Search results

1 – 10 of over 5000
Article
Publication date: 19 December 2019

Colin Michael Hall and Yael Ram

This paper aims to provide a perspective on privacy in tourism and hospitality.

543

Abstract

Purpose

This paper aims to provide a perspective on privacy in tourism and hospitality.

Design/methodology/approach

A systematic review of journals was undertaken in addition to thematic analysis.

Findings

Relatively little research has been undertaken on privacy in tourism and hospitality with privacy often regarded as synonymous with security.

Originality/value

One of the few commentaries on privacy in tourism.

Details

Tourism Review, vol. 75 no. 1
Type: Research Article
ISSN: 1660-5373

Keywords

Article
Publication date: 6 May 2014

Tobias Matzner

Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been…

3553

Abstract

Purpose

Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”.

Design/methodology/approach

New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is reviewed concerning its capability to grasp these problems. The argument is based on the assumption that the technologies work, persons are fully informed and capable of deciding according to advanced privacy considerations.

Findings

Big data and ubiquitous computing enable privacy threats for persons whose data are only indirectly involved and even for persons about whom no data have been collected and processed. Those new problems are intrinsic to the functionality of these new technologies and need to be addressed on a social and political level. Furthermore, a concept of data minimization in terms of the quality of the data is proposed.

Originality/value

The use of personal data as a threat to the privacy of others is established. This new perspective is used to reassess and recontextualize Helen Nissenbaum's concept of privacy. Data minimization in terms of quality of data is proposed as a new concept.

Details

Journal of Information, Communication and Ethics in Society, vol. 12 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 January 2004

Catharine M. Curran and Jef I. Richards

Invasion of privacy is a serious, and sometimes frightening, concept for many people. It can evoke images of big brother, in the form of big business, knowing your most intimate…

1123

Abstract

Invasion of privacy is a serious, and sometimes frightening, concept for many people. It can evoke images of big brother, in the form of big business, knowing your most intimate secrets and even selling those secrets to others. Laws to guard against these personal violations have been slow in coming from the US government. A combination of consumer fears and sluggish federal response is nothing particularly new, but as with other such situations it has provided state and local officials a lever with which to pry public attention out of the hands of their federal counterparts.

Details

Journal of Consumer Marketing, vol. 21 no. 1
Type: Research Article
ISSN: 0736-3761

Keywords

Expert briefing
Publication date: 22 January 2020
Expert Briefings Powered by Oxford Analytica

US media faces tough 2020

US media in 2020.

Details

DOI: 10.1108/OXAN-DB250177

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 1 July 2006

G. Arthur Mihram

To present highlights of the annual Library Legislative Day hosted by the American Library Association in Washington, DC.

125

Abstract

Purpose

To present highlights of the annual Library Legislative Day hosted by the American Library Association in Washington, DC.

Design/methodology/approach

A brief outline of the main events of the day.

Findings

The aim of this event is to promote advocacy for library services, literacy, resources with a better understanding of privacy and other related issues were commonly addressed themes. Since this is an annual event, it is critical for elected and federal officials, the press as well as the professional library community to share their agendas of common as well as different interests and figure out how to refine ways to address them. Originality/value ‐ Funding libraries is no easy feat, and getting legislators to provide funds and support for library services and resources is the challenge of this annual meeting and to determine better advocacy and effectiveness. Paper type Viewpoint

Details

Library Hi Tech News, vol. 23 no. 6
Type: Research Article
ISSN: 0741-9058

Keywords

Abstract

Details

Technologies of Trauma
Type: Book
ISBN: 978-1-80262-135-8

Book part
Publication date: 21 October 2014

Abstract

Details

Politics and the Life Sciences: The State of the Discipline
Type: Book
ISBN: 978-1-78441-108-4

Article
Publication date: 1 October 2003

Joris Claessens, Claudia Díaz, Caroline Goemans, Jos Dumortier, Bart Preneel and Joos Vandewalle

With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have increased. On…

1338

Abstract

With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have increased. On the one hand, users are concerned about their privacy, and desire to anonymously access the network. On the other hand, some organizations are concerned about how this anonymous access might be abused. This paper intends to bridge these conflicting interests, and proposes a solution for revocable anonymous access to the Internet. Moreover, the paper presents some legal background and motivation for such a solution. However, the paper also indicates some difficulties and disadvantages of the proposed solution, and suggests the need for further debate on the issue of online anonymity.

Details

Internet Research, vol. 13 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 August 2003

Rajiv C. Shah and Jay P. Kesan

Regulation through “code,” i.e. the hardware and software of communication technologies, is growing in importance. Policymakers are addressing societal concerns such as privacy…

376

Abstract

Regulation through “code,” i.e. the hardware and software of communication technologies, is growing in importance. Policymakers are addressing societal concerns such as privacy, freedom of speech, and intellectual property protection with code‐based solutions. While scholars have noted the role of code, there is little analysis of the various features or characteristics of code that have significance in regulating behavior. This paper examines three universal governance characteristics that policymakers may use to ensure code comports with societal concerns. The characteristics are transparency, defaults, and standards. For each characteristic, the paper discusses the salient regulatory issues for manipulating code. Additionally, the paper provides normative proposals for modifying some characteristics, such as defaults. In sum, our analysis should aid policymakers seeking to manipulate code to ensure that code comports with our societal values and addresses our societal concerns.

Details

info, vol. 5 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Book part
Publication date: 25 November 2019

Justine E. Egner

Employing virtual ethnography and narrative analysis, this chapter uses data drawn from the online social media site, Tumblr, to explore a group of Tumblr users who mostly…

Abstract

Purpose/Methods/Approach

Employing virtual ethnography and narrative analysis, this chapter uses data drawn from the online social media site, Tumblr, to explore a group of Tumblr users who mostly identify with the complex intersectional identities of LGBTQ+ disabled people of color.

Findings

This chapter suggests that narratives are skillfully constructed by this group of Tumblr users in ways that counteract felt or expected experiences of exclusion, invisibility, and stigmatization within this identity-based community. The posters represented here are combating this invisibility and marginalization. They narrate themselves into existence by attaching their experiences to two well-known and recognizable social problem narratives. One is the “Pride/Community and Self-love” narrative, commonly associated with LGBTQ+ pride and LGBTQ+ communities. The other is the “Our Lives Matter/Deserving of Life” narrative, commonly associated with communities and social movements such as Black Lives Matter. Posters are artfully constructing their own community narratives by drawing from these culturally circulating and available narrative resources. When these two popular narratives are deployed in this way, they are counternarratives that are doing both resistance work and community/identity-building work. The ultimate effect is that the counternarrative they construct unites quite a diverse group of people through experiences of shared exclusion.

Implications/Value

This chapter extends the scholarly conversation on both narratives and disability by suggesting ways in which counternarratives about individuals with complex intersectional identities can be constructed in virtual communities. In so doing, the chapter brings poorly represented perspectives into discourses on disability and narratives. The study also contributes to the literature on the importance of emotion, specifically by highlighting the deployment of love and anger to counteract experiences of shame and marginalization.

Details

New Narratives of Disability
Type: Book
ISBN: 978-1-83909-144-5

Keywords

1 – 10 of over 5000