Family Vlogging – Good or bad?

AUTHOR Malik Aleem Ahmed ABSTRACT People have been making video logs (vlogs) and putting them online since 2000 (e.g. see Michael 2010). The act of vlogging is not bad in itself. In this paper, I explore if there are special circumstances, which make it harmful? Do designers of such systems have responsibility to see to […]

Social computing for expanding information capabilities of pre-service teachers in developing countries

AUTHOR Malik Aleem Ahmed ABSTRACT Developed countries have been using Information and Communication technologies to improve their education system and delivery. They have been experimenting with the Internet and web tools and systems to improve practicum and internship opportunities and experiences for pre-service and beginning teachers. As in other sectors, developing countries have been lagging […]

Mapping the On-line Privacy Landscape

AUTHOR Alison Adam, Danijela Bogdanovic, Michael Dowd and Eileen Wattam ABSTRACT This paper reflects on some the research methods used in a project on on-line privacy, by one of the project partners. The project is interdisciplinary, involving university, local government and industrial partners. The project is one of three funded through a UK Research Council […]

The Social and Ethical Implications Connected with the Development of Social Networking Websites

AUTHOR Janusz Wielki ABSTRACT Despite the Internet being a relatively new phenomenon, in the case of its business dimension and the impact it has had on the functioning of contemporary organizations, it is the subject of dynamic and permanent change. The first phase of its development was a period when all types of organizations started […]

Privacy and the Public – Perception and Acceptance of Various Applications of ICT

AUTHOR Misse Wester and Per Sandin ABSTRACT This contribution presents the results from a survey study conducted in Sweden. In total, 2010 answers were collected from a representative sample of the Swedish population. The increased usage of novel technical solutions that may require individuals to provide sensitive information about themselves, such as an increase of […]