The aim of the study is to explore cross-cultural differences in users’ location privacy behaviour on LBSNs (location-based social networks) in China, the Netherlands and Korea. The study suggests evidence that Chinese, Dutch and Korean users exhibit different location privacy concerns, attitudes to social influence, perceived privacy control and willingness to share location-related information on LBSNs. The results
show that in general, the more concerned users are about location privacy, the less they are willing to share and it also suggests that location privacy concern and social influence affect each other. Furthermore, the more control people perceive they have over their privacy, the more they are willing to share location information. A negative relationship between willingness to share location information and users’ actual sharing of location information was seen. In short, it is concluded that the relation between cultural values and location privacy behaviours only have a partial connection.
1) The document compares predictors of self-disclosure and privacy settings use between adolescents and adults on social network sites. It finds that adolescents disclose more personal information and have more lenient privacy settings than adults.
2) Several factors were found to affect disclosure and privacy settings, with some differences between adolescents and adults. Gender, age, frequency of use, motives for use, concerns about privacy and contacts, trust in others, and susceptibility to peer influence were investigated as predictors.
3) The study aims to provide better information for developing interventions to encourage appropriate privacy management tailored for different age groups on social network sites.
1) The document examines whether norms supporting disclosure of one's online and offline identities are associated with disclosure of personal information online.
2) It reviews theories on how anonymity and lack of cues in online environments may increase self-disclosure to reduce uncertainty, versus theories that predict less disclosure without social presence cues.
3) Research is analyzed showing teens often post photos, names, locations online, and college students frequently share real names, despite potential risks of personal information being misused or abused.
This document summarizes a study that explored the use of Twitter among Korean boy band fan club members in Thailand. The study used a survey of 68 fans to examine how their Twitter usage and behaviors may change based on the number of followers they have. The study found that having more followers can create pressure to post certain types of content and restrict expressing opinions. It also found that Twitter is used for social interactions, information sharing, and expressing opinions, which aligns with Uses and Gratification theory about motivations for using different media.
Suazo%2c martínez & elgueta english version2011990
This document summarizes a study that analyzed the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study found that social networks mainly strengthen existing social ties rather than create new connections. It also found that Facebook's horizontal structure and lack of centralized control enables strong information sharing. Finally, the study aimed to determine if Groups or Causes were better for generating cyberactivism campaigns and setting independent social media agendas.
This document summarizes a study that compares the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study aimed to determine if these applications are used for cyberactivism related to real-world issues and places in Chile. It also sought to identify trends in topics of discussion and whether there are correlations between topics discussed nationally and locally. The main findings were that Facebook is mainly used to strengthen existing social ties rather than create new connections, and that it allows for distributed organization without centralized control of information.
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
This document discusses key concepts related to computer-mediated communication and social theories, including:
- CMC and how it begins to explain social network and media behavior and culture.
- Early HCI research on how humans engage with computers.
- Packet switching and how internet data is transferred.
- Early adopters who first adopt new technologies.
- User profiles, tagging, geotagging, and vlogs on social media.
- Internet Protocol addresses and virtual communities online.
- The Electronic Frontier Foundation, a digital rights group founded in 1990.
This document discusses key concepts related to computer-mediated communication (CMC) and social theories, including:
- CMC as a social construct that explains social network and media behavior.
- Early research on how humans interacted with computers.
- Packet switching and how internet data is transferred.
- Early adopters who first adopt new technologies.
- User profiles, tagging, geotagging, and vlogs on social media.
- Internet protocol addresses and virtual communities online.
- The Electronic Frontier Foundation, a digital rights group founded in 1990 to defend civil liberties online.
The document poses discussion questions about how CMC has influenced relationships, how social networks depict
1) The document compares predictors of self-disclosure and privacy settings use between adolescents and adults on social network sites. It finds that adolescents disclose more personal information and have more lenient privacy settings than adults.
2) Several factors were found to affect disclosure and privacy settings, with some differences between adolescents and adults. Gender, age, frequency of use, motives for use, concerns about privacy and contacts, trust in others, and susceptibility to peer influence were investigated as predictors.
3) The study aims to provide better information for developing interventions to encourage appropriate privacy management tailored for different age groups on social network sites.
1) The document examines whether norms supporting disclosure of one's online and offline identities are associated with disclosure of personal information online.
2) It reviews theories on how anonymity and lack of cues in online environments may increase self-disclosure to reduce uncertainty, versus theories that predict less disclosure without social presence cues.
3) Research is analyzed showing teens often post photos, names, locations online, and college students frequently share real names, despite potential risks of personal information being misused or abused.
This document summarizes a study that explored the use of Twitter among Korean boy band fan club members in Thailand. The study used a survey of 68 fans to examine how their Twitter usage and behaviors may change based on the number of followers they have. The study found that having more followers can create pressure to post certain types of content and restrict expressing opinions. It also found that Twitter is used for social interactions, information sharing, and expressing opinions, which aligns with Uses and Gratification theory about motivations for using different media.
Suazo%2c martínez & elgueta english version2011990
This document summarizes a study that analyzed the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study found that social networks mainly strengthen existing social ties rather than create new connections. It also found that Facebook's horizontal structure and lack of centralized control enables strong information sharing. Finally, the study aimed to determine if Groups or Causes were better for generating cyberactivism campaigns and setting independent social media agendas.
This document summarizes a study that compares the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study aimed to determine if these applications are used for cyberactivism related to real-world issues and places in Chile. It also sought to identify trends in topics of discussion and whether there are correlations between topics discussed nationally and locally. The main findings were that Facebook is mainly used to strengthen existing social ties rather than create new connections, and that it allows for distributed organization without centralized control of information.
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
This document discusses key concepts related to computer-mediated communication and social theories, including:
- CMC and how it begins to explain social network and media behavior and culture.
- Early HCI research on how humans engage with computers.
- Packet switching and how internet data is transferred.
- Early adopters who first adopt new technologies.
- User profiles, tagging, geotagging, and vlogs on social media.
- Internet Protocol addresses and virtual communities online.
- The Electronic Frontier Foundation, a digital rights group founded in 1990.
This document discusses key concepts related to computer-mediated communication (CMC) and social theories, including:
- CMC as a social construct that explains social network and media behavior.
- Early research on how humans interacted with computers.
- Packet switching and how internet data is transferred.
- Early adopters who first adopt new technologies.
- User profiles, tagging, geotagging, and vlogs on social media.
- Internet protocol addresses and virtual communities online.
- The Electronic Frontier Foundation, a digital rights group founded in 1990 to defend civil liberties online.
The document poses discussion questions about how CMC has influenced relationships, how social networks depict
This document discusses key concepts related to computer-mediated communication and social theories, including:
- CMC and how it begins to explain social network and media behavior and culture.
- Early research on how humans engaged with computers.
- Packet switching and how internet data is transferred.
- Early adopters who first adopt new technologies.
- User profiles, tagging, geotagging, and vlogs on social media.
- Internet protocol addresses and virtual communities online.
- The Electronic Frontier Foundation, a digital rights group founded in 1990.
It also includes discussion questions about how CMC has influenced relationships, visualizing social networks, and describing favorite internet memes.
The document discusses how the internet may impact social capital. It presents three perspectives: that the internet increases social capital by enabling new forms of interaction and community; decreases social capital by competing for time and reducing offline social interaction; or supplements social capital by providing an additional means of communication without major effects on offline social life. The document then analyzes data from a 1998 survey of National Geographic website visitors to evaluate these perspectives.
Relational Development & Interpersonal Communication In Computer Mediated Con...maxbury
This document summarizes research on how computer-mediated communication affects relational development. It discusses how social information processing theory explains that in computer-mediated contexts, verbal cues of affinity and issues of time (chronemics) become especially important for developing relationships due to the lack of in-person nonverbal cues. Some research has found similarities between online and in-person relationship development, but most research cited finds that self-disclosure of meaningful information through text is important for developing relational closeness and attraction when communication is mediated by computers rather than face-to-face. The document provides examples of studies that have examined how factors like depth and breadth of self-disclosure can influence relationship development in online contexts.
This study examines how computer-mediated communication (CMC) has changed social interactions and relationships through the lens of uncertainty reduction theory (URT). A survey was conducted to understand if people prefer using the internet over face-to-face interactions to reduce uncertainty and form relationships. It also assessed which URT strategies - passive, active, or interactive - people prefer when looking for friendships versus romantic relationships. The study aims to provide quantitative data on how CMC has impacted relationship formation and determine if further research is needed to understand changes in a increasingly digital world.
Power and Participation in Digital Late Modernity: Towards a Network LogicJakob Svensson
This document discusses how digital technologies and new media are shaping political participation through the emergence of a "network logic". It argues that users are increasingly disciplined by digital media to be constantly updated and responsive on social networks in order to maintain their online identities and connections. As a result, political participation is becoming more expressive and focused on negotiating individual identities through online networks and links to others, rather than substantive policy debates. The network logic emphasizes reflexivity, connectivity, and identity performance over traditional forms of participation.
This document presents a proposal and literature review for an undergraduate thesis exploring the meanings and emotions people experience when viewing photos of other people on Instagram. The literature review discusses research on social media interactions and how people present themselves online. It finds that people increasingly use social media to build and maintain relationships. The proposed study will qualitatively examine how Instagram users feel when viewing photos and the meanings they associate with different types of photos. It aims to provide insight into how online photo sharing and social media use may influence psychosocial well-being.
1. CMC has influenced relationship formation by allowing people to connect globally at all hours but relationships may not be genuine since identity is unknown.
2. A visualization of social networks would show weak communication patterns for the individual since they prefer texting over social media and only share videos, news, and images rather than build relationships.
3. The individual's favorite internet meme is the ongoing rapper feud between Drake and Meek Mill which has produced many memes and possibly transfers cultural views by influencing opinions of Meek Mill through the memes that side with the winning Drake.
The document discusses how social capital theory can help explain the social effects of the Internet. It argues that individuals and communities with higher levels of social capital, as measured by factors like generalized reciprocity and social ties, will be more socially active online as well as offline. Empirical evidence from studies in Los Angeles and of U.S. states supports this, finding those with more offline social connections and belonging were more likely to make online friends or participate in online groups. The document calls for more research examining social capital and online activity over time and across different communities.
Social media poses several privacy and safety risks to users. Some key risks include involuntary sharing of personal information, commercial exploitation of user data, identity theft, and stalking. Users must also be careful of how they present themselves online to avoid issues like harsh criticism, inappropriate sharing of sensitive content, and legal issues from sharing content like copyrighted material. Service providers also face risks, including liability for illegal user-generated content and how they handle and protect user data. Proper privacy settings and awareness of these issues are important for safe social media use.
Are Social Media Emancipatory or Hegemonic? Societal Effects of Mass Media D...MIS Quarterly
This study examines how social media and traditional media shape public discourse during sociopolitical issues. The researchers analyzed media coverage and online discourse around the Stop Online Piracy Act (SOPA) to test propositions about how different types of media may afford emancipation through participation or hegemony through control of discourse. The findings showed that social media allowed more participation through unconstrained authorship and influence, but also exhibited more constrained framing of issues than traditional media. Lean social media further exacerbated these effects by limiting participation and framing. Overall, both social and traditional media were found to both enable emancipation through participation and exhibit hegemonic control of discourse framing.
This document summarizes research on social influence and persuasion online. It begins by defining key terms like social influence, persuasion, compliance, and discusses how computer-mediated communication differs from other forms. Namely, it can allow for anonymity, decrease importance of physical appearance, remove barriers to interacting with others, and give users more control over interactions. It then reviews dual process models of persuasion and research showing peripheral cues may be less salient online, leading people to focus more on message content. Several studies comparing online to offline persuasion are summarized, finding online influence may rely more on systematic/central processing of arguments than peripheral cues.
The Dress vs. Ebola: The Effect of Different News Sources on Social Action.Deborah Tuggy
Abstract
Abstract
This study looks at how different types of news sources affects social action. It predicts that infotainment consumption is related inversely with social action, while news consumption is positively correlated with societal action. Findings show that most respondents use both social media and online news as news sources, and that while there is a relationship between different types of news media sources and different types and varying frequencies of social action, other factors such as religiosity, political party, sex, SES and class year have an impact as well. Thus the casual model is a much more complex and complicated one than expected, and it would be fascinating to further explore this phenomenon.
Exploring addiction to social networking service among young Chinese adultsDigital Society
This document outlines a research proposal to examine addictive tendencies of using social networking sites (SNS) among Chinese young adults. The study aims to explore how specific activities on SNS correlate with addiction and examine psychological dependence. A literature review discusses factors influencing SNS use such as feedback received and virtual interactions. The methodology will use quantitative surveys of SNS usage patterns and perceptions of addiction administered to university students in China. Hypotheses predict more responses/comments and interactions will correlate with increased addiction.
Relational Development And Maintenance on Social NetworkingNeville Wiles
Men and women develop and maintain relationships on social networking sites differently through the use of uncertainty reduction theory. Women are more likely to use social networking sites to connect with friends and family and spend more time on the sites for entertainment and passing time. They also disclose more personal information, use more relational maintenance strategies like positivity and openness, and communicate in a more expressive style. Men tend to use social networking sites less for relationship maintenance and disclose less personal information. Their communication style is more instrumental. Uncertainty reduction theory posits that increasing self-disclosure and perceptions of similarity can help develop relationships by increasing predictability and trust between users.
1. The document discusses computer-mediated communication (CMC) and how it has influenced relationship formation and online identities. Early CMC included email and online forums.
2. Research on CMC examined how online communities and social networks develop through identity presentation and relationship building. However, CMC lacks the richness of in-person interaction and can blur reality and fantasy.
3. The spread of internet memes is also discussed in the context of CMC. Memes spread and evolve through imitation, similar to genes, as they compete for attention online.
Dr. Reijo Savolainen is a professor known for his research on Everyday Life Information Seeking (ELIS), which examines how social and cultural factors influence how people seek information in their daily lives to solve problems or stay informed. ELIS focuses on how gender, age, education and other attributes shape one's information behavior. It also considers concepts like people accepting "good enough" information to meet their needs before moving on.
This document summarizes a research article about social media data mining and public agency. It discusses how social media data mining is currently used to create "known publics" by large corporations and governments, but raises concerns that this results in less privacy, increased surveillance, and social discrimination. However, the document argues that data mining could be democratized to create "knowing publics" by making data mining more transparent and accessible to the public, and using it in a way that allows publics to understand themselves and act collectively. The document imagines how, if done this way, data mining could empower publics with greater agency over how their data is represented and understood.
Baym, nancy k. (2015). personal connections in the digital ageRAJU852744
This document summarizes Nancy Baym's book "Personal Connections in the Digital Age" which examines how people incorporate digital media like the internet and mobile phones into their relationships. The book identifies seven key concepts for differentiating digital media: interactivity, temporal structure, social cues, storage, replicability, reach, and mobility. It uses these concepts to compare different media and explore how capabilities of various digital platforms influence relationship formation and maintenance.
Visible Effort: A Social Entropy Methodology for Managing Computer-Mediated ...Sorin Adam Matei
A theoretically-grounded learning feedback tool suite, the Visible Effort (VE) Mediawiki extension, is proposed for optimizing online group learning activities by measuring the amount of equality and the emergence of social structure in groups that participate in Computer-Mediated Collaboration (CMC). Building on social entropy theory, drawn from Shannon’s Mathematical Theory of Communication, VE captures levels of CMC unevenness and group structure and visualizes them on wiki Web pages through background colors, charts, and tabular data. Visual information provides users entropic feedback on how balanced and equitable collaboration is within their online group are, while helping them to maintain it within optimal levels. Finally, we present the theoretical and practical implications of VE and the measures behind it, as well as illustrate VE’s capabilities by describing a quasi-experimental teaching activity (use scenario) in tandem with a detailed discussion of theoretical justification, methodological underpinning, and technological capabilities of the approach.
Western Bonanza is a large-scale livestock show run by Cal Poly students that has been held annually since 1985. The 2016 leadership team is preparing for the upcoming show in February by meeting weekly and making some changes to branding and awards. They are joined by new advisors as they plan to keep the show focused on its tradition of being professionally run by students. Students can get involved by joining one of the nine committees responsible for tasks like merchandise, media, entries, awards, and livestock. Being part of Western Bonanza is considered a unique and memorable experience by past participants.
This document discusses key concepts related to computer-mediated communication and social theories, including:
- CMC and how it begins to explain social network and media behavior and culture.
- Early research on how humans engaged with computers.
- Packet switching and how internet data is transferred.
- Early adopters who first adopt new technologies.
- User profiles, tagging, geotagging, and vlogs on social media.
- Internet protocol addresses and virtual communities online.
- The Electronic Frontier Foundation, a digital rights group founded in 1990.
It also includes discussion questions about how CMC has influenced relationships, visualizing social networks, and describing favorite internet memes.
The document discusses how the internet may impact social capital. It presents three perspectives: that the internet increases social capital by enabling new forms of interaction and community; decreases social capital by competing for time and reducing offline social interaction; or supplements social capital by providing an additional means of communication without major effects on offline social life. The document then analyzes data from a 1998 survey of National Geographic website visitors to evaluate these perspectives.
Relational Development & Interpersonal Communication In Computer Mediated Con...maxbury
This document summarizes research on how computer-mediated communication affects relational development. It discusses how social information processing theory explains that in computer-mediated contexts, verbal cues of affinity and issues of time (chronemics) become especially important for developing relationships due to the lack of in-person nonverbal cues. Some research has found similarities between online and in-person relationship development, but most research cited finds that self-disclosure of meaningful information through text is important for developing relational closeness and attraction when communication is mediated by computers rather than face-to-face. The document provides examples of studies that have examined how factors like depth and breadth of self-disclosure can influence relationship development in online contexts.
This study examines how computer-mediated communication (CMC) has changed social interactions and relationships through the lens of uncertainty reduction theory (URT). A survey was conducted to understand if people prefer using the internet over face-to-face interactions to reduce uncertainty and form relationships. It also assessed which URT strategies - passive, active, or interactive - people prefer when looking for friendships versus romantic relationships. The study aims to provide quantitative data on how CMC has impacted relationship formation and determine if further research is needed to understand changes in a increasingly digital world.
Power and Participation in Digital Late Modernity: Towards a Network LogicJakob Svensson
This document discusses how digital technologies and new media are shaping political participation through the emergence of a "network logic". It argues that users are increasingly disciplined by digital media to be constantly updated and responsive on social networks in order to maintain their online identities and connections. As a result, political participation is becoming more expressive and focused on negotiating individual identities through online networks and links to others, rather than substantive policy debates. The network logic emphasizes reflexivity, connectivity, and identity performance over traditional forms of participation.
This document presents a proposal and literature review for an undergraduate thesis exploring the meanings and emotions people experience when viewing photos of other people on Instagram. The literature review discusses research on social media interactions and how people present themselves online. It finds that people increasingly use social media to build and maintain relationships. The proposed study will qualitatively examine how Instagram users feel when viewing photos and the meanings they associate with different types of photos. It aims to provide insight into how online photo sharing and social media use may influence psychosocial well-being.
1. CMC has influenced relationship formation by allowing people to connect globally at all hours but relationships may not be genuine since identity is unknown.
2. A visualization of social networks would show weak communication patterns for the individual since they prefer texting over social media and only share videos, news, and images rather than build relationships.
3. The individual's favorite internet meme is the ongoing rapper feud between Drake and Meek Mill which has produced many memes and possibly transfers cultural views by influencing opinions of Meek Mill through the memes that side with the winning Drake.
The document discusses how social capital theory can help explain the social effects of the Internet. It argues that individuals and communities with higher levels of social capital, as measured by factors like generalized reciprocity and social ties, will be more socially active online as well as offline. Empirical evidence from studies in Los Angeles and of U.S. states supports this, finding those with more offline social connections and belonging were more likely to make online friends or participate in online groups. The document calls for more research examining social capital and online activity over time and across different communities.
Social media poses several privacy and safety risks to users. Some key risks include involuntary sharing of personal information, commercial exploitation of user data, identity theft, and stalking. Users must also be careful of how they present themselves online to avoid issues like harsh criticism, inappropriate sharing of sensitive content, and legal issues from sharing content like copyrighted material. Service providers also face risks, including liability for illegal user-generated content and how they handle and protect user data. Proper privacy settings and awareness of these issues are important for safe social media use.
Are Social Media Emancipatory or Hegemonic? Societal Effects of Mass Media D...MIS Quarterly
This study examines how social media and traditional media shape public discourse during sociopolitical issues. The researchers analyzed media coverage and online discourse around the Stop Online Piracy Act (SOPA) to test propositions about how different types of media may afford emancipation through participation or hegemony through control of discourse. The findings showed that social media allowed more participation through unconstrained authorship and influence, but also exhibited more constrained framing of issues than traditional media. Lean social media further exacerbated these effects by limiting participation and framing. Overall, both social and traditional media were found to both enable emancipation through participation and exhibit hegemonic control of discourse framing.
This document summarizes research on social influence and persuasion online. It begins by defining key terms like social influence, persuasion, compliance, and discusses how computer-mediated communication differs from other forms. Namely, it can allow for anonymity, decrease importance of physical appearance, remove barriers to interacting with others, and give users more control over interactions. It then reviews dual process models of persuasion and research showing peripheral cues may be less salient online, leading people to focus more on message content. Several studies comparing online to offline persuasion are summarized, finding online influence may rely more on systematic/central processing of arguments than peripheral cues.
The Dress vs. Ebola: The Effect of Different News Sources on Social Action.Deborah Tuggy
Abstract
Abstract
This study looks at how different types of news sources affects social action. It predicts that infotainment consumption is related inversely with social action, while news consumption is positively correlated with societal action. Findings show that most respondents use both social media and online news as news sources, and that while there is a relationship between different types of news media sources and different types and varying frequencies of social action, other factors such as religiosity, political party, sex, SES and class year have an impact as well. Thus the casual model is a much more complex and complicated one than expected, and it would be fascinating to further explore this phenomenon.
Exploring addiction to social networking service among young Chinese adultsDigital Society
This document outlines a research proposal to examine addictive tendencies of using social networking sites (SNS) among Chinese young adults. The study aims to explore how specific activities on SNS correlate with addiction and examine psychological dependence. A literature review discusses factors influencing SNS use such as feedback received and virtual interactions. The methodology will use quantitative surveys of SNS usage patterns and perceptions of addiction administered to university students in China. Hypotheses predict more responses/comments and interactions will correlate with increased addiction.
Relational Development And Maintenance on Social NetworkingNeville Wiles
Men and women develop and maintain relationships on social networking sites differently through the use of uncertainty reduction theory. Women are more likely to use social networking sites to connect with friends and family and spend more time on the sites for entertainment and passing time. They also disclose more personal information, use more relational maintenance strategies like positivity and openness, and communicate in a more expressive style. Men tend to use social networking sites less for relationship maintenance and disclose less personal information. Their communication style is more instrumental. Uncertainty reduction theory posits that increasing self-disclosure and perceptions of similarity can help develop relationships by increasing predictability and trust between users.
1. The document discusses computer-mediated communication (CMC) and how it has influenced relationship formation and online identities. Early CMC included email and online forums.
2. Research on CMC examined how online communities and social networks develop through identity presentation and relationship building. However, CMC lacks the richness of in-person interaction and can blur reality and fantasy.
3. The spread of internet memes is also discussed in the context of CMC. Memes spread and evolve through imitation, similar to genes, as they compete for attention online.
Dr. Reijo Savolainen is a professor known for his research on Everyday Life Information Seeking (ELIS), which examines how social and cultural factors influence how people seek information in their daily lives to solve problems or stay informed. ELIS focuses on how gender, age, education and other attributes shape one's information behavior. It also considers concepts like people accepting "good enough" information to meet their needs before moving on.
This document summarizes a research article about social media data mining and public agency. It discusses how social media data mining is currently used to create "known publics" by large corporations and governments, but raises concerns that this results in less privacy, increased surveillance, and social discrimination. However, the document argues that data mining could be democratized to create "knowing publics" by making data mining more transparent and accessible to the public, and using it in a way that allows publics to understand themselves and act collectively. The document imagines how, if done this way, data mining could empower publics with greater agency over how their data is represented and understood.
Baym, nancy k. (2015). personal connections in the digital ageRAJU852744
This document summarizes Nancy Baym's book "Personal Connections in the Digital Age" which examines how people incorporate digital media like the internet and mobile phones into their relationships. The book identifies seven key concepts for differentiating digital media: interactivity, temporal structure, social cues, storage, replicability, reach, and mobility. It uses these concepts to compare different media and explore how capabilities of various digital platforms influence relationship formation and maintenance.
Visible Effort: A Social Entropy Methodology for Managing Computer-Mediated ...Sorin Adam Matei
A theoretically-grounded learning feedback tool suite, the Visible Effort (VE) Mediawiki extension, is proposed for optimizing online group learning activities by measuring the amount of equality and the emergence of social structure in groups that participate in Computer-Mediated Collaboration (CMC). Building on social entropy theory, drawn from Shannon’s Mathematical Theory of Communication, VE captures levels of CMC unevenness and group structure and visualizes them on wiki Web pages through background colors, charts, and tabular data. Visual information provides users entropic feedback on how balanced and equitable collaboration is within their online group are, while helping them to maintain it within optimal levels. Finally, we present the theoretical and practical implications of VE and the measures behind it, as well as illustrate VE’s capabilities by describing a quasi-experimental teaching activity (use scenario) in tandem with a detailed discussion of theoretical justification, methodological underpinning, and technological capabilities of the approach.
Western Bonanza is a large-scale livestock show run by Cal Poly students that has been held annually since 1985. The 2016 leadership team is preparing for the upcoming show in February by meeting weekly and making some changes to branding and awards. They are joined by new advisors as they plan to keep the show focused on its tradition of being professionally run by students. Students can get involved by joining one of the nine committees responsible for tasks like merchandise, media, entries, awards, and livestock. Being part of Western Bonanza is considered a unique and memorable experience by past participants.
This document describes a wireless fingerprint attendance system that was designed to automatically record student attendance using fingerprint identification. The system uses a fingerprint sensor module connected to a computer via a Zigbee wireless network. Students register their fingerprints initially. When attending a lecture, they place their finger on the sensor to be identified and have their attendance marked electronically and automatically. The system aims to eliminate the disadvantages of traditional paper-based attendance tracking systems. It provides a low-cost and efficient automatic solution for recording attendance.
This document lists 4 breathtaking vacation spots in Southeast Asia: Ko Phi Phi Don, Bali, Angkor, and Bagan. The document does not provide any additional details about each location beyond their names.
This document provides information about forming verbs in the simple past tense in English. It discusses:
1) Regular verbs are formed by adding "-ed" to the base form (worked, cleaned). Irregular verbs have unique past forms (begin/began, lose/lost, meet/met).
2) Examples are given of verbs in the simple past positive and negative forms (I played/I did not play).
3) Questions in the simple past are formed with "did" plus the base verb (Did you play? Did she go?). Short answers are yes/no plus the subject.
Este documento describe cómo la tecnología puede promover la inclusión de personas con discapacidad. Explica que existen recursos tecnológicos diseñados específicamente para brindar accesibilidad y apoyar el aprendizaje de personas con discapacidad. Además, clasifica diferentes recursos tecnológicos de apoyo según su finalidad, costo, medio de acceso, tipo de materiales, tecnología utilizada, medios empleados y tipo de discapacidad. Finalmente, menciona algunos ejemplos de recursos para
Using Content To Support The Sales TeamIT Decisions
The document discusses how content can support sales teams by establishing thought leadership. It notes that 82% of B2B buyers are influenced by online search results for a company or individual. For those too busy to blog, it recommends hiring a ghostwriter to post content that positions the company as an expert. A ghostwriter would brief on business areas and create regular blogs to promote on social media. This improves online search results and allows companies to look like thought leaders in their field when prospects research them.
Tiga kalimat ringkasan dokumen tersebut adalah:
Dokumen tersebut membahas tentang keutamaan mengenal nama-nama indah Allah SWT yaitu al-Asmau-al-husna dan manfaat beriman kepada-Nya, seperti mendapatkan ketenteraman hati, bimbingan, ampunan dosa, dan kemudahan hidup. Dokumen ini juga menjelaskan makna dari salah satu nama Allah yaitu al-Karim sebagai Yang Mahamulia dan Mah
This document provides a 6-step guide for breaking free from emotional eating. It discusses how emotions drive eating behaviors and food choices. Step 1 explains the connection between emotions and food, how foods high in carbs and fat can boost serotonin and temporarily relieve negative feelings. Step 2 involves assessing if one is an emotional eater by considering eating behaviors. Step 3 recommends understanding personal emotional patterns and triggers. Step 4 stresses the importance of allowing oneself to feel uncomfortable emotions instead of avoiding them through eating. The guide advocates developing emotional mastery by observing feelings without judgment.
The document discusses the information behaviors and needs of low-income communities. It notes that informal social networks are important sources of information for things like community services, healthcare, education, and employment. While libraries provide some access to information resources, low-income individuals often do not see them as a primary source due to lack of trust in outside sources and lack of awareness of what libraries offer. The document recommends that libraries partner with other community organizations to help bridge gaps and gain community trust to provide more relevant information services.
The document discusses the information behaviors and needs of low-income communities. It notes that informal social networks are important sources of information for things like community services, healthcare, education, and employment. Friends, family, and community organizations are often more critical information sources than libraries. The barriers low-income individuals face include lack of access to resources, lack of trust in outside information, and not knowing how to access education and employment opportunities.
The document discusses the information seeking behaviors and needs of low-income communities. It notes that informal social networks are important sources of information for things like community services, healthcare, education, and employment. While libraries can provide access to resources, interpersonal connections within social circles and local organizations are typically more critical information channels for this group. The document also outlines some common barriers to information access for low-income individuals, such as lack of trust in outside sources, desire to avoid revealing needs, and lack of skills or perceived relevance of new technologies. It recommends that libraries partner with community organizations to help address these challenges.
The document discusses the information behaviors and needs of low-income communities. It notes that informal social networks are important sources of information for things like community services, healthcare, education, and employment. Friends, family, and community organizations are often more critical information sources than libraries. The barriers low-income individuals face include lack of access to resources, lack of trust in outside information, and not knowing how to access education and employment opportunities.
Hayes Privacy And Social Media Paper, October 29, 2010canadianlawyer
This document discusses privacy and social media, specifically the blurring line between public and private information online. It begins by introducing the topic and noting that privacy and the internet are inherently at odds. It then discusses how social media has expanded information sharing but also privacy risks. A key case discussed is the Facebook privacy complaint, which highlighted challenges in applying traditional privacy laws to social media. Reasonableness is seen as a flexible standard that may differ across generations and over time as attitudes change. Younger users seem less concerned with privacy risks of social media.
Social and Spatial Clustering of People at Humanity’s Largest GatheringBhaskar T
This document summarizes a research article that analyzed call detail records from 61 million cell phone users at the 2013 Kumbh Mela festival in India, the largest gathering in human history. The researchers estimated attendance by state and found evidence of both social and spatial homophily, or clustering with others from the same state. Attendees from less represented states showed stronger tendencies towards homophily. Homophily effects were amplified on more crowded days with higher attendance. The findings confirm that homophily, likely arising from social influence, is evident even at the massive scale of this historic festival.
Exploring Addiction to Social Networking Service among Young Chinese AdultsDigital Society
This document outlines a proposed study on addiction to social networking sites among young Chinese adults. The study would examine college students' usage of popular SNSs in China and their potential psychological dependence. A literature review discusses research on SNS addiction and factors that could influence it, such as feedback received, interactions, and loneliness. The proposed methodology involves a quantitative survey measuring SNS activities and perceptions of addiction. Hypotheses predict greater addiction risk from more responses to posts and interactions. The schedule outlines drafting the survey, data collection and analysis, and thesis writing from January to June.
Running head SOCIAL MEDIA EFFECT ON INTERPERSONAL RELATIONSHI.docxtoltonkendal
Running head: SOCIAL MEDIA EFFECT ON INTERPERSONAL RELATIONSHIPS 1
Social Media Effect on Interpersonal Relationships
Brenda Rouse
PHI103: Informal Logic
Instructor: Teresa Knox
February 13, 2017
- 1 -
[no notes on this page]
SOCIAL MEDIA EFFECT ON INTERPERSONAL RELATIONSHIPS 2
Social Media Effect on Interpersonal Relationships
The twenty-first century has experienced a sporadic increase in the use and innovation of
technology. There has been much improvement in people’s daily activities due to evolution in
innovations. However, so has been the increase in discussion on the appropriateness and the
costs that the society has had to pay because of the progress. For instance, use of social media
has been an issue that has led scholars to conduct extensive surveys, interviews, and experiments
with the hope of getting a grip on whether it has been of positive or negative influence to the
society. Among the most commonly, asked question is the role it has played in affecting
interpersonal relationships. Different theorists and scholars have had different opinions some of
which can be deduced through logical reasoning. One of the standard forms of expressing an
argument, which I will use in this discussion to draw a conclusion on the issue, would be:
P1: Communication with peer groups primary motivation of social media use
P2: Communication with peers promotes interpersonal relationships
C1: Social media enhances interpersonal relationships.
The first premise has been a result of some of the different studies that have been
influenced by the advent of increased social media use. According to Valerie Barker (2009),
scholarly data on the issue produced results that implied that a significantly high number of
social media users get to use the different platforms with the hope of interacting with their peers
(p. 211). Consequently, the respondents viewed the various platforms as an alternative to calling
their peers or sending them messages on their phones as a way of interaction. Before
popularization of social media, people would use their telephones to call or send messages to
their peers with the hope of engaging in a dialogue that would culminate in improved
relationships. Therefore, social media was seen as an alternative form of communication.
- 2 -
1
1. relationships.
Good format [Teresa Knox]
SOCIAL MEDIA EFFECT ON INTERPERSONAL RELATIONSHIPS 3
The second premise seeks to create a boundary between the first one and the conclusion.
Notably, one cannot engage in communication without expressing his or her ideas or emotions.
After all, communication is the one method using which one can send a message to a different
party. Therefore, in the course of communicating, different people get to learn about others and,
in the process, determine how best to deal with each other under different circumstances. As a
result, the relationship between the two parties improves after som ...
In search of a better understanding of social presence: An investigation into...Patrick Lowenthal
This document summarizes a study that analyzed how researchers define social presence in highly cited social presence research. The study found that the most common definitions referred to social presence as being salient, being real, or being there. Specifically, 36% of definitions described social presence as the degree of salience between communicators, 38% defined it as the degree to which a person is perceived as real, and additional definitions focused on feelings of connection, belonging, or being present. While many definitions referenced the Community of Inquiry framework, the study found there is still variability in how social presence is conceptualized among researchers.
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
I’ve spent my career so far studying the social outcomes people derive from their use of new communication systems like Facebook. These sites contain numerous affordances that differentiate them from other forms of communication & create low-cost environments for things like relationship maintenance and exchange of resources. I have found this research to be extremely rewarding, as it is important to understand how these social systems extend our capabilities for human interaction, beyond the more traditional forms of communication we have relied on previously.
But, there's a flip side to this story. Humans, by nature, are very social beings and want to interact, want to disclose information and share it with others. Social network sites and their like facilitate this through a variety of features. However, as individuals have moved their communication from offline spaces, where the interactions tend to be much more ephemeral and audiences are generally known, to online spaces, where the lines between public and private become much more blurred, I believe that thoughts of privacy of personal information are often lost in the novelty of the technologies. Now, as we begin to think about this issue more and more, I believe it’s time to step back and re-evaluate how we conceptualize our privacy in this highly networked world and to integrate that understanding into solutions that will help individuals become more savvy users of the technology.
Social media enables constant surveillance of users by friends and others with access to their profiles and information. Recent research shows that people often do not adjust privacy settings on social media sites like Facebook even when given opportunities. Law enforcement also uses information publicly available on social media to track down suspects, as one example showed where a suspect was located after posting his location on Facebook. Overall social media allows extensive surveillance of users by both private individuals and companies collecting personal data.
Networked Privacy Beyond the Individual: Four Perspectives to ‘Sharing’ / Ai...airilmpnn
Paper presentation at Critical Alternatives 2005, the fifth decennial Aarhus Conference.
Abstract below, the paper is available at: https://goo.gl/RtissL
My dissertation, Interpersonal Boundary Regulation in the Context of Social Network Services, includes a longer discussion of the topics of the paper: https://helda.helsinki.fi/handle/10138/42272
For further publications, see: airilampinen.fi/publications
"Synthesizing prior work, this paper provides conceptual grounding for understanding the dialectic of challenges and opportunities that social network sites present to social life. With the help of the framework of interpersonal boundary regulation, this paper casts privacy as something people do, together, instead of depicting it as a characteristic or a possession. I illustrate interpersonal aspects of networked privacy by outlining four perspectives to ‘sharing’. These perspectives call for a rethink of networked privacy beyond an individual’s online endeavors."
Information disorder: Toward an interdisciplinary framework for research and ...friendscb
A comprehensive examination of information disorder including filter bubbles, echo chambers and information pollution published by the Council of Europe.
This document presents a framework for using big data and technology to build community resilience in an ethical manner. It discusses six key domains: 1) Ethics, which should guide all projects to enhance individual agency and avoid harm, 2) Governance, to ensure community interests are prioritized, 3) Science, to properly test hypotheses and avoid false correlations, 4) Technology, which enables data collection but can create vulnerabilities, 5) Place, to consider local context, and 6) Sociocultural context, to understand community values and power structures. The framework aims to safeguard against failures by addressing weaknesses from the start through considering all six domains together.
Influence of self presentation on bridging social capital in sn ssAlexander Decker
This document summarizes a research study that examined how self-presentation on social networking sites influences bridging social capital. The study surveyed 199 students at a Chinese university. It found that effective self-presentation on social networking sites helps users build bridging social capital by connecting them to acquaintances and strangers who can provide useful information. Self-presentation had a strong moderating effect on the relationship between social networking site usage and bridging social capital. The document provides context on key concepts like self-presentation, social capital, and bridging versus bonding social capital.
Big Data & Privacy -- Response to White House OSTPMicah Altman
Big data has huge implications for privacy, as summarized in our commentary below:
Both the government and third parties have the potential to collect extensive (sometimes exhaustive), fine grained, continuous, and identifiable records of a person’s location, movement history, associations and interactions with others, behavior, speech, communications, physical and medical conditions, commercial transactions, etc. Such “big data” has the ability to be used in a wide variety of ways, both positive and negative. Examples of potential applications include improving government and organizational transparency and accountability, advancing research and scientific knowledge, enabling businesses to better serve their customers, allowing systematic commercial and non-commercial manipulation, fostering pervasive discrimination, and surveilling public and private spheres.
On January 23, 2014, President Obama asked John Podesta to develop in 90 days, a 'comprehensive review' on big data and privacy.
This lead to a series of workshop on big data and technology at MIT, and on social cultural & ethical dimensions at NYU, with a third planned to discuss legal issues at Berkeley. A number of colleagues from our Privacy Tools for Research project and from the BigData@CSAIL projects have contributed to these workshops and raised many thoughtful issues (and the workshop sessions are online and well worth watching).
My colleagues at the Berkman Center, David O'Brien, Alexandra Woods, Salil Vadhan and I have submitted responses to these questions that outline a broad, comprehensive, and systematic framework for analyzing these types of questions and taxonomize a variety of modern technological, statistical, and cryptographic approaches to simultaneously providing privacy and utility. This comment is made on behalf of the Privacy Tools for Research Project, of which we are a part, and has benefitted from extensive commentary by the other project collaborators.
A stronger shield against electromagnetic radiation is produced by the negative ion sticker. High-quality metal was used to create this sticker, which is intended to reflect electromagnetic waves and stop them from entering your environment. Additionally, it inhibits the damage that these radiations might do to your body .
https://youtube.com/shorts/-Og9dyIoNIA
BBC's shoddy analysis about fake news spread in India
PS: Fake news is being spread, there is NO doubt about that.
But there is no easy way to arrive at the outlandish conclusions they have arrived at. Take a look :-) They start off with some "data analysis" and call it qualitative research.
Similar to LOCATION PRIVACY ONLINE: CHINA, THE NETHERLANDS AND SOUTH KOREA (20)
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Build a Module in Odoo 17 Using the Scaffold Method
LOCATION PRIVACY ONLINE: CHINA, THE NETHERLANDS AND SOUTH KOREA
1. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
DOI : 10.5121/ijsptm.2016.5401 1
LOCATION PRIVACY ONLINE: CHINA, THE
NETHERLANDS AND SOUTH KOREA
Peter Broeder1
and Yujin Lee2
1
Communication and Information Sciences, Tilburg University, The Netherlands
2
Research Instruments, Falmouth, United Kingdom
ABSTRACT
The aim of the study is to explore cross-cultural differences in users’ location privacy behaviour on LBSNs
(location-based social networks) in China, the Netherlands and Korea. The study suggests evidence that
Chinese, Dutch and Korean users exhibit different location privacy concerns, attitudes to social influence,
perceived privacy control and willingness to share location-related information on LBSNs. The results
show that in general, the more concerned users are about location privacy, the less they are willing to
share and it also suggests that location privacy concern and social influence affect each other.
Furthermore, the more control people perceive they have over their privacy, the more they are willing to
share location information. A negative relationship between willingness to share location information and
users’ actual sharing of location information was seen. In short, it is concluded that the relation between
cultural values and location privacy behaviours only have a partial connection.
KEYWORDS
Privacy online, individualism, social influence, Asia, Europe
1. INTRODUCTION
Privacy is a basic and fundamental right and it is undeniable that privacy is deeply permeated
throughout our everyday life. Privacy comprises many aspects so it is hard to describe with one
unified definition, but generally it is defined as the claim of individuals, groups, or institutions to
determine for themselves when, how, and to what extent information about them is
communicated to others [1], or the capacity to control the information about oneself that is
available to others [2].
As online social networks become more prevalent, the importance of information privacy
increases. Social networks have given people the ability to form strong social ties by allowing
them to connect with each other, to share personal information and, latterly, to share location,
activities that all seem to raise privacy concerns. As the range of possible communications and
interactions with others through social network channels has increased dramatically, privacy
concerns have been mounting; our desire to take advantage of new interactive technologies has
made us more willing to give up some of our privacy by sharing a large amount of personal
information online.
Among the information we share in social networks, this study focuses on location information. A
Location-based Service (LBS) depends on and is enhanced by positional information of mobile
devices [3]. It provides users with opportunities to share geo-tagging content and real-time user
location information. Little work has been done to explore the correlations between cultures and
privacy concerns of users on Location-based Social Networks (LBSNs). Therefore, this research
intends to examine how people from different cultures behave with respect to location privacy
2. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
2
concerns when using LBSNs. Accordingly, the study explores how Chinese, Dutch and Korean
people use LBSNs and their location privacy concerns. Specifically, to what extent people reveal
their location information, share with whom and how their concepts or awareness on location
privacy differ.
2. PRIVACY ONLINE
2.1. LOCATION-BASED SOCIAL NETWORKS (LBSNS)
LBSNs are mobile applications that allow people to build social networks and share their location
with their friends or families. A number of major social network platforms have already launched
its own featured location-based service. Facebook (Places, check-in etc.), Twitter (locating
tweets), Foursquare (location check-in) and WeChat (People Nearby, Drift Bottle etc.) are those
providing specific location-based functions. The number of LBSN providers has explosively
increased in the past few years. There were more than 100 LBSN applications in 2010 [4]. The
great popularity of LBS, however, carries the danger of user location privacy breaches due to
location information disclosure. Location privacy is defined as the ability to prevent other parties
from learning one’s current or past location [5]. The privacy issue in location-based service can
be seen as a core concept since it is a channel to broadcast users’ real-time location. LBS users
are concerned about loss of privacy and are worried about data or personal information collection
on LBS [6].
Concerns over location privacy represent people’s attitudes towards sharing location information.
According to [7], over time, Internet users have become less concerned about information
privacy. It is possible to assume that nowadays Internet users have knowledge to control privacy
settings, thus, it leads to less concern about information privacy. Their research found that 71% of
social networking users aged 18-29 in America have changed the privacy settings on their profiles
to limit what they share with others online. Surprisingly, the most visible and engaged Internet
users are most active in limiting the information connected to their names online. Therefore, it is
presumable that people who are more likely to be concerned about privacy will share less location
information on LBSN.
Hypothesis 1. People with more concerns about location privacy will be less willing to share
location.
Social influence is defined as the degree to which individuals perceive that people who are
important to them think they should use the service [8]. It is an equivalent term to subjective
norm [9]. In a study conducted in an organizational environment [10] subjective norm is one of
the factors that determine one’s privacy intention. In addition, [11] also found that subjective
norm is one of the factors which influence people’s intentions to protect personal information
privacy. More precisely, [12] showed that user’s attitude toward social influence positively
affects the use of WeChat. Hence, a hypothesis is composed:
Hypothesis 2. Social influence will have an impact on location based privacy concerns and
willingness to share location.
People’s confidence in their ability to perform certain behaviour can influence people’s
behavioural intention [9]. A study by [13] concluded that perceived control over personal
information is the core factor that influence user information privacy. Following this perspective,
it is presumable that users who think they have knowledge of managing and controlling privacy
settings in an application or a service and may regard that they have high perceived privacy
3. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
3
control, would result in increasing intentions to share personal information [14]. Therefore, a
hypothesis is built:
Hypothesis 3. People with more perceived privacy control will be more willing to share location.
Finally, this study proposes that willingness (intention) to share location based information
positively leads to actual sharing of location based information.
Hypothesis 4. An increase in willingness to share location information will result in actual sharing
of location.
2.2. CULTURAL DIFFERENCES
Individualism/collectivism is one of the most used dimensions when it comes to understanding
the way culture relates to social psychological phenomena. Individualism is described as a culture
that reflects “I” autonomy, individual level of achievement or decisions are encouraged, and
individuals have a relatively weak relationship bond. On the other hand, individuals in collectivist
cultures reflect upon a “we” consciousness, prefer to behave as members of groups rather than
individuals, [15] and [16]. Although the individualism/collectivism dimension has faced several
criticisms (e.g., excessively polarization of cultural differences, assuming national uniformity,
overlooking the possibility of individual differences [17]) it is still widely accepted and applied in
cross-cultural studies [18].
Previous researches have shown fairly mixed results about the influence of individualism on
privacy concerns or behaviours. [19] found a positive relationship between them while many
other studies [20], [21] and [22], found it the opposite. Although many cross-cultural studies have
generally found that cultures with high individualism are less concerned about information
privacy, this study chooses the findings of [19] and posits that people in highly individualistic
societies will be more likely to be concerned about information privacy, thus they will share
location information on LBSN less than those in collectivistic cultures. This is based on the
assumption that individuals in highly individualistic cultures value the right to a private life while
people with lower scores on individualism are more likely to accept intrusion into their private
life.
An important factor in deciding whether or not to share location or other information is with
whom to share, [23] and [24]. In collectivistic, people in high power distance societies will be
likely to share location information with classified groups. Power distance hereby means the
extent to which the less powerful members of a society accept and expect unequally distributed
power. China and Korea rank high in power distance whereas the Netherlands ranks low.
Considering the highly hierarchical nature of high power distance cultures, it should be
considered that people will exhibit different preferences on group orientation when sharing
location information. In collectivistic cultures the difference in behaviours toward in-group and
out-group members is very large, whereas in individualistic cultures it is greatly attenuated [17].
In this study, out-group particularly refers to the people who are in the range of a hierarchy
structure (e.g., superiors, seniors) while in-group refers to family and friends in general. In
addition, given the tendency that in high power distance societies, employees are not greatly
encouraged to present their own opinions or ideas and generally do not have unconstrained
conversations with superiors or seniors, it can be assumed that people in high power distance
societies, mainly due to a hierarchical nature in organizations, seldom share private information
with out-group members.
4. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
4
Hypothesis 5. People from individualistic, low power distance cultures are more privacy
concerned and less willing to share location compared to people in collectivistic high power
distance cultures.
Most commonly, cross-cultural studies conceptualize that Western cultures tend to be
individualistic with low power distance, while collectivism with high power distance is the basis
of Asian cultures, [25] and [26]. However, a single ‘Western’ culture can comprise different
levels of individualism/collectivism. [27] found that Americans showed lower scores on
collectivism than Europeans. Also in Asian cultures there are different levels of
individualism/collectivism characteristics among Asian countries. Specifically, Northeast Asian
countries (China, Japan and Korea) exhibit low scores of individualism and higher scores on
collectivism but their characteristics within individualism and collectivism are different while
they share common cultural bonds, i.e., Confucian values. [28] also concluded that there is a
significant difference of self-construal perspective among China, Japan and Korea and the result
explained that Northeast Asian countries cannot be seen as a single oriental collectivism culture.
This study hypothesizes that the Chinese culture is much more individualistic than the Korea
culture based on the findings of [26], [29] and [30]. Therefore, it anticipates that Chinese users
will be more reluctant to share location information.
Hypothesis 6. Chinese people are more privacy concerned and less willing to share location
compared to Korean people.
3. METHOD
As a whole, the study aims at answering the following major research question: Do cultural
differences play a role in users’ location privacy behaviours and their privacy concerns on
Location-Based Social Networks (LBSNs).
3.1 SAMPLE
In spring 2014, a total of 237 respondents completed an online survey: 128 females and 109
males, Mean age was 24.3 yrs (age range 18-35 yrs.). There were 52 Chinese, 108 Dutch, and 57
Korean respondents, mostly living in the pertinent countries that is in China, the Netherlands, and
South Korea.
3.2 QUESTIONNAIRE
The questionnaire consisted of 23 statements (see Appendix).
• The subscale for location privacy concern (LPC) is defined as the ability to prevent other
parties from learning one’s current or past location [5] consists of five items. [14] and
[31] are used as references.
• Perceived privacy control (PPC) is described as people’s perception of the ease or
difficulty of controlling or modifying privacy setting online [9]. The four items of this
subscale were also built upon [14].
• Social influence (SI) is described as the degree to which individuals perceive that people
who are important to them think they should use the system [12]. Based on [32] five
items were developed.
• For in-group orientation (IG) a subscale consisting of six item was self-developed since
5. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
5
no studies have yet been performed. In-group is often defined as “family and friends”
[17]. In the context of this study, in-group orientation can be interpreted as a tendency of
dividing groups (in-group which refers to friends and family and out-group which
particularly refers to those who are in a range of the hierarchical structure such as
superiors or seniors) and exhibiting different levels of preference to the groups. Six items
were self-developed.
• Willingness to share (WS) is equivalent to intention [9]. Intentions are assumed to
capture the motivational factors that influence behaviour; they are indications of how
hard people are willing to try, of how much effort they are planning to exert, in order to
perform the behaviour. [8] provided the idea for the two items of this scale.
• For the scale actual sharing of location information (AS) the ten items were based on the
observation within Facebook and WeChat of what kind of location information users can
share.
For the first four subscales the respondents were asked to rate the statements on a 5-point scale
ranging from “1 = completely disagree” to “5 = completely agree”. For the subscales Willingness
to Share and Actual Sharing on Facebook/WeChat the respondents were asked to indicate yes or
no.
4. RESULTS
4.1 INTERNAL CONSISTENCY OF THE SUBSCALES
For each subscale the internal consistency was checked with Cronbach’s α. For Location privacy
concern (LPC) α = .89, for perceived privacy control (PPC) α =.82, for willingness to share
(WTS) α = .94, for actual sharing (AS) on Facebook (FB) α = .70, and for actual sharing (AS) on
WeChat (WC) α = .85. All were acceptable by Cronbach’s α with higher than .70. For the
subscale social influence (SI) Cronbach’s α was acceptable with α = .73 (after elimination of item
5). The internal consistency of the subscale In-group orientation (IGO) was poor, with
Cronbach’s α = .53 (after elimination of item four).
4.2 LOCATION BASED PRIVACY INFORMATION
A considerable amount of location-related information is reported to be shared on Facebook and
WeChat. Table 1 displays the actual percentage of shared location-related information.
Table 1. Shared Personal Profile Information on Facebook/Wechat.
Places of birth, residence and home address can be displayed on a personal profile while the rest
of the items can be seen by ‘sharing’. One thing which should be noted is that only a small
6. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
6
number of users shared their home address information (7/159 Facebook users and 5/43 WeChat
users). Considering users tend to share a lot of other information other than home address, it can
be interpreted that home address can be regarded as one of the most private among the range of
location-related information, hence, it is possible to interpret that people are actually concerned
strongly about their location privacy. A great number of users shared place of birth, residence and
country of residence. It seems that because the information does not show details of the exact
location or place but just a country of birth, a city and country of residence in general, users do
not mind sharing the information very much. Table 2 shows the results of the correlation analysis
for the factors of users’ privacy behaviour.
Table 2. Correlation Analysis on the Factors of Users’ Privacy Behaviour.
* p < .05, ** p < . 01
Hypothesis 1 predicted that people who are more concerned about location privacy will be less
willing to share location information. A negative relationship was found between location privacy
concern and willingness to share (r = -.242, Bca 95% CI [-.405, -.068], p < .005).
This study also assumed the impact of social influence (Hypothesis 2). As can be interpreted in
Table 2. social influence and willingness to share location information have negative significant
correlations (r = -.228, Bca 95% CI [-.364, -.085], p < .005). From this result, it is predictable that
people who are more sensitive about their friends or families’ opinions are less willing to share
location information. Similarly, the correlation analysis shared that location privacy concern is
positively linked to social influence (r = .467, Bca 95% CI [.338, .570], p < .001).
The more perceived privacy control people have, the more they are willing to share location
information (Hypothesis 3). This was indeed confirmed by the observed positive relationship
between perceived privacy control and willingness to share location information (r = .337, Bca
95% CI [.174, .480], p < .001). It was also assumed that escalation of intention would result in an
increase of actual behaviour (Hypothesis 4). In the current study, respondents’ willingness to
share location information and actual sharing on Facebook had a significant correlation, r = -.401,
Bca 95% CI [-.524, -.275], p < .001, however, it is negatively correlated, hence, more willingness
actually resulted in less sharing of location-related information. The case of WeChat shows a
similar result as Facebook (r = -.369, Bca 95% CI [-.633, -.063], p < .05).
4.3. PRIVACY PREFERENCES OF CHINESE, DUTCH AND KOREANS
We theorized that relationships exist between cultural preferences and location privacy behaviour.
Hypotheses 5 and 6 inferred that Chinese, Dutch and Koreans will exhibit different location
privacy concerns, perceived privacy control and attitudes toward social influence. Table 3 and
Figure 1 show the three groups’ scores for each factor.
7. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
7
Table 3. Privacy Behaviour Per Cultural Group: Mean Of A 5-Point Scale
(Minimum=1, Maximum=5) and Standard Deviation (SD).
A one way between subjects ANOVA was conducted to compare the level of location privacy
concerns, perceived privacy control and attitudes toward social influence. For location based
privacy concern, significant differences were shown for the three conditions [F (2,170) = 14.062,
p < .001]. Post hoc comparisons using the Tukey HSD test indicated that the mean scores for the
Chinese group (M = 3.90, SD = 0.80) and Korean group (M = 3.85, SD = 0.87) were significantly
higher than those for the Dutch group (M = 3.18, SD = 0.88). However, the Chinese and Korean
groups did not significantly differ. Remarkably, both perceived privacy control and influence did
not display significant differences between the three cultural groups.
Figure 1. Privacy Behaviour Per Cultural Group.
Hypothesis 6 implied that people from collectivistic, high power distance societies are more likely
to share location information. As Table 3 and Figure 1 shows, the highest score on power distance
(SI) was seen within the Korean group. However their willingness to share location information
(WTS) is not as high as the Chinese and Dutch, rather it shows the lowest score.
Power distance can also be linked to in-group orientation (IGO). People in countries with higher
scores of power distance will exhibit clear in-group orientation compared to people in low power
distance societies when sharing location information. Koreans who had the highest scores in
power distance also showed the highest in-group orientation tendency. Finally, the study
hypothesized that people in countries with higher scores on individualism are less likely to share
location information. However, since no significant differences were found on individualism, it is
not measureable yet.
5. CONCLUSIONS
Online privacy is deeply entwined with our daily life. Among various areas of online privacy,
location privacy can be regarded as one of the most ‘private’ areas. The general results suggest
8. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
8
that LBSN users have great concern over their location privacy, and the more users are concerned
the less willing they are to share location information. The findings in this study show that users’
attitudes toward social influence have an impact on the willingness to share. People who are
sensitive about their family or friends opinions, are less willing to share location information.
Similarly, the more perceived privacy control users have, the more they are willing to share. In
the meantime, location privacy concern and social influence affect each other.
Finding possible link between users’ location privacy behaviour and cultural values was one of
the purposes of the study. It was assumed that Chinese and Korean users would be more likely to
exhibit collectivistic behaviour and high power distance cultures, and that Chinese users would
exhibit higher collectivism than Korean. The key reference of the study [22] claimed that cross-
cultural dimensions are significant predictors of information privacy concerns and desire for
online awareness in particular uncertainty avoidance, power distance and individualism
dimensions. Unlike the study of [22], the present research did find only limited links between
location privacy behaviour and cultural values. The result only found that people in higher scores
of power distance societies exhibit clear in-group orientation compared to those in low power
distance societies when sharing location. The relation between cultural values and location
privacy behaviours require more comprehensive future research.
Overall, the study has brought empirical evidence on users’ location privacy behaviour. It
revealed that factors of location privacy concern, social influence and perceived privacy control
are embedded in user’s behaviour on LBSNs. In particular, the study found a significant
relationship between users’ location privacy concern and intention to share. What makes this
study more valuable is a cross-cultural comparison. Considering no study has been done on the
relationship between location privacy and cultural differences so far, the study could trigger more
future research on this or similar topics.
ACKNOWLEDGEMENTS
We would like to thank colleagues of the research group “Online consumers” for all feedback and
discussions, as well as the anonymous reviewers, for their helpful comments.
REFERENCES
[1] Westin, A. (1967). Privacy and Freedom. New York: Atheneum
[2] Stone, E. F., Gueutal, H., Gardner, D. & McClure, S. (1983). A field experiment comparing
information-privacy values, beliefs, and attitudes across several types of organizations. Journal of
Applied Psychology 68, 459-468.
[3] Dhar, S., & Vahrsney, U. (2011). Challenges and business models for mobile location-based services
and advertising. Communications of the ACM 54(5), 121-129
[4] Fusco, S. J., Michael, K., & Michael, M. (2010). Using a social informatics framework to study the
effects of location-based social networking on relationships between people: A review of literature.
IEEE International Symposium on Technology and Society (ISTAS), 157-171.
[5] Beresford, A. R., & Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive
Computing 2(1), 46-55.
[6] Webroot (2010), Survey Finds Geolocation Apps Prevalent Amongst Mobile Device Users, But 55%
Concerned About Loss of Privacy (www.webroot.com).
[7] Madden, M., & Smith, A. (2010). Reputation management and social media. Pew Internet &
American Life Project. Pew Research Center (www.pewinternet.org).
[8] Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology:
Toward a unified view. MIS Quarterly 27, 425-478.
[9] Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision
Processes 50, 179-211.
9. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
9
[10] Loch, K. & Conger, S. (1996). Evaluating ethical decision making and computer use.
Communications of the ACM 39 (7), 74-83.
[11] Hsu, M. & Kuo, F. (2003). The effect of organization-based self-esteem and deindividuation in
protecting personal information privacy. Journal of Business Ethics 42, 305-320.
[12] Zeng, Z., Hu, X. & Mei, S. (2013). Factors affecting a mobile application’s acceptance: An empirical
study of user acceptance of WeChat in China. Jonkoping International Business School, Jonkoping
University.
[13] Xu, H., Teo, H., Tan, B. & Ritu A. (2012). Effects of individual self-protection, industry self-
regulation, and government regulation on privacy concerns: A study of location-based services.
Information Systems Research 23, 1342-1363.
[14] Notermans, R. (2013). To share or not to share? The personal aspects of online privacy behavior.
Tilburg University.
[15] Triandis, H., Bontempo, R., Villareal, M., Asai, M. & Lucca, N. (1988). Individualism and
collectivism: Cross-cultural perspectives on self-ingroup relationships. Journal of Personality and
Social Psychology 54, 323-338.
[16] Hofstede, G. (2001). Culture’s consequences: Comparing values, behaviors, institutions, and
organizations across nations. Thousand Oaks, CA: Sage.
[17] McSweeney, B. (2002). Hofstede's model of national cultural differences and their consequences: A
triumph of faith - a failure of analysis, Human Relations 55, 89-118.
[18] Hofstede, G. (2002). Dimensions do not exist: A reply to Brendan McSweeney. Human Relations 55,
1355-1361.
[19] Milberg, S., Smith, J. & Burke, S., (2000). Information privacy: Corporate management and national
regulation. Organization Science 11, 35-57.
[20] Ting-Toomey, S. (1991). Intimacy expressions in three cultures: France, Japan, and the United States.
International Journal of Intercultural Relations 15, 29-46.
[21] Bellman, S., Johnson, E., Kobrin, S., & Lohse, G. (2004). International differences in information
privacy concerns: A global survey of consumers. The Information Society 20(5), 313-324.
[22] Lowry, P., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness
in driving the use of self-disclosure technologies: The case of instant messaging in two cultures.
Journal of Management Information Systems 27(4), 163-200.
[23] Consolvo, S., et al. (2005). Location disclosure to social relations: why, when, & what people want to
share. Proceedings of the SIGCHI conference on human factors in computing systems, 81-90.
[24] Wiese, J., et al. (2011). Are you close with me? Are you nearby? Investigating social groups,
closeness, and willingness to share. Proceedings of the 13th international conference on ubiquitous
computing 197-206.
[25] Kitayama, S., Markus, H., Matsumoto, H. & Norasakkunkit, V. (1997). Individual and collective
process in the construction of the self: Self-enhancement in the United States and self-criticism in
Japan. Journal of Personality and Social Psychology 72, 1245-1267.
[26] Herrmann-Pillath, C. (2010). Social capital, Chinese style: individualism, relational collectivism and
the cultural embeddedness of the institutions-performance link. China Economic Journal 2, 325-350.
[27] Oyserman, D., Coon, H. & Kemmelmeier, M. (2002). Rethinking individualism and collectivism:
Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin 128, 3-72.
[28] Han, M., Yoshiyuki I., Kim, S. & Zhang, W. (2009). The application of culture bounded self-
construal model: A comparative study between three countries in Northeast Asia. Journal of Korean
Psychology Association 28(1), 49-66.
[29] Kwon, J. & Oh, D. (2010). An examination of thirty-year cross-cultural research in Korea: the case of
Hofstede’s cultural values. International Business Management Review 14 (4), 1-32.
[30] Li, H., Zhang, Z., Bhatt, G., & Yum, Y. (2006). Rethinking culture and self-construal: China as a
middle land. The Journal of Social Psychology 146, 591-610.
[31] Buchanan, T., Paine, C., Joinson, A. & Reips, U. (2007). Development of measures of online privacy
concern and protection for use on the internet. Journal of the American Society for Information and
Science and Technology 58, 157-165.
[32] Chen, R. Wang, J., Heratch, T. & Rao, H. (2011). An investigation of email processing from a risky
decision making perspective. Decision Support Systems 52, 73-81.
10. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 5, No 4, November 2016
10
AUTHORS
Peter Broeder investigates intercultural aspects of online marketing communications and
consumer behaviour. These issues are addressed in Europe and Asia (www.broeder.com).
Yujin Lee obtained her master’s degree from Tilburg University (the Netherlands) in 2014.
Currently she is a Business Development Manager at Research Instruments, Falmouth
(United Kingdom).
APPENDIX
Location Privacy Concern (LPC)
I am concerned about my privacy in general while I am using the Internet.
I am concerned about my privacy in general while I am posting something on social media.
I am concerned about people I don't know obtaining my personal information from my online activities.
I am concerned about sharing location on social media.
I am concerned about people who I don't know accessing my location information from social media.
Perceived Privacy Control (PPC)
In general, I know HOW to modify my privacy setting on Facebook/WeChat.
It is easy to modify WHAT kind of location information is being presented on Facebook/WeChat via
privacy setting.
I am confident that I can control WHOM I share location on Facebook/WeChat with.
I am confident that I can control WHEN to share location on Facebook/WeChat.
Social Influence (SI)
People who are important to me think that sharing location on Facebook/WeChat is very risky.
People who influence my behaviour think using location-based social media is very risky.
I really don't mind sharing location information with everybody.
People whose opinions I value think sharing location on Facebook/WeChat is highly risky.
(I use Facebook/WeChat because many of my friends and colleagues use it)*.
In-group Orientation (IG)
When I post something on Facebook/WeChat, I usually select groups whom I want to share with.
When I share my location on Facebook/WeChat, I would not be worried if anyone can access my
information.
I want to share my location information only with friends.
(The reason why I check-in on Facebook/WeChat is because I want to share the location with my friends)*.
I don't want my superiors to see all my location information on Facebook/WeChat.
If my superiors see those locations that I share on Facebook/WeChat, I would worry that it might have
negative effects on me.
Willingness to Share (WTS)
I am willing to keep using Facebook/WeChat when sharing location for the next 12 months.
I plan to keep using Facebook/WeChat when sharing location information for the next 12 months.
Actual Sharing on Facebook/WeChat (AS)
Place of birth. Place of residence. Country of residence. Home address. Landmarks or well-known places.
Restaurants. Vacation or holiday destinations (airport, accommodation, etc.). Random locations where I
would like to check-in. Places where I haven't been. Tagging friends who are with me on the shared
location or check-in.
*Items deleted after reliability analyses (Cronbach’s α)