Privacy, Trust and Social Media

Privacy, Trust and Social Media
Author: Joanna Paliszkiewicz
Publisher: Taylor & Francis
Total Pages: 255
Release: 2023-11-24
Genre: Business & Economics
ISBN: 1000964574

Trust is important – it influences new technologies adoption and learning, enhances using social media, new technologies, IoT, and blockchain, and it contributes to the practical implementations of cybersecurity policy in organizations. This edited research volume examines the main issues and challenges associated with privacy and trust on social media in a manner relevant to both practitioners and scholars. Readers will gain knowledge across disciplines on trust and related concepts, theoretical underpinnings of privacy issues and trust on social media, and empirically-validated trust-building practice on social media. Social Media, Privacy Issues and Trust-building aims to bring together the theory and practice of social media, privacy issues, and trust. It offers a look at the current state of trust and privacy, including a comprehensive overview of both research and practical applications. It shows the latest state of knowledge on the topic and will be of interest to researchers, students at an advanced level, and academics, in the fields of business ethics, entrepreneurship, management of technology and innovation, marketing, and information management. Practitioners can also use the book as a toolbox to improve their understanding and promote opportunities related to building social media trust while taking into consideration of privacy issues.

Privacy as Trust

Privacy as Trust
Author: Ari Ezra Waldman
Publisher:
Total Pages: 219
Release: 2018-03-29
Genre: Computers
ISBN: 1107186005

Proposes a new way of thinking about information privacy that leverages law to protect disclosures in contexts of trust.

Data Privacy and Trust in Cloud Computing

Data Privacy and Trust in Cloud Computing
Author: Theo Lynn
Publisher: Springer Nature
Total Pages: 149
Release: 2020-10-13
Genre: Business & Economics
ISBN: 3030546608

This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.

Obfuscation

Obfuscation
Author: Finn Brunton
Publisher: MIT Press
Total Pages: 137
Release: 2015-09-04
Genre: Computers
ISBN: 0262029731

How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage—especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it. Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.

Always On

Always On
Author: Naomi S. Baron
Publisher: Oxford University Press
Total Pages: 305
Release: 2010-03-03
Genre: Language Arts & Disciplines
ISBN: 0199779805

In Always On, Naomi S. Baron reveals that online and mobile technologies--including instant messaging, cell phones, multitasking, Facebook, blogs, and wikis--are profoundly influencing how we read and write, speak and listen, but not in the ways we might suppose. Baron draws on a decade of research to provide an eye-opening look at language in an online and mobile world. She reveals for instance that email, IM, and text messaging have had surprisingly little impact on student writing. Electronic media has magnified the laid-back "whatever" attitude toward formal writing that young people everywhere have embraced, but it is not a cause of it. A more troubling trend, according to Baron, is the myriad ways in which we block incoming IMs, camouflage ourselves on Facebook, and use ring tones or caller ID to screen incoming calls on our mobile phones. Our ability to decide who to talk to, she argues, is likely to be among the most lasting influences that information technology has upon the ways we communicate with one another. Moreover, as more and more people are "always on" one technology or another--whether communicating, working, or just surfing the web or playing games--we have to ask what kind of people do we become, as individuals and as family members or friends, if the relationships we form must increasingly compete for our attention with digital media? Our 300-year-old written culture is on the verge of redefinition, Baron notes. It's up to us to determine how and when we use language technologies, and to weigh the personal and social benefits--and costs--of being "always on." This engaging and lucidly-crafted book gives us the tools for taking on these challenges.

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Author: Rawat, Danda B.
Publisher: IGI Global
Total Pages: 593
Release: 2013-10-31
Genre: Computers
ISBN: 1466646926

"This book examines the current scope of theoretical and practical applications on the security of mobile and wireless communications, covering fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks"--Provided by publisher.

Security and Privacy in Social Networks

Security and Privacy in Social Networks
Author: Yaniv Altshuler
Publisher: Springer Science & Business Media
Total Pages: 254
Release: 2012-08-14
Genre: Computers
ISBN: 1461441390

Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

The Cloud-to-Thing Continuum

The Cloud-to-Thing Continuum
Author: Theo Lynn
Publisher: Springer Nature
Total Pages: 183
Release: 2020-07-07
Genre: Business & Economics
ISBN: 3030411109

The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support the Internet of Things. Much of this book focuses on technical aspects of the Internet of Things, however, clear methodologies for mapping the business value of the Internet of Things are still missing. We provide a value mapping framework for the Internet of Things to address this gap. While there is much hype about theInternet of Things, we have yet to reach the tipping point. As such, this book provides a timely entrée for higher education educators, researchers and students, industry and policy makers on the technologies that promise to reshape how society interacts and operates.

Human Aspects of Information Security, Privacy and Trust

Human Aspects of Information Security, Privacy and Trust
Author: Theo Tryfonas
Publisher: Springer
Total Pages: 763
Release: 2017-05-11
Genre: Computers
ISBN: 331958460X

The two-volume set LNCS 10286 + 10287 constitutes the refereed proceedings of the 8th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics, and Risk Management, DHM 2017, held as part of HCI International 2017 in Vancouver, BC, Canada. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process. The 75 papers presented in these volumes were organized in topical sections as follows: Part I: anthropometry, ergonomics, design and comfort; human body and motion modelling; smart human-centered service system design; and human-robot interaction. Part II: clinical and health information systems; health and aging; health data analytics and visualization; and design for safety.

Digital Trust

Digital Trust
Author: Barry Connolly
Publisher: Bloomsbury Publishing
Total Pages: 257
Release: 2020-02-06
Genre: Business & Economics
ISBN: 1472961358

A guide to how e-SMEs can successfully engage within social media communities to positively influence their brand trust and reputation. Consumer trust is more important than ever, as digital platforms and social media have redefined the relationship between businesses and consumers. In this new and disruptive commercial environment, consumers have developed an expectancy of direct, transparent communication through social media. The traditional means of building and maintaining trust have been rendered obsolete by the chaotic, competitive magnitude of multiple online platforms. With a unique combination of academic rigour and practical guidance, Digital Trust is the definitive guide to effectively using social media to build an authentic, trustful connection with your consumer base. Drawing on his extensive experience in marketing and communications, Barry Connolly demonstrates how to harness the commercial opportunities provided by social media, while also showing how you can avoid its most common mistakes and pitfalls. With original research and illuminating case studies, Digital Trust provides adaptable and accessible social media strategies that will strengthen and expand your consumer base.