People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our ...private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he explains the moral importance of virtual identities and offers an ethically robust solution to design surveillance technologies. This book should be read by anyone interested in surveillance technology, new information technology more generally, and social concepts like privacy and property.
Personal information management (PIM) on digital platforms requires multiple practices of saving, organizing and retrieving information. This exploratory study offers a new perspective on PIM ...practices and focuses on the gaps between their actual and ideal use. Data were collected from 465 participants, 114 males and 351 females, who filled in a questionnaire that we developed and validated for 25 PIM practices. Findings showed significant gaps between actual and ideal usage for 22 out of 25 practices. These gaps were mostly positive, revealing that participants wished to use more practices than they actually did and were not satisfied with their PIM behavior. They were larger for women, and we also found age differences. Larger gaps could be associated with negative feelings and a sense of low efficacy in managing personal information. We offer various explanations of the gaps and suggest implications for consumer training and platform design.
•New perspective on gaps between actual and ideal PIM behavior.•Questionnaire including a set of 25 PIM practices built and validated.•Significant gaps are found between actual and ideal PIM use of PIM practices.•Gaps are larger for women and change with age.•Negative feelings caused by large gaps should be addressed in platform design.
The compilation of reference documents for the thesis can be collected in large numbers. Documents collected in large numbers that not accompanied by good document management can cause "Messy Work ...Environment". PIM (Personal Information Management) can be used in the management of thesis reference documents. This study used a R&D method. The research data collection technique used semi-structured interviews. Information selected using purposive sampling technique, based on this technique obtained ten information status as students of the State University of Malang who are currently working on their thesis. Data analysis techniques using qualitative data analysis techniques from Miles and Huberman. From the research conducted, it can be seen that some of the main points in each PIM process belong to information such as brief considerations in selecting documents to be stored, using storage methods, and using search and search through search engines as strategies to return to documents.
In higher education, professional online identities have become increasingly important. A rightly worded tweet can cause an academic blog post to go viral. A wrongly worded tweet can get a professor ...fired. Regular news items in The Chronicle of Higher Education and Inside Higher Ed provide evidence that reputations are both built and crushed via online platforms. Ironically, given the importance of digital identities to job searches, the promotion and distribution of scholarly work, pedagogical innovation, and many other components of an academic life, higher education professionals receive little to no training about how to best represent themselves in a digital space. Managing Your Professional Identity Online: A Guide for Higher Education fills this gap by offering higher education professionals the information and guidance they need to:- craft strong online biographical statements for a range of platforms;- prioritize where and how they want to represent themselves online in a professional capacity;- intentionally and purposefully create an effective brand for their professional identity online;- develop online profiles that are consistent, professional, accurate, organized, of good quality, and representative of their academic lives;- regularly update and maintain an online presence;- post appropriately in a range of online platforms and environments; and-successfully promote their professional accomplishments. Managing Your Professional Identity Online is practical and action-oriented. In addition to offering a range of case studies demonstrating concrete examples of effective practices, the book is built around activities, templates, worksheets, rubrics, and bonus materials that walk readers through a step-by-step guide of how to design, build, and maintain professional online identities.
Edina Harbinja examines the theoretical, technological and doctrinal issues surrounding online death and digital assets. By examining different areas of law, humanities and social science, she ...proposes the new concept of postmortal privacy (privacy of the deceased individuals) and provides answers and suggestions as to what happens to digital assets and online identity after death. Case studies draw on the transmission of emails, online games such as World of Warcraft and social networks to examine the legal issues surrounding these most prominent and widely used types of assets. Aspects of property, intellectual property, contract, succession and probate, privacy and data protection, jurisdiction and criminal law are considered. Harbinja puts forward policy suggestions, proposals for law reforms and sets out an innovative agenda which will open new avenues for research. Her useful consideration of current digital legacy tools and technologies also offers practical advice for users when it comes to their own estate planning.
Increasing quantities of information about our health, bodies, and biological relationships are being generated by health technologies, research, and surveillance. This escalation presents challenges ...to us all when it comes to deciding how to manage this information and what should be disclosed to the very people it describes. This book establishes the ethical imperative to take seriously the potential impacts on our identities of encountering bioinformation about ourselves. Emily Postan argues that identity interests in accessing personal bioinformation are currently under-protected in law and often linked to problematic bio-essentialist assumptions. Drawing on a picture of identity constructed through embodied self-narratives, and examples of people's encounters with diverse kinds of information, Postan addresses these gaps. This book provides a robust account of the source, scope, and ethical significance of our identity-related interests in accessing – and not accessing – bioinformation about ourselves, and the need for disclosure practices to respond appropriately. This title is also available as Open Access on Cambridge Core.
This article presents findings from interviews with 18 writers and artists in New Zealand, whose lives and work have potential heritage value. The objective was to investigate the perceived value of ...participants’ personal collections, the relevant management practices and challenges, and their potential effects on preservation and (re)use. The findings provide a characterisation of the personal information management (PIM) practices of writers and artists, revealed challenges common to organising personal collections across time and devices as well as those caused or increased by the nature of writers’ and artists’ work, and produce insights into the impact of perceived collection value and PIM practices on future access, preservation and (re)use of such collections.
The following contribution aims to provide concluding remarks on the special issue on "Open Science and Data Protection". Following some general introductory considerations, the paper will first ...focus on scientific research and the GDPR: within that framework, it will address (i) the legal basis for the processing of personal data for scientific research purposes and in particular (ii) consent as a legal basis in research. The contribution continues by addressing the use of Open Data for the public benefit and secondary use of health data more generally. It concludes by looking at the future, in particular at European initiatives, such as the forthcoming European Health Data Space (EHDS) and its objective to enhance data sharing, ensure compliance with the data protection regulatory framework and safeguard the freedoms and rights of individuals.
•Seven affective aspects included in a theoretical framework describing the affective experience accompanying PIM.•Questionnaire including 33 statements of the affective aspects built and ...validated.•Affective experience is complex and intense, characterized by anxiety and frustration, but also by high efficacy and low desperation.•Affective experience was more intense for women, increased with the number of PIM platforms used, and decreased with age.•Principles for designing affective-sensitive platforms for PIM are suggested.
In this study, we proposed and examined a theoretical framework for affective interactions with personal information management (PIM). Based on the literature, we identified seven salient affective aspects of PIM: anxiety, efficacy, frustration, desperation, belonging, dependence and loss of control. We examined their frequencies and identified individual differences for age, gender and the number of platforms people use to manage their personal information. Data were collected from 465 participants who filled in a questionnaire built and validated by the researchers. Findings revealed a complex and intense affective experience accompanying PIM that is characterized by anxiety and frustration on the one hand but by a sense of high efficacy and little desperation on the other. The affective experience was more intense for female participants, was correlated with the number of PIM platforms used and decreased with age. We offer various explanations of these findings and suggest implications for future research and platform design.
The social and psychological characteristics of individuals who hoard physical items are quite well understood, however very little is known about the psychological characteristics of those who hoard ...digital items and the kinds of material they hoard. In this study, we designed a new questionnaire (Digital Behaviours Questionnaire: DBQ) comprising 2 sections: the Digital Hoarding Questionnaire (DHQ) assessing two key components of physical hoarding (accumulation and difficulty discarding); and the second measuring the extent of digital hoarding in the workplace (Digital Behaviours in the Workplace Questionnaire: DBWQ). In an initial study comprising 424 adults we established the psychometric properties of the questionnaires. In a second study, we presented revised versions of the questionnaires to a new sample of 203 adults, and confirmed their validity and reliability. Both samples revealed that digital hoarding was common (with emails being the most commonly hoarded items) and that hoarding behaviours at work could be predicted by the 10 item DHQ. Digital hoarding was significantly higher in employees who identified as having ‘data protection responsibilities’, suggesting that the problem may be influenced by working practices. In sum, we have validated a new psychometric measure to assess digital hoarding, documented some of its psychological characteristics, and shown that it can predict digital hoarding in the workplace.
•We designed a new questionnaire to measure digital hoarding behaviours.•In two large samples we validated the questionnaire.•Digital hoarding is common and partly reflects the job demands associated with data protection.•Digital hoarding is associated with characteristics of physical hoarding.