Privacy Paradox 2.0


Book Description

Individuals consistently express significant privacy concerns related to their social, consumptive, and commercial interactions with third parties, as well as a specific intent to act on those concerns by refusing to disclose personal information. This is particularly true in the online environment. Yet in practice we readily provide our personal information with what appears to be little regard for the risks of doing so and for little of value in return. This phenomenon, commonly referred to as the privacy paradox, points to the inconsistency between individuals' asserted intentions and their actual disclosure behavior. Although it is a well-established concept in many fields of the social sciences, legal scholarship has generally failed to engage the privacy paradox in any meaningful way. This failure diminishes the impact of legal scholarship in the formation of privacy policy while elevating the role of fields traditionally less concerned with the core privacy values of personhood, autonomy, and control - inter alia, economics, contract law, marketing theory, and computer science. The emergence of social network sites only deepens the paradox, intensifying the rate and depth of disclosure, and further marginalizing legal scholarship that fails to seriously consider its role in the development of privacy policy. Focusing on this final point, the goal of this essay is to describe both the current market in personal information and the privacy paradox as a product of market distortion. It then identifies two unique phenomena that modify the conditions of the privacy paradox by creating new and powerful distortions in the market, intensifying the rate and depth of personal data disclosure. The first is a transformation in social organization that is driving individuals to join social network sites and to disclose a great deal of personal information on and to those networks. The second is an alteration of the basic structure of the information exchange agreement that permits social network sites to recede into the background as third-party beneficiaries of personal information in social exchange. The essay then addresses the necessity to account for the effect of these phenomena in the formation of privacy policy by briefly addressing various proposals for regulating the collection, storage, use and transfer of personal information. It argues that many of these proposals are misguided, either because they under-protect personal information by failing to adequately address the problems of valuation and consent, or over-protect by failing to adequately preserve functionality in socially-valuable communications platforms. Finally, the essay attempts to briefly conceptualize the broad outline of more a workable solution that, rather than reforming the current notice-and-choice system of privacy protection, is guided by user expectations in imposing minimal restraints on the margins of data collection, storage, use, and transfer practices. Although imposing certain boundaries on the scope of consent, significant space would remain for the negotiation and development of social norms around privacy practices.







Privacy and Identity Management for Life


Book Description

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.




Privacy Online


Book Description

Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online, they may be searched, reproduced and mined by advertisers, merchants, service providers or even stalkers. Many users know what may happen to their information, while at the same time they act as though their data are private or intimate. They expect their privacy will not be infringed while they willingly share personal information with the world via social network sites, blogs, and in online communities. The chapters collected by Trepte and Reinecke address questions arising from this disparity that has often been referred to as the privacy paradox. Works by renowned researchers from various disciplines including psychology, communication, sociology, and information science, offer new theoretical models on the functioning of online intimacy and public accessibility, and propose novel ideas on the how and why of online privacy. The contributing authors offer intriguing solutions for some of the most pressing issues and problems in the field of online privacy. They investigate how users abandon privacy to enhance social capital and to generate different kinds of benefits. They argue that trust and authenticity characterize the uses of social network sites. They explore how privacy needs affect users’ virtual identities. Ethical issues of privacy online are discussed as well as its gratifications and users’ concerns. The contributors of this volume focus on the privacy needs and behaviors of a variety of different groups of social media users such as young adults, older users, and genders. They also examine privacy in the context of particular online services such as social network sites, mobile internet access, online journalism, blogs, and micro-blogs. In sum, this book offers researchers and students working on issues related to internet communication not only a thorough and up-to-date treatment of online privacy and the social web. It also presents a glimpse of the future by exploring emergent issues concerning new technological applications and by suggesting theory-based research agendas that can guide inquiry beyond the current forms of social technologies.




Adcreep


Book Description

Advertising is everywhere. By some estimates, the average American is exposed to over 3,000 advertisements each day. Whether we realize it or not, "adcreep"—modern marketing's march to create a world where advertising can be expected anywhere and anytime—has come, transforming not just our purchasing decisions, but our relationships, our sense of self, and the way we navigate all spaces, public and private. Adcreep journeys through the curious and sometimes troubling world of modern advertising. Mark Bartholomew exposes an array of marketing techniques that might seem like the stuff of science fiction: neuromarketing, biometric scans, automated online spies, and facial recognition technology, all enlisted to study and stimulate consumer desire. This marriage of advertising and technology has consequences. Businesses wield rich and portable records of consumer preference, delivering advertising tailored to your own idiosyncratic thought processes. They mask their role by using social media to mobilize others, from celebrities to your own relatives, to convey their messages. Guerrilla marketers turn every space into a potential site for a commercial come-on or clandestine market research. Advertisers now know you on a deeper, more intimate level, dramatically tilting the historical balance of power between advertiser and audience. In this world of ubiquitous commercial appeals, consumers and policymakers are numbed to advertising's growing presence. Drawing on a variety of sources, including psychological experiments, marketing texts, communications theory, and historical examples, Bartholomew reveals the consequences of life in a world of non-stop selling. Adcreep mounts a damning critique of the modern American legal system's failure to stem the flow of invasive advertising into our homes, parks, schools, and digital lives.




Modern Socio-Technical Perspectives on Privacy


Book Description

This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.




Privacy as Trust


Book Description

Proposes a new way of thinking about information privacy that leverages law to protect disclosures in contexts of trust.




Digital Privacy


Book Description

During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in academia, industry, and government.




Computational Science – ICCS 2023


Book Description

The five-volume set LNCS 14073-14077 constitutes the proceedings of the 23rd International Conference on Computational Science, ICCS 2023, held in Prague, Czech Republic, during July 3-5, 2023. The total of 188 full papers and 94 short papers presented in this book set were carefully reviewed and selected from 530 submissions. 54 full and 37 short papers were accepted to the main track; 134 full and 57 short papers were accepted to the workshops/thematic tracks. The theme for 2023, "Computation at the Cutting Edge of Science", highlights the role of Computational Science in assisting multidisciplinary research. This conference was a unique event focusing on recent developments in scalable scientific algorithms, advanced software tools; computational grids; advanced numerical methods; and novel application areas. These innovative novel models, algorithms, and tools drive new science through efficient application in physical systems, computational and systems biology, environmental systems, finance, and others.




The Privacy Paradox II


Book Description

I n 2015, one of the present authors, writing with Jodie Liu, published a Brookings paper entitled, "The Privacy Paradox: The Privacy Benefits of Privacy Threats," advancing a simple thesis that cuts dramatically against the grain of contemporary privacy thinking: the very technologies that most commentators see as posing grave threats to privacy, the paper argued, in fact offer significant privacy benefits to consumers.--