Results for ' privacy concerns'

1000+ found
Order:
  1. Privacy concerns and identity in online social networks.Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva - 2009 - Identity in the Information Society 2 (1):39-63.
    Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  2.  13
    Privacy concerns can stress you out: Investigating the reciprocal relationship between mobile social media privacy concerns and perceived stress.Jörg Matthes, Marina F. Thomas, Kathrin Karsay, Melanie Hirsch, Anna Koemets, Desirée Schmuck & Anja Stevic - 2022 - Communications 47 (3):327-349.
    Mobile social media have become a widespread means to participate in everyday social and professional life. These platforms encourage the disclosure and exchange of personal information, which comes with privacy risks. While past scholarship has listed various predictors and consequences of online privacy concerns, there has been to date no empirical investigation of a conceivable relationship with perceived stress. Using a longitudinal panel study, we examined the reciprocal relationship between mobile social media privacy concerns and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  17
    Privacy concerns in integrating big data in “e-Oman”.Stuti Saxena - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):385-396.
    Purpose Whereas integration of big data in “e-Oman” – the e-government face of Oman – is a significant prospect, this paper aims to underscore the challenges of privacy concerns in effecting such integration. Design/methodology/approach Providing a brief description about the concepts of e-government and big data, the paper follows a discussion on “e-Oman”. While drawing a framework for integration of big data in “e-Oman”, the paper throws light on the privacy concerns in effecting such an integration (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  10
    Privacy concerns toward short-form video platforms: Scale development and validation.Qingqing Wang, Wensong Zhang & Haikun Wang - 2022 - Frontiers in Psychology 13.
    Privacy concerns can effectively predict behavioral intention between users and short-form video platforms, but existing studies lack of multidimensional scales to measure privacy concerns towards short-form video platforms. To this end, this study took privacy concerns theory as the theoretical foundation to develop and validate a multidimensional privacy concerns scale in short-form video platforms by referring to the development of Smith, Milberg and Burke' multidimensional scale of concerns for information privacy, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  19
    Privacy concerns with using public data for suicide risk prediction algorithms: a public opinion survey of contextual appropriateness.Michael Zimmer & Sarah Logan - 2022 - Journal of Information, Communication and Ethics in Society 20 (2):257-272.
    Purpose Existing algorithms for predicting suicide risk rely solely on data from electronic health records, but such models could be improved through the incorporation of publicly available socioeconomic data – such as financial, legal, life event and sociodemographic data. The purpose of this study is to understand the complex ethical and privacy implications of incorporating sociodemographic data within the health context. This paper presents results from a survey exploring what the general public’s knowledge and concerns are about such (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  16
    Privacy concerns in educational data mining and learning analytics.Isak Potgieter - 2020 - International Review of Information Ethics 28.
    Education at all levels is increasingly augmented and enhanced by data mining and analytics, catalysed by the growing prevalence of automated distance learning. With an unprecedented capacity to scale both horizontally and vertically, data mining and analytics are set to be a transformative part of the future of education. We reflect on the assumptions behind data mining and the potential consequences of learning analytics, with reference to an issue brief prepared for the U.S. Department of Education entitled Enhancing Teaching and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  28
    Privacy Concerns in Brain–Computer Interfaces.Jan Christoph Bublitz - 2019 - American Journal of Bioethics Neuroscience 10 (1):30-32.
    I join Gerben Meynen’s call for an ethical assessment of mind-reading technology by enlarging on four points he raises. First, I suggest distinguishing between neural and mental data, apprehending...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  20
    Addressing privacy concerns through the health insurance portability and accountability act privacy rule.Sharona Hoffman - 2007 - American Journal of Bioethics 7 (3):48 – 49.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  74
    AI and privacy concerns: a smart meter case study.Jillian Carmody, Samir Shringarpure & Gerhard Van de Venter - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):492-505.
    Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?Amandeep Dhir, Torbjørn Torsheim, Ståle Pallesen & Cecilie S. Andreassen - 2017 - Frontiers in Psychology 8.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  29
    Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  12. Data mining to combat terrorism and the roots of privacy concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  21
    Self-censorship in social networking sites (SNSs) – privacy concerns, privacy awareness, perceived vulnerability and information management.Mark Warner & Victoria Wang - 2019 - Journal of Information, Communication and Ethics in Society 17 (4):375-394.
    PurposeThis paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In particular, it examines the relationships between SC and four related factors: privacy concerns (PC), privacy awareness (PA), perceived vulnerability (PV) and information management (IM).Design/methodology/approachA national wide survey was conducted in the UK (N= 519). The data were analysed to present both descriptive and inferential statistical findings.FindingsThe level of online SC increases as the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  97
    Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns[REVIEW]Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107 - 123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers’ (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  15.  18
    Whose Data, Whose Risk? Omics Privacy Concerns Should be Defined by Individuals, not Researchers.Sabrina F. Derrington, Matthew A. Deardorff, Alexander R. Judkins & Xiaowu Gai - 2021 - American Journal of Bioethics 21 (12):67-70.
    The framework proposed by Dupras and Bunnik was developed in response to their recognition that standard regulations are increasingly inadequate to address the complex privacy issues created by the...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  45
    Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective.Weiyin Hong, Frank K. Y. Chan & James Y. L. Thong - 2019 - Journal of Business Ethics 168 (3):539-564.
    This paper investigates the drivers and inhibitors of Internet privacy concern. Applying the Multidimensional Development Theory to the online environment, we identify the important factors under four dimensions—i.e., environmental, individual, information management, and interaction management. We tested our model using data from an online survey of 2417 individuals in Hong Kong. The results show that the factors under all four dimensions are significant in the formation of Internet privacy concern. Specifically, familiarity with government legislation, Internet knowledge, benefit of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  10
    The Impact of Health Information Privacy Concerns on Engagement and Payment Behaviors in Online Health Communities.Banggang Wu, Peng Luo, Mengqiao Li & Xiao Hu - 2022 - Frontiers in Psychology 13.
    Online health communities have enjoyed increasing popularity in recent years, especially in the context of the COVID-19 pandemic. However, several concerns have been raised regarding the privacy of users’ personal information in OHCs. Considering that OHCs are a type of data-sharing or data-driven platform, it is crucial to determine whether users’ health information privacy concerns influence their behaviors in OHCs. Thus, by conducting a survey, this study explores the impact of users’ health information privacy (...) on their engagement and payment behavior in OHCs. The empirical results show that users’ concerns about health information privacy reduce their Paid in OHCs by negatively influencing their OHC engagement. Further analysis reveals that if users have higher benefit appraisals and lower threat appraisals, the negative effect of health information privacy concerns on users’ OHC engagement will decrease. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  17
    Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns.Fue Zeng, Qing Ye, Zhilin Yang, Jing Li & Yiping Amy Song - 2020 - Journal of Business Ethics 176 (4):781-798.
    This study focuses on two specific privacy policies, namely privacy assurance and personalization declaration. Specifically, we investigate how these distinct privacy policies affect customers’ privacy concerns and subsequent purchase responses. We have developed a conceptual model that addresses the independent effects of privacy assurance and personalization declaration, as well as the mechanism of these effects. Our model is grounded in motivation theory and supported by a field experiment and a controlled experiment. Our study demonstrates (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  24
    The study of database design must address privacy concerns.Florence Appel - 2006 - Journal of Information, Communication and Ethics in Society 4 (3):155-161.
    The proliferation of electronic databases has given rise to many practices and occurrences that pose serious threats to personal privacy. This paper argues that attention to privacy should be an integral part of the database design process, and that database designers are uniquely positioned to ensure that this happens. To motivate students to become privacy‐conscious database design professionals, computer science programs must meet the challenges of implementing an “ethics across the curriculum” methodology to integrate privacy content (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  20.  36
    Developing a System for Processing Health Data of Children Using Digitalized Toys: Ethical and Privacy Concerns for the Internet of Things Paradigm.María Luisa Martín-Ruíz, Celia Fernández-Aller, Eloy Portillo, Javier Malagón & Cristina del Barrio - 2018 - Science and Engineering Ethics 24 (4):1057-1076.
    EDUCERE is a government funded research and development project. EDUCERE objectives are to investigate, develop, and evaluate innovative solutions for society to detect changes in psychomotor development through the natural interaction of children with toys and everyday objects, and perform stimulation and early attention activities in real environments such as home and school. In the EDUCERE project, an ethical impact assessment is carried out linked to a minors’ data protection rights. Using a specific methodology, the project has achieved some promising (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  8
    Sharing personal genetic information: the impact of privacy concern and awareness of benefit.Don Heath, Ali Ardestani & Hamid Nemati - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):288-308.
    Purpose Human genomic research demands very large pools of data to generate meaningful inference. Yet, the sharing of one’s genetic data for research is a voluntary act. The collection of data sufficient to fuel rapid advancement is contingent on individuals’ willingness to share. Privacy risks associated with sharing this unique and intensely personal data are significant. Genetic data are an unambiguous identifier. Public linkage of donor to their genetic data could reveal predisposition to diseases, behaviors, paternity, heredity, intelligence, etc. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  4
    Adoption of mobile health services using the unified theory of acceptance and use of technology model: Self-efficacy and privacy concerns.Yizhi Liu, Xuan Lu, Gang Zhao, Chengjiang Li & Junyi Shi - 2022 - Frontiers in Psychology 13.
    Mobile health services have been widely used in medical services and health management through mobile devices and multiple channels, such as smartphones, wearable equipment, healthcare applications, and medical platforms. However, the number of the users who are currently receiving the mHealth services is small. In China, more than 70% of internet users have never used mHealth services. Such imbalanced situation could be attributed to users’ traditional concept of medical treatment, psychological factors and privacy concerns. The purpose of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the analysis will have (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  13
    Correction to: Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns.Fue Zeng, Qing Ye, Zhilin Yang, Jing Li & Yiping Amy Song - 2020 - Journal of Business Ethics 176 (4):799-799.
    The initial online publication contained a typesetting mistake in the author information. The original article has been corrected.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  25. Privacy-enhancing technologies as a panacea for online privacy concerns. Some ethical considerations.Herman Tavani - 2000 - Journal of Information Ethics 9 (2):26-36.
     
    Export citation  
     
    Bookmark   2 citations  
  26.  14
    Correction to: Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective.Weiyin Hong, Frank K. Y. Chan & James Y. L. Thong - 2021 - Journal of Business Ethics 171 (4):835-835.
    A correction to this paper has been published: https://doi.org/10.1007/s10551-021-04854-9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  25
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  17
    Privacy and surveillance concerns in machine learning fall prediction models: implications for geriatric care and the internet of medical things.Russell Yang - forthcoming - AI and Society:1-5.
    Fall prediction using machine learning has become one of the most fruitful and socially relevant applications of computer vision in gerontological research. Since its inception in the early 2000s, this subfield has proliferated into a robust body of research underpinned by various machine learning algorithms (including neural networks, support vector machines, and decision trees) as well as statistical modeling approaches (Markov chains, Gaussian mixture models, and hidden Markov models). Furthermore, some advancements have been translated into commercial and clinical practice, with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  84
    Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  30.  21
    Conflicting concern over the privacy of electronic medical records in the NHSnet.Athanasia Pouloudi - 1997 - Business Ethics, the Environment and Responsibility 6 (2):94–101.
    The privacy and security of computerised medical data have become a major concern in Britain since the launch of the national electronic network for the National Health Service . A stakeholder analysis approach helps identify the wide range of the concerns which are involved, and this contributes to understanding the broader context within which technological developments take place and ethical concerns arise. The author is a member of the Information Systems Department of London School of Economics and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  29
    Privacy and beyond: socio-ethical concerns of ‘on-the-job’ surveillance.Jijo James Indiparambil - 2019 - Asian Journal of Business Ethics 8 (1):73-105.
    Current sophisticated technologies in the workplace offer inexpensive and user-friendly devices and the means to control ‘on-the-job’ behaviour. This promises high profitability, productivity and liability alleviation. Yet, it also gives rise to a socio-ethical crisis of incessant surveillance that often overrules its anticipated benefits and motives of control and care. The dilemma is twofold: First, scholarly studies undertaken on this issue from a principally administrative and legal point of view tend to lack a moral framework and so prove unable to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Privacy, Confidentiality, and New Ways of Knowing More in The Human Microbiome: Ethical, Legal, and Social Concerns.Nada Gligorov, Abraham Schwab, Lily Frank & Brett Trusko - 2013 - In Rosamond Rhodes, Nada Gligorov & Abraham Schwab (eds.), the human microbiome: ethical, legal and social concerns. New York: Oxford University Press.
     
    Export citation  
     
    Bookmark   1 citation  
  33. Defining privacy in employee health screening cases: Ethical ramifications concerning the employee/employer relationship. [REVIEW]Michele Simms - 1994 - Journal of Business Ethics 13 (5):315 - 325.
    Issues of privacy and employee health screening rank as two of the most important ethical concerns organizations will face in the next five years. Despite the increasing numbers of social scientists researching personal privacy and the current focus on workplace privacy rights as one of the most dynamic areas of employment law, the concept of privacy remains relatively abstract. Understanding how the courts define privacy and use the expectation of privacy standards is paramount (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  34.  48
    Privacy and Health Practices in the Digital Age.Monique Pyrrho, Leonardo Cambraia & Viviane Ferreira de Vasconcelos - 2022 - American Journal of Bioethics 22 (7):50-59.
    Increasing privacy concerns are arising from expanding use of aggregated personal information in health practices. Conversely, in light of the promising benefits of data driven healthcare, privacy...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  35.  52
    Togetherness and respect: ethical concerns of privacy in Global Web Societies.Gordana Dodig-Crnkovic & Virginia Horniak - 2006 - AI and Society 20 (3):372-383.
    Today’s computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated internet-based attacks are almost impossible to prevent. At the same time, information and communication technology, ICT offers the technical possibility of embedded privacy protection. Making technology legitimate by design is a part of the intentional design for democracy. This means incorporating options for socially acceptable behaviour in technical systems, and making the basic principles of privacy protection, rights and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36. Case study concerning privacy in the care of patients with HIV.Atsushi Asai & Kenji Miki - 2013 - Eubios Journal of Asian and International Bioethics 23 (1):13-16.
     
    Export citation  
     
    Bookmark  
  37.  12
    The Genetic Privacy Act: An Analysis of Privacy and Research Concerns.Edwin S. Flores Troy - 1997 - Journal of Law, Medicine and Ethics 25 (4):256-272.
    In the last few years, a great deal of attention has been paid to the effects that the achievements of the Human Genome Project will have on the confidentiality of medical information. The Genetic Privacy Act is an attempt to address the privacy, confidentiality, and property rights relating to obtaining, requesting, using, storing, and disposing of genetic material. The GPA grew out of concerns over the vast amount of genetic information that is a product of the Human (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  19
    The Genetic Privacy Act: An Analysis of Privacy and Research Concerns.Edwin S. Flores Troy - 1997 - Journal of Law, Medicine and Ethics 25 (4):256-272.
    In the last few years, a great deal of attention has been paid to the effects that the achievements of the Human Genome Project will have on the confidentiality of medical information. The Genetic Privacy Act is an attempt to address the privacy, confidentiality, and property rights relating to obtaining, requesting, using, storing, and disposing of genetic material. The GPA grew out of concerns over the vast amount of genetic information that is a product of the Human (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39.  34
    Intrusion into Patient Privacy: a moral concern in the home care of persons with chronic mental illness.A. Magnusson & K. Lutzen - 1999 - Nursing Ethics 6 (5):399-410.
    The aim of this study was to identify and analyse ethical decision making in the home care of persons with long-term mental illness. A focus was placed on how health care workers interpret and deal with the principle of autonomy in actual situations. Three focus groups involving mental health nurses who were experienced in the home care of persons with chronic mental illness were conducted in order to stimulate an interactive dialogue on this topic. A constant comparative analysis of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  40.  26
    Privacy Is Power.Carissa Véliz - 2020 - London, UK: Penguin (Bantam Press).
    Selected by the Economist as one of the best books of 2020. -/- Privacy Is Power argues that people should protect their personal data because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark   24 citations  
  41. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. Information Privacy for Technology Users With Intellectual and Developmental Disabilities: Why Does It Matter?Maxine Perrin, Rawad Mcheimech, Johanna Lake, Yves Lachapelle, Jeffrey W. Jutai, Amélie Gauthier-Beaupré, Crislee Dignard, Virginie Cobigo & Hajer Chalghoumi - 2019 - Ethics and Behavior 29 (3):201-217.
    This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities related to their information privacy when using information technology. Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, but not (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  56
    Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145 - 160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  44. Accountable privacy supporting services.Jan Camenisch, Thomas Groß & Thomas Scott Heydt-Benjamin - 2009 - Identity in the Information Society 2 (3):241-267.
    As privacy concerns among consumers rise, service providers increasingly want to provide services that support privacy enhancing technologies. At the same time, online service providers must be able to protect themselves against misbehaving users. For instance, users that do not pay their bill must be held accountable for their behavior. This tension between privacy and accountability is fundamental, however a tradeoff is not always required. In this article we propose the concept of a time capsule, that (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  45. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  46.  33
    Information Privacy for Technology Users With Intellectual and Developmental Disabilities: Why Does It Matter?Maxine Perrin, Rawad Mcheimech, Johanna Lake, Yves Lachapelle, Jeffrey W. Jutai, Amélie Gauthier-Beaupré, Crislee Dignard, Virginie Cobigo & Hajer Chalghoumi - 2019 - Ethics and Behavior 29 (3):201-217.
    This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities (IDD) related to their information privacy when using information technology (IT). Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47. REGULAR ARTICLE Concern for privacy in relation to age during physical examination of children: an exploratory study.Ulrik Kihlbom, Alina Rodriquez, Mats Hansson & Thorsten Tuvemo - 2009 - Acta Pædiatrica 98 (8):1349-1354.
     
    Export citation  
     
    Bookmark   1 citation  
  48. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  29
    Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment.Yanwei Xu, Lianyong Qi, Wanchun Dou & Jiguo Yu - 2017 - Complexity:1-9.
    With the increasing volume of web services in the cloud environment, Collaborative Filtering- based service recommendation has become one of the most effective techniques to alleviate the heavy burden on the service selection decisions of a target user. However, the service recommendation bases, that is, historical service usage data, are often distributed in different cloud platforms. Two challenges are present in such a cross-cloud service recommendation scenario. First, a cloud platform is often not willing to share its data to other (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 1000