Internet Privacy from the Individual and Business Perspectives

2008 ◽  
pp. 1360-1365
Author(s):  
Tziporah Stern

People have always been concerned about protecting personal information and their right to privacy. It is an age-old concern that is not unique to the Internet. People are concerned with protecting their privacy in various environments, including healthcare, the workplace and e-commerce. However, advances in technology, the Internet, and community networking are bringing this issue to the forefront. With computerized personal data files: a. retrieval of specific records is more rapid; b. personal information can be integrated into a number of different data files; and c. copying, transporting, collecting, storing, and processing large amounts of information are easier.

Author(s):  
Tziporah Stern

People have always been concerned about protecting personal information and their right to privacy. It is an age-old concern that is not unique to the Internet. People are concerned with protecting their privacy in various environments, including healthcare, the workplace and e-commerce. However, advances in technology, the Internet, and community networking are bringing this issue to the forefront. With computerized personal data files: a. retrieval of specific records is more rapid; b. personal information can be integrated into a number of different data files; and c. copying, transporting, collecting, storing, and processing large amounts of information are easier.


Author(s):  
William Bülow ◽  
Misse Wester

As information technology is becoming an integral part of modern society, there is a growing concern that too much data containing personal information is stored by different actors in society and that this could potentially be harmful for the individual. The aim of this contribution is to show how the extended use of ICT can affect the individual’s right to privacy and how the public perceives risks to privacy. Three points are raised in this chapter: first, if privacy is important from a philosophical perspective, how is this demonstrated by empirical evidence? Do individuals trust the different actors that control their personal information, and is there a consensus that privacy can and should be compromised in order to reach another value? Second, if compromises in privacy are warranted by increased safety, is this increased security supported by empirical evidence? Third, the authors will argue that privacy can indeed be a means to increase the safety of citizens and that the moral burden of ensuring and protecting privacy is a matter for policy makers, not individuals. In conclusion, the authors suggest that more nuanced discussion on the concepts of privacy and safety should be acknowledged and the importance of privacy must be seen as an important objective in the development and structure of ICT uses.


Author(s):  
Christina Akrivopoulou ◽  
Aris Stylianou

The chapter faces a series of questions that the digital era raises as far as the protection of privacy is concerned. Technology and specifically internet, apart from posing innovative, complex threats to the autonomy and privacy of the individual constructs a new frame for approaching privacy. The technological texture of the internet calls for a new conception of privacy that can be adopted in those circumstances, such as anonymity. The chapter argues that though anonymity cannot be identified with the right to privacy, represents in fact one of its key functions, its ability as a negative freedom to shield the autonomy of the individual against all kind of threats. Thus, anonymity can foster communication, speech and political expression in the internet. Nevertheless, the cost of protecting privacy as anonymity is substantial since its neutral character can function as a veil for sinister actions such as libel, hate-speech and stalking in cyberspace. The need for ‘reconceptualizing’ privacy in the internet, for the writers confirms the evolving, developing character of the right, whose substantial content is not given or static but is closely connected and constructed via societal change. The chapter explores the technological threats that the right to privacy confronts in the internet, such as “cookies”, “spam messages”, the dangers they pose to the freedom and autonomy of the individual as well as the positive dimensions of the internet, especially its role in democratic accountability and political dialogue. Concluding the writers present three architectures for the protection of privacy in the internet: (a) a model based on informational law, (b) a market based solution, where privacy is understood in contractual terms and (c) a model based on the participation of the users in the uses of their personal information as well as to the enforcement of the accountability of the internet actors, e.g. corporations, advertising agencies.


2021 ◽  
pp. 1-31
Author(s):  
Sarah E. Lageson ◽  
Elizabeth Webster ◽  
Juan R. Sandoval

Digitization and the release of public records on the Internet have expanded the reach and uses of criminal record data in the United States. This study analyzes the types and volume of personally identifiable data released on the Internet via two hundred public governmental websites for law enforcement, criminal courts, corrections, and criminal record repositories in each state. We find that public disclosures often include information valuable to the personal data economy, including the full name, birthdate, home address, and physical characteristics of arrestees, detainees, and defendants. Using administrative data, we also estimate the volume of data disclosed online. Our findings highlight the mass dissemination of pre-conviction data: every year, over ten million arrests, 4.5 million mug shots, and 14.7 million criminal court proceedings are digitally released at no cost. Post-conviction, approximately 6.5 million current and former prisoners and 12.5 million people with a felony conviction have a record on the Internet. While justified through public records laws, such broad disclosures reveal an imbalance between the “transparency” of data releases that facilitate monitoring of state action and those that facilitate monitoring individual people. The results show how the criminal legal system increasingly distributes Internet privacy violations and community surveillance as part of contemporary punishment.


2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


Author(s):  
Sam De Silva

Developments in technology and the global nature of business means that personal information about individuals in the UK may often be processed overseas, frequently without the explicit knowledge or consent of those individuals. This raises issues such as the security of such data, who may have access to it and for what purposes and what rights the individual may have to object. The Data Protection Act 1998 provides a standard of protection for personal data, including in respect of personal data that is being transferred outside of the UK. Chapter 18 focus on how a UK data controller (the organisation that controls how and why personal data is processed and is therefore legally responsible for compliance) can fulfil its business and operational requirements in transferring personal data outside the EEA, whilst ensuring legal compliance.


Cyber Crime ◽  
2013 ◽  
pp. 263-283 ◽  
Author(s):  
Jun Hu ◽  
Liam Peyton

Knowledge discovery is a critical component in improving health care. Health 2.0 leverages Web 2.0 technologies to integrate and share data from a wide variety of sources on the Internet. There are a number of issues which must be addressed before knowledge discovery can be leveraged effectively and ubiquitously in Health 2.0. Health care data is very sensitive in nature so privacy and security of personal data must be protected. Regulatory compliance must also be addressed if cooperative sharing of data is to be facilitated to ensure that relevant legislation and policies of individual health care organizations are respected. Finally, interoperability and data quality must be addressed in any framework for knowledge discovery on the Internet. In this chapter, we lay out a framework for ubiquitous knowledge discovery in Health 2.0 based on a combination of architecture and process. Emerging Internet standards and specifications for defining a Circle of Trust, in which data is shared but identity and personal information protected, are used to define an enabling architecture for knowledge discovery. Within that context, a step-by-step process for knowledge discovery is defined and illustrated using a scenario related to analyzing the correlation between emergency room visits and adverse effects of prescription drugs. The process we define is arrived at by reviewing an existing standards-based process, CRISP-DM, and extending it to address the new context of Health 2.0.


Author(s):  
Tziporah Stern

Privacy, or the right to hold information about oneself in secret (Masuda, 1979; O’Brien & Yasnof, 1999), has become increasingly important in the information society. With the rapid technological advances and the digitalization of information, retrieval of specific records is more rapid; personal information can be integrated into a number of different data files; and copying, transporting, collecting, storing, and processing large amounts of information is easier. Additionally, the advent of the World Wide Web and the fast-paced growth of the Internet have created further cause for concern. The vast amounts of digital information and the pervasiveness of the Internet facilitate new techniques for gathering information—for example, spyware, phishing, and cookies. Hence, personal information is much more vulnerable to being inappropriately used. This article outlines the importance of privacy in an e-commerce environment, the specific privacy concerns individuals may have, antecedents to these concerns, and potential remedies to quell them.


Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


Sign in / Sign up

Export Citation Format

Share Document