首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 375 毫秒
1.
Respondents concerns about privacy can decrease reporting of HIV and STD risk behaviors in general population telephone surveys. The purpose of this paper is to describe the results of an experimental study evaluating whether one method for increasing privacy, touch-tone data entry (TTDE), is effective in increasing estimates of sexual behaviors from a population-based survey. We conducted a random-digit-dial telephone survey of adults in New Jersey (n = 405), with half the respondents using TTDE for answering sexual behavior questions. TTDE led to increased reports of same-sex sexual behavior, certain HIV and STD risk factors, and concern about one s risk for HIV and STD transmission. TTDE also narrowed the difference between men s and women s reports of the number of different sexual partners over the past 10 years. The feasibility and limitations of TTDE are discussed, as well as possible alternative interpretations that consider the impact of TTDE on the dynamics of the interaction between the respondent and the interviewer.  相似文献   

2.
This article compares 2 different methods for estimating the number of undocumented Mexican adults in Los Angeles County. The 1st method, the survey-based method, uses a combination of 1980 census data and the results of a survey conducted in Los Angeles County in 1980 and 1981. A sample was selected from babies born in Los Angeles County who had a mother or father of Mexican origin. The survey included questions about the legal status of the baby's parents and certain other relatives. The resulting estimates of undocumented Mexican immigrants are for males aged 18-44 and females aged 18-39. The 2nd method, the residual method, involves comparison of census figures for aliens counted with estimates of legally-resident aliens developed principally with data from the Immigration and Naturalization Service (INS). For this study, estimates by age, sex, and period of entry were produced for persons born in Mexico and living in Los Angeles County. The results of this research indicate that it is possible to measure undocumented immigration with different techniques, yet obtain results that are similar. Both techniques presented here are limited in that they represent estimates of undocumented aliens based on the 1980 census. The number of additional undocumented aliens not counted remains a subject of conjecture. The fact that the proportions undocumented shown in the survey (228,700) are quite similar to the residual estimates (317,800) suggests that the number of undocumented aliens not counted in the census may not be an extremely large fraction of the undocumented population. The survey-based estimates have some significant advantages over the residual estimates. The survey provides tabulations of the undocumented population by characteristics other than the limited demographic information provided by the residual technique. On the other hand, the survey-based estimates require that a survey be conducted and, if national or regional estimates are called for, they may require a number of surveys. The residual technique, however, also requires a data source other than the census. However, the INS discontinued the annual registration of aliens after 1981. Thus, estimates of undocumented aliens based on the residual technique will probably not be possible for subnational areas using the 1990 census unless the registration program is reinstituted. Perhaps the best information on the undocumented population in the 1990 census will come from an improved version of the survey-based technique described here applied in selected local areas.  相似文献   

3.
Respondents’ concerns about privacy can decrease reporting of HIV and STD risk behaviors in general population telephone surveys. The purpose of this paper is to describe the results of an experimental study evaluating whether one method for increasing privacy, touch‐tone data entry (TTDE), is effective in increasing estimates of sexual behaviors from a population‐based survey. We conducted a random‐digit‐dial telephone survey of adults in New Jersey (n = 405), with half the respondents using TTDE for answering sexual behavior questions. TTDE led to increased reports of same‐sex sexual behavior, certain HIV and STD risk factors, and concern about one's risk for HIV and STD transmission. TTDE also narrowed the difference between men's and women's reports of the number of different sexual partners over the past 10 years. The feasibility and limitations of TTDE are discussed, along with possible alternative interpretations that consider the impact of TTDE on the dynamics of the interaction between the respondent and the interviewer.  相似文献   

4.
This article deals with three topics: lying, privacy and anthropological research. Their complex intertwinement is analysed using fieldwork notes and through engagement with relevant literature from various disciplines. Experiences of privacy, among researchers as well as among respondents, is underexposed in the literature on social research methodology. Furthermore, lying is sometimes the only effective way to protect one’s privacy. Starting from a research experience with lying respondents in Ghana, I discuss the various circumstances and reasons that lead to lying in defence of privacy, and in particular, concerns about respect in the context of research. Next, I return to the concept of privacy and explicate cultural variations in the experience of privacy. I then look at the consequences for research ethics. The paradoxical conclusion is that lying, a discredited tool of deception, is often applied in order to uphold a widely accepted basic human necessity of life – privacy. Qualitative social researchers should take these concerns about privacy and respect into account and engage in conversations that do not threaten the security of their interlocutors.  相似文献   

5.
This study expands our knowledge of consent in linking survey and administrative data by studying respondents’ behaviour when consenting to link their own records and when consenting to link those of their children. It develops and tests a number of hypothesised mechanisms of consent, some of which were not explored in the past. The hypotheses cover: parental pride, privacy concerns, loyalty to the survey, pre-existing relations with the agency holding the data, and interviewer effects. The study uses data from the longitudinal Millennium Cohort Study to analyse the correlates of consent in multiple domains (i.e. linkage of education, health and economic records). The findings show that respondent’s behaviour vary depending on the consent domain and on the person within the household for whom consent is sought. In particular, the cohort member’s cognitive skills and the main respondent’s privacy concerns have differential effects on consent. On the other hand, loyalty to the survey proxied by the longitudinal response history has a significant and strong impact on consent irrespective of the outcome. The findings also show that interviewers account for a large proportion of variations in consent even after controlling for the characteristics of the interviewer’s assignment area. In total, it is possible to conclude that the significant impact of some of the correlates will lead to sample bias which needs to be accounted for when working with linked survey and administrative data.  相似文献   

6.
This study examined public perceptions about mental illness, specifically investigating individuals’ concerns about disclosing a mental condition and the potential outcomes of doing so. This survey asked 570 adults whether they would disclose a mental condition in four different scenarios: seeking health care, employment, academic or vocational counseling, and for background checks. Respondents were then asked to identify the reasons they would agree or refuse to disclose. Only in a health care situation were respondents very favorably inclined to disclose. A significant percentage of people in all scenarios were unwilling to disclose, citing privacy as a primary concern.  相似文献   

7.
This article explains Internet users’ self-help activities in protecting their privacy online using structural equation modeling. Based on a representative survey of Swiss Internet users, it reveals past experiences with privacy breaches as a strong predictor of current protective behavior. Further, in line with the ‘privacy paradox’ argument, caring about privacy (privacy attitudes) alone does not necessarily result in substantial self-protection. Most strikingly, however, general Internet skills are key in explaining users’ privacy behavior. These skills enable users to reduce risks of privacy loss while obtaining the benefits from online activities that increasingly depend on the revelation of personal data. Consequently, Internet skills are an essential starting point for public policies regarding users’ self-help in privacy protection.  相似文献   

8.
Urban planning systems rarely include the poor. Cities are growing and so is the urban population. Pune is a large city in Western Maharashtra. According to the National Census, 2001, the population of the Pune urban agglomeration is 3.5 million and it is (in some estimates) to reach nearly 6 million by 2021.1 Out of this, the city of Pune has a 2.5 million people living in it. Forty percent and above of the population live in slums. One of the biggest shortfalls of Pune's urban planning is that it still fails to include the poor in mainstream policies. The reason is that the poor are hardly known about, in fact, even government authorities are unaware about how many poor people there are in Pune. This attitude, and the fact that Shelter Associates (SA) work is closely connected with the poor regarding basic services and housing, started the development of a slum database by SA. Finally, the Pune Municipal Corporation asked us to make a complete census of the slum dwellers in the year 2000. That gave rise to a detailed survey of Pune's slum dwellers, to become, amongst other things, the first ever spatial and socio-economic census processed and analysed on a geographical information system (GIS). The Pune Slum Census has built upon this experience and expanded the communities’ information base, and has created a methodology which the city can use to work on detailed urban planning using a GIS and with the slum database as the base. This article focuses on the Pune Slum Census in progress.  相似文献   

9.
Focus groups conducted with Canadian teenagers examining their perceptions and experiences with cyber risk, center on various privacy strategies geared for impression management across popular social network sites (SNS). We highlight privacy concerns as a primary reason for a gravitation away from Facebook toward newer, more popular sites such as Instagram and Snapchat, as well as debates about the permeability of privacy on Snapchat in particular. The privacy paradox identifies a disjuncture between what is said about privacy and what is done in practice. It refers to declarations from youth that they are highly concerned for privacy, yet frequently disregard privacy online through “oversharing” and neglecting privacy management. However, our participants, especially older teens, invoked a different mindset: that they have “nothing to hide” online and therefore do not consider privacy relevant for them. Despite this mindset, the strategies we highlight suggest a new permutation of the privacy paradox, rooted in a pragmatic adaptation to the technological affordances of SNS, and wider societal acquiescence to the debasement of privacy online.  相似文献   

10.
This paper explores young people's expressed concerns about privacy in the context of a highly mediated cultural environment, mapping social media practices against axes of visibility and participation. Drawing on interdisciplinary conceptual resources from both the humanities and social sciences, we use ‘spectacles of intimacy’ to conceptualise breaches of privacy, mapping an emergent moral landscape for young people that moves beyond concerns with e-safety to engage with the production and circulation of audiences and value. The paper draws on data from a methodological innovation project using multi-media and mixed methods to capture lived temporalities for children and young people. We present a model that captures a moral landscape shaped by emotional concerns about social media, the affordances of those media and affective discourses emerging from young people's use of the media.  相似文献   

11.
Although research evidence shows that people have strong concerns about their privacy online, this does not necessarily mean that they do not share their personal information in varying online relationships. This paper presents New Zealand-based empirical research findings into people’s actual online information-sharing behaviours rather than their attitudes: the motivations, extent, and conditions under which individuals share their personal information in varying online relationships with commercial providers, with government, and on social networking sites. A grounded theory methodology and an abductive analysis were used to identify patterns in the findings and construct a new taxonomy of online information-sharing behaviours: contrary to existing taxonomies, all participants in this study are very privacy aware and make quite deliberate choices about what personal information they share online, with whom, to what extent, and under what circumstances. Four distinctive classifications of people’s online information-sharing behaviours were derived from this study: privacy pragmatists, privacy victims, privacy optimists, and privacy fatalists.  相似文献   

12.
In an age of telemarketers, spam emails, and pop-up advertisements, sociologists are finding it increasingly difficult to achieve high response rates for their surveys. Compounding these issues, the current political and social climate has decreased many survey respondents’ likelihood of responding to controversial questions, which are often at the heart of much research in the discipline. Here we discuss such implications for survey research in sociology using: a content analysis of the prevalence of missing data and survey research methods in the most cited articles in top sociology journals, a case study highlighting the extraction of meaningful information through an example of potential mechanisms driving the non-random missing data patterns in the Religion Among Academic Scientists dataset, and qualitative responses from non-responders in this same case. Implications are likely to increase in importance given the ubiquitous nature of survey research, missing data, and privacy concerns in sociological research.  相似文献   

13.
Abstract

Computer matching has been extensively used by government, primarily as a means of cost-savings and fraud detection. Despite concerns about the invasion of privacy, clear ethical standards about computer matching have not been established. However, a study of past matching practices reveals an implied set of principles. Efficiency is valued over privacy. Welfare clients and government employees are viewed as having sacrificed the right to privacy. Some due process protections are viewed as legitimate but have not been well-implemented. The newly-passed Computer Matching and Privacy Protection Act of 1988 (PL 100-503) strengthens these due process protections.  相似文献   

14.
Women report greater concerns about the danger posed by strangers despite greater victimization by acquaintances. Using a survey of Seattle residents, this article investigates one understudied dimension of this seeming incongruity: the actual effect of victimization by a stranger or acquaintance on concerns about crime. The results suggest different patterns for different crimes: relationship to the offender does not matter for burglaries while acquaintance sexual assaults and stranger nonsexual assaults, respectively, hold the largest associations with concerns. Implications are discussed for research on fear of crime, acquaintance victimizations, and perceptions of neighborhoods.  相似文献   

15.
Internet-mediated sharing is growing quickly. Millions of users around the world share personal services and possessions with others ? often complete strangers. Shared goods can amount to substantial financial and immaterial value. Despite this, little research has investigated privacy in the sharing economy. To fill this gap, we examine the sharing–privacy nexus by exploring the privacy threats associated with Internet-mediated sharing. Given the popularity of sharing services, users seem quite willing to share goods and services despite the compounded informational and physical privacy threats associated with such sharing. We develop and test a framework for analyzing the effect of privacy concerns on sharing that considers institutional and social privacy threats, trust and social-hedonic as well as monetary motives.  相似文献   

16.
The privacy paradox describes people's willingness to disclose personal information on social network sites despite expressing high levels of concern. In this study, we employ the distinction between institutional and social privacy to examine this phenomenon. We investigate what strategies undergraduate students have developed, and their motivations for using specific strategies. We employed a mixed-methods approach that included 77 surveys and 21 in-depth interviews. The results suggest that, in addition to using the default privacy settings, students have developed a number of strategies to address their privacy needs. These strategies are used primarily to guard against social privacy threats and consist of excluding contact information, using the limited profile option, untagging and removing photographs, and limiting Friendship requests from strangers. Privacy strategies are geared toward managing the Facebook profile, which we argue functions as a front stage. This active profile management allows users to negotiate the need for connecting on Facebook with the desire for increased privacy. Thus, users disclose information, because they have made a conscious effort to protect themselves against potential violations. We conclude that there is a tilt toward social privacy concerns. Little concern was raised about institutional privacy and no strategies were in place to protect against threats from the use of personal data by institutions. This is relevant for policy discussions, because it suggests that the collection, aggregation, and utilization of personal data for targeted advertisement have become an accepted social norm.  相似文献   

17.
As the Internet becomes integrated into the institutional world around it, attention has increasingly been drawn to the diverse ways in which information technologies mediate human relationships. As an increasingly commercial Internet has been employed to capture personally identifiable information, privacy concerns have intensified. To analyse these matters more systematically, this article considers the ideas about human identity that have been implicit in the development of economics and computer science. The two fields have evolved along parallel tracks, starting with an assumption of perfect transparency and moving toward a more sophisticated appreciation of individuals' private informational states. Progress in the analysis and resolution of privacy problems will require that this evolution be taken seriously and continued.  相似文献   

18.
Through constitutional amendments and case law, the United States citizens receive privacy protections. These same protections do not exist for individuals incarcerated in prisons and jails. Instead, their privacy rights are regularly replaced by larger institutional concerns for security, safety, and control. Such privacy violation measures may include electronic surveillance, recording of phone calls, opening/reading of mail, and searches of their person, cell, and property. Although it is expected that incarcerated individuals have fewer privacy rights than nonincarcerated citizens, some privacy violations may be perceived as procedurally unjust due to their severity and infringement upon incarcerated individuals' rights to dignity and respect. This has implications for the well-being of incarcerated individuals, the legitimacy of correctional officers, and as a result, the potential safety and security of institutions.  相似文献   

19.
This study examines the process by which Facebook users regulate their interpersonal privacy and information sharing. By tracing the influence of gender, Facebook usage, and privacy-protecting behaviors that are determined by knowledge and attitude, this research identifies a dynamic management process through which Facebook users maintain personal and interpersonal boundaries. Two distinct strategies are used – a privacy-setting control and a self-disclosure control. Based on data collected in a survey of 432 college students conducted in Hong Kong, our results suggest that different uses of Facebook activities (i.e., social interaction, social browsing, and entertainment) can be used to predict different boundary management strategies. Gender and privacy-related psychological factors (i.e., privacy literacy and concern about privacy) also showed significant effects. We concluded that the privacy setting options available on social networking sites such as Facebook were useful in providing users with a base point and a psychological sense of security, but they had little influence on the actual patterns of self-disclosure. To regulate their privacy boundaries, users were more likely to rely on frequently changing their privacy settings and on controlling their levels of self-disclosure.  相似文献   

20.
Photo sharing online has become immensely popular and is a central aspect of modern visual culture. Yet it creates a number of privacy issues, both in relation to other individuals and corporate surveillance. The purpose of this study was to investigate users’ understanding of privacy issues in photo sharing, based on a comparative study of two contrasting platforms: Instagram and Blipfoto. The study combined netnography and in-depth interviewing. It was found that Instagram users had a greater awareness of how the platform might use their data, but saw this loss of privacy as inevitable in return for a free service. Blipfoto users were more trusting of what they experienced as a very community minded platform. Any concerns felt by both groups of users were out-weighed by the sense that photo sharing was highly meaningful and their fascination with watching and being watched. Both groups main approach to privacy was through restricting certain types of image of people and not revealing the location of certain personal spaces. Notions of privacy thus remained primarily personal and ignored corporate dataveillance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号