Research and practice have mostly focused on the “bright side” of social media, aiming to understand and help in leveraging the manifold opportunities afforded by this technology. However, it is ...increasingly observable that social media present enormous risks for individuals, communities, firms, and even for society as a whole. Examples for this “dark side” of social media include cyberbullying, addictive use, trolling, online witch hunts, fake news, and privacy abuse. In this article, we aim to illustrate the multidimensionality of the dark side of social media and describe the related various undesirable outcomes. To do this, we adapt the established social media honeycomb framework to explain the dark side implications of each of the seven functional building blocks: conversations, sharing, presence, relationships, reputation, groups, and identity. On the basis of these reflections, we present a number of avenues for future research, so as to facilitate a better understanding and use of social media.
•The "bright side" of social media and its uptake by society has received much research attention.•The corresponding "dark side" of social media has received much less research attention.•To study the deleterious impacts of social media, we introduce the dark side honeycomb framework.•The framework describes the functional multidimensionality of the dark side of social media.•We use this framework as a basis for a call-to-action for research on the dark side of social media.
With the proliferation and ubiquity of information and communication technologies (ICTs), it is becoming imperative for individuals to constantly engage with these technologies in order to get work ...accomplished.Academic literature, popular press, and anecdotal evidence suggest that ICTs are responsible for increased stress levels in individuals (known as technostress). However, despite the influence of stress on health costs and productivity, it is not very clear which characteristics of ICTs create stress. We draw from IS and stress research to build and test a model of technostress. The person-environment fit model is used as a theoretical lens. The research model proposes that certain technology characteristics — like usability (usefulness, complexity, and reliability), intrusiveness (presenteeism, anonymity), and dynamism (pace of change) — are related to Stressors (work overload, role ambiguity, invasion of privacy, work-home conflict, and job insecurity). Field data from 661 working professionals was obtained and analyzed. The results clearly suggest the prevalence oftechnostress and the hypotheses from the model are generally supported. Work overload and role ambiguity are found to be the two most dominant Stressors, whereas intrusive technology characteristics are found to be the dominant predictors of Stressors. The results open up new avenues for research by highlighting the incidence oftechnostress in organizations and possible interventions to alleviate it.
The use of contact‐tracing apps to curb the spreading of the COVID‐19 pandemic has stimulated social media debates on consumers' privacy concerns about the use and storage of sensitive data and on ...conspiracy theories positing that these apps are part of plans against individuals' freedom. By analyzing the type of language of tweets, we found which words, linguistic style, and emotions conveyed by tweets are more likely to be associated with consumers' privacy concerns and conspiracy theories and how they affect virality. To do so, we analyze a set of 5615 tweets related to the Italian tracing app “Immuni”. Results suggest that consumers' privacy concerns and conspiracy theories belong to different domains and exert different effects on the virality of tweets. Furthermore, the characteristics of the text (namely, complexity, certainty and emotions) cue different Twitter users' behaviors. This study helps researchers and managers to infer the psychological mechanisms that lead people to spread tweets about privacy concerns and conspiracy theories as well as how these texts impact the user who receives it.
This article builds on the argument that feminist technoscience will advance information practice scholarship beyond its current limitations. These limitations reflect neoliberalism in the field of ...information science and include a reliance on extractive logics in theories and models, monological individualism, binaries constructed between people and technologies, and techno‐solutionism. Here, we address the question: what does it look like to apply technofeminism to the study of information practice at methodological and methods levels? We first outline our metatheoretical conception of feminist technoscience, which embraces intersectionality and assemblage theory in order to move past white and colonialist logics embedded in cyborg theory. We next offer design justice as a methodological framework and movement that provides a necessary overhaul of the neoliberal ways that information science approaches scholarship, particularly in terms of participatory research. We suggest that speculative futurities provide a promising method for advancing technofeminism in information practice research because they explicitly reject neoliberalism and its techno‐solutionist bent. Overall, a feminist technoscience of information practice offers directions for our field that are rooted in liberatory epistemologies. We emphasize that in order to achieve liberation, a major overhaul in how our discipline approaches arrangements of information, people, and technologies is sorely needed.
Previous studies on excessive use of social networking services (SNSs) have relied on behavioral addiction theory to explain how users react when they face stress from overusing SNSs. Scholars have ...typically thought that users would stop using an SNS when they became addicted to the SNS and experienced stress from it. However, there seems to be a research gap between the initial adoption and the final intrusion stage of SNS usage. To fill that gap, our study uses a stimulus–organism–response paradigm to examine users' balancing mechanism for social network overuse. Based on a survey of users of social networking services in China, we found that (1) social interaction overload, invasion of work, and invasion of privacy had significant positive impact on technostress; (2) perceived usefulness of SNSs, perceived enjoyment of SNSs, and technostress had significant positive impact on rational usage; (3) social interaction overload had a negative impact on perceived performance, and invasion of privacy had a negative impact on performance and happiness. This paper contributes to the social networking overuse literature by highlighting the mechanism by which technostress elicits the rational use of SNSs.
•Filling the gap between first adoption and final termination stage of social networking addiction.•Examing the underlying mechanism for rational use after excessive use of SNSs.•Pointing out technostress is an impetus for rational usage.
It is well known that the Korenblum maximum principle holds in Bergman spaces
A
p
if and only if
p
≥
1
. In this note, we improve this result by proving that the Korenblum maximum principle holds in ...mixed norm spaces
H
p
,
q
,
α
when
1
≤
p
≤
q
<
∞
and does not hold when
0
<
q
<
1
. As an immediate consequence, we obtain that the Korenblum maximum principle holds in weighted Bergman spaces
A
γ
p
if and only if
p
≥
1
.
Abstract
Character recognition is one of the steps in the number plate recognition system. Character recognition is done to get text character data. The method used is YOLOv3 (You Only Look Once), ...and Darknet-53 is used as a feature extractor. In this study, the data used were number plate images derived from the extraction and cropping of motorized vehicle videos that had been taken using cellphones and cameras. Testing is done with two different models, namely the model obtained with additional preprocessing data and the model obtained without any preprocessing data. Data preprocessing is done to improve the quality of the number plate image. Testing is done on an uninterrupted number plate image dataset and a number plate image dataset with interference and a reduction of color intensity (brightness) in the image. For the model obtained from the data without preprocessing, the highest number plate recognition accuracy obtained is 80%, and the character recognition accuracy is 97.1%. Meanwhile, for the model obtained from preprocessing data, the highest number plate recognition accuracy obtained was 88%, and the character recognition accuracy was 98.2%.
Since more than 96 percent of mobile malware targets the Android platform, various techniques based on static code analysis or dynamic behavior analysis have been proposed to detect malicious apps. ...As malware is becoming more complicated and stealthy, recent research proposed a promising detection approach that looks for the inconsistency between an app's permissions and its description. In this paper, we first revisit this approach and reveal that using description and permission will lead to many false positives because descriptions often fail to declare all sensitive operations. Then, we propose exploiting an app's privacy policy and its bytecode to enhance the malware detection based on description and permissions. It is non-trivial to automatically analyze privacy policy and perform the cross-verification among these four kinds of software artifacts including, privacy policy, bytecode, description, and permissions. To address these challenging issues, we first propose a novel data flow model for analyzing privacy policy, and then develop a new system, named TAPVerifier, for carrying out investigation of individual software artifacts and conducting the cross-verification. The experimental results show that TAPVerifier can analyze privacy policy with a high accuracy and recall rate. More importantly, integrating privacy policy and bytecode level information can remove up to 59.4 percent false alerts of the state-of-the-art systems, such as AutoCog, CHABADA, etc.
The “privacy paradox” is the term used to describe the disconnect between self-reported privacy value attributions and actions actually taken to protect and preserve personal privacy. This phenomenon ...has been investigated in a number of domains and we extend the body of research with an investigation in the IoT domain. We presented participants with evidence of a specific IoT device’s (smart plug) privacy violations and then measured changes in privacy concerns and trust, as well as uptake of a range of behavioural responses. Our Saudi Arabian participants, despite expressing high levels of privacy concerns, generally chose not to respond to this evidence with preventative action. Most preferred to retain the functionality the smart device offered, effectively choosing to tolerate likely privacy violations. Moreover, while the improved awareness increased privacy concerns and reduced trust in the device straight after the experiment, these had regressed to pre-awareness levels a month later. Our study confirms the existence of the privacy paradox in the Saudi Arabian IoT domain, and also reveals the limited influence awareness raising exerts on long-term privacy concern and trust levels.
Display omitted
•A model of privacy while shopping for embarrassing products is proposed.•Perceptions of being watched lead a shopper to feel less in control of his/her privacy.•Control of privacy ...leads to temporary and permanent abandonment and less purchase intentions.•A shopping basket can lessen the negative effects of a visual privacy invasion.
This research fills a gap in the retailing literature regarding the impact of shoppers’ perceptions of being watched while shopping for embarrassing products. Four studies consistently show that an employee watching a shopper can cause the shopper to either permanently or temporarily leave the shopping area as purchase intentions decrease. Reactance theory explains this relationship, which is mediated by consumers’ feelings of control over their own privacy. Essentially, when shoppers believe an employee is watching them, they feel less in control of their privacy, resulting in negative consequences for the retailer. This relationship is especially important for products that consumers may already feel some level of embarrassment over purchasing in the first place. The results have important theoretical implications for reactance theory by demonstrating that a consumer can regain control even when the original threat to behavior still exists. Additionally, increasing options that allow a consumer to regain control will reduce the overall reactance to the threat to privacy and will improve retailer outcomes. Practitioner recommendations present several techniques that allow the consumer to regain privacy control in spite of the sometimes necessary practice of watching in-store consumers.