104,183 research outputs found

    Peer-produced Privacy Protection A Common-pool Approach

    Get PDF
    Abstract-Privacy risks have been addressed through technical solutions such as privacy-enhancing technologies (PETs) as well as regulatory measures including Do Not Track. These approaches are inherently limited as they are grounded in the paradigm of a rational end user who can determine, articulate, and manage consistent privacy preferences. This implies that self-serving efforts to implement individual privacy preferences lead to socially optimal outcomes with regard to information sharing. Consequently, solutions to specific risks are developed, and even mandated, without effective reduction in the overall harm of privacy breaches. We present a systematic framework to examine the limitations of current technical and policy solutions. To address the shortcomings of existing privacy solutions, we argue for considering information sharing to be transactions within a community. Outcomes of privacy management can be improved at a lower overall cost if peers, as a community, are empowered by appropriate technical and policy mechanisms. Designing for a community requires encouraging dialogue, enabling transparency, and supporting enforcement of community norms. In this paper we show how peer production of privacy is possible through PETs that are grounded in the notion of information as a common-pool resource and community governance

    Peer-produced Privacy Protection A Common-pool Approach

    Get PDF
    Abstract-Privacy risks have been addressed through technical solutions such as privacy-enhancing technologies (PETs) as well as regulatory measures including Do Not Track. These approaches are inherently limited as they are grounded in the paradigm of a rational end user who can determine, articulate, and manage consistent privacy preferences. This implies that self-serving efforts to implement individual privacy preferences lead to socially optimal outcomes with regard to information sharing. Consequently, solutions to specific risks are developed, and even mandated, without effective reduction in the overall harm of privacy breaches. We present a systematic framework to examine the limitations of current technical and policy solutions. To address the shortcomings of existing privacy solutions, we argue for considering information sharing to be transactions within a community. Outcomes of privacy management can be improved at a lower overall cost if peers, as a community, are empowered by appropriate technical and policy mechanisms. Designing for a community requires encouraging dialogue, enabling transparency, and supporting enforcement of community norms. In this paper we show how peer production of privacy is possible through PETs that are grounded in the notion of information as a common-pool resource and community governance

    Artificial Intelligence in the Tourism Industry: A privacy impasse

    Get PDF
    Artificial Intelligence (AI) adoption in the tourism industry has resulted with privacy concerns as companies feed a vast amount of consumer data into AI, creating sensitive customer information. Therefore, this research aims at investigating the adequacy of the Personal Data Protection Act 2010 in addressing the privacy challenges raised by AI. Combining the doctrinal methodology and a case study, this research produced systematic means of legal reasoning pertinent to AI applications in the tourism industry. Ensuring privacy and security through every phase of the data lifecycle is pivotal to avoid legal liability for the tourism players while preserving customer confidence. Keywords: Artificial Intelligence and Law, Privacy and Artificial Intelligence, Privacy Engineering Model, Data Protection and Artificial Intelligence eISSN: 2398-4287 © 2022. The Authors. Published for AMER ABRA cE-Bs by e-International Publishing House, Ltd., UK. This is an open-access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer–review under the responsibility of AMER (Association of Malaysian Environment-Behaviour Researchers), ABRA (Association of Behavioural Researchers on Asians), and cE-Bs (Centre for Environment-Behaviour Studies), Faculty of Architecture, Planning & Surveying, Universiti Teknologi MARA, Malaysia. DOI: https://doi.org/10.21834/ebpj.v7iSI7.381

    Surveillant assemblages of governance in massively multiplayer online games:a comparative analysis

    Get PDF
    This paper explores governance in Massively Multiplayer Online Games (MMOGs), one sub-sector of the digital games industry. Informed by media governance studies, Surveillance Studies, and game studies, this paper identifies five elements which form part of the system of governance in MMOGs. These elements are: game code and rules; game policies; company community management practices; player participatory practices; and paratexts. Together these governance elements function as a surveillant assemblage, which relies to varying degrees on lateral and hierarchical forms of surveillance, and the assembly of human and nonhuman elements.Using qualitative mixed methods we examine and compare how these elements operate in three commercial MMOGs: Eve Online, World of Warcraft and Tibia. While peer and participatory surveillance elements are important, we identified two major trends in the governance of disruptive behaviours by the game companies in our case studies. Firstly, an increasing reliance on automated forms of dataveillance to control and punish game players, and secondly, increasing recourse to contract law and diminishing user privacy rights. Game players found it difficult to appeal the changing terms and conditions and they turned to creating paratexts outside of the game in an attempt to negotiate the boundaries of the surveillant assemblage. In the wider context of self-regulated governance systems these trends highlight the relevance of consumer rights, privacy, and data protection legislation to online games and the usefulness of bringing game studies and Surveillance Studies into dialogue
    • …
    corecore