Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?

Author(s):  
Frederic Raber ◽  
Antonio Kruger
Author(s):  
Fulpagare Priya K. ◽  
Nitin N. Patil

Social Network is an emerging e-service for Content Sharing Sites (CSS). It is an emerging service which provides reliable communication. Some users over CSS affect user’s privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user’s inherent trust in their relationship network. Integration of multiple user’s privacy preferences is very difficult task, because privacy preferences may create conflict. The techniques to resolve conflicts are essentially required. Moreover, these methods need to consider how users would actually reach an agreement about a solution to the conflict in order to offer solutions acceptable by all of the concerned users. The first mechanism to resolve conflicts for multi-party privacy management in social media that is able to adapt to different situations by displaying the enterprises that users make to reach a result to the conflicts. Billions of items that are uploaded to social media are co-owned by multiple users. Only the user that uploads the item is allowed to set its privacy settings (i.e. who can access the item). This is a critical problem as users’ privacy preferences for co-owned items can conflict. Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media.


2020 ◽  
Author(s):  
Tamadur Shudayfat ◽  
Çağdaş Akyürek ◽  
Noha Al-Shdayfat ◽  
Hatem Alsaqqa

BACKGROUND Acceptance of Electronic Health Record systems is considered an essential factor for an effective implementation among the Healthcare providers. In an attempt to understand the healthcare providers’ perceptions on the Electronic Health Record systems implementation and evaluate the factors influencing healthcare providers’ acceptance of Electronic Health Records, the current research examines the effects of individual (user) context factors, and organizational context factors, using Technology Acceptance Model. OBJECTIVE The current research examines the effects of individual (user) context factors, and organizational context factors, using Technology Acceptance Model. METHODS A quantitative cross-sectional survey design was used, in which 319 healthcare providers from five public hospital participated in the present study. Data was collected using a self-administered questionnaire, which was based on the Technology Acceptance Model. RESULTS Jordanian healthcare providers demonstrated positive perceptions of the usefulness and ease of use of Electronic Health Record systems, and subsequently, they accepted the technology. The results indicated that they had a significant effect on the perceived usefulness and perceived ease of use of Electronic Health Record, which in turn was related to positive attitudes towards Electronic Health Record systems as well as the intention to use them. CONCLUSIONS User attributes, organizational competency, management support and training and education are essential variables in predicting healthcare provider’s acceptance toward Electronic Health records. These findings should be considered by healthcare organizations administration to introduce effective system to other healthcare organizations.


Author(s):  
Ou Ruan ◽  
Lixiao Zhang ◽  
Yuanyuan Zhang

AbstractLocation-based services are becoming more and more popular in mobile online social networks (mOSNs) for smart cities, but users’ privacy also has aroused widespread concern, such as locations, friend sets and other private information. At present, many protocols have been proposed, but these protocols are inefficient and ignore some security risks. In the paper, we present a new location-sharing protocol, which solves two issues by using symmetric/asymmetric encryption properly. We adopt the following methods to reduce the communication and computation costs: only setting up one location server; connecting social network server and location server directly instead of through cellular towers; avoiding broadcast encryption. We introduce dummy identities to protect users’ identity privacy, and prevent location server from inferring users’ activity tracks by updating dummy identities in time. The details of security and performance analysis with related protocols show that our protocol enjoys two advantages: (1) it’s more efficient than related protocols, which greatly reduces the computation and communication costs; (2) it satisfies all security goals; however, most previous protocols only meet some security goals.


2020 ◽  
Vol 35 (1) ◽  
Author(s):  
A. Can Kurtan ◽  
Pınar Yolum

AbstractImage sharing is a service offered by many online social networks. In order to preserve privacy of images, users need to think through and specify a privacy setting for each image that they upload. This is difficult for two main reasons: first, research shows that many times users do not know their own privacy preferences, but only become aware of them over time. Second, even when users know their privacy preferences, editing these privacy settings is cumbersome and requires too much effort, interfering with the quick sharing behavior expected on an online social network. Accordingly, this paper proposes a privacy recommendation model for images using tags and an agent that implements this, namely pelte. Each user agent makes use of the privacy settings that its user have set for previous images to predict automatically the privacy setting for an image that is uploaded to be shared. When in doubt, the agent analyzes the sharing behavior of other users in the user’s network to be able to recommend to its user about what should be considered as private. Contrary to existing approaches that assume all the images are available to a centralized model, pelte is compatible to distributed environments since each agent accesses only the privacy settings of the images that the agent owner has shared or those that have been shared with the user. Our simulations on a real-life dataset shows that pelte can accurately predict privacy settings even when a user has shared a few images with others, the images have only a few tags or the user’s friends have varying privacy preferences.


2021 ◽  
pp. 1-12
Author(s):  
Gokay Saldamli ◽  
Richard Chow ◽  
Hongxia Jin

Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called ILSSPP. The system protects location information from the service provider and yet enables fine grained location-sharing. One main feature of the system is to protect an individual’s social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. ILSSPP protects locations sharing preferences through protocol unification and masking. ILSSPP has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.


2017 ◽  
Vol 23 (6) ◽  
pp. 1196-1215 ◽  
Author(s):  
Maria Isabel Rodriguez Ferradas ◽  
José A. Alfaro Tanco ◽  
Francesco Sandulli

Purpose The purpose of this paper is to explore the relevant factors that influence the implementation of innovation contests, an open innovation (OI) practice that has been extensively reported in the literature as a managerial tool for external knowledge search. The authors focus the study on the context of small and medium enterprises (SMEs). Design/methodology/approach The approach is a retrospective case study. This methodology allows an in-depth view into a Spanish SME that successfully undertook two new product development processes thanks to the deployment of innovation contests. Findings The main context factors influencing innovation contests as managerial tool are ambidexterity, technological and marketing turbulence and intermediaries, among others. Regarding design factors, this work highlights the role of attraction and facilitation. Additionally, the repetitive implementation of innovation contests creates a corporate culture that promotes OI activities. Practical implications Managers will understand that they can use innovation contests as a managerial tool, and knowing the factors that need to be taken into account when implementing an innovation contest will help SMEs managers to make better use of this practice. Originality/value This case study enriches the literature of both innovation contests and topics relevant to SMEs. Based on a theoretical framework of the design factors that influence the implementation of innovation contests, the authors propose a research framework that incorporates those context factors in association with an SME.


Sign in / Sign up

Export Citation Format

Share Document