Skip to main content

The Design of a Multi-layer Scrutiny Protocol to Support Online Privacy and Accountability

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8463))

Abstract

Information systems design must balance requirements of privacy and accountability for the good of individuals and society. Drawing from an evolving theory of scrutiny, we propose a multi-layer protocol to support the rigorous application of privacy rules and accountability rules in sensitive online applications. We ground our study in the context of the design and development of an eHealth system for psychosocial care. Privacy protections are balanced with the need to provide for accountable interventions in well-defined critical care situations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aakhus, M., Ågerfalk, P., Lyytinen, K., Te’eni, D.: Call for Paper: Information Systems for Symbolic Action: Social Media and Beyond. MIS Quarterly (2011)

    Google Scholar 

  2. Barak, A., Hen, L., Boniel-Nissim, M., Shapira, N.: A Comprehensive Review and a Meta-Analysis of the Effectiveness of Internet-Based Psychotherapeutic Interventions. Journal of Technology in Human Services 26(2/4), 109–160 (2008)

    Article  Google Scholar 

  3. Bélanger, F., Crossler, R.E.: Privacy in the Digital Age: A review of information privacy research in information systems. MIS Quarterly 35(4), 1017–1041 (2011)

    Google Scholar 

  4. Culnan, M.J.: Consumer Privacy, Technology and Policy. In: George, J.F. (ed.) Computers in Society: Privacy, Ethics and the Internet, pp. 171–183. Pearson/Prentice Hall, Upper Saddle River (2003)

    Google Scholar 

  5. Garfinkel, H.: Studies in Ethnomethodology. Polity Press, Cambridge (1967)

    Google Scholar 

  6. Goldkuhl, G., Agerfalk, P.J.: IT Artefacts as Socio-Pragmatic Instruments: Reconciling the Pragmatic, Semiotic, and Technical. International Journal of Technology and Human Interaction 1(3), 29–43 (2005)

    Article  Google Scholar 

  7. Gregor, S.: The Nature of Theory in Information Systems. MIS Quarterly 30(3), 611–642 (2006)

    Google Scholar 

  8. Gregor, S., Hevner, A.R.: Positioning and Presenting Design Science Research for Maximum Impact. MIS Quarterly 37(2), 337–355 (2013)

    Google Scholar 

  9. Gregor, S., Jones, D.: The anatomy of a design theory. Journal of the Association for Information Systems 8(5), 312–335 (2007)

    Google Scholar 

  10. Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in Information Systems research. MIS Quarterly 28(1), 75–105 (2004)

    Google Scholar 

  11. Lee, A.S., Baskerville, R.: Generalizing Generalizability in Information Systems Research. Information Systems Research 14(3), 221–243 (2003)

    Article  Google Scholar 

  12. Merriam-Webster: Privacy, http://www.merriam-webster.com/dictionary/privacy

  13. Riley, S., Veale, D.: The Internet & its Relevance to Cognitive Behavioural Psychotherapists. Behavioural and Cognitive Psychotherapy 27(1), 37–46 (1999)

    Google Scholar 

  14. Sjöström, J., Ågerfalk, P.J., Hevner, A.R.: Privacy and Accountability in Online Communities: Towards a Theory of Scrutiny. In: Helfert, M., Donnellan, B. (eds.) Proceedings of European Design Science Symposium 2013. To appear in CCIS. Springer (2013)

    Google Scholar 

  15. Smith, H.J., Dinev, T.: Information Privacy Research: An interdisciplinary review. MIS Quarterly 35(4), 989–1015 (2011)

    Google Scholar 

  16. Suler, J.: The Online Disinhibition Effect. Cyberpsychology and Behavior 7(3), 321–327 (2004)

    Article  Google Scholar 

  17. Tate, D., Finkelstein, E.: Cost effectiveness of internet interventions: review and recommendations. Annals of Behavioral Medicine 38(1), 40–45 (2009)

    Article  Google Scholar 

  18. United Nations: The Universal Declaration of Human Rights, http://www.webcitation.org/6LIK5GgYI

  19. Weber, M.: Economy and Society. University of California Press, Berkeley (1978)

    Google Scholar 

  20. Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J.: Information accountability. Communications of the ACM 51(6), 82–87 (2008)

    Article  Google Scholar 

  21. Zhuo, J.: Where Anonymity Breeds Contempt. The New York Times (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Sjöström, J., Ågerfalk, P.J., Hevner, A.R. (2014). The Design of a Multi-layer Scrutiny Protocol to Support Online Privacy and Accountability. In: Tremblay, M.C., VanderMeer, D., Rothenberger, M., Gupta, A., Yoon, V. (eds) Advancing the Impact of Design Science: Moving from Theory to Practice. DESRIST 2014. Lecture Notes in Computer Science, vol 8463. Springer, Cham. https://doi.org/10.1007/978-3-319-06701-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06701-8_6

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06700-1

  • Online ISBN: 978-3-319-06701-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics