An Investigation of Smart Applications, Social Relations and Privacy

Total Page:16

File Type:pdf, Size:1020Kb

An Investigation of Smart Applications, Social Relations and Privacy University of Wollongong Research Online University of Wollongong Thesis Collection 2017+ University of Wollongong Thesis Collections 2020 The Privacy Paradox: An Investigation of Smart Applications, Social Relations and Privacy Joanne K. McQuilty Follow this and additional works at: https://ro.uow.edu.au/theses1 University of Wollongong Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorise you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: This work is copyright. Apart from any use permitted under the Copyright Act 1968, no part of this work may be reproduced by any process, nor may any other exclusive right be exercised, without the permission of the author. Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. A court may impose penalties and award damages in relation to offences and infringements relating to copyright material. Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form. Unless otherwise indicated, the views expressed in this thesis are those of the author and do not necessarily represent the views of the University of Wollongong. Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] The Privacy Paradox: An Investigation of Smart Applications, Social Relations and Privacy Joanne K. McQuilty Associate Professor Richard Howson & Associate Professor Brian Yecies This thesis is presented as part of the requirement for the conferral of the degree: Doctorate of Philosophy This research has been conducted with the support of the Australian Government Research Training Program Scholarship University of Wollongong Law, Humanities and the Arts Humanities and Social Enquiry March 2020 1 Abstract Privacy on the internet has increasingly become an issue of grave importance to citizens, businesses and governments alike evidenced in the recent breaches involving Facebook, WhatsApp and WikiLeaks, where large amounts of data have been disseminated to corporate and government entities. The aim of this research is to investigate applications operating through ‘smart’ software that can be specifically referred to as privacy applications and the implications the use of these applications has for user social relations on the internet and beyond. The thesis applies a case study methodology that incorporates a theoretical synergy based on the key components from the work and conceptions of Jean Francois Lyotard, Zygmunt Bauman and Anthony Giddens. This knowledge framework is then used to examine the data collected from surveys, interviews and focus groups. In the end, this thesis will show that the nature of both privacy and social relations differs from how both may be understood beyond the internet and this in turn throws up considerable problematic to moving forward. 2 Acknowledgements Firstly, I owe enormous gratitude to my Supervisor, Associate Professor Richard Howson, who was willing to take on this project with me and who recognised its importance. His guidance and support have been invaluable and his patience has been unending. I cannot think of a teacher who is more dedicated and generous. Thank you for helping me to regain my life so that I can help others do the same. I am also grateful to Associate Professor Brian Yecies for helping me to develop and introduce my three privacy app categories, sincerely thank you. Importantly, I also owe enormous gratitude to David McQuilty without whose unconditional love and support this thesis would never have been completed. Thank you from the bottom of my heart. Thank you also to Chelsea, Morgan and Genevieve McQuilty who are an unending source of joy and pride in my life and whose support in this project has always been given without question. Finally, I would like to thank my dear school friends, Laura Hens-Vogl and Tanya Plibersek, both of whom have always been such an enormous source of inspiration. I am sincerely blessed to have crossed paths with these two amazing women in my childhood. In addition, I would like to acknowledge that this research has been conducted with the support of the Australian Government Research Training Program Scholarship. 3 Certification I, Joanne Karen McQuilty, declare that this thesis, submitted in fulfilment of the requirements for the degree of Doctor of Philosophy at the University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Joanne K. McQuilty March 2020 4 Table of Contents Page Abstract 2 Acknowledgements 3 Certification 4 Table of Contents 5 Chapter 1: Introduction 10 The Issue of Privacy 11 What are ‘Privacy Apps’? 14 How Do Privacy Apps Operate? 15 Why Research Privacy Apps? 17 Research Hypothesis 18 Three Theorists 19 The Postmodern Perception 21 The Games and Rules of Language 22 The Logic of Fluids 22 Transforming Intimacies and Social Relations 23 What Research Method? 23 Expected Results 24 Chapter Summaries 25 Chapter 2: The Gradual Dismantling of Privacy 30 What is Privacy? 31 Conceptualising Privacy 32 Privacy Defined 33 The Value of Privacy 34 A Review of the Literature on Privacy 34 Individual Types of Privacy 36 Society Types of Privacy 38 5 Four Significant Historical Moments in Privacy 40 Ancient Greek Origins 40 The Public Sphere 41 Forfeiting Privacy 42 Feudal Pros and Cons 44 The ‘Nether World’ Surfaces in Property 45 Women as Objectified and Fixed 47 A Dialectic of Rights and History 48 Controlling Nature – The Right to Privacy 49 The Commons Embodied 50 The Internet and Division 51 The Great Public-Private Shift 52 Emptying Out 53 Concluding Comment 55 Chapter 3: Developing a Privacy Solution 57 What is a Social Relation 58 Social Relations on the Internet 59 Establishing a Privacy Model on the Internet 61 Email 62 Networking 63 Intimacy 64 The Deception of the Serpent 65 What Privacy App Websites Look Like 65 Three Privacy App Categories 67 Online Connect 67 The Snapchat App 68 The Whisper App 68 Activistic 70 The Wickr App 70 The Threema App 71 Offline Connect 72 The Yo App 73 The Cloak App 74 6 Concluding Comment 75 Chapter 4: Methodology – Developing a Theoretical Framework 76 Theory 77 The Modern/Postmodern Divide 77 Theoretical Framework 80 Locating Privacy App Frameworks in the Literature 80 The Dead-End of Privacy 86 Artificial Intimate Relations 89 What the Theoretical Framework Will Do 94 Concluding Comment 94 Chapter 5: Methodology – Method of Data Collection 95 Method 95 Researching Privacy Apps 95 Overcoming Obstacles 96 Representative Sample 97 Case Study 98 Ethical Considerations 98 Methods Used to Collect the Data 99 The Survey 99 App Developers 99 The Semi-Structured Interview 101 Technology Journalists 101 Users 102 Focus Group 103 Users 103 Concluding Comment 104 Chapter 6: The Data Presentation 105 Developer Surveys 105 The Fragmentation of Privacy 106 The Western Pursuit for Privacy 107 Privacy Apps Are Political 107 7 Youth Takes Priority Through Smart Software 108 Doing Time 109 Developers Invite User Feedback 110 Increasing User Engagement 111 Journalists Interviews 112 Only Apps 112 Only Anonymity 113 Only the Internet 114 User Interviews 116 Users Are Establishing Rules 116 Rules About Support 117 Rules About Misrepresentation 119 Rules About Monitoring 120 Segmented Regions 122 Lack of Images 123 User Focus Group 116 Focusing on the High 124 Episodic Encounters 125 The Dilemma of Gaining Trust 126 Rules and Intimate Social Relations 127 Concluding Comment 129 Chapter 7: Analysis 130 Developing a New Privacy 130 Developers 131 Journalists 134 Users Contribute to Privacy Apps 137 Rules About Support 138 Rules About Misrepresentation 140 Rules About Monitoring 142 What the Focus Groups Reveal 144 Concluding Comment 148 8 Chapter 8: Conclusion 149 The Significance of Privacy 150 The Current Sociological Field 152 The Importance of a Case Study Approach 152 Future Policy Development 153 Future Research 154 References 155 Appendix A 177 Appendix B 180 Appendix C 181 Appendix D 182 Appendix E 183 Survey 184 9 Chapter 1 Introduction Privacy on the internet has increasingly become an issue of grave importance to citizens, businesses and governments alike evidenced in the recent breaches involving Facebook (Facebook 2017), WhatsApp (WhatsApp 2018) and WikiLeaks (WikiLeaks 2019), where large amounts of data have been disseminated to corporate and government entities. As a result, internet users increasingly look for ways to access privacy on the internet. However, the internet is an inherently public space and although privacy is often referred to on the internet, it does not appear to be the same thing as privacy as traditionally understood. Nonetheless, in response to such privacy breaches on the internet various types1 of privacy software have been regularly released with privacy applications (apps)2 being the most recent version of privacy available on the internet. Yet where users pursue privacy on the internet through the use of ‘smart’ software, this creates a whole new set of issues surrounding privacy. At its most fundamental privacy is understood to be that which is hidden or withheld from public view, however as will become apparent in the thesis, privacy also seems to operate in a way that is more complex than this. Here privacy is addressed in terms of the various discourses surrounding privacy as well as the various ways that privacy may be conceptualized, defined and valued (Rossler 2004, pp2-11). These ideas are discussed in further detail in Chapter Two.
Recommended publications
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Safety Activity Checkpoints (SAC)
    1 GSUSA 2021 Edition Safety Activity Checkpoints Change Memo – Important Updates to 2021 Edition The 2021 Edition of GSUSA’s Safety Activity Checkpoints has been updated to reflect the following changes as outlined in this three-page memo. National guidelines are developed in collaboration with the Girl Scout Council Safety Activity Checkpoints Task Team which includes a balanced regional representation as well as in-depth expertise and experience in the areas of Girl Scout programs, safety, and risk management. Standard Safety Guidelines. GSUSA’s Standard Safety Guidelines (formerly titled “Girl Scout Activity Safety Standards & Guidelines”) are located on pages 4 - 22 and apply to all Girl Scout activities including: troop meetings, day trips, special events, camp, travel, and product program. Accordingly, a link under each activity chapter has been added to direct volunteers to the Standard Safety Guidelines section. Within the Standard Safety Guidelines (p. 4 - 22) are the following updates: Adult Supervision. Further emphasizes the long-standing Girl Scout rule of at least two registered and approved, unrelated Girl Scout volunteers, one of whom is female. Examples of unrelated are provided as: not a sibling, spouse, domestic partner, parent, child, or anyone who would be considered a family member, and who do not live in the same residence. This rule applies to all Girl Scout gatherings and is mandatory whenever girls meet, whether in person or virtually. It is recommended that councils advise troops and parents of this requirement so that the council can be alerted if the supervision is not meeting this requirement. Activities not Listed in Safety Activity Checkpoints.
    [Show full text]
  • Being an Advocate for Substance Abuse Treatment and Prevention
    Being an Advocate for Substance Abuse Treatment and Prevenon—Time for New Strategies Andrew Kessler Slingshot Solutions, LLC NCAD 2013 Anaheim, CA September 21, 2013 FOUNDED AND PRODUCED BY THE PUBLISHERS OF IN CONJUNCTION WITH IN ASSOCIATION WITH Introductions all around! • Andrew Kessler, J.D. • Slingshot Solu6ons, LLC • Incorporated in 2008 • Clients include IC&RC, CAADAC/ CFAAP, Strategic Applicaons Internaonal, Naonal Council on Problem Gambling Who am I? Why am I here? • To learn about the environment we are currently in • To learn about how substance abuse is viewed by policy makers • To take what we learn and apply it to effec6ve advocacy strategies • (All in 60 minutes!) What is an expert? • Webster’s: “having, involving, or displaying special skill or knowledge derived from training or experience.” • Court of law: “a person who is a specialist in a subject, oZen technical, who may present his/ her expert opinion” • Newsflash- I’m not the only expert in this room… We need you to be leaders • If the experts do not lead, who will? (That’s a rhetorical ques6on…) • This is a complex issue that will require guidance and paence. If you’re looking for overnight results, you can leave now. • I mean it. • Get ready to go outside your comfort zone • This is not about a step by step, easy to use formula. Developing that will take months if not years. We only have an hour. • This is about learning what is going on outside our world of treatment and preven6on, what is going on in the rest of the world of advocacy, and learning to operate in that world • This is about the landscape we are working in, and why our strategies need to change.
    [Show full text]
  • 2020 Safety Activity Checkpoints 2021 Edition @ April 1, 2021
    - 2020 SAFETY ACTIVITY CHECKPOINTS 2021 EDITION @ APRIL 1, 2021 1 Table of Contents Introduction .................................................................................................................................................. 4 Standard Safety Guidelines .......................................................................................................................... 4 Coronavirus Safety in Girl Scouts ................................................................................................................. 7 Have an Emergency Action Plan (EAP)......................................................................................................... 8 Understanding Which Activities Are Not Permitted ....................................................................................... 12 Chartered Aircraft Trips and Aviation........................................................................................................... 14 Other Actions Girls and Volunteers Should Not Take ................................................................................... 14 First Aid ..................................................................................................................................................... 14 Overall Health, Well Being and Inclusivity.................................................................................................... 17 Transporting Girls .....................................................................................................................................
    [Show full text]
  • AURI JAYA Ð CEO JPNN.Com 2 MEDIA FLOWCHART
    1 WEBINAR Regulasi Negara Dalam Menjaga Keberlangsungan Media Mainstream Di Era Disrupsi Medsos Kamis, 04 Februari 2021 AURI JAYA – CEO JPNN.com 2 MEDIA FLOWCHART Alur operasional bisnis media SHARE & CONTENT DISTRIBUTION Penyebaran dan distribusi konten ke Media memproduksi konten berbagai platform yang banyak artikel, audio atau video digunakan pembaca AUDIENCE TRAFFIC SOURCE MONETIZE Media mendapatkan pengunjung/pembaca Memperoleh pendapatan dari hasil yang berasal dari berbagai sumber penjualan konten atau iklan 3 TRAFFIC SOURCE Kategori sumber pengunjung yang mendistribusikan konten Search Pengunjung yang berasal dari search engine Social Pengunjung yang berasal dari media sosial Refferal Pengunjung yang berasal dari referensi website lain / agregator Direct Pengunjung yang langsung membuka halaman website TRAFFIC SOURCE LIST 4 Daftar sumber pengunjung berdarkan jenis platformnya Search Social Referral Pengunjung yang berasal dari search Pengunjung yang berasal dari media Pengunjung yang berasal dari engine sosial referensi website lain / agregator Ø Google Ø Facebook Ø Google News Ø Microsoft Bing Ø Twitter Ø BaBe Ø Yahoo Ø Instagram Ø Line Today Ø Baidu Ø Youtube Ø UC News Ø Yandex Ø WhatsApp Ø Flipboard Ø DuckDuckGo Ø Telegram Ø MSN Ø Ask.com Ø TikTok Ø Zend Yandex Ø Aol.com Ø Pinterest Ø Opera Ø … Dll Ø … Dll Ø … Dll 5 MONETIZE Sumber penghasilan media saat ini TRADISIONAL PROGRAMMATIC ADS VS ADS 6 TRADITIONAL VS PROGRAMMATIC Proses negosiasi pemasangan iklan model tradisional cukup Programmatic ad menjalankan suatu algoritma untuk memakan waktu dan biaya. Advertiser dan publisher harus mengumpulkan dan mengevaluasi data sehingga dapat bertemu untuk bernegosiasi harga iklan yang akan dipasang menentukan siapa dan dimana iklan akan ditampilkan Penetapan harga didapatkan dari hasil dinegosiasikan langsung Programmatic menggunakan proses yang dinamakan real-time antara advertiser dan publisher.
    [Show full text]
  • Facebook Fake News in the Post -Truth World
    9-717-473 REV: SEPTEMBER 14, 2 0 1 7 JOHN R. WELLS CAROLE A. WINKLER Facebook Fake News in the Post -Truth World Our mission is to make the world more open and connected. — Mark Zuckerberg1 Introduction In January 2017, Mark Zuckerberg, founder and CEO of Facebook was surrounded by controversy. The election of Donald Trump as the next President of the United States on November 8, 2016 had triggered a national storm of protests, and many put the blame at the door of fake news stories served up on Facebook’s Trending News Feed.2 Facebook had launched the service in January 2014 to deliver news stories that might be of interest to Facebook users, in addition to the automatic News Feed that told them what was going on in their social network. Individuals could select items that they were interested in, but an algorithm served up news items that might appeal based on past reading habits and those of their close friends.3 The argument against Facebook was that this process polarized public opinion, fueled prejudices and encouraged the bitter partisan character of the election campaign.4 Some claimed that fake news, propagated through News Feed, supported the rise of anti-establishment sentiments amongst groups that felt left behind by the establishment elite.5 Zuckerberg was unapologetic. On November 10, 2016 he had commented, “Personally I think the idea that fake news on Facebook, which is a very small amount of the content, influenced the election in any way — I think is a pretty crazy idea.”6 He argued that fake stories were posted on both sides of the political spectrum.
    [Show full text]
  • Summaries and Best Practices
    Dartmouth College FY 16 Club and Group Activities Report (CGAR) Summaries and Best Practices Alumni Relations – Communities [email protected] (603) 646-3497 1. Introduction This is the second year that the Communities Department has provided our club and group volunteers with access to the great ideas, successes, and best practices of over 80 Dartmouth alumni clubs and groups. This information on a range of topics is gleaned from the FY16 CGAR: How to involve more alumni in your organization. Successful initiatives of other clubs and groups. The most unusual or innovative events of other clubs and groups. Ideas for admitted student events, summer send offs, and more. How to have effective communications: email, website, newsletter, etc. Methods to encourage members to pay dues. And 18 other topics! 2. How to Use this Resource The CGAR contains numerous open ended questions that our volunteer leaders answer every year. For 24 of these questions, this resource provides both big picture and detailed information: Overview of 24 topics (page 3) Executive summaries of each question (pages 5 – 12) Detailed responses provided by volunteers for each question (pages 13 – 81) This resource is extensively hyper-linked to make it easy to quickly move from the executive summaries to over 1,600 detailed responses (and vice versa). Each detailed response identifies the club or group that provided the suggestion. To contact a leader from a particular club or group, first visit the AR website where contact information for all clubs and groups is listed. If you cannot find a contact, please contact our office.
    [Show full text]
  • Facebook's Slingshot for Fleeting Posts 17 June 2014, by Barbara Ortutay
    App Watch: Facebook's Slingshot for fleeting posts 17 June 2014, by Barbara Ortutay accidentally released it last week in Apple's app store, giving some vigilant Facebook watchers an early glimpse before the app was removed from the store. Slingshot works with both Apple and Android devices. A Facebook account isn't required. — HOW IT WORKS: After downloading, you can sign up either with a Facebook account or your mobile phone number. You add contacts based on your Facebook friends and phone contacts. Opening the app takes you to its camera, which has a "shoot" button for taking a snapshot and a "selfie" button for, you guessed it, a selfie. After taking a photo, you can type a message of up to This combo made from images provided by Facebook 140 characters on it, or draw a picture. You can shows the company's Slingshot app. After accidentally then send it to some or all of your Slingshot launching the ephemeral messaging app last week, contacts. Facebook says Slingshot is now ready for prime time, and owners of Android or Apple's iOS devices can — UNLIKE SNAPCHAT: download it starting on Tuesday afternoon, June 17, 2014. (AP Photo/Facebook) On Snapchat, people can see a photo sent to them by tapping on it and holding their finger down until it disappears, always within a few seconds. On Slingshot, you can see a message only if you send Facebook is taking another stab at ephemeral one back. Until you do, you'll only see a pixelated mobile messaging with an app called Slingshot.
    [Show full text]
  • Una Propuesta Metodológica Para Estudiar El Impacto De Los Sitios De Nueva Generación En El Periodismo
    Universidad CEU Cardenal Herrera Departamento de Comunicación e Información Periodística Una propuesta metodológica para estudiar el impacto de los sitios de nueva generación en el periodismo TESIS DOCTORAL Presentada por: Helena Albacar Serrano Dirigida por: Dra. Elvira García de Torres Dr. Pablo González-Pola de la Granja Valencia 2017 2 Índice Introducción ........................................................................................................................7 Capítulo 1. Marco Teórico .................................................................................................. 15 1.1. El nuevo entorno comunicativo y su impacto en el periodismo ...................................... 15 1.1.1. Aparición y desarrollo de Internet ...................................................................... 17 1.1.2. La descentralización comunicativa y sus consecuencias .................................... 26 1.1.3. La ruptura del monopolio mediático .................................................................. 35 1.1.4. Contenidos generados por el usuario y su influencia en el periodismo ............. 40 1.2. La primera etapa de los sitios de nueva generación ........................................................ 44 1.2.1. Los portales ......................................................................................................... 44 1.2.2. Los buscadores .................................................................................................... 51 1.2.3. Las redes sociales ...............................................................................................
    [Show full text]
  • Intertwined Development of Business Model and Product Functions for Mobile Applications: a Twin Peak Feature Modeling Approach
    Intertwined Development of Business Model and Product Functions for Mobile Applications: A Twin Peak Feature Modeling Approach? - Technical Report - Sebastian Gottschalk, Florian Rittmeier, and Gregor Engels Software Innovation Lab, Paderborn University, Paderborn, Germany fsebastian.gottschalk,florianr,[email protected] Abstract. Mobile app stores like Apple's AppStore or Google's Play- Store are highly competitive markets for third-party developers want- ing to develop successful applications. During the development process, many developers focus on the multitude of product functions but neglect the business model as an equally important part. This, in turn, raises the question of how we intertwine the business model and product functions during the development process to ensure a better alignment between the two. In our paper, we show this intertwined development by adapt- ing the concept of Twin Peaks to the business model and product func- tions. Based on feature modeling as an abstraction layer, we introduce the concept of a Business Model Decision Line (BMDL) to structure the business model decisions and their relation to product functions struc- tured in a Software Product Line (SPL). The basis of our feature models is the analysis of top listed applications in the app stores of Apple and Google. To create and modify both models, we provide an incremental feature structuring and iterative feature selection process. In this technical report, we show the intermediate domain engineering steps of our BMDL and SPL together with detailed decision options. Moreover, we explain the building blocks of the BMDL which are miss- ing in our research paper and show their validity based on streaming applications.
    [Show full text]
  • Valens Research White Papers – the Impact of Capitalizing R&D
    Valens Research White Papers – The Impact of Capitalizing R&D | September 8, 2016 Valens Research R&D Is an Investment, Not an Expense – How capitalizing R&D impacts 917 284 6008 understanding corporate profitability (GILD, FB, BA, DHR) In several recent Seeking Alpha articles Valens has posted, questions about R&D Rob Spivey capitalization and R&D investment have come up in the comments section. As such, Managing Director we felt it was worth writing a post about this issue, the theoretical underpinnings 917 284 6008 behind it, and how this impacts companies. Angelica Lim In this article, we highlight the impact of these adjustments for companies such as Research Director Facebook (FB), Gilead Sciences (GILD), Boeing (BA), and Danaher (DHR). Throughout 646 453 7861 the article we provide links so that you can see more about how the companies look Kyle Pinkerton after we adjust the financial statements. To be able to see how company analysis Analyst looks when you make this and other key adjustments to clean up the financial 917 284 6008 statements, and get a better picture of corporate profitability and valuations, click here. To read more about our adjustments, click here, and to understand how we think about analyzing companies, click here. [email protected] The Problem – Should R&D be treated as an expense or an investment? The problem with Generally Accepted Accounting Principles (GAAP) is that they create inconsistencies when comparing one company to another, and can distort a company ’s true historical profitability. By making adjustments, we aim to remove the Valens Research App financial statement distortions and miscategorizations of GAAP.
    [Show full text]
  • Preliminary Evidence of Brand Acquaintancing on Snapchat
    Marketing Intelligence & Planning Preliminary evidence of brand acquaintancing on Snapchat Hemant Sashittal, Avan Jassawalla, Article information: To cite this document: Hemant Sashittal, Avan Jassawalla, (2019) "Preliminary evidence of brand acquaintancing on Snapchat", Marketing Intelligence & Planning, Vol. 37 Issue: 2, pp.197-210, https://doi.org/10.1108/ MIP-05-2018-0144 Permanent link to this document: https://doi.org/10.1108/MIP-05-2018-0144 Downloaded on: 02 April 2019, At: 06:21 (PT) References: this document contains references to 64 other documents. To copy this document: [email protected] The fulltext of this document has been downloaded 44 times since 2019* Users who downloaded this article also downloaded: (2019),"An emoji-based metric for monitoring consumers’ emotions toward brands on social media", Marketing Intelligence &amp; Planning, Vol. 37 Iss 2 pp. 211-225 <a href="https://doi.org/10.1108/ MIP-07-2018-0257">https://doi.org/10.1108/MIP-07-2018-0257</a> (2019),"The impact of corporate social responsibility on brand equity", Marketing Intelligence &amp; Planning, Vol. 37 Iss 1 pp. 2-17 <a href="https://doi.org/10.1108/MIP-02-2018-0051">https:// doi.org/10.1108/MIP-02-2018-0051</a> Access to this document was granted through an Emerald subscription provided by Token:Eprints:WWZ8Nfvxc2VxU7tUHPza: For Authors If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission Downloaded by Doctor Hemant Sashittal At 06:21 02 April 2019 (PT) guidelines are available for all.
    [Show full text]