scholarly journals Information Privacy: The Attitudes and Behaviours of Internet Users

2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Marija Jakovljević

The rise of electronic commerce and the Internet have created new technologies and capabilities, which increase concern for privacy online. This study reports on the results of an investigation of Internet users attitudes towards concern for privacy online, online behaviours adopted under varying levels of concern for privacy (high, moderate and low) and the types of information Internet users are protective of. Methodological triangulation was used, whereby both quantitative and qualitative research was conducted. A questionnaire and semi-structured individual interviews were used as the data collection methods. The results of a cross-sectional survey of 104 Internet users suggest a lack of control over personal information online, a lack of privacy rights online, a dislike of government regulation and other privacy concerns. Concern was decreased if personal information was provided for customisation or if there was the ability to opt-out. Anonymity also decreased concern. The qualitative results reveal five areas of concern for privacy, namely the role of Internet Service Providers, online businesses, Internet shopping, government regulation and general Internet privacy problems. This study attempts to add something of value to the body of knowledge regarding concern for privacy on the Internet in the context of South African environment.

2019 ◽  
Author(s):  
Francesco Brigo ◽  
Simona Lattanzi ◽  
Giorgia Giussani ◽  
Laura Tassi ◽  
Nicola Pietrafusa ◽  
...  

BACKGROUND The Internet has become one of the most important sources of health information, accessed daily by an ever-growing number of both patients and physicians, seeking medical advice and clinical guidance. A deeper insight into the current use of the Web as source of information on epilepsy would help in clarifying the individual attitude towards this medium by Internet users. OBJECTIVE We investigated views towards the Internet in a sample of Italian healthcare specialists involved in epilepsy field, to explore factors which explained the influence of information found on the internet. METHODS This study was a self-administered survey conducted in a group of members of the Italian Chapter of the International League Against Epilepsy (ILAE) in January 2018. RESULTS 184 questionnaires were analyzed. 97.8% of responders reported to seek online information on epilepsy. The Internet was most frequently searched to obtain new information (69.9%) or to confirm a diagnostic or therapeutic decision (37.3%). The influence of consulting the Internet on clinical practice was associated with registration to social network(s) (OR: 2.94; 95%CI: 1.28-6.76; p=0.011), higher frequency of Internet use (OR: 3.66; 95%CI: 1.56-9.21; p=0.006) and higher confidence in reliability of online information (OR: 2.61; 95%CI: 1.09-6.26; p=0.031). No association was found with age, sex, years in epilepsy practice or easiness to find online information. CONCLUSIONS Internet is frequently used among healthcare professionals involved in the epilepsy to obtain information about this disease. The attitude of being influenced by the Internet for diagnostic and/or therapeutic decisions in epilepsy is independent on age and years of experience in epilepsy, and probably reflects an individual approach towards the Web.


Author(s):  
Cãlin Gurau

The Privacy Journal (2003), a print newsletter and Web site devoted to privacy matters, defines the present-day use of the word privacy as “the right of individuals to control the collection and use of personal information about themselves.” Similar definitions are provided by law specialists (Gavison, 1980; Warren & Brandies, 1890). The networked society changes the way in which privacy rights are defined, used and interpreted, because: a. The IT-enabled channels of communication change the rules of personal and commercial interaction; b. The participation in the networked society implies a diminishing of individual privacy rights. The fundamental principle of the networked society is information sharing and processing (Kling & Allen, 1996). Advances in computing technology—that represents the infrastructure of the networked society—make possible to collect, store, analyze, and retrieve personal information created in the process of participation. The manifestation and the protection of individual privacy rights represent the field of conflict between various disciplines and social events. The heterogeneous nature of this phenomenon is mirrored in this paper, which aims to present the complex nature of privacy rights in the context of the networked society. The study proposes a negotiating model of online privacy rights, and analyses the necessary conditions for the implementation of this model on the Internet. The new economy is redefined on the basis of information entrepreneurism (Kling & Allen, 1996; Zwick & Dholakia, 1999). This cultural paradigm emphasizes the use of data-intensive analysis techniques for designing and implementing effective marketing and management strategies. This has as a direct consequence the use of an information superpanopticon–a concept derived from Foucault’s panopticon, a system of perfect surveillance and control. Online privacy is a major concern for Internet users (Ackerman, Cranor, & Reagle, 1999). For the individual Internet user, the privacy threats fall into two main categories: a. Web tracking devices that collect information about the online behavior of the user (e.g., cookies); b. The misuse of the personal information provided by the online user in exchange of specific benefits: increased personalization, Web group membership, etc. The databases, intelligent agents and tracking devices are surrounding the Internet users with a Web of surveillance, which is often hidden and unknown to the users. The surveillance is initiated by the simple act of presence on the Internet. Specialized software applications, such as cookies are tracking the online behavior of Internet users, feeding the data into databases, which create and permanently update a profile of online consumers. These profiles are then used for segmenting the market and targeting the most profitable consumers. A company can use cookies for various valid reasons: security, personalization, marketing, customer service, etc., however, there is an important distinction between cookies, which are active only within a specific Web site, and the ones that can track the user’s activity across unrelated Web sites. Recently, some aggregator networks have deployed hidden ‘pixel beacon’ technology that allows ad-serving companies to connect unrelated sites and overcome the site-specific nature of traditional cookies (Mabley, 2000). Additionally, some companies are now connecting this aggregated data with offline demographic and credit card data. Eventually, these resulting databases can be used or sold as powerful marketing tools. Exercising control of information, after it was voluntarily released, presents another critical problem. The misuse of personal information covers many possible aspects, which can be defined as any use which is not explicitly defined in the company’s privacy disclaimer, or which is not approved by the informed customer. For example, in 2000, Toysurus.com was subject to intense debate and controversy, when it was discovered that shoppers’ personal information was transferred through an unmarked Internet channel to a data processing firm, for analysis and aggregation. This operation was not disclosed in the company’s privacy disclaimer, and therefore, online customers were not aware of it. Regulators and legislators have addressed the controversial privacy issue quite differently across the world (Nakra, 2001). The USA, the largest world’s financial and Internet market, has not yet adopted a national, standard-setting privacy law (Jarvis, 2001). U.S. privacy statutes have primarily focused so far on protecting consumers’ financial data, health information, and children’s personal information (Desai, Richards, & Desai, 2003; Frye, 2001). In comparison with the American official opinion that online privacy protection is a matter of voluntary self-regulation by market-driven companies, the Europeans consider that it is more effective to enforce specific legislation regarding this issue. The current European approach is based on three basic tenets: 1. Individuals have the right to access any data relating to them and have it kept accurate and up-to-date; 2. Data cannot be retained for longer than the purpose for which it was obtained, nor used or disclosed “in a matter incompatible with that purpose”, and must be kept only for “lawful purposes”; 3. Those who control data have “a special duty of care” in relation to the individuals whose data they keep. Data commissioners oversee these rights in each European country and require most “data controllers”—people who handle data—to register with them to track what information is being collected and where. They are charged also with investigating all complaints from citizens. These principles have been incorporated in the European Data Directive, which came into effect in 1998, and more recently, in the European Directive on Privacy and Electronic Communications, adopted in 2002. Despite these legislative efforts, it is not yet clear how effective are the measures implemented by EU States. The direct involvement of governmental institutions can be considered as a form of censorship that can undermine the freedom and the flexibility of the Internet domain.


2016 ◽  
Vol 33 (15) ◽  
pp. 2352-2378 ◽  
Author(s):  
Mary J. Marret ◽  
Wan-Yuen Choo

This study aimed to determine contact and privacy risks encountered by Malaysian adolescents with access to the Internet and mobile phones and factors associated with face-to-face meetings with online acquaintances as well as to estimate the prevalence of subsequent victimization. Secondary school students from randomly selected public schools in Selangor and Kuala Lumpur responded to an anonymous self-administered questionnaire (78% response rate). Out of 3,349 Internet or mobile phone users, 51% had been invited to meet offline with an online-meeting acquaintance and 30% complied. Of the 1,005 respondents who went to offline meetings, 55% had meetings with more than six people. Male gender, Malay ethnicity, online access at an Internet café, viewing pornography on the Internet, the absence of parental restrictions on visiting certain website and chat rooms, not being explicitly forbidden to meet strangers encountered online, and disclosure of personal information were significantly associated with increased odds of face-to-face meetings with online acquaintances. Verbal, physical, or sexual assaults were reported by 5.5% of the 1,005 including 13 males and five females who reported forced sexual intercourse. Similarities as well as differences in factors associated with risk-taking behavior compared with adolescents in Western countries have important implications on policy and intervention.


2008 ◽  
pp. 3222-3228
Author(s):  
Cãlin Gurau

The Privacy Journal (2003), a print newsletter and Web site devoted to privacy matters, defines the present-day use of the word privacy as “the right of individuals to control the collection and use of personal information about themselves.” Similar definitions are provided by law specialists (Gavison, 1980; Warren & Brandies, 1890). The networked society changes the way in which privacy rights are defined, used and interpreted, because: a. The IT-enabled channels of communication change the rules of personal and commercial interaction; b. The participation in the networked society implies a diminishing of individual privacy rights. The fundamental principle of the networked society is information sharing and processing (Kling & Allen, 1996). Advances in computing technology—that represents the infrastructure of the networked society—make possible to collect, store, analyze, and retrieve personal information created in the process of participation. The manifestation and the protection of individual privacy rights represent the field of conflict between various disciplines and social events. The heterogeneous nature of this phenomenon is mirrored in this paper, which aims to present the complex nature of privacy rights in the context of the networked society. The study proposes a negotiating model of online privacy rights, and analyses the necessary conditions for the implementation of this model on the Internet. The new economy is redefined on the basis of information entrepreneurism (Kling & Allen, 1996; Zwick & Dholakia, 1999). This cultural paradigm emphasizes the use of data-intensive analysis techniques for designing and implementing effective marketing and management strategies. This has as a direct consequence the use of an information superpanopticon–a concept derived from Foucault’s panopticon, a system of perfect surveillance and control. Online privacy is a major concern for Internet users (Ackerman, Cranor, & Reagle, 1999). For the individual Internet user, the privacy threats fall into two main categories: a. Web tracking devices that collect information about the online behavior of the user (e.g., cookies); b. The misuse of the personal information provided by the online user in exchange of specific benefits: increased personalization, Web group membership, etc. The databases, intelligent agents and tracking devices are surrounding the Internet users with a Web of surveillance, which is often hidden and unknown to the users. The surveillance is initiated by the simple act of presence on the Internet. Specialized software applications, such as cookies are tracking the online behavior of Internet users, feeding the data into databases, which create and permanently update a profile of online consumers. These profiles are then used for segmenting the market and targeting the most profitable consumers. A company can use cookies for various valid reasons: security, personalization, marketing, customer service, etc., however, there is an important distinction between cookies, which are active only within a specific Web site, and the ones that can track the user’s activity across unrelated Web sites. Recently, some aggregator networks have deployed hidden ‘pixel beacon’ technology that allows ad-serving companies to connect unrelated sites and overcome the site-specific nature of traditional cookies (Mabley, 2000). Additionally, some companies are now connecting this aggregated data with offline demographic and credit card data. Eventually, these resulting databases can be used or sold as powerful marketing tools. Exercising control of information, after it was voluntarily released, presents another critical problem. The misuse of personal information covers many possible aspects, which can be defined as any use which is not explicitly defined in the company’s privacy disclaimer, or which is not approved by the informed customer. For example, in 2000, Toysurus.com was subject to intense debate and controversy, when it was discovered that shoppers’ personal information was transferred through an unmarked Internet channel to a data processing firm, for analysis and aggregation. This operation was not disclosed in the company’s privacy disclaimer, and therefore, online customers were not aware of it. Regulators and legislators have addressed the controversial privacy issue quite differently across the world (Nakra, 2001). The USA, the largest world’s financial and Internet market, has not yet adopted a national, standard-setting privacy law (Jarvis, 2001). U.S. privacy statutes have primarily focused so far on protecting consumers’ financial data, health information, and children’s personal information (Desai, Richards, & Desai, 2003; Frye, 2001). In comparison with the American official opinion that online privacy protection is a matter of voluntary self-regulation by market-driven companies, the Europeans consider that it is more effective to enforce specific legislation regarding this issue. The current European approach is based on three basic tenets: 1. Individuals have the right to access any data relating to them and have it kept accurate and up-to-date; 2. Data cannot be retained for longer than the purpose for which it was obtained, nor used or disclosed “in a matter incompatible with that purpose”, and must be kept only for “lawful purposes”; 3. Those who control data have “a special duty of care” in relation to the individuals whose data they keep. Data commissioners oversee these rights in each European country and require most “data controllers”—people who handle data—to register with them to track what information is being collected and where. They are charged also with investigating all complaints from citizens. These principles have been incorporated in the European Data Directive, which came into effect in 1998, and more recently, in the European Directive on Privacy and Electronic Communications, adopted in 2002. Despite these legislative efforts, it is not yet clear how effective are the measures implemented by EU States. The direct involvement of governmental institutions can be considered as a form of censorship that can undermine the freedom and the flexibility of the Internet domain.


2016 ◽  
Vol 9 (5) ◽  
pp. 36 ◽  
Author(s):  
Simon Gyasi Nimako ◽  
Joseph Mbawuni

<p>This paper empirically explores consumer switching intentions, partial and total switching situations in the Ghana mobile telecom industry. Using data from a cross-sectional survey of 736 mobile subscribers from six global telecom networks in Ghana’s mobile telecommunication industry, the results indicate switching intentions are significantly different among customers of various mobile telecom service providers. Customers of MTN and Tigo mobile operators have stronger intentions to switch than those from the other firms. It also found that more non-porters defect and switch to other mobile networks than porters do. Consistent with the hypothesis, defectors (partial switching) are strongly associated with total switching behaviour than non-defectors. Also, in order to reduce subscriber defect or churn rate, mobile telecom operators should direct more effort and resource to promoting and educating their customers on the benefits of porting their mobile numbers to other networks. Theoretical and managerial implications are discussed. The paper contributes to the body of knowledge in the area of consumer switching behaviour in mobile telecom industry in emerging countries.</p>


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


2021 ◽  
pp. 108482232110084
Author(s):  
Agata Wilk ◽  
Lisa LaSpina ◽  
Linda D. Boyd ◽  
Jared Vineyard

This study aimed to explore the level of perceived oral health literacy (OHL) among caregivers of the homebound population in the Chicago metropolitan area and how caregivers’ OHL impacts their oral care to the homebound population. The relationships between demographic characteristics, perceived OHL levels, personal oral health behaviors, and oral health care to clients were also assessed. This cross-sectional survey research examined 69 caregivers of the homebound population employed by home health agencies. The OHL was determined by the validated Health Literacy in Dentistry Scale (HeLD-14). Independent t-tests, chi-square tests set at p < .05 significance level, and logistic regressions were used for analysis. The mean age of participants was 43. The HeLD-14 scores indicated a high perceived OHL among this group. Caregivers came from diverse groups, and the majority spoke a second language at home. About 93% performed oral self-care the recommended amount of time or more, while only 57% did it for their clients. Those who cleaned clients’ mouth twice a day had a higher OHL score ( M = 23 compared to M = 19). About 43% did not check for sores in the client’s mouth, and those who checked had a higher OHL score ( M = 25 compared to M = 19). Controlling for OHL, age was a good predictor of oral care frequency to clients. These findings provide current evidence and add to the body of knowledge on OHL among homebound individuals. The results provide insights for designing a preventive approach in oral health care to the homebound population.


Author(s):  
Sujata Mandhwani ◽  
Sadaf Zia ◽  
Emad Salman Shaikh ◽  
Dante Duarte ◽  
Erum Tanveer

The adverse effects of excessive mobile phone (MP) use on children include deprivation from sleep, increased risk of lack of concentration, depression, anxiety and obesity. No such study has been conducted in children from Pakistan. Objectives: To assess the association of MP usage and musculoskeletal disorders in school going children. Methods: This was a cross sectional survey. Data were collected from different private schools of Karachi, Pakistan. Convenient non probability sampling technique was used. A sample size of 385 students was taken keeping a confidence interval of 95% with 5% margin of error. Results: A total of 385 subjects participated. It was also noticed that 75.6% (291) students have smart phone and 5.2% (20) have conventional phone and remaining 19.2% (74) have camera phone. It was noticed that the participants 306 (79.5%) said they slept for 1–2[Formula: see text]h daily and 30 (7.8%) had sleep for 3–4[Formula: see text]h daily. One hundred and four 104 (27%) had noticed pain in neck. Conclusion: The use of MP for any activity was associated with sleep deprivation and pain in wrist/hands followed by neck and upper back pain. The usage of MP should be limited to avoid the stress on musculoskeletal parts of the body.


2021 ◽  
Author(s):  
Deanna Wiebe ◽  
Pria Nippak ◽  
Julien Meyer ◽  
Shannon Remers

BACKGROUND The use of Routine Outcome Monitoring (ROM) in the treatment of mental health has emerged as a method of improving psychotherapy treatment outcomes. Despite this, very few clinicians regularly use ROM in clinical practice. Online ROM has been suggested as a solution to increase adoption. OBJECTIVE To identify the influence of moving ROM online on client completion rates of self-reported outcome measures and to identify implementation and utilization barriers to online ROM by assessing clinicians’ views on their experience utilizing the online system over previous paper-based methods. METHODS Client completion rates of self-reported outcome measures were compared pre and post implementation of an online system of ROM. In addition, a survey questionnaire was administered to 340 mental health service providers regarding their perception of benefits with an online system of ROM. RESULTS Client completion rates of self-reported measures increased from 15% to 54% after moving online. Fifty-eight% of service providers found the new system less time consuming than previous paper-based ROM and 64% found that it helped monitor clients. However, the perceived value of the system remains in doubt as only 23% found it helped them identify clients at risk for treatment failure, and only 18% found it strengthened the therapeutic alliance. CONCLUSIONS Although the current study suggests mixed results regarding service providers’ views on their experience using an online system for ROM, it has identified barriers and challenges that are actionable for improvement.


Sign in / Sign up

Export Citation Format

Share Document