Skip to main content

Theoretical Framework for Privacy in Interpersonal Information Communication

  • Conference paper
  • First Online:
Proceedings of the International Conference on Data Engineering and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 468))

  • 1464 Accesses

Abstract

In the world of Internet, the number of users and applications has been increasing unprecedentedly, as well as the complexity of interactions. Users communicate directly as well as through applications and the services that each of them in turn invoke. In this fast increasing complexity, users not only share their personal information intentionally to gain a benefit, but does inadvertently end up giving away much more information than what they will willingly give, compromising privacy requirement of not only themselves but that of their contacts as well. The outcomes of earlier studies swing from too simple postulation of tradeoff between secrecy and benefit of sharing, to too complex definitions, both of which makes privacy enforceability practically hard in the current and future scenarios, while preserving universality. This paper provides a way for theoretically capturing the complex relationship of interpersonal information communication by providing a framework within which any systems interpersonal information and its communication can be dynamically modeled but yet its applicability is not restricted to only a subset of application contexts or locations or time. This model provides the necessary theoretical foundation for analyzing the different user requirement attributes like sharing and secrecy, whose complex interplay makes up for the notion of Privacy. From simple clear evidence of presenting the relationship between sharing and secrecy, to the ability of this framework to capture dynamic user and group behavior within a system is presented. This paper also lays the road ahead of how this model can be used to predict user aspirations and arrive at privacy policy specifications for any given system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Warren S, Brandeis L. The right to privacy. Harvard LawReview (1890).

    Google Scholar 

  2. Ds Westin A. Privacy and freedom. New York: Atheneum (1967).

    Google Scholar 

  3. Altman, I., The Environment and Social Behaviour: Privacy, Personal Space, Territory, Crowding, Monterey. CA (1975).

    Google Scholar 

  4. Child, Jeffrey T., and Sandra Petronio. Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet, Computer-mediated communication in personal relationships (2011).

    Google Scholar 

  5. Ajzen, I., Fishbein, M., Attitudebehavior relations: A Theoretical Analysis and Review Of Empirical Research, Psychological Bulletin (1975).

    Google Scholar 

  6. Judith S. Olson, J. G., Eric Horvitz. “A Study of Preferences for Sharing and Privacy.” Human Factors in Computing Systems: 1985–1988 (2005).

    Google Scholar 

  7. Livingstone, S., lafsson, K., Staksrud, Risky social networking practices among under age users: Lessons for evidence based policy. Journal for Computer Mediated Communication, 18(3), 303–32 (2013).

    Google Scholar 

  8. NIST, NIST Privacy Engineering Objectives and Risk Model Discussion Draft-http://www.nist.gov/itl/csd/upload/nist_privacy_engr_objectives_risk_model_discussion_draft.pdf (2014).

  9. NIST, NIST Privacy Engineering Workshop Discussion eckhttp://www.nist.gov/itl/csd/upload/nist_privacy_engr_objectives_risk_model_discussion_deck.pdf (2014).

Download references

Acknowledgments

We thank Mr. U. Thiruvaazhi (Isha Higher Education, Coimbatore, India) toward his valuable suggestions for the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Shanmughapriya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Shanmughapriya, T., Swamynathan, S. (2017). Theoretical Framework for Privacy in Interpersonal Information Communication. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 468. Springer, Singapore. https://doi.org/10.1007/978-981-10-1675-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1675-2_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1674-5

  • Online ISBN: 978-981-10-1675-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics