Search results

1 – 10 of 927
Article
Publication date: 10 June 2014

Younghee Noh

The purpose of this paper is to research attempts to educate public librarians in the importance of user privacy issues and assist in reducing privacy violations by providing…

2209

Abstract

Purpose

The purpose of this paper is to research attempts to educate public librarians in the importance of user privacy issues and assist in reducing privacy violations by providing librarians with an educational program on the subject and measuring its effects.

Design/methodology/approach

Research was conducted to examine the influence of education on library user privacy. An education program on the topic was developed and effects of the training were measured with pre- and post-seminar surveys.

Findings

Concern for the protection of user privacy increased after the training, and its importance was rated higher as participating librarians became aware of the current likelihood of privacy violations, given the amount of user data libraries collect regularly. The demand for user privacy education also significantly increased after the librarian training course had been completed.

Originality/value

This research verified that user privacy awareness can be greatly improved by educating librarians. The awareness change in librarians could greatly contribute to user protection and the basic mission of the library while controversial issues about privacy violation and filter bubbles are seriously discussed.

Article
Publication date: 2 February 2015

Shuchih Ernest Chang, Anne Yenching Liu and Sungmin Lin

– The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring.

7226

Abstract

Purpose

The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring.

Design/methodology/approach

The research used the metaphor of boundary turbulence in the Communication Privacy Management (CPM) theory to demonstrate the psychological effect on employees. The model comprised organizational culture, CPM, trust, and employee performance in employee monitoring to further investigated the influence exerted by organizational culture and how employees viewed their trust within the organization when implementing employee monitoring. Variables were measured empirically by administrating questionnaires to full-time employees in organizations that currently practice employee monitoring.

Findings

The findings showed that a control-oriented organizational culture raised communication privacy turbulence in CPM. The communication privacy turbulence in CPM mostly had negative effects on trust in employee monitoring policy, but not on trust in employee monitoring members. Both trust in employee monitoring policy and trust in employee monitoring members had positive effects on employee commitment and compliance to employee monitoring.

Research limitations/implications

This research applied the CPM theory in workplace privacy to explore the relationship between employees’ privacy and trust. The results provide insights of why employees feel psychological resistance when they are forced to accept the practice of employee monitoring. In addition, this study explored the relationship between CPM and trust, and offer support and verification to prior studies.

Practical implications

For practitioners, the findings help organizations to improve the performance of their employees and to design a more effective environment for employee monitoring.

Originality/value

A research model was proposed to study the impacts of CPM on employee monitoring, after a broad survey on related researches. The validated model and its corresponding study results can be referenced by organization managers and decision makers to make favorable tactics for achieving their goals of implementing employee monitoring.

Details

Industrial Management & Data Systems, vol. 115 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 11 February 2019

Sheshadri Chatterjee

The purpose of this study is to identify how the privacy policy can be framed for protection of personal data and how the latest judgement of full bench of Supreme Court of India…

1228

Abstract

Purpose

The purpose of this study is to identify how the privacy policy can be framed for protection of personal data and how the latest judgement of full bench of Supreme Court of India has dealt with right to privacy in India.

Design/methodology/approach

The study uses the latest Supreme Court judgement on right to privacy and historical cases on right to privacy in India. This paper uses Indian Constitution as a source of Information for study along with case laws and judgements of different courts in India.

Findings

This paper tries to find if personal data privacy is a fundamental right in India. In addition, the paper provides recommendations to different concerned authorities on protecting personal information in online platform.

Research limitations/implications

This study deals with privacy issues so far as Indian citizens are concerns and does not focus on other countries. Moreover, the study tries to understand the issue of fundamental rights from Indian Constitution perspective. In addition, the recommendations provided to the policymakers and other authorities of India have wide implications for formulation of new policy and management of personal data, so that it should not go to wrong hands and the personal data and privacy is protected of the citizens.

Practical implications

Millions of people put their personal information in online platform. In addition, there are few government initiatives in India such as Aadhaar card where the biometric information is taken from the residents of India, and in many cases, the personal data are compromised under various circumstances. As the personal data of the citizens are in question, thus the study has direct practical implication mainly for all the citizens whose personal data are available in online platform.

Social implications

This study has social implication as it dealt with the “personal data” of the citizens of India. As the paper discusses the issue of protection of personal data in the context of right to privacy, thus this study has a direct social impact so far as online citizen of India is concerned.

Originality/value

This paper is timely, original and discusses the contemporary issue of online data privacy and fundamental right in India. This paper is a useful resource for the researchers, policymakers and online users who deal with personal data-, right to privacy and data privacy policy-related areas.

Details

International Journal of Law and Management, vol. 61 no. 1
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 28 August 2019

Rena Lavranou and Aggeliki Tsohou

This paper aims to present a common body of knowledge (CBK) for the field of information privacy, titled InfoPrivacy CBK. The purpose of the proposed CBK is to guide internet…

Abstract

Purpose

This paper aims to present a common body of knowledge (CBK) for the field of information privacy, titled InfoPrivacy CBK. The purpose of the proposed CBK is to guide internet users to better understand the concept of information privacy and associate information privacy-related concepts. The InfoPrivacy CBK was created with an educational orientation to provide the basis for designing privacy awareness and training programs and organizing relevant educational material.

Design/methodology/approach

The proposed CBK for information privacy was developed conceptually and includes five domains and four levels of analysis. It is illustrated with conceptual maps. The authors identified a variety of concepts related to information privacy and created a set of categories to categorize the concepts. They used, as inclusion criteria, both theoretical and practical information privacy aspects, so that the developed CBK can address the challenges of modern technologies for preserving information privacy.

Findings

To validate and refine the conceptually developed CBK, the authors conducted an empirical research, in which seven information privacy experts participated. The experts commented largely positively for the structure and content of InfoPrivacy CBK, as well as for the extent to which it achieves the intended educational goals.

Research limitations/implications

The proposed InfoPrivacy CBK was validated by a limited number of information privacy experts, mainly due to the lengthy and in-depth participation that was required.

Practical implications

The InfoPrivacy CBK can be used primarily by privacy awareness and training programs developers, such as organizations, data protection officers, the state, educational policy makers and teachers.

Social implications

Internet users will benefit from InfoPrivacy CBK by acquiring knowledge and skills from theoretically grounded training programs, which can enhance their awareness and critical thinking on issues related to the protection of their information privacy. This will lead to more privacy-aware online societies, communities, networks, etc.

Originality/value

This work intends to bridge the existing gap in the literature through the creation of a novel CBK for information privacy; information privacy is a field for which no such research effort has been recorded. This paper offers important knowledge in the field of information privacy, which could be useful to both technological education designers and learners (students, employees, etc.).

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 April 2016

Helen Lam

The purpose of this paper is to analyse social media issues that give rise to employment-related legal and ethical dilemmas, with reference made to recent case law development…

15994

Abstract

Purpose

The purpose of this paper is to analyse social media issues that give rise to employment-related legal and ethical dilemmas, with reference made to recent case law development, and offer recommendations for employers and employees.

Design/methodology/approach

Prior research, statistical trends, and case laws are reviewed.

Findings

Employers using social media for employment decisions may risk crossing the lines of discrimination, infringement on personal privacy, and/or interference with employees’ concerted activities protected by US law. However, employers not using social media may face negligent hiring and damages for improper employee messages posted. For employees, while social media provides a connection tool, messages posted off-duty and thought to be “private” may still be used as evidence in support of disciplinary actions.

Practical implications

Employers, employees, and their unions must be cognizant of the ethical and legal implications of using social media in the employment context, and the latest developments in the privacy rights, human rights, labour relations rights, and contractual rights. Concerns about power shift need to be addressed.

Social implications

Social media growth has blurred the boundary between work and private lives. With employers able to monitor employees’ social media activities almost at all times, this has implications for the overall power and control. On the other hand, employees may find social media offering another voice channel that can also potentially increase their power to some extent.

Originality/value

Social media is a fast developing area with new case laws emerging regarding its use in the employment context. The paper provides a systemic review of the issues and latest developments.

Details

Employee Relations, vol. 38 no. 3
Type: Research Article
ISSN: 0142-5455

Keywords

Article
Publication date: 1 June 2015

Beth Ann Fiedler

The purpose of this paper is to forward specific policy proposals permitting greater sharing of health data across multi-level government agencies with the purpose of improving…

Abstract

Purpose

The purpose of this paper is to forward specific policy proposals permitting greater sharing of health data across multi-level government agencies with the purpose of improving rapid identification of bioterrorist attack or disease epidemics while protecting patient privacy.

Design/methodology/approach

A systematic literature review searched the following keyword phrases: knowledge sharing in the public sector, raw data sharing, interagency information systems, federal data sharing technology network and network theory on five primary databases.

Findings

The volunteer nature of data sharing must evolve through public health policy to permit interagency data access agreements while minimizing privacy infringement. A multi-level information infrastructure network linking agencies tasked to develop medical countermeasures is recommended.

Originality/value

This study optimizes the health data collection process to create a medical countermeasure network, demonstrates the utility of operationalizing data metrics for a US federal agency and advances meaningful use of electronic medical records.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. 9 no. 2
Type: Research Article
ISSN: 1750-6123

Keywords

Open Access
Book part
Publication date: 4 June 2021

Elizabeth Coombs

This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated…

Abstract

This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated violence and then highlights the international human rights instruments that are triggered by the various forms of such violence. Ultimately, it focuses upon international human rights to privacy and to freedom from violence (especially gender-based violence) and the obligations on State and Nonstate actors to address violations of these rights. It argues that adoption of a human rights perspective on technology-facilitated violence better enables us to hold State and Nonstate actors to account in finding meaningful ways to address violence in all of its forms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Article
Publication date: 29 July 2021

Jillian Carmody, Samir Shringarpure and Gerhard Van de Venter

The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges…

2571

Abstract

Purpose

The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection.

Design/methodology/approach

The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies.

Findings

The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets.

Social implications

The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions.

Originality/value

The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 October 2006

Cynthia M. Gayton

The purpose of this paper is to examine privacy rights and the relationship between those rights and business and government interests in data collected from individuals.

1668

Abstract

Purpose

The purpose of this paper is to examine privacy rights and the relationship between those rights and business and government interests in data collected from individuals.

Design/methodology/approach

This paper approaches legal issues from the perspective of the consumer or citizen.

Findings

While conducting research for this paper, it was found that the issues facing the citizenry on privacy protection have been addressed extensively in the not too distant past. The distinguishing characteristic is the speed with which data can be collected and disseminated and the infinitely more vast amount of personal data being collected not only by the government and businesses with whom consumers conduct transactions, but also by independent data brokers.

Originality/value

Privacy rights are ephemeral and difficult to measure. Businesses, therefore, appear to have difficulty determining the value of protecting consumers' privacy. Additionally, governments from which citizens derive many social services accumulate substantial personal information given in exchange for those services. Businesses and governments are increasingly negligent in protecting the data collected on individuals, which has been revealed by a series of reported data breaches, disclosures, thefts, and surveillance activities. This paper addresses the inherent value in protecting the privacy interests of individuals and proposes that more robust privacy laws, derived from established tort law, be developed and used by concerned persons.

Details

VINE, vol. 36 no. 4
Type: Research Article
ISSN: 0305-5728

Keywords

Article
Publication date: 1 February 2005

Alan D. Smith

To provide practitioners of management a sense of the importance of strategically leveraging the current and historic development of radio frequency identification (RFID) in order…

9464

Abstract

Purpose

To provide practitioners of management a sense of the importance of strategically leveraging the current and historic development of radio frequency identification (RFID) in order to find inexpensive applications of radio frequency‐based (RF) technologies in many areas.

Design/methodology/approach

A review of the applied literature on RFID, as well as from practical experience, resulted in a basic model of viewpoint to understand the nature of the emergent RF‐based industry.

Findings

Wal‐Mart and other cost sensitive and value chain progressive companies' usage of RFID‐based technology should revolutionize the method that companies' track inventory. However, some of the disadvantages include costs, training, product label and supplies, and privacy infringement. One asset to companies like Wal‐Mart is pallet tracking because it improves on‐time inventory delivery. This helps Wal‐Mart since they rely on just‐in‐time ordering.

Research limitations/implications

RFID is currently used in many industries such as transportation and distribution, manufacturing and processing, and security and law enforcement. The advantages RFID gives to companies are the following: enhanced record management, customer behavior patterns, and accurate inventory tracking.

Practical implications

This paper describes RFID and its implementation process in an academic manner, some disadvantages of RFID, and examples of how the technology can improve customer relationship management (CRM) are discussed. Originality/value – This form of identification can be used in large stores like Wal‐Mart to receive real time information. By implementing RFID, companies will create a fully integrated supply chain system. Traditionally, many supply chain management (SCM) research has simply viewed RF‐based technology as a technological innovation, not a transformational event as this paper presents.

Details

Information Management & Computer Security, vol. 13 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of 927