About
19
Publications
6,804
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
292
Citations
Introduction
Publications
Publications (19)
We use the legal framework of captive audience to examine the Federal Trade Commission’s 2012 privacy guidelines as applied to mobile marketing. We define captive audiences as audiences without functional opt-out mechanisms to avoid situations of coercive communication. By analyzing the current mobile marketing ecosystem, we show that the Federal T...
This study examines the impact of role-based constraints on privacy cynicism within higher education, a workplace increasingly subjected to surveillance. Using a thematic analysis of 15 in-depth interviews conducted between 2017 and 2023 with data stewards in the California State University System, the research explores the reasons behind data stew...
This article looks at how the logic of big data analytics, which promotes an aura of unchallenged objectivity to the algorithmic analysis of quantitative data, preempts individuals’ ability to self-define and closes off any opportunity for those inferences to be challenged or resisted. We argue that the predominant privacy protection regimes based...
In the wake of the quick penetration of mobile devices into the everyday lives of individuals, protection of privacy in mobile ecosystems has become a hot button issue. Existing regulatory efforts on mobile privacy primarily focus on protection of the informational privacy of individuals. While necessary, focusing solely on informational privacy ma...
In the wake of the quick penetration of mobile devices into the everyday lives of individuals, protection of privacy in mobile ecosystems has become a hot button issue. Existing regulatory efforts on mobile privacy primarily focus on protection of the informational privacy of individuals. While necessary, focusing solely on informational privacy ma...
This essay argues that U.S. judicial decisions in obscenity cases at the beginning of the twentieth century reveal a systematic social process of emotion management that supported, in ways not previously recognized, the emotional culture of the middle class and, through it, middle-class status policy. Using a grounded theory analysis on a sample of...
The paper presents a construction of social space in Serbia using multiple correspondence analysis (MCA) on data from a 2005 national survey based on a probability sample of 1364 interviewees. We discuss the theoretical and methodological consequences of a different understanding of the principle of capital composition in comparison with Bourdieu’s...
On May 31, 2010, Israeli Defense Forces raided the ship Mavi Marmara, part of a six-vessel flotilla aiming to break the Israeli naval blockade of the Gaza Strip and to deliver supplies to Gaza. Using comments posted on Turkish online discussion forums in the aftermath of the raid that resulted in the death of nine passengers, this article analyzes...
This article is a study of three major metaphors organizing nationalistic discourse about Cyprus in two online forums for Turkish university students. The analysis suggests that discussants symbolically warranted their constructions of the future of Cyprus and Turkish Cypriots with metaphors of blood and heroism that emphasized their personal and c...
This article is a study of three major metaphors organizing nationalistic discourse about Cyprus in two online forums for Turkish university students. The analysis suggests that discussants symbolically warranted their constructions of the future of Cyprus and Turkish Cypriots with metaphors of blood and heroism that emphasized their personal and c...
This study argues that, to understand the sources of the modern preoccupation with obscenity, we need to understand how claims of harms, constructions of victims and offenders and broader moral governance objectives given by the transition from disciplinarian to risk-based governance articulate in judicial opinion. The study employed grounded theor...
The assumption that the environmental justice movement has always had a distinct identity outside the context of struggle within the legal system is wrong. The identity of this movement emerged gradually through interaction with the actors that contested it, such as the courts, the administrative agencies and the agents of harm. This identity was s...