Search results
1 – 10 of over 1000Athanasios Ntinapogias and George Nikolaidis
Involvement of children in research on different aspects of children's rights, including research on violence against children, is continuously increasing, as is the interest in…
Abstract
Involvement of children in research on different aspects of children's rights, including research on violence against children, is continuously increasing, as is the interest in participatory approaches (European Agency for Fundamental Rights [FRA], 2014; Larsson et al., 2018; UN Committee on the Rights of the Child, 2011). Svevo-Cianci et al. (2011) noted that ‘as researchers commit to learning from community members, including children and adolescents themselves, it has become more clear that an understanding of the lived reality and definition of violence for children in their individual communities, is essential to envision and implement effective child protection’ (p. 985).
In this chapter, the legislative context regarding children's rights to be heard and participate is initially discussed; currently applied age requirements for children to acquire rights across the countries of the European Union (EU) are briefly presented; and children's potential roles and relevant provisions for their participation in social research are explored. The last part is dedicated to the presentation and discussion of the General Data Protection Regulation (GDPR; Regulation [EU] 2016/679, 2016) – specifically, children's personal data–related recitals and articles; the importance of the definition of a legal basis for personal data processing according to the GDPR, including consent; and the necessary information to be provided to children before their data are processed.
Details
Keywords
Christine Prince, Nessrine Omrani and Francesco Schiavone
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…
Abstract
Purpose
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.
Design/methodology/approach
An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.
Findings
The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.
Originality/value
While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.
Details
Keywords
Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe
In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…
Abstract
Purpose
In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.
Design/methodology/approach
Design Science Research (DSR) is the research method implemented in this study.
Findings
General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.
Research limitations/implications
The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.
Practical implications
Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.
Originality/value
The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.
Details
Keywords
Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU…
Abstract
Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU. This chapter discusses the relevance of data protection in the context of security. It shows that data protection has been of particular relevance in the German context – not only against the backdrop of rapidly evolving information technology, but also of the historical experiences with political regimes collecting information in order to oppress citizens.
Details
Keywords
It has become increasingly clear that the objectives of privacy and competition policy are in conflict with one another with regard to platform data. While privacy policies aim at…
Abstract
Purpose
It has become increasingly clear that the objectives of privacy and competition policy are in conflict with one another with regard to platform data. While privacy policies aim at limiting the use of platform data for purposes other than those for which the data were collected in order to protect the privacy of platform users, competition policy aims at making such data widely available in order to curb the power of platforms.
Design/methodology/approach
We draw on Commons' Institutional Economics to contrast the current control-based approaches to ensuring the protection as well as the sharing of platform data with an ownership approach. We also propose the novel category of platform use data and contrast this with the dichotomy of personal/non-personal data which underlies current regulatory initiatives.
Findings
We find that current control- and ownership-based approaches are ineffective with regard to their capacity to balance these conflicting objectives and propose an alternative approach which makes platform data saleable. We discuss this approach in view of its capacity to balance the conflicting objectives of privacy and competition policy and its effectiveness in supporting each separately.
Originality/value
Our approach clarifies the fundamental difference between data markets and other concepts such as data exchanges.
Details
Keywords
Grace Fox, Theo Lynn and Pierangelo Rosati
The General Data Protection Regulation (GDPR) introduces significant data protection obligations on all organizations within the European Union (EU) and those transacting with EU…
Abstract
Purpose
The General Data Protection Regulation (GDPR) introduces significant data protection obligations on all organizations within the European Union (EU) and those transacting with EU citizens. This paper presents the GDPR privacy label and uses two empirical studies to examine the effectiveness of this approach in influencing consumers' privacy perceptions and related behavioral intentions.
Design/methodology/approach
The paper tests the efficacy of two GDPR privacy label designs, a consent-based label and a static label. Study 1 examines the effects of each label on perceptions of risk, control and privacy. Study 2 investigates the influence of consumers' privacy perceptions on perceived trustworthiness and willingness to interact with the organization.
Findings
The findings support the potential of GDPR privacy labels for positively influencing perceptions of risk, control, privacy and trustworthiness and enhancing consumers' willingness to transact and disclose data to online organizations.
Practical implications
The findings are useful for organizations required to comply with the GDPR and present a solution to requirements for transparent communications and explicit consent.
Originality/value
This study examines and demonstrates the efficacy of visualized privacy policies in impacting consumer privacy perceptions and behavioral intentions.
Details
Keywords
Jungran Cho, Byunghee Ahn, Kyoungseo Hong and Inkyo Cheong
As a countermeasure to the COVID-19 pandemic, countries are implementing social distancing and mask-wearing. In this situation, the use of digital devices and untact activities…
Abstract
As a countermeasure to the COVID-19 pandemic, countries are implementing social distancing and mask-wearing. In this situation, the use of digital devices and untact activities are increasing. As a result, domestic and international e-commerce is increasing, and data is growing rapidly. Developed countries with advanced artificial intelligence and big data technologies have been striving to establish international regulations for digital trade in order to create a business environment that is advantageous for their own companies. This paper examines the e-commerce trend since the outbreak of COVID-19 and analyzes major issues related to digital trade rules under discussion. In particular, this paper pointed out that although Korea is recognized to be an advanced country considering its stage of industrial development and income level, the nation maintains the position of developing countries regarding digital trade. Based on this, this paper attempted to draw implications for the development of Korea's digital trade in the post COVID-19 world.
Details
Keywords
Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson
The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…
Abstract
Purpose
The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.
Design/methodology/approach
A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.
Findings
Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.
Practical implications
Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.
Originality/value
The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.
Details
Keywords
Jorge Xavier and Winnie Ng Picoto
Regulatory initiatives and related technological shifts have been imposing restrictions on data-driven marketing (DDM) practices. This paper aims to find the main restrictions for…
Abstract
Purpose
Regulatory initiatives and related technological shifts have been imposing restrictions on data-driven marketing (DDM) practices. This paper aims to find the main restrictions for DDM and the key management theories applied to investigate the consequences of these restrictions.
Design/methodology/approach
The authors conducted a unified bibliometric analysis with 104 publications retrieved from both Scopus and Web of Science, followed by a qualitative, in-depth systematic literature review to identify the management theories in literature and inform a research agenda.
Findings
The fragmentation of the research outcomes was overcome by the identification of 3 main clusters and 11 management theories that structured 18 questions for future research.
Originality/value
To the best of the authors’ knowledge, this paper sets for the first time a frontier between almost three decades where DDM evolved with no significative restrictions, grounded on innovations and market autoregulation, and an era where data privacy, anti-trust and competition and data sovereignty regulations converge to impose structural changes, requiring scholars and practitioners to rethink the roles of data at the strategic level of the firm.
Details
Keywords
Simisola Akintoye, George Ogoh, Zoi Krokida, Juliana Nnadi and Damian Eke
Digital contact tracing technologies are critical to the fight against COVID-19 in many countries including the UK. However, a number of ethical, legal and socio-economic concerns…
Abstract
Purpose
Digital contact tracing technologies are critical to the fight against COVID-19 in many countries including the UK. However, a number of ethical, legal and socio-economic concerns that can affect uptake of the app have been raised. The purpose of this research is to explore the perceptions of the UK digital contact tracing app in the Black, Asian and Minority Ethnic (BAME) community in Leicester and how this can affect its deployment and implementation.
Design/methodology/approach
Data was collected through virtual focus groups in Leicester, UK. A total of 28 participants were recruited for the study. All participants are members of the BAME community, and data was thematically analysed with NVivo 11.
Findings
A majority of the participants were unwilling to download and use the app owing to legal and ethical concerns. A minority were willing to use the app based on the need to protect public health. There was a general understanding that lack of uptake will negatively affect the fight against COVID-19 in BAME communities and an acknowledgement of the need for the government to rebuild trust through transparency and development of regulatory safeguards to enhance privacy and prevent misuse.
Originality/value
To the best of the authors’ knowledge, the research makes original contributions being the first robust study conducted to explore perceptions of marginalised communities, particularly BAME which may be adversely impacted by the deployment of the app. By exploring community-based perceptions, this study further contributes to the emerging citizens’ perceptions on digital contact tracing which is crucial to the effectiveness and the development of an efficient, community-specific response to public attitudes towards the app. The findings can also help the development of responsible innovation approaches that balances the competing interests of digital health interventions with the needs and expectations of the BAME community in the UK.
Details