120,220 research outputs found

    Understanding Nuances of Privacy and Security in the Context of Information Systems

    Get PDF
    The concepts of privacy and security are interrelated but the underlying meanings behind them may vary across different contexts. As information technology is becoming integrated in our lives, emerging information privacy and security issues have been catching both scholars’ and practitioners’ attention with the aim to address these issues. Examples of such issues include users’ role in information security breaches, online information disclosure and its impact on information privacy, and the collection and use of electronic data for surveillance. These issues are associated with and can be explained by various disciplines, such as psychology, law, business, economics, and information systems. This diversity of disciplines leads to an inclusive approach that subsumes interrelated constructs, such as security, anonymity, and surveillance, as a part of privacy in the current literature. However, privacy and security are distinct concepts. In this paper, we argue that to better understand the role of human factors in the context of information privacy and security, these two concepts need to be examined independently. We examine the two concepts and systematically present various nuances of information privacy and security

    SHOULD PERSONAL INFORMATION AND BIOMETRIC DATA BE PROTECTED UNDER A COMPREHENSIVE FEDERAL PRIVACY STATUTE THAT USES THE CALIFORNIA CONSUMER PRIVACY ACT AND THE ILLINOIS BIOMETRIC INFORMATION PRIVACY ACT AS MODEL LAWS?

    Get PDF
    The issue addressed in this paper was that only a minority of states have passed privacy and biometric privacy rights laws. The collection, storage, use, and dissemination of personal information and biometric data is becoming paramount due to the public’s ever-increasing desire for security. The purpose of this study was to understand and evaluate the privacy and property issues that states confront that are inherent within the use and results of employing personal information and biometric data to enhance corporate security in their efforts to protect individual privacy. This research addressed the following questions: (1) What are the biometric privacy issues that states face regarding individual and corporate needs for security and privacy?; (2) Why do the several states continue to be vulnerable to litigation regarding biometric privacy issues?; (3) How does the State of Illinois address biometric privacy issues in its statutory effort to protect individuals against organizations that employ biometric cybersecurity procedures?; and (4) How does the Illinois Biometric Information Privacy Act benefit the federal government and other states in their efforts to create and pass biometric privacy laws that protect the privacy rights of their citizens? Four key findings are discussed in this study. The major finding was that neither the California Consumer Privacy Act as amended, the California Privacy Right Act nor Illinois’ Biometric Information Privacy Act overlap to form a far-reaching privacy law because the subject matters of both laws are different. The recommendations argue that the United States needs an all inclusive privacy law that encompasses both personal information and biometric information

    Accessible Banking: Experiences and Future Directions

    Get PDF
    This is a short position paper drawing on experience working with the UK banking industry and their disabled and ageing customers in the Business Disability Forum, a UK non-profit member organisation funded by a large body of UK private and public sector businesses. We describe some commonly reported problems of disabled customers who use modern banking technologies, relating them to UK law and best practice. We describe some of the recent banking industry innovations and the hope they may offer for improved inclusive and accessible multi-channel banking.Comment: 3 pages, presented at Workshop on Inclusive Privacy and Security (WIPS): Privacy and Security for Everyone, Anytime, Anywhere, held as part of Symposium on Usable Privacy and Security (SOUPS) 2015, July 22-24, 2015, Ottawa, Canad

    Africa’s Ed-Tech Platforms: Protecting Children’s Right to Privacy

    Get PDF
    Ed-tech platforms are used to create a more engaging, inclusive, and individualized learning experience. A number of these platforms utilize Artificial Intelligence (AI). AI-enabled learning tools and approaches have revolutionized the global education sector (Pedro et al., 2019). They have been recognized for their contributions to enhancing the quality of learning and teaching. AI aids teachers and students in their lessons (Pedro et al., 2019). Additionally, AI has been lauded for its potential to boost students' knowledge and learning habits, while also creating a more personalized approach to learning (Pedro et al., 2019). Children are less likely to read or understand privacy policies, and they may have a limited understanding of their right to privacy and data protection. In addition, they are more susceptible to marketing techniques that adults can identify. The existence of their personal information online poses potential safety and security risks. Therefore, privacy policies on Ed-tech platforms must incorporate children's rights and an understanding of their right to privacy. This includes online protection and security measures established to protect children's data. The primary audience for this policy brief is corporations. Although, children’s rights to privacy are a collective responsibility of the parents, legal guardians, and other individuals legally responsible for the child. In the Ed-tech space, this responsibility extends to AI platform owners, who manage the platforms, and policymakers and regulators concerned with data protection and children’s rights

    Menstrual hygiene: a ‘silent’ need during disaster recovery

    Get PDF
    Post-disaster relief and recovery operations seldom focus on women’s priorities regarding menstrual hygiene. There is an increasing awareness to incorporate inclusive, participatory, and gender-sensitive strategies for implementation of response programmes. This article presents empirical findings related to menstrual hygiene management (MHM), demonstrating it is integral to women’s privacy and safety during recovery. Using case studies from India, the 2012 Assam floods and 2013 Cyclone Phailin in Odisha, this article explores menstrual hygiene practices in a post-disaster context. The data were collected through participatory learning and action tools such as focus group discussions, household interviews, priority ranking, and observations. It emerged that menstrual hygiene was overlooked at the household level during recovery; women and adolescent girls faced seclusion and isolation, exacerbating privacy and security concerns post-disasters. Some humanitarian agencies have an ad hoc approach towards MHM, which is limited to distribution of sanitary pads and does not address the socio-cultural practices around MHM. There is a need for strategic planning to address MHM with a gender-sensitive and inclusive approach. This article draws practical and policy inferences from the research for stronger approaches towards initiating behaviour change in MHM, and addressing attitudes and knowledge regarding menstrual hygiene
    • …
    corecore