15 research outputs found

    Remembering Me: Big Data, Individual Identity, and the Psychological Necessity of Forgetting

    Get PDF
    Each of us has a personal narrative: a story that defines us, and one that we tell about ourselves to our inner and outer worlds. A strong sense of identity is rooted in a personal narrative that has coherence and correspondence (Conway, 2005): coherence in the sense that the story we tell is consistent with and supportive of our current version of ‘self’; and correspondence in the sense that the story reflects the contents of autobiographical memory and the meaning of our experiences. These goals are achieved by a reciprocal interaction of autobiographical memory and the self, in which memories consistent with the self-image are reinforced, in turn strengthening the self-image they reflect. Thus, personal narratives depend crucially on the malleable nature of autobiographical memory: a strong sense of self requires that one remember what matters, and forget what does not. Today, anyone who is active online generates a highly detailed, ever--expanding, and permanent digital biographical ‘memory’– memory that identifies where we go, what we say, who we see, and what we do in increasing detail as our physical lives become more and more enmeshed with electronic devices capable of recording our communications, online activities, movements, and even bodily functions. This paper explores the consequences of this digital record for identity, arguing that it presents a challenge to our ability to construct our own personal narratives – narratives that are central to a sense of ‘self’. In the end, the ‘right to be forgotten’ may be, above all else, a psychological necessity that is core to identity – and therefore a value that we must ensure is protected

    Display and Control in Online Social Spaces: Toward a Typology of Users

    Get PDF
    Online social networks are spaces of social display where an astronomical amount of personal information, which would once have been characterized as private, is shared with a loose community of friends or followers. This broad sharing does not preclude participant interest in control, both over the content of the social network profile and over the audience that has access to that profile. Thus, issues of display and control are in tension in the context of online social networking. The goal of this research is to articulate the different subjective perspectives that characterize Facebook users with respect to the control that they exert over content that they share and audience with whom they share it

    Equality at Stake: Connecting the Privacy/Vulnerability Cycle to the Debate about Publicly Accessible Online Court Records

    Get PDF
    A considerable amount has been written about the privacy implications of publishing court and tribunal records online. In this article the authors examine the linkages between privacy and vulnerability for members of marginalized communities and, drawing on Calo’s “vicious cycle” of privacy and vulnerability, suggest that publicly accessible online court records represent an equality issue as well. Drawing on social science research and privacy theory, the authors demonstrate the potentially disproportionate effect of online court records on members of marginalized communities. They then examine Canadian case law, legislation and policy that impose restrictions on public disclosure of information from court proceedings and disclosure of information within court proceedings to highlight a limited pre-existing recognition of the privacy/vulnerability cycle. In conclusion they suggest that removal of personal information from court records made publicly available online would serve to protect both privacy and equality rights

    Hidden Surveillance on Consumer Health Information Websites

    Get PDF
    Behavioural tracking presents a significant privacy risk to Canadians, particularly when their online behaviours reveal sensitive information that could be used to discriminate against them. This concern is particularly relevant in the context of online health information seeking, since searches can reveal details about health conditions and concerns that the individual may wish to keep private. The privacy threats are exacerbated because behavioural tracking mechanisms are large invisible to users, and many are unaware of the strategies and mechanisms available to track online behaviour. In this project, we seek to document the behavioural tracking practices of consumer health websites, and to examine the privacy policy disclosures of these same practices. The results of our research demonstrate that tracking is widespread on consumer health information websites; furthermore, sites recommended by Information Professionals are similar to sites returned in Google searches in terms of overall tracking, though they show lower levels of third-party advertiser presence. Privacy policy disclosure of tracking practices is largely ineffective, and website visitors cannot easily determine tracking practices from a review of the website privacy policies. Taken together, these results suggest that alternative mechanisms are required to detect and/or mitigate or neutralize the behavioural tracking measures used on many consumer health information websites

    The View From Here: User-Centered Perspectives on Social Network Privacy

    Get PDF
    A great deal of personal information is released in online social network profiles, and this information is increasingly being sought as evidence in criminal, administrative and civil legal proceedings. Determination of the admissibility of social network profile information rests in part on the issue of subjective expectations of privacy: to what extent do online social network participants expect privacy in their social network profiles? This question is examined through a combination of interviews and focus groups. The results suggest that Facebook as a whole is characterized as a space where participants construct and display a produced version of the self to a large and indeterminate social network. The common perspective is that information posted on social network profiles is selected for social broadcast, and further dissemination (beyond the online social network to which information is disclosed) is therefore both acceptable and to be expected. Although they would prefer profile access to be restricted to a broadly defined social network of friends and acquaintances, online social network participants do not in general expect to control the audience for their profiles, and they therefore typically include only information that ‘everyone’ can know in their online profiles. They thus require and exercise control over the content that is associated with their online profiles, and actions that undermine this control run contrary to privacy expectations

    Rural Men’s Health, Health Information Seeking, and Gender Identities: A Conceptual Theoretical Review of the Literature

    Get PDF
    Beginning as early as 2009, recent shifts in Canadian health care delivery indicate that access to health information is essential to promote and maintain a healthy population. It is important to understand how and where various populations, such as underresourced rural populations, access health information so that public health agencies can develop and deliver appropriate information with, for, and in these contexts. There is a paucity of research that specifically examines how rural Canadian men seek health information; therefore, this review aimed to conceptualize this process based on three dynamic key constructs: health patterns of rural Canadians, health information–seeking behaviors, and rural gender identities. This conceptual theoretical literature review included 91 articles at the intersection of these three constructs. Discussion focuses on how residing in a rural region influences men’s health and health care access. Health information–seeking behaviors are discussed in terms of social networks and framed with a rural context. Connell’s theory of masculinity provides a useful approach to dissecting how rural men’s gender identities influence their health attitudes, and how such attitudes are embedded in rural social and cultural norms. Each major construct—health in rural Canada, health information seeking, and rural gender identities—is discussed to highlight how specific embodiments of masculinity may promote and inhibit men’s health information–seeking and positive health behaviors

    Enhancing Key Digital Literacy Skills: Information Privacy, Information Security, and Copyright/Intellectual Property

    Get PDF
    Key Messages Background Knowledge and skills in the areas of information security, information privacy, and copyright/intellectual property rights and protection are of key importance for organizational and individual success in an evolving society and labour market in which information is a core resource. Organizations require skilled and knowledgeable professionals who understand risks and responsibilities related to the management of information privacy, information security, and copyright/intellectual property. Professionals with this expertise can assist organizations to ensure that they and their employees meet requirements for the privacy and security of information in their care and control, and in order to ensure that neither the organization nor its employees contravene copyright provisions in their use of information. Failure to meet any of these responsibilities can expose the organization to reputational harm, legal action and/or financial loss. Context Inadequate or inappropriate information management practices of individual employees are at the root of organizational vulnerabilities with respect to information privacy, information security, and information ownership issues. Users demonstrate inadequate skills and knowledge coupled with inappropriate practices in these areas, and similar gaps at the organizational level are also widely documented. National and international regulatory frameworks governing information privacy, information security, and copyright/intellectual property are complex and in constant flux, placing additional burden on organizations to keep abreast of relevant regulatory and legal responsibilities. Governance and risk management related to information privacy, security, and ownership are critical to many job categories, including the emerging areas of information and knowledge management. There is an increasing need for skilled and knowledgeable individuals to fill organizational roles related to information management, with particular growth in these areas within the past 10 years. Our analysis of current job postings in Ontario supports the demand for skills and knowledge in these areas. Key Competencies We have developed a set of key competencies across a range of areas that responds to these needs by providing a blueprint for the training of information managers prepared for leadership and strategic positions. These competencies are identified in the full report. Competency areas include: conceptual foundations risk assessment tools and techniques for threat responses communications contract negotiation and compliance evaluation and assessment human resources management organizational knowledge management planning; policy awareness and compliance policy development project managemen

    Access to justice for all: Towards an “expansive vision” of justice and technology.

    Get PDF
    In this paper, the authors examine developments in the Canadian access to justice dialogue from Macdonald’s seminal 2005 analysis to the recent reports of the National Action Committee on Access to Justice in Civil and Family Matters [NAC]. They draw on the NAC’s call for an “expansive vision” of access to justice as the basis for critically evaluating examples of particular technologies used or proposed as responses to the access to justice crisis in Canada. In so doing, they illustrate the importance of conscious consideration of deliverables and beneficiaries in prioritizing technologies for deployment, in determining how the technology ought to be deployed, and in evaluating the potential of a technology to facilitate access to justice. The authors argue that nuanced accounts of the relationships between justice deliverables, technological mechanisms for delivery and intended justice beneficiaries are essential to developing good decision-making mechanisms with respect to access to justice and technology. Dans le prĂ©sent article, les auteurs examinent l’évolution du dialogue canadien sur l’accĂšs Ă  la justice, depuis l’analyse fondamentale de Macdonald en 2005 jusqu’aux rĂ©cents rapports du ComitĂ© national d’action sur l’accĂšs Ă  la justice en matiĂšre civile et familiale (CNA). Ils se fondent sur la « vision Ă©largie » de l’accĂšs Ă  la justice rĂ©clamĂ©e par le CNA pour Ă©valuer de façon critique les exemples de technologies particuliĂšres utilisĂ©es ou proposĂ©es pour rĂ©pondre Ă  la crise de l’accĂšs Ă  la justice au Canada. Ce faisant, ils illustrent l’importance d’examiner de façon consciente les livrables et les bĂ©nĂ©ficiaires pour classer par ordre de prioritĂ© les technologies Ă  dĂ©ployer, pour dĂ©terminer comment la technologie devrait ĂȘtre dĂ©ployĂ©e et pour Ă©valuer le potentiel d’une technologie de faciliter l’accĂšs Ă  la justice. Les auteurs soutiennent que des comptes rendus nuancĂ©s des rapports entre les livrables en matiĂšre de justice, les mĂ©canismes de livraison technologiques et les bĂ©nĂ©ficiaires prĂ©vus sont essentiels pour Ă©laborer de bons mĂ©canismes dĂ©cisionnels en ce qui concerne l’accĂšs Ă  la justice et la technologie
    corecore