首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy. This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information can violate privacy but does not call for consent.  相似文献   

2.
In this article we examine the effectiveness of consent in data protection legislation. We argue that the current legal framework for consent, which has its basis in the idea of autonomous authorisation, does not work in practice. In practice the legal requirements for consent lead to ‘consent desensitisation’, undermining privacy protection and trust in data processing. In particular we argue that stricter legal requirements for giving and obtaining consent (explicit consent) as proposed in the European Data protection regulation will further weaken the effectiveness of the consent mechanism. Building on Miller and Wertheimer’s ‘Fair Transaction’ model of consent we will examine alternatives to explicit consent.  相似文献   

3.
Users increasingly use mobile devices to engage in social activity and commerce, enabling new forms of data collection by firms and marketers. User privacy expectations for these new forms of data collection remain unclear. A particularly difficult challenge is meeting expectations for contextual integrity, as user privacy expectations vary depending upon data type collected and context of use. This article illustrates how fine-grained, contextual privacy expectations can be measured. It presents findings from a factorial vignette survey that measured the impact of diverse real-world contexts (e.g., medical, navigation, music), data types, and data uses on user privacy expectations. Results demonstrate that individuals’ general privacy preferences are of limited significance for predicting their privacy judgments in specific scenarios. Instead, the results present a nuanced portrait of the relative importance of particular contextual factors and information uses, and demonstrate how those contextual factors can be found and measured. The results also suggest that current common activities of mobile application companies, such as harvesting and reusing location data, images, and contact lists, do not meet users’ privacy expectations. Understanding how user privacy expectations vary according to context, data types, and data uses highlights areas requiring stricter privacy protections by governments and industry.  相似文献   

4.
This article argues that big data’s entrepreneurial potential is based not only on new technological developments that allow for the extraction of non-trivial, new insights out of existing data, but also on an ethical judgment that often remains implicit: namely the ethical judgment that those companies that generate these new insights can legitimately appropriate (the fruits of) these insights. As a result, the business model of big data companies is essentially founded on a libertarian-inspired ‘finders, keepers’ ethic. The article argues, next, that this presupposed ‘finder, keepers’ ethic is far from unproblematic and relies itself on multiple unconvincing assumptions. This leads to the conclusion that the conduct of companies working with big data might lack ethical justification.  相似文献   

5.
Along with informed consent, anonymization is an accepted method of protecting the interests of research participants, while allowing data collected for official statistical purposes to be reused by other agencies within and outside government. The Decennial Census, carried out in a number of countries, including the United Kingdom, is a major event in the production of research data and provides an important resource for a variety of organizations. This article combines ethical evaluation, a review of relevant law and guidance, and analysis of 30 qualitative interviews (carried out during the period of the 2001 UK Census), in order to explore the adequacy of the current framework for the protection of informational privacy in relation to census data. Taking account of Nissenbaum's concept of “contextual integrity,” Vedder's concept of “categorical privacy,” and Sen's call to heed of the importance of “actual behavior,” it will be argued that the current “contractarian” view of the relationship between an individual participant and the organization carrying out the Census does not engage sufficiently with actual uses of data. As a result, people have expectations of privacy that are not matched by practice and that the current normative—including the governance—framework cannot capture.  相似文献   

6.
In the public debate, social implications of information technology are mainly seen through the privacy lens. Impact assessments of information technology are also often limited to privacy impact assessments, which are focused on individual rights and well-being, as opposed to the social environment. In this article, I argue that this perspective is too narrow, in terms of understanding the complexity of the relation between information technology and society, as well as in terms of directions for managing this relation. I use systems theory to show that current approaches focus mostly on individual impact of information technology developments rather than their mediating role in society itself. I argue that this should be complemented by an analysis of impact on individuals (psychic systems) via co-construction of the environment (social system). I then take up the question of what the role of information technology in social systems would look like in terms of the social relations of trust and power, and how this can complement privacy in discussions on impacts of information technology.  相似文献   

7.
This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.  相似文献   

8.
谢卫红  樊炳东  董策 《现代情报》2018,38(9):113-121
为了发现国内大数据产业存在的不足,本文从大数据发展顶层设计、要素供给、数据隐私与安全保护及大数据标准体系建设4个方面对国内外大数据产业政策进行比较,分析了国内外大数据产业政策的异同,最后针对性地从平衡政府数据开放和个人隐私保护政策完善、完善数据流通体系、加强人才培养、调整大数据关键技术投入重心4个方面提出建议,推动我国大数据产业有效、健康发展。  相似文献   

9.
In a highly competitive industry, it has been a best practice that dynamic capabilities guide technology firms to cope with challenging situations. Meanwhile, knowledge creation enables the firm to condition the success and continuity of innovations, entrepreneurial orientation to support companies in winning the competition, and gamification to engage employees in a collaborative way towards better firm performance. This study examines how technology companies can improve their performance using gamification, knowledge creation, and entrepreneurial orientation. To test the proposed model, we collected data using a questionnaire survey of 124 technology companies in Indonesia. The theoretical model used structural equation modeling (SEM) with SmartPLS 3. The results show that all constructs have a direct and positive relationship, except for the direct relationship between gamification and firm performance. Thus, entrepreneurial orientation and knowledge creation are essential components of technology companies that mediate the effect of gamification on firm performance. This study provides a theoretical and empirical basis for the antecedents of technological firm performance.  相似文献   

10.
Wearable devices introduce many new capabilities to the delivery of healthcare. But wearables also pose grave privacy risks. Furthermore, information overload gets in the way of informed consent by the patient. To better protect American patients in an increasingly digital world, the U.S. Congress passed the Health Insurance Portability and Accountability Act of 1996 (HIPAA). This article examines the adequacy of HIPAA vis-à-vis issues raised by wearable technologies in the Internet of Things environment and identifies policy gaps and factors that drive health data exposure. It presents a 2 × 2 Partnership-Identity Exposure Matrix, illustrates implications in four different contexts, and provides recommendations for improving privacy protection.  相似文献   

11.
    企业如何通过技术收购活动实现价值创造是一个非常重要而又缺乏深入探讨的问题。本文构建了技术甄选行为、技术知识利用方式、收购经验以及价值创造之间的理论模型,并以高科技企业为研究对象,利用257份有效问卷进行了实证研究。研究结果表明:技术甄选行为和技术知识利用方式之间存在相互对应的匹配关系,技术知识利用方式有助于企业新价值的创造,收购经验对技术甄选行为和技术知识利用方式之间关系有差异性的调节效应。研究结果丰富并扩展了企业如何通过技术收购创造价值的相关理论,较好的回答了“成功的技术购买者如何做到物有所值”这一现实问题。  相似文献   

12.
Informational privacy, data mining, and the Internet   总被引:3,自引:2,他引:1  
Privacy concerns involving data mining are examined in terms of four questions: (1) What exactly is data mining? (2) How does data mining raise concerns for personal privacy? (3) How do privacy concerns raised by data mining differ from those concerns introduced by ‘traditional’ information-retrieval techniques in computer databases? (4) How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from ‘data warehouses?’ It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that (a) go beyond concerns introduced in traditional information-retrieval techniques in computer databases and (b) are not covered by present data-protection guidelines and privacy laws.  相似文献   

13.
[目的/意义]大数据时代,美国情报机构监视恐怖嫌疑分子数据作为维护美国国家安全的重要方面,效果显著。然而,实践中出现"国家安全"和"个人数据安全""个人隐私权"相冲突的问题,对之研究具有重要的镜鉴价值。[方法/过程]以美国《涉外情报监控法》第702条为研究样本,实证分析了个人隐私被侵犯的原因,如即情报搜集工作监督不严、问责不力等。规范分析了平衡"国家安全"和"个人数据安全""个人隐私权"之间的法律对策。[结果/结论]研究认为,设立情报监督机构,规制数据使用目的和范围,加大问责力度是平衡国家安全和公民个人数据隐私权的积极面向。  相似文献   

14.
金泓序  何畏 《情报科学》2022,40(6):132-140
【目的/意义】大数据技术的广泛应用为个人信息的保护提出新的挑战,既有的个人信息法律保护模式亟待 完善,研究个人信息保护的存在的问题及影响因素能有利于提出完善个人信息保护相应的对策。【方法/过程】基于 大数据时代背景下我国个人信息保护的状况,找出目前我国个人信息保护存在的问题,并深入发掘个人信息保护 的影响因素,针对各影响因素提出相应的对策。【结果/结论】通过分析研究提出加大个人信息保护的投入,明确个 人信息与个人隐私界分,完善可识别化要素,重塑知情同意原则等,从多途径、多维度完善个人信息保护。【创新/局 限】本文是对我国大数据时代个人信息保护问题的影响因素和对策的宏观研究,在微观层面还有待进一步深层 剖析。  相似文献   

15.
周婷婷  郭岩 《科研管理》2006,41(2):210-219
基于公司发展休戚相关的人情与金钱视角,以大数据上市公司的大数据业务规模、创新投入、无形资产为契入点,实证探究关系文化、信贷资源配置影响下的科技创新效率。研究发现,科技创新环境越好,大数据公司的发展越繁荣。地区民众对“人脉”等关系文化的崇尚藐视了公平正义,形成负面舆情,阻碍了科技创新对大数据公司发展的提振效应。信贷资源配置效率越高的地区,大数据公司的融资约束越轻,科技创新对大数据公司发展的推动效应越凸显。实践表明,产学研合作对接、国外技术引进、纯洁科技环境的建立以及顺畅的融资渠道是助力大数据公司繁荣发展的有效路径。  相似文献   

16.
Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and management of digital identities and footprints. SNS uses in healthcare raise additional issues. Online materials acting as archives of ‘the self’ bolster present and future identities for users with compromised capacity. E-health involves actual and potential intersection of data gathered for the purpose of delivering health technological support with data used for social networking purposes. Ethicolegal guidance is limited on the implications of SNS usage in contexts where users have impaired/reduced capacity to understand and/or consent to sharing personal data about their health, medication or location. Vulnerable adults and family/carers face uncertainty in regard to consent, data protection, online identity and legal liabilities. Ethicolegal responsibilities and duties of care of technology providers, healthcare professionals, regulatory bodies and policymakers need clarification.  相似文献   

17.
This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.  相似文献   

18.
In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The influential Chinese social media platform WeChat is taken as a case study, and the ease of connection, communication and transaction combined with issues of commercialisation and surveillance are discussed in the framework of the privacy paradox. Protective behaviour and tactics are examined through different perceptions of privacy in the digital age. The findings of this study suggest that users possess certain amount of freedoms on WeChat. However, users’ individual privacy attitudes and behaviour in practice suggest they have a declined sense of their own freedom and right to privacy. A privacy paradox exists when users, while holding a high level of concerns, in reality do little to further the protection of their personal information on WeChat. We argue that once a user has ingrained part of their social engagement within the WeChat system, the incentive for them to remain a part of the system outweighs their requirement to secure their privacy online as their decision-making is largely based on a simple cost-benefit analysis. The power and social capital yielded via WeChat is too valuable to give up as WeChat is widely used not only for private conversations, but also for study or work-related purposes. It further blurs the boundaries between the public, the professional and the private, which is a rather unique case compared with other social media around the world.  相似文献   

19.
黄丽佳  袁勤俭 《现代情报》2017,37(10):114-121
通过对相关文献的回顾,本文对国际网络隐私研究进行了计量分析,发现现有的研究主题集中在"基于移动位置服务的隐私问题研究"、"隐私保护算法研究"、"隐私保护技术研究"、"云计算的隐私安全研究"、"网络隐私权限控制研究"、"社交网站和电子商务中的用户隐私态度与行为研究"、"青少年敏感信息的隐私与安全保护研究"、"数据公开共享策略与国家治理研究"8个方面。研究发现当前研究中存在"利用数据纵向分析网络隐私主题随时间发展变化的研究较少"、"对于一些发展中国家的隐私问题关注度较低"、"国家的治理与业界的隐私政策相对独立缺乏联系"等问题,"大数据时代移动信息和社交信息挖掘过程中的隐私问题"、"在线医疗的隐私问题"等是未来研究值得关注的领域。  相似文献   

20.
Whether the Internet Protocol address should be seen as personal data or not remains a contested issue with regard to information privacy. This article explores the question by looking at the technical attributes of the Internet Protocol address, European Union (EU) and U.S. case law, and how the EU's advisory data protection body, the Article 29 Working Party, and some of the world's most influential information and communication technology (ICT) companies consider the IP address. The notion of contextual integrity is then used to show that information privacy regulation must stipulate concrete technical mandates instead of guiding principles, contrary to the ideal of technology neutrality in Internet regulation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号