Internetworking with TCP/IP (2nd ed.), vol. I
Internetworking with TCP/IP (2nd ed.), vol. I
HTTP Cookies: Standards, privacy, and politics
ACM Transactions on Internet Technology (TOIT)
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Looking at, looking up or keeping up with people?: motives and use of facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On the leakage of personally identifiable information via online social networks
ACM SIGCOMM Computer Communication Review
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Privacy in Context: Technology, Policy, and the Integrity of Social Life
Privacy leakage in mobile online social networks
WOSN'10 Proceedings of the 3rd conference on Online social networks
Online social networks: Why do students use facebook?
Computers in Human Behavior
Contextual gaps: privacy issues on Facebook
Ethics and Information Technology
Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity
ACM SIGCAS Computers and Society
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
The findings of our experiments showed that social network sites (SNSs) such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users' movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google's Plus One button, Facebook's Like button, and Twitter's Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum's decision heuristic derived from her contextual integrity framework in order to answer the question of whether or not an online user's privacy is being violated by this practice.