首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 625 毫秒
1.
It is commonly accepted that the use of personal information in business and government puts individual privacy at risk. However, little is known about these risks-for instance, whether and how they can be measured, and how they vary across social groups and the sectors in which personal data are used. Unless we can gain a purchase on such issues, our knowledge of the societal effects of information technology and systems will remain deficient, and the ability to make and implement better policies for privacy protection, and perhaps for a more equitable distribution of risk and protection, will remain impaired. The article explores this topic, examining conventional paradigms in data protection, including the one-dimensional view of the 'data subject,' that inhibit better conceptualizations and practices. It looks at some comparative survey evidence that casts light on the question of the distribution of privacy risks and concerns. It examines theoretical issues in the literature on risk, raising questions about the objectivity and perception of the risk of privacy invasion.  相似文献   

2.
《普罗米修斯》2012,30(2):125-132

Privacy is universal value. But according to The Economist in 1999 it is finished - killed off by the remarkable capacity of information technology to analyse, trace and re-assemble personal data: affording an unprecedented insight into individual attitudes and activities. Based on the progress made in implementing the OECD Guidelines on Privacy (1980), the author, who chaired the OECD group that devised those Guidelines, reviews their impact, the need to update them and contemporary proposals for new privacy protections suitable to the current technologies. He concludes that the capacity to uphold human values in the context of new technologies, such as informatics and genomics, presents one of the largest ethical questions for the 21st century.  相似文献   

3.
Consumers can conduct mobile commerce via their smartphones. They can search for products and when ready, they pay and have the products delivered to their homes. By sharing personal information, they receive faster and more customized service. Because of the risk of loss of privacy, consumers need to balance their privacy concerns against the perceived value of enhanced mobile commerce. In this empirical study, the unified theory of acceptance and use of technology (UTAUT2) is modified where perceived value replaces price value to represent the value of an IT artifact that has no direct costs attributable to it. The framework is extended to include constructs from the privacy calculus. In addition, the construct of personal innovativeness is added as a moderator with the anticipation that owners of smartphones who are more personally innovative will be more willing to share information. From an empirical study of Canadian smartphone owners, the results show that perceived privacy concerns influence perceived value and that intention to use is significantly influenced by hedonic motivation and perceived value.  相似文献   

4.
The recently passed European Directive on the Protection of Personal Data aims to harmonize European data protection law at a higher level of protection than exists now. It represents a European consensus on a standard for personal privacy and a model for countries without data protection laws. The protracted process for agreement and ratification, however, has produced a document with many derogations and ambiguities, reflecting the wider moves towards 'subsidiarity' within the European Union. Of concern to North America is the stipulation that transborder data flow may not be permitted unless the receiving country can demonstrate an 'adequate' level of protection. While the process through which this provision will be interpreted and applied is so far found to be complicated and unclear, nevertheless European authorities will be reluctant to tolerate 'data havens,' a fact that should concern North American business that relies on the unimpeded flows of personal data from and to Europe. Neither Canada nor the United States can claim 'adequate' data protection according to the European standard. However, Canadian efforts through the Canadian Standards Association and the Federal Information Highway Advisory Council signal an attempt to fashion a more comprehensive policy framework for privacy than the more incremental and reactive approach of the United States. This divergence is explained by key cultural, economic, and political factors within Canada, which have caused a different reaction to the extraterritorial effects of the European Union's Data Protection Directive.  相似文献   

5.
The recently passed European Directive on the Protection of Personal Data aims to harmonize European data protection law at a higher level of protection than exists now. It represents a European consensus on a standard for personal privacy and a model for countries without data protection laws. The protracted process for agreement and ratification, however, has produced a document with many derogations and ambiguities, reflecting the wider moves towards ''subsidiarity'' within the European Union. Of concern to North America is the stipulation that transborder data flow may not be permitted unless the receiving country can demonstrate an ''adequate'' level of protection. While the process through which this provision will be interpreted and applied is so far found to be complicated and unclear, nevertheless European authorities will be reluctant to tolerate ''data havens,'' a fact that should concern North American business that relies on the unimpeded flows of personal data from and to Europe. Neither Canada nor the United States can claim ''adequate'' data protection according to the European standard. However, Canadian efforts through the Canadian Standards Association and the Federal Information Highway Advisory Council signal an attempt to fashion a more comprehensive policy framework for privacy than the more incremental and reactive approach of the United States. This divergence is explained by key cultural, economic, and political factors within Canada, which have caused a different reaction to the extraterritorial effects of the European Union's Data Protection Directive.  相似文献   

6.
This study aimed to investigate the issue of consumer intention to disclose personal information via mobile applications (apps). Drawing on the literature of privacy calculus theory, this research examined the factors that influence the trade-off decision of receiving perceived benefits and being penalized with perceived risks through the calculus lens. In particular, two paths of the direct effects on perceived benefits and risks that induce the ultimate intention to disclose personal information via mobile apps were proposed and empirically tested. The analysis showed that self-presentation and personalized services positively influence consumers’ perceived benefits, which in turn positively affects the intention to disclose personal information. Perceived severity and perceived control serve as the direct antecedents of perceived risks that negatively affect the intention of consumers to disclose personal information. Compared with the perceived risks, the perceived benefits more strongly influence the intention to disclose personal information. This study extends the literature on privacy concerns to consumer intention to disclose personal information by theoretically developing and empirically testing four hypotheses in a research model. Results were validated in the mobile context, and implications and discussions were presented.  相似文献   

7.
Computing resources are essential to foster the productivity of employees in organisations; however, non-work-related computing (NWRC) in the workplace has recently become a serious concern because employees often spend too much time in the personal use of computers. To deepen our understanding of employees' compliance with NWRC rules, we developed and tested a research model that focuses on the formation of procedural justice and moderating role of privacy concerns. The results indicate that employees are more willing to comply with NWRC rules when they believe fair procedures to be in place during the design and implementation of the rules. In addition, accuracy, consistency, and ethicality were found to enhance employees' belief in procedural justice. Further, we found that the effect of procedural justice on compliance intention is moderated by privacy concerns that arise from the implementation of NWRC rules.  相似文献   

8.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

9.
网络环境下个人信息安全与隐私问题的探析   总被引:7,自引:1,他引:7  
颜祥林 《情报科学》2002,20(9):937-940
随着互联网的发展,关于个人信息安全方面的问题已经越来越受到人们的关注,个人信息安全实际上强调的是隐私权的保护,本文分别从个人数据和私人生活安宁的两个角度,分析目前网络环境下存在的侵犯隐私权的若干情形。  相似文献   

10.
What's in a Name? Some Reflections on the Sociology of Anonymity   总被引:1,自引:0,他引:1  
To paraphrase Mark Twain, reports of either the recent death or coming dominance of anonymity have been greatly exaggerated. This article is a beginning effort to lay out some of the conceptual landscape needed to better understand anonymity and identifiability in contemporary life. I suggest seven types of identity knowledge, involving legal name, location, symbols linked and not linked back to these through intermediaries, distinctive appearance and behavior patterns, social categorization, and certification via knowledge or artifacts. I identify a number of major rationales and contexts for anonymity (free flow of communication, protection, experimentation) and identifiability (e.g., accountability, reciprocity, eligibility) and suggest a principle of truth in the nature of naming , which holds that those who use pseudonyms on the Internet in personal communications have an obligation to indicate they are doing so. I also suggest 13 procedural questions to guide the development and assessment of any internet policy regarding anonymity.  相似文献   

11.
Over the past decade, social media technologies have become effective tools not only for entertainment, but also for online health communications. In virtual health communities (VHCs), the members often share their personal health information (PHI) with other members. These information exchanges provide benefits to both the information providers as well as the recipients. The PHI disclosure, however, may entail privacy concerns. Our study used the privacy calculus model to examine the trade-off between individuals’ expected benefits and privacy concerns when disclosing PHI in social media environments. Our results showed that age, health status, and affective commitment influence the balance between the information disclosure drivers and barriers in the privacy calculus model. More specifically, we found that among members of VHCs, healthier people expect to receive fewer personal benefits of communicating PHI in social media environments. Moreover, individuals who are emotionally attached to online communities expect to both receive and provide more benefits while communicating PHI in those communities. We also observed that individuals who are familiar with but not members of VHCs, especially those who are young and healthy, are more concerned about their PHI privacy in online communities.  相似文献   

12.
美国《隐私权法》与公民个人信息保护   总被引:9,自引:1,他引:9  
周健 《情报科学》2001,19(6):608-611
本文介绍了美国《隐私权法》的立法原则、适用范围、个人记录公开的限制和登记、公民查询与修改个人记录的权利、对行政机关的限制与要求、免除适用的规定、该法与美国《信息自由法》的关系;论述了我国厂家和借鉴国外隐私保护的法律法规,强化政府信息法制建设力度,在确保国家和公共利益的前提下依法保护公民个人信息的必要性。  相似文献   

13.
The only way to be aware of the risks and threats of Facebook, the most commonly used social networking site in the world and Turkey, is to be a careful user changing the default settings or simply not to have a Facebook account. In Turkey, there is still no study in which personal information shared though social networking sites has been evaluated in terms of privacy. For this reason, the findings obtained of this study have a great importance in the general picture of the current situation and drawing attention to the risks of the issue in Turkey where there are no legal arrangements effectively protecting the users from such sites. This study aims to investigate the Facebook privacy of information professionals who are members of KUTUP-L, and to determine the sensitivity and level of awareness of information professionals in Turkey. Facebook user profiles of 400 information professionals, all KUTUP-L members, have been analyzed in a study examining 32 different privacy settings. A privacy score has been calculated for each user, and the relations between privacy results have been analyzed. The findings at the end of the study show that information professionals in Turkey do pay attention to privacy, and most of the users change the default settings in order to protect their personal information.  相似文献   

14.
This paper provides an analysis of the current and potential ethical implications of RFID technology for the library and information professions. These issues are analysed as a series of ethical dilemmas, or hard-to-resolve competing ethical obligations, which the librarian has in relationship to information objects, library users and the wider social and political environment or state. A process model of the library is used as a framework for the discussion to illustrate the relationship between the different participants in the library system and it is argued that ethical analysis should involve the identification of future developments as well as current issues. The analysis shows that RFIDs do currently pose some dilemmas for librarians in terms of the conflicts between efficient service, privacy of users and an obligation to protect the safety of society as a whole, and that these are likely to become more problematic as the technology develops. This paper is part 2 of a series of papers on RFIDs and the library and information professions.  相似文献   

15.
We are heading into an era of uncontrolled and uncontrollable information flow. In the past, the tools of information flow required large investments, and the persons controlling them were easily identifiable. Now, effective long-range communication with large numbers of people can be done using tools that are easily affordable to the average citizen. Moreover, it can be done in ways that make monitoring and control virtually impossible. This is not a worrisome future change that can be averted by prompt action; it is a fait accompli and there is no reversing it. However, this is not necessarily clear to those interested in monitoring and control. Unfortunately, the bulk of electronic communication is still relatively exposed to monitoring and control, and is likely to remain so for a while. The danger is that the authorities, trying to retain a grip on a situation that is irretrievably slipping away, will react to the extremes of the problem in ways that leave ordinary users' privacy unprotected. The best approach is to adapt traditional solutions rather than inventing new ones. The safeguards built into the traditional solutions may not be precisely appropriate, but they are far better than nothing.  相似文献   

16.
We are heading into an era of uncontrolled and uncontrollable information flow. In the past, the tools of information flow required large investments, and the persons controlling them were easily identifiable. Now, effective long-range communication with large numbers of people can be done using tools that are easily affordable to the average citizen. Moreover, it can be done in ways that make monitoring and control virtually impossible. This is not a worrisome future change that can be averted by prompt action; it is a fait accompli and there is no reversing it. However, this is not necessarily clear to those interested in monitoring and control. Unfortunately, the bulk of electronic communication is still relatively exposed to monitoring and control, and is likely to remain so for a while. The danger is that the authorities, trying to retain a grip on a situation that is irretrievably slipping away, will react to the extremes of the problem in ways that leave ordinary users' privacy unprotected. The best approach is to adapt traditional solutions rather than inventing new ones. The safeguards built into the traditional solutions may not be precisely appropriate, but they are far better than nothing.  相似文献   

17.
介绍了实用、方便、高性能的办公软件"办公通"的设计与实现方法,该软件利用实用的计算机编程技术,实现了个人文件管理、隐私保护、工作日程提醒的功能,且运用多线程并发的方式实现了局域网内即时通信。该软件基于Microsoft.net framework 3.0的框架编写,实验证明其适用于Microsoft Windows各种版本系统。  相似文献   

18.
While there is no question that the commercial development of the World Wide Web is still in its infancy and growing rapidly, this development faces a serious barrier to ultimate commercialization. In this article we develop the argument that the primary barrier to the successful commercial development of the Web is the current lack of consumer trust in this new commercial medium. This lack of trust is engendered primarily by the industry's documented failure to respond satisfactorily to mounting consumer concerns over information privacy in electronic, networked environments. We examine how such concerns are affecting the growth and development of consumer-oriented commercial activity on the World Wide Web and investigate the implications of these concerns for potential industry response. In the short run, the commercial development of the Web depends on giving consumers the opportunity to be anonymous when engaging in information exchanges and online transactions. Ultimately, however, commercial Web providers must come to realize that the Internet dramatically shifts the balance of power between a business and its customers, and therefore, radical new business strategies will be required for long-term success. Because the Web offers unprecedented opportunities for interacting with customers, strategies that take advantage of the medium's unique features are likely to reap important rewards in customer satisfaction, loyalty, and retention. Therefore, in the long run, the most effective way for commercial Web providers to develop profitable exchange relationships with online customers is to gain consumer trust by allowing the balance of power to shift toward more cooperative interactions between firms and their customers.  相似文献   

19.
While there is no question that the commercial development of the World Wide Web is still in its infancy and growing rapidly, this development faces a serious barrier to ultimate commercialization. In this article we develop the argument that the primary barrier to the successful commercial development of the Web is the current lack of consumer trust in this new commercial medium. This lack of trust is engendered primarily by the industry's documented failure to respond satisfactorily to mounting consumer concerns over information privacy in electronic, networked environments. We examine how such concerns are affecting the growth and development of consumer-oriented commercial activity on the World Wide Web and investigate the implications of these concerns for potential industry response. In the short run, the commercial development of the Web depends on giving consumers the opportunity to be anonymous when engaging in information exchanges and online transactions. Ultimately, however, commercial Web providers must come to realize that the Internet dramatically shifts the balance of power between a business and its customers, and therefore, radical new business strategies will be required for long-term success. Because the Web offers unprecedented opportunities for interacting with customers, strategies that take advantage of the medium's unique features are likely to reap important rewards in customer satisfaction, loyalty, and retention. Therefore, in the long run, the most effective way for commercial Web providers to develop profitable exchange relationships with online customers is to gain consumer trust by allowing the balance of power to shift toward more cooperative interactions between firms and their customers.  相似文献   

20.
Toward a Typology of Internet Users and Online Privacy Concerns   总被引:2,自引:0,他引:2  
Traditional typologies of consumer privacy concern suggest that consumers fall into three distinct groups: One-fourth of consumers are not concerned about privacy, one-fourth are highly concerned, and half are pragmatic, in that their concerns about privacy depend on the situation presented. This study examines online users to determine whether types of privacy concern online mirror the offline environment. An e-mail survey of online users examined perceived privacy concerns of 15 different situations involving collection and usage of personally identifiable information. Results indicate that the vast majority of online users are pragmatic when it comes to privacy. Further analysis of the data suggested that online users can be segmented into four distinct groups, representing differing levels of privacy concern. Distinct demographic differences were seen. Persons with higher levels of education are more concerned about their privacy online than persons with less education. Additionally, persons over the age of 45 years tended to be either not at all concerned about privacy or highly concerned about privacy. Younger persons tended to be more pragmatic. Content and policy implications are provided.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号