Privacy in the Information Society
eBook - ePub

Privacy in the Information Society

Volume II

Philip Leith, Philip Leith

  1. 574 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Privacy in the Information Society

Volume II

Philip Leith, Philip Leith

Book details
Book preview
Table of contents
Citations

About This Book

Information society projects promise wealth and better services to those countries which digitise and encourage the consumer and citizen to participate. As paper recedes into the background and digital data becomes the primary resource in the information society, what does this mean for privacy? Can there be privacy when every communication made through ever-developing ubiquitous devices is recorded? Data protection legislation developed as a reply to large scale centralised databases which contained incorrect data and where data controllers denied access and refused to remedy information flaws. Some decades later the technical world is very different one, and whilst data protection remains important, the cries for more privacy-oriented regulation in commerce and eGov continue to rise. What factors should underpin the creation of new means of regulation? The papers in this collection have been drawn together to develop the positive and negative effects upon the information society which privacy regulation implies.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Privacy in the Information Society an online PDF/ePUB?
Yes, you can access Privacy in the Information Society by Philip Leith, Philip Leith in PDF and/or ePUB format, as well as other popular books in Droit & Droit de la science et de la technologie. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Routledge
Year
2016
ISBN
9781351908771

Part I
Privacy Generally

[1]
An examination of the concern for information privacy in the New Zealand regulatory context

Ellen A. Rose *
Institute of Information and Mathematical Sciences, Massey University; Auckland 1310, New Zealand
Received 5 March 2004; received in revised form 23 April 2005; accepted 22 August 2005 Available online 5 October 2005
Abstract
This study used confirmatory factor analysis on responses from a random sample of 459 New Zealanders to examine the theoretical basis of the concern for information privacy. The results were interpreted using two competing theories to explain differences found in the structural model of the construct when testing it with a non-US sample. Differences between US and New Zealand privacy protection approaches reflected cross-national differences in privacy concerns. The findings should contribute to our understanding of cross-national information privacy concerns and have implications for policy instrument choices.
Keywords:
Concern for information privacy:
Data protection models;
Information privacy theory;
Structural equation modeling

1. Introduction

Increased consumer concerns about organizational practices in the collection and management of personal data have resulted from several. Firstly, advances in information technology (IT) have produced efficiencies that have increased the value of personal information as a commodity for exchange [22]. Secondly, globalization has increased the need for cross-border data flows leading to concerns about different levels of protection and safeguards. Thirdly, legislation to improve privacy protection has often been enacted in reaction to surveys of consumer concern but has later been followed by legislation to decrease privacy in reaction to catastrophic events, such as the 9/11 terrorist attack. Finally, an increase in the exchange of information between public and private organizations [17] and the availability of new surveillance capabilities has contributed to consumer fears of misuse. The ease of collecting and accessing information over global networks has made information privacy concern an international issue, complicated by the variability in the way it is defined and protected by laws and policies across countries [5,15,23,39].
The purpose of my study was to examine the CFIP construct using a non-US sample to determine whether empirical evidence could be found to support Westin's control theory of privacy, upon which the construct is based. If a lack of individual control over one's information is not the only plausible explanation underlying privacy concerns, individual procedural controls for fair information practice (FIP), such as choice and consent, may be necessary but insufficient ways to justify and manage privacy. Different policy instruments (such as law, privacy-enhancing technologies, international agreements, administrative regulation, and organizational policies) are used in different countries. Different conceptualizations of the dynamic associations between individuals, public and private organizations, and IT are reflected in the current variety of approaches [2]. Cross-national and cultural differences in the way that privacy is defined may also reflect different underlying explanations for information privacy concern.

2. Related work, theoretical framework, and hypotheses

2.1. CFIP as a multi-dimensional concept

A 15-item instrument, hereafter referred to as the CFIP instrument was developed by Smith et al. in Ref. [37] as a way of measuring the multi-dimensional nature of consumer concern for information privacy (CFIP). The CFIP instrument was based on an extensive review of the privacy literature and the use of rigorous procedures to test its validity and reliability using samples of US graduate students. The CFIP instrument was designed to measure levels of consumer concern about organizational information privacy practices with respect to the four first-order factors or dimensions of CFIP shown in Table 1. Concerns about organizational practice, such as collection, errors, secondary use, and unauthorized access to personal information, represent aspects of consumer concern in terms of losing the ability to control the collection, handling, and use of personal information. The fair information practices (FIPS) displayed here are the five principles adopted by the US Federal Trade Commission: notice, choice, security, access, and enforcement. They are common to all major international codes.
Despite the recognition of FIPS in US laws and organizational policies, consumer privacy concerns remain high, as evidenced by recent Harris Interactive polls [19-21] and the Federal Trade Commission studies [13,14]. Similarly, in NZ complaints to the Privacy Commissioner rose 10% in 2001 from the previous year. The largest categories of complaints were in gaining access to personal information held by others (29.6%) and concerns over unauthorized disclosure (29.3%) [36]. Privacy concerns reported in NZ surveys were higher when the Internet was involved (e.g. 86% concerned or very concerned) but lower (e.g. 47% concerned or very concerned) when other issues, such as health care, the environment, and crime, were simultaneously considered. The 47% represented a drop from 68% concerned or very concerned in the 1994 Brian Steel Survey (cited in Ref. [42]).
Two recent international studies [26,27] using the CFIP instrument found that consumers in countries with moderate regulatory models (e.g. US and New Zealand) had greater privacy concerns than consumers in countries with either no regulation or very high regulation. Levels of concern were not significantly different between countries with moderate regulatory models. It was assumed that high regulation resulted in fewer privacy violations, leading to fewer incidents reported in the media and lower concern or else that in countries with low concern, there was little pressure by the public or advocacy groups. Both studies used relatively small per country samples (n = 706 spread over 30 countries; n = 595 spread over 20 countries). All participants belonged to the IS Audit and Control Association (IS ACA), resulting in a sample biased towards employed males with higher levels of education.
CFIP was represented as a reflective second-order factor, underlying the four CFIP dimensions in the findings of a recent study of US consumers (biased towards the more educated and affluent) [38]. This factor was interpreted as the common aspect of an individual's concern about losing control over his or her private information underlying concerns specific to each dimension. This interpretation was based on the "control theory" of privacy attributed to Westin [44], whose 1967 definition stated: "Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others" (as opposed to the statement of Brandeis and Warren quoting Judge Cooley in 1890 that privacy was the right "to be let alone"). This definition reflects the individualist cultural model that prevails in North America [24]. Control is not separated from privacy in Westin's definition. The privacy as a control viewpoint has been widely used in recent studies, including [10,31]. Based on the control theory of privacy, I expected support for the following hypothesis:
Hypothesis H1a. Consumer concern for information privacy can be separated into concerns about unauthorized access, errors, secondary use, and collection where a common concern about loss of control underlies the distinct concerns.
This control theory has been criticized as confusing privacy with autonomy. Practically, it is impossible in today's world to have total control over personal information once it has been collected and dispersed [40]. A more recent, alternative view [28] is Moor's control/restricted ...

Table of contents