Search results

11 – 20 of over 1000
Article
Publication date: 14 June 2023

Fatema Kawaf, Annaleis Montgomery and Marius Thuemmler

The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its…

Abstract

Purpose

The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its implications remain underexplored. The research question is: How do consumers perceive the matter of personal data collection for the use of highly targeted and personalised ads post-GDPR-2018? The invasion of privacy vs the benefits of highly personalised digital marketing.

Design/methodology/approach

To address the research question, this qualitative study conducts semi-structured interviews with 14 individuals, consisting of average users and digital experts.

Findings

This paper reports on increasing consumer vulnerability post-GDPR-2018 due to increased awareness of personal data collection yet incessant lack of control, particularly regarding the repercussions of the digital footprint. The privacy paradox remains an issue except among experts, and personalisation remains necessary, yet critical challenges arise (e.g. filter bubbles and intrusion).

Practical implications

Policy implications include education, regulating consent platforms and encouraging consensual sharing of personal data.

Originality/value

While the privacy–personalisation paradox has been widely studied, the impact of GDPR-2018 has rarely been addressed in the literature. GDPR-2018 has seemingly had little impact on instilling a sense of security for consumers; if anything, this paper highlights greater concerns for privacy as users sign away their rights on consent forms to access websites, thus contributing novel insights to this area of research.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 15 July 2020

James Peltz and Anita C. Street

This chapter explores how data-driven methods such as Artificial Intelligence pose real concerns for individual privacy. The current paradigm of collecting data from those using…

Abstract

This chapter explores how data-driven methods such as Artificial Intelligence pose real concerns for individual privacy. The current paradigm of collecting data from those using online applications and services is reinforced by significant potential profits that the private sector stands to realize by delivering a broad range of services to users faster and more conveniently. Terms of use and privacy agreements are a common source of confusion, and are written in a way that dulls their impact and dopes most into automatically accepting a certain level of risk in exchange for convenience and “free” access. Third parties, including the government, gain access to these data in numerous ways. If the erosion of individual protections of privacy and the potential dangers this poses to our autonomy and democratic ideals were not alarming enough, the digital surrogate product of “you” that is created from this paradigm might one day freely share thoughts, buying habits, and your pattern of life with whoever owns these data. We use an ethical framework to assess key factors in these issues and discuss some of the dilemmas posed by Artificial Intelligence methods, the current norm of sharing one's data, and what can be done to remind individuals to value privacy. Will our digital surrogate one day need protections too?

Details

Artificial Intelligence and Global Security
Type: Book
ISBN: 978-1-78973-812-4

Keywords

Article
Publication date: 27 September 2011

Marc van Lieshout, Linda Kool, Bas van Schoonhoven and Marjan de Jonge

The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and to explore the validity of the PbD framework.

1952

Abstract

Purpose

The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and to explore the validity of the PbD framework.

Design/methodology/approach

Attention for alternative concepts, such as PbD, which might offer surplus value in safeguarding privacy, is growing. Using PbD to design for privacy in ICT systems is still rather underexplored and requires substantial conceptual and empirical work to be done. The methodology includes conceptual analysis, empirical validation (focus groups and interviews) and technological testing (a technical demonstrator was build).

Findings

A holistic PbD approach can offer surplus value in better safeguarding of privacy without losing functional requirements. However, the implementation is not easily realised and confronted with several difficulties such as: potential lack of economic incentives, legacy systems, lack of adoption of trust of end‐users and consumers in PbD.

Originality/value

The article brings together/incorporates several contemporary insights on privacy protection and privacy by design and develops/presents a holistic framework for Privacy by Design framework consisting of five building blocks.

Article
Publication date: 20 March 2017

Mortaza S. Bargh, Sunil Choenni and Ronald Meijer

Information dissemination has become a means of transparency for governments to enable the visions of e-government and smart government, and eventually gain, among others, the…

Abstract

Purpose

Information dissemination has become a means of transparency for governments to enable the visions of e-government and smart government, and eventually gain, among others, the trust of various stakeholders such as citizens and enterprises. Information dissemination, on the other hand, may increase the chance of privacy breaches, which can undermine those stakeholders’ trust and thus the objectives of transparency. Moreover, fear of potential privacy breaches compels information disseminators to share minimum or no information. The purpose of this study is to address these contending issues of information disseminations, i.e. privacy versus transparency, when disseminating judicial information to gain (public) trust. Specifically, the main research questions are: What is the nature of the aforementioned “privacy–transparency” problem and how can we approach and address this class of problems?

Design/methodology/approach

To address these questions, the authors have carried out an explorative case study by reconsidering and analyzing a number of information dissemination cases within their research center for the past 10 years, reflecting upon the whole design research process, consulting peers through publishing a preliminary version of this contribution and embedding the work in an in-depth literature study on research methodologies, wicked problems and e-government topics.

Findings

The authors show that preserving privacy while disseminating information for transparency purposes is a typical wicked problem, propose an innovative designerly model called transitional action design research (TADR) to address the class of such wicked problems and describe three artifacts which are designed, intervened and evaluated according to the TADR model in a judicial research organization.

Originality/value

Classifying the privacy transparency problem in the judicial settings as wicked is new, the proposed designerly model is innovative and the realized artifacts are deployed and still operational in a real setting.

Details

Transforming Government: People, Process and Policy, vol. 11 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 4 April 2019

Mark Warner and Victoria Wang

This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In…

Abstract

Purpose

This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In particular, it examines the relationships between SC and four related factors: privacy concerns (PC), privacy awareness (PA), perceived vulnerability (PV) and information management (IM).

Design/methodology/approach

A national wide survey was conducted in the UK (N = 519). The data were analysed to present both descriptive and inferential statistical findings.

Findings

The level of online SC increases as the level of privacy concern increases. The level of privacy concern increases as the levels of PA and PV increase and the level of effective IM decreases.

Originality/value

This study extends the literature on online SC, showing that PCs increase the level of SC in SNSs. It provides support for three antecedent factors to PC which impact upon levels of SC when communicating in SNSs.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 14 February 2023

Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…

Abstract

Purpose

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.

Design/methodology/approach

The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.

Findings

The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.

Originality/value

This is the first in-depth, quantitative mapping study of all privacy research.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 21 April 2022

Katie Mackinnon

This paper aims to provide a brief overview of the ethical challenges facing researchers engaging with web archival materials and demonstrates a framework and method for…

Abstract

Purpose

This paper aims to provide a brief overview of the ethical challenges facing researchers engaging with web archival materials and demonstrates a framework and method for conducting research with historical web data created by young people.

Design/methodology/approach

This paper’s methodology is informed by the conceptual framing of data materials in research on the “right to be forgotten” (Crossen-White, 2015; GDPR, 2018; Tsesis, 2014), data afterlives (Agostinho, 2019; Stevenson and Gehl, 2019; Sutherland, 2017), indigenous data sovereignty and governance (Wemigwans, 2018) and feminist ethics of care (Cifor et al., 2019; Cowan, 2020; Franzke et al., 2020; Luka and Millette, 2018). It demonstrates a new method called an archive promenade, which builds on the walkthrough and scroll-back methods (Light et al., 2018; Robards and Lincoln, 2017).

Findings

The archive promenades demonstrate how individual attachments to digital traces vary and are often unpredictable, which necessitates further steps to ensure that privacy and data sovereignty are maintained through research with web archives.

Originality/value

This paper demonstrates how the archive promenade methodological intervention can lead to better practices of care with sensitive web materials and brings together previous work on ethical fabrications (Markham, 2012), speculation (Luka and Millette, 2018) and thick context (Marzullo et al., 2018), to yield new insights for research on the experiences of growing up online.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 18 January 2022

Bill Ming Gao, Matthew Tingchi Liu and Rongwei Chu

This paper aims to learn about consumers’ information disclosing patterns in the mobile internet context by investigating how demographic, geographic and psychological factors…

Abstract

Purpose

This paper aims to learn about consumers’ information disclosing patterns in the mobile internet context by investigating how demographic, geographic and psychological factors influence their information disclosing willingness (IDW).

Design/methodology/approach

Drawing on self-disclosure theory, the authors carried out simple linear regression analyses on a Chinese sample of 10,000 participants.

Findings

The results revealed that significant gender differences exist between males and females in their IDW in mobile internet context, and females have higher IDW than males do. And the authors also found that first-tier (third tier) citizens have the lowest (highest) IDW in their mobile internet usage.

Originality/value

This study offers three implications. First, this paper captures the insight of IDW within the mobile internet context, while previous studies mostly focus on the desktop internet context. Second, the results show that females have higher willingness to disclose than males do in the context of mobile internet, which is different from the findings of prior studies that females have higher privacy concerns and lower disclosing willingness in the context of desktop internet. Thirdly, this research introduces city tiers as a new approach to the study of IDW, which is one of the first studies exploring the geographical effect on information privacy.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 35 no. 1
Type: Research Article
ISSN: 1355-5855

Keywords

Book part
Publication date: 26 February 2016

Kay Mathiesen

To discuss the problem of cultural imperialism as it relates to human rights and to provide a framework for applying human rights to Library and Information Services (LIS) so as

Abstract

Purpose

To discuss the problem of cultural imperialism as it relates to human rights and to provide a framework for applying human rights to Library and Information Services (LIS) so as to respect diverse worldviews.

Methodology/approach

The chapter is theoretical in nature but also draws out important practical implications. The problem is described and addressed using the approach of philosophical ethics emphasizing moral pluralism. Political and moral theories are compared and lessons drawn from them for LIS practice.

Findings

Drawing on the work of philosopher Jacques Maritain (1949) as well as contemporary human rights theory, an understanding of human rights as pluralistic and evolving practical principles is developed. Using Maritain’s conception of human rights as a set of common principles of action, guidelines for applying human rights in ways that avoid cultural imperialism are provided.

Social implications

The findings of this chapter should assist LIS professionals in understanding the relationship between human rights and cultural diversity. In addition, it gives professionals a framework for understanding and applying human rights in a ways that respects cultural diversity.

Originality/value

This chapter develops an original approach to applying human rights in a way that respects cultural diversity.

Details

Perspectives on Libraries as Institutions of Human Rights and Social Justice
Type: Book
ISBN: 978-1-78635-057-2

Keywords

Article
Publication date: 4 May 2010

U. Pagallo

The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of…

1188

Abstract

Purpose

The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of openness. Threats arising from these file sharing applications‐systems should not be a pretext to limit freedom of research, speech or the right “freely to participate in the cultural life of the community”, as granted by the Universal Declaration of Human Rights from 1948. The paper aims to take sides in today's debate.

Design/methodology/approach

The paper adopts an interdisciplinary approach, including network theory, law and ethics. The method draws on both theoretical and empirical material so as to stress the paradox of the principle of precaution applied to P2P systems and why the burden of proof should fall on the party proposing that one refrain from action.

Findings

Censors and opponents of P2P systems who propose to apply the principle of precaution to this case deny the premise upon which that principle rests. “Levels of evidence” required by the precautionary principle show that – in many cases in which the outcomes of technology are ignored – another principle is needed for orienting action, namely, the principle of openness.

Social implications

Alarm about how P2P systems undermine crucial elements of the societies often led to the ban of this technology. The paper illustrates why it should not be the case: rather than shutting these networks down, they should be further developed.

Originality/value

The paper provides the comprehensive picture of a far too often fragmented debate.

Details

Journal of Information, Communication and Ethics in Society, vol. 8 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

11 – 20 of over 1000