Search (3668 results, page 1 of 184)

  1. Miller, S.: Privacy, data bases and computers (1998) 0.18
    0.17689167 = product of:
      0.35378334 = sum of:
        0.35378334 = sum of:
          0.30141306 = weight(_text_:disclosure in 3027) [ClassicSimilarity], result of:
            0.30141306 = score(doc=3027,freq=2.0), product of:
              0.40591347 = queryWeight, product of:
                8.401051 = idf(docFreq=26, maxDocs=44218)
                0.04831699 = queryNorm
              0.74255496 = fieldWeight in 3027, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                8.401051 = idf(docFreq=26, maxDocs=44218)
                0.0625 = fieldNorm(doc=3027)
          0.05237028 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
            0.05237028 = score(doc=3027,freq=2.0), product of:
              0.16919786 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.04831699 = queryNorm
              0.30952093 = fieldWeight in 3027, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0625 = fieldNorm(doc=3027)
      0.5 = coord(1/2)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
  2. Zhitomirsky-Geffet, M.; Bratspiess, Y.: Professional information disclosure on social networks : the case of Facebook and LinkedIn in Israel (2016) 0.12
    0.11536066 = product of:
      0.23072132 = sum of:
        0.23072132 = product of:
          0.46144265 = sum of:
            0.46144265 = weight(_text_:disclosure in 2766) [ClassicSimilarity], result of:
              0.46144265 = score(doc=2766,freq=12.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                1.1368005 = fieldWeight in 2766, product of:
                  3.4641016 = tf(freq=12.0), with freq of:
                    12.0 = termFreq=12.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=2766)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Disclosure of personal information on social networks has been extensively researched in recent years from different perspectives, including the influence of demographic, personality, and social parameters on the extent and type of disclosure. However, although some of the most widespread uses of these networks nowadays are for professional, academic, and business purposes, a thorough investigation of professional information disclosure is still needed. This study's primary aim, therefore, is to conduct a systematic and comprehensive investigation into patterns of professional information disclosure and various factors involved on different types of social networks. To this end, a user survey was conducted. We focused specifically on Facebook and LinkedIn, the 2 diverse networks most widely used in Israel. Significant differences were found between these networks. For example, we found that on Facebook professional pride is a factor in professional information disclosure, whereas on LinkedIn, work seniority and income have a significant effect. Thus, our findings shed light on the attitudes and professional behavior of network members, leading to recommendations regarding advertising strategies and network-appropriate self-presentation, as well as approaches that companies might adopt according to the type of manpower required.
  3. Costello, K.L.; Martin III, J.D.; Brinegar, A.E.: Online disclosure of illicit information : information behaviors in two drug forums (2017) 0.12
    0.11536066 = product of:
      0.23072132 = sum of:
        0.23072132 = product of:
          0.46144265 = sum of:
            0.46144265 = weight(_text_:disclosure in 3832) [ClassicSimilarity], result of:
              0.46144265 = score(doc=3832,freq=12.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                1.1368005 = fieldWeight in 3832, product of:
                  3.4641016 = tf(freq=12.0), with freq of:
                    12.0 = termFreq=12.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=3832)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Although people disclose illicit activities such as drug use online, we currently know little about what information people choose to disclose and share or whether there are differences in behavior depending on the illicit activity being disclosed. This exploratory mixed-methods study examines how people discuss and disclose the use of two different drugs-marijuana and opioids-on Reddit. In this study, hermeneutic content analysis is employed to describe the type of comments people make in forums dedicated to discussions about illicit drugs. With inductive analysis, seven categories of comments were identified: disclosure, instruction and advice, culture, community norms, moralizing, legality, and banter. Our subsequent quantitative analysis indicates that although the amounts of disclosure are similar in each subreddit, there are more instances of instruction and advice in discussions about opiates, and more examples of banter in comments about marijuana use. In fact, both subreddits have high rates of banter. We argue that banter fosters disclosure in both subreddits, and that banter and disclosure are linked with information-seeking behaviors in online forums. This work has implications for future explorations of disclosure online and for public health interventions aimed at disseminating credible information about drug use to at-risk individuals.
  4. Chen, H.; Beaudoin, C.E.; Hong, H.: Teen online information disclosure : empirical testing of a protection motivation and social capital model (2016) 0.11
    0.113029905 = product of:
      0.22605981 = sum of:
        0.22605981 = product of:
          0.45211962 = sum of:
            0.45211962 = weight(_text_:disclosure in 3203) [ClassicSimilarity], result of:
              0.45211962 = score(doc=3203,freq=8.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                1.1138325 = fieldWeight in 3203, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=3203)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    With bases in protection motivation theory and social capital theory, this study investigates teen and parental factors that determine teens' online privacy concerns, online privacy protection behaviors, and subsequent online information disclosure on social network sites. With secondary data from a 2012 survey (N?=?622), the final well-fitting structural equation model revealed that teen online privacy concerns were primarily influenced by parental interpersonal trust and parental concerns about teens' online privacy, whereas teen privacy protection behaviors were primarily predicted by teen cost-benefit appraisal of online interactions. In turn, teen online privacy concerns predicted increased privacy protection behaviors and lower teen information disclosure. Finally, restrictive and instructive parental mediation exerted differential influences on teens' privacy protection behaviors and online information disclosure.
  5. Wu, Z.; Li, R.; Zhou, Z.; Guo, J.; Jiang, J.; Su, X.: ¬A user sensitive subject protection approach for book search service (2020) 0.11
    0.110557295 = product of:
      0.22111459 = sum of:
        0.22111459 = sum of:
          0.18838316 = weight(_text_:disclosure in 5617) [ClassicSimilarity], result of:
            0.18838316 = score(doc=5617,freq=2.0), product of:
              0.40591347 = queryWeight, product of:
                8.401051 = idf(docFreq=26, maxDocs=44218)
                0.04831699 = queryNorm
              0.46409684 = fieldWeight in 5617, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                8.401051 = idf(docFreq=26, maxDocs=44218)
                0.0390625 = fieldNorm(doc=5617)
          0.032731425 = weight(_text_:22 in 5617) [ClassicSimilarity], result of:
            0.032731425 = score(doc=5617,freq=2.0), product of:
              0.16919786 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.04831699 = queryNorm
              0.19345059 = fieldWeight in 5617, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0390625 = fieldNorm(doc=5617)
      0.5 = coord(1/2)
    
    Abstract
    In a digital library, book search is one of the most important information services. However, with the rapid development of network technologies such as cloud computing, the server-side of a digital library is becoming more and more untrusted; thus, how to prevent the disclosure of users' book query privacy is causing people's increasingly extensive concern. In this article, we propose to construct a group of plausible fake queries for each user book query to cover up the sensitive subjects behind users' queries. First, we propose a basic framework for the privacy protection in book search, which requires no change to the book search algorithm running on the server-side, and no compromise to the accuracy of book search. Second, we present a privacy protection model for book search to formulate the constraints that ideal fake queries should satisfy, that is, (i) the feature similarity, which measures the confusion effect of fake queries on users' queries, and (ii) the privacy exposure, which measures the cover-up effect of fake queries on users' sensitive subjects. Third, we discuss the algorithm implementation for the privacy model. Finally, the effectiveness of our approach is demonstrated by theoretical analysis and experimental evaluation.
    Date
    6. 1.2020 17:22:25
  6. Hotho, A.; Bloehdorn, S.: Data Mining 2004 : Text classification by boosting weak learners based on terms and concepts (2004) 0.10
    0.09637904 = sum of:
      0.07674019 = product of:
        0.23022056 = sum of:
          0.23022056 = weight(_text_:3a in 562) [ClassicSimilarity], result of:
            0.23022056 = score(doc=562,freq=2.0), product of:
              0.40963197 = queryWeight, product of:
                8.478011 = idf(docFreq=24, maxDocs=44218)
                0.04831699 = queryNorm
              0.56201804 = fieldWeight in 562, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                8.478011 = idf(docFreq=24, maxDocs=44218)
                0.046875 = fieldNorm(doc=562)
        0.33333334 = coord(1/3)
      0.019638853 = product of:
        0.039277706 = sum of:
          0.039277706 = weight(_text_:22 in 562) [ClassicSimilarity], result of:
            0.039277706 = score(doc=562,freq=2.0), product of:
              0.16919786 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.04831699 = queryNorm
              0.23214069 = fieldWeight in 562, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046875 = fieldNorm(doc=562)
        0.5 = coord(1/2)
    
    Content
    Vgl.: http://www.google.de/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CEAQFjAA&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.91.4940%26rep%3Drep1%26type%3Dpdf&ei=dOXrUMeIDYHDtQahsIGACg&usg=AFQjCNHFWVh6gNPvnOrOS9R3rkrXCNVD-A&sig2=5I2F5evRfMnsttSgFF9g7Q&bvm=bv.1357316858,d.Yms.
    Date
    8. 1.2013 10:22:32
  7. Fullwood, C.; Melrose, K.; Morris, N.; Floyd, S.: Sex, blogs, and baring your soul : factors influencing UK blogging strategies (2013) 0.09
    0.09419158 = product of:
      0.18838316 = sum of:
        0.18838316 = product of:
          0.37676632 = sum of:
            0.37676632 = weight(_text_:disclosure in 614) [ClassicSimilarity], result of:
              0.37676632 = score(doc=614,freq=8.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.9281937 = fieldWeight in 614, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=614)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    There is an abundance of evidence to suggest that online behavior differs from behaviors in the offline world, and that there are a number of important factors which may affect the communication strategies of people within an online space. This article examines some of these, namely, whether the sex, age, and identifiability of blog authors, as well as the genre of communication, affect communication strategies. Findings suggest that the level of identifiability of the blog author has a limited effect upon their communication strategies. However, sex appeared to influence online behavior in so far as men were more likely to swear and attack others in their blogs. Genre had an important influence on disclosure with more self-disclosure taking place in the diary genre (i.e., blogs in which people talk about their own lives) comparative to the filter genre (i.e., blogs in which people talk about events external to their lives). Age affected both self-disclosure and language use. For example, younger bloggers tended to use more swearing, express more negative emotions and disclose more personal information about others. These findings suggest that age, sex, genre, and identifiability form a cluster of variables that influence the language style and self-disclosure patterns of bloggers; however, the level of identifiability of the blogger may be less important in this respect. Implications of these findings are discussed.
  8. Bacsanyi, K.; Lynn, P.: CD-ROMs : instructional methods and user reactions (1989) 0.09
    0.09324491 = product of:
      0.18648982 = sum of:
        0.18648982 = product of:
          0.37297964 = sum of:
            0.37297964 = weight(_text_:disclosure in 1526) [ClassicSimilarity], result of:
              0.37297964 = score(doc=1526,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.9188649 = fieldWeight in 1526, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1526)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    The popularity of CD-ROM products has caused librarians to become more active participants in the bibliographic instruction process. To meet the instructional needs of users, a variety of teaching methods has been explored at the Purdy/Kresge Library, Wayne Stare University, Detroit, Michigan, where 4 CD-Rom systems-ERIC, PsycLIT, Compact Disclosure, Social Science Index (SSI)-have also been purchased. The teaching methods include: developing instructional leaflets; offering individual instruction on demand or by appointment; scheduled group sessions; course integrated training sessions. Describes these activities and reports select results of a preliminary survey, undertaken in Spring 88, designed to evaluate user reaction to the library's CD-ROM products.
    Object
    Compact Disclosure
  9. Kobsa, A.; Cho, H.; Knijnenburg, B.P.: ¬The effect of personalization provider characteristics on privacy attitudes and behaviors : an Elaboration Likelihood Model approach (2016) 0.08
    0.0815723 = product of:
      0.1631446 = sum of:
        0.1631446 = product of:
          0.3262892 = sum of:
            0.3262892 = weight(_text_:disclosure in 3146) [ClassicSimilarity], result of:
              0.3262892 = score(doc=3146,freq=6.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.8038393 = fieldWeight in 3146, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=3146)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Many computer users today value personalization but perceive it in conflict with their desire for privacy. They therefore tend not to disclose data that would be useful for personalization. We investigate how characteristics of the personalization provider influence users' attitudes towards personalization and their resulting disclosure behavior. We propose an integrative model that links these characteristics via privacy attitudes to actual disclosure behavior. Using the Elaboration Likelihood Model, we discuss in what way the influence of the manipulated provider characteristics is different for users engaging in different levels of elaboration (represented by the user characteristics of privacy concerns and self-efficacy). We find particularly that (a) reputation management is effective when users predominantly use the peripheral route (i.e., a low level of elaboration), but much less so when they predominantly use the central route (i.e., a high level of elaboration); (b) client-side personalization has a positive impact when users use either route; and (c) personalization in the cloud does not work well in either route. Managers and designers can use our results to instill more favorable privacy attitudes and increase disclosure, using different techniques that depend on each user's levels of privacy concerns and privacy self-efficacy.
  10. Fachsystematik Bremen nebst Schlüssel 1970 ff. (1970 ff) 0.08
    0.08031587 = sum of:
      0.06395016 = product of:
        0.19185047 = sum of:
          0.19185047 = weight(_text_:3a in 3577) [ClassicSimilarity], result of:
            0.19185047 = score(doc=3577,freq=2.0), product of:
              0.40963197 = queryWeight, product of:
                8.478011 = idf(docFreq=24, maxDocs=44218)
                0.04831699 = queryNorm
              0.46834838 = fieldWeight in 3577, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                8.478011 = idf(docFreq=24, maxDocs=44218)
                0.0390625 = fieldNorm(doc=3577)
        0.33333334 = coord(1/3)
      0.016365713 = product of:
        0.032731425 = sum of:
          0.032731425 = weight(_text_:22 in 3577) [ClassicSimilarity], result of:
            0.032731425 = score(doc=3577,freq=2.0), product of:
              0.16919786 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.04831699 = queryNorm
              0.19345059 = fieldWeight in 3577, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0390625 = fieldNorm(doc=3577)
        0.5 = coord(1/2)
    
    Content
    1. Agrarwissenschaften 1981. - 3. Allgemeine Geographie 2.1972. - 3a. Allgemeine Naturwissenschaften 1.1973. - 4. Allgemeine Sprachwissenschaft, Allgemeine Literaturwissenschaft 2.1971. - 6. Allgemeines. 5.1983. - 7. Anglistik 3.1976. - 8. Astronomie, Geodäsie 4.1977. - 12. bio Biologie, bcp Biochemie-Biophysik, bot Botanik, zoo Zoologie 1981. - 13. Bremensien 3.1983. - 13a. Buch- und Bibliothekswesen 3.1975. - 14. Chemie 4.1977. - 14a. Elektrotechnik 1974. - 15 Ethnologie 2.1976. - 16,1. Geowissenschaften. Sachteil 3.1977. - 16,2. Geowissenschaften. Regionaler Teil 3.1977. - 17. Germanistik 6.1984. - 17a,1. Geschichte. Teilsystematik hil. - 17a,2. Geschichte. Teilsystematik his Neuere Geschichte. - 17a,3. Geschichte. Teilsystematik hit Neueste Geschichte. - 18. Humanbiologie 2.1983. - 19. Ingenieurwissenschaften 1974. - 20. siehe 14a. - 21. klassische Philologie 3.1977. - 22. Klinische Medizin 1975. - 23. Kunstgeschichte 2.1971. - 24. Kybernetik. 2.1975. - 25. Mathematik 3.1974. - 26. Medizin 1976. - 26a. Militärwissenschaft 1985. - 27. Musikwissenschaft 1978. - 27a. Noten 2.1974. - 28. Ozeanographie 3.1977. -29. Pädagogik 8.1985. - 30. Philosphie 3.1974. - 31. Physik 3.1974. - 33. Politik, Politische Wissenschaft, Sozialwissenschaft. Soziologie. Länderschlüssel. Register 1981. - 34. Psychologie 2.1972. - 35. Publizistik und Kommunikationswissenschaft 1985. - 36. Rechtswissenschaften 1986. - 37. Regionale Geograpgie 3.1975. - 37a. Religionswissenschaft 1970. - 38. Romanistik 3.1976. - 39. Skandinavistik 4.1985. - 40. Slavistik 1977. - 40a. Sonstige Sprachen und Literaturen 1973. - 43. Sport 4.1983. - 44. Theaterwissenschaft 1985. - 45. Theologie 2.1976. - 45a. Ur- und Frühgeschichte, Archäologie 1970. - 47. Volkskunde 1976. - 47a. Wirtschaftswissenschaften 1971 // Schlüssel: 1. Länderschlüssel 1971. - 2. Formenschlüssel (Kurzform) 1974. - 3. Personenschlüssel Literatur 5. Fassung 1968
  11. Robbin, A.; Koball, H.: Seeking explanation in theory : reflections on the social practices of organizations that distribute public use microdata files for research purposes (2001) 0.08
    0.07992421 = product of:
      0.15984842 = sum of:
        0.15984842 = product of:
          0.31969684 = sum of:
            0.31969684 = weight(_text_:disclosure in 6852) [ClassicSimilarity], result of:
              0.31969684 = score(doc=6852,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.7875985 = fieldWeight in 6852, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=6852)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Public concern about personal privacy has recently focused on issues of Internet data security and personal information as big business. The scientific discourse about information privacy focuses on the crosspressures of maintaining confidentiality and ensuring access in the context of the production of statistical data for public policy and social research and the associated technical solutions for releasing statistical data. This article reports some of the key findings from a small-scale survey of organizational practices to limit disclosure of confidential information prior to publishing public use microdata files, and illustrates how the rules for preserving confidentiality were applied in practice. Explanation for the apparent deficits and wide variations in the extent of knowledge about statistical disclosure limitation (SDL) methods is located in theories of organizational life and communities of practice. The article concludes with suggestions for improving communication between communities of practice to enhance the knowledge base of those responsible for producing public use microdata files
  12. Nobarany, S.; Booth, K.S.: Understanding and supporting anonymity policies in peer review (2017) 0.08
    0.07992421 = product of:
      0.15984842 = sum of:
        0.15984842 = product of:
          0.31969684 = sum of:
            0.31969684 = weight(_text_:disclosure in 3533) [ClassicSimilarity], result of:
              0.31969684 = score(doc=3533,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.7875985 = fieldWeight in 3533, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=3533)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Design of peer-review support systems is shaped by the policies that define and govern the process of peer review. An important component of these are policies that deal with anonymity: The rules that govern the concealment and transparency of information related to identities of the various stakeholders (authors, reviewers, editors, and others) involved in the peer-review process. Anonymity policies have been a subject of debate for several decades within scholarly communities. Because of widespread criticism of traditional peer-review processes, a variety of new peer-review processes have emerged that manage the trade-offs between disclosure and concealment of identities in different ways. Based on an analysis of policies and guidelines for authors and reviewers provided by publication venues, we developed a framework for understanding how disclosure and concealment of identities is managed. We discuss the appropriate role of information technology and computer support for the peer-review process within that framework.
  13. Wu, P.F.: ¬The privacy paradox in the context of online social networking : a self-identity perspective (2019) 0.08
    0.07992421 = product of:
      0.15984842 = sum of:
        0.15984842 = product of:
          0.31969684 = sum of:
            0.31969684 = weight(_text_:disclosure in 4984) [ClassicSimilarity], result of:
              0.31969684 = score(doc=4984,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.7875985 = fieldWeight in 4984, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=4984)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Drawing on identity theory and privacy research, this article argues that the need for self-identity is a key factor affecting people's privacy behavior in social networking sites. I first unpack the mainstream, autonomy-centric discourse of privacy, and then present a research model that illustrates a possible new theorization of the relationship between self-identity and information privacy. An empirical study with Facebook users confirms the main hypotheses. In particular, the data show that the need for self-identity is positively related to privacy management behaviors, which in turn result in increased self-disclosure in online social networks. I subsequently argue that the so-called "privacy paradox" is not a paradox per se in the context of online social networking; rather, privacy concerns reflect the ideology of an autonomous self, whereas social construction of self-identity explains voluntary self-disclosure.
  14. Verwer, K.: Freiheit und Verantwortung bei Hans Jonas (2011) 0.08
    0.07674019 = product of:
      0.15348038 = sum of:
        0.15348038 = product of:
          0.4604411 = sum of:
            0.4604411 = weight(_text_:3a in 973) [ClassicSimilarity], result of:
              0.4604411 = score(doc=973,freq=2.0), product of:
                0.40963197 = queryWeight, product of:
                  8.478011 = idf(docFreq=24, maxDocs=44218)
                  0.04831699 = queryNorm
                1.1240361 = fieldWeight in 973, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.478011 = idf(docFreq=24, maxDocs=44218)
                  0.09375 = fieldNorm(doc=973)
          0.33333334 = coord(1/3)
      0.5 = coord(1/2)
    
    Content
    Vgl.: http%3A%2F%2Fcreativechoice.org%2Fdoc%2FHansJonas.pdf&usg=AOvVaw1TM3teaYKgABL5H9yoIifA&opi=89978449.
  15. Coyne, R.: Cyberspace and Heidegger's pragmatics (1998) 0.08
    0.075353265 = product of:
      0.15070653 = sum of:
        0.15070653 = product of:
          0.30141306 = sum of:
            0.30141306 = weight(_text_:disclosure in 3828) [ClassicSimilarity], result of:
              0.30141306 = score(doc=3828,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.74255496 = fieldWeight in 3828, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3828)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Discusses some of the implications of Martin Heidegger's pragmatism for information technology ananlysis and critique and surveys his transformation of Enlightment notoions such as identity, proximity, community, disembodiment, pattern, representation and utopia to the phenomenological concepts of Dasein (human being), care, being-with, corporality, praxis, disclosure and the not-yet
  16. Fox, G.; Werff, L. van der; Rosati, P.; Takako Endo, P.; Lynn, T.: Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil : an extended privacy calculus perspective (2022) 0.07
    0.06660351 = product of:
      0.13320702 = sum of:
        0.13320702 = product of:
          0.26641405 = sum of:
            0.26641405 = weight(_text_:disclosure in 616) [ClassicSimilarity], result of:
              0.26641405 = score(doc=616,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.6563321 = fieldWeight in 616, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=616)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Mobile contact tracing applications have emerged as a potential solution to track and reduce the transmission of viruses such as Covid-19. These applications require the disclosure of potentially sensitive personal information thus generating understandable implications for personal privacy. This research aims to determine the factors driving acceptance of these applications, with acceptance represented by three distinct variables, namely usage intentions, willingness to disclose personal data, and willingness to rely on health advice. The study examines the influence of perceived privacy, social influence, and benefits on acceptance of contact tracing applications among a sample of 1,114 Brazilian citizens. The study leverages social contract theory to demonstrate the importance of perceived control and perceived surveillance in the formation of individuals' perceptions of privacy. Integrating privacy calculus theory with social contract theory to include reciprocity and social influence, our findings suggest that perceived privacy, reciprocal benefits, and social influence all positively influence individuals' intentions to download or continue the use of contact tracing applications, while intentions to disclose information are influenced by adoption intentions, perceived privacy, and reciprocal benefits and individuals' willingness to rely on contact tracing applications for health advice is influenced by reciprocal benefits and disclosure intentions.
  17. Blake, P.: Searching out and assessing Web sites (1996) 0.07
    0.06593411 = product of:
      0.13186821 = sum of:
        0.13186821 = product of:
          0.26373643 = sum of:
            0.26373643 = weight(_text_:disclosure in 4095) [ClassicSimilarity], result of:
              0.26373643 = score(doc=4095,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.64973557 = fieldWeight in 4095, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=4095)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Describes 4 search engines for the Internet: infoMarket Search; Yahoo and OpenText; Lycos Spider; and WebCompass. InfoMarket Search retrieves data from Web pages and information providers such as Disclosure, Information Access Company and Cambridge Scientific Abstracts. It is able to search millions of Web pages in under five seconds. Automated 'crawlers' index the complete text of Web documents. Yahoo enables users to search for specific words and phrases and conduct multilevel Boolean and weighted searches. Lycos spider offers support for HotJava and indexes 91% of the Web. WebCompass polls multiple search engines such as Lycos and InfoSeek for relevant Web pages. A personalized index of topics may be built and retrieved data stored in a format based on Microsoft Access 2.0
  18. Lewandowski, D.; Kerkmann, F.; Rümmele, S.; Sünkler, S.: ¬An empirical investigation on search engine ad disclosure (2018) 0.07
    0.06593411 = product of:
      0.13186821 = sum of:
        0.13186821 = product of:
          0.26373643 = sum of:
            0.26373643 = weight(_text_:disclosure in 4115) [ClassicSimilarity], result of:
              0.26373643 = score(doc=4115,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.64973557 = fieldWeight in 4115, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=4115)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
  19. #220 0.06
    0.06480491 = product of:
      0.12960982 = sum of:
        0.12960982 = product of:
          0.25921965 = sum of:
            0.25921965 = weight(_text_:22 in 219) [ClassicSimilarity], result of:
              0.25921965 = score(doc=219,freq=4.0), product of:
                0.16919786 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04831699 = queryNorm
                1.5320505 = fieldWeight in 219, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.21875 = fieldNorm(doc=219)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Date
    22. 5.1998 20:02:22
  20. #1387 0.06
    0.06480491 = product of:
      0.12960982 = sum of:
        0.12960982 = product of:
          0.25921965 = sum of:
            0.25921965 = weight(_text_:22 in 1386) [ClassicSimilarity], result of:
              0.25921965 = score(doc=1386,freq=4.0), product of:
                0.16919786 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04831699 = queryNorm
                1.5320505 = fieldWeight in 1386, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.21875 = fieldNorm(doc=1386)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Date
    22. 5.1998 20:02:22

Languages

Types

  • a 3066
  • m 346
  • el 162
  • s 141
  • b 39
  • x 35
  • i 23
  • r 17
  • ? 8
  • p 4
  • d 3
  • n 3
  • u 2
  • z 2
  • au 1
  • h 1
  • More… Less…

Themes

Subjects

Classifications