首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This article explains Internet users’ self-help activities in protecting their privacy online using structural equation modeling. Based on a representative survey of Swiss Internet users, it reveals past experiences with privacy breaches as a strong predictor of current protective behavior. Further, in line with the ‘privacy paradox’ argument, caring about privacy (privacy attitudes) alone does not necessarily result in substantial self-protection. Most strikingly, however, general Internet skills are key in explaining users’ privacy behavior. These skills enable users to reduce risks of privacy loss while obtaining the benefits from online activities that increasingly depend on the revelation of personal data. Consequently, Internet skills are an essential starting point for public policies regarding users’ self-help in privacy protection.  相似文献   

2.
ABSTRACT

The home environment becomes very important for family caregivers of people with dementia as a place of safety, retreat and care provision. Using a gender-based perspective, the authors analyzed thirteen interviews with family caregivers to understand how they perceived their home space. The data was analyzed thematically with the help of adjacency diagrams. Our analysis identified three main themes: compact layout, spatial flexibility, and the wider neighborhood. Given the gendered nature of caring, the findings are discussed drawing on the work of feminist architects regarding the home environment. The authors argue that feminist architectural approaches can usefully inform spatial strategies regarding dementia, ageing friendly housing, accessible living and the wellbeing of the caregiver. Different bodies and users’ needs should be at the epicenter of design, as opposed to conventional design and the current practices by developers, which may create a series of disabling spaces.  相似文献   

3.
ABSTRACT

This paper considers how personal data protections figure into the design process of wearable technology. The data question is becoming especially important in the face of recent innovations in biotechnology that capitalize on the new fungibility of biology and electronics, in which new biotech wearables capitalize on the ability to analyze and track changes in blood, sweat, and tears. Interviews and participant observation with wearable tech designers, data scientists, fashion tech entrepreneurs, and select experts in cybersecurity and intellectual property law, reveal a range of approaches to data protection in design within the culture where wearables are beginning to merge with biotech. While a few respondents were extremely vigilant about protecting consumer’s privacy, the majority felt that when consumers ‘opt in’ to data sharing, they should be cognizant of the risks. From their perspective, it is not necessarily the producer’s responsibility to protect user's personal data. These attitudes present a problematic logic, which leaves users vulnerable to data exploitation. The paper concludes by arguing that this laissez-faire culture is the environment in which wearable biotech is being developed and will be deployed. This emerging technology raises issues about bodies, data, and ownership in crucial need of analysis and critique to push its move into the mainstream toward more equitable and inclusive ends.  相似文献   

4.
ABSTRACT

Participatory approaches are needed in Finland for service users to participate in designing and developing social services. New collaborative methods are the focus of this research, as this pilot case-study analyses the experiment-driven design approach and its consequences on service users’ agency and participation. This practitioner research belongs to the pragmatist research tradition. The data comprises transcribed focus group and individual interviews of service users and social workers in group operations in a Finnish municipal adult social service organisation. The data are evaluated by content analysis. The experiments with service prototypes allowed the service users to observe the consequences of their actions in practice. Instead of only being heard and consulted, the service users found they could influence the practice in concrete ways. The professionals and organisation shaped the service users’ participation and agency by operating as gatekeepers in sharing power. The service users reported that collaboration with professionals and participation in the group gave them a sense of renewed citizenship, improved social skills and helped to manage with personal illnesses or daily struggles. The research concludes that experimentation can provide a way to utilise experiential knowledge in developing social work collaboratively.  相似文献   

5.
Although research evidence shows that people have strong concerns about their privacy online, this does not necessarily mean that they do not share their personal information in varying online relationships. This paper presents New Zealand-based empirical research findings into people’s actual online information-sharing behaviours rather than their attitudes: the motivations, extent, and conditions under which individuals share their personal information in varying online relationships with commercial providers, with government, and on social networking sites. A grounded theory methodology and an abductive analysis were used to identify patterns in the findings and construct a new taxonomy of online information-sharing behaviours: contrary to existing taxonomies, all participants in this study are very privacy aware and make quite deliberate choices about what personal information they share online, with whom, to what extent, and under what circumstances. Four distinctive classifications of people’s online information-sharing behaviours were derived from this study: privacy pragmatists, privacy victims, privacy optimists, and privacy fatalists.  相似文献   

6.
ABSTRACT

This study offers a grounded theory of ‘new ways of working’ (NWW), an organizational design concept of Dutch origin with a global relevance. NWW concern business solutions for flexible workspaces enabled by digital network technologies. Theoretically, NWW are analysed with reference to Lefebvre’s theory on the ‘production of space’ and are defined along three dimensions: the spatiotemporal ‘flexibilization’ of work practices, the ‘virtualization’ of the technologically pre-defined organization, and the ‘interfacialization’ of meaning making in the lifeworld of workers. Empirically, NWW are explored in a case study of an insurance company which in 2007 radically implemented NWW. The case study consists of a longitudinal – before and after implementation – research based on ethnographic fieldwork, conducted in 2007 and 2010. The article contributes with a conceptual framework for the analysis and management of NWW, and highlights contradictions and ambiguities in the implementation and appropriation of this innovative organizational design.  相似文献   

7.
ABSTRACT

Traditionally, in western countries, the social work profession primarily has come into contact with issues of precarity through the lives of service users. This paper introduces precarity in the social work scholarly literature as a feature of social workers’ professional and personal lives. It draws from the findings of a qualitative small study of mental health social workers working in the non-profit sector in Greece. The findings reflect a picture of social workers experiencing precarious conditions as they have become part of the growing phenomenon of the working poor, surviving by loans, experiencing housing insecurity, reproductive insecurity, fuel poverty and unable to pay for their commuting expenses to and from work. Furthermore, the paper maintains that the expansion of the conditions of precarity to university-educated professionals, such as social workers, needs to be understood within an International Political Economy (IPE) perspective in order neoliberal capitalism which brings rising levels of inequalities to become a focus of intervention.  相似文献   

8.
ABSTRACT

Ethical standards in social work have matured significantly since the formal inauguration of the profession in the late 19th century. This article traces the global evolution of ethical standards in social work, focusing especially on current challenges in the digital age. The author discusses changes over time in social workers’ understanding of ethical issues and development of conceptual frameworks and protocols for managing them. Social workers’ increasing use of digital technology poses novel and unprecedented ethical challenges pertaining to privacy, confidentiality, informed consent, professional boundaries, conflicts of interest, documentation, client abandonment, and professionalism, among others. The article outlines emerging ethical standards designed to help social workers manage ethical challenges in the digital age.  相似文献   

9.
Abstract

This paper develops a typology of people using social care services’ preferences for care workers and satisfaction with social care services from a large multimethod study that explored international recruitment to the English social care sector (home and health care, including residential homes). We developed this typology with two questions in mind: (a) what led to satisfaction of care and (b) what led to preference and satisfaction with workers? Data were collected from face-to-face interviews with 35 people who were using social care services and carers (2007–2009) and these data were used to develop the typology. Using the theoretical concept of homophily, we explored contentions that people might prefer to receive care and support from individuals resembling themselves. We observed that preferences for care workers and satisfaction with social care services may be linked, but highlighted that the concept of meeting a preference is personal to the individual. The implications of users’ preferences for certain care workers at a time where policy is promoting greater consumer-led care or self-directed support are discussed.  相似文献   

10.
Photo sharing online has become immensely popular and is a central aspect of modern visual culture. Yet it creates a number of privacy issues, both in relation to other individuals and corporate surveillance. The purpose of this study was to investigate users’ understanding of privacy issues in photo sharing, based on a comparative study of two contrasting platforms: Instagram and Blipfoto. The study combined netnography and in-depth interviewing. It was found that Instagram users had a greater awareness of how the platform might use their data, but saw this loss of privacy as inevitable in return for a free service. Blipfoto users were more trusting of what they experienced as a very community minded platform. Any concerns felt by both groups of users were out-weighed by the sense that photo sharing was highly meaningful and their fascination with watching and being watched. Both groups main approach to privacy was through restricting certain types of image of people and not revealing the location of certain personal spaces. Notions of privacy thus remained primarily personal and ignored corporate dataveillance.  相似文献   

11.
The privacy paradox describes people's willingness to disclose personal information on social network sites despite expressing high levels of concern. In this study, we employ the distinction between institutional and social privacy to examine this phenomenon. We investigate what strategies undergraduate students have developed, and their motivations for using specific strategies. We employed a mixed-methods approach that included 77 surveys and 21 in-depth interviews. The results suggest that, in addition to using the default privacy settings, students have developed a number of strategies to address their privacy needs. These strategies are used primarily to guard against social privacy threats and consist of excluding contact information, using the limited profile option, untagging and removing photographs, and limiting Friendship requests from strangers. Privacy strategies are geared toward managing the Facebook profile, which we argue functions as a front stage. This active profile management allows users to negotiate the need for connecting on Facebook with the desire for increased privacy. Thus, users disclose information, because they have made a conscious effort to protect themselves against potential violations. We conclude that there is a tilt toward social privacy concerns. Little concern was raised about institutional privacy and no strategies were in place to protect against threats from the use of personal data by institutions. This is relevant for policy discussions, because it suggests that the collection, aggregation, and utilization of personal data for targeted advertisement have become an accepted social norm.  相似文献   

12.
This study examines the process by which Facebook users regulate their interpersonal privacy and information sharing. By tracing the influence of gender, Facebook usage, and privacy-protecting behaviors that are determined by knowledge and attitude, this research identifies a dynamic management process through which Facebook users maintain personal and interpersonal boundaries. Two distinct strategies are used – a privacy-setting control and a self-disclosure control. Based on data collected in a survey of 432 college students conducted in Hong Kong, our results suggest that different uses of Facebook activities (i.e., social interaction, social browsing, and entertainment) can be used to predict different boundary management strategies. Gender and privacy-related psychological factors (i.e., privacy literacy and concern about privacy) also showed significant effects. We concluded that the privacy setting options available on social networking sites such as Facebook were useful in providing users with a base point and a psychological sense of security, but they had little influence on the actual patterns of self-disclosure. To regulate their privacy boundaries, users were more likely to rely on frequently changing their privacy settings and on controlling their levels of self-disclosure.  相似文献   

13.
Backgrounde-Learning, a means by which to expand people’s access to information can be effective in promoting health in the workplace. This study to present steps in the development of an e-health education program at the workplace.ObjectiveThis study aimed to present all steps of develop a telehealth education program for computer users using formative research to identify themes to health education for workers.MethodsA team of expert conducted focus groups with administrative workers (n = 36 participants) to identify thematic health to the development of program. Three meetings were audio video recorded, and notes. All data were based on constant analysis, classical content analysis and keywords in-context.ResultsThe content of the nine audio videos included four musculoskeletal health topics (Walking Program, Back School, Muscle Relaxation Techniques, and Work-related Musculoskeletal Diseases); three to healthy diet (Eating and Commensality, Ultra-processed Food and Food labeling, and Oil and Fat); two to mental health (Burnout Syndrome and the Meaning of work).ConclusionThe proposed steps in the development of a workplace e-health education program were successfully achieved. The engagement of the workers’ staged focus groups was fundamental to the choice of themes relevant to the population in question.  相似文献   

14.
This article explores human rights storytelling within two of the dominant internet companies, Google and Facebook. Based on interview with company staff as well as analysis of publicly available statements, the article examines how human rights are framed, made sense of and translated into company norms, products, and governance structures. The paper argues that the companies’ framing in many respects resembles that of the United States’ online freedom agenda, celebrating the liberating power of the internet and perceiving human rights as primarily safeguards against repressive governments. The companies see freedom of expression as part of their DNA and do not perceive any contradiction between this standard and business practices that may impact negatively on users’ freedom of expression, such as terms of service enforcement. Likewise, there is no sense of conflict between the online business model and their users’ right to privacy.  相似文献   

15.
WEB SITES     
Abstract

It would be useful to better understand the personal determinants of successful interventions in the community, especially those interventions already recognized for their efficacy and efficiency, such as elder home care telesurveillance. This is a modality of health care services that transmits, via a call center on a 24/7 basis, the clinical information necessary to follow elders outside medical centers. Community health workers refer elders to this service. A qualitative research design was realized to understand why so much difference in the implementation of this service had arisen in two comparable sites previously judged receptive. The research objectives were as follows: (1) to document the personal determinants associated with telesurveillance adoption by community health workers, in two sites previously judged receptive; and (2) to point out the personal determinants that can explain successful adoption of telesurveillance. According to the Theory of Interpersonal Behavior, the results showed that habits (e.g., community health workers' knowledge of new information technologies) and perceived barriers in clinical practice were fundamental determinants in the adoption of telesurveillance.  相似文献   

16.
17.
Computer Ethics     
Summary

As human service waiters implement computerized information technologies, they operate in areas in which problems of power, de-personalization, and the invasion of privacy are central. In attempting to understand and resolve these issues, studies of computer ethics deal with moral values, economic policy, and other social change impacts associated with computerization. Unfortunately, the diffuse focus of ethical discourse in computing is contusing. This paper, in clarifying the relation of “computer ethics” to issues of personal freedom, social control, and social inequality, seeks to provide human service workers and other professional computer specialists with a framework for identifying the social effects and moral dimensions of computerization.  相似文献   

18.
ABSTRACT

Facebook is a common tool that enables students to publicly express their emotions, thoughts, experiences, and knowledge. On the assumption that the personal narratives of students can provide deep insights into their learning processes during practical training programs, the article presents content analyses of Facebook posts written by Israeli students who participated in an international social work field placement program in India. Content analysis of the students’ posts reveals that they grappled with their personal and professional identities as part of the learning process that occurred while they were formulating their professional identity as social workers. The analysis elicited three main themes: (1) awareness of the national identity; (2) exploration of other identities (personal, professional, and global); and (3) an attempt to contain multidimensional identity. The students discussed the main challenges they faced in the process of formulating an identity that will enable them to engage in international social work, and they described the fluctuations that occurred in those identities. The results show how public Facebook posts can be used as a tool to shed light on the contribution of social work education in international field placements, and provide insights into the learning processes that students experience in field placements abroad.  相似文献   

19.
This paper describes current US trends and practices regarding workplace personal assistance services (PAS) as part of available work accommodation options. Workplace PAS include task-related assistance at work, such as readers, interpreters, help with lifting or reaching, re-assignment of non-essential duties to co-workers, and other help related to performing work tasks; and personal care-related assistance such as helping someone with using the rest room, eating, or drinking while at work. The results reported here are based on forty-one telephone interviews conducted in 2004, which included 20 workplace PAS users and 21 US employers familiar with workplace accommodations. Employers and consumers described a range of workplace personal assistance currently used. Barriers to expansion of workplace PAS include negative co-worker or supervisor attitude, cost to employers and workers, waiting time for accommodations, employee attitude and knowledge, and confusing terminology. Development of organizational culture that encourages employment of people with disabilities and developing employer-employee partnerships in arranging for accommodations can contribute to workplace PAS solutions. The survey findings contribute to better understanding of current practices related to workplace PAS.  相似文献   

20.
This article seeks to broaden our understanding of online privacy in three ways: first, by drawing out the differences between the physical world and the digital world as those differences affect privacy; second, by exploring how the concept of the 'commons' might help us to understand social and economic relationships in cyberspace; and third, by analysing two contrasting views of privacy: privacy as a private or individual good and privacy as a common good. In order to analyse similarities and differences in privacy in the physical world and the online world, each is assessed in three ways: the obvious level of privacy available; the possibility of modifying that level of privacy to create or choose more or less privacy for oneself; and the degree to which the, prior or contemporaneous, privacy decisions of others affect the amount of privacy that is available to all. Applying an analysis based on the 'tragedy of the commons', the article concludes that at least part of cyberspace can be conceived as a 'commons' and that personal information flows could be considered a 'common pool resource' within that commons. Based on the likely calculations that individuals and organizations will make about collection and uses of personal information, the article next evaluates what would be the most effective policy approach to ensure that the common pool resource of personal information is not overused and degraded. The article concludes that a policy approach of providing individuals with a private means, either through property rights or some means of redressing their grievances, is unlikely to provide an effective means of protecting the common pool resource of personal information. A policy approach that acknowledges the common good basis of privacy and views personal information as a common pool resource provides an alternative view of the policy problems and offers suggestions in terms of rules and institutions that may be effective in addressing those problems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号