase people’s donation intention through the use of emotional marketing.


2019 ◽  
Vol 7 (2) ◽  
pp. 173-183 ◽  
Author(s):  
Jay Marlowe

As social media platforms and the associated communication technologies become increasingly available, affordable and usable, these tools effectively enable forced migrants to negotiate political life across borders. This connection provides a basis for resettled refugees to interact with their transnational networks and engage in political activities in novel ways. This article presents a digital ethnography with 15 resettled refugees living in New Zealand and the role of social media and transnational networks for the maintenance and creation of political lives. Taking a broad interpretation of how political and political life are understood, this article focuses on how power is achieved and leveraged to provide legitimacy and control. In particular, it examines how refugees practise transnational politics through social media as they navigate both the subjugation and subversion of power. These digital interactions have the potential to reconfigure and, at times collapse, the distance between the resettled “here” and the transnational “there”. This article highlights how social media facilitates political lives as an ongoing transnational phenomenon and its implications for the country of resettlement and the wider diaspora.


Author(s):  
Emilio Ferrara

With people moving out of physical public spaces due to containment measures to tackle the novel coronavirus (COVID-19) pandemic, online platforms become even more prominent tools to understand social discussion. Studying social media can be informative to assess how we are collectively coping with this unprecedented global crisis. However, social media platforms are also populated by bots, automated accounts that can amplify certain topics of discussion at the expense of others. In this paper, we study 43.3M English tweets about COVID-19 and provide early evidence of the use of bots to promote political conspiracies in the United States, in stark contrast with humans who focus on public health concerns.


Author(s):  
Konstantinos Siassiakos ◽  
Athina Lazakidou

Privacy includes the right of individuals and organizations to determine for themselves when, how and to what extent information about them is communicated to others. The growing need of managing large amounts of medical data raises important legal and ethical challenges. E-Health systems must be capable of adhering to clearly defined security policies based upon legal requirements, regulations and standards while catering for dynamic healthcare and professional needs. Such security policies, incorporating enterprise level principles of privacy, integrity and availability, coupled with appropriate audit and control processes, must be able to be clearly defined by enterprise management with the understanding that such policy will be reliably and continuously enforced. This chapter addresses the issue of identifying and fulfilling security requirements for critical applications in the e-health domain. In this chapter the authors describe the main privacy and security measures that may be taken by the implementation of e-health projects.


Author(s):  
Sema Bulat Demir ◽  
Ayten Övür

Nowadays, social media platforms are frequently being used on the Internet. When the users create an account for these platforms, they are required to accept the data privacy policy. With the approval of the data policy, major problems may arise such as observing every activity of users on the platform, violations of security and protection of personal data, and sharing user data with third parties for commercial purposes. In this regard, it is significant to examine the privacy policies of social media platforms in detail. In this research, we examined the privacy policies of the five most popular free applications on the communication section of the Google Play Store on January 30th, 2021. The privacy policies of these applications were analyzed with the content analysis method, and the research aims to reveal the area of utilization of the data that the users provide, with or without the permission of the user.


2019 ◽  
Vol 8 (2) ◽  
pp. 149-166 ◽  
Author(s):  
Catherine Archer

The rise of blogging mothers as precariat workers conducting ‘playbour’, a combination of play and labour, and as subjects of neoliberalism, requires a re-examination of virtually mobile mothers and their role in 21st century society. At the same time, public relations (PR) and marketing practitioners are grappling with how to interact and ‘work’ with these, among other, social media influencers who are increasingly seen as able to sell products and ideas through their blogs, Instagram, Facebook and other social media platforms. The relatively new relationships between PR practitioners and social media influencers raise questions of unequal power and vulnerability for both the largely amateur influencers and the PR practitioners. The relationship between the two means that ethical questions around exploitation, authenticity, professionalism and control have arisen, with both sides feeling their way in new terrain. This article uses the concepts of precarity and liminality and applies them to a group of ‘mommy/mummy/mum bloggers’, that is, blogging mothers of young children, negotiating their identities as mothers, and moving beyond their homes using social media to, in part, create a sense of belonging (but also, in some cases, to make money). The article is based on the author’s own longitudinal digital ethnography within online influencer territory, and includes mainstream and online media reports and interviews with both mum bloggers and PR practitioners. It is argued that the marketisation of motherhood within a dominant culture of neoliberalism means that practitioners may wrongly assume that mum bloggers are acting freely to engage with entrepreneurial endeavours.


2019 ◽  
Vol 41 (8) ◽  
pp. 1261-1278 ◽  
Author(s):  
Benjamin Hanckel ◽  
Son Vivienne ◽  
Paul Byron ◽  
Brady Robards ◽  
Brendan Churchill

Lesbian, gay, bisexual, transgender, queer, intersex, and other non-heterosexual and gender diverse (LGBTIQ+) young people utilise a range of digital media platforms to explore identity, find support and manage boundaries. Less well understood, however, is how they navigate risk and rewards across the different social media platforms that are part of their everyday lives. In this study, we draw on the concept of affordances, as well as recent work on curation, to examine 23 in-depth interviews with LGBTIQ+ young people about their uses of social media. Our findings show how the affordances of platforms used by LGBTIQ+ young people, and the contexts of their engagement, situate and inform a typology of uses. These practices – focused on finding, building and fostering support – draw on young people’s social media literacies, where their affective experiences range from feelings of safety, security and control, to fear, disappointment and anger. These practices also work to manage boundaries between what is ‘for them’ (family, work colleagues, friends) and ‘not for them’. This work allowed our participants to mitigate risk, and circumnavigate normative platform policies and norms, contributing to queer-world building beyond the self. In doing so, we argue that young people’s social media curation strategies contribute to their health and well-being.


Sign in / Sign up

Export Citation Format

Share Document