COMPUTATIONAL BIG MODEL-BASED STUDY OF PRIVACY PROTECTION MECHANISMS AND PROBLEMATIC USAGE BEHAVIOUR IN DIGITAL MEDIA
Volume 6, Issue 3, Pp 44-51, 2024
DOI: 10.61784/jcsee3018
Author(s)
Jin Lu1, Ji Li2*
Affiliation(s)
1Guangdong Key Laboratory of Big Data Intelligence for Vocational Education, Shenzhen Polytechnic University, Shenzhen 518000, Guangdong, China.
2Research Management Office, Shenzhen Polytechnic University, Shenzhen 518000, Guangdong, China.
Corresponding Author
Ji Li
ABSTRACT
With the rapid development of information technology, digital media has become an important part of people's daily lives. From social media to online shopping, from cloud computing to artificial intelligence, digital media not only greatly enriches people's lifestyles, but also brings unprecedented data privacy protection challenges. In particular, the wide application of computational big models (e.g., deep learning models, natural language processing models, etc.) has further exacerbated the complexity of data privacy protection. This paper aims to explore the privacy protection mechanism of digital media based on computational big models and analyse the resulting problematic use behaviour, with a view to providing references for research and practice in related fields, delving into the development of the convergence of computational big models and digital media, analyzing the manifestation of problematic use behaviors and privacy issues in digital media, exploring the challenges and countermeasures to prevent the privacy issues, and presenting the challenges and countermeasures to prevent privacy issues in digital media privacy protection mechanism under the computational big model. Successful privacy protection experiences and lessons of problematic use behaviors leading to privacy issues are summarized through case studies. Finally, the research results are summarized and future trends and research directions are outlined.
KEYWORDS
Big model; Privacy protection mechanisms; Usage behaviour; Digital media
CITE THIS PAPER
Jin Lu, Ji Li. Computational big model-based study of privacy protection mechanisms and problematic usage behaviour in digital media. Journal of Computer Science and Electrical Engineering. 2024, 6(3): 44-51. DOI: 10.61784/jcsee3018.
REFERENCES
[1] Spiekermann S. Viewpoint The Challenges of Privacy by Design.Communications of the ACM, 2012, 55(7): 38-40.
[2] Bélanger F, Crossler E R,Hiller S J, et al. POCKET: A tool for protecting children's privacy online. Decision Support Systems, 2013, 54(2): 1161-1173.
[3] Berendt B, Günther O, Spiekermann S. Privacy in e-commerce. Communications of the ACM, 2005, 48(4): 101-106.
[4] Degirmenci K. Mobile users’ information privacy concerns and the role of app permission requests. International Journal of Information Management, 2020, 50, 261-272.
[5] Spiekermann S. The challenges of privacy by design. Communications of the ACM, 2012, 55(7): 38-40.
[6] Spiekermann S, Acquisti A, B?hme R, et al. The challenges of personal data markets and privacy. Electronic Markets, 2015, 25(2): 161-167.
[7] Acquisti A, Brandimarte L, Loewenstein G. Privacy and human behavior in the age of information. Science, 2015, 347(6221): 509-514.
[8] Neves J, Turel O, Oliveira T. Privacy concerns in social media use: A fear appeal intervention. International Journal of Information Management Data Insights, 2024, 4(2): 100260-100260.
[9] S. J H , Taylor J P, Kara B, et al. Digital Media and Developing Brains: Concerns and Opportunities. Current Addiction Reports, 2024, 11(2): 287-298.
[10] Ofir T, Hamed S Q, Isaac V. Special Issue: Dark Sides of Digitalization. International Journal of Electronic Commerce, 2021, 25(2): 127-135.
[11] Turel, Qahri-Saremi. Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective. Journal of Management Information Systems, 2016, 33(4): 1087-1116.
[12] M S, M A M, A F, et al. Impact of a targeted direct marketing price promotion intervention (Buywell) on food-purchasing behaviour by low income consumers: a randomised controlled trial. Journal of human nutrition and dietetics: the official journal of the British Dietetic Association, 2017, 30(4): 524-533.
[13] Norman V, Ahlqvist M, Mattsson T. Evaluation of scale invariance in fatigue crack growth in metallic materials. International Journal of Fatigue, 2024, 189, 108545-108545.
[14] D’Ambrosio S, De Pasquale S, Iannone G, et al. Privacy as a proxy for Green Web browsing: Methodology and experimentation. Computer Networks, 2017, 126: 81-99.
[15] Ohme J, Araujo T, Boeschoten L, et al. Digital trace data collection for social media effects research: APIs, data donation, and (screen) tracking. Communication Methods and Measures, 2024, 18(2): 124-141.
[16] Dwivedi Y K, Ismagilova E, Hughes D L, et al. Setting the future of digital and social media marketing research: Perspectives and research propositions. International journal of information management, 2021, 59: 102168.
[17] Stoumpos A I, Kitsios F, Talias M A. Digital transformation in healthcare: technology acceptance and its applications. International journal of environmental research and public health, 2023, 20(4): 3407.
[18] Ahammed M F, Labu M R. Privacy-Preserving Data Sharing in Healthcare: Advances in Secure Multiparty Computation. Journal of Medical and Health Studies, 2024, 5(2): 37-47.
[19] Delaney J, Ghazi B, Harrison C, et al. Differentially Private Ad Conversion Measurement. Arxiv preprint arxiv: 2403. 15224, 2024.
[20] Jain P, Gyanchandani M, Khare N. Big data privacy: a technological perspective and review. Journal of Big Data, 2016, 3(1): 1-25.
[21] Imdad U, Roksana B, S S K. Privacy in targeted advertising on mobile devices: a survey. International journal of information security, 2022, 22(3): 31-32.
[22] Aridor G, Che Y K. Privacy Regulation and Targeted Advertising: Evidence from Apple's App Tracking Transparency. 2024.
[23] Borenstein B E, Taylor C R. The effects of targeted digital advertising on consumer welfare. Journal of Strategic Marketing, 2024, 32(3): 317-332.
[24] Ran H. Improved content recommendation algorithm integrating semantic information. Journal of Big Data, 2023, 10(1).
[25] Pan Y, Wang M, Lu L, et al. Scan-to-graph: Automatic generation and representation of highway geometric digital twins from point cloud data. Automation in Construction, 2024, 166, 105654-105654.
[26] J. M R. Signals and Images: Advances and Results in Speech, Estimation, Compression, Recognition, Filtering, and Processing. Photogrammetric Engineering & Remote Sensing, 2020, 86(2): 77-78.
[27] Bartoletti I, Plantié S, Sambodaran A. Security and privacy risks in the blockchain ecosystem. Cyber Security: A Peer-Reviewed Journal, 2019, 3(3): 195-207.
[28] Jia W, Guangbin W, Heng L, et al. Intelligent Construction Activity Identification for All-Weather Site Monitoring Using 4D Millimeter-Wave Technology. Journal of Construction Engineering and Management, 2024, 150(11).
[29] Zhu R, Srivastava A, Sutanto J. Privacy-deprived e-commerce: the efficacy of consumer privacy policies on China's e-commerce websites from a legal perspective. Information Technology & People, 2020, 33(6): 1601-1626.
[30] Watson J, Lacey D, Kerr D, et al. Understanding the effects of compromise and misuse of personal details on older people. Australasian Journal of Information Systems, 2019, 23.
[31] Kani-Zabihi E, Helmhout M. Increasing service users’ privacy awareness by introducing on-line interactive privacy features//Information Security Technology for Applications: 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers 16. Springer Berlin Heidelberg, 2012: 131-148.
[32] Bilal A. Rise of technomoral virtues for artificial intelligence-based emerging technologies’ users and producers: threats to personal information privacy, the privacy paradox, trust in emerging technologies, and virtue ethics. 2022.