556 research outputs found

    Individual values of GenZ in managing their Internet Privacy: a decision analytic assessment

    Get PDF
    A nossa investigação coloca a importĂąncia dos valores individuais como o centro de qualquer discussĂŁo sobre questĂ”es de privacidade. Os valores tĂȘm um papel essencial no discurso cientĂ­fico. Notamos que o conceito de valores Ă© um dos poucos discutidos e utilizados em vĂĄrias disciplinas das ciĂȘncias sociais. Para isso, nesta investigação, apresentamos objetivos baseados em valores para a privacidade na Internet da GenZ. Os objetivos sĂŁo classificados em duas categorias - os objetivos fundamentais e os meios para os atingir. Em sĂ­ntese, os nossos seis objetivos fundamentais orientam a gestĂŁo das questĂ”es de privacidade da Internet da GenZ. Os objetivos sĂŁo: Aumentar a confiança nas interaçÔes online; Maximizar a responsabilidade dos detentores de dados; Maximizar o direito Ă  privacidade; Maximizar a capacidade individual de gerir o controlo da privacidade; Maximizar a percepção da funcionalidade da plataforma; Garantir que os dados pessoais nĂŁo sĂŁo alterados. Coletivamente, os objetivos fundamentais e de meios sĂŁo uma base valiosa para a GenZ avaliar a sua postura de privacidade. Os objetivos tambĂ©m sĂŁo Ășteis para que as empresas de media social e outras plataformas relacionadas elaborem as suas polĂ­ticas de privacidade de acordo com o que a GenZ deseja. Finalmente, os objetivos sĂŁo uma ajuda Ăștil para o desenvolvimento de leis e regulamentos; Individual values of GenZ in managing their Internet Privacy: a decision analytic assessment Abstract: Online privacy is a growing concern. As individuals and businesses connect, the problem of privacy continues to remain significant. In this thesis, we address three primary questions - What are the individual values of GenZ concerning online privacy? What are the fundamental objectives of GenZ in terms of protecting their online privacy? What are the means objectives GenZ consider for protecting their online privacy? We argue that online privacy for GenZ is vital to protect. We also argue that protection can be ensured if we understand and know what privacy-related values behold GenZ and define their objectives accordingly. Our research brings the importance of individual values to be central to any discussion of privacy concerns. Values have an essential place in scientific discourse. We note that the concept of values is one of the very few discussed and employed across several social science disciplines. To that effect, in this research, we present value-based objectives for GenZ internet privacy. The objectives are classified into two categories – the fundamental objectives and the means to achieve them. In a final synthesis, our six fundamental objectives guide the management of GenZ Internet Privacy Concerns. The objectives are: Increase trust in online interactions; Maximize responsibility of data custodians; Maximize right to be left alone; Maximize individual ability to manage privacy controls; Maximize awareness of platform functionality; Ensure that personal data does not change. Collectively our fundamental and means objectives are a valuable basis for GenZ to evaluate their privacy posture. The objectives are also helpful for the social media companies and other related platforms to design their privacy policies according to the way GenZ wants. Finally, the objectives are a helpful policy aid for developing laws and regulations

    Tracking RFID

    Get PDF
    RFID-Radio Frequency Identification-is a powerful enabling technology with a wide range of potential applications. Its proponents initially overhyped its capabilities and business case: RFID deployment is proceeding along a much slower and less predictable trajectory than was initially thought. Nonetheless, in the end it is plausible that we will find ourselves moving in the direction of a world with pervasive RFID: a world in which objects\u27 wireless self-identification will become much more nearly routine, and networked devices will routinely collect and process the resulting information. RFID-equipped goods and documents present privacy threats: they may reveal information about themselves, and hence about the people carrying them, wirelessly to people whom the subjects might not have chosen to inform. That information leakage follows individuals, and reveals how they move through space. Not only does the profile that RFID technology helps construct contain information about where the subject is and has been, but RFID signifiers travel with the subject in the physical world, conveying information to devices that otherwise would not recognize it and that can take actions based on that information. RFID implementations, thus, can present three related privacy threats, which this article categorizes as surveillance, profiling, and action. RFID privacy consequences will differ in different implementations. It would be a mistake to conclude that an RFID implementation will pose no meaningful privacy threat because a tag does not directly store personally identifiable information, instead containing only a pointer to information contained in a separate database. Aside from any privacy threats presented by the database proprietor, privacy threats from third parties will depend on the extent to which those third parties can buy, barter, or otherwise gain database access. Where a tag neither points to nor carries personal identifying information, the extent of the privacy threat will depend in part on the degree to which data collectors will be able to link tag numbers with personally identifying information. Yet as profiling accelerates in the modem world, aided by the automatic, networked collection of information, information compiled by one data collector will increasingly be available to others as well; linking persistent identifiers to personally identifying information may turn out to be easy. Nor are sophisticated access controls and other cryptographic protections a complete answer to RFID privacy threats. The cost of those protections will make them impractical for many applications, though, and even with more sophisticated technology, security problems will remain. This article suggests appropriate government and regulatory responses to two important categories of RFID implementation. It concludes with a way of looking at, and an agenda for further research on, wireless identification technology more generally

    Pervasive Computing: Embedding the Public Sphere

    Full text link

    Mapping civic courage

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2008.Includes bibliographical references (leaves 89-96).Hero Reports extends the rationale of New York City's "See Something, Say Something" campaign-an alert public can be a good security measure. The current political climate within the United States translates the MTA's tactics into ones of fear. Instead of fostering collective security, these calls for vigilance create rifts between people and communities. An unhealthy impact of the "See Something, Say Something" campaign encourages people to look at each other with heightened and prejudicial suspicion. Although other projects have sought to interrogate the tactics of such citizen-detective campaigns, they do not provide productive alternatives. Because of this, projects seeking to deflect fear, only serve to reify and preserve its power. An alternative technology is needed to effectively destabilize the message of fear inherent in the MTA campaign. Hero Reports counterbalances the vigilance associated with suspicion and Othering with measures of positive and contextual alertness. It is a technology that builds communities that are truly, and collectively, empowering. Hero Reports provides this alternative first by aggregating stories of everyday heroism, and then by thematically, geographically and temporally mapping them. By linking and contextualizing discrete moments of heroism, Hero Reports promotes a public discourse about how we create, enforce and value social norms. Balancing the empirical ways we measure crime, Hero Reports provides the groundwork for determining the empirical parameters for heroism.Alyssa Pamela Wright.S.M

    Sharing our digital aura through social and physical proximity

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2008.Includes bibliographical references (p. 153-160).People are quite good at establishing a social style and using it in different communications contexts, but they do less well when the communication is mediated by computer networks. It is hard to control what information is revealed and how one's digital persona will be presented or interpreted. In this thesis, we ameliorate this problem by creating a "Virtual Private Milieu", a "VPM", that allows networked devices to act on our behalf and project a "digital aura" to other people and devices around us in a manner analogous to the way humans naturally interact with one another. The dynamic aggregation of the different auras and facets that the devices expose to one another creates social spheres of interaction between sets of active devices, and consequently between people. We focus on the subset of networking that deals with proximate communication, which we dub Face-to-Face Networking (FtFN). Network interaction in this space is often analogous to human face-to-face interaction, and increasingly, our devices are being used in local situations. We describe a VPM framework, key features of which include the incorporation of trust and context parameters into the discovery and communication process, incorporation of multiple contextunique identities, and also the support for multiple degrees of security and privacy. We also present the "Social Dashboard", a readily usable control for one's aura. Finally, we review "Comm.unity", a software package that allows developers and researchers easy implementation and deployment of local and distant social applications, and present two applications developed over this platform.Nadav Aharony.S.M
    • 

    corecore