Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet207/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   203   204   205   206   207   208   209   210   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

National culture
impacts user expectations as well as usage behaviors. 
Comparing, for instance, US, Korean and Chinese users, 
Ji et al. (2010)
 found that 
individuals from Korea and China use social networking sites as a tool to search for 
experts to obtain advice for important decisions and for emotional support. US users 
are interested rather in the formation of relationships, in which the sharing of content 
plays an important role. The link between content sharing and relationships was not 
found for Korean and Chinese users. Comparing US students with German students 
further suggests that US students are more likely to post problematic behaviors such 
as substance abuse or sexual content on their Facebook page (
Karl et al., 2010
).
Minority status impacts behaviors too, as members of minority groups tend to use 
social media more commonly for occupational than private purposes, while members 
of a majority group are more interested in the social potential of social media (i.e., 
chatting and personal relations with family and friends) (
Mesch, 2012
). Minority 
groups also seem less willing to use social media services offered by the police 
(
Bayerl et al., 2014
).
These are clear indications that online behavior is shaped by demographics as 
well as national contexts and their cultural norms and standards. These differences 
are relevant when LEAs try to engage with disparate user groups as well as for better 
understanding of the disparities of online information provided by users.
Attitudes towards services or people
. Generally speaking, trust precedes infor-
mation sharing. The more people trust another person, the more willing they are to 
grant even intrusive information requests, at least if they feel that the interaction will 
remain private (
Joinson et al., 2010
). If the communication partner is trusted, sensi-
tive information is provided even in a situation where privacy is low (
Joinson et al., 
2010
). Online trust can go so far that even pretending to be a friend can be enough to 
bring users to divulge personal information (
Jagatic et al., 2007
). The central role of 
trust is also relevant for the engagement of LEAs with individuals on social media, 
as user's willingness to engage is linked to their trust in the organization with which 
they are engaging (
Bayerl et al., 2014
).



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   203   204   205   206   207   208   209   210   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish