Skip to main content

Privacy and Security—Limits of Personal Information to Minimize Loss of Privacy

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 70))

Included in the following conference series:

Abstract

The current information age enabled the direct access to personal information that rapidly invades private space. With the advent of new information technology’s equipment and innovations the time and distance limitations of communication got minimized that leads to more interaction among IT users. Thus with the expansion of information society the privacy violation becomes prominent as well as privacy dilemma got increased. IT users think that personal information is used for other purposes rather than security. The things are getting worse when the organization outsources data processing to other suppliers and sometime share information with third parties. All these steps are rapidly increasing users’ attention towards their personal information. The aim of this research is to investigate the concerns of IT users about their personal information and to find out that how much personal information users would like to provide to government, secured organizations, private organizations’ websites and social media. Data has been collected through a questionnaire from the students of Department of Computer and System Sciences (DSV), Stockholm University, Sweden and Royal Institute of Technology (KTH), Stockholm Sweden. The findings of the research study show that all the participants had deep knowledge about privacy. They were highly concerned about sharing their personal information with third parties. More importantly, respondents refused to provide complete personal information to nonprofit organizations and social media. On the other hand, the survey result reflects that people provide their complete personal information to organizations such as Swedish Migrationsverket, Skatteverket, and to DSV, KTH and Swedish banks. The IT users believed that these systems are quiet secure for their personal information and they will not use their information for other purposes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Introna, L.D.: Privacy and the computer: why we need privacy in the information society. Metaphilosophy 28, 259–275 (1997)

    Article  Google Scholar 

  2. Shattuck, J.: Computer matching is a serious threat to individual rights. Commun. ACM 27, 538–541 (1984)

    Article  Google Scholar 

  3. Clarke, R.: Information technology and dataveillance. Commun. ACM 31, 498–512 (1988)

    Article  Google Scholar 

  4. Van Dijck, J.: Datafication, dataism and dataveillance: big data between scientific paradigm and ideology. Surveill. Soc. 12(2), 197 (2014)

    Article  Google Scholar 

  5. Jeff, S.H.: Privacy policies and practices: inside the organizational maze. Commun. ACM 36, 104–122 (1993)

    Google Scholar 

  6. Yu, Y., Wang, Q., Ke, Z.: Research on security for personal information and privacy under network environment. In: International Conference on Computational Intelligence and Natural Computing, IEEE, vol. 2, pp. 277–279 (2009)

    Google Scholar 

  7. Udo, G.J.: Privacy and security concerns as major barriers for e-commerce: a survey study. Inf. Manag. Comput. Secur. 9(4), 165–174 (2001)

    Article  Google Scholar 

  8. Schneier, B.: What our top spy doesn’t get: security and privacy aren’t opposites. https://www.wired.com/2008/01/securitymatters-0124/

  9. Schneier, B.: Protecting privacy and liberty (2001) https://www.schneier.com/essays/archives/2001/10/protecting_privacy_a.html

    Article  Google Scholar 

  10. Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51, 337–350 (2009)

    Article  Google Scholar 

  11. Katz, J.E., Tassone, A.R.: A report: public opinion trends: privacy and information technology. Public Opin. Q. 54, 125–143 (1990)

    Article  Google Scholar 

  12. Gavison, R.: Privacy and the limits of law. Yale Law J. 89, 421–471 (1980)

    Article  Google Scholar 

  13. Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4, 193–220 (1890)

    Article  Google Scholar 

  14. Haag, V.D.: On privacy. In: Pennock, J.R., Chapman, J.W. (eds) Privacy (Nomos XIII: year book of the American Society for Political and Legal Philosophy), New York: Atherton (1971)

    Google Scholar 

  15. Gross, H.: The concept of privacy. New York Univ. Law 42, 35–36 (1967)

    Google Scholar 

  16. Fried, C.: Privacy. Yale Law J. 77(3), 475–493 (1968)

    Article  Google Scholar 

  17. Westin, A.F.: Piracy and freedom. Washington and Lee Law Review 25 (1968)

    Google Scholar 

  18. Parker, R.B.: A definition of privacy. California Law Rev. 27, 275 (1974)

    Google Scholar 

  19. Johnson, J.L.: Privacy and the judgement of others. J. Value Inq. 23, 157–168 (1989)

    Article  Google Scholar 

  20. Decew, J.W.: The scope of privacy in law and ethics. Law Philos. 5, 145–173 (1986)

    Google Scholar 

  21. Baars, H., Hintzbergen, J., Smulders, A., Hintzbergen, K.: Foundations of information security based on ISO27001 and ISO27002. Van Haren Publishing (2010)

    Google Scholar 

Download references

Acknowledgements

The authors would to acknowledge the Higher Education Commission of Pakistan for supporting the work and providing the grant, under the grant No. Ref. No.300.362/TG/R&D/HEC/2018/26774.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanif Ur Rahman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rahman, H.U., Rehman, A.U., Nazir, S., Rehman, I.U., Uddin, N. (2020). Privacy and Security—Limits of Personal Information to Minimize Loss of Privacy. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_65

Download citation

Publish with us

Policies and ethics