Search results for "yksityisyys"
showing 10 items of 60 documents
Mothers’ self-representations and representations of childhood on social media
2023
Funding Information: This work was supported by Kone Foundation, Academy of Finland (#320370), Strategic Research Council (#327237), Strategic Research Council (#327395), Intimacy in Data-driven Culture (IDA). The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. Publisher Copyright: © 2023, Minna Kallioharju, Terhi-Anna Wilska and Annamari Vänskä. Purpose: The purpose of this paper is to examine mothers’ social media accounts that focus on children’s fashion. The authors probed children’s fashion photo practices as representations of the mothers’ extended self and the kind of childhood representations produce…
Privacy preserving data collection for smart grid using self-organizing map
2017
Homomorphic encryption is widely researched in the smart grid area to publish and transfer electricity consumption data between electricity companies. This method makes it feasible to calculate total electricity consumption of neighborhoods without sharing any raw electricity consumption data. In the area of demand response(DR), calculating the total consumption of electricity is important in order to create DR reports which are published by third party to reduce the peak period of electricity usage such as 7 am or 6pm. Nevertheless, the possibility of data exposing or data decryption may lead to individual households private information revealing, for example, the timing of leaving home, t…
To Calculate or To Follow Others : How Do Information Security Managers Make Investment Decisions?
2019
Economic models of information security investment suggest estimating cost and benefit to make an information security investment decision. However, the intangible nature of information security investment prevents managers from applying costbenefit analysis in practice. Instead, information security managers may follow experts’ recommendations or the practices of other organizations. The present paper examines factors that influence information security managers’ investment decisions from the reputational herding perspective. The study was conducted using survey questionnaire data collected from 106 organizations in Finland. The findings of the study reveal that the ability and reputation …
Valvontakapitalismin ensimmäiset vuosikymmenet
2021
Arvio teoksesta: Zuboff, Shoshana. 2019. The Age of Surveillance Capitalism: The Fight for the Future at the New Frontier of Power. Lontoo: Profile Books, 704 s.
Naispääministerin mediarepresentaatiot Helsingin Sanomissa ja Ilta-Sanomissa 2003
2013
Tutkimuksen tarkoituksena on selvittää, millaisia mediarepresentaatioita Suomen ensimmäisenä naispääministerinä toimineesta Anneli Jäätteenmäestä mediassa muodostetaan ja miten median tapa kuvata poliitikkoja on sukupuolittunut. Näitä mediarepresentaatioita eli mediaesityksiä tarkastellaan konstruktivistisesta näkökulmasta. Tutkimuksen teoria nojaa feministiseen politiikan tutkimukseen sekä feministiseen mediatutkimukseen. Lisäksi tutkimuksen taustalla vaikuttaa vahvana yhteiskunnallinen jako yksityiseen sekä julkiseen sfääriin. Naispääministeristä luotavat mediarepresentaatiot saavat lisämerkityksiä kahdesta 2000-luvulla vaikuttaneesta yhteiskunnallisesta ilmiöstä, vuonna 2000 voimaan astu…
Protecting Human Subjects in Internet Research
2005
The growth of the Internet as a research venue has led to practical, legal, and ethical problems regarding the protection of human subjects. Among these are difficulty in verifying subjects’ identities, gaining informed consent, and assuring ethically- correct research. The authors summarize the current standards pertaining to the protection of human subjects in online research and present a set of guidelines for dealing ethically, legally, and practically with the issues of privacy and confidentiality, intellectual property, informed consent, and protection from harm. As computer-mediated communications merge and evolve, as the Internet becomes more and more a part of everyday life, and as…
Children as social actors negotiating their privacy in the digital commercial context
2023
This study advances research on children’s negotiation of online commercial privacy by identifying an act of digital agency by children that may serve their current needs but can also impact children negatively. Secondly, it identifies certain factors children consider while evaluating the trustworthiness of apps and websites before disclosing information online. Eight focus group discussions with children (13–16 years) in Finland’s capital region are analysed using thematic analysis. Our findings highlight that while children’s digital literacy education is needed, ensuring that education translates to children’s online practices is also essential. We also recommend increasing corporations…
Verkkokaupan luottamuksen luonti
2008
Tietojärjestelmätieteen kandidaatintutkielma / Urpo Sippola Jyväskylä: Jyväskylän yliopisto, 2007, 28 s. Kandidaatintutkielma. Tässä tutkielmassa tutkitaan luottamusta ja sen luomista Internetin verkkokauppojen näkökulmasta. Tutkielma tehtiin kirjallisuuskatsauksena. Luottamuksen puute on yksi eniten verkkokaupan kasvua rajoittavia tekijöitä. Lisäksi kilpailu on Internetissä kovaa ja yrityksen pitää pystyä erottumaan joukosta muun muassa luotettavuudella. Selkein määritelmä luottamukselle on kuluttajan tapa vähentää riskiä. Luottamus ei kuitenkaan ole yksiulotteinen käsite. Luottamuksen käsite vaihtelee usein eri tieteenalojen näkökulmien mukaan. Kuluttajan suurin huoli, joka estää luottamu…
Negotiating digital surveillance legislation in post-Snowden times : An argumentation analysis of Finnish political discourse
2019
Abstract In the digital era, when security agencies world-wide have been challenging basic democratic principles with massive data gathering, Finland has had a different approach: it has conducted no large-scale surveillance of citizens’ online activities. Now, however, the country is planning such a vast expansion of state surveillance that the constitution itself must be altered. The present article examines one key point in this legislative process to see how the new surveillance measures are argued for and criticized, and how the differing points of view are negotiated to ultimately enable political action. Drawing particularly on Fairclough and Fairclough’s (2012) approach to argumenta…
Technology management, networking positions and work/life boundaries among working adult students
2021
In this digitalised world, crossing boundaries between life domains is becoming increasingly easy. We are constantly faced with the need to define whether we are online or offline, and technology management is now an integral part of daily life. Technology management, which is affected by the individual's networking position, has different components: connectivity management, online self-presentation and privacy management. The objective of this study is to explore technology management strategies among working adult students. The study identifies three networking positions: socio-affective enthusiasts, context-contingent pragmatists and pragmatic avoiders. These three groups have specific …