scholarly journals Privacy in mobile learning applications: user privacy concerns and implications of applying privacy by design approach

Author(s):  
Daria Ilkina

This thesis investigates the privacy risks that m-learning app users face by identifying the personal information that m-learning apps collect from their users, and the privacy policies of these apps. It reveals that most of the m-learning applications have similar privacy policies, which seem to protect the interest of the providers rather than the users. The Privacy by Design framework is reviewed to determine whether it can help the developers address user privacy practices. The results from the sample of 260 participants suggest that users are less concerned with the collection of personal information that is non-identifiable. The survey also revealed that the users are more concerned when an app shares their personal information with third parties for commercial purposes than when it is shared with the government.

2021 ◽  
Author(s):  
Daria Ilkina

This thesis investigates the privacy risks that m-learning app users face by identifying the personal information that m-learning apps collect from their users, and the privacy policies of these apps. It reveals that most of the m-learning applications have similar privacy policies, which seem to protect the interest of the providers rather than the users. The Privacy by Design framework is reviewed to determine whether it can help the developers address user privacy practices. The results from the sample of 260 participants suggest that users are less concerned with the collection of personal information that is non-identifiable. The survey also revealed that the users are more concerned when an app shares their personal information with third parties for commercial purposes than when it is shared with the government.


Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


2019 ◽  
Vol 14 (2) ◽  
pp. 116-118 ◽  
Author(s):  
Stephanie Krueger

A Review of: Tummon, N., & McKinnon, D. (2018). Attitudes and practices of Canadian academic librarians regarding library and online privacy: A national study. Library and Information Science Research, 40(2), 86-97. https://doi.org/10.1016/j.lisr.2018.05.002 Abstract Objective – To assess attitudes of Canadian academic librarians regarding online privacy issues and to gauge their knowledge of related procedures and policies at their institutions. Design – Attitudinal online survey in English. Setting – English-language academic libraries in 10 Canadian provinces. Subjects – English-speaking academic librarians across Canada. Methods – Survey, based on Zimmer’s 2014 study of librarians in the United States of America, announced via email to 1,317 potential participants, managed using LimeSurvey, and available from April 7 to May 5, 2017. In 28 optional multiple choice or Likert scale questions, the survey prompted participants to express their attitudes regarding online privacy scenarios and privacy-related library practices, including patron data collection. Results were analyzed in Microsoft Excel and SPSS. Main Results – The survey response rate was 13.9% (183 respondents). Job position, age, or geographic location did not appear to influence attitudes towards privacy, with almost all respondents strongly agreeing or agreeing that individuals should control who sees their personal information (96.2%) and that companies collect too much such information (97.8%). Respondents voiced slightly less concern about government information collection, but nearly all respondents agreed that governments should not share personal information with third parties without authorization and that companies should only use information for the purposes they specify. When asked if privacy issues are more important today than five years ago, 69.9% of respondents said they were more concerned and 78.1% noted they knew more than five years before about privacy-related risks. Regarding online behaviour, 53.3% of respondents felt web behaviour tracking is both beneficial and harmful, with 29.1% considering it harmful, and 13.7% finding it neither beneficial nor harmful. Online shopping and identify theft, social media behaviour tracking, search engine policy display, and personal information sharing were also areas of concern for respondents, with the majority noting they were somewhat or very concerned about these issues.  In terms of library practices, most respondents strongly agreed that libraries should not share personal information, circulation records, or Internet use records with third parties unless authorized, though 33% of respondents noted they could neither agree nor disagree that libraries are doing all they can to prevent unauthorized access to such information. The majority of respondents strongly agreed or agreed that libraries should play a role in educating patrons about privacy issues. Many respondents (68.9%) did not know if their libraries had practices or procedures for dealing with patron information requests from law enforcement or governmental representatives. The majority of respondents did not know if patrons at their libraries had inquired about privacy issues, 42.3% did not know if their libraries communicate privacy policies to patrons, and 45.4% noted their libraries did not inform patrons about library e-resource privacy policies. Many respondents (55.2%) had attended educational sessions about online privacy and surveillance in the past five years, while 52.2% noted their libraries had not hosted or organized such sessions over the same period. Conclusion – Survey participants showed concern about online and patron privacy, though their lack of knowledge about local procedures and policies highlights a potential need for enhanced privacy education.


2017 ◽  
Vol 34 (1) ◽  
pp. 9-14
Author(s):  
Paul Pedley

The article considers privacy from the perspective of corporate libraries and their users, including the issues that the sector has in common with other types of library as well as those that are unique to the sector. The future of business information will include greater portability and personalization, both of which pose privacy challenges. Reliance on vendors and third parties in order to be able to deliver services as well as increasing usage of cloud computing also creates privacy risks which need to be carefully addressed. Corporate libraries aren’t immune from data breaches. These can sometimes be traced back to vendors. Library vendors serving the corporate sector can’t be expected to fully address customer privacy concerns if information professionals don’t make clear to them precisely what those concerns are. Argues that components of strategies to address privacy concerns include vendor management as well as a privacy/data protection audit.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

With a growing number of health and wellness applications (apps), there is a need to explore exactly what third parties can legally do with personal data. Following a review of the online privacy policies of a select set of mobile health and fitness apps, this chapter assessed the privacy policies of four popular health and fitness apps, using a checklist that comprised five privacy risk categories. Privacy risks, were based on two questions: a) is important information missing to make informed decisions about the use of personal data? and b) is information being shared that might compromise the end-user's right to privacy of that information? The online privacy policies of each selected app was further examined to identify important privacy risks. From this, a separate checklist was completed and compared to reach an agreement of the presence or absence of each privacy risk category. This chapter concludes with a set of recommendations when designing privacy policies for the sharing of personal information collected from health and fitness apps.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

With a growing number of health and wellness applications (apps), there is a need to explore exactly what third parties can legally do with personal data. Following a review of the online privacy policies of a select set of mobile health and fitness apps, this chapter assessed the privacy policies of four popular health and fitness apps, using a checklist that comprised five privacy risk categories. Privacy risks, were based on two questions: a) is important information missing to make informed decisions about the use of personal data? and b) is information being shared that might compromise the end-user's right to privacy of that information? The online privacy policies of each selected app was further examined to identify important privacy risks. From this, a separate checklist was completed and compared to reach an agreement of the presence or absence of each privacy risk category. This chapter concludes with a set of recommendations when designing privacy policies for the sharing of personal information collected from health and fitness apps.


Sensors ◽  
2018 ◽  
Vol 18 (12) ◽  
pp. 4383 ◽  
Author(s):  
Hongchen Wu ◽  
Mingyang Li ◽  
Huaxiang Zhang

Privacy intrusion has become a major bottleneck for current trust-aware social sensing, since online social media allows anybody to largely disclose their personal information due to the proliferation of the Internet of Things (IoT). State-of-the-art social sensing still suffers from severe privacy threats since it collects users’ personal data and disclosure behaviors, which could raise user privacy concerns due to data integration for personalization. In this paper, we propose a trust-aware model, called the User and Item Similarity Model with Trust in Diverse Kinds (UISTD), to enhance the personalization of social sensing while reducing users’ privacy concerns. UISTD utilizes user-to-user similarities and item-to-item similarities to generate multiple kinds of personalized items with common tags. UISTD also applies a modified k-means clustering algorithm to select the core users among trust relationships, and the core users’ preferences and disclosure behaviors will be regarded as the predicted disclosure pattern. The experimental results on three real-world data sets demonstrate that target users are more likely to: (1) follow the core users’ interests on diverse kinds of items and disclosure behaviors, thereby outperforming the compared methods; and (2) disclose more information with lower intrusion awareness and privacy concern.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Anja Stevic ◽  
Desirée Schmuck ◽  
Anna Koemets ◽  
Melanie Hirsch ◽  
Kathrin Karsay ◽  
...  

Abstract Mobile social media have become a widespread means to participate in everyday social and professional life. These platforms encourage the disclosure and exchange of personal information, which comes with privacy risks. While past scholarship has listed various predictors and consequences of online privacy concerns, there has been to date no empirical investigation of a conceivable relationship with perceived stress. Using a longitudinal panel study, we examined the reciprocal relationship between mobile social media privacy concerns and perceived stress. Results supported the hypothesis that mobile social media privacy concerns at T1 are associated with higher perceived stress at T2. However, we found no evidence for the reverse association, that is, perceived stress at T1 was not related to mobile social media privacy concerns at T2. The findings are discussed based on two models—the “Antecedents privacy concerns outcomes” model and the “Privacy calculus” model.


2019 ◽  
Vol 20 (3) ◽  
pp. 509-529
Author(s):  
Tanja Heuer ◽  
Ina Schiering ◽  
Reinhard Gerndt

Abstract Social robots as companions play an increasingly important role in our everyday life. However, reaching the full potential of social robots and the interaction between humans and robots requires permanent collection and processing of personal data of users, e.g. video and audio data for image and speech recognition. In order to foster user acceptance, trust and to address legal requirements as the General Data Protection Regulation of the EU, privacy needs to be integrated in the design process of social robots. The Privacy by Design approach by Cavoukian indicates the relevance of a privacy-respecting development and outlines seven abstract principle. In this paper two methods as a hands-on guideline to fulfill the principles are presented and discussed in the content of the Privacy by Design approach. Privacy risks of a typical robot scenario are identified, analyzed and solutions are proposed on the basis of the seven types of privacy and the privacy protection goals.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

Personal applications (apps) collect all sorts of personal information like name, email address, age, height, weight, and in some cases, detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.


Sign in / Sign up

Export Citation Format

Share Document