429
Views
6
CrossRef citations to date
0
Altmetric
Articles

Zone-it before IT zones you: a location-based digital notice board to build community while preserving privacy

, , , , , & show all
Pages 16-32 | Received 24 Jan 2014, Accepted 04 Mar 2015, Published online: 07 Apr 2015

References

  • Abdul-Rahman, A., and S. Hailes. 2000. “Supporting Trust in Virtual Communities.” Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Island of Maui, Hawaii.
  • Agger, Ben. 2011. “iTime: Labor and Life in a Smartphone Era.” Time & Society 20 (1): 119–136. doi:10.1177/0961463X10380730.
  • Bailard, C., R. Baker, M. Hindman, S. Livingston, and P. Meier. 2012. Mapping the Maps: A Meta-Level Analysis of Ushahidi and Crowdmap. Washington, DC: Internews Center for Innovation and Learning.
  • Boyd, Danah, and Nicole Ellison. 2007. “Social Network Sites: Definition, History, and Scholarship.” Journal of Computer-Mediated Communication 13 (1): 210–230. doi:10.1111/j.1083-6101.2007.00393.x.
  • Brown, G., T. Howe, M. Ihbe, A. Prakash, and K. Borders. 2008. “Social Networks and Context-Aware Spam.” CSCW '08: Proceedings of the ACM 2008 Conference on Computer Supported Cooperative Work, San Diego, CA, 403–412.
  • Coleman, E. G. 2010. “Ethnographic Approaches to Digital Media.” Annual Review of Anthropology 39 (1): 487–505. doi:10.1146/annurev.anthro.012809.104945.
  • Debatin, B., J. P. Lovejoy, A.-K. Horn, and B. N. Hughes. 2009. “Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences.” Journal of Computer-Mediated Communication 15 (1): 83–108. doi:10.1111/j.1083-6101.2009.01494.x.
  • Dwyer, C., S. R. Hiltz, and K. Passerini. 2007. “Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace.” Proceedings of AMCIS 2007, Keystone, Colorado.
  • Fogel, Joshua, and Elham Nehmad. 2009. “Internet Social Network Communities: Risk Taking, Trust, and Privacy Concerns.” Computers in Human Behavior 25 (1): 153–160. doi:10.1016/j.chb.2008.08.006.
  • Goh, L., J. Phillips, and A. Blaszczynski. 2011. “Computer-Mediated Communication and Risk-Taking Behaviour.” Computers in Human Behavior 27 (5): 1794–1799. doi:10.1016/j.chb.2011.03.006.
  • Jarvenpaa, S., N. Tractinsky, and M. Vitale. 2000. “Consumer Trust in an Internet Store.” Information Technology and Management 1 (1/2): 45–71. doi:10.1023/A:1019104520776.
  • Jøsang, A., R. Ismail, and C. Boyd. 2007. “A Survey of Trust and Reputation Systems for Online Service Provision Decision.” Support Systems 43: 618–644.
  • Lindqvist, J., J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. 2011. “I'm The Mayor of My House: Examining Why People Use Foursquare – a Social-driven Location Sharing Application.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, Canada, 2409–2418. New York, NY: ACM.
  • Mascetti, S., D. Freni, C. Bettini, X. S. Wang, and S. Jajodia. 2011. “Privacy in Geo-social Networks: Proximity Notification with Untrusted Service Providers and Curious Buddies.” The VLDB Journal 20 (4): 541–566.
  • McKnight, D. H., and N. L. Chervany. 2001. “What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology.” International Journal of Electronic Commerce 6 (2): 35–59.
  • Morgan, Gareth. 2010. “The Location-Based Future of the Web.” New Scientist 2746: 22.
  • Morozov, Evgeny. 2012. The Net Delusion: The Dark Side of Internet Freedom. New York: PublicAffairs.
  • Page, X., A. Kobsa, and B. Knijnenburg. 2012. “Don't Disturb My Circles! Boundary Preservation is at the Center of Location-Sharing Concerns.” Sixth International AAAI Conference on Weblogs and Social Media, Dublin. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/view/4679.
  • Peterson, Robert A. 2001. “On the Use of College Students in Social Science Research: Insights from a Second-Order Meta-Analysis.” Journal of Consumer Research 28 (3): 450–461. doi:10.1086/323732.
  • Poltash, Nicole. 2013. “Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials.” Richmond Journal of Law & Technology 19 (4): 1–24.
  • Porter, C. 2004. “A Typology of Virtual Communities: A Multi-Disciplinary Foundation for Future Research.” Journal of computer-mediated communication 10 (3). doi:10.1111/j.1083-6101.2004.tb00228.x.
  • Resnick, Paul, and Richard Zeckhauser. 2002. “Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System.” Advances in Applied Microeconomics 11: 127–157.
  • Roick, Oliver, and Suzanne Heuser. 2013. “Location Based Social Networks – Definition, Current State of the Art and Research Agenda.” Transactions in GIS 17 (5): 763–784.
  • Ruiz Vicente, C., D. Freni, C. Bettini, and C. S. Jensen. 2011. “Location-Related Privacy in Geo-Social Networks.” Location-Related IEEE Internet Computing 15 (3): 20–27. doi:10.1109/MIC.2011.29.
  • Semitsu, Junichi P. 2011. “From Facebook to Mug Shot: How the Dearth of Social Networking Privacy Rights Revolutionized Online Government Surveillance (March 9, 2011).” Pace Law Review 31 (1), SSRN. http://ssrn.com/abstract = 1782267.
  • Smart, John. 2013. “The Conversational Interface: Our Next Great Leap Forward.” http://www.accelerationwatch.com/lui.html.
  • Srinivasan, R. 2006. “Indigenous, Ethnic and Cultural Articulations of the New Media.” International Journal of Cultural Studies 9 (4): 497–518.
  • Stroeken, K. 1999. “Disarming the Intragaze: Internet and the World-Wide Cult.” SSRN. http://ssrn.com/abstract = 2354987.
  • Stutzman, Fred, Ralph Gross, and Alessandro Acquisti. 2012. “Silent Listeners: The Evolution of Privacy and Disclosure on Facebook.” Journal of Privacy and Confidentiality 4 (2): 7–41. http://repository.cmu.edu/jpc/vol4/iss2/2.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.