首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
马振萍 《现代情报》2011,31(1):24-28
由于在社会网络应用程序站点上自愿添加个人身份信息的人数不断增加,站点服务商可以从中获益,但是同时数据误用的风险会威胁个人用户的隐私信息以及服务商的商业模式。本文根据最近的调查,分析了开发隐私保护社会网络应用的主要需求,在此基础上提出了隐私风险模式,以增强数据或社会网络迁移过程中的信息隐私保护。通过确定与个人身份信息迁移过程中重要的问题设计出了该隐私风险模式。  相似文献   

2.
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

3.
《The Information Society》2007,23(5):383-389
Privacy has largely been equated with every individual's right to privacy. Accordingly, current efforts to protect privacy on the Internet have sought anonymity by breaking, where possible, links with personally identifiable information (PII)—all uses of aggregated data stripped of PII are considered legitimate. This article argues that we need to use a broader concept, general or group identifying information (GII), because even aggregated data stripped of PII violate privacy at the community level. The search engine companies, or anyone else with access to their log files, can use these data to generate a moment-by-moment view of what is on the collective mind. Such a view can be used in a variety of ways, some with deep economic and even political impact. In order to frame this discussion, it is necessary to examine some of the realities of the search engine-mediated associative interface to the World Wide Web. While this interface has enormous benefits for the networked world, it also fundamentally changes a number of issues underlying various current debates about Internet governance.  相似文献   

4.
Video conferencing (VC) applications (apps) have surged in popularity as an alternative to face-to-face communications. Although VC apps offer myriad benefits, it has caught much media attention owing to concerns of privacy infringements. This study examines the key determinants of professionals’ attitude and intentions to use VC apps in the backdrop of this conflicting duality. A conceptual research model is proposed based on theoretical foundations of privacy calculus and extended with conceptualizations of mobile users’ information privacy concerns (MUIPC), trust, technicality, ubiquity, as well as theoretical underpinnings of social presence theory. Structural equation modeling is used to empirically test the model using data collected from 484 professionals. The study offers insights regarding the trade-offs that professionals are willing to make in the face of information privacy concerns associated with VC apps. Based on the findings, the study emphasizes the promotion of privacy protection at the organizational level, control mechanisms that motivate employees to actively engage in privacy protection behavior, and a multi-faceted approach for data transparency within the VC app platforms.  相似文献   

5.
Toward a Typology of Internet Users and Online Privacy Concerns   总被引:2,自引:0,他引:2  
Traditional typologies of consumer privacy concern suggest that consumers fall into three distinct groups: One-fourth of consumers are not concerned about privacy, one-fourth are highly concerned, and half are pragmatic, in that their concerns about privacy depend on the situation presented. This study examines online users to determine whether types of privacy concern online mirror the offline environment. An e-mail survey of online users examined perceived privacy concerns of 15 different situations involving collection and usage of personally identifiable information. Results indicate that the vast majority of online users are pragmatic when it comes to privacy. Further analysis of the data suggested that online users can be segmented into four distinct groups, representing differing levels of privacy concern. Distinct demographic differences were seen. Persons with higher levels of education are more concerned about their privacy online than persons with less education. Additionally, persons over the age of 45 years tended to be either not at all concerned about privacy or highly concerned about privacy. Younger persons tended to be more pragmatic. Content and policy implications are provided.  相似文献   

6.
信息通讯技术(ICT)的迅速发展使得人们可以通过微博、即时通信软件(IM)、手机终端应用及社交网络(SNS)来发布个人真实信息,网络将以往零散的碎片信息整合成完整的个体信息,造成隐私泄露现象日益严重。本文总结了个体隐私泄露的渠道和类别,通过访谈研究,分析了个体隐私感知风险以及个体隐私保护行为特征:个体特征差异(受教育水平、网络经验)导致隐私关注差异;信息关联及商业价值在不同程度上与隐私关注的变化相关;隐私关注对感知隐私风险产生影响;个体隐私保护行为(常规保护、技术保护)因隐私风险感知不同而发生变化。在此基础上,构建了个体隐私感知与保护行为模型。  相似文献   

7.
This paper investigates the research question if senders of large amounts of irrelevant or unsolicited information – commonly called “spammers” – distort the network structure of social networks. Two large social networks are analyzed, the first extracted from the Twitter discourse about a big telecommunication company, and the second obtained from three years of email communication of 200 managers working for a large multinational company. This work compares network robustness and the stability of centrality and interaction metrics, as well as the use of language, after removing spammers and the most and least connected nodes. The results show that spammers do not significantly alter the structure of the information-carrying network, for most of the social indicators. The authors additionally investigate the correlation between e-mail subject line and content by tracking language sentiment, emotionality, and complexity, addressing the cases where collecting email bodies is not permitted for privacy reasons. The findings extend the research about robustness and stability of social networks metrics, after the application of graph simplification strategies. The results have practical implication for network analysts and for those company managers who rely on network analytics (applied to company emails and social media data) to support their decision-making processes.  相似文献   

8.
Social commerce sites (SCSs), a new model of social media, provide fertile ground for customers to communicate their opinions and exchange product- or service- related information. Given the significant opportunities related to the use of social media data for customers’ insight, we explore the factors driving information sharing behavior on SCSs. In this paper, we propose and empirically test a comprehensive theoretical model for customer information sharing behavior through analysis of online survey data as well as network and behavioral usage data of over four months from 1177 customers in a SCS. The research model was empirically validated with the use of both subjective and objective data in a longitudinal setting. Our results show that customer information sharing is influenced by both individual (i.e., reputation and the enjoyment of helping others) and social capital (i.e., out-degrees’ post, in-degrees’ feedback, customer expertise and reciprocity) factors. This study contributes to the existing literature by highlighting the role of directed social network in customer information sharing behavior on SCSs. We believe that the results of our study offer important insights to the IS research and practice.  相似文献   

9.
网络信息安全问题,已经成为制约网络经济进一步发展的重要瓶颈.Web数据挖掘技术是提升网络信息安全防范绩效的关键技术.本文在构建基于Web数据挖掘的网络信息安全防范模型后,还对建立在Web数据挖掘基础上的网络信息安全防范模型运行的基本原理、Web挖掘的数据资源、Web挖掘的技术方法、防范模型的主要应用、模型运行的注意事项等进行了深入分析.  相似文献   

10.
Co-authorship networks in the digital library research community   总被引:5,自引:0,他引:5  
The field of digital libraries (DLs) coalesced in 1994: the first digital library conferences were held that year, awareness of the World Wide Web was accelerating, and the National Science Foundation awarded $24 Million (US) for the Digital Library Initiative (DLI). In this paper we examine the state of the DL domain after a decade of activity by applying social network analysis to the co-authorship network of the past ACM, IEEE, and joint ACM/IEEE digital library conferences. We base our analysis on a common binary undirectional network model to represent the co-authorship network, and from it we extract several established network measures. We also introduce a weighted directional network model to represent the co-authorship network, for which we define AuthorRank as an indicator of the impact of an individual author in the network. The results are validated against conference program committee members in the same period. The results show clear advantages of PageRank and AuthorRank over degree, closeness and betweenness centrality metrics. We also investigate the amount and nature of international participation in Joint Conference on Digital Libraries (JCDL).  相似文献   

11.
Modern information systems not only capture a seemingly endless amount of transactional data, but also tend to retain it for indefinite periods of time. We argue that privacy policies must address not only collection and access to transactional information, but also its timely disposal. One unintended side effect of data retention is the disappearance of social forgetfulness, which allows individuals a second chance, the opportunity for a fresh start in life. We examine three domains in which social policy has explicitly recognized the importance of such a principle: bankruptcy law, juvenile crime records, and credit reports. In each case, we frame the issue in terms of the social benefits of forgetfulness, rather than in terms of individual privacy protection. We examine how different policy approaches to privacy might handle the retention of data and propose a comprehensive policy that includes a variety of strategies. The broad conclusion of the article is that data retention and disposal should be addressed as a part of a broader and comprehensive policy approach, rather than in a piecemeal fashion or as an afterthought.  相似文献   

12.
13.
With the noted popularity of social networking sites, people increasingly rely on these social networks to address their information needs. Although social question and answering is potentially an important venue seeking information online, it, unfortunately, suffers from a problem of low response rate, with the majority of questions receiving no response. To understand why the response rate of social question and answering is low and hopefully to increase it in the future, this research analyzes extrinsic factors that may influence the response probability of questions posted on Sina Weibo. We propose 17 influential factors from 2 different perspectives: the content of the question, and the characteristics of the questioner. We also train a prediction model to forecast a question's likelihood of being responded based on the proposed features We test our predictive model on more than 60,000 real-world questions posted on Weibo, which generate more than 600,000 responses. Findings show that a Weibo's question answerability is primarily contingent on the questioner versus the question. Our findings indicate that using appreciation emojis can increase a question's response probability, whereas the use of hashtags negatively influences the chances of receiving answers. Our contribution is in providing insights for the design and development of future social question and answering tools, as well as for enhancing social network users’ collaboration in supporting social information seeking activities.  相似文献   

14.
Drawing on the stressor-strain-outcome framework, this study investigates how information irrelevance and overload induce social network fatigue, and the relationship of these variables to users’ information avoidance behavior. It also examines the conditions under which social network fatigue is more likely to be translated into information avoidance behavior. The analysis of data collected from 341 users of WeChat Moments suggests that information irrelevance directly leads to information avoidance behavior, and social media fatigue as a mediator partially mediates the impact of information overload on information avoidance behavior and fully mediates the impact of social overload on information avoidance behavior. Furthermore, time pressure strengthens the effect of social network fatigue on information avoidance behavior. This study fulfills the identified need for an in-depth investigation of actual discontinuous behavior in social network services (SNSs) by investigating information avoidance behavior and its antecedents. The findings provide SNSs providers with guidelines on how to manage users’ behavior so that they remain active users of the SNSs.  相似文献   

15.
Although social commerce is an important trend in practice, relatively few research studies have explored the impact of social commerce innovations launched within social networking sites. The deployment of a gift-giving service within a social networking site provides a unique opportunity to study the intersection of technological innovations and social norms and its potential to generate new revenue for ecommerce sites. Using Facebook Gifts as a real-world context for the study, we explore the factor structure of salient user beliefs influencing usage intention, and examine the relationships between beliefs and intention to use the service in a broader nomological network. Instead of adopting constructs from existing models, we started with the elicitation of salient beliefs and proceeded with successive stages of refinement to develop a suitable model. The empirical results show countervailing effects of perceived social utility and perceived convenience of the service on one hand, and low perceived value and privacy concerns on the other. A notable finding is the potential conflict arising between the expectations of effort associated with the procurement of a gift and the common perception of technology as reducing the required effort. The net result is that a technology-mediated gift service in the context of a social networking site runs counter to the social norms associated with traditional gift exchanges. This insight provides evidence of the dual challenge for social commerce initiatives. In order to be successful, new services in this area must leverage the potential of the technology as well as social practices.  相似文献   

16.
目的】研究Web3.0快速发展背景下,科技期刊同行评议改进与发展的新平台、新模式。【方法】 以Peerage of ScienceFrontier为案例,针对最新的基于社交网络平台的同行评议模式进行了分析,介绍了该同行评议模式的改进、特点、流程、工作方式等。【结果】在社交网络平台下,同行评议从静态变为动态,从"一对一"变成"一对多",从封闭式评议变成开放式评价。【结论】基于社交网络的同行评议模式是同行评议发展的最新趋势,可为我国的同行评议发展提供参考。  相似文献   

17.
Web数据库技术综述   总被引:7,自引:1,他引:6  
Web-Database is the base of many network applications such as Web information retrieval system, Web information publishing and Electronic Commerce. This article focuses on several popular Web-Database technologies such as CGI, ISAPI, IDC, ASP and Java Applet, analyzing and comparing their structure, characteristics, advantages and disadvantages. Finally, it discusses the main structure of the Web-Database technology.  相似文献   

18.
【目的/意义】社交网络舆情监管关乎社会稳定,区块链作为当前一种重要的应用技术,关于区块链社交网 络的信息传播特征和规律研究将有利于对区块链社交应用的舆情监管提供一定的理论依据。【方法/过程】基于区 块链和信息传播理论,通过爬虫采集区块链社交网络应用数据,采用社会网络分析法,利用Gephi进行数据可视化 并利用统计分析软件进行数据处理。在此基础上,对整体网络下的社群进行对比分析,重点讨论了声誉分与用户 度的关系情况。【结果/结论】区块链社交网络为无标度网络;社群间的平均聚类基本一致并且较低;用户发帖量服 从幂律分布;声誉分高的用户在区块链网络中的影响力较大,其在舆情网络信息传播过程中起着重要的作用。【创 新/局限】基于区块链社交网络应用,本文分析了区块链整体社交网络及区块链社群网络的舆情信息传播特征及规 律,后续将采用动态网络、超网络方法对区块链网络舆情信息传播特征及规律进行分析研究。  相似文献   

19.
In today’s world, knowledge is important for constructing core competitive advantages for individuals and organizations. Recently, Web 2.0 applications and social media have provided a convenient medium for people to share knowledge over the Internet. However, the huge amount of created knowledge can also leads to the problem of information overload. This research proposes a social knowledge navigation mechanism that utilizes the techniques of relevant knowledge network construction, knowledge importance analysis, and knowledge concept ontology construction to generate a visualized recommendation of a knowledge map of sub-concept and knowledge of an article reading sequence for supporting learning activities related to a free online encyclopedia. The results of experiments conducted on Wikipedia show that the proposed mechanism can effectively recommend useful articles and improve a knowledge seeker’s learning effectiveness.  相似文献   

20.
Abuse of information entrusted to organizations can result in a variety of privacy violations and trust concerns for consumers. In the event of violations, a social media brand or organization renders an apology – a form of social account – to alleviate users’ concerns and maintain user membership and engagement with the platform. To explore the link between apology offered by a social media brand or organization and the users’ trust dynamics in the brand’s services, we study how organizational integrity can contribute to reducing individuals’ privacy concerns whiles increasing or repairing their trust. Drawing on organizational behavioral integrity literature, our proposed research model suggests that the persuasiveness of an apology following a data breach affects users’ trust or spillover trust through their perceptions of the degree of alignment between the words in the apology and the actions of the violating entity. Based on a survey of Facebook users, our findings show that persuasiveness of an apology has a significant impact on users’ perceptions of the alignment between the social media brand’s (i.e. Facebook) words and subsequent actions. These perceptions impact social media brand trust (i.e. users’ trust in Facebook and allied services such as Instagram). We also find that, post data breach incidence, while integrity of the social media organization partially mediates the relationship between persuasive apology and users’ trust, it fully mediates the relationship between the persuasive apology and the privacy concerns expressed by the users. However, users’ privacy concerns do not contribute much to the repair of trust needed to maintain their membership.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号