Sustaining Social Cohesion in Information and Knowledge Society: The Priceless Value of Privacy
- 94 Downloads
Abstract
Within Information and Knowledge Society the concept of Privacy has been enriched including aspects related to digital life, while the right to online Privacy gains more and more attention daily due to several cases of privacy breaches. Privacy is associated with the control, access and use or misuse of personal information by others, including governments, companies and other users as well. Social Network Sites as a part of digital space have altered the way that people communicate and have contributed to the construction of online social networks. During online interaction, users disclose information about them or others, while at the same time they express their concerns about Privacy infringement that may come up due to self-disclosure practices, not restricting or reversing though their disclosure behavior. Thus the “Privacy paradox” phenomenon is recorded since users cannot balance between Privacy concerns and their need for disclosure. Privacy’s circumvention destabilizes the trust between social actors, increases the feelings of insecurity and puts into risk social cohesion which is a prerequisite for the sustainability of our society. Legislation as well as technology may protect us, but sometimes they are not user friendly and sufficient. Users should protect themselves and other people in order to preserve their Privacy as a fundamental human right. In this paper, based on a literature review, we present the issue of Privacy in Social Network Sites focusing on factors that affect people’s Privacy concerns and behavior while relating these to social cohesion.
Keywords
Privacy Privacy paradox Privacy protective behavior Social network sites Human rights Social cohesionReferences
- 1.U. Beck, Risk Society Towards a New Modernity (Sage, London, 1992)Google Scholar
- 2.S. Chtouris, Rational Symbolic Networks—Global States and National Hobbit (Nisos Publ, Athens, 2004). (in Greek)Google Scholar
- 3.L.F. Berkman, T. Glass, Social integration, social networks, social support and health, in Social Epidemiology, ed. by L.F. Berkman, I. Kawachi (Oxford University Press, New York, 2000), pp. 158–162Google Scholar
- 4.E. Breeze, C. Grundy, A. Fletcher, Inequalities in Quality of Life Among People Aged 75 Years and Over in Great Britain (University of Sheffield, UK, 2001), https://www.growingolder.group.shef.ac.uk/GOProgSumms.pdf. Accessed Jan 2019
- 5.K. Walker, A. Macbride, M.L.S. Vachon, Social support networks and the crisis of bereavement. Soc. Sci. Med. 11, 34–41 (1997)Google Scholar
- 6.K.Y. Lin, H.P. Lu, Why people use social networking sites: an empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152–1161 (2011)MathSciNetCrossRefGoogle Scholar
- 7.P. Pai, D.C. Arnott, User adoption of social networking sites: eliciting uses and gratifications through a means–end approach. Comput. Hum. Behav. 29(3), 1039–1053 (2013)CrossRefGoogle Scholar
- 8.S. Gritzalis, Enhancing web privacy and anonymity in the digital era. Inf. Manag. Comput. Secur. 12(3), 255–288 (2004)CrossRefGoogle Scholar
- 9.L. Mitrou, Privacy protection in information and communication technology—the legal dimension, in Privacy and Information and Communication Technologies—Technical and Legal Issues, ed. by C. Lambrinoudakis, L. Mitrou, S. Gritzalis, S. Katsikas (Papasotiriou Publ., Athens, 2010), pp. 505–551. (in Greek)Google Scholar
- 10.T. Jones, T. Newburn, Private Security and Public Policing (Clarendon, Oxford, 1998)Google Scholar
- 11.G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001)CrossRefGoogle Scholar
- 12.J. Panousis, Symbolic Constructions of Reality (Entelecheia Publ, Athens, 2004). (in Greek)Google Scholar
- 13.Α. Kitsiou, The social construction of crime in Information Society: the paradigm of free software movement. Ph.D. thesis. Department of Sociology, University of the Aegean, 2014 (in Greek)Google Scholar
- 14.J. Kallas, Information Society and the Role of Social Sciences (Nefeli Publ, Athens, 2006). (in Greek)Google Scholar
- 15.J.L. Cebrian, Τhe Network (Stachi, Αthens, 2000). (in Greek)Google Scholar
- 16.L. Mitrou, Law in Information Society (Sakkoulas Publ, Athens, 2002). (in Greek)Google Scholar
- 17.E. Simon, Introduction to the legal frame of information society, in Information Society, Studies on Information Society. From Theory to Political Practice, ed. by R. Pinter (Gondolat, Budapest, 2008)Google Scholar
- 18.K.T. Lee, M.J. Noh, D.M. Koo, Lonely people are no longer lonely on social networking sites: the mediating role of self-disclosure and social support. Cyberpsychol. Behav. Soc. Netw. 16(6), 413–418 (2013)CrossRefGoogle Scholar
- 19.E.M. Bryant, J. Marmo, A. Ramirez Jr., A functional approach to social networking sites, in Computer-Mediated Communication in Personal Relationships, ed. by K.B. Wright, L.M. Webb (Peter Lang, New York, 2011), pp. 3–20Google Scholar
- 20.J. Kim, J.R. Lee, The Facebook paths to happiness: effects of the number of Facebook friends and self-presentation on subjective wellbeing. Cyberpsychol. Behav. Soc. Netw. 14, 359–364 (2011)CrossRefGoogle Scholar
- 21.T.A. Pempek, Y.A. Yermolayeva, S.L. Yermolayeva, College students’ social networking experiences on Facebook. J. Appl. Dev. Psychol. 30, 227–238 (2009)CrossRefGoogle Scholar
- 22.J.A. Bargh, K. McKenna, The Internet and social life. Annu. Rev. Psychol. 55, 573–590 (2004)CrossRefGoogle Scholar
- 23.E. Pearson, All the worldwide web’s a stage: the performance of identity in online social networks. First Monday14(3) (2009), https://firstmonday.org/article/view/2162/2127. Accessed Dec 2018
- 24.M. Trusov, R.E. Bucklin, K. Pauwels, Effects of word-of-mouth versus traditional marketing: findings from an internet social networking site. J. Mark. 73, 90–102 (2009)CrossRefGoogle Scholar
- 25.Z. Papacharissi (ed.), A Networked Self: Identity, Community, and Culture on Social Network Sites (Routledge, New York, 2011)Google Scholar
- 26.S. Conger, J.H. Pratt, K.D. Loch, Personal information privacy and emerging technologies. Inf. Syst. J. 23(5), 401–417 (2013)CrossRefGoogle Scholar
- 27.V. Benson, G. Saridakis, H. Tennakoon, Information disclosure of social media users. Does control over personal information, user awareness and security notices matter? Inf. Technol. People28(3), 426–441 (2015)Google Scholar
- 28.M. Taddicken, The ‘privacy paradox in the social web: the impact of privacy concerns, individual characteristics and the perceived social relevance on different forms of self-disclosure. J. Comput.-Mediat. Commun. 19(2), 248–273 (2014)CrossRefGoogle Scholar
- 29.F. Stutzman, J. Vitak, N.B. Ellison, R. Gray, C. Lampe, Privacy in interaction: exploring disclosure and social capital in Facebook, in Proceedings of the Sixth International Conference on Weblogs and Social Media (AAAI org, Ireland, Dublin, 2012), pp. 330–337Google Scholar
- 30.N. Ellison, J. Vitak, C. Steinfield, R. Gray, C. Lampe, Negotiating privacy concerns and social capital needs in a social media environment, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 19–32CrossRefGoogle Scholar
- 31.M. Ziegele, O. Quiring, Privacy in social network sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 175–189CrossRefGoogle Scholar
- 32.S.A. Rains, S.R. Brunner, The outcomes of broadcasting self-disclosure using new communication technologies responses to disclosure vary across one’s social network. Commun. Res. 45(5), 659–687 (2015)CrossRefGoogle Scholar
- 33.N.N. Bazarova, Y.H. Choi, Self-disclosure in social media: extending the functional approach to self-disclosure motivations and characteristics on social network sites. J. Commun. 64, 635–657 (2014)CrossRefGoogle Scholar
- 34.T. Spiliotopoulos, I. Oakley, Understanding motivations for Facebook use: usage metrics, network structure, and privacy, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM, Paris, France, 2013), pp. 3287–3296Google Scholar
- 35.S.C. Walton, R.E. Rice, Mediated disclosure on Twitter: the roles of gender and identity in boundary impermeability, valence, disclosure, and stage. Comput. Hum. Behav. 29, 1465–1474 (2013)CrossRefGoogle Scholar
- 36.I. Buschel, R. Mehdi, A. Cammilleri, Y. Marzouki, B. Elger, Protecting human health and security in digital Europe: how to deal with the “privacy paradox”? Sci. Eng. Ethics 20, 639–658 (2014)CrossRefGoogle Scholar
- 37.S. Petronio, Boundary of Privacy: Dialectics of Disclosure (State University of New York Press, Albany, 2002)Google Scholar
- 38.M. Nguyen, Y.S. Bin, A. Campbell, Comparing online and offline self-disclosure: a systematic review. Cyberpsychol. Behav. Soc. Netw. 15(2), 103–111 (2012)CrossRefGoogle Scholar
- 39.D.M. Boyd, E. Hargittai, Facebook privacy settings: who cares? First Monday15(8) (2010), https://firstmonday.org/article/view/3086/2589. Accessed Jan 2019
- 40.A. Acquisti, R. Gross, Imagined communities: awareness, information sharing, and privacy on the Facebook, in Proceedings of the 6th Workshop on Privacy Enhancing Technologies (PET '06), ed. by G. Danezis, P. Golle (Robinson College, Cambridge, UK, 2006), pp. 36–58Google Scholar
- 41.Y.M. Baek, Solving the privacy paradox: a counter-argument experimental approach. Comput. Hum. Behav. 38, 33–42 (2014)CrossRefGoogle Scholar
- 42.T. Dienlin, S. Trepte, Putting the social (psychology) into social media is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. Eur. J. Soc. Psychol. 45, 285–297 (2015)CrossRefGoogle Scholar
- 43.Sp. Kokolakis, Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)Google Scholar
- 44.C. Cheung, Z. W. Y. Lee, T. K. H. Chan, Self-disclosure in social networking sites. Internet Res. 25(2), 279–299 (2015)Google Scholar
- 45.H. Krasnova, S. Spiekermann, K. Koroleva, T. Hildebrand, Online social networks: why we disclose. J. Inf. Technol. 25, 109–125 (2010)CrossRefGoogle Scholar
- 46.W.M. Klein, Z. Kunda, Exaggerated self-assessments and the preference for controllable risks. Organ. Behav. Hum. Decis. Process. 59, 410–427 (1994)CrossRefGoogle Scholar
- 47.L.F. Nordgren, J. Van Der Pligt, F. Van Harreveld, Unpacking perceived control in risk perception: the mediating role of anticipated regret. J. Behav. Decis. Mak. 20(5), 533–544 (2007)CrossRefGoogle Scholar
- 48.L. Brandimarte, A. Acquisti, G. Loewenstein, Misplaced confidences: privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2012)CrossRefGoogle Scholar
- 49.J.C. Bertot, P.T. Jaeger, J.M. Grimes, Using ICTs to create a culture of transparency: e-government and social media as openness and anti-corruption tools for societies. Gov. Inf. Q. 27(3), 264–271 (2010)CrossRefGoogle Scholar
- 50.J.C. Bertot, P.T. Jaeger, D. Hansen, The impact of polices on government social media use: issues, challenges, and recommendations. Gov. Inf. Q. 29(1), 30–40 (2012)CrossRefGoogle Scholar
- 51.E. Christofides, A. Muise, S. Desmarais, Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychol. Behav. 12(3), 341–345 (2012)CrossRefGoogle Scholar
- 52.S.B. Barnes, A privacy paradox: social networking in the United States. First Monday11(9) (2006), https://firstmonday.org/article/view/1394/1312_2. Accessed Jan 2019
- 53.R. Gross, A. Acquisti, Information revelation and privacy in online social networks, in Proceedings of the ACM Workshop on Privacy in the Electronic Society (ACM, Virginia, USA, 2005), pp. 71–80Google Scholar
- 54.H.J. Smith, T. Dinev, H. Xu, Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989–1015 (2011)CrossRefGoogle Scholar
- 55.Y.M. Baek, E. Kim, Y. Bae, My privacy is okay, but theirs is endangered: why comparative optimism matters in online privacy concerns. Comput. Hum. Behav. 31, 48–56 (2014)CrossRefGoogle Scholar
- 56.E. Hargittai, An update on survey measures of web-oriented digital literacy. Soc. Sci. Comput. Rev. 27(1), 130–137 (2009)CrossRefGoogle Scholar
- 57.Y.J. Park, Digital literacy and privacy behavior online. Commun. Res. 40(2), 215–236 (2011)CrossRefGoogle Scholar
- 58.B. Debatin, J.P. Lovejoy, A.K. Horn, B.N. Hughes, Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Med. Commun. 15, 83–108 (2009)CrossRefGoogle Scholar
- 59.B. Debatin, Ethics, privacy, and self-restraint in social networking, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 47–60CrossRefGoogle Scholar
- 60.S. Trepte, D. Teutsch, P.K. Masur, C. Eicher, M. Fischer, A. Hennhofer, F. Lind, Do people know about privacy and data protection strategies? Towards the “Online Privacy Literacy Scale” (OPLIS), in Reforming European Data Protection Law, ed. by S. Gutwirth, R. Leenes, P. Hert (Springer, Heidelberg, 2015), pp. 333–365CrossRefGoogle Scholar
- 61.T. Zhou, Understanding online community user participation: a social influence perspective”. Internet Res. 21(1), 67–81 (2011)CrossRefGoogle Scholar
- 62.C. Posey, P.B. Lowry, T.L. Roberts, T.S. Ellis, Proposing the online community self- disclosure model: the case of working professionals in France and the UK who use online communities. Eur. J. Inf. Syst. 19(2), 181–195 (2010)CrossRefGoogle Scholar
- 63.C. Dwyer, S. Hiltz, K. Passerini, Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace, in Proceedings of 13th Americas Conference on Information Systems, AMCIS 2007, paper 339, https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1849&context=amcis2007. Accessed Jan 2019
- 64.Z. Tufekci, Facebook, youth and privacy in networked publics, in Proceedings of the Sixth International Conference on Weblogs and Social Media (AAAI org, Dublin, Ireland, 2012), pp. 338–35Google Scholar
- 65.M. Ragnedda, Social control and surveillance in the society of consumers. Int. J. Sociol. Anthropol. 3(6), 180–188 (2011)Google Scholar
- 66.N.B. Ellison, C. Steinfield, C. Lampe, The benefits of Facebook ‘‘friends’’: social capital and college students’ use of online social network sites. J. Comput.-Mediat. Commun. 12(4), 1143–1168 (2007)CrossRefGoogle Scholar
- 67.M. Taddicken, C. Jers, The uses of privacy online: trading a loss of privacy for social web gratifications?, in Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 143–158CrossRefGoogle Scholar
- 68.S. Trepte, L. Reinecke, The reciprocal effects of social network site use and the disposition for self-disclosure: a longitudinal study. Comput. Hum. Behav. 29(3), 1102–1112 (2013)CrossRefGoogle Scholar
- 69.C.M.K. Cheung, P.-Y. Chiu, M.K.O. Lee, Online social networks: why do students use Facebook? Comput. Hum. Behav. 27(4), 1337–1343 (2011)CrossRefGoogle Scholar
- 70.S. Utz, N. Kramer, The privacy paradox on social network sites revisited: the role of individual characteristics and group norms. Cyberpsychol. J. Psychosoc. Res. Cyberspace 3(2) (2009), https://cyberpsychology.eu/article/view/4223/3265. Accessed Jan 2019
- 71.D. Boyd, J. Heer, Profiles as conversation: networked identity performance on Friendster, in Proceedings of the Hawai'i International Conference on System Sciences (HICSS-39) (IEEE, Kauai, 2006)Google Scholar
- 72.C. Steinfield, N. Ellison, C. Lampe, J. Vitak, Online social network sites and the concept of social capital, in Frontiers in New Media Research, ed. by F.L. Lee, L. Leung, J.S. Qiu, D. Chu (Routledge, New York, 2012), pp. 115–131Google Scholar
- 73.P.M. Valkenburg, J. Peter, The effect of instant messaging on the quality of adolescents’ existing friendships: a longitudinal study. J. Commun. 59, 79–97 (2009)CrossRefGoogle Scholar
- 74.Z.J. Jiang, C.S. Heng, B.C. Choi, Research note-privacy concerns and privacy-protective behavior in synchronous online social interactions. Inform. Syst. Res. 24(3), 579–595 (2013)CrossRefGoogle Scholar
- 75.H. Xu, X.R. Luo, J.M. Carroll, M.B. Rosson, The personalization privacy paradox: an exploratory study of decision-making process for location-aware marketing. Decis. Support Syst. 51(1), 42–52 (2011)CrossRefGoogle Scholar
- 76.E.E. Hollenbaugh, A.L. Ferris, Facebook self-disclosure: examining the role of traits, social cohesion, and motives. Comput. Hum. Behav. 30, 50–58 (2014)CrossRefGoogle Scholar
- 77.N.K. Malhotra, S.S. Kim, J. Agarwal, Ιnternet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inform. Syst. Res. 15(4), 336–355 (2004)CrossRefGoogle Scholar
- 78.M. Sideri, A. Kitsiou, C. Kalloniatis, S. Gritzalis, Privacy and Facebook universities students’ communities for confessions and secrets: the greek case, in e-Democracy 2015. CCIS, vol. 570, ed. by S.K. Katsikas, A.B. Sideridis (Springer, Cham, 2015), pp. 77–94Google Scholar
- 79.F. Stutzman, R. Gross, A. Acquisti, Silent listeners: the evolution of privacy and disclosure on facebook. J. Priv. Confid. 4(2), 7–41 (2013)Google Scholar
- 80.J.L. Gibbs, N.B. Ellison, C.-H. Lai, First comes love, then comes Google: an investigation of uncertainty reduction strategies and self-disclosure in online dating. Commun. Res. 38(1), 70–100 (2011)CrossRefGoogle Scholar
- 81.B.M. Okdie, Blogging and self-disclosure: the role of anonymity, self-awareness and audience size. Ph.D. dissertation. Department of Psychology in the Graduate School, University of Alabama, 2011Google Scholar
- 82.Z. Papacharissi, P.L. Gibson, Fifteen minutes of privacy: privacy, sociality, and publicity on social network sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social Web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 75–89CrossRefGoogle Scholar
- 83.P.A. Norberg, D. Horne, D. Horne, The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)CrossRefGoogle Scholar
- 84.Z. Tufekci, Can you see me now? Audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Soc. 28, 20–36 (2008)CrossRefGoogle Scholar
- 85.T. Alashoor, M. Keil, L. Liu, H.J. Smith, How values shape concerns about privacy for self and others, in Proceedings of the Thirty Sixth International Conference on Information Systems, ICIS 2015, ed. by T. Carte, A. Heinzl, C. Urquhart (AIS Electronic Library, Atlanta, 2015)Google Scholar
- 86.H. Krasnova, N.F. Veltri, O. Günther, Self-disclosure and privacy calculus on social networking sites: the role of culture: intercultural dynamics of privacy calculus. Bus. Inf. Syst. Eng. 4(3), 127–135 (2012)CrossRefGoogle Scholar
- 87.P.B. Lowry, J. Cao, A. Everard, Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. J. Manag. Inf. Syst. 27(4), 163–200 (2011)CrossRefGoogle Scholar
- 88.M. Helweg-Larsen, J.A. Shepperd, Do moderators of the optimistic bias affect personal or target risk estimates? A review of the literature. Pers. Soc. Psychol. Bull. 5(1), 75–95 (2001)Google Scholar
- 89.C.M. Hoadley, H. Xu, J.J. Lee, M.B. Rosson, Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)CrossRefGoogle Scholar
- 90.A. Acquisti, L.K. John, G. Loewenstein, What is privacy worth? J. Leg. Stud. 42(2), 249–274 (2013)CrossRefGoogle Scholar
- 91.K.-L. Hui, H.-H. Teo, S.-Y.T. Lee, The value of privacy assurance: an exploratory field experiment. MIS Q. 31(1), 19–33 (2007)CrossRefGoogle Scholar
- 92.W.M.P. Steijn, Developing a sense of privacy: an investigation into privacy appreciation among young and older individuals in the context of social network sites. Dissertation, Tilburg University, 2014, https://pure.uvt.nl/ws/portalfiles/portal/7737309/Steijn_Developing_05_09_2014_emb_tot_06_09_2015.pdf. Accessed Dec 2018
- 93.D. Boyd, What does the Facebook experiment teach us? The Message (2014), https://medium.com/message/what-does-the-facebook-experiment-teach-us-c858c08e287f. Accessed Jan 2019
- 94.S. Livingston, Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc. 10(3), 393–411 (2008)CrossRefGoogle Scholar
- 95.K. Raynes-Goldie, Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook’. First Monday15(1) (2010), https://firstmonday.org/article/view/2775/2432. Accessed Jan 2019
- 96.P.B. Brandtzæg, M. Lüders, J.H. Skjetne, Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. Int. J. Hum.-Comput. Interact. 26, 1006–1030 (2010)CrossRefGoogle Scholar
- 97.E. Van den Broeck, K. Poels, M. Walrave, Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood. Soc. Media Soc. 1–11 (2015)Google Scholar
- 98.K. Sheehan, An investigation of gender differences in on-line privacy concerns and resultant behavior. J. Interact. Mark. 13, 24–38 (1999)CrossRefGoogle Scholar
- 99.C. Jensen, C. Potts, C. Jensen, Privacy practices of Internet users: Self-reports versus observed behavior. Int. J. Hum. Comput. Stud. 63(1–2), 203–227 (2005)CrossRefGoogle Scholar
- 100.M.S. Ackerman, L.F. Cranor, J. Reagle, Privacy in e-commerce: examining user scenarios and privacy preferences, in Proceedings of the ACM Conference on Electronic Commerce (ACM, Denver, U.S.A, 1999), pp. 1–8Google Scholar
- 101.K.B. Sheehan, Toward a typology of Internet users and online privacy concerns. Inf. Soc. 18, 21–32 (2002)CrossRefGoogle Scholar
- 102.M.Z. Yao, R.E. Rice, K. Wallis, Predicting user concerns about online privacy. J. Am. Soc. Inf. Sci. Technol. 58, 710–722 (2007)CrossRefGoogle Scholar
- 103.Y. Feng, W. Xie, Teens’ concern for privacy when using social networking sites: an analysis of socialization agents and relationships with privacy-protecting behaviors. Comput. Hum. Behav. 33, 153–162 (2014)CrossRefGoogle Scholar
- 104.G. Cecere, F. Le Guel, N. Soulié, Perceived Internet privacy concerns on social networks in Europe. Technol. Forecast. Soc. Chang. 96, 277–287 (2015)CrossRefGoogle Scholar
- 105.D.H. Nguyen, E.D. Mynatt, Privacy Mirrors: Understanding and Shaping Socio-Technical Ubiquitous Computing Systems (Georgia Institute of Technology, USA, 2002)Google Scholar
- 106.E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis, Incorporating privacy requirements into the system design process: the PriS conceptual framework. Internet Res. 16(2), 140–158 (2006)CrossRefGoogle Scholar
- 107.C. Kalloniatis, E. Kavakli, S. Gritzalis, PriS methodology: incorporating privacy requirements into the system design process, in Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference—Symposium on Requirements Engineering for Information Security, ed. by J. Mylopoulos, G. Spafford (IEEE, France, Paris, 2005), pp. 1–9Google Scholar
- 108.C. Kalloniatis, E. Kavakli, S. Gritzalis, Addressing privacy requirements in system design: the PriS method. Requir. Eng. J. 13(3), 241–255 (2008)CrossRefGoogle Scholar
- 109.M. Pavlidis, H. Mouratidis, C. Kalloniatis, S. Islam, S. Gritzalis, Trustworthy selection of cloud providers based in security and privacy requirements: justifying trust assumptions, in Proceedings of 10th International Conference on Trust, Privacy and Security in Digital Business, ed. by S. Furnell, C. Lambrinoudakis (Springer, Czech, Prague, 2013), pp. 185–198Google Scholar
- 110.N.C. Kramer, N. Haferkamp, Online self-presentation: balancing privacy concerns and impression construction on social networking sites, in Privacy Online: Perspectives on Privacy and Self-disclosure in the Social web, ed. by S. Trepte, L. Reinecke (Springer, Heidelberg, 2011), pp. 127–141CrossRefGoogle Scholar
- 111.E. Litt, Understanding social network site users' privacy tool use. Comput. Hum. Behav. 29, 1649–1656 (2013)CrossRefGoogle Scholar
- 112.A.L. Young, A. Quan-Haase, Privacy protection strategies on Facebook. Information. Commun. Soc. 16(4), 479–500 (2013)CrossRefGoogle Scholar
- 113.M. Johnson, S. Egelman, S.M. Bellovin, Facebook and privacy: it’s complicated, in Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012) (ACM, Washington, 2012), pp. 1–15Google Scholar
- 114.E. Vanderhoven, T. Schellens, M. Valcke, Exploring the usefulness of school education about risks on social network sites: a survey study. J. Media Liter. Educ. 5(1), 285–294 (2013)Google Scholar
- 115.E. Vanderhoven, T. Schellens, M. Valcke, Educating teens about the risks on social network sites: an intervention study in secondary education. Communicar Sci. J. Media Educ. 43(XXII), 123–131 (2014)Google Scholar
- 116.E. Vanderhoven, T. Schellens, R. Vanderlinde, M. Valcke, Developing educational materials about risks on social network sites: a design-based research approach. Educ. Tech. Res. Dev. 64, 459–480 (2016)CrossRefGoogle Scholar
- 117.R. Del Rey, J.A. Casas, R. Ortega, The ConRed program, an evidence-based practice. Communicar Sci. J. Media Educ. 39(XX), 129–137 (2012)Google Scholar
- 118.M. Sideri, A. Kitsiou, E. Tzortzaki, C. Kalloniatis, S. Gritzalis, “I have learned that I must think twice before…”. An educational intervention for enhancing students’ privacy awareness in Facebook, in Proceedings of the 7th International Conference, E-Democracy 2017, ed. by S. Katsikas, V. Zorkadis (Springer, Cham, 2017), pp. 79–94Google Scholar
- 119.M. Foucault, Power, Knowledge Ethics (Ipsilon, Athens, 1987). (in Greek)Google Scholar
- 120.T.H. Eriksen, Tyranny of the Moment Fast and Slow Time in the Information Age (. Pluto Press, London, 2001)Google Scholar
- 121.Μ. Jakala, E. Berki, Communities, communication and online identities, in Digital Identity and Social Media, ed. by St. Warburton, St. Hatzipanagos (IGI Global, USA, 2013), pp. 1–13Google Scholar
- 122.E. Lampropoulou, Internal Security and Control Society (Kritiki Publ, Athens, 2001). (in Greek)Google Scholar
- 123.C. Norris, From personal to digital: CCTV, the panopticon and the technological mediation of suspicion and social control, in Surveillance and Social Sorting: Privacy Risk and Automated Discrimination, ed. by D. Lyon (Routledge, London, 2003), pp. 249–281Google Scholar
- 124.D. Lyon, The Electronic Eye: The Rise of Surveillance Society-Computers and Social Control in Context (Wiley, UK, 2013)Google Scholar
- 125.M. Kandias, L. Mitrou, V. Stavrou, D. Gritzalis, Which side are you on? A new panopticon versus privacy, in Proceedings of 2013 International Conference on Security and Cryptography (SECRYPT) (IEEE, Reykjavik, Iceland, 2013), pp. 1–13Google Scholar
- 126.L. Mitrou, M. Kandias, V. Stavrou, D. Gritzalis, Social media profiling: a panopticon or omniopticon tool? in Proceedings of the 6th Biannual Surveillance and Society Conference (Spain, Barcelona, 2014), pp. 1–15Google Scholar
- 127.A. Melucci, Social Theory in the Information Era (Trotta Editorial, 2002)Google Scholar
- 128.E. Daskalakis, Criminology of Social Reaction: Traditions (Sakkoulas Publ, Athens, 1985). (in Greek)Google Scholar
- 129.F.B. Viégas, Blogger’s expectations of privacy and accountability: an initial survey. J. Comput.-Mediated Commun. 10(3), 1–31 (2005)Google Scholar
- 130.G. D’Souza, J.E. Phelps, The privacy Paradox: the case of secondary disclosure. Rev. Mark. Sci. 7, 1–29 (2009)Google Scholar
- 131.D.J. Solove, A taxonomy of privacy. Law Rev. 154(3), 477–560 (2006)Google Scholar
- 132.M.B. Islam, J. Watson, R. Iannella, S. Geva, What I Want for my Social Network Privacy (NICTA, Australia, 2014)Google Scholar
- 133.A. Beldad, M. De Jong, M. Steehouder, I trust not therefore it must be risky: determinants of the perceived risks of disclosing personal data for e-government transactions. Comput. Hum. Behav. 27(6), 2233–2242 (2011)CrossRefGoogle Scholar
- 134.J. Midgley, Social Development The Developmental Perspective in Social Welfare (Sage, London, 1995)Google Scholar
- 135.J. Holmberg (ed.), Making Development Sustainable (Island Press, Washington D.C., 1992)Google Scholar
- 136.W. Streeck, Productive constraints: on the institutional conditions of diversified quality production, in Social Institutions and Economic Performance, ed. by W. Street (Sage, London, 1992), pp. 1–40Google Scholar
- 137.P. Cooke, K. Morgan, The Associational Economy (Oxford University Press, Oxford, 1998)CrossRefGoogle Scholar
- 138.N. Uphoff, Local Institutional Development: An Analytic Sourcebook with Cases (Kumarian, West Hartford, 1986)Google Scholar
- 139.L.F. Salmen, Listen to the People Participant-Observer Evaluation of Development Projects (Oxford University Press, Washington, 1987)Google Scholar
- 140.S.E. Henderson, Expectations of privacy in social media. Mississippi Coll. Law Rev. 31, 227–324 (2012)Google Scholar
- 141.J.E. Cohen, What privacy is for. Harvard Law Rev. 126(7), 1904–1933 (2013)Google Scholar