2017
DOI: 10.1016/j.chb.2017.01.016
|View full text |Cite
|
Sign up to set email alerts
|

“We were not prepared to tell people yet”: Confidentiality breaches and boundary turbulence on Facebook

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…No significant relationship was found with interpersonal privacy management. Building further on DeGroot and Vik (2017), I presented the respondents with many different types of privacy turbulences. In addition to whether or not the respondents encountered one of these turbulent events, future research might also focus on the severity and recency of the event declared by the respondent to further examine the relationship between turbulence and privacy management.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…No significant relationship was found with interpersonal privacy management. Building further on DeGroot and Vik (2017), I presented the respondents with many different types of privacy turbulences. In addition to whether or not the respondents encountered one of these turbulent events, future research might also focus on the severity and recency of the event declared by the respondent to further examine the relationship between turbulence and privacy management.…”
Section: Discussionmentioning
confidence: 99%
“…DeGroot and Vik (2017) conducted a qualitative study and categorized different types of privacy turbulence (e.g. pre-emptive disclosure violations and discrepancy breaches).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The public response was considerable, with many concerns raised about data privacy and what companies know about individuals and the types of information they share online. This type of large-scale privacy violation has an impact on the trust people have in the security of their digital data, and some people reportedly deleted their social media accounts after this occurred [28]. Of note, a large proportion (74%) of patients surveyed in this study had expressed concern that companies might share information with third parties without consent, a full 6-months before the Cambridge Analytica activities were reported in the media.…”
Section: Discussionmentioning
confidence: 99%
“…As a result, more often than not, users decide to give the permissions they are asked for [9] and, in doing so, they are transformed into willing cogs in the geosurveillance machine [10]. The incentives to opt-out, to boycott, to remove ourselves from this mechanism are very few and the frequent examples of data-leaks and shadowy practices of giants such as Uber and Facebook [11,12] strengthen the myth that in the world of big data everything is already in a database somewhere. At the same time as users produce (or rather just provide) data, they also consume part of the stream of geospatial information to fuel and inform their quotidian activities through location-based services (LBS)-which provide "geographically-oriented data and information services to users across mobile telecommunication networks" [13].…”
Section: Introduction and Literature Reviewmentioning
confidence: 99%