Improving protection mechanisms by understanding online risk
Purpose - The purpose of this research is to examine privacy risks for two groups of individuals for whom privacy is an important issue. Understanding the risks to vulnerable groups leads to the development of a prototype tool used to inform users about areas of potential harm in their online behavi...
Saved in:
Published in | Information management & computer security Vol. 15; no. 5; pp. 382 - 393 |
---|---|
Main Authors | , , |
Format | Journal Article Conference Proceeding |
Language | English |
Published |
Bradford
Emerald Group Publishing Limited
16.10.2007
Emerald |
Subjects | |
Online Access | Get full text |
ISSN | 0968-5227 2056-4961 1758-5805 2056-497X |
DOI | 10.1108/09685220710831125 |
Cover
Summary: | Purpose - The purpose of this research is to examine privacy risks for two groups of individuals for whom privacy is an important issue. Understanding the risks to vulnerable groups leads to the development of a prototype tool used to inform users about areas of potential harm in their online behaviour.Design methodology approach - Data collection employed a number of qualitative approaches in order to best understand both the risks and the social context surrounding them. Semi-structured interviews, focus groups and questionnaires were all utilised where appropriate. Subjects were selected from two groups of individuals for whom the abuse of personal information could lead to serious harm - teenagers and domestic abuse survivors.Findings - The findings provide specific examples of risks posed to the two groups of individuals involved in the study and demonstrate the need for protection mechanisms that promote the awareness of potential risk among vulnerable internet users. These formed the basis of the requirements for the prototype.Originality value - This paper presents a contribution to the understanding of risks faced by individuals from technologies as well as considering the potential for harm in an online setting against traditional abuse theories. It also contributes to the body of knowledge considering the development of privacy-enhancing technologies. |
---|---|
Bibliography: | filenameID:0460150505 ark:/67375/4W2-ZNM5Q4LL-P istex:3A9A738007D3CFD63BB75C8C99F4A2B1EB41ACFD original-pdf:0460150505.pdf href:09685220710831125.pdf SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 ObjectType-Article-1 ObjectType-Feature-2 |
ISSN: | 0968-5227 2056-4961 1758-5805 2056-497X |
DOI: | 10.1108/09685220710831125 |