Controlling information behaviour: the case for access control

ABSTRACT Intentional dissemination of information is a key role of information systems. Yet methods for controlling access to information – as opposed to data – are still in their infancy, especially in relation to the key ‘decision points' that need to be made regarding what information users can access when, and under what conditions. This paper presents the case for access control to be explicitly integrated into models of information behaviour, especially as they relate to information access on the relatively unregulated internet. An observational case study relating to information access in Indonesia – which is a highly regulated society – is presented, through advertising on rogue websites – in this case, behaviour which is strictly regulated in the physical world (such as the promotion of gambling) is relatively unchecked online; the absence of effective controls, as suggested by situational crime prevention theory [Clarke, R. V. G., ed. 1997. Situational Crime Prevention. Criminal Justice Press] is reflected in the high levels of offending seen online. The extent to which information systems can manage information-seeking behaviour in a way that is consistent with regulatory or policy requirements in the online environment is discussed, with a view to establishing a foundation and terminology to modify information behaviour theory for the online environment.

[1]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[2]  Paul A. Watters,et al.  Detecting and Tracing Copyright Infringements in P2P Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[3]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[4]  E. Quayle,et al.  Typology of Paedophile Picture Collections , 2001 .

[5]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[6]  Patrick Keilty,et al.  Embodiment and desire in browsing online pornography , 2012, iConference '12.

[7]  Paul A. Watters,et al.  Patterns of ownership of child model sites: Profiling the profiteers and consumers of child exploitation material , 2013, First Monday.

[8]  Christopher Peter Lueg,et al.  Characteristics of human perception and their relevance when studying information behavior , 2014, J. Documentation.

[9]  S. Berg Snowball Sampling—I , 2006 .

[10]  Elena Maceviciute,et al.  Foundations of library and information science , 2016, Inf. Res..

[11]  I. Segal A Note on the Concept of Entropy , 1960 .

[12]  Zubair Nabi Censorship is Futile , 2014, ArXiv.

[13]  L. Dyall,et al.  Cultural Icons and Marketing of Gambling , 2007, International Journal of Mental Health and Addiction.

[14]  Ronald J. Deibert The geopolitics of internet control: censorship, sovereignty, and cyberspace , 2008 .

[15]  Carol Collier Kuhlthau,et al.  Inside the search process: Information seeking from the user's perspective , 1991, J. Am. Soc. Inf. Sci..

[16]  Hinrich Schütze,et al.  Introduction to information retrieval , 2008 .

[17]  Gerhard Schwabe,et al.  Understanding Information Seeking Behaviour in Financial Advisory , 2009, ISI.

[18]  Shyhtsun Felix Wu,et al.  Crawling Online Social Graphs , 2010, 2010 12th International Asia-Pacific Web Conference.

[19]  Thomas D. Wilson,et al.  Human Information Behavior , 2000, Informing Sci. Int. J. an Emerg. Transdiscipl..

[20]  Simon Chapman,et al.  The Case for the Plain Packaging of Tobacco Products , 2007, Addiction.

[21]  Emily Christofides,et al.  Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? , 2009, Cyberpsychology Behav. Soc. Netw..

[22]  Clémence Magnien,et al.  Quantifying paedophile queries in a large P2P system , 2011, 2011 Proceedings IEEE INFOCOM.

[23]  Jock Given,et al.  Online video in Australia , 2012 .

[24]  Stefaan Verhulst,et al.  Self-Regulation and the Internet , 2004 .

[25]  Jorn De Boever,et al.  Value Networks of P2P TV: An Analysis of Actors and Their Roles , 2008, ICIW.

[26]  Luthfi Assyaukanie,et al.  Islam and the Secular State in Indonesia , 2009 .

[27]  T. D. Wilson,et al.  On user studies and information needs , 2006, J. Documentation.

[28]  Paul Watters,et al.  Data Loss in the British Government: A Bounty of Credentials for Organised Crime , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[29]  Paul A. Watters,et al.  Young people, child pornography, and subcultural norms on the Internet , 2013, J. Assoc. Inf. Sci. Technol..

[30]  Charles Reuben Gibson,et al.  The Ethics of Piracy for Personal Use , 2014 .

[31]  David G. Schwartz Regulation and the internet , 2005 .

[32]  Paul A. Watters,et al.  Statistical and structural approaches to filtering Internet pornography , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[33]  Stuart Hannabuss,et al.  Issues of censorship , 2001 .

[34]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[35]  J. Sidak A Consumer-Welfare Approach to Network Neutrality Regulation of the Internet , 2006 .

[36]  J. Goldsmith REGULATION OF THE INTERNET: THREE PERSISTENT FALLACIES , 2000 .

[37]  Paul A. Watters Cyber Security: Concepts and Cases , 2012 .

[38]  Paul A. Watters A Systematic Approach to Measuring Advertising Transparency Online: An Australian Case Study , 2014, AWC.