Privacy policy: How to perfect it

10

October

2020

5/5 (1)

This post aims to highlight the importance of privacy and the efforts to prevent the infringement of data privacy in the platform-based businesses.  The concept of privacy is generally defined as “an individual’s ability to control the extent by which the personal information is acquired and used” (Galanxhi-Janaqi and Fui-Hoon Nah, 2004). Platform-based businesses are inseparable from the internet since their operations more than often do not require any hardware. Then, when the internet is involved, data privacy affects aspects such as the obtaining, distribution or the non-authorized use of personal information.
.
Today, information technologies’ growing size in information processing, and its complex nature, have made privacy an important issue. Consequently, distrusts of consumers are also increasing because of the same reason the platform-based information technologies are successful. Due to the sensitive nature of the topic and the increased importance, privacy infringement is that much more harmful to the companies’ performance. Awareness for the privacy heightened more than ever, privacy related hazards and crises can be extremely devastating.
.
Therefore, a company’s damage control capacity regarding the privacy related dangers is of utmost importance. Prevention and promotion are both equally important in data privacy. One of the many ways to secure both is by maintaining a regulatory focus under difficult situations. In privacy research, such regulatory focus is widely studied in order to analyze human motivation and behavior. Based on such approach, in the work of Chang and colleagues (2018), it was attempted to provide deeper understanding of the role of privacy policy on consumers’ perceived privacy.
.
Privacy policy play an important role for consumers to build trust and reduce privacy related concerns. Due to the introduction of GDPR, implementation of privacy policy is not voluntary. Such prevalence of the privacy policies also expose consumers to repeated evaluations of such policies. This eventually conditions them into acquiring personal standards on how well a company’s privacy practices are followed and the responsiveness of the practices.
.
One of the other common criteria in evaluating the perceived effectiveness of privacy policy is notice (Wu and Huang, 2012). Along with the freedom to choose the extent of the shared data, notifying the users with the details in the executions of policy is important (Wu and Huang, 2012). Based on these, the responsiveness and the level of clarity in the communications promoting the privacy policy are employed as the tool of measuring the perceived quality of the policy.
.
.
.
.

– Galanxhi-Janaqi, H. and Fui-Hoon Nah, F. (2004), “U-commerce: emerging trends and
research
– Chang, Y., Wong, SF, Libaque-Saenz, CF, & Lee, H. (2018). The role of privacy policy
on consumers’ perceived privacy. Government Information Quarterly , 35 (3), 445-459.
– Wu, K. Huang, S.Y. (2012) The effect of online privacy policy on consumer privacy
concern and trust

Please rate this

Don’t even think it!!

7

October

2020

5/5 (1)

Tom Cruise standing in the middle of a dimmed office orchestrating a floating wall of images, graphs, and surveillance footages.  This is perhaps one of the most prominent images people take home after watching Minority Report (Steven Spielberg, 2002). Loosely based on the same-titled short story written by Philip K. Dick, Minority Report is a sci-fi action film gem-packed with ‘futuristic’ technologies in the year 2054. Pre-crime, which also appears as the name of the specialized police department in the film, is a coined term by the author Philip K. Dick.

 

In Dick’s story, he described Pre-crime as a system that is designed to intervene, punish or restrict the potential criminal activities before such motifs are carried out and lead to harmful consequences. While it initially was merely a conceptual instrument in Dick’s 1956 sci-fi story, such idea of introducing preventive criminal justice system has been studied to various extents in real life. Mainly advocated by the positivist school of criminology, academia and the practitioners alike focused on the potential roles of a system like Pre-crime in the biological, psychological and sociological profiling (Zedner, 2007;2009;2010;2014).

Most notable examples can be found in the actual developments of crime prediction software. Developed by a professor from the University of Pennsylvania, a crime prediction software program had a trial run in Washington D.C. in order to test the applicability to a nation-wide operation (Economic Times, 2010). IBM’s Crime Reduction Utilizing Statistical History (CRUSH) can be another example. Based on mining years’ worth data of incident reports and law enforcement data, the predictive analytics of IBM’s CRUSH is already yielding positive results (Carr, 2010).

 

It almost sounds too fantastic: crises averted, lives saved, crimes solved before even happening… but at what cost? While some might argue the operations of CRUSH and the likes are too conservative or too ‘reserved’, there is a good reason such ubiquitous application must be hindered – just yet at least. For Minority Report’s level of application to be possible, a total surveillance must be preceded. Not a corner will be allowed for the individuality and personal privacy – No dead angle, not even in your mind.

No one knows what kind of changes GDPR will go through during the coming 25 years. However, I don’t think that kind of deep infringements of personal privacy and data privacy will be tolerated in the course of the changes in coming years. What do you think? Are you ready to welcome the brave new world of pre-crime in 2045?

 

aa113d061853ce23578fd7d38d616062

 

• Zedner, Lucia (2014), “Preventive Detention of the Dangerous”. In: Andrew Ashworth/Luica Zedner/Patrick Tomlin (eds.) Prevention and the limits of the Criminal Law. Oxford University Press, 144-170.
• Zedner, Lucia (2010), “Pre-Crime and pre-punishment: a health warning”. In: Criminal Justice Matters, 81: 1, 24–25.
• Zedner, Lucia (2009), Security. London, 72 ff.
• Zedner, Lucia (2007), “Pre-crime and post-criminology?”. In: Theoretical Criminology, vol. 11, no. 2, 261–281.
• “‘Minority Report’ moves from reel into real life”. The Economic Times. August 27, 2010. Archived from the original on August 31, 2010. Retrieved December 12, 2010.
• Carr, Austin (July 30, 2010). “7 Ways Real-Life Crime Fighting Mirrors “Minority Report””. Fast Company. Retrieved December 10, 2010.

Please rate this