“As We Grow, It Will Become a Priority”: American Mobile Start-Ups’ Privacy Practices

2018 ◽  
Vol 62 (10) ◽  
pp. 1338-1355 ◽  
Author(s):  
Wenhong Chen ◽  
Gejun Huang ◽  
Joshua Miller ◽  
Kye-Hyoung Lee ◽  
Daniel Mauro ◽  
...  

Privacy has become a crucial issue of the digital age, with significant social, political, and economic ramifications. A growing body of literature has dedicated to the patterns, causes, and consequences of individuals’ privacy concerns, skills, and practices. Advancing a producer’s perspective, this research draws on in-depth interviews with 45 tech entrepreneurs to examine privacy practices of mobile start-ups in the United States. Results reveal (a) factors that contribute to the problematic status of privacy issues and (b) whether and how entrepreneurs leverage privacy management as a competitive advantage. Results show that data are widely seen by entrepreneurs as a potentially profitable asset. Privacy practices are networked and thus pose challenges for privacy management as different parties may have different privacy practices. Fast-moving technologies often leave government regulations behind, making them look outdated or irrelevant to many entrepreneurs. For most start-ups not specialized in identity, privacy, or anonymity service, privacy is neither a core business strategy nor a top concern. Only a few mobile ventures have leveraged privacy management as a competitive advantage and designed their products from the ground up concerned about privacy. Most entrepreneurs adopt a building-the-plane-while-flying-it approach: as business grows, privacy policies and practices would evolve. Many entrepreneurs fail to recognize the significance of privacy policies and practices as they lack the awareness, bandwidth, and capacity. Growth and monetization pressures from investors are perceived as more urgent and important than privacy and security issues. Offering a richer account of the power structure that shapes mobile entrepreneurs’ privacy practices and their challenges of managing privacy in a data-driven digital economy, our work advances the existing literature dominated by stories of the individual consumers.

Author(s):  
Drago Orčić

Entrepreneurship is a powerful tool in the value creation function. Contemporary trends indicate that entrepreneurship is not so much a matter of choice but it is increasingly an issue of survival. In the age of knowledge, intellectual potential becomes a key segment of successful entrepreneurship. The discovery, development and management of intellectual potential gives entrepreneurs, in addition to a competitive edge in the modern market, a greater chance of success in developing an entrepreneurial idea. According to research, in the first three years of business, about 90% of start-ups fail. One possible reason is the mismatch of the business strategy, the business idea, with the personal preferences of the entrepreneurs. The theme of the paper is: how to detect an entrepreneur's individual hidden potential (intellectual DNA) ie his natural dominant traits. By "Intellectual DNA" we mean mental, emotional, character, educational, and other conscious and subconscious individual specificities of an individual. Considering that natural personality traits mean interconnected circuits of cognitive, affective, and behavioral functioning, by the term intellectual DNA, we encompass all these characteristics together. Detecting a unique Intellectual DNA gives us a thorough insight into the natural inclinations of a potential entrepreneur. The concept of understanding the unique intellectual DNA of a potential entrepreneur can be very helpful in developing a strategy to materialize a business idea through starting your own business in many ways. First, knowing the entrepreneur's natural preferences, the business strategy can be adapted in an acceptable, natural way. Second, business processes, procedures can be created, modified, aligned to the individual natural preferences of the entrepreneur and thus reduce the risk of potential failure. Third, associates can be selected and placed in the right places according to their personal preferences. In this way, adequate people would perform certain tasks in accordance with their intellectual DNA, in a natural way, which would result in a greater degree of innovation, creativity, productivity, while reducing the degree of risk. We tested this innovative approach on the participants of the training program "What Makes An Adventure Called Entrepreneurship" within the project "Innovation at Work", which was supported by the Cabinet of the Minister for Innovation and Technological Development of the Republic of Serbia, held from 13.11.2019 to 16.12.2019. The results will be presented in the paper.


Author(s):  
Nisha P. Shetty ◽  
Balachandra Muniyal ◽  
Saleh Mowla

Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners.


2016 ◽  
Author(s):  
Jennifer Urban

*Abstract: *This chapter serves as an introduction to the privacy and security issues presented by advanced metering and other "smart grid" technologies, and to recent policy efforts to address them. The chapter introduces the recent political and economic push to move to the ‘smart grid’, describes the privacy issues presented by advanced metering technologies and the data they gather, and gives an overview of regulatory and policy efforts being made to address them as the smart grid develops.Smart electricity meters and other devices that gather or process household energy signatures at high temporal resolutions hold a great deal of promise. Among other predicted benefits, smart grid technologies are expected to better manage energy usage, enable real-time demand-response pricing, improve efficient load balancing across the grid, and increase the capacity for solar and other edge-based energy generation. These predicted benefits depend, in part, on new, richer data models of energy flow and usage. The temporally granular data collected by advanced metering technologies can reveal detailed information about intimate life within the home, raising serious questions about how to address privacy interests. Moreover, the present vision for the smart grid requires large numbers of new devices and gateways to connect from the ‘edge’ of the grid, raising security issues that require immediate and sustained attention. Recent and ongoing technical and policy efforts in the United States and elsewhere attempt to address these issues.Available at SSRN: http://ssrn.com/abstract=2632300


2015 ◽  
Vol 2015 (2) ◽  
pp. 135-155 ◽  
Author(s):  
Luís T. A. N. Brandão ◽  
Nicolas Christin ◽  
George Danezis ◽  

Abstract Available online public/governmental services requiring authentication by citizens have considerably expanded in recent years. This has hindered the usability and security associated with credential management by users and service providers. To address the problem, some countries have proposed nation-scale identification/authentication systems that intend to greatly reduce the burden of credential management, while seemingly offering desirable privacy benefits. In this paper we analyze two such systems: the Federal Cloud Credential Exchange (FCCX) in the United States and GOV.UK Verify in the United Kingdom, which altogether aim at serving more than a hundred million citizens. Both systems propose a brokered identification architecture, where an online central hub mediates user authentications between identity providers and service providers. We show that both FCCX and GOV.UK Verify suffer from serious privacy and security shortcomings, fail to comply with privacy-preserving guidelines they are meant to follow, and may actually degrade user privacy. Notably, the hub can link interactions of the same user across different service providers and has visibility over private identifiable information of citizens. In case of malicious compromise it is also able to undetectably impersonate users. Within the structural design constraints placed on these nation-scale brokered identification systems, we propose feasible technical solutions to the privacy and security issues we identified. We conclude with a strong recommendation that FCCX and GOV.UK Verify be subject to a more in-depth technical and public review, based on a defined and comprehensive threat model, and adopt adequate structural adjustments.


2015 ◽  
Vol 36-37 (1) ◽  
pp. 163-183
Author(s):  
Paul Taylor

John Rae, a Scottish antiquarian collector and spirit merchant, played a highly prominent role in the local natural history societies and exhibitions of nineteenth-century Aberdeen. While he modestly described his collection of archaeological lithics and other artefacts, principally drawn from Aberdeenshire but including some items from as far afield as the United States, as a mere ‘routh o’ auld nick-nackets' (abundance of old knick-knacks), a contemporary singled it out as ‘the best known in private hands' (Daily Free Press 4/5/91). After Rae's death, Glasgow Museums, National Museums Scotland, the University of Aberdeen Museum and the Pitt Rivers Museum in Oxford, as well as numerous individual private collectors, purchased items from the collection. Making use of historical and archive materials to explore the individual biography of Rae and his collection, this article examines how Rae's collecting and other antiquarian activities represent and mirror wider developments in both the ‘amateur’ antiquarianism carried out by Rae and his fellow collectors for reasons of self-improvement and moral education, and the ‘professional’ antiquarianism of the museums which purchased his artefacts. Considered in its wider nineteenth-century context, this is a representative case study of the early development of archaeology in the wider intellectual, scientific and social context of the era.


2018 ◽  
Vol 2018 ◽  
pp. 310-310
Author(s):  
Chih-Hsing Liu ◽  
◽  
Jeou-Shyan Horng ◽  
Sheng-Fang Chou ◽  
Yung-Chuan Huang ◽  
...  

2020 ◽  
Vol 2020 (10-3) ◽  
pp. 228-237
Author(s):  
Marina Shpakovskaya ◽  
Oleg Barnashov ◽  
Arian Mohammad Hassan Shershah ◽  
Asadullah Noori ◽  
Mosa Ziauddin Ahmad

The article discusses the features and main approaches of Turkish foreign policy in the Middle East. Particular attention is paid to the history of the development of Turkish-American relations. The causes of the contradictions between Turkey and the United States on the security issues of the Middle East region are analyzed. At the same time, the commonality of the approaches of both countries in countering radical terrorism in the territories adjacent to Turkey is noted. The article also discusses the priority areas of Turkish foreign policy, new approaches and technologies in the first decade of the XXI century.


1983 ◽  
Vol 13 (2) ◽  
pp. 159-171 ◽  
Author(s):  
Robert W. Buckingham

The hospice concept represents a return to humanistic medicine, to care within the patient's community, for family-centered care, and the view of the patient as a person. Medical, governmental, and educational institutions have recognized the profound urgency for the advocacy of the hospice concept. As a result, a considerable change in policy and attitude has occurred. Society is re-examining its attitudes toward bodily deterioration, death, and decay. As the hospice movement grows, it does more than alter our treatment of the dying. Hospices and home care de-escalate the soaring costs of illness by reducing the individual and collective burdens borne by all health insurance policyholders. Because hospices and home care use no sophisticated, diagnostic treatment equipment, their overhead is basically for personal care and medication. Also, the patient is permitted to die with dignity. Studies indicated that the patient of a hospice program will not experience the anxiety, helplessness, inadequacy, and guilt as will an acute care facility patient. Consequently, a hospice program can relieve family members and loved ones of various psychological disorders.


Sign in / Sign up

Export Citation Format

Share Document