Without Permission: Privacy on the Line
نویسندگان
چکیده
Considerable research shows that personal information privacy has eroded over the last 30 years. Prior research, however, takes a consumer-centric view of personal information privacy, a view that leads to the conclusion that the individual is responsible for his/her own information. This research presents and defends a comprehensive personal information privacy model of extra-organizational data sharing, leakages, and transgressions of data that incorporates how data are actually passed and leaked to organizations of whom the consumer has no knowledge and over which the consumer has no control. This research presents support for the existence of the extra-organizational parties and the need for more complete comprehension of personal information privacy in business-to-consumer research. In addition, the research supports the presence of data transgressors and data invaders, identifying the magnitude of privacy violations in spite of legal and self-protection policies. The model can serve as a guide for privacy research and for social discussion and legislation to manage and regulate use of data once collected.
منابع مشابه
SMS Advertising and Consumer Privacy: Analysis of Factors Affecting Consumer Willingness to send and Receive Information in Permission and Data based SMS advertising
The increasing penetration rate of mobile phone, with specific characteristics of this medium, such as almost everywhere with the audience, has attracted companies' attention to it as an advertising channel. Mobile devices facilitate highly customized marketing communication in terms of person, time location and context so numbers of companies that use this medium for communicating with their c...
متن کاملPhishing website detection using weighted feature line embedding
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...
متن کاملاعتبارسنجی اقتصادی از منظر حقوق عمومی
Government seeks to manage every aspects of society including financial affairs, in order to exercise its sovereignty. This management requires keeping and using financial information of citizens which is used in process of credit scoring. On the other hand, financial information of people is known as a part of their privacy and cannot been breached without legal permission, so that legal princ...
متن کاملنگرش بیماران در مورد حریم خصوصی و رازداری در بیمارستاهای منتخب تهران
Privacy and confidentiality are the inalienable rights of every human being to preserve his dignity. This issue should be considered in all levels of medical interventions. In the healthcare system, based on respect for privacy and confidentiality, patients decides what information to provide to their physicians. However, if a patient does not provide necessary information to his physician this...
متن کاملA survey on the evolution of privacy enforcement on smartphones and the road ahead
With the increasing proliferation of smartphones, enforcing privacy of smartphone users becomes evermore important. Nowadays, one of the major privacy challenges is the tremendous amount of permissions requested by applications, which can significantly invade users’ privacy, often without their knowledge. In this paper, we provide a comprehensive review of approaches that can be used to report ...
متن کاملINSPIRED: Intention-based Privacy-preserving Permission Model
Mobile operating systems adopt permission systems to protect system integrity and user privacy. In this work, we propose INSPIRED, an intention-aware dynamic mediation system for mobile operating systems with privacy preserving capability. When a security or privacy sensitive behavior is triggered, INSPIRED automatically infers the underlying program intention by examining its runtime environme...
متن کامل