Skip to main content

Consent as Mechanism to Preserve Information Privacy: Its Origin, Evolution, and Current Relevance

  • Conference paper
  • First Online:
Security and Trust Management (STM 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14336))

Included in the following conference series:

  • 149 Accesses

Abstract

Informed consent and the requirements to obtain ethical-legal sound consent has a long and rich history that originated with the medical treatment of patients and then evolved into its application in the field of biomedical research. The same concepts and principles of consent has been adopted to be applied in the digital sphere. However, upon closer scrutiny it is clear why this principle, that originated for the protection of a person’s bodily integrity cannot be adequately applied in the digital sphere to protect people’s personal data. To the contrary it transpired that the ethical-legal requirements of consent has been made futile in the context of digital consent receipts by erroneously comparing and applying this concept to transactions receipts and commercial contracts. This paper investigates this evolution of biomedical consent to digital consent and analyze the difference between the concept of consent as it developed for biomedical application and compare that with the current application of consent in the digital sphere.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Vollmann, J., Winau, R.: Nuremberg doctors’ trial: informed consent in human experimentation before the nuremberg code. BMJ 313, 1445–1447 (1996)

    Article  Google Scholar 

  2. Nuremberg Military Tribunal. The nuremberg code. JAMA 276(20), 1691 (1996)

    Google Scholar 

  3. Novitzky, P., Chen, C., Smeaton, A.F., Verbruggen, R., Gordijn, B.: Issues of informed consent from persons with dementia when employing assistive technologies. In: Intelligent Assistive Technologies for Dementia: Clinical, Ethical, Social, and Regulatory Implications. vol. 2, pp. 166 (2019)

    Google Scholar 

  4. Human, D., Fluss, S.S.: The World Medical Association’s declaration of Helsinki: Historical and contemporary perspectives. In: World Medical Association, pp. 1–24 (2001)

    Google Scholar 

  5. Gefenas, E., Tuzaite, E.: Persons without the capacity to consent. Handbook of Global Bioethics. Dordrecht: Springer Science+ Business Media, pp. 85–103 (2014)

    Google Scholar 

  6. Beauchamp, T.L., Childress, J.F.: Principles of Biomedical Ethics, 7th edn. Oxford University Press, New York (2013)

    Google Scholar 

  7. Brandt, A.M.: Racism and research: the case of the Tuskegee syphilis study. Hastings Cent. Rep. 8(6), 21–29 (1978)

    Article  Google Scholar 

  8. The Belmont Report. Ethical Principles and Guidelines for the Protection of Human Subjects of Research. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research (1979)

    Google Scholar 

  9. Bailey, M., Dittrich, D., Kenneally, E., Maughan, D.: The menlo report. IEEE Secur. Priv. 10(2), 71–75 (2012)

    Article  Google Scholar 

  10. Lizar, M., Hodder, M.: Usable Consents. Tracking and Managing Use of Personal Data with a Consent Transaction Receipt. UbiComp. Seattle, WA, USA (2014)

    Google Scholar 

  11. Open Notice. http://opennotice.smartspecies.com/about/. Accessed 14 Jun 2022

  12. Sanchini, V., et al.: Informed consent as an ethical requirement in clinical trials: an old, but still unresolved issue. An observational study to evaluate patient’s informed consent comprehension. J. Med. Ethics 40(4), 269–75 (2014)

    Google Scholar 

  13. Kasireddy, P.: How does Ethereum work, anyway. Medium. http://www.easygoing.pflog.eu/32_blockchain_P2P/ethereum_blockchain.pdf. Accessed 03 Aug 2022

  14. Consent Receipt Specification 1.1.0. Kantara Initiative Consent & Information Sharing Work Group. Kantara Initiative Technical Specification Recommendation (2018) https://kantarainitiative.org/download/7902/. Accessed 03 Aug 2022

  15. Vitor, J.: Towards an accountable web of personal information: the web-of-receipts. IEEE Access 8, 25383–25394 (2020)

    Article  Google Scholar 

  16. European Commission. Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (Data Protection Directive). General Data Protection Regulation (GDPR), Article 12

    Google Scholar 

  17. ISO/IEC 29184:2020 standard for Online Privacy Notices and Consent

    Google Scholar 

  18. ISO/IEC 29100 Lead Privacy Framework

    Google Scholar 

  19. European Commission. Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (Data Protection Directive). General Data Protection Regulation (GDPR), Articles 9 and 29

    Google Scholar 

  20. Santos, C., Bielova, N., Matte, C.: Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners. Technol. Regul. 2020, 91–135 (2020)

    Google Scholar 

  21. Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the internet: ignoring the privacy policies and terms of service policies of social networking services. Inf. Commun. Soc. 23(1), 128–147 (2020)

    Article  Google Scholar 

  22. Urban, T., Tatang, D., Degeling, M., Holz, T., Pohlmann, N.: Measuring the Impact of the GDPR on Data Sharing in Ad Networks. In: ASIA CCS. ACM, Taipei, Taiwan. 15 (2020)

    Google Scholar 

  23. Consumer Privacy Act. US. Section 1798.120. Right to opt-out of sale of personal information, selling minors’ personal information (2020)

    Google Scholar 

  24. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. 1979. https://www.hhs.gov/ohrp/sites/default/files/the-belmont-report-508c_FINAL.pdf. Accessed 27 Jan 2023

  25. European Commission. Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (Data Protection Directive). General Data Protection Regulation (GDPR), Recitals 58 and 39

    Google Scholar 

  26. Klenk, M., Jongepier, F. (eds.) The Philosophy of Online Manipulation, Routledge (2022)

    Google Scholar 

  27. Yu, T.K., Lin, M.L., Liao, Y.K.: Understanding factors influencing information communication technology adoption behavior: the moderators of information literacy and digital skills. Comput. Hum. Behav. 1(71), 196–208 (2017)

    Article  Google Scholar 

  28. Nouwens, M., Liccardi, I., Veale, M., Karger, D., Kagal, L.: Dark patterns after the GDPR: Scraping consent pop-ups and demonstrating their influence. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–13 (2020)

    Google Scholar 

  29. Court of Justice of the European Union. 2019b. Case C-673/17 Planet49 GmbH v Bundesverband der Verbraucherzentralen und Verbraucherverbände – Verbraucherzentrale Bundesverband e.V. ECLI:EU:C:2019:801 (2019)

    Google Scholar 

  30. United Kingdom. Information Commissioner’s Office. Guidance on the use of cookies and similar technologies (2019) https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/. Accessed 27 Jan 2023

  31. Brandt, A.M.: Racism and research: the case of the Tuskegee Syphilis Study. Hastings Cent. Rep. 1, 21–29 (1978)

    Article  Google Scholar 

  32. Krugman, S.: The Willowbrook hepatitis studies revisited: ethical aspects. Rev. Infect. Dis. 8(1), 157–162 (1986)

    Article  Google Scholar 

  33. World Medical Association. WMA Declaration of Helsinki – Ethical Principles for Medical Research Involving Human Subjects. Adopted by the 18th WMA General Assembly, Helsinki, Finland, June 1964 and as amended by the 64th WMA General Assembly, Fortaleza, Brazil, October 2013

    Google Scholar 

  34. Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304–312 (2014)

    Article  Google Scholar 

  35. Kaspersky.com. One-in-50 online transactions in the banking and e-commerce sectors, were fraudulent in 2019. (2020) https://www.kaspersky.com/about/press-releases/2020_one-in-50-online-transactions-in-the-banking-and-e-commerce-sectors-were-fraudulent-in-2019. Accessed 2023/01/27

  36. Baker, S.M., Gentry, J.W., Rittenburg, T.L.: Building understanding of the domain of consumer vulnerability. J. Macromark. 25(2), 128–139 (2005)

    Article  Google Scholar 

  37. Echeverri, P., Salomonson, N.: Consumer vulnerability during mobility service interactions: causes, forms, and coping. J. Mark. Manag. 35(3–4), 364–389 (2019)

    Article  Google Scholar 

  38. McKeage, K., Crosby, E., Rittenburg, T.: Living in a gender-binary world: implications for a revised model of consumer vulnerability. J. Macromark. 38(1), 73–90 (2018)

    Article  Google Scholar 

  39. Baker, S.M., Mason, M.J.: Toward a process theory of consumer vulnerability and resilience. In: Mick, D.G., Pettigrew, S., Pechmann, C., Ozanne, J.L. (eds.) Transformative Consumer Research for Personal and Collective Wellbeing, pp. 543–564. Routledge, New York, NY (2012)

    Google Scholar 

  40. Dunnett, S., Hamilton, K., Piacentini, M.: Consumer vulnerability: introduction to the special issue. J. Mark. Manag. 32(3–4), 207–210 (2016)

    Article  Google Scholar 

  41. European Data Protection Board. Guidelines 3/2022 on Dark patterns in social media platform interfaces: How to recognise and avoid them. Version 1.0. Adopted on 14 March 2022

    Google Scholar 

  42. Lockton, D.: Cognitive biases, heuristics, and decision-making in design for behaviour change. SSRN (2012)

    Google Scholar 

  43. Susser, D., Roessler, B., Nissenbaum, H.: Online manipulation: hidden influences in a digital world. Georgetown Law Technol Rev. 4(1), 1–45 (2019)

    Google Scholar 

  44. Fogg, B.J.: Persuasive technologies. Commun. ACM 42(5), 26–29 (1999)

    Article  Google Scholar 

  45. Botes, M.: Autonomy and the social dilemma of online manipulative behavior. AI Ethics 3, 315–323 (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marietjie Botes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Botes, M. (2023). Consent as Mechanism to Preserve Information Privacy: Its Origin, Evolution, and Current Relevance. In: Rios, R., Posegga, J. (eds) Security and Trust Management. STM 2023. Lecture Notes in Computer Science, vol 14336. Springer, Cham. https://doi.org/10.1007/978-3-031-47198-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-47198-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-47197-1

  • Online ISBN: 978-3-031-47198-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics