2004
DOI: 10.2139/ssrn.629283
|View full text |Cite
|
Sign up to set email alerts
|

A Social Networks Theory of Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
27
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(30 citation statements)
references
References 179 publications
(164 reference statements)
3
27
0
Order By: Relevance
“…On the contrary, legal measures play a minor role and are a last resort to retroactively punish privacy violations. These observations corresponds to those of Strahilevitz, stating that law does little to shape people's actual expectations of privacy [43].…”
Section: F Enforcementsupporting
confidence: 83%
“…On the contrary, legal measures play a minor role and are a last resort to retroactively punish privacy violations. These observations corresponds to those of Strahilevitz, stating that law does little to shape people's actual expectations of privacy [43].…”
Section: F Enforcementsupporting
confidence: 83%
“…She described that there is a high potential of incivility, emotional blackmail, exploitation, prosecution and social control by government while using life-log tools. Strahilevitz [41] stated that the most private information consists of sensitive personal matters such as sexual encounters and bodily functions, sensitive medical information and knowledge of owners fundamental weaknesses. A life-log tool can sense and record this information, therefore, from a privacy perspective, a life-log dataset is a very sensitive object.…”
Section: Security and Privacymentioning
confidence: 99%
“…However, this work has some bearing on HCI and researchers may find some analyses inspiring, including articles on data protection [249], the relation between legislation and technology Survey 7 [195], identity [171], data mining [311], and employee privacy [188]. As one specific example, Strahilevitz outlines a methodology for helping courts decide on whether an individual has a reasonable expectation of privacy based on the social networking literature [272]. As another example, Murphy discusses whether or not the default privacy rule should allow disclosure or protection of personal information [212].…”
Section: Sources Used and Limitations Of This Surveymentioning
confidence: 99%