Search results

1 – 10 of over 2000
Book part
Publication date: 8 August 2008

Debjani Mukherjee

Privacy is a broad concept that encompasses spatial, psychosocial and moral dimensions. The author draws on two examples of ethnographic studies to highlight privacy concerns. She…

Abstract

Privacy is a broad concept that encompasses spatial, psychosocial and moral dimensions. The author draws on two examples of ethnographic studies to highlight privacy concerns. She frames the discussion by using the categories of physical, informational, proprietary and decisional privacy. The first study of a case of life support withdrawal after severe traumatic brain injury (TBI) raises four key points: (1) cultural norms in the setting dictate practices and perceptions of invasions of privacy, (2) dual roles allow access to private spaces, (3) the topic of the research can itself be a private matter and (4) inadvertent lapses in privacy are possible even with careful consideration and safeguards. The second study which is an ongoing examination of long-term adjustment to TBI in Kolkata, India raises a different set of issues: (1) differences in norms regarding physical privacy need to be negotiated, (2) the signing of consent forms can feel intrusive to persons unfamiliar with this process, (3) privacy and trust are inextricably linked and (4) norms of disclosure also affect the researcher. Recommendations are made for negotiating the complex nature of privacy and intrusion in ethnographic work.

Details

Access, a Zone of Comprehension, and Intrusion
Type: Book
ISBN: 978-1-84663-891-6

Article
Publication date: 9 May 2016

Amaya Noain-Sánchez

The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has…

1437

Abstract

Purpose

The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improve users’ informational self-determination. Following this reasoning, this paper focuses on the suitable way to provide user with the correct amount of information they may need to maintain a desirable grade of autonomy as far as their privacy protection is concerned and decide whether or not to put their personal data on the internet.

Design/methodology/approach

The authors arrive at this point in their analysis by qualitative discourse analysis of the most relevant scientific papers and dossiers relating to privacy protection.

Findings

The goal of this paper is twofold. The first is to illustrate the importance of privacy by default and informed consent working together to protect information and communication technology (ICT) users’ privacy. The second goal is to develop a suitable way to administrate the mentioned “informed consent” to users.

Originality/value

To fulfil this purpose, the authors present a new concept of informed consent: active “informed consent” or “Opt-in” model by layers. “Opt-in” regimens have already been used with cookies but never with 2.0 applications, as, for instance, social network sites (SNS).

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Book part
Publication date: 17 March 2017

Kartikeya Bajpai and Klaus Weber

We examine the translation of the concept of privacy in the advent of digital communication technologies. We analyze emerging notions of informational privacy in public discourse…

Abstract

We examine the translation of the concept of privacy in the advent of digital communication technologies. We analyze emerging notions of informational privacy in public discourse and policymaking in the United States. Our analysis shows category change to be a dynamic process that is only in part about cognitive processes of similarity. Instead, conceptions of privacy were tied to institutional orders of worth. Those orders offered theories, analogies, and vocabularies that could be deployed to extrapolate the concept of privacy into new domains, make sense of new technologies, and to shape policy agendas.

Details

From Categories to Categorization: Studies in Sociology, Organizations and Strategy at the Crossroads
Type: Book
ISBN: 978-1-78714-238-1

Keywords

Article
Publication date: 4 November 2014

Valerie Steeves and Priscilla Regan

The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the…

1806

Abstract

Purpose

The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings.

Design/methodology/approach

Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people and the social importance of privacy. Earlier philosophical discussions of privacy and identity, as well as current scholarship, are drawn on to suggest that privacy is an inherently social practice that enables social actors to navigate the boundary between self/other and between being closed/open to social interaction.

Findings

Four understandings of privacy’s value are developed in concordance with recent privacy literature and our own empirical data: privacy as contextual, relational, performative and dialectical.

Social implications

A more holistic approach is necessary to understand young people’s privacy negotiations. Adopting such an approach can help re-establish an ability to address the ways in which privacy boundaries are negotiated and to challenge surveillance schemes and their social consequences.

Originality/value

Findings imply that privacy policy should focus on creating conditions that support negotiations that are transparent and equitable. Additionally, policy-makers must begin to critically evaluate the ways in which surveillance interferes with the developmental need of young people to build relationships of trust with each other and also with adults.

Details

Journal of Information, Communication and Ethics in Society, vol. 12 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Book part
Publication date: 22 March 2022

Björn Fasterling

The context of this chapter is the use of data and advanced data analytics in a commercial setting. Privacy is considered as protection from vulnerability, whereby vulnerability…

Abstract

The context of this chapter is the use of data and advanced data analytics in a commercial setting. Privacy is considered as protection from vulnerability, whereby vulnerability is understood as the state of being exposed to the possibility of being harmed, either physically or emotionally, or in fundamental rights other than privacy. Therefore, privacy's policy instruments, in particular data protection law, could be seen as a means to reduce the risk of harm resulting from data use. Such harm is probabilistic and often uncertain, which, however, does not exclude analyzing costs and benefits of regulatory data protection policies. When balancing privacy protections and opportunities for knowledge gain, regulatory policy could be viewed as superior, when it expands the range of possible trade-offs between vulnerability protection and gaining socially beneficial knowledge.

Details

The Law and Economics of Privacy, Personal Data, Artificial Intelligence, and Incomplete Monitoring
Type: Book
ISBN: 978-1-80262-002-3

Keywords

Article
Publication date: 17 May 2011

Thomas Allmer

Although there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The…

1369

Abstract

Purpose

Although there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the existing literature.

Design/methodology/approach

This contribution constructs theoretically founded typologies in order to systemize the existing literature of privacy studies and to analyse examples of privacy (threats). Therefore, it mainly is a theoretical approach combined with illustrative examples.

Findings

This paper contains a systematic discussion of the state of the art of privacy studies by establishing a typology of existing privacy definitions and discussing commonalties and differences. In this paper, it is argued that the existing literature is insufficient for studying privacy. Therefore, a critical contribution to privacy studies is needed.

Originality/value

A critical contribution to privacy studies avoids pitfalls of the existing literature and strives for the development of theoretical and empirical research methods in order to focus on privacy in the context of domination, asymmetrical power relations, resource control, social struggles, and exploitation.

Details

Journal of Information, Communication and Ethics in Society, vol. 9 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 23 August 2022

Crystal T. Lee and Ling-Yen Pan

Sellers view facial recognition mobile payment services (FRMPS) as a convenient and cost-saving way to receive immediate payments from customers. For consumers, however, these…

1257

Abstract

Purpose

Sellers view facial recognition mobile payment services (FRMPS) as a convenient and cost-saving way to receive immediate payments from customers. For consumers, however, these biometric identification technologies raise issues of usability as well as privacy, so FRMPS are not always preferable. This study uses the stressor–strain–outcome (S–S–O) framework to illuminate the underlying mechanism of FRMPS resistance, thereby addressing the paucity of research on users' negative attitudes toward FRMPS.

Design/methodology/approach

Drawing from the stressor–strain–outcome (S–S–O) framework, the purpose of this study is to illuminate the underlying mechanism of FRMPS resistance. To this end, they invited 566 password authentication users who had refused to use FRMPS to complete online survey questionnaires.

Findings

The findings enrich the understanding of FRMPS resistance and show that stressors (i.e. system feature overload, information overload, technological uncertainty, privacy concern and perceived risk) aggravate the strain (i.e. technostress), which then leads to users’ resistance behaviors and negative word of mouth.

Originality/value

Advances in payment methods have profoundly changed consumers’ consumption and payment habits. Understanding FRMPS resistance can provide marketers with strategies for dealing with this negative impact. This study theoretically confirms the S–S–O paradigm in the FRMPS setting and advances it by proposing thorough explanations of the major stressors that consumers face. Building on their findings, the authors suggest ways service providers can eliminate the stressors, thereby reducing consumers’ fear and preventing resistance or negative word-of-mouth behaviors. This study has valuable implications for both scholars and practitioners.

Details

Journal of Services Marketing, vol. 37 no. 3
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 4 September 2019

Konstantina Vemou and Maria Karyda

This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and privacy

Abstract

Purpose

This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and privacy research.

Design/methodology/approach

This paper critically reviews and assesses generic PIA methods proposed by related research, data protection authorities and standard’s organizations, to identify best practices and practically support PIA practitioners. To address identified gaps, best practices from privacy literature are proposed.

Findings

This paper proposes a PIA process based on best practices, as well as an evaluation framework for existing PIA guidelines, focusing on practical support to PIA practitioners.

Practical implications

The proposed PIA process facilitates PIA practitioners in organizing and implementing PIA projects. This paper also provides an evaluation framework, comprising a comprehensive set of 17 criteria, for PIA practitioners to assess whether PIA methods/guidelines can adequately support requirements of their PIA projects (e.g. special legal framework and needs for PIA project organization guidance).

Originality/value

This research extends PIA guidelines (e.g. ISO 29134) by providing comprehensive and practical guidance to PIA practitioners. The proposed PIA process is based on best practices identified from evaluation of nine commonly used PIA methods, enriched with guidelines from privacy literature, to accommodate gaps and support tasks that were found to be inadequately described or lacking practical guidance.

Details

Information & Computer Security, vol. 28 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 24 April 2019

Linda Alkire, Johannes Pohlmann and Willy Barnett

Internet user privacy risks have been a topical subject with respect to consumers, corporations and governments. In line with the recent privacy scandals linked to social media…

2137

Abstract

Purpose

Internet user privacy risks have been a topical subject with respect to consumers, corporations and governments. In line with the recent privacy scandals linked to social media, the aim of this study is to explore users’ privacy protection behaviors (PPB) on Facebook through the actions they take to protect their privacy, their underlying motives and the values behind these protective actions. Moreover, this study aims to address an unintended consequence of Facebook usage. Despite Facebook’s positive and uplifting goal of connecting people, consumers are forced to resort to specific behaviors to protect their privacy and well-being.

Design/methodology/approach

This study adopts an exploratory research approach by using a well-established qualitative technique: structured laddering interviews. In total, 20 in-depth personal interviews were conducted with the Millennials.

Findings

Results show that the process of privacy protection is initiated by experiences, uncertainty and literacy, rather than threats, which leads to concerns that trigger PPBs. The most common PPBs include: “Reflection,” “Avoidance,” “Intervention,” “Restriction,” “Control,” and “Restraint.” The underlying motives for the adoption of these strategies include: “Success,” “Security,” “Social Recognition,” “A World of Peace,” “Exclusivity of Self,” “Being in Control,” “Meaning” and “True Friendship”.

Originality/value

The present research adopts a transdisciplinary framework to help fill the gap regarding the interplay of PPBs on Facebook, the triggers of those behaviors and their underlying motives. It contributes to the service literature and practice as it provides insights into a growing area of interest, whereas more social media channels are being created and more services are using social media strategies to engage and interact with their customers. Finally, it addresses the growing need to consider the impact of technological services, including internet and social media, on consumers’ and societies’ well-being.

Details

Journal of Services Marketing, vol. 33 no. 1
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 23 February 2022

Anita Katulić, Tihomir Katulić and Ivana Hebrang Grgić

The purpose of this paper is to examine the relationship between the legal obligation of European libraries to ensure the transparent personal data processing and respect for user…

Abstract

Purpose

The purpose of this paper is to examine the relationship between the legal obligation of European libraries to ensure the transparent personal data processing and respect for user privacy. This paper will examine how libraries use privacy notices on websites to communicate with patrons about the processing of personal data and in what manner have libraries been guided by applicable transparency guidelines.

Design/methodology/approach

The method used is the analysis of privacy policies and other privacy documents found on the websites of national libraries. The analysis sample includes documents of 45 European national libraries, 28 out of those being national libraries of European Union (EU) Member States. The elements for this analysis are derived from the mandatory elements of the General Data Protection Regulation and the recommendations of the WP29/EDPB Transparency Guidelines.

Findings

The findings suggest that European national libraries largely adhere to EU data protection standards. In total, 60% libraries use a separate privacy page, and 53% of the EU Member State national libraries websites managed to comply with publishing all necessary data protection information in a way recommended by the Guidelines, compared to 47% of non-Member State national libraries.

Originality/value

The research contributes to the understanding of the importance of the principle of transparency and its operationalization.

Details

Digital Library Perspectives, vol. 38 no. 4
Type: Research Article
ISSN: 2059-5816

Keywords

1 – 10 of over 2000