- Privacy, Security, and Data Protection
- Technology Adoption and User Behaviour
- Sexuality, Behavior, and Technology
- Privacy-Preserving Technologies in Data
- Digital Marketing and Social Media
- Social Media and Politics
- Impact of Technology on Adolescents
- Child Development and Digital Technology
- Cybercrime and Law Enforcement Studies
- Information and Cyber Security
- Sharing Economy and Platforms
- Ethics and Social Impacts of AI
- Internet Traffic Analysis and Secure E-voting
- Customer Service Quality and Loyalty
- Digital Platforms and Economics
- Bullying, Victimization, and Aggression
- Consumer Behavior in Brand Consumption and Identification
- Advanced Malware Detection Techniques
- Consumer Retail Behavior Studies
- Industrial Technology and Control Systems
- Access Control and Trust
- Collaboration in agile enterprises
- Spam and Phishing Detection
- Knowledge Management and Sharing
- Conflict Management and Negotiation
American University
2018-2024
Hebei Finance University
2024
University of Technology Sydney
2024
Henan University of Technology
2008-2024
University of Florida
2023-2024
Beijing Jiaotong University
2024
Hoseo University
2023
Sichuan University
2020
Pennsylvania State University
2009-2018
Beijing University of Posts and Telecommunications
2016
Location-based services (LBS) use positioning technologies to provide individual users with reachability and accessibility that would otherwise not be available in the conventional commercial realm. While LBS confer greater connectivity personalization on consumers, they also threaten users' information privacy through granular tracking of their preferences, behaviors, identity. To address concerns context, this study extends calculus model explore role delivery mechanisms (pull push)...
Organizational information practices can result in a variety of privacy problems that increase consumers’ concerns for privacy. To explore the link between individuals and organizations regarding privacy, we study how institutional assurances such as policies industry self-regulation contribute to reducing individual concerns. Drawing on Communication Privacy Management (CPM) theory, develop research model suggesting an individual’s form through cognitive process involving perceived risk,...
Since the textual contents on online social media are highly unstructured, informal, and often misspelled, existing research message-level offensive language detection cannot accurately detect content. Meanwhile, user-level offensiveness seems a more feasible approach but it is an under researched area. To bridge this gap, we propose Lexical Syntactic Feature (LSF) architecture to content identify potential users in media. We distinguish contribution of pejoratives/profanities obscenities...
Four studies support the development and validation of a framework for understanding range social psychological outcomes valued subjectively as consequences negotiations. Study 1 inductively elicited coded elements subjective value among students, community members, practitioners, revealing 20 categories that theorists in 2 sorted into 4 underlying subconstructs: Feelings About Instrumental Outcome, Self, Negotiation Process, Relationship. 3 proposed new Subjective Value Inventory (SVI)...
This study seeks to clarify the nature of control in context information privacy generate insights into effects different assurance approaches on context-specific concerns for privacy. We theorize that such are exhibited through mediation by perceived over personal and develop arguments support interaction involving (individual self-protection, industry self-regulation, government legislation). test research model location-based services using data obtained from 178 individuals Singapore. In...
The effect of situational factors is largely ignored by current studies on information privacy. This paper theorized and empirically tested how an individual's decision-making disclosure driven competing benefits risk factors. results this study indicate that, in the context e-commerce transaction with unfamiliar vendor, result influences exchange two types privacy beliefs (privacy protection belief belief). In addition, monetary rewards dependent upon fairness exchange. Monetary could...
The emergence of mobile communication and positioning technologies has presented advertisers marketers with a radically innovative advertising channel: Location-Based Advertising (LBA). Despite the growing attention given to LBA, little is understood about differential effects text multimedia formats on consumer perceptions behaviours. This exploratory study empirically examines advertisements vis-a-vis text-based behaviours in simulated LBA environment. A structural model was formulated...
We conducted a structured, qualitative feature analysis of 75 Android mobile apps designed for the purpose promoting adolescent online safety. Through this we identified 42 unique features that mapped to theoretically derived conceptual framework teen safety strategies balanced between parental control (through monitoring, restriction, and active mediation) self-regulation self-monitoring, impulse control, risk-coping). found strongly favored promote through monitoring restricting teens'...
We cannot fully protect adolescents from experiencing online risks; however, we can aim to better understand how risk experiences impact teens, factors that contribute or prevent teens exposure risk, as well psychological harm in spite of exposure. Through a web-based survey study 75 the US, develop and empirically validate theoretical model adolescent resilience presence risks. show evidence is key factor protecting risks, even when exhibit high levels Internet addiction. Resilience also...
Through an empirical, secondary analysis of 588 teens (ages 12 - 17) and one their parents living in the USA, we present useful insights into how parental privacy concerns for different mediation strategies (direct intervention versus active mediation) influence teen risk-taking risk-coping behaviors social media. Our results suggest that use direct by itself may have a suppressive effect on teens, reducing exposure to online risks but also ability engage with others learn effectively cope...
In our study, 68 teens spend two months reflecting on their weekly online experiences and report 207 separate risk events involving information breaches, harassment, sexual solicitations, exposure to explicit content. We conduct a structured, qualitative analysis characterize the salient dimensions of experiences, such as severity, level agency, coping strategies, whether felt like situation had been resolved. Overall, we found that can potentially benefit from lower situations, which allow...
Little research examines the privacy threats associated with use of third-party apps on Facebook. To address this gap in literature, we systematically study apps' current practices for notice and consent by: i) collecting data from 1800 most popular Facebook to record their collection concerning users friends, ii) developing our own app conduct a number tests identify problems that exist design authentication dialogs these problems, propose two new interface designs to: increase user control...
Abstract Online Social Networks (OSNs) facilitate the creation and maintenance of interpersonal online relationships. Unfortunately, availability personal data on social networks may unwittingly expose users to numerous privacy risks. As a result, establishing effective methods control maintain within these OSNs have become increasingly important. This research extends current access mechanisms employed by protect private information shared among OSNs. The proposed approach presents system...
The increasing popularity of the Internet and social media is creating new unique challenges for parents adolescents regarding boundaries between parental control adolescent autonomy in virtual spaces. Drawing on developmental psychology C ommunication P rivacy M anagement ( CPM ) theory, we conduct a qualitative study to examine challenge concern online safety teens' desire independently regulate their own experiences. Analysis 12 parent–teen pairs revealed five distinct challenges: (a)...