首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
As federal agencies move toward more sophisticated e-govern- ment offerings, they must consider both policy and operational requirements for electronic authentication (e-authentication). One important consideration in designing and deploying e-authentica- tion solutions is the balance between access, security, authentication, and privacy. Public law and government-wide policy encourage e-government and e-authentication simultaneously with privacy protection, creating policy and operational tensions for e-government efforts. A review of the relevant laws and policies and analyses of the privacy implications of authentication technologies indicates that federal agencies have at least two analytic frameworks for balancing privacy concerns with e-authentication. A framework offered in the 2003 National Research Council report Who Goes There? and the privacy impact analysis requirements of the E-Government Act of 2002 provide e-government projects with the tools for navigating the path between privacy and openness, required by both e-government law and policy.  相似文献   

2.
There is an increasing recognition that various stakeholder groups for e-government have a significant role to play in ensuring the long-term success of the e-government enterprise. This article seeks to contribute to the understanding of the stakeholders’ multiple perspectives by proposing typologies of stakeholder roles, and stakeholder benefits, respectively, and embedding these in a stakeholder benefits analysis tool. A literature review is used to surface the diverse existing categorizations of e-government stakeholders and their interests and the benefits sought. This review informs a proposal for a typology of stakeholder roles, and for a typology of stakeholder benefits, which together are used to construct an initial proposal for a stakeholder benefits analysis tool (SBAT), which can be used to map stakeholder roles to stakeholder benefits. This tool has been tested by an expert group, and revised. This exploratory study is an important first step towards the development of tools and approaches for understanding the benefits sought by a wide range of different stakeholder groups in e-government. Progress in the development of such tools is important for the development of knowledge and practice, policy, and evaluation with respect to stakeholder engagement with, and participation in, e-government.  相似文献   

3.

As federal agencies move toward more sophisticated e-govern- ment offerings, they must consider both policy and operational requirements for electronic authentication (e-authentication). One important consideration in designing and deploying e-authentica- tion solutions is the balance between access, security, authentication, and privacy. Public law and government-wide policy encourage e-government and e-authentication simultaneously with privacy protection, creating policy and operational tensions for e-government efforts. A review of the relevant laws and policies and analyses of the privacy implications of authentication technologies indicates that federal agencies have at least two analytic frameworks for balancing privacy concerns with e-authentication. A framework offered in the 2003 National Research Council report Who Goes There? and the privacy impact analysis requirements of the E-Government Act of 2002 provide e-government projects with the tools for navigating the path between privacy and openness, required by both e-government law and policy.  相似文献   

4.
Informational privacy, data mining, and the Internet   总被引:3,自引:2,他引:1  
Privacy concerns involving data mining are examined in terms of four questions: (1) What exactly is data mining? (2) How does data mining raise concerns for personal privacy? (3) How do privacy concerns raised by data mining differ from those concerns introduced by ‘traditional’ information-retrieval techniques in computer databases? (4) How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from ‘data warehouses?’ It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that (a) go beyond concerns introduced in traditional information-retrieval techniques in computer databases and (b) are not covered by present data-protection guidelines and privacy laws.  相似文献   

5.
Pervasive digitization and aggregation of personal health information (PHI), along with artificial intelligence (AI) and other advanced analytical techniques, hold promise of improved health and healthcare services. These advances also pose significant data governance challenges for ensuring value for individual, organizational, and societal stakeholders as well as individual privacy and autonomy. Through a case study of a controversial public-private partnership between Royal Free Trust, a National Health Service hospital system in the United Kingdom, and Alphabet’s AI venture DeepMind Health, we investigate how forms of data governance were adapted, as PHI data flowed into new use contexts, to address concerns of contextual integrity, which is violated when personal information collected in one use context moves to another use context with different norms of appropriateness.  相似文献   

6.
Biometric technology is rapidly gaining popularity as an access control mechanism in the workplace. In some instances, systems relying on biometric technology for access control have not been well received by employees. One potential reason for resistance may be perceived privacy issues associated with organizational collection and use of biometric data. This research draws on previous organizational information handling and procedural fairness literature to frame and examine these underlying privacy issues. Perceived accountability, perceived vulnerability, and distrust were distilled from the previous literature as the primary dimensions of employee privacy concerns related to biometric technology. This study assesses the effects of these privacy concerns, how they vary based on the cultural influences of Anglos and Hispanics.Fire ground accountability is a critical management objective in the firefighting domain. In multi-unit or multi-agency crisis response scenarios, the on-scene incident commander tracks and accounts for each first responder. This research designed and deployed a new fire ground accountability system that tracked firefighters through finger pattern-based biometric logins to their assigned positions on the firefighting apparatus. An instrument measuring level of privacy concern on three underlying dimensions and demographic data was developed, validated and administered in a quasi-experimental field study. A pre-test–post-test survey methodology was employed to detect potential differences in privacy concerns as familiarity with the system increased. The study shows that Anglo and Hispanic subjects frame privacy issues differently associated with use of biometric technology in a fire ground accountability system. Finally, the study showed that some privacy concerns such as distrust and perceived vulnerability can be alleviated through system use with changes in post-use privacy concerns moderated by ethnic affiliation.  相似文献   

7.
陆康  刘慧  任贝贝  杜健 《现代情报》2021,40(10):93-103
[目的/意义] 数字图书馆逐渐向智慧图书馆转变。图书馆数据的收集、分析等数据使用行为不断被实践,并对业务管理与服务创新做出一定的贡献。然而,涉及用户隐私敏感数据的使用可能会带来安全方面的问题。[方法/过程] 本文在分析传统的图书馆数据挖掘方法基础上,尝试引用PPDM(Privacy-Preserving Data Mining)的数据泛化、清洗、屏蔽、扭曲等方法,将数据挖掘与业务需求相融合,并以用户数据规范化使用为目标,探索智慧服务背景下用户隐私保护机制,构建业务实施与数据保护融合的可行性方案。[结果/结论] 智慧图书馆数据收集、数据发布、数据共享、数据汇聚都可以借鉴PPDM方法对用户隐私数据加以保护。智慧图书馆只有紧密联系技术创新才能够保障服务创新,从而促进智慧图书馆事业的发展。  相似文献   

8.
石进  南霞  刘千里 《现代情报》2019,39(6):111-119
[目的/意义]随着电子政务的发展,政府部门协作日趋频繁,政务数据共享成为必然趋势。传统的政务数据共享方式主要基于统一的数据中心,然而这种模式未能充分考虑部门权限、安全性等因素,使得政务数据共享仍然困难重重。[方法/过程]本文提出了一种基于总线结构的政务数据共享应用模型,模型使用统一的数据、接口、资源目录标准以及自主访问控制和权限管理模型,以期为政务数据共享提供支持。[结果/结论]相对传统的政务数据共享模型,该模型灵活的权限管理和统一的标准既可以较好地保障数据安全又能防止利益冲突造成的信息壁垒,同时又可以大大降低共享的资金、人力和时间成本。  相似文献   

9.
[目的/意义]大数据时代,美国情报机构监视恐怖嫌疑分子数据作为维护美国国家安全的重要方面,效果显著。然而,实践中出现"国家安全"和"个人数据安全""个人隐私权"相冲突的问题,对之研究具有重要的镜鉴价值。[方法/过程]以美国《涉外情报监控法》第702条为研究样本,实证分析了个人隐私被侵犯的原因,如即情报搜集工作监督不严、问责不力等。规范分析了平衡"国家安全"和"个人数据安全""个人隐私权"之间的法律对策。[结果/结论]研究认为,设立情报监督机构,规制数据使用目的和范围,加大问责力度是平衡国家安全和公民个人数据隐私权的积极面向。  相似文献   

10.
黄丽佳  袁勤俭 《现代情报》2017,37(10):114-121
通过对相关文献的回顾,本文对国际网络隐私研究进行了计量分析,发现现有的研究主题集中在"基于移动位置服务的隐私问题研究"、"隐私保护算法研究"、"隐私保护技术研究"、"云计算的隐私安全研究"、"网络隐私权限控制研究"、"社交网站和电子商务中的用户隐私态度与行为研究"、"青少年敏感信息的隐私与安全保护研究"、"数据公开共享策略与国家治理研究"8个方面。研究发现当前研究中存在"利用数据纵向分析网络隐私主题随时间发展变化的研究较少"、"对于一些发展中国家的隐私问题关注度较低"、"国家的治理与业界的隐私政策相对独立缺乏联系"等问题,"大数据时代移动信息和社交信息挖掘过程中的隐私问题"、"在线医疗的隐私问题"等是未来研究值得关注的领域。  相似文献   

11.
随着我国互联网的高速发展,数据挖掘技术尤其是Web挖掘作为企业搜寻商业信息为客户提供个性化服务的重要手段,不可避免地触到隐私保护这块"雷区"。隐私权保护在网络环境下既是法律界同时也是电子商务研究的热点话题。隐私保护限制了web挖掘数据中数据的搜集及知识的共享和传播,如何在web挖掘和隐私保护之间进行权衡是文章研究的出发点。结合我国网络隐私权保护的现状,通过对隐私权的内容及可能造成侵权形式的研究,探讨了隐私保护面临的挑战,提出了隐私权保护的解决方案框架。  相似文献   

12.
Abuse of information entrusted to organizations can result in a variety of privacy violations and trust concerns for consumers. In the event of violations, a social media brand or organization renders an apology – a form of social account – to alleviate users’ concerns and maintain user membership and engagement with the platform. To explore the link between apology offered by a social media brand or organization and the users’ trust dynamics in the brand’s services, we study how organizational integrity can contribute to reducing individuals’ privacy concerns whiles increasing or repairing their trust. Drawing on organizational behavioral integrity literature, our proposed research model suggests that the persuasiveness of an apology following a data breach affects users’ trust or spillover trust through their perceptions of the degree of alignment between the words in the apology and the actions of the violating entity. Based on a survey of Facebook users, our findings show that persuasiveness of an apology has a significant impact on users’ perceptions of the alignment between the social media brand’s (i.e. Facebook) words and subsequent actions. These perceptions impact social media brand trust (i.e. users’ trust in Facebook and allied services such as Instagram). We also find that, post data breach incidence, while integrity of the social media organization partially mediates the relationship between persuasive apology and users’ trust, it fully mediates the relationship between the persuasive apology and the privacy concerns expressed by the users. However, users’ privacy concerns do not contribute much to the repair of trust needed to maintain their membership.  相似文献   

13.
14.
以利益相关者理论为视角,对我国转基因技术应用中利益相关者进行界定,并系统分析政府、生物科技公司、转基因产品的生产者和销售者、转基因作物种植农民、消费者、科学家和社会组织间的利益关系,最后对如何协调和平衡利益相关者的利益关系提出建议。  相似文献   

15.
《Research Policy》2022,51(3):104470
Previous research has analyzed the effect of stakeholder orientation on the amount of technological investment firms make but has ignored its effect on the characteristics of that investment. To address this gap, we explored the impact of stakeholder orientation on the degree of generality of a firm's technological investment. More general technologies (i.e., technologies easily deployable in a wider range of industries) are more likely to promote major changes in the firm's scope. However, these changes undermine the value of stakeholders’ past relationship-specific investments, which are tailored to a certain firm scope. Therefore, more stakeholder-oriented firms will invest in less general technological assets to reduce stakeholder concerns and opposition. This negative effect will be stronger in more uncertain industries, where stakeholders are more concerned that firms might use technology generality to change their scope following the realization of previously unforeseen contingencies. However, it will be weaker in more competitive industries, where stakeholders tend to make less relationship-specific investments and are less concerned with changes in firm scope triggered by an increase in technology generality. We test our hypotheses by exploiting the enactment of constituency statutes in 34 U.S. states during the period 1976–2000 as a plausibly exogenous variation in firms’ stakeholder orientation.  相似文献   

16.
Corruption has emerged as a well-debated subject against the backdrop of electronic government (e-government). While e-government has attained a level of sophistication in leading countries, there are countries for which going digital remains comparatively new on their national schedules. Their struggle and lag in reaching maturity in e-government can be attributed to corruption, which is an infamous issue prevalent across the globe and argued to impede technological innovation. Despite such a possibility, there is a paucity of research examining the “corruption–e-government” linkage. This study, hence, adopts the institutional perspective for conceptualizing corruption and seeks to understand the relationship of corruption in basic national institutions and national stakeholder service systems with e-government maturity. Specifically, by grounding the discussion on the agency theory, the rent-seeking theory, and the perspective of institutions as structures of cooperation and power, this study analyses the moderating influence of corruption in a national stakeholder service system (i.e., business systems) on the relationship of corruption in three basic national institutions (i.e., political, legal, and media) with e-government maturity in a country. The hypothesized relationships are empirically validated using a panel data of 94 countries, and the findings confirm that political corruption, legal corruption, and business-systems corruption in a country play vital roles in influencing its e-government maturity. Implications of our results to research and practice are discussed.  相似文献   

17.
统计量化规则(SQ rule)在数据挖掘中拥有重要和有用的地位。尽管集中式挖掘SQ规则的算法已经存在,但是集中式算法不能简单应用到分布式环境中,尤其涉及到分布式环境中各方的私有信息保护的时候。考虑数据分布共享的多方,在不泄漏各自的私有信息的情况下,合作完成SQ规则的挖掘问题。该问题属于保护私有信息的数据挖掘(PPDM)研究领域的问题。基于3个PPDM的基本工具,包括安全求和、安全求平均和安全求频繁项集的集合等,提交2个算法,共同完成水平划分数据下的保护私有信息的SQ规则挖掘。其中,一个算法安全计算置信区间,该区间用来检验规则的重要性;另一个算法安全挖掘规则。最后,给出算法的正确性、安全性和复杂性分析。  相似文献   

18.
In privacy information security literature, Privacy by Design (PbD) is recognized as a positive protection paradigm capable of providing higher privacy protection throughout information products’ entire lifetime. It is becoming the dominant privacy protection pattern. Considered to be a promising development tendency towards the information industry, it is garnering interest among researchers and professionals. However, PbD still lacks specific implementation instructions, and it is not popularized among information system engineers. Weighing the pros and cons leads to information system engineers’ uncertainty regarding PbD adoption, since existing research on the linkage between PbD implementation and information system engineers’ individual factors is inconclusive. Through the lenses of information system engineers, this study aims to advance implementation of PbD by exploring the influence factors of individual and organizational contexts. Real data from 253 practitioners in China’s IT industry were used to understand the antecedent of PbD implementation and interaction effects among different dimensions of engineers’ adopting behaviors. The findings have demonstrated that appropriate incentive mechanism is a critical factor in PbD implementation by promoting engineer’s social influence regarding PbD usage and further affecting both their intentions about adopting PbD and implementing action. This study reveals, for the first time, the role of incentive mechanism in advancing PbD implementation from the information system engineer perspective, and contributes to a deeper understanding of the determinants of PbD adoption by providing a holistic theoretical lens. The findings provide theoretical guidance to IT organizations with guidelines on PbD implementation for higher privacy information protection performance of products.  相似文献   

19.
KDD, data mining, and the challenge for normative privacy   总被引:3,自引:1,他引:2  
The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.  相似文献   

20.
Requesting personal information in frontline service encounters raises privacy concerns among customers. The proximity contact tracing that occurred during the COVID-19 pandemic provides an intriguing context of information requests. Hospitality venues required contact tracing details from customers, and customer cooperation varied with concerns about privacy. Drawing on gossip theory, we investigate the roles of businesses’ data privacy practices and government support in driving customers’ responses to contact tracing. Our findings show that perceived transparency of a business’s privacy practices has a positive effect on customers’ commitment to the business, while perceived control exerts a negative effect on commitment. These effects are mediated by customers’ information falsification rather than disclosure, because the former is a sensitive behavioral indicator of privacy concerns. The results also reveal the moderating roles of government support. This research contributes to the customer data privacy literature by demonstrating the distinct effects of perceived transparency and control on commitment and revealing the underlying mechanism. Moreover, the research extends the conceptual understanding of privacy practices from online contexts to face-to-face contexts of frontline service. The findings offer implications for the management of customer data privacy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号