Search results for "Internet privacy"

showing 10 items of 223 documents

Information flow and WOM in social media and online communities

2017

Computer sciencebusiness.industry05 social sciencesInternet privacyLibrary and Information SciencesComputer Science Applications0502 economics and business050211 marketingSocial mediaInformation flow (information theory)0509 other social sciences050904 information & library sciencesbusinessInformation SystemsOnline Information Review
researchProduct

Small worlds with a difference

2011

Political discussions on social network platforms represent an increasingly relevant source of political information, an opportunity for the exchange of opinions and a popular source of quotes for media outlets. We analyzed political communication on Twitter during the run-up to the German general election of 2009 by extracting a directed network of user interactions based on the exchange of political information and opinions. In consonance with expectations from previous research, the resulting network exhibits small-world properties, lending itself to fast and efficient information diffusion. We go on to demonstrate that precisely the highly connected nodes, characteristic for small-world…

Computer sciencebusiness.industryInternet privacyPolitical communicationFilter (signal processing)language.human_languageGermanPoliticsGeneral electionSmall worldslanguageEntropy (information theory)businessNetwork analysisProceedings of the 3rd International Web Science Conference
researchProduct

A Context-Aware Mobile Solution for Assisting Tourists in a Smart Environment

2017

Computer sciencebusiness.industryInternet privacyRecommender Systems020206 networking & telecommunicationsContext (language use)02 engineering and technologyRecommender systemContext Awareness; E-Tourism; Recommender SystemsE-Tourism020204 information systemsAdaptive system0202 electrical engineering electronic engineering information engineeringContext awarenessSmart environmentbusinessContext AwarenessProceedings of the 50th Hawaii International Conference on System Sciences (2017)
researchProduct

Security Enhancement of Peer-to-Peer Session Initiation

2012

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…

Computer sciencebusiness.industryInternet privacySecurity enhancementSession (computer science)Peer-to-peercomputer.software_genrebusinesscomputer
researchProduct

Low-cost active cyber defence

2014

The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…

Computer sciencebusiness.industryInternet privacybusinessComputer securitycomputer.software_genrePhishingcomputerCyber threats2014 6th International Conference On Cyber Conflict (CyCon 2014)
researchProduct

Performing transnational family with the affordances of mobile apps : a case study of Polish mothers living in Finland

2020

Affordances provided by digital technologies and mobile apps (WhatsApp, Skype, Messenger) help in maintaining familyhood. These mobile apps enable the creation of in-app family groups. They also afford image sharing, which is used for phatic purposes. Digital connectivity provides the illusions of togetherness and belonging, and allows for performing family in a transnational context (emotional transnationalism). However, it also generates the feelings of guilt through infrequent communication. In the auto-driven visual elicitation interviews, the study looks at family constellations and technologically mediated communication from the perspective of five Polish mothers living in Finland. Ap…

ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATIONcollageGeneralLiterature_INTRODUCTORYANDSURVEYInternet privacyaffordances0507 social and economic geographyperhe-elämäGeneralLiterature_MISCELLANEOUSArts and Humanities (miscellaneous)keskinäisviestintämental disorders050602 political science & public administrationtransnationaalisuusmobiilisovelluksetSociologyAffordancetransnational familyDemographymobile appsbusiness.industryInformationSystems_INFORMATIONSYSTEMSAPPLICATIONS05 social sciencesMobile appsPolish migrantsmaahanmuuttajat0506 political sciencevisual elicitationpuolalaisetperhesuhteetbusiness050703 geography
researchProduct

Preventing problematic internet use during the COVID-19 pandemic: Consensus guidance

2020

As a response to the COVID-19 pandemic, many governments have introduced steps such as spatial distancing and “staying at home” to curb its spread and impact. The fear resulting from the disease, the ‘lockdown’ situation, high levels of uncertainty regarding the future, and financial insecurity raise the level of stress, anxiety, and depression experienced by people all around the world. Psychoactive substances and other reinforcing behaviors (e.g., gambling, video gaming, watching pornography) are often used to reduce stress and anxiety and/or to alleviate depressed mood. The tendency to use such substances and engage in such behaviors in an excessive manner as putative coping strategies i…

ConsensusDistancingSocial connectednesslcsh:RC435-571Internet privacyPneumonia Viral610 Medicine & healthAnxietyArticleSocial group03 medical and health sciences2738 Psychiatry and Mental HealthBetacoronavirus0302 clinical medicinelcsh:PsychiatryPandemicAdaptation PsychologicalmedicinePornographyHumans10064 Neuroscience Center ZurichSalut mentalPandemicsInternetbusiness.industryDepressionSARS-CoV-23203 Clinical PsychologyClinical Psychology; Psychiatry and Mental health; COVID-19COVID-1910058 Department of Child and Adolescent PsychiatryAnxiety Disorders030227 psychiatryPsychiatry and Mental healthClinical PsychologyWork (electrical)PsychologieVideo GamesInformation and Communications Technology10076 Center for Integrative Human PhysiologyAnxietyMental healthmedicine.symptomPsychologybusinessCoronavirus Infections030217 neurology & neurosurgeryComprehensive Psychiatry
researchProduct

Social Media News: Motivation, Purpose and Usage

2013

This paper presents the results of an online survey which was conducted to analyse the use of social web in the context of daily news. Users' motivation and habit in the news consumption were focused. Moreover, users' news behaviour was distinguished in three purposes such news consumption, news production and news dissemination to find out if the usage has a passive or active character. In a second step it was questioned which social software is used for which purpose. In conclusion users appreciate social software for features such as interactivity and information that traditional media does not provide. Among the social web platforms users prefer social networking sites as well as videos…

Consumption (economics)business.industryComputer scienceSocial softwareInternet privacyRank (computer programming)Context (language use)computer.software_genreSocial webWorld Wide WebInteractivitySocial media optimizationSocial mediabusinesscomputerInternational Journal of Computer Science and Information Technology
researchProduct

Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice

2004

.  Several approaches for and against the unauthorized copying of software have been proposed. These approaches can be divided into two categories: moral reasoning and solution. These categories of approaches to unauthorized copying of software are scrutinized in the light of Kohlberg's theory of Cognitive Moral Development. The results suggest that most approaches presenting solutions to unauthorized copying of software have focused attention on the lower levels of moral development, while approaches at the highest stage are few and far between. No single approach covers all the stages of moral development. The implications of this analysis for practice and research are discussed.

CopyingComputingMilieux_THECOMPUTINGPROFESSIONComputer Networks and Communicationsbusiness.industryComputer ethicsInternet privacyComputingMilieux_LEGALASPECTSOFCOMPUTINGCognitionMoral reasoningSoftwareMoral developmentLawrence Kohlberg's stages of moral developmentbusinessPsychologySocial psychologySoftwareInformation SystemsInformation Systems Journal
researchProduct

Attitudes to and factors affecting unauthorized copying of computer software in Finland

2005

Several quantitative studies have sought to determine the factors affecting the unauthorized copying of software, particularly in North America. However, we find no statistically reliable studies on the situation in Europe. In order to address this gap in the literature, we explored the attitudes to and factors affecting the unauthorized copying of computer software of 249 Finnish university students: nine hypotheses derived from the existing research on unauthorized copying of computer software or theories of ethics were tested. A quantitative questionnaire was used as the research instrument. The results shed new light on the characteristics of users and factors affecting the unauthorized…

CopyingInfluence factorbusiness.industryInternet privacyGeneral Social SciencesComputingMilieux_LEGALASPECTSOFCOMPUTINGHuman-Computer InteractionSoftwareArts and Humanities (miscellaneous)Computer softwareDevelopmental and Educational PsychologyPsychologybusinessSocial psychologyBehaviour & Information Technology
researchProduct