User Control Over Personal Information: A Case Study of Facebook, Twitter, and Snapchat

2018 ◽  
pp. 13-29
Author(s):  
Indranath Gupta
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jillian Carmody ◽  
Samir Shringarpure ◽  
Gerhard Van de Venter

Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies. Findings The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets. Social implications The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions. Originality/value The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.


Author(s):  
Yu Niu ◽  
Ji-Jiang Yang ◽  
Qing Wang

With the pervasive using of Electronic Medical Records (EMR) and telemedicine technologies, more and more digital healthcare data are accumulated from multiple sources. As healthcare data is valuable for both commercial and scientific research, the demand of sharing healthcare data has been growing rapidly. Nevertheless, health care data normally contains a large amount of personal information, and sharing them directly would bring huge threaten to the patient privacy. This paper proposes a privacy preserving framework for medical data sharing with the view of practical application. The framework focuses on three key issues of privacy protection during the data sharing, which are privacy definition/detection, privacy policy management, and privacy preserving data publishing. A case study for Chinese Electronic Medical Record (ERM) publishing with privacy preserving is implemented based on the proposed framework. Specific Chinese free text EMR segmentation, Protected Health Information (PHI) extraction, and K-anonymity PHI anonymous algorithms are proposed in each component. The real-life data from hospitals are used to evaluate the performance of the proposed framework and system.


Author(s):  
Venetis Kanakaris ◽  
Georgios Lampropoulos ◽  
Kerstin Siakas

Nowadays, social media and social networks are increasingly used in business as they have drastically changed the way the community works, communicates, collaborates, socialises, creates content and shares knowledge and ideas. However, in particular, IT professionals and practitioners need to be aware of online security and privacy issues and the potential negative impact that they may cause on different aspects of business, such as online breaches or information theft. The use of social media inevitably leads to disclosure of personal information, with the use of open-source intelligence (OSINT) and other similar techniques. Hence, the aim of this article is twofold, namely first to show results of a survey towards future Greek IT practitioners regarding awareness and viewpoints of social media users concerning security and privacy on social media. More specifically the study was based on responses and viewpoints of 178 Greek electrical engineering and IT students to an online questionnaire. Secondly, the aim is also to show how easily a potential malicious user can anonymously track and retrieve sensitive personal information in an automated and undetectable way from popular social media platforms by using publicly available information, resources, and tools. The results of the survey show that most of the respondents are aware of the privacy settings of the social media platforms they use. However, they consider that they should be more careful concerning personal data and whom they add as friends or followers and they do not feel comfortable with the fact that a stranger might be able to access their personal information through their publications on social media platforms.The case study indicates that it is possible for malicious users to acquire sensitive personal data (e.g. user's location via tweets and instas from smartphones). In addition, the ability to map activity could allow malicious users to track the activities of unsuspected users and predict their future locations.


Author(s):  
Robert K. McCormack

This chapter highlights a case study involving research into the science of building teams. Accomplishment of mission goals requires team members to not only possess the required technical skills but also the ability to collaborate effectively. The authors describe a research project that aims to develop an automated staffing system. Any such system requires a large amount of personal information about the potential team members under consideration. Gathering, storing, and applying this data raises a spectrum of concerns, from social and ethical implications, to technical hurdles. The authors hope to highlight these concerns by focusing on their research efforts which include obtaining and using employee data within a small business.


2020 ◽  
pp. 146144482093409
Author(s):  
Xinyu Zhao

Daigou, literally translated as buying on behalf of, is a Mandarin term that refers to a form of personalised transnational trading activity, which is generally characterised by practices of purchasing locally manufactured products overseas and reselling them to consumers in China via international courier services. This article examines Chinese international students’ digital labour invested in daigou and their use of social media, particularly WeChat, in running their personal enterprises. Through the analytical lens of ‘boundary’, the article reveals how daigou activities involve sustained crossing and reconstructing boundaries of privacy through selective self-disclosure of personal information. This study contributes to the empirical literature on international students’ everyday use of digital media by highlighting their work practices in the digital age. Conceptually, the case study of daigou suggests overlapping spaces between various forms of digital labour and the relevance of ‘unproductive’ labour which constitutes a necessary dimension of online work.


2017 ◽  
Vol 17 (3) ◽  
pp. 661-666
Author(s):  
Ayoung Cho ◽  
Myungsin Chae ◽  
Byungtae Lee
Keyword(s):  

2005 ◽  
Vol 9 (1) ◽  
pp. 111-136 ◽  
Author(s):  
Kaori Kurosawa ◽  
Jane W. Davidson

The aim of this study was to investigate performer nonverbal behaviour in popular music performance in order to understand the use and functions of gestures, postures, and facial expression. To this end, the study begins by reviewing relevant psychological and sociological research including Ekman and Friesen and Argyle's categorisations of nonverbal behaviour. Drawing on these specific categories, functions of nonverbal behaviours in popular music performance are proposed. These include: to maintain performer self-control; to provide musical, narrative, emotional and personal information; to regulate and manipulate relationships between performer, co-performer and audience. The investigative work focuses on a case study of The Corrs and is carried out by observing two commercially available film recordings of the band in live performance. The songs demonstrate that within this band, three of the four members take turns singing solos. In the first performance, What can I do? is sung by Andrea (principle vocal), and in the second performance, No frontiers is sung by Sharon and Caroline. Focusing on the soloists, all their nonverbal behaviours are classified in terms of types ( e.g., emblem, illustrator, regulator, adaptor, affect display) and frequency of behaviour. The results demonstrate that Ekman and Friesen and Argyle's categorisations provide a complete description of the nonverbal behaviours found in the performances. Moreover, the analysis reveals differences between individuals and the two songs. With these findings, the paper concludes that nonverbal behaviours in this type of performance are crucial to the development, production and perception of the musical performance. Though preliminary, the study indicates a need for much more detailed research of this topic if performers, educators and researchers are to understand and exploit the nonverbal aspects of a musical communication fully.


Sign in / Sign up

Export Citation Format

Share Document