In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effective in providing privacy to citizens. Rapid development of ubiquitous computing and ‘the internet of things’ are leading to Big Data and the application of Predictive Analytics, effectively merging the real world with cyberspace. The power of information technology is increasingly used to provide personalised services to citizens, leading to the availability of huge amounts of sensitive data about individuals, with potential and actual privacy-eroding effects. To protect the private sphere, deemed essential in a state of law, information and communication systems (ICTs) should meet the requirements laid down in numerous privacy regulations. Sensitive personal information may be captured by organizations, provided that the person providing the information consents to the information being gathered, and may only be used for the express purpose the information was gathered for. Any other use of information about persons without their consent is prohibited by law; notwithstanding legal exceptions. If regulations are properly translated into written code, they will be part of the outcomes of an ICT, and that ICT will therefore be privacy compliant. We conclude that privacy compliance in the ‘technological’ sense cannot meet citizens’ concerns completely, and should therefore be augmented by a conceptual model to make privacy impact assessments at the level of citizens’ lives possible.
DOCUMENT
According to Johnson & Grandison (2007), failure to safeguard privacy of users of services provided by private and governmental organisations, leaves individuals with the risk of exposure to a number of undesirable effects of information processing. Loss of control over information about a person may lead to fraud, identity theft, reputation damage, and may cause psychosocial consequences ranging from mild irritation, unease, social exclusion, physical harm or even, in extreme cases, death. Although pooh-poohed upon by some opinion leaders from search engine and ICT industries for over a decade (Sprenger, 1999; Esguerra, 2009), the debate in the wake of events like the tragic case of Amanda Todd could be interpreted as supporting a case for proper attention to citizens’ privacy. Truth be told, for a balanced discussion on privacy in the age of Facebook one should not turn towards the social media environment that seems to hail any new development in big data analysis and profiling-based marketing as a breathtaking innovation. If the myopic view of technology pundits is put aside, a remarkably lively debate on privacy and related issues may be discerned in both media and scientific communities alike. A quick keyword search on ‘privacy’, limited to the years 2000-2015, yields huge numbers of publications: Worldcat lists 19,240; Sciencedirect 52,566, IEEE explore 71,684 and Google scholar a staggering 1,880,000. This makes clear that privacy is still a concept considered relevant by both the general public and academic and professional audiences. Quite impressive for a subject area that has been declared ‘dead’.
MULTIFILE
Following the rationale of the current EU legal framework protecting personal data, children are entitled to the same privacy and data protection rights as adults. However, the child, because of his physical and mental immaturity, needs special safeguards and care, including appropriate legal protection. In the online environment, children are less likely to make any checks or judgments before entering personal information. Therefore, this paper presents an analysis of the extent to which EU regulation can ensure children’s online privacy and data protection.
DOCUMENT
Firms increasingly use social network sites to reach out to customers and proactively intervene with observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service, sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to theorize how proactive customer service interventions with consumer messages on social network sites may evoke feelings of privacy infringement. Subsequently we use privacy calculus theory to propose how these perceptions of privacy infringement, together with the perceived usefulness of the intervention, in turn drive customer satisfaction. In two experiments, we find that feelings of privacy infringement associated with proactive interventions may explain why only reactive interventions enhance customer satisfaction. Moreover, we find that customer satisfaction can be modeled through the calculus of the perceived usefulness and feelings of privacy infringement associated with an intervention. These findings contribute to a better understanding of the impact of privacy concerns on consumer behavior in the context of firm–consumer interactions on social network sites, extend the applicability of privacy calculus theory, and contribute to complaint and compliment management literature. To practitioners, our findings demonstrate that feelings of privacy are an element to consider when handling consumer messages on social media, but also that privacy concerns may be overcome if an intervention is perceived as useful enough.
MULTIFILE
Data collected from fitness trackers worn by employees could be very useful for businesses. The sharing of this data with employers is already a well-established practice in the United States, and companies in Europe are showing an interest in the introduction of such devices among their workforces. Our argument is that employers processing their employees’ fitness trackers data is unlikely to be lawful under the General Data Protection Regulation (GDPR). Wearable fitness trackers, such as Fitbit and AppleWatch devices, collate intimate data about the wearer’s location, sleep and heart rate. As a result, we consider that they not only represent a novel threat to the privacy and autonomy of the wearer, but that the data gathered constitutes ‘health data’ regulated by Article 9. Processing health data, including, in our view, fitness tracking data, is prohibited unless one of the specified conditions in the GDPR applies. After examining a number of legitimate bases which employers can rely on, we conclude that the data processing practices considered do not comply with the principle of lawfulness that is central to the GDPR regime. We suggest alternative schema by which wearable fitness trackers could be integrated into an organization to support healthy habits amongst employees, but in a manner that respects the data privacy of the individual wearer.
MULTIFILE
Advanced technology is a primary solution for the shortage of care professionals and increasing demand for care, and thus acceptance of such technology is paramount. This study investigates factors that increase use of advanced technology during elderly care, focusing on current use of advanced technology, factors that influence its use, and care professionals’ experiences with the use. This study uses a mixed-method design. Logfiles were used (longitudinal design) to determine current use of advanced technology, questionnaires assessed which factors increase such use, and in-depth interviews were administered to retrieve care professionals’ experiences. Findings suggest that 73% of care professionals use advanced technology, such as camera monitoring, and consult clients’ records electronically. Six of nine hypotheses tested in this study were supported, with correlations strongest between performance expectancy and attitudes toward use, attitudes toward use and satisfaction, and effort expectancy and performance expectancy. Suggested improvements for advanced technology include expanding client information, adding report functionality, solving log-in problems, and increasing speed. Moreover, the quickest way to increase acceptance is by improving performance expectancy. Care professionals scored performance expectancy of advanced technology lowest, though it had the strongest effect on attitudes toward the technology.
DOCUMENT
The 'implementation' and use of smart home technology to lengthen independent living of non-instutionalized elderly have not always been flawless. The purpose of this study is to show that problems with smart home technology can be partially ascribed to differences in perception of the stakeholders involved. The perceptual worlds of caregivers, care receivers, and designers vary due to differences in background and experiences. To decrease the perceptual differences between the stakeholders, we propose an analysis of the expected and experienced effects of smart home technology for each group. For designers the effects will involve effective goals, caregivers are mainly interested in effects on workload and quality of care, while care receivers are influenced by usability effects. Making each stakeholder aware of the experienced and expected effects of the other stakeholders may broaden their perspectives and may lead to more successful implementations of smart home technology, and technology in general.
DOCUMENT
Airports have undergone a significant digital evolution over the past decades, enhancing efficiency, effectiveness, and user-friendliness through various technological advancements. Initially, airports deployed basic IT solutions as support tools, but with the increasing integration of digital systems, understanding the detailed digital ecosystem behind airports has become crucial. This research aims to classify technological maturity in airports, using the access control process as an example to demonstrate the benefits of the proposed taxonomy. The study highlights the current digital ecosystem and its future trends and challenges, emphasizing the importance of distinguishing between different levels of technological maturity. The role of biometric technology in security access control is examined, highlighting the importance of proper identification and classification. Future research could explore data collection, privacy, and cybersecurity impacts, particularly regarding biometric technologies in Smart Access Level 4.0. The transition from Smart Access Level 3.0 to 4.0 involves process automation and the introduction of AI, offering opportunities to increase efficiency and improve detection capabilities through advanced data analytics. The study underscores the need for global legislative frameworks to regulate and support these technological advancements.
DOCUMENT
Teacher knowledge guides a teacher's behaviour in the classroom. Teacher knowledge for technology education is generally assumed to play an important role in affecting pupils' learning in technology. There are an abundant number of teacher knowledge models that visualise different domains of teacher knowledge, but clear empirical evidence on how these domains interact is lacking. Insights into the interaction of teacher knowledge domains could be useful for teacher training. In this study, the hypothesised relations between different domains of teacher knowledge for technology education in primary schools were empirically investigated. Subject matter knowledge, pedagogical content knowledge, attitude, and self-efficacy were measured with tests and questionnaires. Results from a path analysis showed that subject matter knowledge is an important prerequisite for both pedagogical content knowledge and self-efficacy. Subsequently, teachers' self-efficacy was found to have a strong influence on teachers' attitude towards technology. Based on the findings in this study, it is recommended that teacher training should first of all focus on the development of teachers' subject matter knowledge and pedagogical content knowledge. This knowledge will positively affect teachers' confidence in teaching and, in turn, their attitude towards the subject. More confidence in technology teaching and a more positive attitude are expected to increase the frequency of technology education, which consequently increases teaching experience and thereby stimulates the development of teachers' pedagogical content knowledge. This circle of positive reinforcement will eventually contribute to the quality of technology education in primary schools.
LINK
this thesis was simply a research done to see how the manor amsterdam can use technologies to enhance its guest eperience. Surveys and intervews were conducted to see what the guest preferences were after which an implementation process was also drawn up.
MULTIFILE