Improving protection mechanisms by understanding online risk

Purpose – The purpose of this research is to examine privacy risks for two groups of individuals for whom privacy is an important issue. Understanding the risks to vulnerable groups leads to the development of a prototype tool used to inform users about areas of potential harm in their online behaviour.Design/methodology/approach – Data collection employed a number of qualitative approaches in order to best understand both the risks and the social context surrounding them. Semi‐structured interviews, focus groups and questionnaires were all utilised where appropriate. Subjects were selected from two groups of individuals for whom the abuse of personal information could lead to serious harm – teenagers and domestic abuse survivors.Findings – The findings provide specific examples of risks posed to the two groups of individuals involved in the study and demonstrate the need for protection mechanisms that promote the awareness of potential risk among vulnerable internet users. These formed the basis of the r...

[1]  S. Margulis Conceptions of Privacy: Current Status and Next Steps , 1977 .

[2]  Frank Furedi,et al.  Culture of Fear , 1997 .

[3]  Lincoln Dahlberg,et al.  Internet Research Tracings: Towards Non-Reductionist Methodology , 2006, J. Comput. Mediat. Commun..

[4]  J. Alwang Vulnerability : a view from different disciplines , 2001 .

[5]  J. C. Cannon Privacy: What Developers and IT Professionals Should Know , 2004 .

[6]  C. Fraser,et al.  A High-Tech Twist on Abuse: Technology, Intimate Partner Stalking, and Advocacy , 2005 .

[7]  R. Yin Case Study Research: Design and Methods , 1984 .

[8]  Ian Goldberg,et al.  Privacy-Enhancing Technologies for the Internet, II: Five Years Later , 2002, Privacy Enhancing Technologies.

[9]  Simson Garfinkel,et al.  Database Nation , 2000 .

[10]  R. Clarke Situational Crime Prevention , 1995, Crime and Justice.

[11]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[12]  Steven Furnell End-Users: Internet threats to end-users: Hunting easy prey , 2005 .

[13]  Herbert Burkert,et al.  Privacy-enhancing technologies: typology, critique, vision , 1997 .

[14]  Colin J. Bennett,et al.  The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..

[15]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[16]  Janis Wolak,et al.  The Internet and Family and Acquaintance Sexual Abuse , 2005, Child maltreatment.