Dataveillance and Information Privacy Concerns

Author(s):  
Regina Connolly ◽  
Grace Kenny

Information privacy research historically focuses on exploring individuals' concerns in the transaction environment. However, the recent growth of technology-enabled workplace surveillance is raising many concerns over employees' privacy. Employee surveillance practices are becoming increasingly prevalent, ranging from monitoring internet and email activities to capturing employees' interactions with customers and employees' personal health and fitness data using wearable health devices. Individuals may understand that employers can monitor their activities, but may not the potential uses or the repercussions of such monitoring. Moreover, employees may not feel they have the ability to opt-out of this monitoring. This chapter explores the privacy and ethical issues surrounding emerging means of workplace surveillance. The chapter considers both employee and employer perspectives and poses many questions to consider when deciding when does legitimate monitoring become an invasion of employee privacy?

Biometrics ◽  
2017 ◽  
pp. 1522-1542
Author(s):  
Regina Connolly ◽  
Grace Kenny

Information privacy research historically focuses on exploring individuals' concerns in the transaction environment. However, the recent growth of technology-enabled workplace surveillance is raising many concerns over employees' privacy. Employee surveillance practices are becoming increasingly prevalent, ranging from monitoring internet and email activities to capturing employees' interactions with customers and employees' personal health and fitness data using wearable health devices. Individuals may understand that employers can monitor their activities, but may not the potential uses or the repercussions of such monitoring. Moreover, employees may not feel they have the ability to opt-out of this monitoring. This chapter explores the privacy and ethical issues surrounding emerging means of workplace surveillance. The chapter considers both employee and employer perspectives and poses many questions to consider when deciding when does legitimate monitoring become an invasion of employee privacy?


2012 ◽  
Vol 5 (2) ◽  
pp. 31-45 ◽  
Author(s):  
Regina Connolly ◽  
Cliona McParland

Information privacy concerns are a dominant concern of the information age. Such concerns emanate from the tension between the correct use of personal information and information privacy. That tension has extended to the computer-mediated work environment as employees are becoming increasingly aware of the ways in which management can employ technologies to monitor their email and Internet interactions. Such information privacy concerns have the potential to negatively impact organisational productivity and employee morale. The aim of this paper is to outline some of the major issues relating to workplace surveillance and provide a balanced perspective that identifies the emerging issues and subsequent privacy concerns from the employee’s perspective as well as the rationale underlying managements’ decision to employ monitoring technologies in the workplace. In doing so, it attempts to progress academic understanding of this issue and enhance practitioners’ understanding of the factors that influence employees’ technology-related privacy concerns.


Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


2013 ◽  
Vol 10 (3) ◽  
pp. 348-356
Author(s):  
Yolanda Jordaan

Within the current privacy sensitive environment, an understanding of consumers’ information privacy concerns is critical. The objective of the study is to establish whether there is a difference between victims and non-victims of information privacy invasion, and whether this has an influence on their privacy concerns and protective behaviour. A probability (systematic) sampling design was used to draw a representative sample of 800 households where-after 800 telephone interviews were conducted with adults from these households. The findings show that victims had increased concern about information misuse by, and solicitation practices of, organisations, and they exhibit more protective behaviour than non-victims. This suggests that organisations should recognise that consumers believe that they have ownership of their personal information. Furthermore, organisations should share information of consumers in a way that is respectful, relevant and beneficial.


Sign in / Sign up

Export Citation Format

Share Document