首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Abstract

Analyses of attitudes and concerns about privacy from a national survey sample of 1,532 adult Americans in 1988 revealed several separate dimensions. A modification of Tryon's method of clustering variables (third‐order correlations) yielded groups of variables whose meanings were much more interpretable than they had been when factor analysis was initially used. We tested the validity of the clustering by a highly comprehensive system of item analyses. The main findings were that (1) respondent concerns over telephone privacy were not related to other aspects of privacy, (2) interest in devices like Caller ID that enable recipients to know the number of the caller were not related to other aspects of telephone privacy, and (3) general privacy concerns under conditions where the respondent and the other party know each other were independent of those conditions where they do not know each other. Implications for telecommunications policy and new services are discussed.  相似文献   

2.
This paper investigates the issue of innovation policy within a regional context. It is presented that the perspective one takes is important both in how one interprets the processes and relationships involved, but also in the way one identifies barriers and problems in policy formation and how one resolves them. The paper explores a number of contrasting perspectives in relation to innovation policy and the regions and seeks to highlight the implications of this both for policy, but also in the development of our conceptual understanding about innovation and geography.  相似文献   

3.
In 2014, a large archive of hacked nude photos of female celebrities was released on 4chan and organized and discussed primarily on Reddit. This paper explores the ethical implications of this celebrity nude photo leak within a frame of gendered privacy violations. I analyze a selection of a mass capture of 5143 posts and 94,602 comments from /thefappening subreddit, as well as editorials written by female celebrities, feminists, and journalists. Redditors justify the photo leak by arguing the subjects are privileged because they are celebrities; that the celebrities are at fault for failing to appropriately protect their information; and that the only person ethically responsible for the leak is the hacker. The popular press primarily took a feminist perspective, linking the photo leak to institutionalized sexism and misogyny. I argue that the Reddit participants frame the privacy violations within a context of geek masculinity, in which references to masturbation and pornography and casually misogynist language are used to signify a normative masculine self. Privacy violations are de-emphasized when the victims are women and gender or feminist concerns are rejected. Entitlement to viewing women’s bodies and male sexual desire are prioritized over ethical concerns over privacy violations. The paper contributes to understanding how privacy violations are normatively gendered and reinforced by gender inequality.  相似文献   

4.
In the public debate, social implications of information technology are mainly seen through the privacy lens. Impact assessments of information technology are also often limited to privacy impact assessments, which are focused on individual rights and well-being, as opposed to the social environment. In this article, I argue that this perspective is too narrow, in terms of understanding the complexity of the relation between information technology and society, as well as in terms of directions for managing this relation. I use systems theory to show that current approaches focus mostly on individual impact of information technology developments rather than their mediating role in society itself. I argue that this should be complemented by an analysis of impact on individuals (psychic systems) via co-construction of the environment (social system). I then take up the question of what the role of information technology in social systems would look like in terms of the social relations of trust and power, and how this can complement privacy in discussions on impacts of information technology.  相似文献   

5.
Users increasingly use mobile devices to engage in social activity and commerce, enabling new forms of data collection by firms and marketers. User privacy expectations for these new forms of data collection remain unclear. A particularly difficult challenge is meeting expectations for contextual integrity, as user privacy expectations vary depending upon data type collected and context of use. This article illustrates how fine-grained, contextual privacy expectations can be measured. It presents findings from a factorial vignette survey that measured the impact of diverse real-world contexts (e.g., medical, navigation, music), data types, and data uses on user privacy expectations. Results demonstrate that individuals’ general privacy preferences are of limited significance for predicting their privacy judgments in specific scenarios. Instead, the results present a nuanced portrait of the relative importance of particular contextual factors and information uses, and demonstrate how those contextual factors can be found and measured. The results also suggest that current common activities of mobile application companies, such as harvesting and reusing location data, images, and contact lists, do not meet users’ privacy expectations. Understanding how user privacy expectations vary according to context, data types, and data uses highlights areas requiring stricter privacy protections by governments and industry.  相似文献   

6.
This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing a greater understanding of how privacy issues can be addressed with RFID technology.  相似文献   

7.
The purpose of this article and the special issue is to improve our understanding of the theoretical, managerial, and policy implications of entrepreneurial innovation. We accomplish this objective by examining the role of context in stimulating such activity, as well as its impact on the outcomes of entrepreneurial innovation. Our analysis begins by outlining an overarching framework for entrepreneurial innovation and context. With reference to this framework we then compare the attributes of national innovation systems, entrepreneurship and entrepreneurial innovation, and categorize contextual influences on entrepreneurial innovation. We then situate the papers presented in this special issue within this framework. We conclude by outlining an agenda for additional research on this topic, focusing on the relationships between contexts and entrepreneurial innovation and then discuss policy implications, focusing on how public and private actors can meet these challenges.  相似文献   

8.
The widespread use of the computer and the rapid growth of telecommunications technology have sparked debate on the privacy implications of computerized records. Regulations and government programs implemented in response to public pressure for greater protection of records could significantly affect the information system manager and any individual who has personal data recorded in a computerized file. This article considers the implications of possible privacy policy initiatives in the United States in light of Swedish experience.  相似文献   

9.
Scholarly communication is undergoing transformation under the confluence of many forces. The purpose of this article is to explore trends in transforming scholarly publishing and their implications. It examines how collaboration and volume of information production were changed over the past century. It also explores how older documents are used under today’s network environment where new information is easily accessible. Understanding these trends would help us design more effective electronic scholarly publishing systems and digital libraries, and serve the needs of scholars more responsively.  相似文献   

10.
This article reviews the qualitative changes that big data technology introduced to society, particularly changes that affect how individuals control the access, use and retention of their personal data. In particular interest is whether the practice of privacy self-management in this new context could still ensure the informed consent of individuals to the privacy terms of big data companies. It is concluded that that accepting big data companies’ privacy policies falls short of the disclosure and understanding requirements for informed consent. The article argues that the practice of privacy self-management could remain viable if the review, understanding and acceptance of privacy agreements is streamlined, standardized and automated. Technology should be employed to counter the privacy problems created by big data technology. The creation of the privacy exchange authorities (PEA) is proposed as a solution to the failures of privacy self-management. The PEA are intermediaries that empower individuals to define their own privacy terms and express informed consent in their dealings with data companies. They will create the technological infrastructure for individuals to select their own privacy terms from a list of standard choices, potentially only once. The PEA will further mediate the delivery and authentication of the individual users’ privacy terms to data companies. A logical proof of concept is offered, illustrating the potential steps involved in the creation of the PEA.  相似文献   

11.
Whether the Internet Protocol address should be seen as personal data or not remains a contested issue with regard to information privacy. This article explores the question by looking at the technical attributes of the Internet Protocol address, European Union (EU) and U.S. case law, and how the EU's advisory data protection body, the Article 29 Working Party, and some of the world's most influential information and communication technology (ICT) companies consider the IP address. The notion of contextual integrity is then used to show that information privacy regulation must stipulate concrete technical mandates instead of guiding principles, contrary to the ideal of technology neutrality in Internet regulation.  相似文献   

12.
While recent developments in information and communication technologies have produced heightened concern over privacy issues, technology and privacy have a long history of interaction. The home has served as a key locus for this interaction. By distinguishing inside from outside, the home supports the allocation of particular behaviors and information to different areas, both physical and virtual. This article explores how different technologies, including structural elements, have affected and reflected over time the boundary represented by the home and how that boundary has helped shape the construction of privacy in the West. This illustrates how privacy might be conceptualized as a social condition arising from the interaction of various boundaries, including the principal one separating the public and the private.  相似文献   

13.
It is commonly accepted that the use of personal information in business and government puts individual privacy at risk. However, little is known about these risks-for instance, whether and how they can be measured, and how they vary across social groups and the sectors in which personal data are used. Unless we can gain a purchase on such issues, our knowledge of the societal effects of information technology and systems will remain deficient, and the ability to make and implement better policies for privacy protection, and perhaps for a more equitable distribution of risk and protection, will remain impaired. The article explores this topic, examining conventional paradigms in data protection, including the one-dimensional view of the 'data subject,' that inhibit better conceptualizations and practices. It looks at some comparative survey evidence that casts light on the question of the distribution of privacy risks and concerns. It examines theoretical issues in the literature on risk, raising questions about the objectivity and perception of the risk of privacy invasion.  相似文献   

14.
[目的/意义]健康信息风险和用户隐私保护是健康大数据和移动健康时代的重要议题,从信息隐私和隐私计算视角,探究移动健康管理服务使用意愿的影响因素具有重要意义。[方法/过程]本文在分析移动健康管理服务特殊性和回顾相关研究的基础上,从信息隐私和隐私计算的视角,通过模型构建、问卷调查和假设验证等实证分析过程,重点探究信息隐私等相关因素对移动健康管理服务用户行为意向的影响。[结果/结论]研究表明:显著影响移动健康管理服务使用意愿的因素有感知收益和信任;隐私顾虑对使用意愿的影响并不显著,但并不意味着用户隐私保护不重要;此外,感知隐私控制是重要的心理要素,正向影响感知收益,负向影响隐私顾虑。对移动健康管理服务商来说,应该从信息隐私保护、感知收益提升、个人隐私控制强化以及用户信任建设等方面着手,从而促进移动健康管理服务的用户使用。  相似文献   

15.
The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions. Currently, however, different practices being put in place in order to enhance the protection of individuals appear to deliberately rely on the use of ‘inaccurate’ personal information. This article explores such practices and tries to assess their potential for privacy protection, giving particular attention to their legal implications and to related ethical issues. Ultimately, it suggests that the use of ‘inaccurate’ data can potentially play a useful role to preserve the informational autonomy of the individual, and that any understandings of privacy or personal data protection that would tend to unduly limit such potential should be critically questioned.  相似文献   

16.
This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.  相似文献   

17.
The weather is a preoccupation of the British public, and flooding has become a salient feature of their experience. Climate science also has important things to say about the prevalence, distribution and dangers of rainfall and flooding, and what we should expect from global warming. This paper looks at British press coverage of flooding, and at the connections made between this theme and climate change. It aims to expose longitudinal patterning, and assess how common the connection is. From here the analysis moves to specific cases of high profile flooding events for a detailed exploration of the tone and tenor, and discursive contours of reports. The results suggest the media's contribution to genuine debate is mixed, that the connection between common forms of reportage and our scientific understanding of the phenomena is often tenuous. The paper explores the implications for the way the politics of climate change plays out.  相似文献   

18.
刘松 《现代情报》2007,27(7):190-192
基于现行数据隐私问题日益严重,如何防止数据挖掘过程中隐私信息的泄漏,将是一个重要的研究议题。本文主要针对关联规则挖掘技术,从数据挖掘资源共享方面探讨隐私信息的保护,提出数据汇总概念的保护机制.将欲公开的内容隐藏到汇总内容中。此机制不仅确保公开内容的隐私,还可以从汇总内容中获取有用信息,从而在隐私保护和知识获取间取得一个平衡。  相似文献   

19.
Will the proliferation of devices that provide the continuous archival and retrieval of personal experiences (CARPE) improve control over, access to and the record of collective knowledge as Vannevar Bush once predicted with his futuristic memex? Or is it possible that their increasing ubiquity might pose fundamental risks to humanity, as Donald Norman contemplated in his investigation of an imaginary CARPE device he called the “Teddy”? Through an examination of the webcam experiment of Jenni Ringley and the EyeTap experiments of Steve Mann, this article explores some of the social implications of CARPE. The authors’ central claim is that focussing on notions of individual consent and control in assessing the privacy implications of CARPE while reflective of the individualistic conception of privacy that predominates western thinking, is nevertheless inadequate in terms of recognizing the effect of individual uptake of these kinds of technologies on the level of privacy we are all collectively entitled to expect. The authors urge that future analysis ought to take a broader approach that considers contextual factors affecting user groups and the possible limitations on our collective ability to control the social meanings associated with the subsequent distribution and use of personal images and experiences after they are captured and archived. The authors ultimately recommend an approach that takes into account the collective impact that CARPE technologies will have on privacy and identity formation and highlight aspects of that approach.  相似文献   

20.
习近平总书记在2016年"科技三会"上发出建设世界科技强国的号召。建设世界科技强国不仅需要资源要素的支撑,更需要有将这些要素进行合理配置的制度安排,需要新的模式来激发新的创造力。其中,对评价制度的改革在寻找科技体制新模式的改革关键举措中具有基础性作用。为此,回顾过去,文章从科技体制与科技评价的关系视角重新审视这一问题,从回归科技评价的本源出发,探究科技评价异化的体制问题。相应地,面向未来,文章从改革主线、改革结构、评价体系3个方面提出推动以科技创新为核心的科技体制改革建议,为建成百年科技强国提供政策依据。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号