120,220 research outputs found
Understanding Nuances of Privacy and Security in the Context of Information Systems
The concepts of privacy and security are interrelated but the underlying meanings behind them may vary across different contexts. As information technology is becoming integrated in our lives, emerging information privacy and security issues have been catching both scholars’ and practitioners’ attention with the aim to address these issues. Examples of such issues include users’ role in information security breaches, online information disclosure and its impact on information privacy, and the collection and use of electronic data for surveillance. These issues are associated with and can be explained by various disciplines, such as psychology, law, business, economics, and information systems. This diversity of disciplines leads to an inclusive approach that subsumes interrelated constructs, such as security, anonymity, and surveillance, as a part of privacy in the current literature. However, privacy and security are distinct concepts. In this paper, we argue that to better understand the role of human factors in the context of information privacy and security, these two concepts need to be examined independently. We examine the two concepts and systematically present various nuances of information privacy and security
SHOULD PERSONAL INFORMATION AND BIOMETRIC DATA BE PROTECTED UNDER A COMPREHENSIVE FEDERAL PRIVACY STATUTE THAT USES THE CALIFORNIA CONSUMER PRIVACY ACT AND THE ILLINOIS BIOMETRIC INFORMATION PRIVACY ACT AS MODEL LAWS?
The issue addressed in this paper was that only a minority of states have passed privacy and biometric privacy rights laws. The collection, storage, use, and dissemination of personal information and biometric data is becoming paramount due to the public’s ever-increasing desire for security. The purpose of this study was to understand and evaluate the privacy and property issues that states confront that are inherent within the use and results of employing personal information and biometric data to enhance corporate security in their efforts to protect individual privacy. This research addressed the following questions: (1) What are the biometric privacy issues that states face regarding individual and corporate needs for security and privacy?; (2) Why do the several states continue to be vulnerable to litigation regarding biometric privacy issues?; (3) How does the State of Illinois address biometric privacy issues in its statutory effort to protect individuals against organizations that employ biometric cybersecurity procedures?; and (4) How does the Illinois Biometric Information Privacy Act benefit the federal government and other states in their efforts to create and pass biometric privacy laws that protect the privacy rights of their citizens? Four key findings are discussed in this study. The major finding was that neither the California Consumer Privacy Act as amended, the California Privacy Right Act nor Illinois’ Biometric Information Privacy Act overlap to form a far-reaching privacy law because the subject matters of both laws are different. The recommendations argue that the United States needs an all inclusive privacy law that encompasses both personal information and biometric information
Accessible Banking: Experiences and Future Directions
This is a short position paper drawing on experience working with the UK
banking industry and their disabled and ageing customers in the Business
Disability Forum, a UK non-profit member organisation funded by a large body of
UK private and public sector businesses. We describe some commonly reported
problems of disabled customers who use modern banking technologies, relating
them to UK law and best practice. We describe some of the recent banking
industry innovations and the hope they may offer for improved inclusive and
accessible multi-channel banking.Comment: 3 pages, presented at Workshop on Inclusive Privacy and Security
(WIPS): Privacy and Security for Everyone, Anytime, Anywhere, held as part of
Symposium on Usable Privacy and Security (SOUPS) 2015, July 22-24, 2015,
Ottawa, Canad
Africa’s Ed-Tech Platforms: Protecting Children’s Right to Privacy
Ed-tech platforms are used to create a more engaging, inclusive, and individualized learning experience. A number of these platforms utilize Artificial Intelligence (AI). AI-enabled learning tools and approaches have revolutionized the global education sector (Pedro et al., 2019). They have been recognized for their contributions to enhancing the quality of learning and teaching. AI aids teachers and students in their lessons (Pedro et al., 2019). Additionally, AI has been lauded for its potential to boost students' knowledge and learning habits, while also creating a more personalized approach to learning (Pedro et al., 2019). Children are less likely to read or understand privacy policies, and they may have a limited understanding of their right to privacy and data protection. In addition, they are more susceptible to marketing techniques that adults can identify. The existence of their personal information online poses potential safety and security risks. Therefore, privacy policies on Ed-tech platforms must incorporate children's rights and an understanding of their right to privacy. This includes online protection and security measures established to protect children's data. The primary audience for this policy brief is corporations. Although, children’s rights to privacy are a collective responsibility of the parents, legal guardians, and other individuals legally responsible for the child. In the Ed-tech space, this responsibility extends to AI platform owners, who manage the platforms, and policymakers and regulators concerned with data protection and children’s rights
Menstrual hygiene: a ‘silent’ need during disaster recovery
Post-disaster relief and recovery operations seldom focus on women’s priorities regarding menstrual hygiene. There is an increasing awareness to incorporate inclusive, participatory, and gender-sensitive strategies for implementation of response programmes. This article presents empirical findings related to menstrual hygiene management (MHM), demonstrating it is integral to women’s privacy and safety during recovery. Using case studies from India, the 2012 Assam floods and 2013 Cyclone Phailin in Odisha, this article explores menstrual hygiene practices in a post-disaster context. The data were collected through participatory learning and action tools such as focus group discussions, household interviews, priority ranking, and observations. It emerged that menstrual hygiene was overlooked at the household level during recovery; women and adolescent girls faced seclusion and isolation, exacerbating privacy and security concerns post-disasters. Some humanitarian agencies have an ad hoc approach towards MHM, which is limited to distribution of sanitary pads and does not address the socio-cultural practices around MHM. There is a need for strategic planning to address MHM with a gender-sensitive and inclusive approach. This article draws practical and policy inferences from the research for stronger approaches towards initiating behaviour change in MHM, and addressing attitudes and knowledge regarding menstrual hygiene
Recommended from our members
Technology and Caregiving: Emerging Interventions and Directions for Research.
An array of technology-based interventions has increasingly become available to support family caregivers, primarily focusing on health and well-being, social isolation, financial, and psychological support. More recently the emergence of new technologies such as mobile and cloud, robotics, connected sensors, virtual/augmented/mixed reality, voice, and the evermore ubiquitous tools supported by advanced data analytics, coupled with the integration of multiple technologies through platform solutions, have opened a new era of technology-enabled interventions that can empower and support family caregivers. This paper proposes a conceptual framework for identifying and addressing the challenges that may need to be overcome to effectively apply technology-enabled solutions for family caregivers. The paper identifies a number of challenges that either moderate or mediate the full use of technologies for the benefit of caregivers. The challenges include issues related to equity, inclusion, and access; ethical concerns related to privacy and security; political and regulatory factors affecting interoperability and lack of standards; inclusive/human-centric design and issues; and inherent economic and distribution channel difficulties. The paper concludes with a summary of research questions and issues that form a framework for global research priorities
- …