首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.  相似文献   

3.
Solutions to the problem ofprotecting informational privacy in cyberspacetend to fall into one of three categories:technological solutions, self-regulatorysolutions, and legislative solutions. In thispaper, I suggest that the legal protection ofthe right to online privacy within the USshould be strengthened. Traditionally, inidentifying where support can be found in theUS Constitution for a right to informationalprivacy, the point of focus has been on theFourth Amendment; protection in this contextfinds its moral basis in personal liberty,personal dignity, self-esteem, and othervalues. On the other hand, the constitutionalright to privacy first established by Griswoldv. Connecticut finds its moral basis largelyin a single value, the value of autonomy ofdecision-making. I propose that an expandedconstitutional right to informational privacy,responsive to the escalating threats posed toonline privacy by developments in informationaltechnology, would be more likely to find asolid moral basis in the value of autonomyassociated with the constitutional right toprivacy found in Griswold than in the varietyof values forming the moral basis for the rightto privacy backed by the Fourth Amendment.  相似文献   

4.
J. van den Hoven suggested to analyse privacy from the perspective of informational justice, whereby he referred to the concept of distributive justice presented by M. Walzer in “Spheres of Justice”. In “privacy as contextual integrity” Helen Nissenbaum did also point to Walzer’s approach of complex equality as well to van den Hoven’s concept. In this article I will analyse the challenges of applying Walzer’s concept to issues of informational privacy. I will also discuss the possibilities of framing privacy from the point of the “art of separation” by looking at the intersection of information infrastructures and institutions.  相似文献   

5.
I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research: (1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths and drawbacks of each, emphasizing the importance of protecting the privacy of sensitive medical and genetic information as well as letting information technology flourish to aid patient care, public health and scientific research.  相似文献   

6.
Individuals try to guard their right to privacy by exercising their right to informational self-determination. They thereby hope to retain control over their identity, which they construct over time by interpreting how their past relates to their present. In a similar vein, historians try to make sense of the past by way of interpreting past events. The theory of narrative identity helps to understand these processes. By an explorative discussion of narrative techniques, historiographical methods including the art of (auto)biography, and the role they play in identity construction, this article aims to give fresh insights into the theory of informational self-determination. An analysis is presented of three types of attempts by individuals to gain control of their digital double, in an effort to maintain their personal dignity. With the lessons learned, an indication is given of the viability of the principle of informational self-determination in the Internet era.  相似文献   

7.
谢卫红  常青青  李忠顺 《现代情报》2018,38(11):136-144
现有学者从多个视角出发,应用多个理论来研究网络隐私悖论。迄今为止关于隐私悖论的成因研究没有形成统一的研究框架,也缺乏对现有研究的系统梳理与理论整合,这有碍于隐私研究领域的进一步发展。为了弥补这一缺憾,本文检索和收集关于网络隐私悖论的国外文献成果,通过对文献系统性的回顾,对国外网络隐私悖论研究进行了梳理和述评,系统介绍了隐私悖论相关概念、隐私悖论成因相关理论的研究,并为进一步研究提出一个理论整合的框架。这一框架基于计划行为理论,将隐私悖论相关理论间的关系展示出来,让我们更好地了解隐私悖论的形成机理。最后,结合现有网络隐私悖论研究的不足为国内学者未来研究提供参考。  相似文献   

8.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches.  相似文献   

9.
周涛  曾环宇  邓胜利 《现代情报》2019,39(11):38-45
[目的/意义] 基于社交媒体的社会化商务显著促进了用户的信息交互。与此同时,信息过度收集和使用、信息泄露等问题愈发突出,引发了用户对于个人隐私问题的密切关注。从用户、平台、环境3个层面,研究了信息隐私关注的影响因素及其对用户行为的作用。[方法/过程] 研究收集了340份有效问卷,采用结构方程模型进行数据分析。[结果/结论] 结果发现,隐私倾向、平台声誉、法律法规显著影响用户的信息隐私关注,进而决定用户的信任、隐私风险和社会化商务行为。研究结果启示企业需要采取措施缓解用户隐私关注,进而促进其社会化商务行为。  相似文献   

10.
师斌  李凯  严建援 《科研管理》2018,39(4):64-73
随着LBS在全球范围内的快速发展,LBS用户使用意向的影响因素及用户认知过程引发了相关领域学者的广泛重视。然而,以往研究缺乏对其中个人隐私问题的有效关注。本研究以公平理论和价值接受模型为理论基础,从个人隐私信息视角出发,探索LBS特性对用户使用意向的作用机制,构建LBS用户使用意向的认知过程模型,并利用264份有效问卷对研究模型进行实证检验。研究发现,首先,LBS平台的个性化和互动促进特征对用户的感知有用性和感知娱乐性都有正向提升作用;其次,互动促进会增加用户的隐私关注,而隐私政策会减少用户的隐私关注;最后,用户的感知有用性和感知娱乐性正向提升其感知价值,进而增加LBS使用意向,而用户的隐私关注会降低其感知价值,进而降低用户的使用意向。  相似文献   

11.
KDD, data mining, and the challenge for normative privacy   总被引:3,自引:1,他引:2  
The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.  相似文献   

12.
In the public debate, social implications of information technology are mainly seen through the privacy lens. Impact assessments of information technology are also often limited to privacy impact assessments, which are focused on individual rights and well-being, as opposed to the social environment. In this article, I argue that this perspective is too narrow, in terms of understanding the complexity of the relation between information technology and society, as well as in terms of directions for managing this relation. I use systems theory to show that current approaches focus mostly on individual impact of information technology developments rather than their mediating role in society itself. I argue that this should be complemented by an analysis of impact on individuals (psychic systems) via co-construction of the environment (social system). I then take up the question of what the role of information technology in social systems would look like in terms of the social relations of trust and power, and how this can complement privacy in discussions on impacts of information technology.  相似文献   

13.
[目的/意义]社交网络已广泛渗入到人们的日常生活中,用户对所提供个人数据的隐私关注一直存在,但却依然持续使用社交网络,需要解析产生这种现象的原因。[方法/过程]运用社会影响理论,通过解析用户使用社交网络的隐私成本(即隐私关注)和隐私收益(即行为诱导:人际关系管理,自我展示,主观规范),建立隐私权衡模型,分析用户的隐私权衡行为,寻找隐私关注困扰下用户持续使用社交网络的动机。[结果/结论]用户提供个人数据并持续使用社交网络的动机并非是忽略了隐私关注,而是行为诱导(包括人际关系管理和自我展示)的正面影响超过隐私关注的负面影响。  相似文献   

14.
信息通讯技术(ICT)的迅速发展使得人们可以通过微博、即时通信软件(IM)、手机终端应用及社交网络(SNS)来发布个人真实信息,网络将以往零散的碎片信息整合成完整的个体信息,造成隐私泄露现象日益严重。本文总结了个体隐私泄露的渠道和类别,通过访谈研究,分析了个体隐私感知风险以及个体隐私保护行为特征:个体特征差异(受教育水平、网络经验)导致隐私关注差异;信息关联及商业价值在不同程度上与隐私关注的变化相关;隐私关注对感知隐私风险产生影响;个体隐私保护行为(常规保护、技术保护)因隐私风险感知不同而发生变化。在此基础上,构建了个体隐私感知与保护行为模型。  相似文献   

15.
泄露他人隐私行为意向的影响要素研究   总被引:1,自引:0,他引:1       下载免费PDF全文
吴娜  李文立  吕欣  柯育龙 《科研管理》2015,36(11):139-147
互联网的发展为人们的生活带来巨大便利,但也带来了隐私安全隐患,通过互联网渠道泄露他人隐私的现象已经引起社会的高度关注。基于犯罪学领域的中和技术理论,分析了否认责任、否认伤害、否认受害者、更高层次效忠、避免更多的伤害和隐私意识对泄露他人隐私行为发生意向的影响,构建了互联网环境下泄露他人隐私意向的研究模型。以人肉搜索这一典型例子进行场景设计,通过问卷调查,收集759份有效问卷,采用Smart PLS2.0软件进行结构方程检验。实证结果表明否认责任、否认受害者和避免更多伤害三类中和技术正向影响泄露他人隐私行为的意向,否认伤害和更高层次效忠技术对泄露他人隐私意向没有显著影响。另外,增强个人隐私意识能有效削弱泄露他人隐私行为的意向。本研究结果有助于了解隐私泄露者的行为动机,为规范互联网用户上网行径和制定隐私保护政策提供借鉴。  相似文献   

16.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

17.
网络隐私第三方认证机制初探   总被引:4,自引:1,他引:3  
研究表明,由于担心个人信息得不到有效的保护,人们对使用基于互联网的各种服务心存疑虑,严重影响到电子商务的发展.旨在给电子商务的发展营造宽松的发展环境,在网络隐私法律框架之外,以美国为代表的国家产生了基于市场运作的网络隐私第三方认证.为了减少网络用户担心隐私遭到侵犯的不安全感,不少网站加入网络隐私认证计划.本文介绍了网络隐私第三方认证运行机制,以及在保护个人隐私方面存在的不足之处,并提出完善第三方认证机制的策略,以期对我国的个人信息保护提供新的思路.  相似文献   

18.
In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development of new products and business models in the digital market. However, these advances have given rise to the development of sophisticated strategies for data management, predicting user behavior, or analyzing their actions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy concerns about how companies manage user data. Although there are some studies on data security, privacy protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI as main concepts is lacking. Therefore, the present study aims to provide a comprehensive understanding of the main challenges related to user privacy that affect DDI. The methodology used in the present study unfolds in the following three phases; (i) a systematic literature review (SLR); (ii) in-depth interviews framed in the perspectives of UGD and DDI on user privacy concerns, and finally, (iii) topic-modeling using a Latent Dirichlet allocation (LDA) model to extract insights related to the object of study. Based on the results, we identify 14 topics related to the study of DDI and UGD strategies. In addition, 14 future research questions and 7 research propositions are presented that should be consider for the study of UGD, DDI and user privacy in digital markets. The paper concludes with an important discussion regarding the role of user privacy in DDI in digital markets.  相似文献   

19.
20.
This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to an unspecified audience, thus undermining the informational privacy boundaries necessary for living an autonomous life.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号