首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider means of strengthening employees’ negotiating power. This article emphasizes the importance of contextualizing consent for contractual agreements to be ethically acceptable.  相似文献   

2.
Why are ongoing legal, design, and policy debates around information privacy often divorced from the lived experience of everyday digital media use? This article argues that human emotion is a critical but undertheorized element in users' subjective sense of information privacy. The piece advocates for a greater attention to the phenomenology of feeling and to the concept of “visceral” design in information privacy scholarship, policy, and design practice.  相似文献   

3.
It is sometimes suggested thatthere is no conception of privacy in Japan orthat, if there is, it is completely differentfrom Western conceptions of privacy. If thiswere so, finding common ground between Japanand the West on which to establish privacypolicies for the internet would be extremelydifficult if not impossible. In this paper wedelineate some of the distinctive differencesin privacy practices in Japan, but we maintainthat these differences do not prevent theestablishment of sound, shared, ethicalinformation privacy policies. We distinguishbetween a minimal conception of privacy that webelieve is shared by Japan and other societiesand richer conceptions of privacy that oftenreflect patterns of behavior distinctive ofparticular cultures. Although Japan and othersocieties share at least a minimal sense ofprivacy, a base on which to build, robustprivacy protection will not exist on theinternet until an internationally accepted richsense of privacy is developed.  相似文献   

4.
5.
Solutions to the problem ofprotecting informational privacy in cyberspacetend to fall into one of three categories:technological solutions, self-regulatorysolutions, and legislative solutions. In thispaper, I suggest that the legal protection ofthe right to online privacy within the USshould be strengthened. Traditionally, inidentifying where support can be found in theUS Constitution for a right to informationalprivacy, the point of focus has been on theFourth Amendment; protection in this contextfinds its moral basis in personal liberty,personal dignity, self-esteem, and othervalues. On the other hand, the constitutionalright to privacy first established by Griswoldv. Connecticut finds its moral basis largelyin a single value, the value of autonomy ofdecision-making. I propose that an expandedconstitutional right to informational privacy,responsive to the escalating threats posed toonline privacy by developments in informationaltechnology, would be more likely to find asolid moral basis in the value of autonomyassociated with the constitutional right toprivacy found in Griswold than in the varietyof values forming the moral basis for the rightto privacy backed by the Fourth Amendment.  相似文献   

6.
In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy. This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information can violate privacy but does not call for consent.  相似文献   

7.
Use of the concept of `areasonable person and his or her expectations'is widely found in legal reasoning. This legalconstruct is employed in the present article toexamine privacy questions associated withcontemporary information technology, especiallythe internet. In particular, reasonableexpectations of privacy while browsing theworld-wide-web and while sending and receivinge-mail are analyzed.  相似文献   

8.
9.
Requesting personal information in frontline service encounters raises privacy concerns among customers. The proximity contact tracing that occurred during the COVID-19 pandemic provides an intriguing context of information requests. Hospitality venues required contact tracing details from customers, and customer cooperation varied with concerns about privacy. Drawing on gossip theory, we investigate the roles of businesses’ data privacy practices and government support in driving customers’ responses to contact tracing. Our findings show that perceived transparency of a business’s privacy practices has a positive effect on customers’ commitment to the business, while perceived control exerts a negative effect on commitment. These effects are mediated by customers’ information falsification rather than disclosure, because the former is a sensitive behavioral indicator of privacy concerns. The results also reveal the moderating roles of government support. This research contributes to the customer data privacy literature by demonstrating the distinct effects of perceived transparency and control on commitment and revealing the underlying mechanism. Moreover, the research extends the conceptual understanding of privacy practices from online contexts to face-to-face contexts of frontline service. The findings offer implications for the management of customer data privacy.  相似文献   

10.
大数据环境下用户隐私顾虑日益加深。尝试从用户对威胁的评估以及组织的隐私政策方面研究当下隐私现状,有利于企业在保护个人隐私的前提下更好地发展。基于保护动机理论,实证研究威胁评估、网络隐私顾虑和组织隐私政策(重要性认知)的关系及其作用机理。研究结果表明:威胁评估和组织隐私政策都对网络隐私顾虑起正向影响作用;组织隐私政策作为调节变量,在威胁评估与网络隐私顾虑间的调节作用并不显著,只在威胁评估与隐私控制的关系中起显著反向调节作用。  相似文献   

11.
Abstract

This paper first reviews the development of record‐keeping privacy, together with its legislative attention and major studies of it. It then identifies new dimensions of personal privacy and illustrates them with electronic mail. It notes the intricacy of policy issues arising from large‐scale use of computers and communications for systems that provide a variety of services, many of them oriented toward the individual. The legislative awkwardness of providing protection to the individual and the role of the federal government in the entire issue is described. Other systems that will create new privacy issues are touched on. The “privacy future” is discussed in terms of access‐without‐action, information representation, information protection, exploitation of information such as computer matching, the large‐scale availability of personal information to many people, and the widespread appearance of systems that deal with information about people but for other than record‐keeping purposes. Finally, two broad policy issues are identified: (1) In an information‐intensive future, how can the country establish societally acceptable usage patterns for information but at the same time provide protection for its citizens? (2) How can the country create an appropriate mechanism for addressing such a pervasive and complex issue?  相似文献   

12.
阐述脑机接口技术自身和技术应用可能带来的隐私风险,以及这种风险所带有的新特征,并试图从技术本身、法律与伦理这3个角度给出解决上述问题的框架.  相似文献   

13.
A case from 1996 in Oregon in which citizens' legally publicmotor vehicle information was disseminated on a World Wide Website is considered. The case evoked widespread moral outrageamong Oregonians and led to changes in the Oregon records laws.The application of either consequentialist ornon-consequentialist moral theories to this and otherinformational privacy cases is found to be inadequate.Adjudication of conflicting desires is offered as the appropriateanalytical model for moral disputes. The notion of adjudicationoffered here diverges from traditional moral theories in itsindeterminate nature.  相似文献   

14.
Post-mortem privacy is becoming a vital topic of public and scholarly legal concern. Post-mortem privacy is understood as the right of a person to preserve and control what becomes of his reputation and dignity after death. The assumption that the deceased does not qualify for privacy rights, because his bodily presence has been terminated, no longer holds in our networked society. In the digital age, the phenomenon of the digital legacy that an Internet user leaves behind after his demise, has led to new challenges for the legal system. The deceased is no longer in a position to exercise human autonomy as an active agent. The article reconsiders the notion of human autonomy with regard to these digital representations. Taking the point of view that the control over personal information (also known as informational self-determination) is essential in protecting one’s privacy in the antemortem life, the article explores whether this principle may have validity in the postmortem context. Legal philosophical arguments are advanced in a discourse about the quandary if digital personae of deceased persons can be bestowed with a legal basis of personality rights and concomitantly privacy rights. Therefore much attention is given to the problem of the subject, which does not seem to be functioning in the case of the absence of a living subject. Briefly referring to novel personae, it is argued that fundamental human rights need not be limited to the rights of living human beings.  相似文献   

15.
Owen revisited     
  相似文献   

16.
The purpose of this article and the special issue is to improve our understanding of the theoretical, managerial, and policy implications of entrepreneurial innovation. We accomplish this objective by examining the role of context in stimulating such activity, as well as its impact on the outcomes of entrepreneurial innovation. Our analysis begins by outlining an overarching framework for entrepreneurial innovation and context. With reference to this framework we then compare the attributes of national innovation systems, entrepreneurship and entrepreneurial innovation, and categorize contextual influences on entrepreneurial innovation. We then situate the papers presented in this special issue within this framework. We conclude by outlining an agenda for additional research on this topic, focusing on the relationships between contexts and entrepreneurial innovation and then discuss policy implications, focusing on how public and private actors can meet these challenges.  相似文献   

17.
随着各种各样移动设备的普及,轨迹隐私保护问题变得日益严峻,作为轨迹隐私保护的一个方向,国内外开始慢慢建立起一些较为成熟的度量机制,常见的有基于k-匿名保护机制的隐私度量方法、基于跟踪的度量方法、针对特定匿名系统的轨迹隐私度量方法等。文章在现有研究的基础上构建了了一种基于假数据轨迹隐私保护技术的隐私度量标准,从发布假轨迹上点之间的关联性、发布数据所包含信息的精确度以及攻击者所拥有背景知识多少三个方面进行轨迹隐私保护度的全面度量。  相似文献   

18.
Users increasingly use mobile devices to engage in social activity and commerce, enabling new forms of data collection by firms and marketers. User privacy expectations for these new forms of data collection remain unclear. A particularly difficult challenge is meeting expectations for contextual integrity, as user privacy expectations vary depending upon data type collected and context of use. This article illustrates how fine-grained, contextual privacy expectations can be measured. It presents findings from a factorial vignette survey that measured the impact of diverse real-world contexts (e.g., medical, navigation, music), data types, and data uses on user privacy expectations. Results demonstrate that individuals’ general privacy preferences are of limited significance for predicting their privacy judgments in specific scenarios. Instead, the results present a nuanced portrait of the relative importance of particular contextual factors and information uses, and demonstrate how those contextual factors can be found and measured. The results also suggest that current common activities of mobile application companies, such as harvesting and reusing location data, images, and contact lists, do not meet users’ privacy expectations. Understanding how user privacy expectations vary according to context, data types, and data uses highlights areas requiring stricter privacy protections by governments and industry.  相似文献   

19.
Caller ID service continues to be a controversial issue in the U.S. because of its privacy implications. State and federal regulators, legislators, scholars, and the courts have examined and responded to the privacy issue from a policy perspective, but perhaps without a complete understanding of the meaning of privacy in the context of the debate. What types of privacy are involved, how significant are these interests, and how might privacy needs compare and be balanced? This article explores privacy in the context of the Caller ID debate from a social science perspective. It examines motives for seeking and preserving privacy and explores the dynamic relationship between the caller and called party positions. It then provides an analysis of current and proposed Caller ID features and policies with a view toward understanding how these proposals balance competing privacy needs. This article establishes an analytic framework and a foundation for further study of caller and called party privacy that should lead to a better understanding of the privacy debate and the privacy implications of Caller ID.  相似文献   

20.
卫生统计学(Health Statistics)在撰写医学论文的整个过程中都发挥着非常重要的作用。大多数医学论文,从资料的搜集、整理、分析都是离不开卫生统计学,即使画个表格也需要严格按照卫生统计学的要求来设计。因此,要想写出一篇有价值的医学论文,首先就要对卫生统计学的知识要有一定的了解,只有这样才能够给撰写真正具有科学性的、高品质的医学论文奠定坚实的基础。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号