Search (3066 results, page 1 of 154)

  • × type_ss:"a"
  1. Miller, S.: Privacy, data bases and computers (1998) 0.18
    0.17689167 = product of:
      0.35378334 = sum of:
        0.35378334 = sum of:
          0.30141306 = weight(_text_:disclosure in 3027) [ClassicSimilarity], result of:
            0.30141306 = score(doc=3027,freq=2.0), product of:
              0.40591347 = queryWeight, product of:
                8.401051 = idf(docFreq=26, maxDocs=44218)
                0.04831699 = queryNorm
              0.74255496 = fieldWeight in 3027, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                8.401051 = idf(docFreq=26, maxDocs=44218)
                0.0625 = fieldNorm(doc=3027)
          0.05237028 = weight(_text_:22 in 3027) [ClassicSimilarity], result of:
            0.05237028 = score(doc=3027,freq=2.0), product of:
              0.16919786 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.04831699 = queryNorm
              0.30952093 = fieldWeight in 3027, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0625 = fieldNorm(doc=3027)
      0.5 = coord(1/2)
    
    Abstract
    Within the looming threat of the combination of computer databases with monitoring and surveillance devices, attempts to define the notion of privacy and its parameters. Considers the ethical issues posed by databases, touching on disclosure to organizations of matters such as personal taxation and financial information or security surveillance. Highlights the increasing information imbalance between persons and organizations and suggests ways to improve autonomy
    Date
    22. 2.1999 15:57:43
  2. Zhitomirsky-Geffet, M.; Bratspiess, Y.: Professional information disclosure on social networks : the case of Facebook and LinkedIn in Israel (2016) 0.12
    0.11536066 = product of:
      0.23072132 = sum of:
        0.23072132 = product of:
          0.46144265 = sum of:
            0.46144265 = weight(_text_:disclosure in 2766) [ClassicSimilarity], result of:
              0.46144265 = score(doc=2766,freq=12.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                1.1368005 = fieldWeight in 2766, product of:
                  3.4641016 = tf(freq=12.0), with freq of:
                    12.0 = termFreq=12.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=2766)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Disclosure of personal information on social networks has been extensively researched in recent years from different perspectives, including the influence of demographic, personality, and social parameters on the extent and type of disclosure. However, although some of the most widespread uses of these networks nowadays are for professional, academic, and business purposes, a thorough investigation of professional information disclosure is still needed. This study's primary aim, therefore, is to conduct a systematic and comprehensive investigation into patterns of professional information disclosure and various factors involved on different types of social networks. To this end, a user survey was conducted. We focused specifically on Facebook and LinkedIn, the 2 diverse networks most widely used in Israel. Significant differences were found between these networks. For example, we found that on Facebook professional pride is a factor in professional information disclosure, whereas on LinkedIn, work seniority and income have a significant effect. Thus, our findings shed light on the attitudes and professional behavior of network members, leading to recommendations regarding advertising strategies and network-appropriate self-presentation, as well as approaches that companies might adopt according to the type of manpower required.
  3. Costello, K.L.; Martin III, J.D.; Brinegar, A.E.: Online disclosure of illicit information : information behaviors in two drug forums (2017) 0.12
    0.11536066 = product of:
      0.23072132 = sum of:
        0.23072132 = product of:
          0.46144265 = sum of:
            0.46144265 = weight(_text_:disclosure in 3832) [ClassicSimilarity], result of:
              0.46144265 = score(doc=3832,freq=12.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                1.1368005 = fieldWeight in 3832, product of:
                  3.4641016 = tf(freq=12.0), with freq of:
                    12.0 = termFreq=12.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=3832)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Although people disclose illicit activities such as drug use online, we currently know little about what information people choose to disclose and share or whether there are differences in behavior depending on the illicit activity being disclosed. This exploratory mixed-methods study examines how people discuss and disclose the use of two different drugs-marijuana and opioids-on Reddit. In this study, hermeneutic content analysis is employed to describe the type of comments people make in forums dedicated to discussions about illicit drugs. With inductive analysis, seven categories of comments were identified: disclosure, instruction and advice, culture, community norms, moralizing, legality, and banter. Our subsequent quantitative analysis indicates that although the amounts of disclosure are similar in each subreddit, there are more instances of instruction and advice in discussions about opiates, and more examples of banter in comments about marijuana use. In fact, both subreddits have high rates of banter. We argue that banter fosters disclosure in both subreddits, and that banter and disclosure are linked with information-seeking behaviors in online forums. This work has implications for future explorations of disclosure online and for public health interventions aimed at disseminating credible information about drug use to at-risk individuals.
  4. Chen, H.; Beaudoin, C.E.; Hong, H.: Teen online information disclosure : empirical testing of a protection motivation and social capital model (2016) 0.11
    0.113029905 = product of:
      0.22605981 = sum of:
        0.22605981 = product of:
          0.45211962 = sum of:
            0.45211962 = weight(_text_:disclosure in 3203) [ClassicSimilarity], result of:
              0.45211962 = score(doc=3203,freq=8.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                1.1138325 = fieldWeight in 3203, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=3203)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    With bases in protection motivation theory and social capital theory, this study investigates teen and parental factors that determine teens' online privacy concerns, online privacy protection behaviors, and subsequent online information disclosure on social network sites. With secondary data from a 2012 survey (N?=?622), the final well-fitting structural equation model revealed that teen online privacy concerns were primarily influenced by parental interpersonal trust and parental concerns about teens' online privacy, whereas teen privacy protection behaviors were primarily predicted by teen cost-benefit appraisal of online interactions. In turn, teen online privacy concerns predicted increased privacy protection behaviors and lower teen information disclosure. Finally, restrictive and instructive parental mediation exerted differential influences on teens' privacy protection behaviors and online information disclosure.
  5. Wu, Z.; Li, R.; Zhou, Z.; Guo, J.; Jiang, J.; Su, X.: ¬A user sensitive subject protection approach for book search service (2020) 0.11
    0.110557295 = product of:
      0.22111459 = sum of:
        0.22111459 = sum of:
          0.18838316 = weight(_text_:disclosure in 5617) [ClassicSimilarity], result of:
            0.18838316 = score(doc=5617,freq=2.0), product of:
              0.40591347 = queryWeight, product of:
                8.401051 = idf(docFreq=26, maxDocs=44218)
                0.04831699 = queryNorm
              0.46409684 = fieldWeight in 5617, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                8.401051 = idf(docFreq=26, maxDocs=44218)
                0.0390625 = fieldNorm(doc=5617)
          0.032731425 = weight(_text_:22 in 5617) [ClassicSimilarity], result of:
            0.032731425 = score(doc=5617,freq=2.0), product of:
              0.16919786 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.04831699 = queryNorm
              0.19345059 = fieldWeight in 5617, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.0390625 = fieldNorm(doc=5617)
      0.5 = coord(1/2)
    
    Abstract
    In a digital library, book search is one of the most important information services. However, with the rapid development of network technologies such as cloud computing, the server-side of a digital library is becoming more and more untrusted; thus, how to prevent the disclosure of users' book query privacy is causing people's increasingly extensive concern. In this article, we propose to construct a group of plausible fake queries for each user book query to cover up the sensitive subjects behind users' queries. First, we propose a basic framework for the privacy protection in book search, which requires no change to the book search algorithm running on the server-side, and no compromise to the accuracy of book search. Second, we present a privacy protection model for book search to formulate the constraints that ideal fake queries should satisfy, that is, (i) the feature similarity, which measures the confusion effect of fake queries on users' queries, and (ii) the privacy exposure, which measures the cover-up effect of fake queries on users' sensitive subjects. Third, we discuss the algorithm implementation for the privacy model. Finally, the effectiveness of our approach is demonstrated by theoretical analysis and experimental evaluation.
    Date
    6. 1.2020 17:22:25
  6. Hotho, A.; Bloehdorn, S.: Data Mining 2004 : Text classification by boosting weak learners based on terms and concepts (2004) 0.10
    0.09637904 = sum of:
      0.07674019 = product of:
        0.23022056 = sum of:
          0.23022056 = weight(_text_:3a in 562) [ClassicSimilarity], result of:
            0.23022056 = score(doc=562,freq=2.0), product of:
              0.40963197 = queryWeight, product of:
                8.478011 = idf(docFreq=24, maxDocs=44218)
                0.04831699 = queryNorm
              0.56201804 = fieldWeight in 562, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                8.478011 = idf(docFreq=24, maxDocs=44218)
                0.046875 = fieldNorm(doc=562)
        0.33333334 = coord(1/3)
      0.019638853 = product of:
        0.039277706 = sum of:
          0.039277706 = weight(_text_:22 in 562) [ClassicSimilarity], result of:
            0.039277706 = score(doc=562,freq=2.0), product of:
              0.16919786 = queryWeight, product of:
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.04831699 = queryNorm
              0.23214069 = fieldWeight in 562, product of:
                1.4142135 = tf(freq=2.0), with freq of:
                  2.0 = termFreq=2.0
                3.5018296 = idf(docFreq=3622, maxDocs=44218)
                0.046875 = fieldNorm(doc=562)
        0.5 = coord(1/2)
    
    Content
    Vgl.: http://www.google.de/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CEAQFjAA&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.91.4940%26rep%3Drep1%26type%3Dpdf&ei=dOXrUMeIDYHDtQahsIGACg&usg=AFQjCNHFWVh6gNPvnOrOS9R3rkrXCNVD-A&sig2=5I2F5evRfMnsttSgFF9g7Q&bvm=bv.1357316858,d.Yms.
    Date
    8. 1.2013 10:22:32
  7. Fullwood, C.; Melrose, K.; Morris, N.; Floyd, S.: Sex, blogs, and baring your soul : factors influencing UK blogging strategies (2013) 0.09
    0.09419158 = product of:
      0.18838316 = sum of:
        0.18838316 = product of:
          0.37676632 = sum of:
            0.37676632 = weight(_text_:disclosure in 614) [ClassicSimilarity], result of:
              0.37676632 = score(doc=614,freq=8.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.9281937 = fieldWeight in 614, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=614)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    There is an abundance of evidence to suggest that online behavior differs from behaviors in the offline world, and that there are a number of important factors which may affect the communication strategies of people within an online space. This article examines some of these, namely, whether the sex, age, and identifiability of blog authors, as well as the genre of communication, affect communication strategies. Findings suggest that the level of identifiability of the blog author has a limited effect upon their communication strategies. However, sex appeared to influence online behavior in so far as men were more likely to swear and attack others in their blogs. Genre had an important influence on disclosure with more self-disclosure taking place in the diary genre (i.e., blogs in which people talk about their own lives) comparative to the filter genre (i.e., blogs in which people talk about events external to their lives). Age affected both self-disclosure and language use. For example, younger bloggers tended to use more swearing, express more negative emotions and disclose more personal information about others. These findings suggest that age, sex, genre, and identifiability form a cluster of variables that influence the language style and self-disclosure patterns of bloggers; however, the level of identifiability of the blogger may be less important in this respect. Implications of these findings are discussed.
  8. Bacsanyi, K.; Lynn, P.: CD-ROMs : instructional methods and user reactions (1989) 0.09
    0.09324491 = product of:
      0.18648982 = sum of:
        0.18648982 = product of:
          0.37297964 = sum of:
            0.37297964 = weight(_text_:disclosure in 1526) [ClassicSimilarity], result of:
              0.37297964 = score(doc=1526,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.9188649 = fieldWeight in 1526, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=1526)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    The popularity of CD-ROM products has caused librarians to become more active participants in the bibliographic instruction process. To meet the instructional needs of users, a variety of teaching methods has been explored at the Purdy/Kresge Library, Wayne Stare University, Detroit, Michigan, where 4 CD-Rom systems-ERIC, PsycLIT, Compact Disclosure, Social Science Index (SSI)-have also been purchased. The teaching methods include: developing instructional leaflets; offering individual instruction on demand or by appointment; scheduled group sessions; course integrated training sessions. Describes these activities and reports select results of a preliminary survey, undertaken in Spring 88, designed to evaluate user reaction to the library's CD-ROM products.
    Object
    Compact Disclosure
  9. Kobsa, A.; Cho, H.; Knijnenburg, B.P.: ¬The effect of personalization provider characteristics on privacy attitudes and behaviors : an Elaboration Likelihood Model approach (2016) 0.08
    0.0815723 = product of:
      0.1631446 = sum of:
        0.1631446 = product of:
          0.3262892 = sum of:
            0.3262892 = weight(_text_:disclosure in 3146) [ClassicSimilarity], result of:
              0.3262892 = score(doc=3146,freq=6.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.8038393 = fieldWeight in 3146, product of:
                  2.4494898 = tf(freq=6.0), with freq of:
                    6.0 = termFreq=6.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=3146)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Many computer users today value personalization but perceive it in conflict with their desire for privacy. They therefore tend not to disclose data that would be useful for personalization. We investigate how characteristics of the personalization provider influence users' attitudes towards personalization and their resulting disclosure behavior. We propose an integrative model that links these characteristics via privacy attitudes to actual disclosure behavior. Using the Elaboration Likelihood Model, we discuss in what way the influence of the manipulated provider characteristics is different for users engaging in different levels of elaboration (represented by the user characteristics of privacy concerns and self-efficacy). We find particularly that (a) reputation management is effective when users predominantly use the peripheral route (i.e., a low level of elaboration), but much less so when they predominantly use the central route (i.e., a high level of elaboration); (b) client-side personalization has a positive impact when users use either route; and (c) personalization in the cloud does not work well in either route. Managers and designers can use our results to instill more favorable privacy attitudes and increase disclosure, using different techniques that depend on each user's levels of privacy concerns and privacy self-efficacy.
  10. Robbin, A.; Koball, H.: Seeking explanation in theory : reflections on the social practices of organizations that distribute public use microdata files for research purposes (2001) 0.08
    0.07992421 = product of:
      0.15984842 = sum of:
        0.15984842 = product of:
          0.31969684 = sum of:
            0.31969684 = weight(_text_:disclosure in 6852) [ClassicSimilarity], result of:
              0.31969684 = score(doc=6852,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.7875985 = fieldWeight in 6852, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=6852)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Public concern about personal privacy has recently focused on issues of Internet data security and personal information as big business. The scientific discourse about information privacy focuses on the crosspressures of maintaining confidentiality and ensuring access in the context of the production of statistical data for public policy and social research and the associated technical solutions for releasing statistical data. This article reports some of the key findings from a small-scale survey of organizational practices to limit disclosure of confidential information prior to publishing public use microdata files, and illustrates how the rules for preserving confidentiality were applied in practice. Explanation for the apparent deficits and wide variations in the extent of knowledge about statistical disclosure limitation (SDL) methods is located in theories of organizational life and communities of practice. The article concludes with suggestions for improving communication between communities of practice to enhance the knowledge base of those responsible for producing public use microdata files
  11. Nobarany, S.; Booth, K.S.: Understanding and supporting anonymity policies in peer review (2017) 0.08
    0.07992421 = product of:
      0.15984842 = sum of:
        0.15984842 = product of:
          0.31969684 = sum of:
            0.31969684 = weight(_text_:disclosure in 3533) [ClassicSimilarity], result of:
              0.31969684 = score(doc=3533,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.7875985 = fieldWeight in 3533, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=3533)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Design of peer-review support systems is shaped by the policies that define and govern the process of peer review. An important component of these are policies that deal with anonymity: The rules that govern the concealment and transparency of information related to identities of the various stakeholders (authors, reviewers, editors, and others) involved in the peer-review process. Anonymity policies have been a subject of debate for several decades within scholarly communities. Because of widespread criticism of traditional peer-review processes, a variety of new peer-review processes have emerged that manage the trade-offs between disclosure and concealment of identities in different ways. Based on an analysis of policies and guidelines for authors and reviewers provided by publication venues, we developed a framework for understanding how disclosure and concealment of identities is managed. We discuss the appropriate role of information technology and computer support for the peer-review process within that framework.
  12. Wu, P.F.: ¬The privacy paradox in the context of online social networking : a self-identity perspective (2019) 0.08
    0.07992421 = product of:
      0.15984842 = sum of:
        0.15984842 = product of:
          0.31969684 = sum of:
            0.31969684 = weight(_text_:disclosure in 4984) [ClassicSimilarity], result of:
              0.31969684 = score(doc=4984,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.7875985 = fieldWeight in 4984, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=4984)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Drawing on identity theory and privacy research, this article argues that the need for self-identity is a key factor affecting people's privacy behavior in social networking sites. I first unpack the mainstream, autonomy-centric discourse of privacy, and then present a research model that illustrates a possible new theorization of the relationship between self-identity and information privacy. An empirical study with Facebook users confirms the main hypotheses. In particular, the data show that the need for self-identity is positively related to privacy management behaviors, which in turn result in increased self-disclosure in online social networks. I subsequently argue that the so-called "privacy paradox" is not a paradox per se in the context of online social networking; rather, privacy concerns reflect the ideology of an autonomous self, whereas social construction of self-identity explains voluntary self-disclosure.
  13. Coyne, R.: Cyberspace and Heidegger's pragmatics (1998) 0.08
    0.075353265 = product of:
      0.15070653 = sum of:
        0.15070653 = product of:
          0.30141306 = sum of:
            0.30141306 = weight(_text_:disclosure in 3828) [ClassicSimilarity], result of:
              0.30141306 = score(doc=3828,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.74255496 = fieldWeight in 3828, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0625 = fieldNorm(doc=3828)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Discusses some of the implications of Martin Heidegger's pragmatism for information technology ananlysis and critique and surveys his transformation of Enlightment notoions such as identity, proximity, community, disembodiment, pattern, representation and utopia to the phenomenological concepts of Dasein (human being), care, being-with, corporality, praxis, disclosure and the not-yet
  14. Fox, G.; Werff, L. van der; Rosati, P.; Takako Endo, P.; Lynn, T.: Examining the determinants of acceptance and use of mobile contact tracing applications in Brazil : an extended privacy calculus perspective (2022) 0.07
    0.06660351 = product of:
      0.13320702 = sum of:
        0.13320702 = product of:
          0.26641405 = sum of:
            0.26641405 = weight(_text_:disclosure in 616) [ClassicSimilarity], result of:
              0.26641405 = score(doc=616,freq=4.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.6563321 = fieldWeight in 616, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=616)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Mobile contact tracing applications have emerged as a potential solution to track and reduce the transmission of viruses such as Covid-19. These applications require the disclosure of potentially sensitive personal information thus generating understandable implications for personal privacy. This research aims to determine the factors driving acceptance of these applications, with acceptance represented by three distinct variables, namely usage intentions, willingness to disclose personal data, and willingness to rely on health advice. The study examines the influence of perceived privacy, social influence, and benefits on acceptance of contact tracing applications among a sample of 1,114 Brazilian citizens. The study leverages social contract theory to demonstrate the importance of perceived control and perceived surveillance in the formation of individuals' perceptions of privacy. Integrating privacy calculus theory with social contract theory to include reciprocity and social influence, our findings suggest that perceived privacy, reciprocal benefits, and social influence all positively influence individuals' intentions to download or continue the use of contact tracing applications, while intentions to disclose information are influenced by adoption intentions, perceived privacy, and reciprocal benefits and individuals' willingness to rely on contact tracing applications for health advice is influenced by reciprocal benefits and disclosure intentions.
  15. Blake, P.: Searching out and assessing Web sites (1996) 0.07
    0.06593411 = product of:
      0.13186821 = sum of:
        0.13186821 = product of:
          0.26373643 = sum of:
            0.26373643 = weight(_text_:disclosure in 4095) [ClassicSimilarity], result of:
              0.26373643 = score(doc=4095,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.64973557 = fieldWeight in 4095, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=4095)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Describes 4 search engines for the Internet: infoMarket Search; Yahoo and OpenText; Lycos Spider; and WebCompass. InfoMarket Search retrieves data from Web pages and information providers such as Disclosure, Information Access Company and Cambridge Scientific Abstracts. It is able to search millions of Web pages in under five seconds. Automated 'crawlers' index the complete text of Web documents. Yahoo enables users to search for specific words and phrases and conduct multilevel Boolean and weighted searches. Lycos spider offers support for HotJava and indexes 91% of the Web. WebCompass polls multiple search engines such as Lycos and InfoSeek for relevant Web pages. A personalized index of topics may be built and retrieved data stored in a format based on Microsoft Access 2.0
  16. Lewandowski, D.; Kerkmann, F.; Rümmele, S.; Sünkler, S.: ¬An empirical investigation on search engine ad disclosure (2018) 0.07
    0.06593411 = product of:
      0.13186821 = sum of:
        0.13186821 = product of:
          0.26373643 = sum of:
            0.26373643 = weight(_text_:disclosure in 4115) [ClassicSimilarity], result of:
              0.26373643 = score(doc=4115,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.64973557 = fieldWeight in 4115, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.0546875 = fieldNorm(doc=4115)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
  17. Li, T.; Slee, T.: ¬The effects of information privacy concerns on digitizing personal health records (2014) 0.06
    0.056514952 = product of:
      0.113029905 = sum of:
        0.113029905 = product of:
          0.22605981 = sum of:
            0.22605981 = weight(_text_:disclosure in 1325) [ClassicSimilarity], result of:
              0.22605981 = score(doc=1325,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.55691624 = fieldWeight in 1325, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=1325)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Electronic health record (EHR) systems can improve service efficiency and quality within the health care sector and thus have been widely considered for adoption. Yet the introduction of such systems has caused much concern about patients' information privacy. This study provides new insights into how privacy concerns play a role in patients' decisions to permit digitization of their personal health information. We conducted an online experiment and collected data from 164 patients who are involved in the nonmandatory EHR adoption in the Netherlands. We found that the negative effect of information privacy concerns on patients' willingness to opt in is influenced by the degree of EHR system interoperability and patients' ability to control disclosure of their information. The results show that, for a networked EHR system, the negative effect of privacy concerns on opt-in behavior was reinforced more than for the stand-alone system. The results also suggest that giving patients greater ability to control their information can alleviate their privacy concerns when they make opt-in decisions. We discuss the implications of these findings.
  18. Rubel, A.; Biava, R.: ¬A framework for analyzing and comparing privacy states (2014) 0.06
    0.056514952 = product of:
      0.113029905 = sum of:
        0.113029905 = product of:
          0.22605981 = sum of:
            0.22605981 = weight(_text_:disclosure in 1340) [ClassicSimilarity], result of:
              0.22605981 = score(doc=1340,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.55691624 = fieldWeight in 1340, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=1340)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the nature and value of privacy. The article begins with an outline of the framework. It then refines the view by describing a hypothetical application. Finally, it applies the framework to a real-world privacy issue-campaign finance disclosure laws in the United States and France. The article concludes with an argument that the framework offers important advantages to privacy scholarship and for privacy policy makers.
  19. Li, Y.; Kobsa, A.: Context and privacy concerns in friend request decisions (2020) 0.06
    0.056514952 = product of:
      0.113029905 = sum of:
        0.113029905 = product of:
          0.22605981 = sum of:
            0.22605981 = weight(_text_:disclosure in 5873) [ClassicSimilarity], result of:
              0.22605981 = score(doc=5873,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.55691624 = fieldWeight in 5873, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=5873)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Friend request acceptance and information disclosure constitute 2 important privacy decisions for users to control the flow of their personal information in social network sites (SNSs). These decisions are greatly influenced by contextual characteristics of the request. However, the contextual influence may not be uniform among users with different levels of privacy concerns. In this study, we hypothesize that users with higher privacy concerns may consider contextual factors differently from those with lower privacy concerns. By conducting a scenario-based survey study and structural equation modeling, we verify the interaction effects between privacy concerns and contextual factors. We additionally find that users' perceived risk towards the requester mediates the effect of context and privacy concerns. These results extend our understanding about the cognitive process behind privacy decision making in SNSs. The interaction effects suggest strategies for SNS providers to predict user's friend request acceptance and to customize context-aware privacy decision support based on users' different privacy attitudes.
  20. Tan, X.; Luo, X.; Wang, X.; Wang, H.; Hou, X.: Representation and display of digital images of cultural heritage : a semantic enrichment approach (2021) 0.06
    0.056514952 = product of:
      0.113029905 = sum of:
        0.113029905 = product of:
          0.22605981 = sum of:
            0.22605981 = weight(_text_:disclosure in 455) [ClassicSimilarity], result of:
              0.22605981 = score(doc=455,freq=2.0), product of:
                0.40591347 = queryWeight, product of:
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.04831699 = queryNorm
                0.55691624 = fieldWeight in 455, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  8.401051 = idf(docFreq=26, maxDocs=44218)
                  0.046875 = fieldNorm(doc=455)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Abstract
    Digital images of cultural heritage (CH) contain rich semantic information. However, today's semantic representations of CH images fail to fully reveal the content entities and context within these vital surrogates. This paper draws on the fields of image research and digital humanities to propose a systematic methodology and a technical route for semantic enrichment of CH digital images. This new methodology systematically applies a series of procedures including: semantic annotation, entity-based enrichment, establishing internal relations, event-centric enrichment, defining hierarchy relations between properties text annotation, and finally, named entity recognition in order to ultimately provide fine-grained contextual semantic content disclosure. The feasibility and advantages of the proposed semantic enrichment methods for semantic representation are demonstrated via a visual display platform for digital images of CH built to represent the Wutai Mountain Map, a typical Dunhuang mural. This study proves that semantic enrichment offers a promising new model for exposing content at a fine-grained level, and establishing a rich semantic network centered on the content of digital images of CH.

Languages

Types

  • el 72
  • b 34
  • p 1
  • More… Less…

Themes