Privacy as a shared feature of the e-phenomenon: a comparison of privacy policies in e-government, e-commerce and e-teaching

One of the characteristics shared by most, if not all, aspects of the e-phenomenon is that it poses new challenges to privacy. This paper will discuss the concept of privacy and analyse which differences regarding the attention to privacy exist between different sectors. Based on a broad literature review on the ethical foundations of privacy, we have identified three research questions: What are the reasons given by organisations to protect privacy? What is the perceived nature of privacy? How do organisations address different stakeholders? These questions are explored by analysing the privacy policies of organisations from three different sectors: e-commerce, e-teaching and e-government. We will argue that the three sectors come to different answers to the above questions but that privacy is an overarching concern that needs to be addressed. It is therefore justified to say that the e-phenomenon exists, at least in so far as it creates a necessity for organisations to consider the issues raised by privacy.

[1]  Janice C. Sipior,et al.  The ethical and legal quandary of email privacy , 1995, CACM.

[2]  M. Castells,et al.  The Hacker Ethic and the Spirit of the Information Age , 2001 .

[3]  Detmar W. Straub,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .

[4]  M. Castells End of Millennium: The Information Age: Economy, Society and Culture , 1997 .

[5]  William S. Brown Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .

[6]  Lucas D. Introna Workplace surveillance is unethical and unfair , 2002 .

[7]  Bruce A. Reinig,et al.  Managing user perceptions of email privacy , 1995, CACM.

[8]  Bernd Carsten Stahl,et al.  Electronic monitoring in the workplace: if people don’t care, then what is the relevance? , 2005 .

[9]  Grace F. Johnson‐Page,et al.  B2C data privacy policies: current trends , 2001 .

[10]  Mary J. Culnan,et al.  Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 U.S. Web Surveys , 2002, Inf. Soc..

[11]  Minh Q. Huynh,et al.  The critical social theory of Jürgen Habermas and its implications for IS research , 2004 .

[12]  M. Velasquez Business Ethics: Concepts and Cases , 1982 .

[13]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[14]  Simon Rogerson Ethical Aspects of Information Technology: Issues for Senior Executives , 1998 .

[15]  D. Nye,et al.  The 'Privacy in Employment' Critique: A Consideration of Some of the Arguments for 'Ethical' HRM Professional Practice , 2002 .

[16]  Joseph S. Valacich,et al.  E-Learning as an Emerging Entrepreneurial Enterprise in Universities and Firms , 2003, Commun. Assoc. Inf. Syst..

[17]  Sirkka L. Jarvenpaa,et al.  The Use of Information Technology to Enhance Management School Education: A Theoretical View , 1995, MIS Q..

[18]  John Weckert,et al.  Computer and Information Ethics , 1997 .

[19]  Felix Stalder,et al.  Privacy is not the Antidote to Surveillance. , 2009 .

[20]  Bernd Carsten Stahl,et al.  Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? , 2004, J. Organ. End User Comput..

[21]  Philip Brey,et al.  Disclosive computer ethics , 2000, CSOC.

[22]  Benjamin J. Goold,et al.  Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy , 2002 .

[23]  R. Mason Four ethical issues of the information age , 1986 .

[24]  H. Nissenbaum Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .

[25]  Marc Rotenberg,et al.  Communications privacy: implications for network design , 1993, CACM.

[26]  Richard J. Severson,et al.  The Principles of Information Ethics , 1997 .

[27]  Lucas D. Introna Privacy and the computer: why we need privacy in the information society , 1997 .

[28]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[29]  M. Foucault,et al.  Surveiller et punir: Naissance de la prison , 1977 .

[30]  R. Chandran Privacy in Employment , 2007 .

[31]  Blake Ives,et al.  Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effectiveness in Basic It Skills Training Author(s): Piccoli Et Al./web-based Virtual Learning Environments Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effe , 2022 .

[32]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[33]  Richard A. Spinello,et al.  Cyberethics: Morality and Law in Cyberspace , 2001 .

[34]  Dag Elgesem,et al.  The structure of rights in Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data , 1999, Ethics and Information Technology.

[35]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[36]  Stewart T. Fleming Biometrics: past, present and future , 2003 .

[37]  Kiran J. Desai,et al.  E-commerce policies and customer privacy , 2003, Inf. Manag. Comput. Secur..

[38]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[39]  Michael J. Gallivan,et al.  Trust, control and the role of interorganizational systems in electronic partnerships , 2003, Inf. Syst. J..

[40]  Yolande E. Chan,et al.  Theoretical Explanations for Firms' Information Privacy Behaviors , 2005, J. Assoc. Inf. Syst..

[41]  M. Castells The Information Age: Economy, Society and Culture , 1999 .

[42]  Claire Gauzente WEB MERCHANTS' PRIVACY AND SECURITY STATEMENTS: HOW REASSURING ARE THEY FOR CONSUMERS? A TWO-SIDED APPROACH , 2004 .

[43]  Dorothy E. Leidner,et al.  Research Commentary: Technology-Mediated Learning - A Call for Greater Depth and Breadth of Research , 2001, Inf. Syst. Res..

[44]  M. Foucault,et al.  Surveiller et punir: Naissance de la prison , 1993 .

[45]  Bernd Carsten Stahl,et al.  The Paradigm of E-Commerce in E-Government and E-Democracy , 2004 .