Privacy Compliance System by Design Platforms: A Case of Privacy Concerns for Thai Teenagers
Main Article Content
Abstract
The concern over privacy is growing, and several attempts have been made to address privacy invasion and suggest privacy ethics in technology design. However, users' privacy is still customized by the technology around them. Teenagers who are technology savvy are often not aware of online privacy as much as adults. Therefore, their privacy was customized by the Internet or technology devices around them especially via their mobile phone. This study aims to present a design guideline for privacy compliance system by reviewing previous design platforms, and identifying the most concerns of privacy invasions for users and how they react to those invasions. From the legal and designer perspectives, the developer should consider privacy principles of system design, namely, notice/awareness, choice/consent, access/participation, security, enforcement/redress and anonymity/pseudonymity. By using open-ended questionnaires which were sent to 42 Thai teenagers, the results show that the most privacy invasion that students concerned is advertising via mobile phone messages. This invasion could cause annoyance and a waste of time and money. The teenagers react to the invasion varied from calling to the wireless service provider to help stopping those advertisements, blocking the intruders and finally, stopping the use of those services or applications. It was also found that teenagers are concerned only for the privacy invasions that interrupt while they were using the Internet applications, but they have less concern over the collection of their personal information. At the end of this study, some practical implications are suggested as guidelines for a privacy compliance system.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
All authors need to complete copyright transfer to Journal of Applied Informatics and Technology prior to publication. For more details click this link: https://ph01.tci-thaijo.org/index.php/jait/copyrightlicense
References
Awad, N.F., & Krishnan, M.S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization, MIS Quarterly, 30(1), pp.13-28.
Boyle, M., & Greenberg, S. (2005). The language of privacy: Learning from video media space analysis and design, Journal ACM Transactions on Computer-Human Interaction, 12(2), 328-370. https://doi.org/10.1145/1067860.1067868
Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada.
Colesky, M., Hoepman, J.H., & Hillen, C. (2016). A critical analysis of privacy design strategies, IEEE Security and Privacy Workshops (SPW) (pp. 33-40). IEEE. https://doi.org/10.1109/SPW.2016.23
Debatin, B., Lovejoy, J.P., Horn, A., & Hughes, B.N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences, Journal of Computer-Mediated Communication, 15, 83–108.
Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: ethical issues, Journal of public policy and Marketing, 12(1), 106-119.
Gunnarsson, A., & Ekberg, S. (2003). Invasion of privacy, spam one result of bad privacy protection, [Thesis, Blekinge Institute of Technology, Sweden].
Hansen, M. (2011). Top 10 mistakes in system design from a privacy perspective and privacy protection goals. In 7th PrimeLife International Summer School (PRIMELIFE) (pp. 14-31).
Hawk, S. T., Hale, W.W., Raaijmakers, Q.A.W., & Meeus, W. (2008). Adolescents’ perceptions of privacy invasion in reaction to parental solicitation and control. The Journal of Early Adolescence, 28, 583–608.
Jegatheesan, S. (2013). Cookies – Invading our privacy for marketing, advertising and security issues. International Journal of Scientific and Engineering Research, 4(5), 3.
Jones, H. and Soltren, J. H. (2005). Facebook: Threats to privacy, Retrieved 30 May 2020, Retrieved from http://www-swiss.ai.mit.edu/6805/student-papers/fall05-papers/facebook.pdf
Langheinrich, M. (2001). Privacy by design – principles of privacy-aware ubiquitous systems. In G.D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001 Proceedings, volume 2201 of Lecture Notes in Computer Science (pp. 273-291). Springer.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
Skendžić, A., Kovaèić, B., & Tijan, E. (2018). General data protection regulation—Protection of personal data in an organization, In 41st International Convention Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 1370-1375).
Tchao, E. T., Diawuo,K., Aggor, C. S., & Kotey, S. D. (2017). Ghanaian consumers online privacy concerns: Causes and its effects on E-commerce adoption. International Journal of Advanced Computer Science and Applications, 8(11), 157-163.
The Federal Trade Commission. (1998). Privacy online: a report to congress, Retrieved 30 May 2020, Retrieved from https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-report-congress/priv-23a.pdf
Xu, X., Dinev,T., Smith, H. J., & Hart, P. (2008). Examining the formation of individual’s privacy concerns: Toward an integrative view, in International Conference on Information Systems.
Zhu, Y. Q., & Chang, J. H., (2016). The key role of relevance in personalized advertisement: Examining its impact on perceptions of privacy invasion, self-awareness, and continuous use intentions. Computers in Human Behavior, 65, 442–447.