Privacy Concerns on Expungement Laws in the Digital World

Author(s):  
Greer Koerner ◽  
Houssain Kettani
First Monday ◽  
2017 ◽  
Vol 22 (4) ◽  
Author(s):  
Clifford Lynch

This paper studies emerging technologies for tracking reading behaviors (“reading analytics”) and their implications for reader privacy, attempting to place them in a historical context. It discusses what data is being collected, to whom it is available, and how it might be used by various interested parties (including authors). I explore means of tracking what’s being read, who is doing the reading, and how readers discover what they read. The paper includes two case studies: mass-market e-books (both directly acquired by readers and mediated by libraries) and scholarly journals (usually mediated by academic libraries); in the latter case I also provide examples of the implications of various authentication, authorization and access management practices on reader privacy. While legal issues are touched upon, the focus is generally pragmatic, emphasizing technology and marketplace practices. The article illustrates the way reader privacy concerns are shifting from government to commercial surveillance, and the interactions between government and the private sector in this area. The paper emphasizes U.S.-based developments.


Systems ◽  
2021 ◽  
Vol 9 (2) ◽  
pp. 36
Author(s):  
Ron S. Hirschprung ◽  
Sigal Kordova

Systems thinking is a valuable skill that may be required for an individual to be promoted in the business arena to managerial or leading positions. Thus, assessing systems thinking skills is an essential transaction for decision makers in the organization as a preceding step to the promotion decision. One of the well-known and validated tools for this task is a questionnaire. However, because some of the questions invade the employee or candidate’s privacy, the answer may be biased. In this paper, we consider this potential bias, a phenomenon that is becoming more and more significant as privacy concerns and awareness continuously increase in the modern digital world. We propose a formal methodology to optimize the questionnaire based on the privacy sensitivity of each question, thereby providing a more reliable assessment. We conducted an empirical study (n = 142) and showed that a systems skills questionnaire can be enhanced. This research makes a significant contribution to improving the systems skills assessment process in particular, and lays the foundations for improving the evaluation of other skills or traits.


Author(s):  
Peter Verhezen

We are increasingly living in a digital world, where companies attempt to adapt to a new context of Industry 4.0. The authors believe that artificial intelligence and the use of logarithms will alter the game of competition. Digitization is moving our economy away from “financial capitalism” to “data capitalism,” and companies and their boards need to adopt the way they operate and steer the organization to new ecosystems where personalized service becomes part of the new digital strategy. Basically, it is not a battle of AI versus humans, but rather finding a way to enhance the collaboration of AI and humans in organizations. Despite the enormous potential benefits of AI, boards should not ignore the darker side of AI, namely the potential biasedness and sometimes unfairness of algorithms and privacy concerns and the ubiquitous cyberthreats. This is why proper data governance at the board level is needed. The authors suggest that this becomes a critical success factor to be addressed at boards, either as part of the risk management or strategic committee or as a separated digitization committee.


First Monday ◽  
2009 ◽  
Author(s):  
Nour S. Al-Shakhouri ◽  
A. Mahmood

In today’s digital world, personal privacy has become the number one issue for consumers [9]. Consumers' confidence in personal privacy is directly affecting and limiting the growth of the Internet commercial development. Therefore, it has become a necessity to address the consumers privacy concerns for the interests of the parties involved. Examples of the different ways of penetrating the consumers' privacy are reviewed. The national and international efforts to formulate regulatory and self-regulatory programs to protect the consumers' privacy are demonstrated. The different privacy enhancing technologies are presented. The problems and shortages of the current national and international consumers' privacy protection regulatory effort including privacy enhancing technologies are addressed. The argument of the need for an international efforts and the proposed role of the United Nations (UN) towards enforced international privacy legislation is established. The complexity and the multi dimensional factors that affect the proposed international legislation are discussed.


2018 ◽  
Vol 62 (10) ◽  
pp. 1372-1391 ◽  
Author(s):  
Isioma Elueze ◽  
Anabel Quan-Haase

There is a growing literature on teenage and young adult users’ attitudes toward and concerns about online privacy, yet little is known about older adults and their unique experiences. As older adults join the digital world in growing numbers, we need to gain a better understanding of how they experience and navigate online privacy. This article fills this research gap by examining 40 in-depth interviews with older adults (65+ years) living in East York, Toronto. We found Westin’s typology to be a useful starting point for understanding privacy attitudes and concerns in this demographic. We expand Westin’s typology and distinguish five categories: fundamentalist, intense pragmatist, relaxed pragmatist, marginally concerned, and cynical expert. We find that older adults are not a homogenous group composed of privacy fundamentalists; rather, there is considerable variability in terms of their privacy attitudes, with only 13% being fundamentalists. We also identify a group of cynical experts who believe that online privacy breaches are inevitable. A large number of older adults are marginally concerned, as they see their online participation as limited and harmless. Older adults were also grouped as either intense or relaxed pragmatists. We find that some privacy concerns are shared by older adults across several categories, the most common being spam, unauthorized access to personal information, and information misuse. We discuss theoretical implications based on the findings for our understanding of privacy in the context of older adults’ digital lives and discuss implications for offering training appropriate for enhancing privacy literacy in this age group.


Author(s):  
Ron S. Hirschprung ◽  
Sigal Kordova

Systems thinking is a valuable skill that may be required for an individual to be promoted in the business arena to managerial or leading positions. Thus, assessing systems thinking skills is an essential transaction for decision-makers in the organization as a preceding step to the promotion decision. One of the well-known and validated tools for this task is a questionnaire. However, because some of the questions invade the employee / candidate’s privacy, the answer may be biased. In this paper, we consider this potential bias, a phenomenon that is becoming more and more significant as privacy concerns and awareness continuously increase in the modern digital world. We propose a formal methodology to optimize the questionnaire based on the privacy sensitivity of each question, thereby providing a more reliable assessment. We conducted an empirical study (n=142), and showed that a systems skills questionnaire can be enhanced. This research has a significant contribution to improving the systems skills assessment process in particular, and also lays the foundations for improving the evaluation of other skills / traits.


2021 ◽  
Vol 7 (2) ◽  
pp. 126-130
Author(s):  
Siti Noorsuriani Maon ◽  
Naffisah Mohd Hassan ◽  
Noorain Mohammad Yunus ◽  
Sri Fatiany Abdul Kader Jailani ◽  
Nor Azmaniza Azizam

Digital technologies have become essential tools in today’s society in many ways.  However, not all of them have undergone formal training or assistance to be competent for them to survive in a challenging environment in a digital world. Hence, this study is intended to determine the digital behavior of students in rural schools, including learning how youth self-evaluate their perceptions of digital technologies, digital competencies, and attitudes towards digital technologies. A descriptive quantitative methodology was employed, using survey questions were distributed to selected secondary schools in rural areas. Based on the descriptive analyses of 211 responses, the findings indicate there is a high level of attitude toward ICT usage. Troubleshooting, staying safe online, and being credible; as well as in the ethical knowledge, were found moderately competent. Digital security attributes were at a moderate level; however, privacy concerns have reached a high level of agreement. Perception of ethical digital behaviour was significantly associated with the frequency of ethical digital behaviour of the school students. Specific concerns and emphasis on youth digital technology usage and education must be imposed on ensuring that they are not neglected, and vulnerable to cybercrime, but also on fostering a responsible e-society with excellent digital citizenship attributes.


2021 ◽  
Vol 10 (2) ◽  
pp. 46-53
Author(s):  
Jihane Jebrane ◽  
Saiida Lazaar

In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the digital world arousing the interest of the scientific community. The requirements of new small intelligent devices brought numerous security and privacy concerns. In order to secure the exchanged data through the IoT, integrity and authentication protocols are required and are usually constructed under hash functions. We notice that the most conventional cryptographic standards are not suitable for multiple platforms hardware/software. The expressed need is to construct lightweight functions and algorithms suitable for constrained environments including small devices. In this context, we propose a review of the research progress on IoT architecture. Further, we present and compare some selected lightweight cryptographic algorithms regarding security, performance, and resource requirements. The main goal of the present paper is to highlight the need to provide security systems for IoT applications through lightweight cryptographic mechanisms.


Author(s):  
John Mansfield

Advances in camera technology and digital instrument control have meant that in modern microscopy, the image that was, in the past, typically recorded on a piece of film is now recorded directly into a computer. The transfer of the analog image seen in the microscope to the digitized picture in the computer does not mean, however, that the problems associated with recording images, analyzing them, and preparing them for publication, have all miraculously been solved. The steps involved in the recording an image to film remain largely intact in the digital world. The image is recorded, prepared for measurement in some way, analyzed, and then prepared for presentation.Digital image acquisition schemes are largely the realm of the microscope manufacturers, however, there are also a multitude of “homemade” acquisition systems in microscope laboratories around the world. It is not the mission of this tutorial to deal with the various acquisition systems, but rather to introduce the novice user to rudimentary image processing and measurement.


2006 ◽  
Vol 39 (4) ◽  
pp. 68-69
Author(s):  
NELLIE BRISTOL
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document