Search results

1 – 10 of over 7000
To view the access options for this content please click here
Article
Publication date: 13 December 2019

Yang Li and Xuhua Hu

The purpose of this paper is to solve the problem of information privacy and security of social users. Mobile internet and social network are more and more deeply…

Abstract

Purpose

The purpose of this paper is to solve the problem of information privacy and security of social users. Mobile internet and social network are more and more deeply integrated into people’s daily life, especially under the interaction of the fierce development momentum of the Internet of Things and diversified personalized services, more and more private information of social users is exposed to the network environment actively or unintentionally. In addition, a large amount of social network data not only brings more benefits to network application providers, but also provides motivation for malicious attackers. Therefore, under the social network environment, the research on the privacy protection of user information has great theoretical and practical significance.

Design/methodology/approach

In this study, based on the social network analysis, combined with the attribute reduction idea of rough set theory, the generalized reduction concept based on multi-level rough set from the perspectives of positive region, information entropy and knowledge granularity of rough set theory were proposed. Furthermore, it was traversed on the basis of the hierarchical compatible granularity space of the original information system and the corresponding attribute values are coarsened. The selected test data sets were tested, and the experimental results were analyzed.

Findings

The results showed that the algorithm can guarantee the anonymity requirement of data publishing and improve the effect of classification modeling on anonymous data in social network environment.

Research limitations/implications

In the test and verification of privacy protection algorithm and privacy protection scheme, the efficiency of algorithm and scheme needs to be tested on a larger data scale. However, the data in this study are not enough. In the following research, more data will be used for testing and verification.

Practical implications

In the context of social network, the hierarchical structure of data is introduced into rough set theory as domain knowledge by referring to human granulation cognitive mechanism, and rough set modeling for complex hierarchical data is studied for hierarchical data of decision table. The theoretical research results are applied to hierarchical decision rule mining and k-anonymous privacy protection data mining research, which enriches the connotation of rough set theory and has important theoretical and practical significance for further promoting the application of this theory. In addition, combined the theory of secure multi-party computing and the theory of attribute reduction in rough set, a privacy protection feature selection algorithm for multi-source decision table is proposed, which solves the privacy protection problem of feature selection in distributed environment. It provides a set of effective rough set feature selection method for privacy protection classification mining in distributed environment, which has practical application value for promoting the development of privacy protection data mining.

Originality/value

In this study, the proposed algorithm and scheme can effectively protect the privacy of social network data, ensure the availability of social network graph structure and realize the need of both protection and sharing of user attributes and relational data.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

To view the access options for this content please click here
Article
Publication date: 5 June 2017

Jon D. Elhai, Jason C. Levine and Brian J. Hall

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine…

Abstract

Purpose

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.

Design/methodology/approach

In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.

Findings

Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.

Research limitations/implications

Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.

Practical implications

Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.

Originality/value

This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 11 February 2019

Sheshadri Chatterjee

The purpose of this study is to identify how the privacy policy can be framed for protection of personal data and how the latest judgement of full bench of Supreme Court…

Abstract

Purpose

The purpose of this study is to identify how the privacy policy can be framed for protection of personal data and how the latest judgement of full bench of Supreme Court of India has dealt with right to privacy in India.

Design/methodology/approach

The study uses the latest Supreme Court judgement on right to privacy and historical cases on right to privacy in India. This paper uses Indian Constitution as a source of Information for study along with case laws and judgements of different courts in India.

Findings

This paper tries to find if personal data privacy is a fundamental right in India. In addition, the paper provides recommendations to different concerned authorities on protecting personal information in online platform.

Research limitations/implications

This study deals with privacy issues so far as Indian citizens are concerns and does not focus on other countries. Moreover, the study tries to understand the issue of fundamental rights from Indian Constitution perspective. In addition, the recommendations provided to the policymakers and other authorities of India have wide implications for formulation of new policy and management of personal data, so that it should not go to wrong hands and the personal data and privacy is protected of the citizens.

Practical implications

Millions of people put their personal information in online platform. In addition, there are few government initiatives in India such as Aadhaar card where the biometric information is taken from the residents of India, and in many cases, the personal data are compromised under various circumstances. As the personal data of the citizens are in question, thus the study has direct practical implication mainly for all the citizens whose personal data are available in online platform.

Social implications

This study has social implication as it dealt with the “personal data” of the citizens of India. As the paper discusses the issue of protection of personal data in the context of right to privacy, thus this study has a direct social impact so far as online citizen of India is concerned.

Originality/value

This paper is timely, original and discusses the contemporary issue of online data privacy and fundamental right in India. This paper is a useful resource for the researchers, policymakers and online users who deal with personal data-, right to privacy and data privacy policy-related areas.

Details

International Journal of Law and Management, vol. 61 no. 1
Type: Research Article
ISSN: 1754-243X

Keywords

To view the access options for this content please click here
Article
Publication date: 6 August 2018

Jawahitha Sarabdeen and Immanuel Azaad Moonesar

The move toward e-health care in various countries is envisaged to reduce the cost of provision of health care, improve the quality of care and reduce medical errors. The…

Abstract

Purpose

The move toward e-health care in various countries is envisaged to reduce the cost of provision of health care, improve the quality of care and reduce medical errors. The most significant problem is the protection of patients’ data privacy. If the patients are reluctant or refuse to participate in health care system due to lack of privacy laws and regulations, the benefit of the full-fledged e-health care system cannot be materialized. The purpose of this paper is to investigate the available e-health data privacy protection laws and the perception of the people using the e-health care facilities.

Design/methodology/approach

The researchers used content analysis to analyze the availability and comprehensive nature of the laws and regulations. The researchers also used survey method. Participants in the study comprised of health care professionals (n=46) and health care users (n=187) who are based in the Dubai, United Arab Emirates. The researchers applied descriptive statistics mechanisms and correlational analysis to analyze the data in the survey.

Findings

The content analysis revealed that the available health data protection laws are limited in scope. The survey results, however, showed that the respondents felt that they could trust the e-health services systems offered in the UAE as the data collected is protected, the rights are not violated. The research also revealed that there was no significance difference between the nationality and the privacy data statements. All the nationality agreed that there is protection in place for the protection of e-health data. There was no significance difference between the demographic data sets and the many data protection principles.

Originality/value

The findings on the users’ perception could help to evaluate the success in realizing current strategies and an action plan of benchmarking could be introduced.

Details

Benchmarking: An International Journal, vol. 25 no. 6
Type: Research Article
ISSN: 1463-5771

Keywords

To view the access options for this content please click here

Abstract

Details

Drones and the Law
Type: Book
ISBN: 978-1-80043-249-9

To view the access options for this content please click here
Article
Publication date: 18 September 2019

Matteo La Torre, Vida Lucia Botes, John Dumay and Elza Odendaal

Privacy concerns and data security are changing the risks for businesses and organisations. This indicates that the accountability of all governance participants changes…

Abstract

Purpose

Privacy concerns and data security are changing the risks for businesses and organisations. This indicates that the accountability of all governance participants changes. This paper aims to investigate the role of external auditors within data protection practices and how their role is evolving due to the current digital ecosystem.

Design/methodology/approach

By surveying the literature, the authors embrace a practice-oriented perspective to explain how data protection practices emerge, exist and occur and examine the auditors’ position within data protection.

Findings

Auditors need to align their tasks to the purpose of data protection practices. Accordingly, in accessing and using data, auditors are required to engage moral judgements and follow ethical principles that go beyond their legal responsibility. Simultaneously, their accountability extends to data protection ends for instilling confidence that security risks are properly managed. Due to the changing technological conditions under, which auditors operate, the traditional auditors’ task of hearing and verifying extend to new phenomena that create risks for businesses. Thus, within data protection practices, auditors have the accountability to keep interested parties informed about data security and privacy risks, continue to transmit signals to users and instill confidence in businesses.

Research limitations/implications

The normative level of the study is a research limitation, which calls for future empirical research on how Big Data and data protection is reshaping accounting and auditing practices.

Practical implications

This paper provides auditing standard setters and practitioners with insights into the redefinitions of auditing practices in the era of Big Data.

Social implications

Recent privacy concerns at Facebook have sent warning signals across the world about the risks posed by in Big Data systems in terms of privacy, to those charged with governance of organisations. Auditors need to understand these privacy issues to better serve their clients.

Originality/value

This paper contributes to triggering discussions and future research on data protection and privacy in accounting and auditing research, which is an emerging, yet unresearched topic.

Details

Managerial Auditing Journal, vol. 36 no. 2
Type: Research Article
ISSN: 0268-6902

Keywords

To view the access options for this content please click here
Article
Publication date: 18 May 2015

Zhihong Gao and Susan O’Sullivan-Gavin

Given the unique cultural-political context of China, this paper aims to investigate two research questions: What has been the development trajectory of policy-making on…

Abstract

Purpose

Given the unique cultural-political context of China, this paper aims to investigate two research questions: What has been the development trajectory of policy-making on consumer privacy protection in China, and what factors have shaped its development over the years?

Design/methodology/approach

This paper adopts a historical approach and examines the development of Chinese consumer privacy policy during four periods: 1980s, 1990s, 2000s and 2010-present.

Findings

Chinese policy-making on consumer privacy protection has made steady advancement in the past few decades due to factors such as technological development, elite advocacy and emulation of other markets; however, the effects of these factors are conditioned by local forces.

Originality/value

To date, most studies of consumer privacy issues have focused on Western countries, especially the European Union and the USA. A better understanding of how consumer privacy policy has developed in China provides important lessons on the promotion of consumer privacy protection in other developing countries.

Details

Journal of Historical Research in Marketing, vol. 7 no. 2
Type: Research Article
ISSN: 1755-750X

Keywords

To view the access options for this content please click here
Article
Publication date: 11 June 2018

Montserrat Batet and David Sánchez

To overcome the limitations of purely statistical approaches to data protection, the purpose of this paper is to propose Semantic Disclosure Control (SeDC): an inherently…

Abstract

Purpose

To overcome the limitations of purely statistical approaches to data protection, the purpose of this paper is to propose Semantic Disclosure Control (SeDC): an inherently semantic privacy protection paradigm that, by relying on state of the art semantic technologies, rethinks privacy and data protection in terms of the meaning of the data.

Design/methodology/approach

The need for data protection mechanisms able to manage data from a semantic perspective is discussed and the limitations of statistical approaches are highlighted. Then, SeDC is presented by detailing how it can be enforced to detect and protect sensitive data.

Findings

So far, data privacy has been tackled from a statistical perspective; that is, available solutions focus just on the distribution of the data values. This contrasts with the semantic way by which humans understand and manage (sensitive) data. As a result, current solutions present limitations both in preventing disclosure risks and in preserving the semantics (utility) of the protected data.

Practical implications

SeDC captures more general, realistic and intuitive notions of privacy and information disclosure than purely statistical methods. As a result, it is better suited to protect heterogenous and unstructured data, which are the most common in current data release scenarios. Moreover, SeDC preserves the semantics of the protected data better than statistical approaches, which is crucial when using protected data for research.

Social implications

Individuals are increasingly aware of the privacy threats that the uncontrolled collection and exploitation of their personal data may produce. In this respect, SeDC offers an intuitive notion of privacy protection that users can easily understand. It also naturally captures the (non-quantitative) privacy notions stated in current legislations on personal data protection.

Originality/value

On the contrary to statistical approaches to data protection, SeDC assesses disclosure risks and enforces data protection from a semantic perspective. As a result, it offers more general, intuitive, robust and utility-preserving protection of data, regardless their type and structure.

Details

Online Information Review, vol. 42 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 2001

Vanishree Rudraswamy and David A. Vance

Information privacy is currently regarded as one of the key ethical issues of the information age. Rapid technological developments and the advent of Internet based…

Abstract

Information privacy is currently regarded as one of the key ethical issues of the information age. Rapid technological developments and the advent of Internet based commerce or electronic commerce (e‐commerce) have forced several nations of the world to enact legislation to protect the information privacy of their citizens and corporations. Transborder data flows (TBDFs) have been known to have a significant impact on multinational and transnational corporations with respect to international data transfers. This paper discusses the issues and implications of TBDFs and provides a comparative account of the privacy laws on individual data protection in different countries. Also proposed is a theoretical model relating to diffusion of social policies of use with respect to the adoption and diffusion of privacy laws by different nations of the world in a global e‐commerce environment.

Details

Logistics Information Management, vol. 14 no. 1/2
Type: Research Article
ISSN: 0957-6053

Keywords

To view the access options for this content please click here
Article
Publication date: 22 May 2009

Humphry Hung and Y.H. Wong

The purpose of this study is to develop and validate a model to analyze the inter‐relationship between information transparency and the protection of digital privacy of…

Abstract

Purpose

The purpose of this study is to develop and validate a model to analyze the inter‐relationship between information transparency and the protection of digital privacy of customers, from the perspective of e‐services providers.

Design/methodology/approach

A total of 320 questionnaires were sent out to all e‐banking service providers in the Guangdong province in China in 2004 and 150 useable questionnaires were collected. The response rate was 46.9 percent.

Findings

The paper identifies three types of digital privacy: information, communication and individual privacy. The findings show that e‐service marketers who adopt a more open information transparency policy are more likely to pay attention to customers' information and communication privacy, but less to their individual privacy.

Practical implications

E‐services providers need to be very careful about the necessity to be transparent in information sharing, but at the same time, have to be well aware of the need of the protection of individual privacy of their customers. Unfortunately, at times they may be too aggressive in adopting an open information transparency policy that may upset their customers by intruding into their individual privacy.

Originality/value

The paper contributes to a more comprehensive conceptualization of digital privacy not only by identifying three generic types of privacy (information, communication and individual), but also by looking into the relationship between information transparency and these three generic types of privacy. This study shows that, unlike the first two types of privacy, individual privacy of customers is given less concern by most e‐service providers.

Details

Journal of Services Marketing, vol. 23 no. 3
Type: Research Article
ISSN: 0887-6045

Keywords

1 – 10 of over 7000