Search results
1 – 10 of over 2000Privacy is a broad concept that encompasses spatial, psychosocial and moral dimensions. The author draws on two examples of ethnographic studies to highlight privacy concerns. She…
Abstract
Privacy is a broad concept that encompasses spatial, psychosocial and moral dimensions. The author draws on two examples of ethnographic studies to highlight privacy concerns. She frames the discussion by using the categories of physical, informational, proprietary and decisional privacy. The first study of a case of life support withdrawal after severe traumatic brain injury (TBI) raises four key points: (1) cultural norms in the setting dictate practices and perceptions of invasions of privacy, (2) dual roles allow access to private spaces, (3) the topic of the research can itself be a private matter and (4) inadvertent lapses in privacy are possible even with careful consideration and safeguards. The second study which is an ongoing examination of long-term adjustment to TBI in Kolkata, India raises a different set of issues: (1) differences in norms regarding physical privacy need to be negotiated, (2) the signing of consent forms can feel intrusive to persons unfamiliar with this process, (3) privacy and trust are inextricably linked and (4) norms of disclosure also affect the researcher. Recommendations are made for negotiating the complex nature of privacy and intrusion in ethnographic work.
The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has…
Abstract
Purpose
The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improve users’ informational self-determination. Following this reasoning, this paper focuses on the suitable way to provide user with the correct amount of information they may need to maintain a desirable grade of autonomy as far as their privacy protection is concerned and decide whether or not to put their personal data on the internet.
Design/methodology/approach
The authors arrive at this point in their analysis by qualitative discourse analysis of the most relevant scientific papers and dossiers relating to privacy protection.
Findings
The goal of this paper is twofold. The first is to illustrate the importance of privacy by default and informed consent working together to protect information and communication technology (ICT) users’ privacy. The second goal is to develop a suitable way to administrate the mentioned “informed consent” to users.
Originality/value
To fulfil this purpose, the authors present a new concept of informed consent: active “informed consent” or “Opt-in” model by layers. “Opt-in” regimens have already been used with cookies but never with 2.0 applications, as, for instance, social network sites (SNS).
Details
Keywords
Kartikeya Bajpai and Klaus Weber
We examine the translation of the concept of privacy in the advent of digital communication technologies. We analyze emerging notions of informational privacy in public discourse…
Abstract
We examine the translation of the concept of privacy in the advent of digital communication technologies. We analyze emerging notions of informational privacy in public discourse and policymaking in the United States. Our analysis shows category change to be a dynamic process that is only in part about cognitive processes of similarity. Instead, conceptions of privacy were tied to institutional orders of worth. Those orders offered theories, analogies, and vocabularies that could be deployed to extrapolate the concept of privacy into new domains, make sense of new technologies, and to shape policy agendas.
Details
Keywords
Valerie Steeves and Priscilla Regan
The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the…
Abstract
Purpose
The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings.
Design/methodology/approach
Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people and the social importance of privacy. Earlier philosophical discussions of privacy and identity, as well as current scholarship, are drawn on to suggest that privacy is an inherently social practice that enables social actors to navigate the boundary between self/other and between being closed/open to social interaction.
Findings
Four understandings of privacy’s value are developed in concordance with recent privacy literature and our own empirical data: privacy as contextual, relational, performative and dialectical.
Social implications
A more holistic approach is necessary to understand young people’s privacy negotiations. Adopting such an approach can help re-establish an ability to address the ways in which privacy boundaries are negotiated and to challenge surveillance schemes and their social consequences.
Originality/value
Findings imply that privacy policy should focus on creating conditions that support negotiations that are transparent and equitable. Additionally, policy-makers must begin to critically evaluate the ways in which surveillance interferes with the developmental need of young people to build relationships of trust with each other and also with adults.
Details
Keywords
The context of this chapter is the use of data and advanced data analytics in a commercial setting. Privacy is considered as protection from vulnerability, whereby vulnerability…
Abstract
The context of this chapter is the use of data and advanced data analytics in a commercial setting. Privacy is considered as protection from vulnerability, whereby vulnerability is understood as the state of being exposed to the possibility of being harmed, either physically or emotionally, or in fundamental rights other than privacy. Therefore, privacy's policy instruments, in particular data protection law, could be seen as a means to reduce the risk of harm resulting from data use. Such harm is probabilistic and often uncertain, which, however, does not exclude analyzing costs and benefits of regulatory data protection policies. When balancing privacy protections and opportunities for knowledge gain, regulatory policy could be viewed as superior, when it expands the range of possible trade-offs between vulnerability protection and gaining socially beneficial knowledge.
Details
Keywords
Although there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The…
Abstract
Purpose
Although there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the existing literature.
Design/methodology/approach
This contribution constructs theoretically founded typologies in order to systemize the existing literature of privacy studies and to analyse examples of privacy (threats). Therefore, it mainly is a theoretical approach combined with illustrative examples.
Findings
This paper contains a systematic discussion of the state of the art of privacy studies by establishing a typology of existing privacy definitions and discussing commonalties and differences. In this paper, it is argued that the existing literature is insufficient for studying privacy. Therefore, a critical contribution to privacy studies is needed.
Originality/value
A critical contribution to privacy studies avoids pitfalls of the existing literature and strives for the development of theoretical and empirical research methods in order to focus on privacy in the context of domination, asymmetrical power relations, resource control, social struggles, and exploitation.
Details
Keywords
Crystal T. Lee and Ling-Yen Pan
Sellers view facial recognition mobile payment services (FRMPS) as a convenient and cost-saving way to receive immediate payments from customers. For consumers, however, these…
Abstract
Purpose
Sellers view facial recognition mobile payment services (FRMPS) as a convenient and cost-saving way to receive immediate payments from customers. For consumers, however, these biometric identification technologies raise issues of usability as well as privacy, so FRMPS are not always preferable. This study uses the stressor–strain–outcome (S–S–O) framework to illuminate the underlying mechanism of FRMPS resistance, thereby addressing the paucity of research on users' negative attitudes toward FRMPS.
Design/methodology/approach
Drawing from the stressor–strain–outcome (S–S–O) framework, the purpose of this study is to illuminate the underlying mechanism of FRMPS resistance. To this end, they invited 566 password authentication users who had refused to use FRMPS to complete online survey questionnaires.
Findings
The findings enrich the understanding of FRMPS resistance and show that stressors (i.e. system feature overload, information overload, technological uncertainty, privacy concern and perceived risk) aggravate the strain (i.e. technostress), which then leads to users’ resistance behaviors and negative word of mouth.
Originality/value
Advances in payment methods have profoundly changed consumers’ consumption and payment habits. Understanding FRMPS resistance can provide marketers with strategies for dealing with this negative impact. This study theoretically confirms the S–S–O paradigm in the FRMPS setting and advances it by proposing thorough explanations of the major stressors that consumers face. Building on their findings, the authors suggest ways service providers can eliminate the stressors, thereby reducing consumers’ fear and preventing resistance or negative word-of-mouth behaviors. This study has valuable implications for both scholars and practitioners.
Details
Keywords
Konstantina Vemou and Maria Karyda
This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and privacy…
Abstract
Purpose
This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and privacy research.
Design/methodology/approach
This paper critically reviews and assesses generic PIA methods proposed by related research, data protection authorities and standard’s organizations, to identify best practices and practically support PIA practitioners. To address identified gaps, best practices from privacy literature are proposed.
Findings
This paper proposes a PIA process based on best practices, as well as an evaluation framework for existing PIA guidelines, focusing on practical support to PIA practitioners.
Practical implications
The proposed PIA process facilitates PIA practitioners in organizing and implementing PIA projects. This paper also provides an evaluation framework, comprising a comprehensive set of 17 criteria, for PIA practitioners to assess whether PIA methods/guidelines can adequately support requirements of their PIA projects (e.g. special legal framework and needs for PIA project organization guidance).
Originality/value
This research extends PIA guidelines (e.g. ISO 29134) by providing comprehensive and practical guidance to PIA practitioners. The proposed PIA process is based on best practices identified from evaluation of nine commonly used PIA methods, enriched with guidelines from privacy literature, to accommodate gaps and support tasks that were found to be inadequately described or lacking practical guidance.
Details
Keywords
Linda Alkire, Johannes Pohlmann and Willy Barnett
Internet user privacy risks have been a topical subject with respect to consumers, corporations and governments. In line with the recent privacy scandals linked to social media…
Abstract
Purpose
Internet user privacy risks have been a topical subject with respect to consumers, corporations and governments. In line with the recent privacy scandals linked to social media, the aim of this study is to explore users’ privacy protection behaviors (PPB) on Facebook through the actions they take to protect their privacy, their underlying motives and the values behind these protective actions. Moreover, this study aims to address an unintended consequence of Facebook usage. Despite Facebook’s positive and uplifting goal of connecting people, consumers are forced to resort to specific behaviors to protect their privacy and well-being.
Design/methodology/approach
This study adopts an exploratory research approach by using a well-established qualitative technique: structured laddering interviews. In total, 20 in-depth personal interviews were conducted with the Millennials.
Findings
Results show that the process of privacy protection is initiated by experiences, uncertainty and literacy, rather than threats, which leads to concerns that trigger PPBs. The most common PPBs include: “Reflection,” “Avoidance,” “Intervention,” “Restriction,” “Control,” and “Restraint.” The underlying motives for the adoption of these strategies include: “Success,” “Security,” “Social Recognition,” “A World of Peace,” “Exclusivity of Self,” “Being in Control,” “Meaning” and “True Friendship”.
Originality/value
The present research adopts a transdisciplinary framework to help fill the gap regarding the interplay of PPBs on Facebook, the triggers of those behaviors and their underlying motives. It contributes to the service literature and practice as it provides insights into a growing area of interest, whereas more social media channels are being created and more services are using social media strategies to engage and interact with their customers. Finally, it addresses the growing need to consider the impact of technological services, including internet and social media, on consumers’ and societies’ well-being.
Details
Keywords
Anita Katulić, Tihomir Katulić and Ivana Hebrang Grgić
The purpose of this paper is to examine the relationship between the legal obligation of European libraries to ensure the transparent personal data processing and respect for user…
Abstract
Purpose
The purpose of this paper is to examine the relationship between the legal obligation of European libraries to ensure the transparent personal data processing and respect for user privacy. This paper will examine how libraries use privacy notices on websites to communicate with patrons about the processing of personal data and in what manner have libraries been guided by applicable transparency guidelines.
Design/methodology/approach
The method used is the analysis of privacy policies and other privacy documents found on the websites of national libraries. The analysis sample includes documents of 45 European national libraries, 28 out of those being national libraries of European Union (EU) Member States. The elements for this analysis are derived from the mandatory elements of the General Data Protection Regulation and the recommendations of the WP29/EDPB Transparency Guidelines.
Findings
The findings suggest that European national libraries largely adhere to EU data protection standards. In total, 60% libraries use a separate privacy page, and 53% of the EU Member State national libraries websites managed to comply with publishing all necessary data protection information in a way recommended by the Guidelines, compared to 47% of non-Member State national libraries.
Originality/value
The research contributes to the understanding of the importance of the principle of transparency and its operationalization.
Details