On the importance of protecting personal information privacy: A lightweight and portable implementation of cryptographic systems

Author(s):  
Haibo Yi
Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


2017 ◽  
Vol 6 (1) ◽  
pp. 1-8
Author(s):  
Jorida Xhafaj ◽  
Almarin Frakulli

The main object of this paper is the tender balance that exists and arises even more between the use of personal information that people provide in the course of most public security actions and privacy. This study analyze the most famous and strong related decision of the European Court of Human Rights, with the aim to give our opinion how has to be understand the barrier between the power of individuals over information and the power of public institutions to guaranties security. The protection of personal data is of fundamental importance to a person’s enjoyment of his or her right to respect for private and family life, and how law allocates power over information in different countries, will give us the possibility to define the most important criteria’s which define the existence of abuse or not over personal data and information.


1995 ◽  
Vol 38 (12) ◽  
pp. 65-74 ◽  
Author(s):  
Sandra J. Milberg ◽  
Sandra J. Burke ◽  
H. Jeff Smith ◽  
Ernest A. Kallman

Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Garry L. White ◽  
Francis A. Méndez Mediavilla ◽  
Jaymeen R. Shah

In the Web dependent world, companies must respect and protect individuals’ information privacy. Companies develop and implement corporate information privacy policies to comply with the domestic and international information privacy laws and regulations. This paper investigates: (a) the approach used by multinational and domestic companies to develop and implement corporate information privacy policies; and (b) the perception of corporate managers/professionals toward information privacy legislation and secondary use of personally identifiable information (PII) that organizations collect. A survey was conducted to collect data from corporate CEOs, managers, and technical professionals of national and multinational companies. Findings indicate the following: 1) Views regarding the practicality and effectiveness of information privacy legislations are similar for respondents from the national and multinational companies. 2) Respondents are undecided about whether the privacy laws of the United States and foreign countries are equally restrictive. 3) Multinational companies do not favor developing and implementing uniform information privacy policies or different information privacy policies across countries of operations. 4) Respondents strongly agreed that unauthorized secondary use of personal information is unacceptable.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Dimitrios Xanthidis ◽  
Christos Manolas ◽  
Ourania Koutzampasopoulou Xanthidou ◽  
Han-I Wang

The rapid developments of emerging technologies, including Big Data, Cloud Computing, and Internet of Things, are causing many societies to struggle whilst trying to keep up with, and adopt them. As a consequence, serious concerns and issues are being raised. The threat to personal information privacy is one of these issues. This review paper briefly introduces the aforementioned technologies and explores concepts related to concerns on information privacy and disclosure in the U.A.E. in the context of these technologies. In addition, related research themes that could be interesting to explore are identified, with a focus on the local environment.


Sign in / Sign up

Export Citation Format

Share Document