Content Analysis of Privacy Management Features in Geosocial Networking Application
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Geosocial networking application allows user to share information and communicate with other people within a virtual neighborhood or community. Although most geosocial networking application include privacy management features, one the challenge is to improve privacy management features design. To overcome this challenge, the adaptation of privacy-related theories offers a concrete way to comprehend and analyze how the privacy management features are used as tangible research results that facilitate user and system developer in understanding privacy management. This paper attempt to propose a standardized privacy management features in geosocial networking application from market perspectives that could be utilized by researchers and application developers to demonstrate or measure privacy management features. The objective of this paper is two-fold: First, to map the theoretical constructs guided by Communication Privacy Management (CPM) theory into privacy management features in geosocial networking application. Second, to evaluate the reliability of the proposed features using content analysis. Content analysis is performed on 1326 geosocial networking apps in the market (Google Play store and App Store) to determine the reliability of the proposed privacy management features through inter-coder reliability analysis. The primary findings of the content analysis show that many of the privacy management features with low reliability are from Boundary Turbulence construct. Furthermore, only 6 out of 13 proposed features are deemed reliable, namely, specific grouping, visibility setting, privacy policy, violation, imprecision and inaccuracy. The proposed privacy management features may aid researchers and system developers to focus on the best privacy management features for improving geosocial networking application design.
Authors and Affiliations
Syarulnaziah Anawar, Yeoh Wai Hong, Erman Hamid, Zakiah Ayop
An Improved Scheme on Morphological Image Segmentation Using the Gradients
An improved scheme for contour detection with better performance measure has been proposed. It is based on the response of human visual system during visualization of any type of an image. The scheme consisted of two par...
Stabilizing Average Queue Length in Active Queue Management Method
This paper proposes the Stabilized (DGRED) method for congestion detection at the router buffer. This method aims to stabilize the average queue length between allocated minthre_shold and doublemaxthre_shold positions to...
A Simple and Reliable Method for the Evaluation of the Exposed Field Near the GSM Antenna
The objective of this paper is to present a simple, accurate and very efficient method for the evaluation of the field in the vicinity of GSM antennas of the radio base-station in urban areas. The method is based on the...
Mining Interesting Positive and Negative Association Rule Based on Improved Genetic Algorithm (MIPNAR_GA)
Association Rule mining is very efficient technique for finding strong relation between correlated data. The correlation of data gives meaning full extraction process. For the mining of positive and negative rules, a var...
MITIGATING BLACK HOLE ATTACK IN MANET BY EXTENDING NETWORK KNOWLEDGE
The Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Network. It operates as a table driven, proactive protocol. The core of the OLSR protocol is the selection of Multipoint Relays (MPRs), used as a f...