The Disclosure of Personal Information on the Internet: user Motivation, Reliability and Price as Explaining Factors

Author(s):  
Karianne Vermaas ◽  
Lidwien van de Wijngaert
2019 ◽  
Author(s):  
◽  
Youssef Ramzi Mansour

Big data is a relatively new concept that refers to the enormous amount of data generated in a new era where people are selling, buying, paying dues, managing their health and communicating over the internet. It becomes natural that generated data will be analyzed for the purposes of smart advertising and social statistical studies. Social data analytics is the concept of micro-studying users interactions through data obtained often from social networking services, the concept also known as “social mining” offers tremendous opportunities to support decision making through recommendation systems widely used by e-commerce mainly. With these new opportunities comes the problematic of social media users privacy concerns as protecting personal information over the internet has become a controversial issue among social network providers and users. In this study we identify and describe various privacy concerns and related platforms as well as the legal frameworks governing the protection of personal information in different jurisdictions. Furthermore we discuss the Facebook and Cambridge Analytica Ltd incident as an example.


2015 ◽  
Vol 3 ◽  
pp. 361-367
Author(s):  
Kamila Peszko

The development of IT technology has provided people with free access to the Internet, which is now a place for consumers to look for opportunities to share their observations with others. The Internet user wants to be more aware, and willingly participates in the development of emerging brands. Companies have also found their place on the Internet, where they source information from Internet users. They realize the power of the consumer as a source of marketing information, and "take advantage" of consumer behavior to promote their brands. They analyze information about consumers, especially consumer preferences, and then publish this via social media in ways that might appeal to users and lead them to share it with others. This study describes this relationship between consumers and marketing via the Internet, and how the consumer is a source of marketing information, because of the possibilities created for entrepreneurs in the information society.


2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


Author(s):  
Anna Kaushik

In the Internet age, most of information is available on the Internet in the different formats which known as “Internet resources” and people use Internet information for their different purposes but it is very essential for every Internet user to evaluate the retrieved Internet resources before making their uses to accomplish the tasks. This paper presents a review of selected literature found on evaluation of Internet resources available in different format in LIS domain with the following objectivities (i) To know the literature available on the need of evaluation of Internet resources; (ii) To identify the availability of literature on evaluating Internet resources; (iii) To examine the various criteria suggested for evaluating different types Internet resources by authors. This study will assist to users in framing the evaluation criteria for resources exist in various formats on the Internet.


Author(s):  
Adam N. Joinson ◽  
Carina B. Paine

This article examines the extant research literature on self-disclosure and the Internet, in particular by focusing on disclosure in computer-mediated communication and web-based forms – both in surveys and in e-commerce applications. It also considers the links between privacy and self-disclosure, and the unique challenges (and opportunities) that the Internet poses for the protection of privacy. Finally, the article proposes three critical issues that unite the ways in which we can best understand the links between privacy, self-disclosure, and new technology: trust and vulnerability, costs and benefits, and control over personal information. Central to the discussion is the notion that self-disclosure is not simply the outcome of a communication encounter: rather, it is both a product and process of interaction, as well as a way of regulating interaction dynamically. By adopting a privacy approach to understanding disclosure online, it becomes possible to consider not only media effects that encourage disclosure, but also the wider context and implications of such communicative behaviours.


Author(s):  
Julio Angulo

Frequent contact with online businesses requires Internet users to distribute large amounts of personal information. This spreading of users’ information through different Websites can eventually lead to increased probabilities for identity theft, profiling and linkability attacks, as well as other harmful consequences. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, called Privacy Enhancing Technologies (PETs), are being designed and developed. However, these technologies are often perceived as complicated and obtrusive by users who are not privacy aware or are not computer or technology savvy. This chapter explores the way in which users’ involvement has been considered during the development process of PETs and argues that more democratic approaches of user involvement and data handling practices are needed. It advocates towards an approach in which people are not only seen as consumers of privacy and security technologies, but where they can play a role as the producers of ideas and sources of inspiration for the development of usable PETs that meet their actual privacy needs and concerns.


Sign in / Sign up

Export Citation Format

Share Document