Privacy and Security—Limits of Personal Information to Minimize Loss of Privacy
Abstract
The current information age enabled the direct access to personal information that rapidly invades private space. With the advent of new information technology’s equipment and innovations the time and distance limitations of communication got minimized that leads to more interaction among IT users. Thus with the expansion of information society the privacy violation becomes prominent as well as privacy dilemma got increased. IT users think that personal information is used for other purposes rather than security. The things are getting worse when the organization outsources data processing to other suppliers and sometime share information with third parties. All these steps are rapidly increasing users’ attention towards their personal information. The aim of this research is to investigate the concerns of IT users about their personal information and to find out that how much personal information users would like to provide to government, secured organizations, private organizations’ websites and social media. Data has been collected through a questionnaire from the students of Department of Computer and System Sciences (DSV), Stockholm University, Sweden and Royal Institute of Technology (KTH), Stockholm Sweden. The findings of the research study show that all the participants had deep knowledge about privacy. They were highly concerned about sharing their personal information with third parties. More importantly, respondents refused to provide complete personal information to nonprofit organizations and social media. On the other hand, the survey result reflects that people provide their complete personal information to organizations such as Swedish Migrationsverket, Skatteverket, and to DSV, KTH and Swedish banks. The IT users believed that these systems are quiet secure for their personal information and they will not use their information for other purposes.
Keywords
Privacy Security Privacy loss Personal informationNotes
Acknowledgements
The authors would to acknowledge the Higher Education Commission of Pakistan for supporting the work and providing the grant, under the grant No. Ref. No.300.362/TG/R&D/HEC/2018/26774.
References
- 1.Introna, L.D.: Privacy and the computer: why we need privacy in the information society. Metaphilosophy 28, 259–275 (1997)CrossRefGoogle Scholar
- 2.Shattuck, J.: Computer matching is a serious threat to individual rights. Commun. ACM 27, 538–541 (1984)CrossRefGoogle Scholar
- 3.Clarke, R.: Information technology and dataveillance. Commun. ACM 31, 498–512 (1988)CrossRefGoogle Scholar
- 4.Van Dijck, J.: Datafication, dataism and dataveillance: big data between scientific paradigm and ideology. Surveill. Soc. 12(2), 197 (2014)CrossRefGoogle Scholar
- 5.Jeff, S.H.: Privacy policies and practices: inside the organizational maze. Commun. ACM 36, 104–122 (1993)Google Scholar
- 6.Yu, Y., Wang, Q., Ke, Z.: Research on security for personal information and privacy under network environment. In: International Conference on Computational Intelligence and Natural Computing, IEEE, vol. 2, pp. 277–279 (2009)Google Scholar
- 7.Udo, G.J.: Privacy and security concerns as major barriers for e-commerce: a survey study. Inf. Manag. Comput. Secur. 9(4), 165–174 (2001)CrossRefGoogle Scholar
- 8.Schneier, B.: What our top spy doesn’t get: security and privacy aren’t opposites. https://www.wired.com/2008/01/securitymatters-0124/
- 9.Schneier, B.: Protecting privacy and liberty (2001) https://www.schneier.com/essays/archives/2001/10/protecting_privacy_a.htmlCrossRefGoogle Scholar
- 10.Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51, 337–350 (2009)CrossRefGoogle Scholar
- 11.Katz, J.E., Tassone, A.R.: A report: public opinion trends: privacy and information technology. Public Opin. Q. 54, 125–143 (1990)CrossRefGoogle Scholar
- 12.Gavison, R.: Privacy and the limits of law. Yale Law J. 89, 421–471 (1980)CrossRefGoogle Scholar
- 13.Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4, 193–220 (1890)CrossRefGoogle Scholar
- 14.Haag, V.D.: On privacy. In: Pennock, J.R., Chapman, J.W. (eds) Privacy (Nomos XIII: year book of the American Society for Political and Legal Philosophy), New York: Atherton (1971)Google Scholar
- 15.Gross, H.: The concept of privacy. New York Univ. Law 42, 35–36 (1967)Google Scholar
- 16.Fried, C.: Privacy. Yale Law J. 77(3), 475–493 (1968)CrossRefGoogle Scholar
- 17.Westin, A.F.: Piracy and freedom. Washington and Lee Law Review 25 (1968)Google Scholar
- 18.Parker, R.B.: A definition of privacy. California Law Rev. 27, 275 (1974)Google Scholar
- 19.Johnson, J.L.: Privacy and the judgement of others. J. Value Inq. 23, 157–168 (1989)CrossRefGoogle Scholar
- 20.Decew, J.W.: The scope of privacy in law and ethics. Law Philos. 5, 145–173 (1986)Google Scholar
- 21.Baars, H., Hintzbergen, J., Smulders, A., Hintzbergen, K.: Foundations of information security based on ISO27001 and ISO27002. Van Haren Publishing (2010)Google Scholar