Technologies can change our moral beliefs and practices. They can change both how we perceive and understand what is good and worth pursuing and what is right and worth doing. A classic example is ...the debate about technology and the value of privacy. Some argue that the prevalence of surveillance technology, combined with the allure of convenient digital services, has rendered this value close to obsolete. (A classic text on this would be 1 . A more recent one would be 2 .) Others think that the technological pressure placed on the value of privacy means that it is more precious than ever and that we must do everything we can to preserve it (for example, 3 ).
Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online ...services. To obtain a comprehensive understanding of online privacy, we review established approaches, distill a unified list of 15 privacy attributes and rank them based on perceived importance by users and privacy experts. We then discuss similarities, explain notable differences, and examine trends in terms of the attributes covered. Finally, we show how our results provide a foundation for user-centric privacy visualizations, inspire best practices for developers, and give structure to privacy policies.
This meta‐analysis investigates privacy concerns and literacy as predictors of use of online services and social network sites (SNSs), sharing information, and adoption of privacy protective ...measures. A total of 166 studies from 34 countries (n = 75,269) were included in the analysis. In line with the premise of privacy paradox, privacy concerns did not predict SNS use. However, users concerned about privacy were less likely to use online services and share information and were more likely to utilize privacy protective measures. Except for information sharing, the relationships were comparable for intentions and behavior. Analyses also confirm the role that privacy literacy plays in enhancing use of privacy protective measures. The findings can be generalized across gender, cultural orientation, and national legal systems.
The art of data privacy Bowen, Claire McKay
Significance (Oxford, England),
February 2022, 2022-02-01, 20220201, Volume:
19, Issue:
1
Journal Article
Open access
Statistics are vital for understanding society, but they can pose a risk to the privacy of individuals who contribute their data. Claire McKay Bowen illustrates some of the methods used to minimise ...that risk – with the aid of a famous artwork
Statistics are vital for understanding society, but they can pose a risk to the privacy of individuals who contribute their data. Claire McKay Bowen illustrates some of the methods used to minimise that risk — with the aid of a famous artwork.
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to ...modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
Three Control Views on Privacy Menges, Leonhard
Social theory and practice,
10/2022, Volume:
48, Issue:
4
Journal Article
Peer reviewed
Open access
This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will ...be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.