scholarly journals Editorial: Children’s Voices on Privacy Management and Data Responsibilization

2020 ◽  
Vol 8 (4) ◽  
pp. 158-162
Author(s):  
Ralf De Wolf ◽  
Mariek M. P. Vanden Abeele

Contemporary children live in datafied societies in which they navigate and use technological innovations that drive on their personal information. Instructing privacy literacy is often presented as a key solution to help children manage their personal data responsibly. While there is agreement on the empowering potential of privacy literacy for children, there are also concerns over the burden that this responsibility places on them and their capacity for resilience. Children are key stakeholders in this debate. Nonetheless, we rarely hear their voices on issues related to their online privacy and data responsibilization. The articles included in this thematic issue account for this limitation by amplifying the voices of children, looking into the practices of parents and exploring the role of the tools being used.

Author(s):  
Maria Grazia Lo Cricchio ◽  
Benedetta E. Palladino ◽  
Androulla Eleftheriou ◽  
Annalaura Nocentini ◽  
Ersilia Menesini

Abstract. The amount of personal information shared online every day by youths without control has raised concerns about their vulnerability to privacy disclosure. Parental mediation strategies have been considered as important aspects that can contribute to the reduction of online-related risks. However, research on this field has shown puzzling results and there is not a consistent investigation of the specific role of parental mediation in youths’ online privacy management. Therefore, this systematic review was aimed at examining the evidence for associations between different parental mediation strategies and aspects of both privacy disclosure and protection. The search was conducted in December 2019 in the SCOPUS and Web of Science scientific databases and resulted in 17 studies that have been included in our review. Taken together, the results confirm that mediation practices can be considered as important variables for the reduction of information disclosure and for enhancing privacy protection. However, some specificities emerged. Restrictive forms of mediation showed clear negative associations with disclosing behaviors, whereas active strategies showed more contrasting results. Moreover, restrictive practices seemed to be less linked to attitudes and beliefs of privacy protection than active forms. More research is needed concerning the role of co-viewing strategies. Findings were discussed in terms of future research and intervention.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

With a growing number of health and wellness applications (apps), there is a need to explore exactly what third parties can legally do with personal data. Following a review of the online privacy policies of a select set of mobile health and fitness apps, this chapter assessed the privacy policies of four popular health and fitness apps, using a checklist that comprised five privacy risk categories. Privacy risks, were based on two questions: a) is important information missing to make informed decisions about the use of personal data? and b) is information being shared that might compromise the end-user's right to privacy of that information? The online privacy policies of each selected app was further examined to identify important privacy risks. From this, a separate checklist was completed and compared to reach an agreement of the presence or absence of each privacy risk category. This chapter concludes with a set of recommendations when designing privacy policies for the sharing of personal information collected from health and fitness apps.


Author(s):  
Irene Maria Portela

The chapter discusses the role of CNPD (Comissão Nacional de Proteção de Dados) in case of violation of privacy, like dissemination or revelation of personal data by a public/private organization or entity. About this subject, the CNPD can issue a recommendation to the Portuguese Treasury to take some measures to strictly protect the security of the personal information using the Portuguese “E-Invoice.” Portuguese people must be protected against the misuse of personal data by the use of the “E-Invoice.” A Security System Administrator continuously monitors the network and all data traffic to prevent any misuse or abuse of the system. A prerequisite for trust and acceptance of these information systems is that appropriate data protection measures are implemented against possible misuse of personal data decreasing the risks in its utilization. Protective measures should be taken by the Treasury referring additional procedures against the misuse of data because the administrative control system is inefficient regarding unauthorized access, disclosure, misuse of localization data or loss, modification, and appropriation of information linked with the use of the Portuguese “E-Invoice.”


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

With a growing number of health and wellness applications (apps), there is a need to explore exactly what third parties can legally do with personal data. Following a review of the online privacy policies of a select set of mobile health and fitness apps, this chapter assessed the privacy policies of four popular health and fitness apps, using a checklist that comprised five privacy risk categories. Privacy risks, were based on two questions: a) is important information missing to make informed decisions about the use of personal data? and b) is information being shared that might compromise the end-user's right to privacy of that information? The online privacy policies of each selected app was further examined to identify important privacy risks. From this, a separate checklist was completed and compared to reach an agreement of the presence or absence of each privacy risk category. This chapter concludes with a set of recommendations when designing privacy policies for the sharing of personal information collected from health and fitness apps.


2018 ◽  
Vol 25 (4) ◽  
pp. 1675-1691 ◽  
Author(s):  
Stephen Cory Robinson

Wearable technologies have created fascinating opportunities for patients to treat chronic pain in a discreet, mobile fashion. However, many of these health wearables require patients to disclose sensitive information, including health information (e.g., heart rate, glucose levels) and personal information (location, email, name, etc.). Individuals using wearables for treatment of chronic pain may sacrifice social health elements, including their privacy, in exchange for better physical and mental health. Utilizing communication privacy management, a popular disclosure theory, this article explores the policy and ethical ramifications of patients disclosing sensitive health information in exchange for better health treatment and relief of chronic pain. The article identifies scenarios where a user must disclose information, and what factors motivate or dissuade disclosure, and ultimately the use of a health wearable. Practical implications of this conceptual article include an improved understanding of how and why consumers may disclose personal data to health wearables, and potential impacts for public policy and ethics regarding how wearables and their manufacturers entice disclosure of private health information.


PLoS ONE ◽  
2021 ◽  
Vol 16 (7) ◽  
pp. e0253568
Author(s):  
Piers Fleming ◽  
Andrew P. Bayliss ◽  
S. Gareth Edwards ◽  
Charles R. Seger

Personal data is ubiquitous in the digital world, can be highly valuable in aggregate, and can lead to unintended intrusions for the data creator. However, individuals’ expressions of concern about exposure of their personal information are generally not matched by their behavioural caution. One reason for this mismatch could be the varied and intangible value of personal data. We present three studies investigating the potential association between personal data value and privacy behaviour, assessing both individual and cross-cultural differences in personal data valuation, comparing collectivist and individualistic cultures. Study 1a, using a representative UK sample, found no relationship between personal data value and privacy behaviour. However, Study 1b found Indian (collectivist) participants’ privacy behaviour was sensitive to personal data value, unlike US (individualist) participants. Study 2 showed that in a UK sample, privacy behaviour was sensitive to personal data value but only for individuals who think of themselves as more similar to others (i.e., self-construe as similar, rather than different). We suggest those who prioritise group memberships are more sensitive to unintentional disclosure harm and therefore behave in accordance with personal data valuations—which informs the privacy concern-behaviour relationship. Our findings can suggest approaches to encourage privacy behaviours.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

Personal applications (apps) collect all sorts of personal information like name, email address, age, height, weight, and in some cases, detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

Personal Applications (apps) collect all sorts of personal information like name, email address, age, height, weight and in some cases detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.


Author(s):  
Soumava Bandyopadhyay

This paper proposes a theoretical framework to investigate the factors that influence the privacy concerns of consumers who use the Internet, and the possible outcomes of such privacy concerns. Factors identified as antecedents to online privacy concerns are perceived vulnerability to personal data collection and misuse, perceived ability to control data collection and subsequent use, the level of Internet literacy, social awareness, and background cultural factors.  The possible consequences of online privacy concerns are the lack of willingness to provide personal information online, rejection of e-commerce, or even unwillingness to use the Internet.  Managerial implications of the framework are discussed.


Author(s):  
Michel Walrave ◽  
Ini Vanwesenbeeck ◽  
Wannes Heirman

The present study serves two purposes. First, we explore how adolescents and adults approach the disclosure of personal information and the application of privacy settings on social network sites (SNS). Second, we investigate whether the factors that predict these two privacy-management strategies differ for adolescents and adults. To achieve the goals of this study, an online survey was conducted among a sample of 1484 SNS users ranging in age from 10 to 65 years. In addition to gender and age, we investigated the following predictors: frequency of and motives for SNS use, trust in other users, peer influence and concerns related to privacy and contact risks. The results show that adolescents disclose more personal data and apply more lenient privacy settings to these data than adults do. Several factors were found to affect disclosure and profile-access management, with differences between adolescents and adults in some cases. Finally, we discuss implications emerging from the study’s findings.


Sign in / Sign up

Export Citation Format

Share Document