Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online

被引:7
|
作者
Kim, Jongwoo [1 ]
Baskerville, Richard L. [2 ,3 ]
Ding, Yi [4 ]
机构
[1] Univ Massachusetts Boston, Dept Management Sci & Informat Syst, Boston, MA 02125 USA
[2] Georgia State Univ, Dept Comp Informat Syst, Atlanta, GA 30303 USA
[3] Curtin Univ, Bentley, WA, Australia
[4] Georgia Gwinnett Coll, Sch Sci & Tech, 100 Univ Ctr Lane, Lawrenceville, NJ USA
关键词
Ethics; Privacy; Online social network; Business intelligence; Digital forensics; Information security; BUSINESS INTELLIGENCE; BIG DATA; INFORMATION-TECHNOLOGY; ETHICS; MANAGEMENT; SECURITY; SYSTEMS; EVOLUTION; COMMUNITY; ECONOMICS;
D O I
10.1007/s10796-018-9856-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting and prosecuting policy violations, crimes, terrorist activities, subversive political movements, etc. Some existing methods and tools in the fields of business analytics and digital forensics are useful for such investigations. While the privacy rights of individuals are widely respected, the privacy rights of social groups are less well developed. In the current development of OLSNs and information technologies, the compromise of group privacy may lead to the violation of individual privacy. Adopting an explorative literature review, we examine the privacy kill chain that compromises group privacy as a means to compromise individual privacy. The latter is regulated, while the former is not. We show how the kill chain makes the need for protecting group privacy important and feasible from the perspectives of social, legal, ethical, commercial, and technical perspectives. We propose a research agenda to help societies and organizations strike the proper balance between the benefits and costs of both OLSNs and investigative technologies.
引用
收藏
页码:171 / 185
页数:15
相关论文
共 50 条
  • [1] Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
    Jongwoo Kim
    Richard L. Baskerville
    Yi Ding
    [J]. Information Systems Frontiers, 2020, 22 : 171 - 185
  • [2] Protecting individual privacy
    不详
    [J]. M D COMPUTING, 1999, 16 (01): : 12 - 12
  • [4] GROUP-THERAPY - PROTECTING PRIVACY
    BINDRIM, P
    [J]. PSYCHOLOGY TODAY, 1980, 14 (02) : 24 - &
  • [5] Protecting Oneself Online: The Effects of Negative Privacy Experiences on Privacy Protective Behaviors
    Chen, Hongliang
    Beaudoin, Christopher E.
    Hong, Traci
    [J]. JOURNALISM & MASS COMMUNICATION QUARTERLY, 2016, 93 (02) : 409 - 429
  • [6] Protecting privacy
    Coyle, K
    [J]. LIBRARY JOURNAL, 2001, : 14 - 17
  • [7] Protecting Privacy in Health Research: The Limits of Individual Choice
    Cate, Fred H.
    [J]. CALIFORNIA LAW REVIEW, 2010, 98 (06) : 1765 - 1803
  • [8] PROTECTING PRIVACY
    ROTENBERG, M
    [J]. COMMUNICATIONS OF THE ACM, 1992, 35 (04) : 164 - 164
  • [9] Privacy as a Service: Protecting the Individual in Healthcare Data Processing
    Su, Xiang
    Hyysalo, Jarkko
    Rautiainen, Mika
    Riekki, Jukka
    Sauvola, Jaakko
    Maarala, Altti Ilari
    Hirvonsalo, Harri
    Li, Pingjiang
    Honko, Harri
    [J]. COMPUTER, 2016, 49 (11) : 49 - 59
  • [10] INDIVIDUAL AND GROUP PRIVACY - BLOUSTEIN,EJ
    JOHNSON, MC
    [J]. CONTEMPORARY SOCIOLOGY-A JOURNAL OF REVIEWS, 1981, 10 (02) : 325 - 326