Do-It-Yourself Data Protection—Empowerment or Burden?
暂无分享,去创建一个
Carsten Ochs | Thilo von Pape | Philipp K. Masur | Tobias Matzner | T. V. Pape | P. Masur | Carsten Ochs | Tobias Matzner
[1] Ralf De Wolf,et al. Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook , 2014, Comput. Hum. Behav..
[2] Leonard Reinecke,et al. The Social Web as a Shelter for Privacy and Authentic Living , 2011, Privacy Online.
[3] Cliff Lampe,et al. Negotiating Privacy Concerns and Social Capital Needs in a Social Media Environment , 2011, Privacy Online.
[4] T. Lemke. 'The birth of bio-politics': Michel Foucault's lecture at the Collège de France on neo-liberal governmentality , 2001 .
[5] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[6] Tobias Matzner. Why privacy is not enough privacy in the context of "ubiquitous computing" and "big data" , 2014, J. Inf. Commun. Ethics Soc..
[7] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[8] Nojin Kwak,et al. Affect, cognition and reward: Predictors of privacy protection online , 2012, Comput. Hum. Behav..
[9] Philipp K. Masur,et al. Do People Know About Privacy and Data Protection Strategies? Towards the “Online Privacy Literacy Scale” (OPLIS) , 2015 .
[10] N. Henry,et al. Beyond the ‘sext’: Technology-facilitated sexual violence and harassment against adult women , 2015 .
[11] Neil Selwyn,et al. Reconsidering Political and Popular Understandings of the Digital Divide , 2004, New Media Soc..
[12] Andrew J. Rohm,et al. Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .
[14] I. Altman,et al. Social penetration: The development of interpersonal relationships , 1973 .
[15] Airi Lampinen,et al. We're in it together: interpersonal management of disclosure in social network services , 2011, CHI.
[16] Suzanne de Castell,et al. Re-Mediating Research Ethics , 2012 .
[17] David J. Gunkel. Second Thoughts: Toward a Critique of the Digital Divide , 2003, New Media Soc..
[18] Zizi Papacharissi. A Private Sphere: Democracy in a Digital Age , 2010 .
[19] Alasdair S. Roberts. The naked crowd: Reclaiming security and freedom in an anxious age , 2004 .
[20] Yong Jin Park,et al. Digital Literacy and Privacy Behavior Online , 2013, Commun. Res..
[21] S. Trepte,et al. Online-Privatheitskompetenz und deren Bedeutung für demokratische Gesellschaften , 2017 .
[22] Jessica Vitak. The Impact of Context Collapse and Privacy on Social Network Site Disclosures , 2012 .
[23] Marika Lüders,et al. Too Many Facebook “Friends”? Content Sharing and Sociability Versus the Need for Privacy in Social Network Sites , 2010, Int. J. Hum. Comput. Interact..
[24] Kate Raynes-Goldie,et al. Aliases, Creeping, and Wall Cleaning: Understanding Privacy in the Age of Facebook , 2010, First Monday.
[25] Eden Litt,et al. Understanding social network site users' privacy tool use , 2013, Comput. Hum. Behav..
[26] Monika Taddicken,et al. The Uses of Privacy Online: Trading a Loss of Privacy for Social Web Gratifications? , 2011, Privacy Online.
[27] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[28] Philipp K. Masur,et al. Disclosure Management on Social Network Sites: Individual Privacy Perceptions and User-Directed Privacy Strategies , 2016 .
[29] David Lyon,et al. Surveillance as social sorting : Computer codes and mobile bodies , 2005 .
[30] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[31] Louise Amoore,et al. Data Derivatives , 2011 .
[32] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[33] John Gilliom,et al. Overseers of the poor , 2001 .
[34] Colin J. Bennett. The governance of privacy , 2003 .
[35] E. Hughes. A cypherpunk's manifesto , 1997 .
[36] Miriam J. Metzger. Communication Privacy Management in Electronic Commerce , 2007, J. Comput. Mediat. Commun..
[37] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[38] A. Strauss,et al. The Chicago Tradition and Social Change: Thomas, Park And Their Successors , 1978 .
[39] Sabine Trepte,et al. Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors , 2015 .
[40] Priscilla M. Regan,et al. Negotiating With Gender Stereotypes on Social Networking Sites , 2013 .
[41] D. Garland,et al. `Governmentality' and the Problem of Crime: , 1997 .
[42] N. Rose. Government and control , 2000 .
[43] A. Kellerman,et al. The Constitution of Society : Outline of the Theory of Structuration , 2015 .
[44] Priscilla M. Regan,et al. Negotiating With Gender Stereotypes on Social Networking Sites , 2013 .
[45] S. Jourard,et al. Some factors in self-disclosure. , 1958, Journal of abnormal psychology.
[46] A. Strauss. A SOCIAL WORLD PERSPECTIVE* , 2012 .
[47] Paul Dourish,et al. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..