{"title":"Sealing One's Online Wall Off From Outsiders","authors":"A. Beldad","doi":"10.4018/978-1-5225-7113-1.ch066","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch066","url":null,"abstract":"Pieces of personal information (e.g. contact details, photos, thoughts and opinions on issues and things) on online social network sites are susceptible to third-party surveillance. While users are provided with the possibility to prevent unwarranted access using available privacy settings, such settings may not often be adequately used. This research investigated the factors influencing the use of Facebook's privacy settings among young Dutch users based on the premises of Protection Motivation Theory and Technology Acceptance Model. A paper-based survey was implemented with 295 students in a vocational school in the eastern part of the Netherlands. Results of hierarchical regression analysis indicate that privacy valuation, self-efficacy, and respondents' age positively influenced the use of Facebook's privacy settings. Furthermore, the size of Facebook users' network negatively influences the use of those settings. Important results and points for future research are discussed in the paper.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Should We Publish That?","authors":"L. Falkenberg, Oleksiy Osiyevskyy","doi":"10.4018/978-1-5225-7113-1.ch082","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch082","url":null,"abstract":"As the responsibilities of modern business expand to multiple stakeholders, there is an increased need to understand how to manage conflicting normative expectations of different stakeholders. Corporate responsibilities to stakeholders are based on the need to minimize or correct harm from operations (respect negative injunctions) while contributing to the social welfare of communities the firm operates in (engage in positive duties). By comparing multiple decision scenarios in the traditional and online publishing industry, the chapter explores the tensions that arise between these imperatives. Based on these tensions, the chapter outlines a framework and a practical industry-independent heuristic decision making process, embracing normative expectations, the consequences to a company and to stakeholders, and potential mitigating actions. The proposed heuristic approach allows balancing the tensions among stakeholder expectations to ensure selection of the appropriate alternative. The discussion is finished by pointing out the usefulness and applicability of the proposed heuristics in other industries and settings of the contemporary business environment.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Right to Privacy Is Dying","authors":"Sam B. Edwards III","doi":"10.4018/978-1-5225-7113-1.ch007","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch007","url":null,"abstract":"This chapter explores privacy in American jurisprudence from its inception until the present day. This examination starts with the first challenge of defining privacy. The second section examines the body of research on the importance of privacy. The third section focuses on privacy in American jurisprudence from its inception to its current state. This examination will include analysis of specific cases where technology has advanced and privacy has retreated. The purpose of this examination is to elucidate how current privacy doctrine no longer represents either the original intent nor the wishes of the citizens. The final section examines different paths the U.S. can take at this important point in privacy jurisprudence.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116534880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Technology and Process Analysis for Contemporary Identity Management Frameworks","authors":"Alex Ng, P. Watters, Shiping Chen","doi":"10.4018/978-1-5225-7113-1.CH048","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH048","url":null,"abstract":"The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131147309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Information Security Model for Implementing the New ISO 27001","authors":"Margareth Stoll","doi":"10.4018/978-1-5225-7113-1.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH013","url":null,"abstract":"The importance of data privacy, information availability, and integrity is increasingly recognized. Sharpened legal requirements and increasing data leakages have further promoted data privacy. In order to implement the different requirements in an effective, efficient, and sustainable way, the authors integrate different governance frameworks to their holistic information security and data privacy model. More than 1.5 million organizations worldwide are implementing a standard-based management system. In order to promote the integration of different standards, the International Standard Organization (ISO) released a common structure. ISO/IEC 27001 for information security management was changed accordingly in October 2013. The holistic model fulfills all requirements of the new version. Its implementation in several organizations and the study's results are described. In that way data privacy and security are part of all strategic, tactical, and operational business processes, promote corporate governance and living security, as well as the fulfillment of all standard requirements.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collective Event Detection by a Distributed Low-Cost Smart Camera Network","authors":"Jhih-Yuan Hwang, Wei-Po Lee","doi":"10.4018/978-1-4666-8654-0.CH004","DOIUrl":"https://doi.org/10.4018/978-1-4666-8654-0.CH004","url":null,"abstract":"The current surveillance systems must identify the continuous human behaviors to detect various events from video streams. To enhance the performance of event recognition, in this chapter, we propose a distributed low-cost smart cameras system, together with a machine learning technique to detect abnormal events through analyzing the sequential behaviors of a group of people. Our system mainly includes a simple but efficient strategy to organize the behavior sequence, a new indirect encoding scheme to represent a group of people with relatively few features, and a multi-camera collaboration strategy to perform collective decision making for event recognition. Experiments have been conducted and the results confirm the reliability and stability of the proposed system in event recognition.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Privacy Awareness in Future Internet Technologies","authors":"Hosnieh Rafiee, C. Meinel","doi":"10.4018/978-1-5225-7113-1.CH107","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.CH107","url":null,"abstract":"With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users' lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115796178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative View of Censored and Uncensored Political Discussion","authors":"Qihao Ji","doi":"10.4018/978-1-5225-7113-1.ch070","DOIUrl":"https://doi.org/10.4018/978-1-5225-7113-1.ch070","url":null,"abstract":"Through a content analysis on Chinese online dissidents' social media discourses, this study examines the impact of Internet censorship on Chinese dissidents' political discourse in two social media platforms: Weibo and Twitter. Data was collected during a time period when China's Internet censorship was tightened. Results revealed that Chinese online dissidents are more likely to post critical opinions and direct criticism towards the Chinese government on Twitter. In addition, dissidents on Twitter are more likely to engage in discussing with others, while Weibo dissidents tend to adopt linguistic skills more often to bypass censorship. No difference was found in terms of dissidents' civility and rationality across the two platforms. Implications and future research are discussed in detail.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133973792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Liampotis, E. Papadopoulou, N. Kalatzis, I. Roussaki, Pavlos Kosmides, E. Sykas, D. Bental, N. Taylor
{"title":"Tailoring Privacy-Aware Trustworthy Cooperating Smart Spaces for University Environments","authors":"N. Liampotis, E. Papadopoulou, N. Kalatzis, I. Roussaki, Pavlos Kosmides, E. Sykas, D. Bental, N. Taylor","doi":"10.4018/978-1-4666-8732-5.CH016","DOIUrl":"https://doi.org/10.4018/978-1-4666-8732-5.CH016","url":null,"abstract":"The more information users disclose to pervasive systems or social media, the better quality and enhanced experience they enjoy for a wider variety of personalised services. However, the privacy concerns of individuals that use such systems have dramatically risen the last years, especially after several events of massive security breaches in various computing or communication systems that have reached the news. This chapter presents the approach being employed by the SOCIETIES project to protect the privacy of sensitive user data and ensure the trustworthiness of delivered services via social and pervasive computing systems. This framework has already been designed, implemented and evaluated via real user trials engaging wide and heterogeneous user populations. In addition to the respective requirements, architecture and features discussed herewith, this chapter elaborates on the user trial that has been conducted in university settings to validate this system focusing on the privacy and trust evaluation results obtained.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130916068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object-Based Surveillance Video Synopsis Using Genetic Algorithm","authors":"Shefali Gandhi, T. Ratanpara","doi":"10.4018/978-1-5225-1022-2.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-1022-2.CH009","url":null,"abstract":"Video synopsis provides representation of the long surveillance video, while preserving the essential activities of the original video. The activity in the original video is covered into a shorter period by simultaneously displaying multiple activities, which originally occurred at different time segments. As activities are to be displayed in different time segments than original video, the process begins with extracting moving objects. Temporal median algorithm is used to model background and foreground objects are detected using background subtraction method. Each moving object is represented as a space-time activity tube in the video. The concept of genetic algorithm is used for optimized temporal shifting of activity tubes. The temporal arrangement of tubes which results in minimum collision and maintains chronological order of events is considered as the best solution. The time-lapse background video is generated next, which is used as background for the synopsis video. Finally, the activity tubes are stitched on the time-lapse background video using Poisson image editing.","PeriodicalId":171391,"journal":{"name":"Censorship, Surveillance, and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125836340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}