Privacy Policies Considerations in Socio-Technical Systems
Murthy Rallapalli
Systems Engineering, IBM, Atlanta, USA.
DOI: 10.4236/ti.2012.32009   PDF    HTML     4,331 Downloads   7,054 Views   Citations

Abstract

The idea of a socio-technical system (STS) is an intellectual tool to help recognize patterns in the way technology is used and produced. Identification of these patterns will help in analyzing the ethical issues associated with the technology-and-its-social-system [1]. By way of example, consider a relatively simple technology: a set of twenty laptops connected by a local area network. The social and ethical issues associated with these networked devices will change dramatically depending upon the socio-technical system in which they are embedded. Few technologies have ever had the capability of gathering information (with or without the user’s knowledge) as effectively as the World Wide Web. Internet has the greatest potential of targeting precise marketing demographics. Internet is also capable of disseminating information widely and quickly. This paper will study the role of privacy policies in web based socio-technical systems. This paper will research the role played by privacy policies in web user adaptation in the context of web based sociotechnical systems.

Share and Cite:

M. Rallapalli, "Privacy Policies Considerations in Socio-Technical Systems," Technology and Investment, Vol. 3 No. 2, 2012, pp. 63-67. doi: 10.4236/ti.2012.32009.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] ComputingCases.Org, 2011. http://computingcases.org/general_tools/sia/socio_tech_system.html
[2] Principia Cybernetica Web, “Socio-Technical System,” 2011. http://pespmc1.vub.ac.be/ASC/Socio-_Syste.html
[3] ComputingCases.Org, Editorial Content, 2012. http://computingcases.org/general_tools/sia/socio_tech_system.html
[4] ComputingCases.Org, Editorial Content, 2011. http://computingcases.org/general_tools/sia/socio_tech_system.html
[5] M. Michelle, “New Privacy Legislation,” Beyond Numbers, 2003. http://www.ica.bc.ca/kb.php3?pageid=2326
[6] B. J. Fogg, “How Do People Evaluate a Web Site’s Credibility?” 2002. http://www.nd.edu/~cclark2/capp30523/PDFs/HowDoPeopleEvaluate.pdf
[7] A. Alessandro and J. Tsai, S. Egelmana and L. Cranor, “The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study,” Carnegie Mellon University, Pittsburgh, 2007.
[8] G. Robert, “Do Consumers Care about Online Privacy?” 2007. http://www.mendeley.com/research/consumers-care-about-online-privacy/
[9] OUT-LAW News Editorial, “Regulators Demand Clearer Privacy Policies,” 2009. http://www.out-law.com//default.aspx?page=9795
[10] B. Spencer, “The Effects of Privacy Policy Statements on Customer Behavior,” 1999. http://www.techrepublic.com/article/the-effects-of-privacy-policy-statements-on-customer-behavior/5032632
[11] Treasury Board of Canada Secretariat, “Guidelines for Privacy Breaches,” 2011. http://www.tbs-sct.gc.ca/atip-aiprp/in-ai/in-ai2007/breach-atteint-eng.asp
[12] A. Figueroa, “Privacy Issues Hit Facebook (Again),” 2010. http://www.pcworld.com/article/202315/privacy_concerns_hit_facebook_again.html
[13] N. O’Neill, “10 Privacy Settings Every Facebook User Should Know,” 2009. http://www.allfacebook.com/facebook-privacy-2009-02
[14] Federal Trade Commission, “Choice Point Settles Data Security Breach Charges; to Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress,” 2006. http://www.ftc.gov/opa/2006/01/choicepoint.shtm
[15] Electronic Privacy Information Center, “Choice Point: Introduction and Background,” 2001. http://epic.org/privacy/choicepoint/
[16] K. Tedder, “Don’t Wait for a Data Compromise,” 2010. https://www.firstdata.com/downloads/thought-leadership/fd-data-compromise-wp.pdf.
[17] H. Nissenbaum, “Technology, Policy, and the Integrity of Social Life,” Stanford University Press, Stanford, 2010.
[18] L. Ponemon, “Institute Research Editorial Report,” 2010. http://www.ponemon.org/about-ponemon-research
[19] F. Y. Rashid, “IT Security & Network Security News & Reviews: 10 Biggest Data Breaches of 2011 So Far,” 2011. http://www.eweek.com/c/a/Security/10-Biggest-Data-Breaches-of-2011-So-Far-175567/
[20] C. Sturdevant, “Danger: Privacy Agreements,” 2012. http://www.pcmag.com/article2/0,2817,1752833,00.asp
[21] C. Sturdevant, “IT Security & Network Security News,” 2005. http://www.eweek.com/c/a/Security/Danger-Privacy-Agreements/
[22] Second Moment, “Georgetown Internet Privacy Policy Survey,” 2003. http://www.secondmoment.org/etal-column/georgetown.php
[23] http://www.ftc.gov/os/1998/9808/geo-cmpl.htm http://www.ftc.gov/os/1999/9902/9823015d&o.htm
[24] GVU’s 10th WWW User Survey, 1998. http://www.cc.gatech.edu/gvu/user_surveys/survey-1998-10/

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.