{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:02:26Z","timestamp":1754157746751,"version":"3.41.2"},"reference-count":45,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T00:00:00Z","timestamp":1353628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of the paper is to draw a new map confronting the issue of privacy in the new media age in general, and in the State of Israel in particular.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper presents an in\u2010depth review based on professional literature covering the topics of privacy, new media, social networks, and Israel. The paper considers all citizens of Israel (both Jewish and non\u2010Jewish), the vast majority (over 80 percent), however, of which are Jewish.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The study has found that even though Israeli social network users may be aware of online privacy issues, their adoption of online sharing and exposure, while partly due to third person effect, is to a great extent a reflection of the Israeli collective ethos which emphasises the importance of community and emotional and material sharing.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The study proposes a new classification of privacy exposures and violations by analyzing the nature of privacy violations inherent in the new media. The paper then discusses the unique cultural and normative manifestations of this issue in Israeli society.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779961211285908","type":"journal-article","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T05:18:38Z","timestamp":1353561518000},"page":"288-304","source":"Crossref","is-referenced-by-count":5,"title":["Privacy in new media in Israel"],"prefix":"10.1108","volume":"10","author":[{"given":"Yuval","family":"Karniel","sequence":"first","affiliation":[]},{"given":"Amit","family":"Lavie\u2010Dinur","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021220280737100_b3","doi-asserted-by":"crossref","unstructured":"Acquisti, A. and Gross, R. (2006), Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook, Carnegie Mellon University (PET), Pittsburgh, PA, pp. 17\u201022.","DOI":"10.1007\/11957454_3"},{"key":"key2022021220280737100_b4","unstructured":"Ahonen, T. (2008), Mobile as 7th of the Mass Media: Cellphone, Cameraphone, iPhone, Smartphone, Futuretext, London."},{"key":"key2022021220280737100_b5","doi-asserted-by":"crossref","unstructured":"Almog, O. (2000), The Sabra: The Creation of the New Jew, University of California Press, Berkeley, CA, pp. 226\u201033.","DOI":"10.1525\/california\/9780520216426.003.0008"},{"key":"key2022021220280737100_b6","doi-asserted-by":"crossref","unstructured":"Avraham, E. and First, A. (2003), \u201c\u2018I buy American\u2019: the American image as reflected in Israeli advertising\u201d, Journal of Communication, Vol. 53 No. 2, pp. 282\u201099.","DOI":"10.1111\/j.1460-2466.2003.tb02591.x"},{"key":"key2022021220280737100_b7","doi-asserted-by":"crossref","unstructured":"Bailey, F.G. (1991), The Prevalence of Deceit, Cornell University Press, Ithaca, NY, pp. 66\u2010125.","DOI":"10.7591\/9781501741128"},{"key":"key2022021220280737100_b8","doi-asserted-by":"crossref","unstructured":"Baruh, L. (2007), \u201cRead at your own risk: shrinkage of privacy and interactive media\u201d, New Media Society, Vol. 9 No. 2, pp. 187\u2010211.","DOI":"10.1177\/1461444807072220"},{"key":"key2022021220280737100_b9","unstructured":"Berkowitz, S.D. (1982), An Introduction to Structural Analysis: The Network Approach to Social Research, Butterworth, Toronto."},{"key":"key2022021220280737100_b11","unstructured":"Birnhack, M. (2010), \u201cUnmasking anonymous users online\u201d, Hukim Journal on Legislation, Vol. 2, December 17, pp. 125\u20106."},{"key":"key2022021220280737100_b10","unstructured":"Birnhack, M. and Elkin\u2010Koren, N. (2009), \u201cDoes law matter online? Empirical evidence on privacy law compliance\u201d, Social Science Research Network, August, pp. 5\u201046."},{"key":"key2022021220280737100_b12","doi-asserted-by":"crossref","unstructured":"Boyd, D. (2008), \u201cFacebook's privacy trainwreck: exposure, invasion and social convergence\u201d, Convergence: The International Journal of Research into Media Technologies, Vol. 14 No. 1, pp. 13\u201020.","DOI":"10.1177\/1354856507084416"},{"key":"key2022021220280737100_b13","doi-asserted-by":"crossref","unstructured":"Boyd, D. and Ellison, N.B. (2008), \u201cSocial network sites: definition, history and scholarship\u201d, Journal of Computer\u2010Mediated Communication, Vol. 13, pp. 210\u201030.","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"key2022021220280737100_b14","doi-asserted-by":"crossref","unstructured":"Buchanan, T., Paine, C., Joinson, A.N. and Reips, U. (2007), \u201cDevelopment of measures of online privacy concern and protection for use on the internet\u201d, Journal of the American Society for Information Science and Technology, Vol. 58 No. 2, pp. 157\u201065.","DOI":"10.1002\/asi.20459"},{"key":"key2022021220280737100_b15","doi-asserted-by":"crossref","unstructured":"Caspi, A. and Gorsky, P. (2006), \u201cOnline deception: prevalence, motivation, and emotion\u201d, Cyberpsychology & Behavior, Vol. 9 No. 1, pp. 54\u20109.","DOI":"10.1089\/cpb.2006.9.54"},{"key":"key2022021220280737100_b44","doi-asserted-by":"crossref","unstructured":"DeCew, J.W. (1997), In Pursuit of Privacy: Law, Ethics and the Rise of Technology, Cornell University Press, Ithaca, NY.","DOI":"10.7591\/9781501721243"},{"key":"key2022021220280737100_b18","unstructured":"Dybwad, B. (2010), \u201cFoursquare beats Yelp and Gowalla in reader poll\u201d, Mashable, January 23, available at: http:\/\/mashable.com\/2010\/01\/23\/poll\u2010foursquare\u2010beats\u2010yelp\u2010and\u2010gowalla."},{"key":"key2022021220280737100_b20","unstructured":"Fitzpatrick, C. (2008), \u201cSt. Lucie teacher: Bikini charter cost me my job\u201d, The Palm Beach Post News, available at: www.palmbeachpost.com\/treasurecoast\/content\/tcoast\/epaper\/2008\/04\/29\/0429fishingteacher.html."},{"key":"key2022021220280737100_b19","unstructured":"Garton, L., Haythornthwaite, C. and Wellman, B. (1997), \u201cStudying online social networks\u201d, Journal of Computer\u2010Mediated Communication, Vol. 3 No. 1, available at: http:\/\/207.201.161.120\/jcmc\/vol3\/issue1\/garton.html."},{"key":"key2022021220280737100_b22","unstructured":"Jones, S. and Fox, S. (2009), Generations Online in 2009, Pew Internet & American Life Project, Pew Research Center, Washington, DC."},{"key":"key2022021220280737100_b100","doi-asserted-by":"crossref","unstructured":"Larose, R. and Rifon, N. (2006), \u201cYour privacy is assured \u2013 of being disturbed: websites with and without privacy seals\u201d, New Media Society, Vol. 8 No. 6, pp. 1009\u201029.","DOI":"10.1177\/1461444806069652"},{"key":"key2022021220280737100_b24","unstructured":"Lavie\u2010Dinur, A. and Karniel, Y. (2010), \u201cPrivacy and fame: privacy cession and exposure techniques in Israel's Big Brother reality program\u201d, unpublished manuscript."},{"key":"key2022021220280737100_b25","unstructured":"Lemelshtrich\u2010Latar, N. and Nordfors, D. (2009), \u201cDigital identities and journalism content\u201d, Innovation Journalism, Vol. 6 No. 7, pp. 10\u201024."},{"key":"key2022021220280737100_b26","doi-asserted-by":"crossref","unstructured":"Lewis, K., Kaufman, J. and Christakis, N. (2008), \u201cThe taste for privacy: an analysis of college student privacy settings in an online social network\u201d, Journal of Computer\u2010Mediated Communication, Vol. 14, pp. 79\u2010100.","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"key2022021220280737100_b27","unstructured":"Lilian, N. (2010), \u201cNot only eavesdropping: trigger happy on communications data\u201d, Ynet, June 28, available at: www.ynet.co.il\/articles\/0,7340,L\u20103912050,00.html."},{"key":"key2022021220280737100_b28","unstructured":"Lipson, N. (2008), \u201cAll Israelis are friends \u2013 on social networks\u201d, Captain Internet, August 7, available at: www.haaretz.co.il\/captain\/spages\/1009248.html."},{"key":"key2022021220280737100_b45","unstructured":"(The) Marker (2010), \u201cThe number of Facebook users that are considering deleting their account doubled\u201d, The Marker, May 16, pp. 10\u201011."},{"key":"key2022021220280737100_b29","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H. (2010), Privacy in Context: Technology, Policy and the Integrity of Social Life, Stanford University Press, Stanford, CA, pp. 120\u201049.","DOI":"10.1515\/9780804772891"},{"key":"key2022021220280737100_b30","unstructured":"O'Dell, J. (2010), \u201cA field guide to using Facebook places\u201d, Mashable, August 19, available at: http:\/\/mashable.com\/2010\/08\/19\/facebook\u2010places\u2010guide."},{"key":"key2022021220280737100_b31","unstructured":"Onn, Y. (2005), Privacy in the Digital Environment, in Elkin\u2010Koren, N. and Birnhack, M. (Eds), Haifa Center of Law and Technology, Haifa, pp. 2\u2010167."},{"key":"key2022021220280737100_b32","doi-asserted-by":"crossref","unstructured":"Papacharissi, Z. (2002), \u201cThe presentation of self in virtual life: characteristics of personal home pages\u201d, Journalism & Mass Communication Quarterly, Vol. 79 No. 3, pp. 643\u201060.","DOI":"10.1177\/107769900207900307"},{"key":"key2022021220280737100_b33","unstructured":"Parag, N. (2010), \u201cTIM February: globes leads financial websites in surfing from work\u201d, Globes, March 10, available at: www.globes.co.il\/news\/article.aspx?did=1000545594&fid=594."},{"key":"key2022021220280737100_b34","unstructured":"Rafaeli, S., Ariel, Y. and Katsman, M. (2009), Online Youth: Internet Use and Shopping Patterns, Research and Economic Administration, Ministry of Industry, Trade and Labor, Jerusalem."},{"key":"key2022021220280737100_b35","unstructured":"Ribak, R. and Lemish, D. (2007), \u201cIsraeli children go on\u2010line\u201d, article presented at the 11th Annual Conference of the Israel Internet Association, Avenue Convention Center, Airport City, Lod, Israel, February."},{"key":"key2022021220280737100_b36","unstructured":"Solove, D. (2007), \u201cI've got nothing to hide and other misunderstandings of privacy\u201d, San Diego Law Review, Vol. 44, p. 745."},{"key":"key2022021220280737100_b37","unstructured":"Turow, J. and Hennessy, M. (2011), \u201cInternet privacy and institutional trust: insights from a national survey\u201d, New Media and Society, pp. 1\u201029 (in press).."},{"key":"key2022021220280737100_b38","unstructured":"Urieli, N. (1989), \u201cThe cultural aspect of cigarette advertisements in Israel\u201d, thesis toward receipt of Masters of Social Sciences, Tel Aviv University, Tel Aviv."},{"key":"key2022021220280737100_b39","unstructured":"Vidal, E. (2010), \u201cNaked to the world\u201d, The Marker, May 26."},{"key":"key2022021220280737100_b40","unstructured":"Warren, C. (2010), \u201cPrivacy group voices concern about Facebook places\u201d, Mashable, August 19, available at: http:\/\/mashable.com\/2010\/08\/18\/aclu\u2010privacy\u2010facebook\u2010places."},{"key":"key2022021220280737100_b41","doi-asserted-by":"crossref","unstructured":"Wasserman, S. and Faust, K. (1994), Social Network Analysis: Methods and Applications, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511815478"},{"key":"key2022021220280737100_b42","unstructured":"Wellman, B. (1988), \u201cStructural analysis: from method and metaphor to theory and substance\u201d, in Wellman, B. and Berkowitz, S.D. (Eds), Social Structures: A Network Approach, Cambridge University Press, Cambridge, pp. 19\u201061."},{"key":"key2022021220280737100_b43","doi-asserted-by":"crossref","unstructured":"Woo, J. (2006), \u201cThe right not to be identified: privacy and anonymity in the interactive media environment\u201d, New Media Society, Vol. 8, pp. 949\u201067.","DOI":"10.1177\/1461444806069650"},{"key":"key2022021220280737100_b1","unstructured":"Ynet (2007), \u201cApproved by law \u2013 authority to monitor internet and cell phone users\u201d, Ynet, December 17, available at: www.ynet.co.il\/articles\/0,7340,L\u20103483670,00.html."},{"key":"key2022021220280737100_b2","unstructured":"Ynet (2010), \u201cTIM survey: most Israelis are members of social networks\u201d, Ynet, January 13, available at: www.ynet.co.il\/articles\/0,7340,L\u20103833872,00.html."},{"key":"key2022021220280737100_frd1","doi-asserted-by":"crossref","unstructured":"Debatin, B., Lovejoy, J.P., Horn, A.\u2010K. and Hughes, B.N. (2009), \u201cFacebook and online privacy: attitudes, behaviors and unintended consequences\u201d, Journal of Computer\u2010Mediated Communication, Vol. 15 No. 1, pp. 83\u2010108.","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"key2022021220280737100_frd2","doi-asserted-by":"crossref","unstructured":"Decrew, J.W. (1997), In Pursuit of Privacy: Law, Ethics and the Rise of Technology, Cornell University Press, Ithaca, NY, pp. 145\u201070.","DOI":"10.7591\/9781501721243"},{"key":"key2022021220280737100_frd3","doi-asserted-by":"crossref","unstructured":"Hoofnagle, C., King, J., Li, S. and Turow, J. (2010), \u201cHow different are young adults from older adults when it comes to information privacy attitudes & policies\u201d, from the World Wide Web (accessed May 12).","DOI":"10.2139\/ssrn.1589864"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779961211285908","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211285908\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211285908\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:21Z","timestamp":1753402401000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/10\/4\/288-304\/218277"}},"subtitle":["How social networks are helping to shape the perception of privacy in Israeli society"],"short-title":[],"issued":{"date-parts":[[2012,11,23]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11,23]]}},"alternative-id":["10.1108\/14779961211285908"],"URL":"https:\/\/doi.org\/10.1108\/14779961211285908","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2012,11,23]]}}}