Privacy and Security—Limits of Personal Information to Minimize Loss of Privacy
The current information age enabled the direct access to personal information that rapidly invades private space. With the advent of new information technology’s equipment and innovations the time and distance limitations of communication got minimized that leads to more interaction among IT users. Thus with the expansion of information society the privacy violation becomes prominent as well as privacy dilemma got increased. IT users think that personal information is used for other purposes rather than security. The things are getting worse when the organization outsources data processing to other suppliers and sometime share information with third parties. All these steps are rapidly increasing users’ attention towards their personal information. The aim of this research is to investigate the concerns of IT users about their personal information and to find out that how much personal information users would like to provide to government, secured organizations, private organizations’ websites and social media. Data has been collected through a questionnaire from the students of Department of Computer and System Sciences (DSV), Stockholm University, Sweden and Royal Institute of Technology (KTH), Stockholm Sweden. The findings of the research study show that all the participants had deep knowledge about privacy. They were highly concerned about sharing their personal information with third parties. More importantly, respondents refused to provide complete personal information to nonprofit organizations and social media. On the other hand, the survey result reflects that people provide their complete personal information to organizations such as Swedish Migrationsverket, Skatteverket, and to DSV, KTH and Swedish banks. The IT users believed that these systems are quiet secure for their personal information and they will not use their information for other purposes.
KeywordsPrivacy Security Privacy loss Personal information
The authors would to acknowledge the Higher Education Commission of Pakistan for supporting the work and providing the grant, under the grant No. Ref. No.300.362/TG/R&D/HEC/2018/26774.
- 5.Jeff, S.H.: Privacy policies and practices: inside the organizational maze. Commun. ACM 36, 104–122 (1993)Google Scholar
- 6.Yu, Y., Wang, Q., Ke, Z.: Research on security for personal information and privacy under network environment. In: International Conference on Computational Intelligence and Natural Computing, IEEE, vol. 2, pp. 277–279 (2009)Google Scholar
- 8.Schneier, B.: What our top spy doesn’t get: security and privacy aren’t opposites. https://www.wired.com/2008/01/securitymatters-0124/
- 9.Schneier, B.: Protecting privacy and liberty (2001) https://www.schneier.com/essays/archives/2001/10/protecting_privacy_a.htmlCrossRefGoogle Scholar
- 14.Haag, V.D.: On privacy. In: Pennock, J.R., Chapman, J.W. (eds) Privacy (Nomos XIII: year book of the American Society for Political and Legal Philosophy), New York: Atherton (1971)Google Scholar
- 15.Gross, H.: The concept of privacy. New York Univ. Law 42, 35–36 (1967)Google Scholar
- 17.Westin, A.F.: Piracy and freedom. Washington and Lee Law Review 25 (1968)Google Scholar
- 18.Parker, R.B.: A definition of privacy. California Law Rev. 27, 275 (1974)Google Scholar
- 20.Decew, J.W.: The scope of privacy in law and ethics. Law Philos. 5, 145–173 (1986)Google Scholar
- 21.Baars, H., Hintzbergen, J., Smulders, A., Hintzbergen, K.: Foundations of information security based on ISO27001 and ISO27002. Van Haren Publishing (2010)Google Scholar