Technology-Related Privacy Concerns: An Emerging Challenge

Technology-Related Privacy Concerns: An Emerging Challenge

Cliona McParland (Dublin City University, Ireland) and Regina Connolly (Dublin City University, Ireland)
Copyright: © 2009 |Pages: 13
DOI: 10.4018/978-1-60566-222-0.ch012
OnDemand PDF Download:


While Internet-based technologies have the potential to empower users immensely, individuals are becoming increasingly aware of the ways in which those technologies can be employed to monitor their computer-based interactions. In the past, much attention has focused on the impact of technology-related privacy concerns from a transactional perspective. However, privacy concerns regarding communication monitoring are now emerging as a significant issue with the potential to negatively impact both productivity and morale within the computer-mediated work environment. This chapter outlines the evolution of technology-related privacy concerns. The lack of definitional consensus and the resulting conceptual and operational confusion that surrounds the privacy construct is described. Furthermore, the significant deficit of rigorous academic studies on this topic is highlighted. The current state of privacy legislation in Europe is addressed and some of the key challenges that face researchers who may wish to conduct research on this phenomenon are outlined.
Chapter Preview


Privacy has been a contentious issue throughout the ages as individuals have sought to protect their personal information from misuse by others. The advent of the Internet and the increasing proliferation of technologies into our daily lives has only managed to heighten these concerns. The importance of individuals’ privacy concerns is widely acknowledged in the literature. For example, in the social science literature researchers (e.g Konvitz, 1966; Powers, 1996; Froomkin, 2000; Rule, 2004; Cassidy and Chae, 2006) describe it as a dynamic issue that has the potential to impact attitudes, perceptions, and even the environment and future technology developments (Crompton, 2001). However, despite growing interest in the topic, empirical research on technology-related privacy concerns from an information systems perspective remains at an embryonic stage and the limited number of studies on the construct that do exist tend to be limited in size and nature (Gefen and Straub, 2000; Cockcroft and Heales, 2005). Compounding the problem is the fact that some of these studies are beset by conflicting conceptualisations of the construct, as well as a lack of agreement regarding the factors that predict the perceptions, attitudes and behaviours of the individuals themselves. Consequently, it is difficult for privacy researchers within the information systems field to compare and contrast the results of previous studies in their efforts to progress understanding in this area.

In general, the limited studies that do exist within the field of information systems tend to focus on the technology-related privacy issues that exist in the online marketplace and the fact that consumers are becoming increasingly aware of the ways in which online vendors can collect and use potentially sensitive information regarding them and their actions without their express permission. From a vendor perspective the ability to collate such data allows them to provide customers with specifically customised information thus conferring the benefits of a personalised shopping experience. From a consumer perspective however, the price of this personalised shopping experience may outweigh any customisation benefits, particularly when vendors have been known to sell information on consumers to third parties without their knowledge or consent. More recently however, researchers within the information systems discipline are moving beyond the context of the marketplace and are focusing their efforts towards the privacy concerns emerging within the organisational framework. Researchers such as Nord et al., (2006) note how the increasing proliferation of technologies into working environments has resulted in numerous situations whereby the right to invade the privacy of the employee is being taken for granted by management. As a result, information systems researchers have begun to focus attention on the factors that influence technology-related privacy concerns in that specific context and the behavioural outcomes of such concerns.

The aim of this chapter therefore is to thoroughly describe the factors that influence technology-related privacy concerns and the emerging challenges that face the issue, particularly within the computer-mediated work environment. The current state of privacy legislation within Europe will be addressed and compared with the privacy laws and legal codes practiced in the US. Before doing so however, it is important to first discuss the conceptual confusion that surrounds the privacy construct itself as well as identifying the changing pattern and shifts of privacy concerns over the years.

Complete Chapter List

Search this Book:
Patricia Ordóñez de Pablos
Table of Contents
Chapter 1
Patricia Ordóñez de Pablos, Miltiadis D. Lytras
The chapter addresses the importance of knowledge-based resources proposing indicators to measure and report technological capital in companies. The... Sample PDF
Measuring and Reporting Technological Capital in Companies
Chapter 2
Pankaj, Micki Hyde, Arkalgud Ramaprasad, Suresh K. Tadisina
There is no systematic study of Information Systems (IS) agility in academic and practitioner IS literature and the concept is not well defined. For... Sample PDF
Revisiting Agility to Conceptualize Information Systems Agility
Chapter 3
Vagan Terziyan, Artem Katasonov
Industry pushes a new type of Internet characterized as the Internet of Things, which represents a fusion of the physical and digital worlds. The... Sample PDF
Global Understanding Environment: Applying Semantic and Agent Technologies to Industrial Automation
Chapter 4
Jeffrey Hsu
The market for e-commerce to Chinese audiences is one which has tremendous potential, given the fact that the number of potential users and... Sample PDF
Targeting E-Commerce to Chinese Audiences and Markets: Managing Cultural and Regional Challenges
Chapter 5
Edward T. Chen
Enterprise Resource Planning (ERP) is the method of trying to unify all processes within an organization into one software system or database.... Sample PDF
Enterprise Resource Planning System: Issues and Implementation
Chapter 6
Sandip Vijay, S. C. Sharma
This chapter reviews the secure characteristics of mobile devices that can use wireless networks (adhoc) almost any where and any time, by using one... Sample PDF
A Secure Characteristics of Wireless Ad-Hoc Networks
Chapter 7
Jorge Marx Gómez, Thanh Tran
Approaches to adaptation have been proposed by many different research communities, Hypermedia System and Intelligent Tutoring in particular. The... Sample PDF
A Survey on Approaches to Adaptation on the Web
Chapter 8
Jorge Marx Gómez, Tran Duc
A portal is a Web-based single point of access that delivers information and applications to a user on its own and by the integration of external... Sample PDF
A Personalized Portal on the Basis of Semantic Models and Rules
Chapter 9
Sylvie Laforet, Hannah Limahelu
This wireless advertising is considered to be an important alternative advertising medium in the future, due to its numerous advantages over... Sample PDF
British Consumers' Attitudes and Acceptance of Mobile Advertising
Chapter 10
Javier de Andrés, Pedro Lorca, Jose Emilio Labra
This chapter aims to determine the factors influencing the decision of implementing an ERP system in a country where technology awareness and the... Sample PDF
Determinants of ERP Implementations: An Empirical Study in Spanish Companies
Chapter 11
Jaakko Ikävalko, Hänninen, Seppo J., Ari Serkkola, Ilkka Kauranen
Technology programs are a means to facilitate the development and commercialization process of new innovative technologies. They are forums for the... Sample PDF
Emerging Topics and Technologies in Information Systems
Chapter 12
Cliona McParland, Regina Connolly
While Internet-based technologies have the potential to empower users immensely, individuals are becoming increasingly aware of the ways in which... Sample PDF
Technology-Related Privacy Concerns: An Emerging Challenge
Chapter 13
Giovanni Vincenti
Fear of flying is a common problem that many people have to face. As varied as the causes may be, all kinds of fears have many aspects in common.... Sample PDF
Fear of Flying and Virtual Environments: An Introductory Review
Chapter 14
Thomas Hädrich, Torsten Priebe
Knowledge work can be characterized by a high degree of variety and exceptions, strong communication needs, weakly structured processes, networks... Sample PDF
A Context-Based Approach for Supporting Knowledge Work with Semantic Portals
Chapter 15
Le Duy Ngan, Angela Goh
Web services form the core of e-business and hence, have experienced a rapid development in the past few years. This has led to a demand for a... Sample PDF
Survey of Web Service Discovery Systems
Chapter 16
Antonio Picariello, Antonio M. Rinaldi
The user dimension is a crucial component in the information retrieval process and for this reason it must be taken into account in planning and... Sample PDF
User Relevance Feedback in Semantic Information Retrieval
Chapter 17
Abdul-Rahman Al-Ali, Tarik Ozkul, Taha Landolsi
This paper presents the results of a study toward generating a wireless environment to provide real-time mobile accessibility to patient information... Sample PDF
A Preliminary Study toward Wireless Integration of Patient Information System
About the Contributors