ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
5
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,215
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Privacy perception and protection on Chinese social media: a case study of WeChat
Author(s):
Zhen Troy Chen
,
Ming Cheung
Publication date:
2018
Journal:
Ethics and Information Technology
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Privacy and Data Protection
Author and article information
Journal
DOI::
10.1007/s10676-018-9480-6
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,215
Under this theory, the WeChat ban would be merely collateral damage, as it would be odd to target TikTok without also banning this other popular Chinese-owned app
Authors:
Stuart Emmrich
Managing manipulative and non-cooperative behaviors in large scale group decision making based on a WeChat-like interaction network
Authors:
Shengli Li
,
Rosa Rodríguez
,
Cuiping Wei
Application of dietary evaluation WeChat platform in obese pregnant women's nutrition intervention
Authors:
L Tang
,
C Jian
,
W Yaping
See all similar
Cited by
5
Privacy paradox in mHealth applications: An integrated elaboration likelihood model incorporating privacy calculus and privacy fatigue
Authors:
Mengxi Zhu
,
Chuanhui Wu
,
Shijing Huang
…
Cybervetting job applicants on social media: the new normal?
Authors:
Jenna Jacobson
,
Anatoliy Gruzd
Sentiments and perceptions after a privacy breach incident
Authors:
Chang Boon Lee
,
Hio Nam Io
,
Heng Tang
See all cited by