scholarly journals How can nudging solve some of the internet data privacy issues

2019 ◽  
Vol 10 (2) ◽  
pp. 6-19
Author(s):  
Cinthia Obladen De Almendra Freitas ◽  
Giovanna Michelato Almada

The development of new technologies often arouses discussions concerning privacy rights. Consequently, when the Internet became popular and worldwide spread, user privacy concerns also began to arise. Therefore, with the emergence of the information society, the notion of user privacy became variable and has changed over time and according to the region. Consequently, its concept has been modified over the decades too. In 1890, privacy was defined as the right to be left alone. As time passed, the idea of privacy has changed and has become more and more multifaceted, as a reflection of intrinsic aspects of the society. Even with the volatility of this concept, privacy is a fundamental right, as well as essential for a citizen to use the Internet properly. Although it is a fundamental right, people tend to give up on their privacy because of functionalities on the Internet or exchange it for small rewards. However, users often do not have the knowledge about the exchanges or violations. In order to solve some of the Internet data privacy issues, Libertarian Paternalism may be used. Different researches were conducted by applying this theory in the data privacy sphere. By using nudges, it is possible to help people choose wisely how to protect privacy, or at least to give them the right amount of information and guide users to the best option.

Author(s):  
Petra Molnar

This chapter focuses on how technologies used in the management of migration—such as automated decision-making in immigration and refugee applications and artificial intelligence (AI) lie detectors—impinge on human rights with little international regulation, arguing that this lack of regulation is deliberate, as states single out the migrant population as a viable testing ground for new technologies. Making migrants more trackable and intelligible justifies the use of more technology and data collection under the guide of national security, or even under tropes of humanitarianism and development. Technology is not inherently democratic, and human rights impacts are particularly important to consider in humanitarian and forced migration contexts. An international human rights law framework is particularly useful for codifying and recognizing potential harms, because technology and its development are inherently global and transnational. Ultimately, more oversight and issue specific accountability mechanisms are needed to safeguard fundamental rights of migrants, such as freedom from discrimination, privacy rights, and procedural justice safeguards, such as the right to a fair decision maker and the rights of appeal.


2002 ◽  
Vol 1 (4) ◽  
Author(s):  
Gordon A. Gow ◽  
Mark Ihnat

This paper reports on a recently concluded empirical study into the development of Wireless E9-1-1 (emergency service) in Canada that initially focussed on privacy concerns raised in the context of an emerging location based service (LBS) for mobile phone users. In light of existing regulatory arrangements this paper concludes that in Canada the emerging Wireless E9-1-1 system establishes a reasonable level of protection for the privacy rights of mobile phone users who choose to contact emergency services. However, an important and surprising issue was raised in the proceedings regarding the obligation of wireless service providers offering prepaid mobile phone service to obtain verifiable subscriber records from their customers. This paper provides details regarding the issue and contributes a number of points to an emerging debate concerning the right to anonymity for customers who elect to use prepaid or other services provided over commercial networks.


Author(s):  
Tziporah Stern

Privacy, or the right to hold information about oneself in secret (Masuda, 1979; O’Brien & Yasnof, 1999), has become increasingly important in the information society. With the rapid technological advances and the digitalization of information, retrieval of specific records is more rapid; personal information can be integrated into a number of different data files; and copying, transporting, collecting, storing, and processing large amounts of information is easier. Additionally, the advent of the World Wide Web and the fast-paced growth of the Internet have created further cause for concern. The vast amounts of digital information and the pervasiveness of the Internet facilitate new techniques for gathering information—for example, spyware, phishing, and cookies. Hence, personal information is much more vulnerable to being inappropriately used. This article outlines the importance of privacy in an e-commerce environment, the specific privacy concerns individuals may have, antecedents to these concerns, and potential remedies to quell them.


2019 ◽  
pp. 274-304
Author(s):  
Andrew Murray

This chapter examines copyright issues from copying and distributing information from the internet. It considers the discussion focuses on how the internet has challenged the application and development of copyright law, considering web-copyright concerns such as linking, caching, and aggregating, citing Google Inc. v Copiepresse SCRL. It spends considerable time discussing the operation of the temporary eproduction right though key cases Infopaq International, and Public Relations Consultants Association v Newspaper Licensing Agency. The analysis then moves on to examine the communication to the public right created by the Copyright and Related Rights in the Information Society Directive, examining the application of the right through key cases such as Nils Svensson v Retriever Sverige, GS Media v Sanoma Media, and Stichting Brein v Ziggo BV.


2021 ◽  
Vol 2 (2) ◽  
pp. 119-135
Author(s):  
Lucas Bossoni Saikali

Technological development has extremely useful facets for everyday life, since disruptive innovations are increasingly present in society. In this current scenario, the State's intervention in the economy is increasingly difficult. The objective of this research is to investigate the regulatory role of the Executive Power and regulatory agencies regarding streaming technologies. To do so, initially, the paper investigates the definition of streaming services, analyzing their legal adequancy according to Brazilian legislation. Subsequently, the regulatory competence of the Ministry of Science, Technology, Innovation and Communication, the National Telecommunications Agency and the National Cinema Agency in relation to new technologies for dispersion of audiovisual content is analyzed. In the end, it is concluded that it is the responsibility of MCTIC to be the granting power of broadcasting services, not interfering in streaming services. Anatel is responsible for regulating the conditions and the relationship between streaming and telecommunications service providers, in this case, the internet, as well as assuring them the right to use the internet infrastructure. Ancine is responsible for acting with the objective of promoting, regulating and supervising the cinematographic and videophonographic industry in the various market segments. The research methodology used is the hypothetical-deductive and research technique is indirect documentation.


Author(s):  
Cãlin Gurau

The Privacy Journal (2003), a print newsletter and Web site devoted to privacy matters, defines the present-day use of the word privacy as “the right of individuals to control the collection and use of personal information about themselves.” Similar definitions are provided by law specialists (Gavison, 1980; Warren & Brandies, 1890). The networked society changes the way in which privacy rights are defined, used and interpreted, because: a. The IT-enabled channels of communication change the rules of personal and commercial interaction; b. The participation in the networked society implies a diminishing of individual privacy rights. The fundamental principle of the networked society is information sharing and processing (Kling & Allen, 1996). Advances in computing technology—that represents the infrastructure of the networked society—make possible to collect, store, analyze, and retrieve personal information created in the process of participation. The manifestation and the protection of individual privacy rights represent the field of conflict between various disciplines and social events. The heterogeneous nature of this phenomenon is mirrored in this paper, which aims to present the complex nature of privacy rights in the context of the networked society. The study proposes a negotiating model of online privacy rights, and analyses the necessary conditions for the implementation of this model on the Internet. The new economy is redefined on the basis of information entrepreneurism (Kling & Allen, 1996; Zwick & Dholakia, 1999). This cultural paradigm emphasizes the use of data-intensive analysis techniques for designing and implementing effective marketing and management strategies. This has as a direct consequence the use of an information superpanopticon–a concept derived from Foucault’s panopticon, a system of perfect surveillance and control. Online privacy is a major concern for Internet users (Ackerman, Cranor, & Reagle, 1999). For the individual Internet user, the privacy threats fall into two main categories: a. Web tracking devices that collect information about the online behavior of the user (e.g., cookies); b. The misuse of the personal information provided by the online user in exchange of specific benefits: increased personalization, Web group membership, etc. The databases, intelligent agents and tracking devices are surrounding the Internet users with a Web of surveillance, which is often hidden and unknown to the users. The surveillance is initiated by the simple act of presence on the Internet. Specialized software applications, such as cookies are tracking the online behavior of Internet users, feeding the data into databases, which create and permanently update a profile of online consumers. These profiles are then used for segmenting the market and targeting the most profitable consumers. A company can use cookies for various valid reasons: security, personalization, marketing, customer service, etc., however, there is an important distinction between cookies, which are active only within a specific Web site, and the ones that can track the user’s activity across unrelated Web sites. Recently, some aggregator networks have deployed hidden ‘pixel beacon’ technology that allows ad-serving companies to connect unrelated sites and overcome the site-specific nature of traditional cookies (Mabley, 2000). Additionally, some companies are now connecting this aggregated data with offline demographic and credit card data. Eventually, these resulting databases can be used or sold as powerful marketing tools. Exercising control of information, after it was voluntarily released, presents another critical problem. The misuse of personal information covers many possible aspects, which can be defined as any use which is not explicitly defined in the company’s privacy disclaimer, or which is not approved by the informed customer. For example, in 2000, Toysurus.com was subject to intense debate and controversy, when it was discovered that shoppers’ personal information was transferred through an unmarked Internet channel to a data processing firm, for analysis and aggregation. This operation was not disclosed in the company’s privacy disclaimer, and therefore, online customers were not aware of it. Regulators and legislators have addressed the controversial privacy issue quite differently across the world (Nakra, 2001). The USA, the largest world’s financial and Internet market, has not yet adopted a national, standard-setting privacy law (Jarvis, 2001). U.S. privacy statutes have primarily focused so far on protecting consumers’ financial data, health information, and children’s personal information (Desai, Richards, & Desai, 2003; Frye, 2001). In comparison with the American official opinion that online privacy protection is a matter of voluntary self-regulation by market-driven companies, the Europeans consider that it is more effective to enforce specific legislation regarding this issue. The current European approach is based on three basic tenets: 1. Individuals have the right to access any data relating to them and have it kept accurate and up-to-date; 2. Data cannot be retained for longer than the purpose for which it was obtained, nor used or disclosed “in a matter incompatible with that purpose”, and must be kept only for “lawful purposes”; 3. Those who control data have “a special duty of care” in relation to the individuals whose data they keep. Data commissioners oversee these rights in each European country and require most “data controllers”—people who handle data—to register with them to track what information is being collected and where. They are charged also with investigating all complaints from citizens. These principles have been incorporated in the European Data Directive, which came into effect in 1998, and more recently, in the European Directive on Privacy and Electronic Communications, adopted in 2002. Despite these legislative efforts, it is not yet clear how effective are the measures implemented by EU States. The direct involvement of governmental institutions can be considered as a form of censorship that can undermine the freedom and the flexibility of the Internet domain.


2016 ◽  
pp. 379-402 ◽  
Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


2021 ◽  
pp. 237-246
Author(s):  
Kieron O’Hara

The final chapter summarizes the ideas of Four Internets. The Internet needs to remain connected, while its governance should allow different ideologies to flourish simultaneously, without imposing their view on the rest. Governance should pursue common interests while respecting cultural diversity. The prominent role of the United States remains an issue, although it has historically been a good steward of the infrastructure, and probably better than any alternative, including the multilateral structures promoted by nations like China and Russia. Governance is currently multistakeholder and ad hoc, but informal, emergent arrangements are probably better and more flexible than something neater and designed. Innovation and network effects need to be fostered, but policymakers will, on occasion, have to intervene against (perceived) negative externalities. New Internets will emerge over time; a COVID-19 Internet is imagined and described, for example. New technologies, such as quantum computing, will create new stresses, requiring a constant focus on resilience.


2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Mohamed Seliem ◽  
Khalid Elgazzar ◽  
Kasem Khalil

The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. Billions of these computing devices are connected to the Internet to exchange data between themselves and/or their infrastructure. IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life. However, with the increasing wide adoption of IoT, come significant privacy concerns to lose control of how our data is collected and shared with others. As such, privacy is a core requirement in any IoT ecosystem and is a major concern that inhibits its widespread user adoption. The ultimate source of user discomfort is the lack of control over personal raw data that is directly streamed from sensors to the outside world. In this survey, we review existing research and proposed solutions to rising privacy concerns from a multipoint of view to identify the risks and mitigations. First, we provide an evaluation of privacy issues and concerns in IoT systems due to resource constraints. Second, we describe the proposed IoT solutions that embrace a variety of privacy concerns such as identification, tracking, monitoring, and profiling. Lastly, we discuss the mechanisms and architectures for protecting IoT data in case of mobility at the device layer, infrastructure/platform layer, and application layer.


2016 ◽  
Vol 14 (4) ◽  
pp. 364-382 ◽  
Author(s):  
Aqdas Malik ◽  
Kari Hiekkanen ◽  
Amandeep Dhir ◽  
Marko Nieminen

Purpose The popularity of Facebook photo sharing has not only seen a surge in the number of photos shared but also has raised various issues concerning user privacy and self-disclosure. Recent literature has documented the increasing interest of the research community in understanding various privacy issues concerning self-disclosures on Facebook. However, little is known about how different privacy issues, trust and activity influence users’ intentions to share photos on Facebook. To bridge this gap, a research model was developed and tested to better understand the impact of privacy concerns, privacy awareness and privacy-seeking on trust and actual photo sharing activity and subsequently on photo sharing intentions. This study aims to examine the consequences of various facets of privacy associated with photo sharing activity on Facebook. Design/methodology/approach A cross-sectional data from 378 respondents were collected and analysed using partial least squares modelling. Findings The results revealed a significant relationship between various aspects of privacy, including awareness and protective behaviour, with trust and activity. Furthermore, trust and users’ photo sharing activity significantly impact photo sharing intentions on Facebook. Originality/value This study contributes new knowledge concerning various privacy issues and their impact on photo sharing activity and trust. The study also proposes implications that are highly relevant for social networking sites, media agencies and organisations involved in safeguarding the privacy of online users.


Sign in / Sign up

Export Citation Format

Share Document