R Chen - Decision Support Systems, 2013 - Elsevier
In this research the authors examine members' voluntary use of social networking sites. Site use leads to the growth of social relationships, increased volume of site visits and traffic, and …
The ways in which privacy is defined, perceived, and enacted are contingent on cultural, social, political, economic, and technological structures. Privacy research, however, is often …
R Chen, SK Sharma - … of the Association for Information Systems, 2013 - aisel.aisnet.org
In this research, the authors examine members' decisions to continue using social networking sites. Site use leads to the growth of social relationships, increased volume of …
S Chen, MA Williams - Conferences in Research and Practice in …, 2010 - opus.lib.uts.edu.au
Social recommendations have been rapidly adopted as important components in social network sites. How-ever, they assume a cooperative relationship between parties involved …
S Tomy, E Pardede - International Journal of Web Information …, 2016 - emerald.com
Purpose The purpose of this paper is to analyse the problem of privacy disclosure of third party applications in online social networks (OSNs) through Facebook, investigate the …
In recent years, mobile social networks have largely been developed and gained considerable popularity. An approach to protecting privacy on mobile social networks is the …
S Bensch - International Journal of Computational Science …, 2015 - inderscienceonline.com
Cyber-enabled distributed cloud services support ubiquitous value added services. In many industries, value added services are increasingly provided by value networks. Such value …
S Bensch - 2011 Fourth International Conference on Ubi …, 2011 - ieeexplore.ieee.org
In many industries, value added services are increasingly provided by value networks. Such value networks are enabled by information technologies, allowing for a flexible transmission …
Approaches to addressing privacy issues tend to assume privacy is well understood and typically approach the problem from a security perspective. However, security is more …