Search results
1 – 10 of 927The purpose of this paper is to research attempts to educate public librarians in the importance of user privacy issues and assist in reducing privacy violations by providing…
Abstract
Purpose
The purpose of this paper is to research attempts to educate public librarians in the importance of user privacy issues and assist in reducing privacy violations by providing librarians with an educational program on the subject and measuring its effects.
Design/methodology/approach
Research was conducted to examine the influence of education on library user privacy. An education program on the topic was developed and effects of the training were measured with pre- and post-seminar surveys.
Findings
Concern for the protection of user privacy increased after the training, and its importance was rated higher as participating librarians became aware of the current likelihood of privacy violations, given the amount of user data libraries collect regularly. The demand for user privacy education also significantly increased after the librarian training course had been completed.
Originality/value
This research verified that user privacy awareness can be greatly improved by educating librarians. The awareness change in librarians could greatly contribute to user protection and the basic mission of the library while controversial issues about privacy violation and filter bubbles are seriously discussed.
Details
Keywords
Shuchih Ernest Chang, Anne Yenching Liu and Sungmin Lin
– The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring.
Abstract
Purpose
The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring.
Design/methodology/approach
The research used the metaphor of boundary turbulence in the Communication Privacy Management (CPM) theory to demonstrate the psychological effect on employees. The model comprised organizational culture, CPM, trust, and employee performance in employee monitoring to further investigated the influence exerted by organizational culture and how employees viewed their trust within the organization when implementing employee monitoring. Variables were measured empirically by administrating questionnaires to full-time employees in organizations that currently practice employee monitoring.
Findings
The findings showed that a control-oriented organizational culture raised communication privacy turbulence in CPM. The communication privacy turbulence in CPM mostly had negative effects on trust in employee monitoring policy, but not on trust in employee monitoring members. Both trust in employee monitoring policy and trust in employee monitoring members had positive effects on employee commitment and compliance to employee monitoring.
Research limitations/implications
This research applied the CPM theory in workplace privacy to explore the relationship between employees’ privacy and trust. The results provide insights of why employees feel psychological resistance when they are forced to accept the practice of employee monitoring. In addition, this study explored the relationship between CPM and trust, and offer support and verification to prior studies.
Practical implications
For practitioners, the findings help organizations to improve the performance of their employees and to design a more effective environment for employee monitoring.
Originality/value
A research model was proposed to study the impacts of CPM on employee monitoring, after a broad survey on related researches. The validated model and its corresponding study results can be referenced by organization managers and decision makers to make favorable tactics for achieving their goals of implementing employee monitoring.
Details
Keywords
The purpose of this study is to identify how the privacy policy can be framed for protection of personal data and how the latest judgement of full bench of Supreme Court of India…
Abstract
Purpose
The purpose of this study is to identify how the privacy policy can be framed for protection of personal data and how the latest judgement of full bench of Supreme Court of India has dealt with right to privacy in India.
Design/methodology/approach
The study uses the latest Supreme Court judgement on right to privacy and historical cases on right to privacy in India. This paper uses Indian Constitution as a source of Information for study along with case laws and judgements of different courts in India.
Findings
This paper tries to find if personal data privacy is a fundamental right in India. In addition, the paper provides recommendations to different concerned authorities on protecting personal information in online platform.
Research limitations/implications
This study deals with privacy issues so far as Indian citizens are concerns and does not focus on other countries. Moreover, the study tries to understand the issue of fundamental rights from Indian Constitution perspective. In addition, the recommendations provided to the policymakers and other authorities of India have wide implications for formulation of new policy and management of personal data, so that it should not go to wrong hands and the personal data and privacy is protected of the citizens.
Practical implications
Millions of people put their personal information in online platform. In addition, there are few government initiatives in India such as Aadhaar card where the biometric information is taken from the residents of India, and in many cases, the personal data are compromised under various circumstances. As the personal data of the citizens are in question, thus the study has direct practical implication mainly for all the citizens whose personal data are available in online platform.
Social implications
This study has social implication as it dealt with the “personal data” of the citizens of India. As the paper discusses the issue of protection of personal data in the context of right to privacy, thus this study has a direct social impact so far as online citizen of India is concerned.
Originality/value
This paper is timely, original and discusses the contemporary issue of online data privacy and fundamental right in India. This paper is a useful resource for the researchers, policymakers and online users who deal with personal data-, right to privacy and data privacy policy-related areas.
Details
Keywords
Rena Lavranou and Aggeliki Tsohou
This paper aims to present a common body of knowledge (CBK) for the field of information privacy, titled InfoPrivacy CBK. The purpose of the proposed CBK is to guide internet…
Abstract
Purpose
This paper aims to present a common body of knowledge (CBK) for the field of information privacy, titled InfoPrivacy CBK. The purpose of the proposed CBK is to guide internet users to better understand the concept of information privacy and associate information privacy-related concepts. The InfoPrivacy CBK was created with an educational orientation to provide the basis for designing privacy awareness and training programs and organizing relevant educational material.
Design/methodology/approach
The proposed CBK for information privacy was developed conceptually and includes five domains and four levels of analysis. It is illustrated with conceptual maps. The authors identified a variety of concepts related to information privacy and created a set of categories to categorize the concepts. They used, as inclusion criteria, both theoretical and practical information privacy aspects, so that the developed CBK can address the challenges of modern technologies for preserving information privacy.
Findings
To validate and refine the conceptually developed CBK, the authors conducted an empirical research, in which seven information privacy experts participated. The experts commented largely positively for the structure and content of InfoPrivacy CBK, as well as for the extent to which it achieves the intended educational goals.
Research limitations/implications
The proposed InfoPrivacy CBK was validated by a limited number of information privacy experts, mainly due to the lengthy and in-depth participation that was required.
Practical implications
The InfoPrivacy CBK can be used primarily by privacy awareness and training programs developers, such as organizations, data protection officers, the state, educational policy makers and teachers.
Social implications
Internet users will benefit from InfoPrivacy CBK by acquiring knowledge and skills from theoretically grounded training programs, which can enhance their awareness and critical thinking on issues related to the protection of their information privacy. This will lead to more privacy-aware online societies, communities, networks, etc.
Originality/value
This work intends to bridge the existing gap in the literature through the creation of a novel CBK for information privacy; information privacy is a field for which no such research effort has been recorded. This paper offers important knowledge in the field of information privacy, which could be useful to both technological education designers and learners (students, employees, etc.).
Details
Keywords
The purpose of this paper is to analyse social media issues that give rise to employment-related legal and ethical dilemmas, with reference made to recent case law development…
Abstract
Purpose
The purpose of this paper is to analyse social media issues that give rise to employment-related legal and ethical dilemmas, with reference made to recent case law development, and offer recommendations for employers and employees.
Design/methodology/approach
Prior research, statistical trends, and case laws are reviewed.
Findings
Employers using social media for employment decisions may risk crossing the lines of discrimination, infringement on personal privacy, and/or interference with employees’ concerted activities protected by US law. However, employers not using social media may face negligent hiring and damages for improper employee messages posted. For employees, while social media provides a connection tool, messages posted off-duty and thought to be “private” may still be used as evidence in support of disciplinary actions.
Practical implications
Employers, employees, and their unions must be cognizant of the ethical and legal implications of using social media in the employment context, and the latest developments in the privacy rights, human rights, labour relations rights, and contractual rights. Concerns about power shift need to be addressed.
Social implications
Social media growth has blurred the boundary between work and private lives. With employers able to monitor employees’ social media activities almost at all times, this has implications for the overall power and control. On the other hand, employees may find social media offering another voice channel that can also potentially increase their power to some extent.
Originality/value
Social media is a fast developing area with new case laws emerging regarding its use in the employment context. The paper provides a systemic review of the issues and latest developments.
Details
Keywords
The purpose of this paper is to forward specific policy proposals permitting greater sharing of health data across multi-level government agencies with the purpose of improving…
Abstract
Purpose
The purpose of this paper is to forward specific policy proposals permitting greater sharing of health data across multi-level government agencies with the purpose of improving rapid identification of bioterrorist attack or disease epidemics while protecting patient privacy.
Design/methodology/approach
A systematic literature review searched the following keyword phrases: knowledge sharing in the public sector, raw data sharing, interagency information systems, federal data sharing technology network and network theory on five primary databases.
Findings
The volunteer nature of data sharing must evolve through public health policy to permit interagency data access agreements while minimizing privacy infringement. A multi-level information infrastructure network linking agencies tasked to develop medical countermeasures is recommended.
Originality/value
This study optimizes the health data collection process to create a medical countermeasure network, demonstrates the utility of operationalizing data metrics for a US federal agency and advances meaningful use of electronic medical records.
Details
Keywords
This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated…
Abstract
This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated violence and then highlights the international human rights instruments that are triggered by the various forms of such violence. Ultimately, it focuses upon international human rights to privacy and to freedom from violence (especially gender-based violence) and the obligations on State and Nonstate actors to address violations of these rights. It argues that adoption of a human rights perspective on technology-facilitated violence better enables us to hold State and Nonstate actors to account in finding meaningful ways to address violence in all of its forms.
Details
Keywords
Jillian Carmody, Samir Shringarpure and Gerhard Van de Venter
The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges…
Abstract
Purpose
The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection.
Design/methodology/approach
The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies.
Findings
The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets.
Social implications
The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions.
Originality/value
The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.
Details
Keywords
The purpose of this paper is to examine privacy rights and the relationship between those rights and business and government interests in data collected from individuals.
Abstract
Purpose
The purpose of this paper is to examine privacy rights and the relationship between those rights and business and government interests in data collected from individuals.
Design/methodology/approach
This paper approaches legal issues from the perspective of the consumer or citizen.
Findings
While conducting research for this paper, it was found that the issues facing the citizenry on privacy protection have been addressed extensively in the not too distant past. The distinguishing characteristic is the speed with which data can be collected and disseminated and the infinitely more vast amount of personal data being collected not only by the government and businesses with whom consumers conduct transactions, but also by independent data brokers.
Originality/value
Privacy rights are ephemeral and difficult to measure. Businesses, therefore, appear to have difficulty determining the value of protecting consumers' privacy. Additionally, governments from which citizens derive many social services accumulate substantial personal information given in exchange for those services. Businesses and governments are increasingly negligent in protecting the data collected on individuals, which has been revealed by a series of reported data breaches, disclosures, thefts, and surveillance activities. This paper addresses the inherent value in protecting the privacy interests of individuals and proposes that more robust privacy laws, derived from established tort law, be developed and used by concerned persons.
Details
Keywords
To provide practitioners of management a sense of the importance of strategically leveraging the current and historic development of radio frequency identification (RFID) in order…
Abstract
Purpose
To provide practitioners of management a sense of the importance of strategically leveraging the current and historic development of radio frequency identification (RFID) in order to find inexpensive applications of radio frequency‐based (RF) technologies in many areas.
Design/methodology/approach
A review of the applied literature on RFID, as well as from practical experience, resulted in a basic model of viewpoint to understand the nature of the emergent RF‐based industry.
Findings
Wal‐Mart and other cost sensitive and value chain progressive companies' usage of RFID‐based technology should revolutionize the method that companies' track inventory. However, some of the disadvantages include costs, training, product label and supplies, and privacy infringement. One asset to companies like Wal‐Mart is pallet tracking because it improves on‐time inventory delivery. This helps Wal‐Mart since they rely on just‐in‐time ordering.
Research limitations/implications
RFID is currently used in many industries such as transportation and distribution, manufacturing and processing, and security and law enforcement. The advantages RFID gives to companies are the following: enhanced record management, customer behavior patterns, and accurate inventory tracking.
Practical implications
This paper describes RFID and its implementation process in an academic manner, some disadvantages of RFID, and examples of how the technology can improve customer relationship management (CRM) are discussed. Originality/value – This form of identification can be used in large stores like Wal‐Mart to receive real time information. By implementing RFID, companies will create a fully integrated supply chain system. Traditionally, many supply chain management (SCM) research has simply viewed RF‐based technology as a technological innovation, not a transformational event as this paper presents.
Details