Lemi Baruh

Lemi Baruh
Koc University · Department of Media and Visual Arts

PhD

About

73
Publications
23,596
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
789
Citations
Introduction
Lemi Baruh currently works at the Department of Media and Visual Arts, Koc University. Lemi does research in Communication and Media, focusing on surveillance and social psychology of privacy and disclosure.
Additional affiliations
September 2011 - December 2015
Koc University
Position
  • Professor (Assistant)
September 2007 - September 2010
Kadir Has University
Position
  • Professor (Assistant)
Education
September 2003 - May 2007
University of Pennsylvania
Field of study
  • Communication
September 2001 - May 2003
University of Pennsylvania
Field of study
  • Communication
September 2001 - May 2003
University of Pennsylvania
Field of study
  • Communication

Publications

Publications (73)
Chapter
Full-text available
Mobile messaging platforms, WhatsApp especially, have come under a great deal of scrutiny for how they can be utilized to spread misinformation through virally forwarded rumors and fake news. This chapter complements technological approaches to addressing the problem by shedding light on the social conditions that shape how users deal with misinfor...
Article
Explaining the spread and impact of health misinformation has garnered considerable attention with the uptake of social media and group messaging applications. This study contributes to that line of work by investigating how reliance on multiple digital media may help support or suppress misinformation belief, and how individual differences in misi...
Preprint
The ways in which privacy is defined, perceived, and enacted are contingent on cultural, social, political, economic, and technological structures. Privacy research, however, is often conducted in settings that do not account for variations in how privacy is perceived and enacted. A comparative perspective explicitly addresses this shortcoming by r...
Article
Based on role congruity theory, we investigated how gender bias may influence public attitudes toward the vaccine in Turkey. Using a between-subjects design, we tested whether an emphasis on the female versus the male scientist as the vaccine’s inventor in a news story influenced attitudes about the BioNTech vaccine and vaccination intentions. Part...
Article
We present two studies testing the validity and nomological properties of the Turkish adaptation of the Big Five Inventory–2 (BFI-2) using a university student sample and a nationally representative community sample of young adults aged 18–35. Findings from the university student sample replicate the psychometric properties of the BFI-2. Findings f...
Article
Full-text available
In a now-classic study by Srull and Wyer (1979), people who were exposed to phrases with hostile content subsequently judged a man as being more hostile. And this “hostile priming effect” has had a significant influence on the field of social cognition over the subsequent decades. However, a recent multi-lab collaborative study (McCarthy et al., 20...
Article
How do press-party parallelism dynamics unfold in media systems that experience competitive authoritarianism? We analyze the content of news coverage of political parties across four consecutive national election campaigns in Turkey (2002, 2007, 2011, and 2015) to track changes in press-party parallelism. We explore three dimensions of press-party...
Article
Recent social movements, as exemplified by the informal organizations formed during and after the Occupy Movement in the United States and Gezi Park Protests in Turkey, are characterized by distrust towards institutional political bodies and hierarchical organizations (Boler et al. 2014). Also, the debate on the relationship between social movement...
Chapter
This chapter provides an overview of the data analysis and visualization steered under “An Urban Deep Map for Integration in Turkey” (UDMIT) project, which uses mobile call data records of Syrian refugees under temporary protection provided by Data for Refugees: The D4R Challenge on Mobility of Syrian Refugees in Turkey (Salah et al. Data for refug...
Article
Full-text available
Social network sites (SNSs) provide users with ample opportunity to share information about themselves and to engage in social browsing to learn about others. This article reports results from two experiments (with participants from the U.S.) that investigate the impacts of breadth and depth of information disclosed in a profile on viewers’ attribu...
Article
We investigate the effects of perceivers’ impressions of others’ personality traits on their social attraction, after a brief encounter face-to-face or via Facebook. We first examine the main effects of perceived personality traits. Next, we compare and contrast the effects of perceived- and actual- personality similarity through polynomial regress...
Article
Full-text available
We provide a causal inference framework to model the effects of machine learning algorithms on user preferences. We then use this mathematical model to prove that the overall system can be tuned to alter those preferences in a desired manner. A user can be an online shopper or a social media user, exposed to digital interventions produced by machin...
Article
Full-text available
This meta-analysis investigates privacy concerns and literacy as predictors of use of online services and social network sites (SNSs), sharing information, and adoption of privacy protective measures. A total of 166 studies from 34 countries (n=75,269) were included in the analysis. In line with the premise of privacy paradox, privacy concerns did...
Article
Full-text available
The present study investigates the influence of workforce participation on women’s cancer screening behaviors in Turkey. In cultures with predominantly Muslim populations like Turkey, emphasis is typically placed on a woman’s traditional role as a child bearer. Although the impact of workforce participation on women’s welfare has been studied in va...
Article
We introduce an online anomaly detection algorithm, which processes data in a sequential manner. At each time, the algorithm makes a new observation, produces a decision and then adaptively updates all its parameters to enhance its performance. The algorithm mainly works in an unsupervised manner since in most real life applications labeling the da...
Article
Full-text available
Privacy has been identified as a hot button issue in literature on Social Network Sites (SNSs). While considerable research has been conducted with teenagers and young adults, scant attention has been paid to differences among adult age groups regarding privacy management behavior. With a multidimensional approach to privacy attitudes, we investiga...
Conference Paper
In this article, we model the effects of machine learning algorithms on different Social Network users by using a causal inference framework, making estimation about the underlying system and design systems to control underlying latent unobservable system. In this case, the latent internal state of the system can be a wide range of interest of user...
Conference Paper
In this paper, we study multi-class classification of tweets, where we introduce highly efficient dimensionality reduction techniques suitable for online processing of high dimensional feature vectors generated from freely-worded text. As for the real life case study, we work on tweets in the Turkish language, however, our methods are generic and c...
Article
Full-text available
This article looks at how the logic of big data analytics, which promotes an aura of unchallenged objectivity to the algorithmic analysis of quantitative data, preempts individuals’ ability to self-define and closes off any opportunity for those inferences to be challenged or resisted. We argue that the predominant privacy protection regimes based...
Article
Social networking sites offer individuals an opportunity to document and share information about themselves, as well as engaging in social browsing to learn about others. As a micro-blogging site within which users often share information publicly, Twitter may be a particularly suitable venue that can help satisfy both of these motivations. This st...
Article
Full-text available
This article reports findings from two studies regarding the role citizen reporting plays in emergencies. Findings from first study, a content analysis of citizen reporting about the Haiti Earthquake, Gezi Park Protests (Istanbul), Xynthia Storm (Europe) and Boston Bombings, indicates that citizen reporters were predominantly engaging in reporting...
Chapter
In the wake of the quick penetration of mobile devices into the everyday lives of individuals, protection of privacy in mobile ecosystems has become a hot button issue. Existing regulatory efforts on mobile privacy primarily focus on protection of the informational privacy of individuals. While necessary, focusing solely on informational privacy ma...
Article
This study summarizes the development and validation of a multidimensional privacy orientation scale designed for measuring privacy attitudes of Social Network Site (SNS) users. Findings confirm the existence of four dimensions: (1) belief in the value of “privacy as a right”; (2) “other-contingent privacy”; (3) “concern about own informational pri...
Article
This study summarizes the results from a 2 (low vs. high information) × 2 (female vs. male profile) experiment that investigates the impact of quantity of information shared on a Social Network Site (SNS) profile on viewers’ intentions to pursue further interactions with the profile owner. Quantity of information had no statistically significant ef...
Article
The aim of this article is to examine press-party parallelism during the 2011 national elections in Turkey. The article reports findings from a content analysis of 9,127 news articles and editorial columns from fifteen newspapers regarding the trajectory of press-party parallelism over the course of the twelve-week national elections campaign perio...
Conference Paper
Full-text available
The use of social media in a crisis has been applauded, and is witnessing an increase in uptake among those involved in crisis management activities, including citizens. Whilst some challenges have been discussed elsewhere, somewhat lacking is a discussion on the impact of sharing information on the security of those that may have been recorded....
Technical Report
Full-text available
In Task 4.2, entitled “Citizens’ Involvement and Ethics”, COSMIC seeks to examine the opportunities, risks (threats), and ethical issues that are brought about by utilization of new media technologies during crises. Additionally, through this task, COSMIC aims to detail the potential consequences, for individuals and the society, of the threats and...
Technical Report
Full-text available
In Task 4.1, entitled “Citizens’ Involvement in Emergency Communications”, COSMIC seeks to examine the various roles that citizens may have in communications during emergencies. Also, through this task, the partners aimed to map the relationship between the use of different types of media and communication technologies—including mass media, as well...
Article
Full-text available
We use the legal framework of captive audience to examine the Federal Trade Commission’s 2012 privacy guidelines as applied to mobile marketing. We define captive audiences as audiences without functional opt-out mechanisms to avoid situations of coercive communication. By analyzing the current mobile marketing ecosystem, we show that the Federal T...
Chapter
In the wake of the quick penetration of mobile devices into the everyday lives of individuals, protection of privacy in mobile ecosystems has become a hot button issue. Existing regulatory efforts on mobile privacy primarily focus on protection of the informational privacy of individuals. While necessary, focusing solely on informational privacy ma...
Conference Paper
This paper presents the results of an experiment that em- ployed a 2 (low vs. high information) by 2 (male vs. female profile) design to investigate the relationship between amount of information displayed in a Social Network Site (SNS) profile and profile viewers’ intentions to engage in further social interactions (communicate online, add to SNS...
Conference Paper
This paper presents the results of an experiment that employed a 2 (low vs. high information) by 2 (male vs. female profile) design to investigate the relationship between amount of information displayed in a Social Network Site (SNS) profile and profile viewers' intentions to engage in further social interactions (communicate online, add to SNS pr...
Article
On May 31, 2010, Israeli Defense Forces raided the ship Mavi Marmara, part of a six-vessel flotilla aiming to break the Israeli naval blockade of the Gaza Strip and to deliver supplies to Gaza. Using comments posted on Turkish online discussion forums in the aftermath of the raid that resulted in the death of nine passengers, this article analyzes...
Article
Media commentators have frequently argued that the rising popularity of reality programs stems from the show’s ability to accommodate television viewers’ voyeuristic needs. However, extant literature provides inconsistent evidence regarding the relationship between voyeurism and consumption of reality programs. This article expands on work by Baruh...
Chapter
In recent years social media applications, which enable consumers to contribute to the world of online content, have grown in popularity. However, this growth is yet to be transformed into a sustainable commercial model. Starting with a brief overview of existing online advertising models, this chapter discusses the opportunities available for adve...
Chapter
In recent years, social media have become an important avenue for self-expression. At the same time, the ease with which individuals disclose their private information has added to an already heated debate about the privacy implications of interactive media. This chapter investigates the relationship between disclosure of personal information in so...
Chapter
In recent years social media applications, which enable consumers to contribute to the world of online content, have grown in popularity. However, this growth is yet to be transformed into a sustainable commercial model. Starting with a brief overview of existing online advertising models, this chapter discusses the opportunities available for adve...
Chapter
In recent years, social media have become an important avenue for self-expression. At the same time, the ease with which individuals disclose their private information has added to an already heated debate about the privacy implications of interactive media. This chapter investigates the relationship between disclosure of personal information in so...
Chapter
In recent years social media applications, which enable consumers to contribute to the world of online content, have grown in popularity. However, this growth is yet to be transformed into a sustainable commercial model. Starting with a brief overview of existing online advertising models, this chapter discusses the opportunities available for adve...
Article
Full-text available
Given that reality television is not a cohesive genre, a better understanding of the frequently noted voyeuristic appeal of reality programs would require an analysis of content features that may contribute to their voyeuristic appeal. A survey administered to television viewers and a content analysis of reality programs support hypotheses regardin...
Chapter
Full-text available
In recent years social media applications, which enable consumers to contribute to the world of online content, have grown in popularity. However, this growth is yet to be transformed into a sustainable commercial model. Starting with a brief overview of existing online advertising models, this chapter discusses the opportunities available for adve...
Chapter
In recent years, social media have become an important avenue for self-expression. At the same time, the ease with which individuals disclose their private information has added to an already heated debate about the privacy implications of interactive media. This chapter investigates the relationship between disclosure of personal information in so...
Chapter
In recent years social media applications, which enable consumers to contribute to the world of online content, have grown in popularity. However, this growth is yet to be transformed into a sustainable commercial model. Starting with a brief overview of existing online advertising models, this chapter discusses the opportunities available for adve...
Article
This article is a study of three major metaphors organizing nationalistic discourse about Cyprus in two online forums for Turkish university students. The analysis suggests that discussants symbolically warranted their constructions of the future of Cyprus and Turkish Cypriots with metaphors of blood and heroism that emphasized their personal and c...
Article
Full-text available
This article discusses how interactive media threaten informational privacy, especially in a legal environment that fails to protect individuals' right to receive and use content without being scrutinized by private and government institutions.The article observes that as information about media consumption habits make up an increasingly large shar...
Article
Media commentators have offered different explanations for the rising popularity of reality television. One frequently cited hypothesis is that the rising popularity of reality programs can be attributed to their ability to accommodate television viewers' voyeuristic needs. It has also been suggested that the voyeuristic appeal of reality programs...
Article
Full-text available
This article examines the media frames and legislative responses of eighteen states in the United States to the use of racial profiling and a technology of modern policing. Racial profiling is characterized as a troubled technology because of the way in which the use of racial identification as an index of criminality contributes to the cumulative...
Article
Full-text available
Print news stories about genetics convey information to the public. This study assesses the effects of priming a belief in genetic susceptibility to smoking addiction on smokers' inferences about their own susceptibility to smoking addiction, their efficacy to quit smoking, and their intention to get a genetic test for addiction susceptibility. Res...
Article
The proliferation of interactive media has provided corporations with an unprecedented ability to collect information about individuals’ media consumption habits. This ability of corporations is often reinforced by the rhetoric of “consumer sovereignty,” whereby individuals are misled into entrusting a considerable amount of information about their...

Network

Cited By

Projects