000696475 000__ 03207cam\a2200481Ii\4500 000696475 001__ 696475 000696475 005__ 20230306135558.0 000696475 006__ m\\\\\o\\d\\\\\\\\ 000696475 007__ cr\cnu|||unuuu 000696475 008__ 140122s2014\\\\sz\a\\\\ob\\\\000\0\eng\d 000696475 020__ $$a9783319024561 $$qelectronic book 000696475 020__ $$a3319024566 $$qelectronic book 000696475 020__ $$z9783319024554 000696475 0247_ $$a10.1007/978-3-319-02456-1$$2doi 000696475 035__ $$aSP(OCoLC)ocn868832520 000696475 035__ $$aSP(OCoLC)868832520 000696475 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dN$T$$dCOO$$dDKDLA$$dIUL 000696475 049__ $$aISEA 000696475 050_4 $$aJC596 000696475 08204 $$a302.23$$223 000696475 1001_ $$aTubaro, Paola,$$eauthor. 000696475 24510 $$aAgainst the hypothesis of the end of privacy$$h[electronic resource] :$$ban agent-based modelling approach to social media /$$cPaola Tubaro, Antonio A Casilli, Yasaman Sarabi. 000696475 264_1 $$aCham :$$bSpringer,$$c2014. 000696475 300__ $$a1 online resource (ix, 57 pages) :$$billustrations. 000696475 336__ $$atext$$btxt$$2rdacontent 000696475 337__ $$acomputer$$bc$$2rdamedia 000696475 338__ $$aonline resource$$bcr$$2rdacarrier 000696475 4901_ $$aSpringerBriefs in Digital Spaces,$$x2193-5890 000696475 504__ $$aIncludes bibliographical references. 000696475 5050_ $$aPart I: Why Privacy is not over yet: Conflicting Attitudes of Users, companies and States -- Part II: Modeling Privacy: Online Social Structures and Data Architectures -- Part III: Discussion and Conclusions 000696475 506__ $$aAccess limited to authorized users. 000696475 520__ $$aSeveral prominent public voices have advanced the hypothesis that networked communications erode the value of privacy in favor of a transparent connected existence. Especially younger generations are often described as prone to live "open digital lives". This hypothesis has raised considerable controversy, polarizing the reaction of its critics as well as of its partisans. But how likely is the "end of privacy"? Under which conditions might this scenario come to be? What are the business and policy implications? How to ethically assess risks and opportunities? To shed light on the co-evolution and mutual dependencies of networked structures and individual and collective strategies towards privacy, this book innovatively uses cutting-edge methods in computational social sciences to study the formation and maintenance of online social networks. The findings confound common arguments and clearly indicate that Internet and social media do not necessarily entail the end of privacy. Publicity is not "the new norm": quite to the contrary, the book makes the case that privacy is a resilient social force, resulting from a set of interconnected behaviors of Internet users. 000696475 588__ $$aDescription based on online resource; title from PDF title page (SpringerLink, viewed November 25, 2013). 000696475 650_0 $$aPrivacy, Right of. 000696475 650_0 $$aSocial media$$xSecurity measures. 000696475 650_0 $$aMultiagent systems. 000696475 7001_ $$aCasilli, Antonio A.,$$d1972-,$$eauthor. 000696475 7001_ $$aSarabi, Yasaman,$$eauthor. 000696475 830_0 $$aSpringerBriefs in digital spaces,$$x2193-5890 000696475 85280 $$bebk$$hSpringerLink 000696475 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-02456-1$$zOnline Access 000696475 909CO $$ooai:library.usi.edu:696475$$pGLOBAL_SET 000696475 980__ $$aEBOOK 000696475 980__ $$aBIB 000696475 982__ $$aEbook 000696475 983__ $$aOnline 000696475 994__ $$a92$$bISE