Abstract
The current information age enabled the direct access to personal information that rapidly invades private space. With the advent of new information technology’s equipment and innovations the time and distance limitations of communication got minimized that leads to more interaction among IT users. Thus with the expansion of information society the privacy violation becomes prominent as well as privacy dilemma got increased. IT users think that personal information is used for other purposes rather than security. The things are getting worse when the organization outsources data processing to other suppliers and sometime share information with third parties. All these steps are rapidly increasing users’ attention towards their personal information. The aim of this research is to investigate the concerns of IT users about their personal information and to find out that how much personal information users would like to provide to government, secured organizations, private organizations’ websites and social media. Data has been collected through a questionnaire from the students of Department of Computer and System Sciences (DSV), Stockholm University, Sweden and Royal Institute of Technology (KTH), Stockholm Sweden. The findings of the research study show that all the participants had deep knowledge about privacy. They were highly concerned about sharing their personal information with third parties. More importantly, respondents refused to provide complete personal information to nonprofit organizations and social media. On the other hand, the survey result reflects that people provide their complete personal information to organizations such as Swedish Migrationsverket, Skatteverket, and to DSV, KTH and Swedish banks. The IT users believed that these systems are quiet secure for their personal information and they will not use their information for other purposes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Introna, L.D.: Privacy and the computer: why we need privacy in the information society. Metaphilosophy 28, 259–275 (1997)
Shattuck, J.: Computer matching is a serious threat to individual rights. Commun. ACM 27, 538–541 (1984)
Clarke, R.: Information technology and dataveillance. Commun. ACM 31, 498–512 (1988)
Van Dijck, J.: Datafication, dataism and dataveillance: big data between scientific paradigm and ideology. Surveill. Soc. 12(2), 197 (2014)
Jeff, S.H.: Privacy policies and practices: inside the organizational maze. Commun. ACM 36, 104–122 (1993)
Yu, Y., Wang, Q., Ke, Z.: Research on security for personal information and privacy under network environment. In: International Conference on Computational Intelligence and Natural Computing, IEEE, vol. 2, pp. 277–279 (2009)
Udo, G.J.: Privacy and security concerns as major barriers for e-commerce: a survey study. Inf. Manag. Comput. Secur. 9(4), 165–174 (2001)
Schneier, B.: What our top spy doesn’t get: security and privacy aren’t opposites. https://www.wired.com/2008/01/securitymatters-0124/
Schneier, B.: Protecting privacy and liberty (2001) https://www.schneier.com/essays/archives/2001/10/protecting_privacy_a.html
Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51, 337–350 (2009)
Katz, J.E., Tassone, A.R.: A report: public opinion trends: privacy and information technology. Public Opin. Q. 54, 125–143 (1990)
Gavison, R.: Privacy and the limits of law. Yale Law J. 89, 421–471 (1980)
Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4, 193–220 (1890)
Haag, V.D.: On privacy. In: Pennock, J.R., Chapman, J.W. (eds) Privacy (Nomos XIII: year book of the American Society for Political and Legal Philosophy), New York: Atherton (1971)
Gross, H.: The concept of privacy. New York Univ. Law 42, 35–36 (1967)
Fried, C.: Privacy. Yale Law J. 77(3), 475–493 (1968)
Westin, A.F.: Piracy and freedom. Washington and Lee Law Review 25 (1968)
Parker, R.B.: A definition of privacy. California Law Rev. 27, 275 (1974)
Johnson, J.L.: Privacy and the judgement of others. J. Value Inq. 23, 157–168 (1989)
Decew, J.W.: The scope of privacy in law and ethics. Law Philos. 5, 145–173 (1986)
Baars, H., Hintzbergen, J., Smulders, A., Hintzbergen, K.: Foundations of information security based on ISO27001 and ISO27002. Van Haren Publishing (2010)
Acknowledgements
The authors would to acknowledge the Higher Education Commission of Pakistan for supporting the work and providing the grant, under the grant No. Ref. No.300.362/TG/R&D/HEC/2018/26774.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Rahman, H.U., Rehman, A.U., Nazir, S., Rehman, I.U., Uddin, N. (2020). Privacy and Security—Limits of Personal Information to Minimize Loss of Privacy. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_65
Download citation
DOI: https://doi.org/10.1007/978-3-030-12385-7_65
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12384-0
Online ISBN: 978-3-030-12385-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)