User Perceptions Email users , expect - ing privacy , risk embarassment , law - suits , and worse . of Email Privacy Managing

نویسنده

  • Bruce A. Reinig
چکیده

Why do email users perceive their communications to be private when email provides virtually no safeguards against privacy violations? The ethical and legal controversies regarding email are increasingly debated by computer professionals, philosophers, politicians, journalists, and legal experts. Much of the debate focuses on employee expectations of privacy in their communications and their employers’ need to control and monitor the flow of information in the workplace. In most organizations, employees reasonably expect their communications to be private. They expect that a conversation in an office with the door closed is private; they expect that a letter in a sealed envelope will not be opened by those not authorized to do so. Telephone conversations are also typically perceived as private—unless callers are told the phone is being monitored. But email messages are not private. Managers can legally intercept, monitor, and read employees’ email [19, 23]. So why the perception of privacy? Is it because users view email in the same way they view a sealed letter? Or are they naive about computer technology? Have managers adopted explicit email policies informing employees their email can be monitored User Perceptions

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quandary What should con - scientious employees and their ethical employers expect ? It ’ s hard to say . of Email Privacy

The controversial nature of these areas demands that employers and employees, as well as those with whom they interact—consultants, information service support personnel, suppliers, and customers—be aware of, and responsive to, expectations of and concerns about privacy. Users and organizations naive about ethical conduct and the legal parameters concerning email privacy are vulnerable to harm ...

متن کامل

Privacy Risk Assessment on Email Tracking

Today’s online marketing industry has widely employed email tracking techniques, such as embedding a tiny tracking pixel, to track email opens of potential customers and measure marketing effectiveness. However, email tracking could allow miscreants to collect metadata information associated with email reading without user awareness and then leverage the information for stealthy surveillance, w...

متن کامل

An Investigation into User Perceptions of Privacy and Trust and their Real-World Practices

Internet security is a well-researched and understood topic. However, the concept of online privacy is a less well-defined issue, particularly with the advent of mass email and social networking interactions. This paper presents results from a user survey to determine perceptions of privacy and trust in online environments. Results suggest that users have oftencontradictory views of their priva...

متن کامل

Analysis the privacy statement of the American Public Libraries and provide privacy statement for public libraries in Iran

Aim: The purpose of this study was to review the privacy statement of the American top public libraries and provide privacy statement for users of public libraries in Iran. Method: The research method is a combination of descriptive survey and Delphi library. The research community consisted of 25 American public libraries based on the rankings of the American Library Association's libraries. T...

متن کامل

Privacy Risk Perceptions and Privacy Protection Strategies

Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies? On the basis of a large scale survey amongst Dutch students, this paper explores the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997