23,937 research outputs found

    The Exploitation of Web Navigation Data: Ethical Issues and Alternative Scenarios

    Get PDF
    Nowadays, the users' browsing activity on the Internet is not completely private due to many entities that collect and use such data, either for legitimate or illegal goals. The implications are serious, from a person who exposes unconsciously his private information to an unknown third party entity, to a company that is unable to control its information to the outside world. As a result, users have lost control over their private data in the Internet. In this paper, we present the entities involved in users' data collection and usage. Then, we highlight what are the ethical issues that arise for users, companies, scientists and governments. Finally, we present some alternative scenarios and suggestions for the entities to address such ethical issues.Comment: 11 pages, 1 figur

    Behavioural public policies and charitable giving

    Get PDF
    Some of the challenges in Sanders et al. (this issue) can be aptly illustrated by means of charity nudges, that is, nudges designed to increase charitable donations. These nudges raise many ethical questions. First, Oxfam’s triptychs with suggested donations are designed to increase giving. If successful, do our actions match ex ante or ex post preferences? Does this make a difference to the autonomy of the donor? Second, the Behavioural Insights Team conducted experiments using social networks to nudge people to give more. Do these appeals steer clear of exploiting power relations? Do they respect boundaries of privacy? Third, in an online campaign by Kiva, donors are asked to contribute directly to personalized initiatives. In many cases, the initiative has already been funded and donor money is funnelled to a new cause. Is such a “pre-disbursal” arrangement truthful and true to purpose as a social business model

    Identity principles in the digital age: a closer view

    Get PDF
    Identity and its management is now an integral part of web-based services and applications. It is also a live political issue that has captured the interest of organisations, businesses and society generally. As identity management systems assume functionally equivalent roles, their significance for privacy cannot be underestimated. The Centre for Democracy and Technology has recently released a draft version of what it regards as key privacy principles for identity management in the digital age. This paper will provide an overview of the key benchmarks identified by the CDT. The focus of this paper is to explore how best the Data Protection legislation can be said to provide a framework which best maintains a proper balance between 'identity' conscious technology and an individual's expectation of privacy to personal and sensitive data. The central argument will be that increased compliance with the key principles is not only appropriate for a distributed privacy environment but will go some way towards creating a space for various stakeholders to reach consensus applicable to existing and new information communication technologies. The conclusion is that securing compliance with the legislation will prove to be the biggest governance challenge. Standard setting and norms will go some way to ease the need for centralised regulatory oversight

    The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

    Get PDF
    In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward

    Privacy Conscious Web Apps Composition

    No full text
    International audienceSo called "apps" are widespread today on the Internet. Most of them allow users to extend the range of functionalities their websites offer. However, they potentially jeopardize the privacy of users. Indeed, they collect, store and process personal pieces of information. Recent studies show that users feel they lack control over information. They also show that users distrust apps providers and would rather turn to their friends or family when they choose apps. In this paper we propose a model-driven approach to empower end-users with an extended control over their information. Our work is implemented as a web-based tool to compose apps and manage end-users privacy requirements. Our work showcases the unexploited possibilities of current web protocols and technologies in terms of privacy management

    Did Facebook absorb freewill?

    Get PDF
    Previous studies on social networking sites have failed to address comprehensively the level of efficacy and role of peer influences in the rise in membership levels of this new communication innovation. This study assessed the level of social influences at play in college students` decision to participate on Facebook. Online and postal surveys were sent to undergraduate students of a Northeastern institution of higher education to obtain self-reported of levels of perceived peer pressure influencing their participation on Facebook. The data collected were used to test a new theory of social conformity. No relationship was found between time spent on Facebook in a typical week and peer pressure
    • …
    corecore