Exercising the Right of Privacy

Author(s):  
Scott Flinn ◽  
Scott Buffett

This chapter discusses privacy from the perspective of the consumer of e-services. It proposes a technique for risk management assessment designed to help consumers evaluate a situation to identify and understand potential privacy concerns. The technique centers around a series of questions based on common principles of privacy protection. The chapter discusses how a consumer can understand exposure risks and how information can be controlled and monitored to mitigate the risks. It also proposes a method for assessing the consumer’s value of personal information, and a mechanism for automated negotiation is presented to facilitate fair, private information exchange. The authors believe that these or similar techniques are essential to give consumers of e-services meaningful control over the personal information they release. This forward-looking chapter provides a foundation for developing methods to empower users with control over their private information.

Author(s):  
Mark Lunney ◽  
Donal Nolan ◽  
Ken Oliphant

The right of privacy under Article 8 of the European Convention on Human Rights was incorporated into English law by the Human Rights Act 1998, but English law as yet recognises no tort of invasion of privacy as such. Admittedly, a number of specific torts protect particular aspects of privacy, but this protection may be regarded as haphazard, incidental, and incomplete. Recent decisions, however, have seen substantial developments in the protection given to particular privacy interests, above all by adapting the law of breach of confidence to provide a remedy against the unauthorised disclosure of personal information. These issues are discussed in this chapter.


2018 ◽  
Vol 7 (2) ◽  
pp. 567
Author(s):  
Yusuf Sinan Zavalsız ◽  
Ensar Şahin

<p><strong>Abstract</strong></p><p>This study deals with changing views and attitudes of individuals towards creator and religion. Apart from this, we analyzed the reasons behind the change of opinions.</p><p>In this paper, we also investigated in a psychosocial approach what lies in the background of that through which atheists and deists adopted this understanding. After we briefly explained the terms "atheism" and "deism" we inquired about the family relations of respondents beginning from their childhood and puberty ages. We asked the respondents whether they are informed by families and the frequency of their practising the duties of past religious affiliates which is followed by sceptical manner about the religion adhered questioning if they experienced any traumatic event and examined the circumstances that motivated them to be atheists or deists. We also sought to determine similarities and differences between atheists and deists in terms of the way of thinking.</p><p>This research has been prepared within the frame of the interviews carried out with 25 volunteers, 15 of whom were atheists and 10 deists. Some of the interviews were recorded their consent having been obtained. As per the right of privacy and the request of the subjects, their universities, identity and personal information have been kept confidential. Nevertheless, they have been given nicknames to be used exclusively in this research.</p><p><strong>Öz</strong></p><p>Araştırmamız, Ateist ve Deistlerin Din Algısı: Üniversite Öğrencileri Üzerine Psiko-Sosyolojik Bir Araştırma başlığı altında, bireylerin, yaratıcı ve din konusunda değişen düşüncelerini ele almaktadır. Düşünce değişikliğinin arka planında hangi kodların bulunduğu ayrıca irdelenmeye çalışılmıştır. </p><p>Bu çalışmada ateist ve deistlerin, arka planda ateizmi ve deizmi benimsemesine yol açan sebeplerin neler olduğu psiko-sosyal bir bakış açısıyla incelenecektir. Ateizm ve deizmin ne olduğu kısaca izah edildikten sonra deneklerin çocukluk ve ergenlik döneminden başlanarak aile ilişkileri ele alınmıştır. Dinî konularda ailesi tarafından bilgilendirilme durumu, toplumla ilişkileri, daha önce mensup olduğu dinin ibadetlerini yerine getirip getirmeme sıklığı sorulmuştur. Sonrasında mensup olunan dine dair taşınan şüpheler, hayatlarını etkileyen travmatik bir olay yaşayıp yaşamadıkları, onları ateist veya deist olmaya iten faktörler irdelenmiştir. Ateist ve deistlerin birbirinden ayrıldığı ve benzer düşündüğü konular ortaya çıkartılmaya çalışılmıştır.</p><p>Araştırma, 15’i ateist, 10’u deist, toplam 25 gönüllü öğrenci ile gerçekleştirilen mülakatlar çerçevesinde ortaya çıkmıştır. Mülakatlarda, isteğe bağlı olarak ses kaydı alınmıştır. Özel hayatın gizliliği ilkesince ve deneklerin talepleri doğrultusunda, üniversiteleri, kimlik bilgileri ve isimleri gizli tutulmuş, yalnız bu çalışmada kullanılmak üzere kendilerine takma isim verilmiştir.</p>


1989 ◽  
Vol 15 (2-3) ◽  
pp. 227-233 ◽  
Author(s):  
Paul Benjamin Linton

In Roe v. Wade, the Supreme Court held that “[the] right of privacy … founded in the Fourteenth Amendment's concept of personal liberty … is broad enough to encompass a woman's decision whether or not to terminate her pregnancy.” The Court acknowledged that “[t]he Constitution does not explicitly mention any right of privacy.” Nevertheless, the Court held that a “right of personal privacy, or a guarantee of certain areas or zones of privacy, does exist under the Constitution.” However, “only personal rights that can be deemed ‘fundamental’ or ‘implicit in the concept of ordered liberty,’ … are included in this guarantee of personal privacy.”


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jillian Carmody ◽  
Samir Shringarpure ◽  
Gerhard Van de Venter

Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies. Findings The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets. Social implications The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions. Originality/value The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.


Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


Sign in / Sign up

Export Citation Format

Share Document