Information Privacy Protection Practices in Africa: A Review through the Lens of Critical Social Theory

With the growth of Social Network Sites (SNS) and other online services, the collection and processing of personal information across boundaries has become an everyday reality including Africa. Africa is growing and technology offers a possibility to break the vicious circle of poverty. However, the limited IT infrastructure and weak economic realities have made African communities highly vulnerable for potential privacy violations. To mitigate such threats, various actors have implemented privacy protection mechanisms based on the Fair Information Practice (FIP) principles. However, Africa is a weak player in the Internet realm with limited decision power, dependent on external world, and limited skills to leverage technologies. Compounding the problem, Africa is lagging behind to start even proper discussions on legal protections and proper practices for information privacy. This work-in-progress reports on critical literature review conducted using critical social theory as lens and highlight potential privacy protection mechanisms and practices for Africa.

[1]  Alfred Kobsa,et al.  Personalized hypermedia and international privacy , 2002, CACM.

[2]  F. Cate The Failure of Fair Information Practice Principles , 2006 .

[3]  Jae-Hyeon Ahn,et al.  Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection , 2011, MIS Q..

[4]  Lorrie Faith Cranor,et al.  Platform for Privacy Preferences - P3P , 2000, Datenschutz und Datensicherheit.

[5]  J. Britz,et al.  Western privacy and/or Ubuntu? Some critical comments on the influences in the forthcoming data privacy bill in South Africa , 2007 .

[6]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..

[7]  M. Chinn,et al.  ICT Use in the Developing World: An Analysis of Differences in Computer and Internet Penetration , 2006, SSRN Electronic Journal.

[8]  J. Winn Consumer protection in the age of the 'information economy' , 2006 .

[9]  France Bélanger,et al.  Social Networks and Information Privacy: A Model for Low-income Countries , 2013, AMCIS.

[10]  Johann Cas,et al.  Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.

[11]  Cheryl Brown,et al.  An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites , 2013 .

[12]  Veda C. Storey,et al.  Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.

[13]  Wanda J. Orlikowski,et al.  Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..

[14]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[15]  Samuel E. Trosow A Holistic Model of Information Policy , 2010 .

[16]  Ya-Ching Lee Will self-regulation work in protecting online privacy? , 2003, Online Inf. Rev..

[17]  France Bélanger,et al.  A framework for e-government: privacy implications , 2006, Bus. Process. Manag. J..

[18]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[19]  Alex B. Makulilo Privacy and data protection in Africa: a state of the art , 2012 .

[20]  Yves Poullet,et al.  EU data protection policy. The Directive 95/46/EC: Ten years after , 2006, Comput. Law Secur. Rev..

[21]  D. Cecez-Kecmanovic Basic Assumptions of the Critical Research Perspectives in Information Systems , 2005 .

[22]  Seda F. Gürses Can you engineer privacy? , 2014, CACM.

[23]  Christian Fuchs,et al.  Africa and the digital divide , 2008, Telematics Informatics.

[24]  Graham Greenleaf Five Years of the Apec Privacy Framework: Failure or Promise? , 2009, Comput. Law Secur. Rev..

[25]  Tomaz Klobucar,et al.  Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.

[26]  Gehan Gunasekara The 'final' privacy frontier? Regulating trans-border data flows , 2007, Int. J. Law Inf. Technol..

[27]  Thomas Allmer,et al.  A critical contribution to theoretical foundations of privacy studies , 2011, J. Inf. Commun. Ethics Soc..

[28]  Anneliese Roos Personal Data Protection in New Zealand: Lessons for South Africa? , 2008 .

[29]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[30]  Michael D Birnhack,et al.  The EU Data Protection Directive: An engine of a global regime , 2008, Comput. Law Secur. Rev..

[31]  Hilde A. M. Voorveld,et al.  Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in Europe , 2014, Comput. Hum. Behav..

[32]  Karol I. Pelc Diffusion of Innovation in Social Networking , 2017 .

[33]  Banji Oyelaran-Oyeyinka,et al.  Internet diffusion in sub-Saharan Africa: A cross-country analysis , 2005 .

[34]  Lewis Auerbach,et al.  Privacy and Canadian telecommunications regulation , 1983 .

[35]  Veda C. Storey,et al.  Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? , 2006, Inf. Manag..

[36]  Bruce Robinson,et al.  The mysterious case of the missing paradigm: a review of critical information systems research 1991–2001 , 2007, Inf. Syst. J..

[37]  K. Malik,et al.  Human Development Report 2013. The Rise of the South: Human Progress in a Diverse World , 2013 .

[38]  Michael D. Myers,et al.  A Set of Principles for Conducting Critical Research in Information Systems , 2011, MIS Q..

[39]  Michael Santer A model to describe the adoption of mobile internet in Sub-Saharan Africa , 2013 .

[40]  Shirin Elahi Privacy and consent in the digital era , 2009, Inf. Secur. Tech. Rep..

[41]  Anne Layne-Farrar,et al.  The Benefits and Costs of Online Privacy Legislation , 2001 .

[42]  Gabriela Kennedy,et al.  Data protection in the Asia-Pacific region , 2009, Comput. Law Secur. Rev..

[43]  Making the most of Africa’s commodities: industrializing for growth, jobs and economic transformation* , 2014 .

[44]  A. Molla Downloading or uploading? The information economy and Africa's current status , 2000 .

[45]  Ingo Take,et al.  Regulating the Internet infrastructure: A comparative appraisal of the legitimacy of ICANN, ITU, and the WSIS , 2012 .

[46]  W. Hofkirchner A Critical Social Systems View of the Internet , 2007 .