首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
ABSTRACT

Higher education institutions have started using big data analytics tools. By gathering information about students as they navigate information systems, learning analytics employs techniques to understand student behaviors and to improve instructional, curricular, and support resources and learning environments. However, learning analytics presents important moral and policy issues surrounding student privacy. We argue that there are five crucial questions about student privacy that we must address in order to ensure that whatever the laudable goals and gains of learning analytics, they are commensurate with respecting students' privacy and associated rights, including (but not limited to) autonomy interests. We address information access concerns, the intrusive nature of information-gathering practices, whether or not learning analytics is justified given the potential distribution of consequences and benefits, and issues related to student autonomy. Finally, we question whether learning analytics advances the aims of higher education or runs counter to those goals.  相似文献   

2.

As federal agencies move toward more sophisticated e-govern- ment offerings, they must consider both policy and operational requirements for electronic authentication (e-authentication). One important consideration in designing and deploying e-authentica- tion solutions is the balance between access, security, authentication, and privacy. Public law and government-wide policy encourage e-government and e-authentication simultaneously with privacy protection, creating policy and operational tensions for e-government efforts. A review of the relevant laws and policies and analyses of the privacy implications of authentication technologies indicates that federal agencies have at least two analytic frameworks for balancing privacy concerns with e-authentication. A framework offered in the 2003 National Research Council report Who Goes There? and the privacy impact analysis requirements of the E-Government Act of 2002 provide e-government projects with the tools for navigating the path between privacy and openness, required by both e-government law and policy.  相似文献   

3.
Check-in services (CISs) are a highly relevant part of location-based services that provide customer value greater than other mobile services due to their technical possibilities; conversely, CISs also create various risks to privacy, as they enable the continuous live tracking of users. We investigate these risks and develop a third-order privacy risk construct based on communication privacy management (CPM) theory to explain how a set of concerns violates privacy boundary mechanisms and generates perceived privacy risk. A developmental mixed-method design is used to qualitatively derive the construct qualitatively through 20 interviews and evaluate it quantitatively using a privacy calculus model with structural equation modelling (N = 431). The results confirm the third-order privacy risk construct and reveal new underlying concerns that create this risk. The results of this study are useful for both practitioners and academics, as they provide insights into how context-specific privacy concerns emerge in advanced mobile services, such as CISs.  相似文献   

4.
We examine three possible explanations for differences in Internet privacy concerns revealed by national regulation: (1) These differences reflect and are related to differences in cultural values described by other research; (2) these differences reflect differences in Internet experience; or (3) they reflect differences in the desires of political institutions without reflecting underlying differences in privacy preferences. Using a sample of Internet users from 38 countries matched against the Internet population of the United States, we find support for (1) and (2), suggesting the need for localized privacy policies. Privacy concerns decline with Internet experience. Controlling for experience, cultural values were associated with differences in privacy concerns. These cultural differences are mediated by regulatory differences, although new cultural differences emerge when differences in regulation are harmonized. Differences in regulation reflect but also shape country differences. Consumers in countries with sectoral regulation have less desire for more privacy regulation.  相似文献   

5.
In light of mounting privacy concerns over the increasing collection and use of biometric and behavioral information for travel facilitation, this study examines travelers’ online privacy concerns (TOPC) and its impact on willingness to share data with travel providers. A proposed theoretical model explaining antecedents and outcomes of TOPC related to biometric and behavioral data sharing was tested using structural equation modeling with data collected from 685 travelers. The results extend the Antecedents – Privacy Concerns – Outcomes (APCO) framework by identifying a set of salient individual factors that shape TOPC. The findings provide empirical evidence confirming the context dependence of privacy preferences, showing that although travelers are concerned over their information privacy they are still willing to share their behavioral data; while in the case of biometric information, the disclosure decision is dependent upon expected benefits rather than privacy concerns. This study offers insights into privacy behavior of online consumers in the travel context and constitutes one of the few focusing on the social aspects of biometric authentication.  相似文献   

6.
We examine three possible explanations for differences in Internet privacy concerns revealed by national regulation: (1) These differences reflect and are related to differences in cultural values described by other research; (2) these differences reflect differences in Internet experience; or (3) they reflect differences in the desires of political institutions without reflecting underlying differences in privacy preferences. Using a sample of Internet users from 38 countries matched against the Internet population of the United States, we find support for (1) and (2), suggesting the need for localized privacy policies. Privacy concerns decline with Internet experience. Controlling for experience, cultural values were associated with differences in privacy concerns. These cultural differences are mediated by regulatory differences, although new cultural differences emerge when differences in regulation are harmonized. Differences in regulation reflect but also shape country differences. Consumers in countries with sectoral regulation have less desire for more privacy regulation.  相似文献   

7.
[目的/意义]用户的微信使用行为,涉及使用动机、隐私关注和隐私行为三个问题,研究目的在于探讨三者之间的关系。[方法/过程]以隐私关注为中介变量,使用动机为前因变量,隐私行为为结果变量,构建用户使用微信的APCO模型,设计量表,测度微信用户对这三个变量的认知,进行相关性分析与回归分析,探讨三者之间的联系。[结果/结论]结果表明,使用动机与隐私关注整体上相关性较弱,但其中的关系保持和信息搜寻动机对隐私关注存在正向影响;隐私关注对隐私行为中的隐私保护存在正向影响,但在使用动机与自我披露之间的中介作用并不显著;使用动机中的关系建立对隐私行为中的自我披露具有显著正向作用。  相似文献   

8.
Abstract

This paper summarizes the concept of privacy, reviews some of its underlying tenets and axioms, illustrates the drift toward a national counterprivacy posture in terms of events involving the Social Security number (SSN), and discusses new faces in terms of three case histories: the California action to require SSNs on driver's licenses, the effort by telephone companies to introduce calling number identification, and the aggregation of public records into dossier databases. Remedial actions by government and legislators are suggested.  相似文献   

9.
[目的/意义]社交网络已广泛渗入到人们的日常生活中,用户对所提供个人数据的隐私关注一直存在,但却依然持续使用社交网络,需要解析产生这种现象的原因。[方法/过程]运用社会影响理论,通过解析用户使用社交网络的隐私成本(即隐私关注)和隐私收益(即行为诱导:人际关系管理,自我展示,主观规范),建立隐私权衡模型,分析用户的隐私权衡行为,寻找隐私关注困扰下用户持续使用社交网络的动机。[结果/结论]用户提供个人数据并持续使用社交网络的动机并非是忽略了隐私关注,而是行为诱导(包括人际关系管理和自我展示)的正面影响超过隐私关注的负面影响。  相似文献   

10.
KDD, data mining, and the challenge for normative privacy   总被引:3,自引:1,他引:2  
The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.  相似文献   

11.
Biometric technology is rapidly gaining popularity as an access control mechanism in the workplace. In some instances, systems relying on biometric technology for access control have not been well received by employees. One potential reason for resistance may be perceived privacy issues associated with organizational collection and use of biometric data. This research draws on previous organizational information handling and procedural fairness literature to frame and examine these underlying privacy issues. Perceived accountability, perceived vulnerability, and distrust were distilled from the previous literature as the primary dimensions of employee privacy concerns related to biometric technology. This study assesses the effects of these privacy concerns, how they vary based on the cultural influences of Anglos and Hispanics.Fire ground accountability is a critical management objective in the firefighting domain. In multi-unit or multi-agency crisis response scenarios, the on-scene incident commander tracks and accounts for each first responder. This research designed and deployed a new fire ground accountability system that tracked firefighters through finger pattern-based biometric logins to their assigned positions on the firefighting apparatus. An instrument measuring level of privacy concern on three underlying dimensions and demographic data was developed, validated and administered in a quasi-experimental field study. A pre-test–post-test survey methodology was employed to detect potential differences in privacy concerns as familiarity with the system increased. The study shows that Anglo and Hispanic subjects frame privacy issues differently associated with use of biometric technology in a fire ground accountability system. Finally, the study showed that some privacy concerns such as distrust and perceived vulnerability can be alleviated through system use with changes in post-use privacy concerns moderated by ethnic affiliation.  相似文献   

12.
Government agencies often face trade-offs in developing initiatives that address a public good given competing concerns of various constituent groups. Efforts to construct data warehouses that enable data mining of citizens’ personal information obtained from other organizations (including sister agencies) create a complex challenge, since privacy concerns may vary across constituent groups whose priorities diverge from agencies’ e-government goals. In addition to privacy concerns, participating government agencies’ priorities related to the use of the information may also be in conflict. This article reports on a case study of the Integrated Non-Filer Compliance System used by the California Franchise Tax Board for which data are collected from federal, state, and municipal agencies and other organizations in a data mining application that aims to identify residents who under-report income or fail to file tax returns. This system pitted the public good (ensuring owed taxes are paid) against citizen concerns about privacy. Drawing on stakeholder theory, the authors propose a typology of four stakeholder groups (data controllers, data subjects, data providers, and secondary stakeholders) to address privacy concerns and argue that by ensuring procedural fairness for the data subjects, agencies can reduce some barriers that impede the successful adoption of e-government applications and policies. The article concludes that data controllers can reduce adoption and implementation barriers when e-government data mining applications rely on data shared across organizational boundaries: identify legitimate stakeholders and their concerns prior to implementation; enact procedures to ensure procedural fairness when data are captured, shared, and used; explain to each constituency how the data mining application helps to ensure distributive fairness; and continue to gauge stakeholders’ responses and ongoing concerns as long as the application is in use.  相似文献   

13.
朱侯  张明鑫 《情报科学》2021,39(7):54-62
【目的/意义】在APP隐私泄露问题日趋严峻的环境下,移动应用提供的隐私设置功能为用户保护自身的隐 私信息提供了一种重要的途径,了解哪些因素会影响以及如何影响移动应用APP用户的隐私设置行为,有利于加 强用户个人隐私保护和改进隐私设置功能。【方法/过程】本研究基于保护动机理论与社会认知理论的基本思想,提 出七个条件变量并采用问卷调查法搜集数据,然后使用模糊集定性比较分析法对条件变量与用户隐私设置行为结 果变量之间的多元因果路径进行分析。【结果/结论】用户主体因素(感知风险、感知隐私控制、隐私关注和行为效 益)是用户隐私设置行为产生的必要条件;同时,用户隐私设置行为的条件组合路径包括了政策保障缺失型和隐私 泄露负面经历驱动型等五条不同路径。【创新/局限】研究问题和研究思路具有一定创新性,例如关注移动APP用户 隐私信息设置行为及其多元因果路径关系,但是也存在着研究变量数量较少,样本抽样方法值得改进等不足。  相似文献   

14.
Consumers can conduct mobile commerce via their smartphones. They can search for products and when ready, they pay and have the products delivered to their homes. By sharing personal information, they receive faster and more customized service. Because of the risk of loss of privacy, consumers need to balance their privacy concerns against the perceived value of enhanced mobile commerce. In this empirical study, the unified theory of acceptance and use of technology (UTAUT2) is modified where perceived value replaces price value to represent the value of an IT artifact that has no direct costs attributable to it. The framework is extended to include constructs from the privacy calculus. In addition, the construct of personal innovativeness is added as a moderator with the anticipation that owners of smartphones who are more personally innovative will be more willing to share information. From an empirical study of Canadian smartphone owners, the results show that perceived privacy concerns influence perceived value and that intention to use is significantly influenced by hedonic motivation and perceived value.  相似文献   

15.
吕璐 《情报探索》2014,(12):22-25
从政府信息公开的视角探析隐私权的涵义、特征、内容及其与知情权的关系。认为政府信息公开中对隐私权管理具有行政性、公权和私权冲突交叉、需要多种法律协调等特点。从知政权与隐私权、社会信息知情权与隐私权、隐私权保护的统一与均衡、法定知情权与隐私权等4个方面,探讨如何平衡知情权与隐私权的关系,提出应根据社会政治及公共利益、利益衡量、宽容协调、人格尊严等4项原则来协调,以实现二者的和谐。  相似文献   

16.
In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy. This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information can violate privacy but does not call for consent.  相似文献   

17.
IntroductionGeneral Data Protection Regulation (GDPR) focuses on important elements of data ethics, including protecting people’s privacy, accountability and transparency. According to the GDPR, certain public institutions are obliged to appoint a Data Protection Officer (DPO). However, there is little publicly available data from national EU surveys on DPOs. This study aimed to examine the scope of work, type of work, and education of DPOs in institutions in Croatia.Materials and methodsDuring 2020-2021, this cross-sectional study surveyed DPOs appointed in Croatia. The survey had 35 items. The questions referred to their appointment, work methods, number and type of cases handled by DPOs, the sources of information they use, their experience and education, level of work independence, contacts with ethics committees, problems experienced, knowledge, suggestions for improvement of their work, changes caused by the GDPR, and sociodemographic information.ResultsOut of 5671 invited DPOs, 732 (13%) participated in the study. The majority (91%) indicated that they could perform their job independently; they did not have prior experience in data protection before being appointed as DPOs (54%) and that they need additional education in data protection (82%).ConclusionsMost DPOs indicated that they had none or minimal prior experience in data protection when they were appointed as DPO, that they would benefit from further education on data protection, and exhibited insufficient knowledge on basic concepts of personal data protection. Requirements for DPO appointments should be clarified; mandatory education and certification of DPOs could be introduced and DPOs encouraged to engage in continuous education.  相似文献   

18.
Abstract

“At present, the majority of [radio] programs heard are from sources outside of Canada. It has been emphasized to us that the continued reception of these has a tendency to mold the minds of the young people in the home to ideals and opinions that are not Canadian. In a country of the vast geographical dimensions of Canada, braodcasting will undoubtedly become a great force in fostering national spirit and in interpreting national citizenship.”1

This statement, written fifty years ago, could just as well have been written today. But, while the basic issue has remained unchanged over time, the uses to which information and communications can be put have steadily grown. The scope of the issue has also therefore increased.

Included under the heading of communications and information today are such diverse but interconnected matters as broadcasting both by TV and radio, the newspaper, magazine, and book publishing industries, the film industry, advertising, computers and all computer communications, telephone and telecommunications, communications satellites, remote sensing, and, to a point, industrial know‐how and research and development.

In this paper, I shall examine how communications and information affect such issues as Canadian unity, Canadian cultural identity, and Canadian economic viability. I shall concentrate on how Canadian governments have seen this issue, and, to a lesser degree, will show where the views of individuals and other interest groups may differ from government policy.  相似文献   

19.
Suppose we have a group of n people, each possessing an item of information not known to any of the others and that during each unit of time each person can send all of the information he knows to at most other people. Further suppose that each of at most k other people can send all of the information they know to him. Determine the length of time required, f(n, k), so that all n people know all of the information. We show f(n, k) = ?logk+1n?.We define g(n, k) analogously except that no person may both send and receive information during a unit time period. We show ?logk+1n?≤g(n, k)≤2?logk+1n? in general and further show that the upper bound can be significantly improvea in the cases k = 1 or 2. We conjecture g(n, k) = bk logk+1n+0(1) for a function bk we determine.  相似文献   

20.
Informational privacy, data mining, and the Internet   总被引:3,自引:2,他引:1  
Privacy concerns involving data mining are examined in terms of four questions: (1) What exactly is data mining? (2) How does data mining raise concerns for personal privacy? (3) How do privacy concerns raised by data mining differ from those concerns introduced by ‘traditional’ information-retrieval techniques in computer databases? (4) How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from ‘data warehouses?’ It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that (a) go beyond concerns introduced in traditional information-retrieval techniques in computer databases and (b) are not covered by present data-protection guidelines and privacy laws.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号