scholarly journals Development of Personal Information Privacy Concerns Evaluation

Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier used privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this article, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions, and the types of context dependent dimensions, to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.

Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data-intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this chapter, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions and the types of context dependent dimensions to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


Author(s):  
Alireza Jabbari ◽  
Nasrin Shaarbafchi Zadeh ◽  
Behrooz Maddahian

Introduction: Performance-based payment is a payment model that attempts to reward the measured dimensions of performance and encourages health service providers to achieve predetermined goals by financial incentives. This study aimed to identify executive challenges of performance-based payment from medical and educational hospitals managers’ perspective and offering solutions in Isfahan 2018. Methods: This study was a qualitative study. Semi structured interviews were used to collect data. The research population was 11 people (the managers of educational and medical hospitals in Isfahan) who were selected purposefully. All interviews were recorded and then written on a paper. The duration of the interviews varied between 45 to 60 minutes. The data were analyzed using MAXQDA120 software and based on thematic analysis. Results: In this study, , regarding executive challenges, seven themes and fifteen sub-themes were obtained, including the weakness of the performance-based payment project, weakness in education and educational support, low employee participation, weakness of information and communication technology, weakness of laws and regulations, unfavorable economic conditions of the public sector, and special conditions governing public hospitals.   Conclusion: performance-based payment, if implemented correctly, can lead to the improvement of quantitative and qualitative indicators related to employees’ performance. Correct implementation requires identifying challenges and obstacles and then corrective actions. This study was able to identify and present some of the operational challenges of the performance-based payment from the viewpoint of hospital managers.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Joseph Kwame Adjei

Monetization of personal identity information has become a major component of modern business models, contributing to dramatic innovations in the collection, aggregation, and use of personal information. This phenomenon is commonplace given that parties to business transactions and social interactions usually rely on the issue of claims and disclosure of unique attributes and credentials for proof and verification of identity. However, the heightened societal information privacy concerns and the diminishing level of trust between transacting parties make such attempts to monetize personal information a very risky endeavor. This chapter examines the major technological and regulatory imperatives in the monetization of personal identity information. The resulting monetization model provides an important source of reference for effective monetization of personal information.


Author(s):  
Xun Li ◽  
Radhika Santhanam

Individuals are increasingly reluctant to disclose personal data and sometimes even intentionally fabricate information to avoid the risk of having it compromised. In this context, organizations face an acute dilemma: they must obtain accurate job applicant information in order to make good hiring decisions, but potential employees may be reluctant to provide accurate information because they fear it could be used for other purposes. Building on theoretical foundations from social cognition and persuasion theory, we propose that, depending on levels of privacy concerns, organizations could use appropriate strategies to persuade job applicants to provide accurate information. We conducted a laboratory experiment to examine the effects of two different persuasion strategies on prospective employees’ willingness to disclose information, measured as their intentions to disclose or falsify information. Our results show support for our suggestion As part of this study, we propose the term information sensitivity to identify the types of personal information that potential employees are most reluctant to disclose.


2015 ◽  
pp. 1638-1652
Author(s):  
Panagiotis Kitsos ◽  
Aikaterini Yannoukakou

The events of 9/11 along with the bombarding in Madrid and London forced governments to resort to new structures of privacy safeguarding and electronic surveillance under the common denominator of terrorism and transnational crime fighting. Legislation as US PATRIOT Act and EU Data Retention Directive altered fundamentally the collection, processing and sharing methods of personal data, while it granted increased powers to police and law enforcement authorities concerning their jurisdiction in obtaining and processing personal information to an excessive degree. As an aftermath of the resulted opacity and the public outcry, a shift is recorded during the last years towards a more open governance by the implementation of open data and cloud computing practices in order to enhance transparency and accountability from the side of governments, restore the trust between the State and the citizens, and amplify the citizens' participation to the decision-making procedures. However, privacy and personal data protection are major issues in all occasions and, thus, must be safeguarded without sacrificing national security and public interest on one hand, but without crossing the thin line between protection and infringement on the other. Where this delicate balance stands, is the focal point of this paper trying to demonstrate that it is better to be cautious with open practices than hostage of clandestine practices.


2019 ◽  
Vol 28 (4) ◽  
pp. 424-434 ◽  
Author(s):  
Anna Middleton ◽  
◽  
Richard Milne ◽  
Heidi Howard ◽  
Emilia Niemiec ◽  
...  

AbstractPublic acceptance is critical for sharing of genomic data at scale. This paper examines how acceptance of data sharing pertains to the perceived similarities and differences between DNA and other forms of personal data. It explores the perceptions of representative publics from the USA, Canada, the UK and Australia (n = 8967) towards the donation of DNA and health data. Fifty-two percent of this public held ‘exceptionalist’ views about genetics (i.e., believed DNA is different or ‘special’ compared to other types of medical information). This group was more likely to be familiar with or have had personal experience with genomics and to perceive DNA information as having personal as well as clinical and scientific value. Those with personal experience with genetics and genetic exceptionalist views were nearly six times more likely to be willing to donate their anonymous DNA and medical information for research than other respondents. Perceived harms from re-identification did not appear to dissuade publics from being willing to participate in research. The interplay between exceptionalist views about genetics and the personal, scientific and clinical value attributed to data would be a valuable focus for future research.


2019 ◽  
Vol 9 (1) ◽  
pp. 24 ◽  
Author(s):  
Leif Sundberg

Governments across the world spend vast resources on implementing digital technology. Electronic, or digital, government is the use and study of Internet-based information and communication technology in the public sector. A point of departure in this study is that investments in technology are not value-free; they require allocation of limited resources and trade-offs between values. The purpose of this paper was to investigate how values are prioritized in the Swedish digital government. This research was conducted by using quantitative data from a survey administered to Swedish municipalities and national agencies. In addition, qualitative data from a database was used to exemplify value operationalization. The research utilized a theoretical framework based on four value positions: professionalism, efficiency, service, and engagement. The findings reveal that service and quality, and productivity and legality have a high priority, while engagement values are less prioritized. Differences based on organization type and size are also discussed. Moreover, the study suggests that professionalism and efficiency are distinct value positions, while service and engagement are closely related through citizen centricity. The qualitative material suggests that citizen centricity can manifest itself as a form of service logic, but also in the form of educational digital inclusion activities for vulnerable groups. The paper concludes by suggesting that future research should further refine the concept of citizen centricity in relation to digital government values, since its current meaning is ambiguous.


2013 ◽  
Vol 10 (3) ◽  
pp. 348-356
Author(s):  
Yolanda Jordaan

Within the current privacy sensitive environment, an understanding of consumers’ information privacy concerns is critical. The objective of the study is to establish whether there is a difference between victims and non-victims of information privacy invasion, and whether this has an influence on their privacy concerns and protective behaviour. A probability (systematic) sampling design was used to draw a representative sample of 800 households where-after 800 telephone interviews were conducted with adults from these households. The findings show that victims had increased concern about information misuse by, and solicitation practices of, organisations, and they exhibit more protective behaviour than non-victims. This suggests that organisations should recognise that consumers believe that they have ownership of their personal information. Furthermore, organisations should share information of consumers in a way that is respectful, relevant and beneficial.


Sign in / Sign up

Export Citation Format

Share Document