2014
DOI: 10.1108/info-01-2014-0004
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating social media privacy settings for personal and advertising purposes

Abstract: Purpose – The purpose of this paper is to define two types of privacy, which are distinct but often reduced to each other. It also investigates which form of privacy is most prominent in privacy settings of online social networks (OSN). Privacy between users is different from privacy between a user and a third party. OSN, and to a lesser extent researchers, often reduce the former to the latter, which results in misleading users and public debate about privacy. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Furthermore, privacy concerns had a stronger influence on PPBs at the horizontal than at the vertical level. This suggests that horizontal privacy concerns are more easily translated into protection from other internet users, presumably because related privacy protections are more readily available and easier to employ compared to privacy protections against institutions (Heyman et al, 2014). Interestingly, no significant differences were found in the effect of OPL on PPBs across levels.…”
Section: Discussionmentioning
confidence: 96%
“…Furthermore, privacy concerns had a stronger influence on PPBs at the horizontal than at the vertical level. This suggests that horizontal privacy concerns are more easily translated into protection from other internet users, presumably because related privacy protections are more readily available and easier to employ compared to privacy protections against institutions (Heyman et al, 2014). Interestingly, no significant differences were found in the effect of OPL on PPBs across levels.…”
Section: Discussionmentioning
confidence: 96%
“…The diagram (Figure 1) clearly shows that the sets of identity attributes and identifiers used for specific transactions on the Internet may vary considerably depending on the context [65]. Effective identification is therefore, based on users' ability to demonstrate knowledge (something you know-e.g., a password); possession of a token or credential (something you have-e.g., driver's license); physiological characteristics or features (something you are-e.g., gender, facial features, signature, fingerprint), or a combination of all or any of the three [66,67].…”
Section: Self Disclosurementioning
confidence: 99%
“…However, other factors such as the limitations of such social media, which may preclude connections outside the organisation, may prevent the platforms from benefitting from the strength of weak ties outside the organisation. Enterprise social media in multinational organisations can improve knowledge sharing, but smaller, private organisations may not have the resources or the ability to develop or deploy enterprise-specific social media and the use of social media may shift towards personal use (Heyman et al, 2014) that may adversely affect project success (Ellison et al, 2015).…”
Section: H5: Other Social Media and Project Success At Workmentioning
confidence: 99%