Search results
1 – 10 of 742The study focusses on the legal issues surrounding artificial intelligence (AI), which are being investigated and debated about several European Union initiatives to manage and…
Abstract
The study focusses on the legal issues surrounding artificial intelligence (AI), which are being investigated and debated about several European Union initiatives to manage and regulate Information and Communication Technologies. The goal is to discuss the benefits and drawbacks of adopting AI technology and the ramifications for the articulations of law and politics in democratic constitutional countries. Thus, the study aims to identify socio-legal concerns and possible solutions to protect individuals’ interests. The exploratory study is based on statutes, rules, and committee reports. The study has used news pieces, reports issued by organisations and legal websites. The study revealed computer security vulnerabilities, unfairness, bias and discrimination, and legal personhood and intellectual property issues. Issues with privacy and data protection, liability for harm, and lack of accountability will all be discussed. The vulnerability framework is utilised in this chapter to strengthen comprehension of key areas of concern and to motivate risk and impact mitigation solutions to safeguard human welfare. Given the importance of AI’s effects on weak individuals and groups as well as their legal rights, this chapter contributes to the discourse, which is essential. The chapter advances the conversation while appreciating the legal work done in AI and the fact that this sector needs constant review and flexibility. As AI technology advances, new legal challenges, vulnerabilities, and implications for data privacy will inevitably arise, necessitating increased monitoring and research.
Details
Keywords
The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse…
Abstract
Purpose
The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications.
Design/methodology/approach
Using a qualitative and interpretivist approach, the author focuses on three different surveillance-oriented incidents/programs in Ghana and analyzes the frames underpinning the related advocacy and narratives of various non-state actors.
Findings
Privacy and anti-surveillance advocacy in Ghana tends to be less framed in the context of privacy rights and is more driven by concerns about corruption and value for money. Such pecuniary emphasis is rational per issue salience calculations as it elevates principles of economic probity, transparency and accountability and pursues a high public shock value and resonance.
Practical implications
Economics-centered critiques of surveillance could be counterproductive as they create a low bar for surveillance promoters and sustains a culture of permissible statist intrusions into citizens’ lives once economic virtues are satisfied.
Originality/value
While anti-surveillance and privacy advocacy is budding across African countries, little is known about its nature, frames and modus compared to such advocacy in European and North American settings. To the best of the author’s knowledge, this is likely the first paper or one of the first dedicated fully to anti-surveillance and advocacy in Africa.
Details
Keywords
Madelyn Rose Sanfilippo, Noah Apthorpe, Karoline Brehm and Yan Shvartzshnaider
This paper aims to address research gaps around third party data flows in education by investigating governance practices in higher education with respect to learning management…
Abstract
Purpose
This paper aims to address research gaps around third party data flows in education by investigating governance practices in higher education with respect to learning management system (LMS) ecosystems. The authors answer the following research questions: how are LMS and plugins/learning tools interoperability (LTI) governed at higher education institutions? Who is responsible for data governance activities around LMS? What is the current state of governance over LMS? What is the current state of governance over LMS plugins, LTI, etc.? What governance issues are unresolved in this domain? How are issues of privacy and governance regarding LMS and plugins/LTIs documented or communicated to the public and/or community members?
Design/methodology/approach
This study involved three components: (1) An online questionnaire about LMS, plugin and LTI governance practices from information technology professionals at seven universities in the USA (n = 4) and Canada (n = 3). The responses from these individuals helped us frame and design the interview schedule. (2) A review of public data from 112 universities about LMS plugin and LTI governance. Eighteen of these universities provide additional documentation, which we analyze in further depth. (3) A series of extensive interviews with 25 university data governance officers with responsibilities for LMS, plugin and/or LTI governance, representing 14 different universities.
Findings
The results indicate a portrait of fragmented and unobtrusive, unnoticed student information flows to third parties. From coordination problems on individual college campuses to disparate distributions of authority across campuses, as well as from significant data collection via individual LTIs to a shared problem of scope across many LTIs, the authors see that increased and intentional governance is needed to improve the state of student privacy and provide transparency in the complex environment around LMSs. Yet, the authors also see that there are logical paths forward based on successful governance and leveraging existing collaborative networks among data governance professionals in higher education.
Originality/value
Substantial prior work has examined issues of privacy in the education context, although little research has directly examined higher education institutions’ governance practices of LMS, plugin and LTI ecosystems. The tight integration of first and third-party tools in this ecosystem raises concerns that student data may be accessed and shared without sufficient transparency or oversight and in violation of established education privacy norms. However, these technologies and the university governance practices that could check inappropriate data handling remain under-scrutinized. This paper addresses this gap by investigating the governance practices of higher education institutions with respect to LMS ecosystems.
Details
Keywords
Fatema Kawaf, Annaleis Montgomery and Marius Thuemmler
The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its…
Abstract
Purpose
The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its implications remain underexplored. The research question is: How do consumers perceive the matter of personal data collection for the use of highly targeted and personalised ads post-GDPR-2018? The invasion of privacy vs the benefits of highly personalised digital marketing.
Design/methodology/approach
To address the research question, this qualitative study conducts semi-structured interviews with 14 individuals, consisting of average users and digital experts.
Findings
This paper reports on increasing consumer vulnerability post-GDPR-2018 due to increased awareness of personal data collection yet incessant lack of control, particularly regarding the repercussions of the digital footprint. The privacy paradox remains an issue except among experts, and personalisation remains necessary, yet critical challenges arise (e.g. filter bubbles and intrusion).
Practical implications
Policy implications include education, regulating consent platforms and encouraging consensual sharing of personal data.
Originality/value
While the privacy–personalisation paradox has been widely studied, the impact of GDPR-2018 has rarely been addressed in the literature. GDPR-2018 has seemingly had little impact on instilling a sense of security for consumers; if anything, this paper highlights greater concerns for privacy as users sign away their rights on consent forms to access websites, thus contributing novel insights to this area of research.
Details
Keywords
These take to 15 the number of US states with consumer privacy laws in effect or pending. Five new state privacy regimes will come into force this year, four more…
Details
DOI: 10.1108/OXAN-DB284858
ISSN: 2633-304X
Keywords
Geographic
Topical
Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le
This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.
Abstract
Purpose
This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.
Design/methodology/approach
Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.
Findings
The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.
Research limitations/implications
This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.
Practical implications
Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.
Originality/value
The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.
Details
Keywords
The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western…
Abstract
Purpose
The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western governments. This research primarily focuses on such practices of the US Government.
Design/methodology/approach
This work is designed as a case study research of cybersecurity whistleblowers or leakers on Western governments, involving data collection from primary and secondary sources. The method is a content analysis to determine the presence of certain themes within this primary and secondary data which this research can then make inferences about the messages within the texts.
Findings
The findings show a formation of a recent class of power brokers, with its own collective ethos, who will be known by a new term: the “New Knowledge Cyberclass” (NKC). The development of the NKC was revealed through the shocking data revelations by Edward Snowden, Julian Assange and Chelsea Manning. What separates the NKC from government “protectors” (i.e. President Obama, Central Intelligence Agency Director Mike Pompeo), who argue that these leakers stole and leaked classified documents that endangered lives, is their definitions of what it means to be defenders of democracy, which here pertains to the rights to citizens’ online privacy and the degree of secrecy in US Government.
Originality/value
To the best of the author’s knowledge, this is the first study directed toward connecting, Snowden, Assange and Manning, to the birth of a new class of power brokers designed to directly challenge Western government malpractices with citizens’ online privacy and secrecy in foreign operations. This research explores both the birth of this new class and a collective ethos that binds this group together despite the tensions and conflicts within this new class.
Details
Keywords
Harry Bowles and Darragh McGee
This chapter examines the shifting significance of data ownership and athlete rights as they pertain to the growth and expansion of the global sports gambling industry. It…
Abstract
This chapter examines the shifting significance of data ownership and athlete rights as they pertain to the growth and expansion of the global sports gambling industry. It provides a nuanced overview of the ‘datafication’ of society, tracing how the omnipresent embrace of digital technologies has expediated new forms of organisational, political and corporate surveillance from which concerns over privacy, rights to ownership and the misuse of personal data arise. The chapter moves on to discuss how the extraction and trade of data has revolutionised how elite sport is performed, manufactured, broadcast and consumed, shedding critical light on the role of the gambling industry in the exchange of human data as a market commodity. These insights inform a series of socio-legal and ethical questions about the relationships between athlete data and the sports gambling industry for the purpose of signposting emerging issues and opportunities for critical sociological research and intervention.
Details
Keywords
Athina Karatzogianni, Jonathan Ong, Adi Kuntsman and Liu Xin