Jump to content

User:Qewel/sandbox

From Wikipedia, the free encyclopedia

Practice[edit]

hello

hello

privacy in prisons/sandbox

User:Qewel/Privacy in airplanes/sandbox

Week 2[edit]

Evaluating Articles[edit]

This week, I studied the Information privacy article as well as the article, Privacy Law, which was edited by previous lab members Gloria and Sondra.

Information Privacy Evaluation[edit]

While reading the article regarding information privacy, I have learned that the term is incredibly broad, spanning technology, legal matters, public opinion, and etcetera on the topic of privacy. Given the broadness of the article, much of the information I learned in my read-through was general, and so I moved my attentions toward the structure of and logistics of the article. The article itself had numerous subsections that led to external sources for each relationship involving the matter of information privacy. Oddly enough, one of the links provided in the reference section does not work, a fact that I intend to address in the article's Talk page.

Privacy Law Evaluation[edit]

In my reading of the Privacy law article, the most common types of privacy protected by the law, or were at least addressed in the article, were that of information and online privacy, with other examples of privacy being only minimally mentioned or not at all in the subsections of privacy laws by country. I was actually quite surprised upon learning that the right to privacy is not explicitly mentioned in the Bill of Rights like I initially thought, and that the right to privacy is really an inference drawn from our protection from unreasonable searches or seizures mentioned in the fourth amendment.

Week 3[edit]

Possible Wiki Articles to Found or Develop[edit]

Tentative Article Topic Interest[edit]

  • As of now, I am most interested in perhaps founding a page devoted on the generational views of internet privacy, and what factors contribute to these views as time passes. Many of the peer-reviewed journal articles I have read provide data on the types of information that internet users are compelled to share on their social media.

Citations Practice[edit]

This subsection is meant for further practice of citing sources.

According to this study, data loss is positively correlated with risky online behavior and lacking anti spyware programs to defend against privacy breaches online.[1]

Week 4[edit]

Privacy on Dating Apps Article Brainstorming[edit]

Possible Contributions[edit]

It appears that there are no pages on Wikipedia exclusively devoted to the topic of privacy and dating apps, therefore giving me a relatively blank canvas to work on. There are numerous pages on other relevant fields of scholarship, such as privacy on social media and Internet privacy that will be helpful in finding a starting point from which to begin my research, but dating app privacy has a number of factors that differentiate it from what has previously been referenced in in aforementioned articles.

When developing a page for dating app privacy, I am looking to achieve the following:

  • An unbiased, well-cited article.
  • Comprehensive explanations on what constitutes a dating app.
  • A section detailing the type of private information most susceptible to being leaked on online dating platforms.
  • Possible psychological or sociological theories that have been offered by researchers to explain why and how private information is leaked on dating apps.

As I continue to research for my topic, I am certain that I will add onto this list.

Current Bibliography[edit]

  1. Alterovitz, Sheyna S. and Gerald A. Mendelsohn. 2009. "Partner Preferences Across the Life Span: Online Dating by Older Adults." Psychology and Aging 24(2):513-517
  2. Bartos, Sebastian E., Voon C. Phua and Erin Avery. 2009. "Differences in Romanian Men's Online Personals by Sexualities." Journal of Men's Studies 17(2):145-154
  3. Bubas, Goran, Tihomir Orehovacki, and Mario Konecki. 2008. “Factors and Predictors of Online Security and Privacy Behavior.” Journal of Information and Organizational Sciences 32(2):79-98.
  4. Chen, Wenhong & Kye-Hyoung Lee. 2013. “Sharing, liking, commenting, and distressed? The pathway between facebook interaction and psychological distress.” Cyberpsychology, Behavior, and Social Networking 16(10):728-733. 
  5. Crosier, Benjamin S., Gregory D. Webster and Haley M. Dillon. 2012. "Wired to Connect: Evolutionary Psychology and Social Networks." Review of General Psychology 16(2):230-239 
  6. Dienlin, Tobias, and Sabine Trepte. 2015. “Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors.” European Journal Of Social Psychology 45(3):285-297. 
  7. DiLillo, David and Emily B. Gale. 2011. "To Google Or Not to Google: Graduate Students' use of the Internet to Access Personal Information about Clients."Training and Education in Professional Psychology 5(3):160-166 
  8. Gudelunas, David. 2012. "There's an App for that: The Uses and Gratifications of Online Social Networks for Gay Men." Sexuality & Culture 16(4):347-365 
  9. Jain, Anuja, Elizabeth M. Petty, Reda M. Jaber, Sean Tackett, Joel Purkiss, James Fitzgerald, & Casey White. 2014. “What is appropriate to post on social media? Ratings from students, faculty members and the public.” Medical Education 48(2):157-169. 
  10. Kolmes, Keely. 2012. "Social Media in the Future of Professional Psychology."Professional Psychology: Research and Practice 43(6):606-612 
  11. Labrague, Leonardo J. 2014. “Facebook use and adolescents' emotional states of depression, anxiety, and stress.” Health Science Journal 8(1):80-89.
  12. Mendelsohn, Gerald A., Lindsay Shaw Taylor, Andrew T. Fiore and Coye Cheshire. 2014. "Black/White Dating Online: Interracial Courtship in the 21st Century."Psychology of Popular Media Culture 3(1):2-18 
  13. Menkin, Josephine A., Theodore F. Robles, Joshua F. Wiley and Gian C. Gonzaga. 2015. "Online Dating Across the Life Span: Users’ Relationship Goals."Psychology and Aging 30(4):987-993 
  14. Moore, Shelley C.,R.N.M.S.N. 2012. "Digital Footprints on the Internet."International Journal of Childbirth Education 27(3):86-91 
  15. Prentice, Jennifer L. and Keith S. Dobson. 2014. "A Review of the Risks and Benefits Associated with Mobile Phone Applications for Psychological Interventions." Canadian Psychology/Psychologie Canadienne 55(4):282-290 
  16. Regan, Priscilla M. 1993. "Ideas Or Interests: Privacy in Electronic Communications." Policy Studies Journal 21(3):450 
  17. Strano, Michele M. and Jill Wattai Queen. 2012. "Covering Your Face on Facebook: Suppression as Identity Management." Journal of Media Psychology: Theories, Methods, and Applications 24(4):166-180
  18. Tsunokai, Glenn T., Augustine J. Kposowa and Michele A. Adams. 2009. "Racial Preferences in Internet Dating: A Comparison of Four Birth Cohorts."Western Journal of Black Studies 33(1):1-15 
  19. Varnali, Kaan, and Aysegul Toker. 2015. “Self-Disclosure on Social Networking Sites.” Social Behavior & Personality: An International Journal 43(1):1-13.
  20. Zurbriggen, Eileen L., Ella Ben Hagai and Gabrielle Leon. 2016. "Negotiating Privacy and Intimacy on Social Media: Review and Recommendations."Translational Issues in Psychological Science 2(3):248-260 

Notes[edit]

  1. ^ Bubas, Goran (2008). "Factors and Predictors of Online Security and Privacy Behavior". Journal of Information and Organizational Sciences. 32 (2): 79–98. {{cite journal}}: |access-date= requires |url= (help)