Search (2 results, page 1 of 1)

  • × author_ss:"Houghton, D."
  1. Vasalou, A.; Joinson, A.; Houghton, D.: Privacy as a fuzzy concept : a new conceptualization of privacy for practitioners (2015) 0.00
    0.0030491136 = product of:
      0.006098227 = sum of:
        0.006098227 = product of:
          0.012196454 = sum of:
            0.012196454 = weight(_text_:a in 1817) [ClassicSimilarity], result of:
              0.012196454 = score(doc=1817,freq=26.0), product of:
                0.053105544 = queryWeight, product of:
                  1.153047 = idf(docFreq=37942, maxDocs=44218)
                  0.046056706 = queryNorm
                0.22966442 = fieldWeight in 1817, product of:
                  5.0990195 = tf(freq=26.0), with freq of:
                    26.0 = termFreq=26.0
                  1.153047 = idf(docFreq=37942, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1817)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    In recent years, technological innovation has re-ignited an interest in privacy as designers, policy makers, and users each strive to reconcile the advantages of technology with the new demands they pose for privacy. Driven by a classic approach to defining concepts, scholars have not been able to agree on a unified definition of privacy. This poses a barrier to those who seek to implement privacy through their decisions. A critical component of their work involves anticipating and responding to potential privacy risks. In choosing one definition over another, practitioners might be missing nuanced contextual overlaps that bear on privacy and thus bias their subsequent decisions. For these practical endeavors, it is important to adopt an inclusive and rich definition. Such a definition should also be responsive to how those affected by decisions that might compromise privacy, namely citizens and technology users, conceive of privacy. The present paper applies a prototype perspective on privacy that acknowledges the fuzziness of concepts and goes on to develop such a definition in a series of empirical studies. The relevance of the privacy prototype is then explored as it applies to privacy theorists, practitioners, and methodologists, suggesting new avenues for future research.
    Type
    a
  2. Newson, A.; Houghton, D.; Patten, J.: Blogging and other social media : exploiting the technology and protecting the enterprise (2008) 0.00
    0.0020296127 = product of:
      0.0040592253 = sum of:
        0.0040592253 = product of:
          0.008118451 = sum of:
            0.008118451 = weight(_text_:a in 2831) [ClassicSimilarity], result of:
              0.008118451 = score(doc=2831,freq=18.0), product of:
                0.053105544 = queryWeight, product of:
                  1.153047 = idf(docFreq=37942, maxDocs=44218)
                  0.046056706 = queryNorm
                0.15287387 = fieldWeight in 2831, product of:
                  4.2426405 = tf(freq=18.0), with freq of:
                    18.0 = termFreq=18.0
                  1.153047 = idf(docFreq=37942, maxDocs=44218)
                  0.03125 = fieldNorm(doc=2831)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Blogging and other types of social media such as wikis and social networking sites have transformed the way we use the internet in recent years. It is a transformation that business is eager to exploit. In order to do so, a clear commercial strategy needs to be established; does your organization wish to use the media actively as a business tool, or do you need to respond to the use of social media by others? "Blogging and Other Social Media" will address this question with practical guidance on using social media as well as the risks associated with it. A collaboration by leading thinkers and business users of social media, the book contains detailed and practical advice on the various forms of social media - their applications, advantages and disadvantages, how these technologies are evolving, and whether or not their use will benefit your business. The section covering social media and the law explains the risks and remedies related to abuse of copyright, defamation, privacy, data protection and user contracts as well as the opportunities and threats for online reputation.If you are looking to encourage your employees but want to protect your business from the threats this emerging media presents, get a copy of this practical guide and study it before you start including social media as part of your corporate marketing or communications strategy.
    Content
    Introduction to blogs - Creating a blog - Writing a blog - Enhancing the experience - Is blogging worthwhile for a business? - Introduction to social media - Professional networks for businesses - Industry specific professional networks - Wikis - Online office applications - Podcasting - Social bookmarking and online content democracy - Forerunners to social media - Social media aggregators - Social tools inside the enterprise - Elements of enterprise - Examples and conclusion - The law of social media - Online reputation