Search results for "Internet privacy"
showing 10 items of 223 documents
Information flow and WOM in social media and online communities
2017
Small worlds with a difference
2011
Political discussions on social network platforms represent an increasingly relevant source of political information, an opportunity for the exchange of opinions and a popular source of quotes for media outlets. We analyzed political communication on Twitter during the run-up to the German general election of 2009 by extracting a directed network of user interactions based on the exchange of political information and opinions. In consonance with expectations from previous research, the resulting network exhibits small-world properties, lending itself to fast and efficient information diffusion. We go on to demonstrate that precisely the highly connected nodes, characteristic for small-world…
A Context-Aware Mobile Solution for Assisting Tourists in a Smart Environment
2017
Security Enhancement of Peer-to-Peer Session Initiation
2012
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…
Low-cost active cyber defence
2014
The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…
Performing transnational family with the affordances of mobile apps : a case study of Polish mothers living in Finland
2020
Affordances provided by digital technologies and mobile apps (WhatsApp, Skype, Messenger) help in maintaining familyhood. These mobile apps enable the creation of in-app family groups. They also afford image sharing, which is used for phatic purposes. Digital connectivity provides the illusions of togetherness and belonging, and allows for performing family in a transnational context (emotional transnationalism). However, it also generates the feelings of guilt through infrequent communication. In the auto-driven visual elicitation interviews, the study looks at family constellations and technologically mediated communication from the perspective of five Polish mothers living in Finland. Ap…
Preventing problematic internet use during the COVID-19 pandemic: Consensus guidance
2020
As a response to the COVID-19 pandemic, many governments have introduced steps such as spatial distancing and “staying at home” to curb its spread and impact. The fear resulting from the disease, the ‘lockdown’ situation, high levels of uncertainty regarding the future, and financial insecurity raise the level of stress, anxiety, and depression experienced by people all around the world. Psychoactive substances and other reinforcing behaviors (e.g., gambling, video gaming, watching pornography) are often used to reduce stress and anxiety and/or to alleviate depressed mood. The tendency to use such substances and engage in such behaviors in an excessive manner as putative coping strategies i…
Social Media News: Motivation, Purpose and Usage
2013
This paper presents the results of an online survey which was conducted to analyse the use of social web in the context of daily news. Users' motivation and habit in the news consumption were focused. Moreover, users' news behaviour was distinguished in three purposes such news consumption, news production and news dissemination to find out if the usage has a passive or active character. In a second step it was questioned which social software is used for which purpose. In conclusion users appreciate social software for features such as interactivity and information that traditional media does not provide. Among the social web platforms users prefer social networking sites as well as videos…
Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice
2004
. Several approaches for and against the unauthorized copying of software have been proposed. These approaches can be divided into two categories: moral reasoning and solution. These categories of approaches to unauthorized copying of software are scrutinized in the light of Kohlberg's theory of Cognitive Moral Development. The results suggest that most approaches presenting solutions to unauthorized copying of software have focused attention on the lower levels of moral development, while approaches at the highest stage are few and far between. No single approach covers all the stages of moral development. The implications of this analysis for practice and research are discussed.
Attitudes to and factors affecting unauthorized copying of computer software in Finland
2005
Several quantitative studies have sought to determine the factors affecting the unauthorized copying of software, particularly in North America. However, we find no statistically reliable studies on the situation in Europe. In order to address this gap in the literature, we explored the attitudes to and factors affecting the unauthorized copying of computer software of 249 Finnish university students: nine hypotheses derived from the existing research on unauthorized copying of computer software or theories of ethics were tested. A quantitative questionnaire was used as the research instrument. The results shed new light on the characteristics of users and factors affecting the unauthorized…