scholarly journals Do You Know Who Is Talking to Your Wearable Smartband?

Author(s):  
Andrei Kazlouski ◽  
Thomas Marchioro ◽  
Harry Manifavas ◽  
Evangelos Markatos

We study seven fitness trackers and their associated smartphone apps from a wide variety of manufacturers, and record who they are talking to. Our results suggest that some of them communicate with unexpected third parties, including social networks, advertisement websites, weather services, and various external APIs. This implies that such unanticipated third-parties may glean personal information of users.

2010 ◽  
Vol 25 (2) ◽  
pp. 109-125 ◽  
Author(s):  
Hanna Krasnova ◽  
Sarah Spiekermann ◽  
Ksenia Koroleva ◽  
Thomas Hildebrand

On online social networks such as Facebook, massive self-disclosure by users has attracted the attention of Industry players and policymakers worldwide. Despite the Impressive scope of this phenomenon, very little Is understood about what motivates users to disclose personal Information. Integrating focus group results Into a theoretical privacy calculus framework, we develop and empirically test a Structural Equation Model of self-disclosure with 259 subjects. We find that users are primarily motivated to disclose Information because of the convenience of maintaining and developing relationships and platform enjoyment. Countervailing these benefits, privacy risks represent a critical barrier to information disclosure. However, users’ perception of risk can be mitigated by their trust in the network provider and availability of control options. Based on these findings, we offer recommendations for network providers.


Temida ◽  
2013 ◽  
Vol 16 (1) ◽  
pp. 151-162
Author(s):  
Vida Vilic

Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.


2020 ◽  
Vol 5 (1) ◽  
pp. 184-194
Author(s):  
Hui Lin ◽  
Shijuan Li

AbstractWith the development of Internet technology, online health forums have become indispensable for people who seek non-professional health support. This research focuses on the content posted by cancer patients and their relatives in online health forums and social networks to raise the following research questions: What is the overall view of the social support network in the online tumor community? What are the information behaviors of the online tumor community in different identities of users? How users interact in this community and build this network of social support? What are the topics users would like to share and talk about? What kinds of users could be the key users in this community? Method: Using the post and comment data of the Oncology Forum of Tianya Hospital in 2019, combined with social network analysis and word co-occurrence network analysis, the following conclusions are obtained: (1) There are some central points in the overall social support network, and there are central users consistent with other social networks. (2) Positive users are more likely to comment on others, and it is easier to get others’ comments, while negative users are more likely to share personal information and do not want to participate more in social interaction. (3) Users focus on posting emotional and emotional content in content sharing. Information-based social support information. The social support experience that this type of information brings to users can be positive and negative. (4) The most active group in the patients’ online health community, followed by the patients’ children. (5) The relationship between users and patients is diverse and there are two types of singularity. Users with diverse relationships are more likely to be commented on, and they are more willing to comment on users who also have diverse relationships.


Author(s):  
Georgios Michaelides ◽  
Gábor Hosszú

The importance of the virtual communities’ privacy and security problems comes into prominence by the rapid development of online social networks. This article presents the multiple threats currently plaguing the virtual world, Internet privacy risks, and recommendations and countermeasures to avoid such problems. New generations of users feel comfortable publishing their personal information and narrating their lives. They are often unaware how vulnerable the data in their public profiles are, which a large audience daily accesses. A so-called digital friendship is built among them. Such commercial and social pressures have led to a number of privacy and security risks for social network members. The article presents the most important vulnerabilities and suggests protection methods and solutions that can be utilized according to the threat. Lastly, the authors introduce the concept of a privacy-friendly virtual community site, named CWIW, where privacy methods have been implemented for better user protection.


2018 ◽  
Vol 10 (4) ◽  
pp. 16
Author(s):  
George Bouchagiar

After having shifted from Web 1.0 to Web 2.0, scientists welcome the advent of Web 3.0, an environment where meaning is added to data. While in the Semantic Web people are no longer users, but part of the emerging applications, producers, subjects and beneficiaries of the Big Data, however, opaque processing of personal data poses tremendous risks and dangers for individuals. Given the new era of Big Data this paper studies firms’ purposes and practices to detect some emerging privacy risks. Moreover, theories that deal with social networks are examined to conclude that, even if people state that they value their privacy, however, they often disclose a huge volume of personal information. Taking into account that today’s European concept of privacy is conceptualized in negative terms this paper also proposes the implementation of trust and loyalty into the privacy concept through flexible fiduciary laws. Furthermore, data portability is discussed to detect its potential as a strategic feature, a key tool that will enhance trust. Finally, further scenarios and proposals are submitted, in our attempt to answer the question whether the European concept of privacy could be re-shaped for the benefit of individuals.


Sign in / Sign up

Export Citation Format

Share Document