Search results
11 – 20 of over 1000Fatema Kawaf, Annaleis Montgomery and Marius Thuemmler
The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its…
Abstract
Purpose
The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its implications remain underexplored. The research question is: How do consumers perceive the matter of personal data collection for the use of highly targeted and personalised ads post-GDPR-2018? The invasion of privacy vs the benefits of highly personalised digital marketing.
Design/methodology/approach
To address the research question, this qualitative study conducts semi-structured interviews with 14 individuals, consisting of average users and digital experts.
Findings
This paper reports on increasing consumer vulnerability post-GDPR-2018 due to increased awareness of personal data collection yet incessant lack of control, particularly regarding the repercussions of the digital footprint. The privacy paradox remains an issue except among experts, and personalisation remains necessary, yet critical challenges arise (e.g. filter bubbles and intrusion).
Practical implications
Policy implications include education, regulating consent platforms and encouraging consensual sharing of personal data.
Originality/value
While the privacy–personalisation paradox has been widely studied, the impact of GDPR-2018 has rarely been addressed in the literature. GDPR-2018 has seemingly had little impact on instilling a sense of security for consumers; if anything, this paper highlights greater concerns for privacy as users sign away their rights on consent forms to access websites, thus contributing novel insights to this area of research.
Details
Keywords
James Peltz and Anita C. Street
This chapter explores how data-driven methods such as Artificial Intelligence pose real concerns for individual privacy. The current paradigm of collecting data from those using…
Abstract
This chapter explores how data-driven methods such as Artificial Intelligence pose real concerns for individual privacy. The current paradigm of collecting data from those using online applications and services is reinforced by significant potential profits that the private sector stands to realize by delivering a broad range of services to users faster and more conveniently. Terms of use and privacy agreements are a common source of confusion, and are written in a way that dulls their impact and dopes most into automatically accepting a certain level of risk in exchange for convenience and “free” access. Third parties, including the government, gain access to these data in numerous ways. If the erosion of individual protections of privacy and the potential dangers this poses to our autonomy and democratic ideals were not alarming enough, the digital surrogate product of “you” that is created from this paradigm might one day freely share thoughts, buying habits, and your pattern of life with whoever owns these data. We use an ethical framework to assess key factors in these issues and discuss some of the dilemmas posed by Artificial Intelligence methods, the current norm of sharing one's data, and what can be done to remind individuals to value privacy. Will our digital surrogate one day need protections too?
Details
Keywords
Marc van Lieshout, Linda Kool, Bas van Schoonhoven and Marjan de Jonge
The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and to explore the validity of the PbD framework.
Abstract
Purpose
The purpose of this paper is to develop/elaborate the concept Privacy by Design (PbD) and to explore the validity of the PbD framework.
Design/methodology/approach
Attention for alternative concepts, such as PbD, which might offer surplus value in safeguarding privacy, is growing. Using PbD to design for privacy in ICT systems is still rather underexplored and requires substantial conceptual and empirical work to be done. The methodology includes conceptual analysis, empirical validation (focus groups and interviews) and technological testing (a technical demonstrator was build).
Findings
A holistic PbD approach can offer surplus value in better safeguarding of privacy without losing functional requirements. However, the implementation is not easily realised and confronted with several difficulties such as: potential lack of economic incentives, legacy systems, lack of adoption of trust of end‐users and consumers in PbD.
Originality/value
The article brings together/incorporates several contemporary insights on privacy protection and privacy by design and develops/presents a holistic framework for Privacy by Design framework consisting of five building blocks.
Details
Keywords
Mortaza S. Bargh, Sunil Choenni and Ronald Meijer
Information dissemination has become a means of transparency for governments to enable the visions of e-government and smart government, and eventually gain, among others, the…
Abstract
Purpose
Information dissemination has become a means of transparency for governments to enable the visions of e-government and smart government, and eventually gain, among others, the trust of various stakeholders such as citizens and enterprises. Information dissemination, on the other hand, may increase the chance of privacy breaches, which can undermine those stakeholders’ trust and thus the objectives of transparency. Moreover, fear of potential privacy breaches compels information disseminators to share minimum or no information. The purpose of this study is to address these contending issues of information disseminations, i.e. privacy versus transparency, when disseminating judicial information to gain (public) trust. Specifically, the main research questions are: What is the nature of the aforementioned “privacy–transparency” problem and how can we approach and address this class of problems?
Design/methodology/approach
To address these questions, the authors have carried out an explorative case study by reconsidering and analyzing a number of information dissemination cases within their research center for the past 10 years, reflecting upon the whole design research process, consulting peers through publishing a preliminary version of this contribution and embedding the work in an in-depth literature study on research methodologies, wicked problems and e-government topics.
Findings
The authors show that preserving privacy while disseminating information for transparency purposes is a typical wicked problem, propose an innovative designerly model called transitional action design research (TADR) to address the class of such wicked problems and describe three artifacts which are designed, intervened and evaluated according to the TADR model in a judicial research organization.
Originality/value
Classifying the privacy transparency problem in the judicial settings as wicked is new, the proposed designerly model is innovative and the realized artifacts are deployed and still operational in a real setting.
Details
Keywords
This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In…
Abstract
Purpose
This paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In particular, it examines the relationships between SC and four related factors: privacy concerns (PC), privacy awareness (PA), perceived vulnerability (PV) and information management (IM).
Design/methodology/approach
A national wide survey was conducted in the UK (N = 519). The data were analysed to present both descriptive and inferential statistical findings.
Findings
The level of online SC increases as the level of privacy concern increases. The level of privacy concern increases as the levels of PA and PV increase and the level of effective IM decreases.
Originality/value
This study extends the literature on online SC, showing that PCs increase the level of SC in SNSs. It provides support for three antecedent factors to PC which impact upon levels of SC when communicating in SNSs.
Details
Keywords
Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis
This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…
Abstract
Purpose
This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.
Design/methodology/approach
The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.
Findings
The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.
Originality/value
This is the first in-depth, quantitative mapping study of all privacy research.
Details
Keywords
This paper aims to provide a brief overview of the ethical challenges facing researchers engaging with web archival materials and demonstrates a framework and method for…
Abstract
Purpose
This paper aims to provide a brief overview of the ethical challenges facing researchers engaging with web archival materials and demonstrates a framework and method for conducting research with historical web data created by young people.
Design/methodology/approach
This paper’s methodology is informed by the conceptual framing of data materials in research on the “right to be forgotten” (Crossen-White, 2015; GDPR, 2018; Tsesis, 2014), data afterlives (Agostinho, 2019; Stevenson and Gehl, 2019; Sutherland, 2017), indigenous data sovereignty and governance (Wemigwans, 2018) and feminist ethics of care (Cifor et al., 2019; Cowan, 2020; Franzke et al., 2020; Luka and Millette, 2018). It demonstrates a new method called an archive promenade, which builds on the walkthrough and scroll-back methods (Light et al., 2018; Robards and Lincoln, 2017).
Findings
The archive promenades demonstrate how individual attachments to digital traces vary and are often unpredictable, which necessitates further steps to ensure that privacy and data sovereignty are maintained through research with web archives.
Originality/value
This paper demonstrates how the archive promenade methodological intervention can lead to better practices of care with sensitive web materials and brings together previous work on ethical fabrications (Markham, 2012), speculation (Luka and Millette, 2018) and thick context (Marzullo et al., 2018), to yield new insights for research on the experiences of growing up online.
Details
Keywords
Bill Ming Gao, Matthew Tingchi Liu and Rongwei Chu
This paper aims to learn about consumers’ information disclosing patterns in the mobile internet context by investigating how demographic, geographic and psychological factors…
Abstract
Purpose
This paper aims to learn about consumers’ information disclosing patterns in the mobile internet context by investigating how demographic, geographic and psychological factors influence their information disclosing willingness (IDW).
Design/methodology/approach
Drawing on self-disclosure theory, the authors carried out simple linear regression analyses on a Chinese sample of 10,000 participants.
Findings
The results revealed that significant gender differences exist between males and females in their IDW in mobile internet context, and females have higher IDW than males do. And the authors also found that first-tier (third tier) citizens have the lowest (highest) IDW in their mobile internet usage.
Originality/value
This study offers three implications. First, this paper captures the insight of IDW within the mobile internet context, while previous studies mostly focus on the desktop internet context. Second, the results show that females have higher willingness to disclose than males do in the context of mobile internet, which is different from the findings of prior studies that females have higher privacy concerns and lower disclosing willingness in the context of desktop internet. Thirdly, this research introduces city tiers as a new approach to the study of IDW, which is one of the first studies exploring the geographical effect on information privacy.
Details
Keywords
To discuss the problem of cultural imperialism as it relates to human rights and to provide a framework for applying human rights to Library and Information Services (LIS) so as…
Abstract
Purpose
To discuss the problem of cultural imperialism as it relates to human rights and to provide a framework for applying human rights to Library and Information Services (LIS) so as to respect diverse worldviews.
Methodology/approach
The chapter is theoretical in nature but also draws out important practical implications. The problem is described and addressed using the approach of philosophical ethics emphasizing moral pluralism. Political and moral theories are compared and lessons drawn from them for LIS practice.
Findings
Drawing on the work of philosopher Jacques Maritain (1949) as well as contemporary human rights theory, an understanding of human rights as pluralistic and evolving practical principles is developed. Using Maritain’s conception of human rights as a set of common principles of action, guidelines for applying human rights in ways that avoid cultural imperialism are provided.
Social implications
The findings of this chapter should assist LIS professionals in understanding the relationship between human rights and cultural diversity. In addition, it gives professionals a framework for understanding and applying human rights in a ways that respects cultural diversity.
Originality/value
This chapter develops an original approach to applying human rights in a way that respects cultural diversity.
Details
Keywords
The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of…
Abstract
Purpose
The paper suggests overcoming the polarization of today's debate on peer‐to‐peer (P2P) systems by defining a fair balance between the principle of precaution and the principle of openness. Threats arising from these file sharing applications‐systems should not be a pretext to limit freedom of research, speech or the right “freely to participate in the cultural life of the community”, as granted by the Universal Declaration of Human Rights from 1948. The paper aims to take sides in today's debate.
Design/methodology/approach
The paper adopts an interdisciplinary approach, including network theory, law and ethics. The method draws on both theoretical and empirical material so as to stress the paradox of the principle of precaution applied to P2P systems and why the burden of proof should fall on the party proposing that one refrain from action.
Findings
Censors and opponents of P2P systems who propose to apply the principle of precaution to this case deny the premise upon which that principle rests. “Levels of evidence” required by the precautionary principle show that – in many cases in which the outcomes of technology are ignored – another principle is needed for orienting action, namely, the principle of openness.
Social implications
Alarm about how P2P systems undermine crucial elements of the societies often led to the ban of this technology. The paper illustrates why it should not be the case: rather than shutting these networks down, they should be further developed.
Originality/value
The paper provides the comprehensive picture of a far too often fragmented debate.
Details