We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
In the space of a single generation, social media have transformed how billions of people make friends, build communities, and share knowledge. However, approaches that suggest harm occurs based solely on time spent using social media disguise this everyday reality. In response, this chapter points toward the importance of understanding who uses social media in daily life, why, and how. While we have more data than ever to help us explore the impacts of new technologies, including social media, everyday experiences require description alongside careful theorizing about the mechanisms that might cause benefits or harms. This collectively shifts research priorities towards applied applications that can mitigate problems, injustices, and inequalities that social media and other digital cultures can foster.
Much of the research discussed previously will have relied on participants consenting to have data collected from their smartphone. However, smartphones continue to pose an inherent security risk within and beyond research. They also provide ways in which criminals can operate and communicate across larger networks. Despite the majority of devices holding large quantities of personal information, many people continue to ignore advice when it comes to securing their device. This is particularly problematic when it comes to carrying out tasks on unsecured networks. Malware can also gain access to a smartphone and compromise its function.
The popularity of smartphones provide another digital outlet for illegal data capture and this chapter will consider why, despite multiple security concerns, the majority of smartphone users and even large organisations are unable to recognise the importance of developing sound security practices. A second stand considers how psychologists and software developers are attempting to improve the security of existing devices and encourage security focused beahviours. While data in the digital age can be tremendously valuable for research purposes, developing good practice remains essential when developing software that collects sensitive data from smartphones and associated devices.
Recommend this
Email your librarian or administrator to recommend adding this to your organisation's collection.