Main Article Content
The concern over privacy is growing, and several attempts have been made to address privacy invasion and suggest privacy ethics in technology design. However, users' privacy is still customized by the technology around them. Teenagers who are technology savvy are often not aware of online privacy as much as adults. Therefore, their privacy was customized by the Internet or technology devices around them especially via their mobile phone. This study aims to present a design guideline for privacy compliance system by reviewing previous design platforms, and identifying the most concerns of privacy invasions for users and how they react to those invasions. From the legal and designer perspectives, the developer should consider privacy principles of system design, namely, notice/awareness, choice/consent, access/participation, security, enforcement/redress and anonymity/pseudonymity. By using open-ended questionnaires which were sent to 42 Thai teenagers, the results show that the most privacy invasion that students concerned is advertising via mobile phone messages. This invasion could cause annoyance and a waste of time and money. The teenagers react to the invasion varied from calling to the wireless service provider to help stopping those advertisements, blocking the intruders and finally, stopping the use of those services or applications. It was also found that teenagers are concerned only for the privacy invasions that interrupt while they were using the Internet applications, but they have less concern over the collection of their personal information. At the end of this study, some practical implications are suggested as guidelines for a privacy compliance system.
Awad, N. F. and Krishnan, M. S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS Quarterly, 30(1), pp.13-28.
Boyle, M., and Greenberg, S. (2005). The language of privacy: Learning from video media space analysis and design, Journal ACM Transactions on Computer-Human Interaction, 12 (2), DOI= http://doi.acm.org/10.1145/1067860.1067868, pp.328-370.
Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada.
Colesky, M., Hoepman, J. H., and Hillen,C. (2016). A critical analysis of privacy design strategies, IEEE Security and Privacy Workshops (SPW).
Debatin, B., Lovejoy, J. P., Horn, A., and Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences, Journal of Computer-Mediated Communication, 15, pp.83–108.
Foxman, E. R., and Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: ethical issues, Journal of public policy and Marketing, 12 (1), pp.106-119.
Gunnarsson, A., and Ekberg, S. (2003). Invasion of privacy, spam one result of bad privacy protection, Master thesis, Blekinge Institute of Technology, Sweden.
Hansen, M. (2011). Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection
Goals. 7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy, pp.14-31.
Hawk, S. T., Hale, W. W., Raaijmakers, Q. A. W., and Meeus,W. (2008). Adolescents’ perceptions of privacy invasion in reaction to parental solicitation and control, The Journal of Early Adolescence, 28, pp.583– 608.
Jegatheesan, S. (2013). Cookies – Invading our privacy for marketing, advertising and security issues, International Journal of Scientific and Engineering Research, 4(5), pp.3.
Jones, H. and Soltren, J. H. (2005). Facebook: Threats to privacy, Available from: http://www-swiss.ai.mit.edu/6805/student-papers/fall05-papers/facebook.pdf. [May 30, 2020].
Langheinrich, M. (2011). Privacy by design – principles of privacy-aware ubiquitous systems. In G.D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001 Proceedings, volume 2201 of Lecture Notes in Computer Science, pp. 273–291.
Malhotra, N. K., Kim, S. S., and Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model, Information Systems Research, 15 (4), pp.336-355.
Skendžić, A., Kovaèić, B. and Tijan, E. (2018). General data protection regulation—Protection of personal data in an organization, Proc. 41st Int. Convent. Inf. Commun. Technol. Electron. Microelectron. (MIPRO), pp. 1370-1375.
Tchao, E. T., Diawuo,K., Aggor, C. S., and Kotey, S. D. (2017). Ghanaian Consumers Online Privacy Concerns: Causes and its Effects on E-Commerce Adoption, International Journal of Advanced Computer Science and Applications, .8(11), pp.157-163.
The Federal Trade Commission. (1998). Privacy online: a report to congress, Retrieved May 30, 2020, from https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-report-congress/priv-23a.pdf.
Xu, X., Dinev,T., Smith, H. J., and Hart, P. (2008). Examining the Formation of Individual’s Privacy Concerns: Toward an integrative view, in International Conference on Information Systems, Paris, France. Available from: https://faculty.ist.psu.edu/xu/papers/conference/icis08a.pdf. [April 1, 2020].
Zhu, Y. Q., and Chang, J. H., (2016). The key role of relevance in personalized advertisement: Examining its impact on perceptions of privacy invasion, self-awareness, and continuous use intentions. Computers in Human Behavior, 65, pp.442–447.