Privacy and Security—Limits of Personal Information to Minimize Loss of Privacy

  • Hanif Ur RahmanEmail author
  • Ateeq Ur Rehman
  • Shah Nazir
  • Izaz Ur Rehman
  • Nizam Uddin
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 70)


The current information age enabled the direct access to personal information that rapidly invades private space. With the advent of new information technology’s equipment and innovations the time and distance limitations of communication got minimized that leads to more interaction among IT users. Thus with the expansion of information society the privacy violation becomes prominent as well as privacy dilemma got increased. IT users think that personal information is used for other purposes rather than security. The things are getting worse when the organization outsources data processing to other suppliers and sometime share information with third parties. All these steps are rapidly increasing users’ attention towards their personal information. The aim of this research is to investigate the concerns of IT users about their personal information and to find out that how much personal information users would like to provide to government, secured organizations, private organizations’ websites and social media. Data has been collected through a questionnaire from the students of Department of Computer and System Sciences (DSV), Stockholm University, Sweden and Royal Institute of Technology (KTH), Stockholm Sweden. The findings of the research study show that all the participants had deep knowledge about privacy. They were highly concerned about sharing their personal information with third parties. More importantly, respondents refused to provide complete personal information to nonprofit organizations and social media. On the other hand, the survey result reflects that people provide their complete personal information to organizations such as Swedish Migrationsverket, Skatteverket, and to DSV, KTH and Swedish banks. The IT users believed that these systems are quiet secure for their personal information and they will not use their information for other purposes.


Privacy Security Privacy loss Personal information 



The authors would to acknowledge the Higher Education Commission of Pakistan for supporting the work and providing the grant, under the grant No. Ref. No.300.362/TG/R&D/HEC/2018/26774.


  1. 1.
    Introna, L.D.: Privacy and the computer: why we need privacy in the information society. Metaphilosophy 28, 259–275 (1997)CrossRefGoogle Scholar
  2. 2.
    Shattuck, J.: Computer matching is a serious threat to individual rights. Commun. ACM 27, 538–541 (1984)CrossRefGoogle Scholar
  3. 3.
    Clarke, R.: Information technology and dataveillance. Commun. ACM 31, 498–512 (1988)CrossRefGoogle Scholar
  4. 4.
    Van Dijck, J.: Datafication, dataism and dataveillance: big data between scientific paradigm and ideology. Surveill. Soc. 12(2), 197 (2014)CrossRefGoogle Scholar
  5. 5.
    Jeff, S.H.: Privacy policies and practices: inside the organizational maze. Commun. ACM 36, 104–122 (1993)Google Scholar
  6. 6.
    Yu, Y., Wang, Q., Ke, Z.: Research on security for personal information and privacy under network environment. In: International Conference on Computational Intelligence and Natural Computing, IEEE, vol. 2, pp. 277–279 (2009)Google Scholar
  7. 7.
    Udo, G.J.: Privacy and security concerns as major barriers for e-commerce: a survey study. Inf. Manag. Comput. Secur. 9(4), 165–174 (2001)CrossRefGoogle Scholar
  8. 8.
    Schneier, B.: What our top spy doesn’t get: security and privacy aren’t opposites.
  9. 9.
  10. 10.
    Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51, 337–350 (2009)CrossRefGoogle Scholar
  11. 11.
    Katz, J.E., Tassone, A.R.: A report: public opinion trends: privacy and information technology. Public Opin. Q. 54, 125–143 (1990)CrossRefGoogle Scholar
  12. 12.
    Gavison, R.: Privacy and the limits of law. Yale Law J. 89, 421–471 (1980)CrossRefGoogle Scholar
  13. 13.
    Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4, 193–220 (1890)CrossRefGoogle Scholar
  14. 14.
    Haag, V.D.: On privacy. In: Pennock, J.R., Chapman, J.W. (eds) Privacy (Nomos XIII: year book of the American Society for Political and Legal Philosophy), New York: Atherton (1971)Google Scholar
  15. 15.
    Gross, H.: The concept of privacy. New York Univ. Law 42, 35–36 (1967)Google Scholar
  16. 16.
    Fried, C.: Privacy. Yale Law J. 77(3), 475–493 (1968)CrossRefGoogle Scholar
  17. 17.
    Westin, A.F.: Piracy and freedom. Washington and Lee Law Review 25 (1968)Google Scholar
  18. 18.
    Parker, R.B.: A definition of privacy. California Law Rev. 27, 275 (1974)Google Scholar
  19. 19.
    Johnson, J.L.: Privacy and the judgement of others. J. Value Inq. 23, 157–168 (1989)CrossRefGoogle Scholar
  20. 20.
    Decew, J.W.: The scope of privacy in law and ethics. Law Philos. 5, 145–173 (1986)Google Scholar
  21. 21.
    Baars, H., Hintzbergen, J., Smulders, A., Hintzbergen, K.: Foundations of information security based on ISO27001 and ISO27002. Van Haren Publishing (2010)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Hanif Ur Rahman
    • 1
    Email author
  • Ateeq Ur Rehman
    • 2
  • Shah Nazir
    • 3
  • Izaz Ur Rehman
    • 2
  • Nizam Uddin
    • 1
  1. 1.Department of Computer and System SciencesStockholm UniversityStockholmSweden
  2. 2.Department of Computer ScienceAbdul Wali Khan University MardanMardanPakistan
  3. 3.Department of Computer ScienceUniversity of SwabiSwabiPakistan

Personalised recommendations