ArticlePDF Available

Public Perception of the Data Environment and Information Transactions: A selected-survey analysis of the European public’s views on the data environment and data transactions

Authors:

Abstract

When engaging in data transactions, it has consistently been observed that individuals' behaviour does not correspond with individuals' theoretically stated preferences about privacy and the importance of personal data. This paper considers this 'paradox'. First, through an analysis of selected surveys, we elaborate a picture of how the public perceives the data environment and their interaction with it. We find that, whilst the public places significant weight on the values of privacy and data protection and has a formal understanding of the features of the data environment, there is a significant knowledge deficit relating to the specifics of data flows and processing. Although the public felt that they were being forced into engaging in an ever increasing number of data transactions, they lacked the clarity and understanding to evaluate the significance of these transactions either at the individual or social level. We then consider how these findings relate to specific transactions involving personal data transfer. Acquisti and Grossklags theorise that decision making may be unbalanced by limited information, bounded rationality issues, psychological distortions and ideology and personal attitudes. Using the findings from our selected survey analysis, we add substance to these claims. The lack of understanding of the data environment coupled with the necessity to act in this environment accounts for impacts on each limiting factor and reduces the ability for the individual to 'rationally' balance each transaction. Awareness of issues (and the importance allocated to personal data) on an abstract scale does not translate to the apparently corresponding action in concrete situations.
A preview of the PDF is not available
... All governments around the world (the United States, United Kingdom, EU, Japan, etc.) are implementing government lead policies and institutional strategies for the use of public open data (Hallinan & Friedewald, 2012). Public open data are actively used as linked data for the growth of society and the economy (Pabn, Gutirrez, Fernndez, & Martnez-Prieto, 2013). ...
Article
Full-text available
In modern society, the importance of information is constantly growing. Human life has been diversely changed due to the volume expansion of information handling and distribution. The rapid growth and informatization of information and communications technology (ICT) could be the driver of the production and distribution of information in the real world. Also, it has greatly influenced the economy, politics, society, culture, etc. As the value of information continues to increase, all governments around the world are becoming more and more interested in the reaction to the provision of information. The people need liberty and equality in the environment for the acquisition or utilization of necessary information. Especially due to the importance of the information sharing system, both the government and people are greatly interested in the information sharing policy of the government. Information sharing policies around the world greatly affect people. They disclose information (from government agencies, local government units, public institutions, etc.) to people. However, in the case of national research institutes, their information sharing policy has been ineffective due to the specialty of their work and data. Also, their data are not at the general information sharing level. In this paper, first, the information science policy for public open data of national research institutes is presented and discussed. First, we will look for an efficient method of information sharing policy-making for national research institutes. Then we will discuss and present research results data of national research institutes. These will comprise the most useful information from national research institutes. Also, the actual availability of the research results data will be discussed through their utilization trend analysis. In this paper, we propose the information science policy direction for public open data of national research institutes through a study of their information sharing system.
Article
In the big data era, information security is becoming more and more important. The recent scandal of the data privacy on Facebook sounded the warning bell for us. Based on the utility theory, this paper proposes that the disclosure behavior of consumer personal information is mainly influenced by two factors, which are perceived risk and perceived benefit, respectively. When consumers make decisions, they weigh the risks and benefits. If the income is greater than the risk, the consumer is willing to provide the information on the website and vice versa. This paper analyzes the serious threats to the safety and privacy of commercial big data and proposes a multi‐level security protection theoretical model for business information security and privacy protection from the perspective of business big data security. The security functions and core technologies of each layer are described in detail, which provide a useful and in‐depth theoretical exploration for practical engineering. Finally, based on the privacy protection of large data and the principle of RBAC, a model of user privacy information security system is proposed.
Article
Full-text available
The economic perspective on privacy presented in this paper resorts to an actor-centred approach deploying a cost-benefit analysis for the data subject and the data controller. In the course of this analysis a basic decision theoretic model is presented. Whereas the data subject faces the choice of “disclosing” or “retaining” personal information, the data controller has to consider the costs and benefits of collecting, aggregating, storing and processing data as well as of potential privacy breaches.
Article
Full-text available
This research addresses the social aspects associated with sharing data, especially personal information, in respect of plans for interoperable European electronic ID systems. The paper reports on a survey which was designed to investigate EU citizens' perceptions and attitudes towards issues involved in making eIDs interoperable. The construction of the survey drew from an underlying conceptual framework of institutional trust. Findings arising from the analysis of the survey point to an overall negative perception of the ID authorities by EU citizens. The vast majority of the respondents do not trust the relevant institutions; they are seriously critical about the competence of the authorities, and are dubious about their ability to handle personal data with appropriate care. Moreover, they are suspicious of the authorities misusing their identity data. These negative attitudes of citizens hold important implications for any future attempts at implementing eID cards, as these perceptions may well be translated into subsequent behaviours, namely, resistance to use or, indeed, non-use. The most negative attitudes were found in respondents from the UK and Ireland, and the least negative in Central and Eastern Europe.
Article
Full-text available
Using the example of Greek society this paper documents how the pragmatics and practicalities of 'doing surveillance studies' can itself be shaped by the unique political and social history of the society being studied. The legacy of authoritarian surveillance poses unique challenges to the practice of studying surveillance in Greece and in other post-authoritarian societies. This point is accentuated with reference to how the history of authoritarian surveillance continues to shape the types of methodologies that are possible for studying surveillance and the analytical orientation of such studies. It also informs us how we might interpret the prospect for resisting surveillance and can have implications for the personal biography of researchers, who have experienced such surveillance.
Article
Full-text available
As electronic commerce environments become more and more interactive, privacy is a matter of increasing concern. Many surveys have investigated households' privacy attitudes and concerns, revealing a general desire among Internet users to protect their privacy. To complement these questionnaire-based studies, we conducted an experiment in which we compared selfreported privacy preferences of 171 participants with their actual disclosing behavior during an online shopping episode. Our results suggest that current approaches to protect online users' privacy, such as EU data protection regulation or P3P, may face difficulties to do so effectively. This is due to their underlying assumption that people are not only privacy conscious, but will also act accordingly. In our study, most individuals stated that privacy was important to them, with concern centering on the disclosure of different aspects of personal information. However, regardless of their specific privacy concerns, most participants did not live up to their self-reported privacy preferences. As participants were drawn into the sales dialogue with an anthropomorphic 3-D shopping bot, they answered a majority of questions, even if these were highly personal. Moreover, different privacy statements had no effect on the amount of information disclosed; in fact, the mentioning of EU regulation seemed to cause a feeling of 'false security'. The results suggest that people appreciate highly communicative EC environments and forget privacy concerns once they are `inside the Web'.
Article
Data protection and privacy gain social importance as technology and data flows play an ever greater role in shaping social structure. Despite this, understanding of public opinion on these issues is conspicuously lacking. This article is a meta-analysis of public opinion surveys on data protection and privacy focussed on EU citizens. The article firstly considers the understanding and awareness of the legal framework for protection as a solid manifestation of the complex concepts of data protection and privacy. This is followed by a consideration of perceptions of privacy and data protection in relation to other social goals, focussing on the most visible of these contexts–the debate surrounding privacy, data protection and security. The article then considers how citizens perceive the ‘real world’ environment in which data processing takes place, before finally considering the public's perception and evaluation of the operation of framework against environment.
Article
Surveys and experiments have uncovered a dichotomy between stated attitudes and actual behavior of individuals facing decisions aecting their privacy and their personal information security. Surveys report that most individuals are concerned about the security of their personal information and are willing to act to protect it. Experiments reveal that very few individuals actually take any action to protect their personal information, even when doing so involves limited costs. In this paper we analyze the causes of this dichotomy. We discuss which economic consid- erations are likely to aect individual choice and we advance hypotheses about why individuals' information security attitudes seem inconsistent with their behavior.
Article
A tremendous amount of news coverage and analysis of privacy issues has been driven by surveys of consumers showing high levels of concern. For this study, the authors reviewed 23 privacy surveys to assess their real usefulness to policymakers. Polls rarely play as large a role in policymaking as they have in the context of privacy. The study explains why lawmakers are right to be skeptical of surveys as a guide to policymaking generally, and privacy in particular. The design of the survey format and questions can be used to manipulate survey results. In reviewing privacy surveys, the authors found almost universal use of "push-pull" questions or prompting for certain results. By contrast, the least manipulative form of surveys, unprompted surveys, show little concern for privacy as such, and more concern for crime issues like credit card fraud. Also, privacy surveys tend to lump together issues like credit card fraud, spam, and marketing under the heading of "privacy," making it difficult to identify consumer concerns with precision. Surveys generally, and privacy surveys in particular, also suffer from the "talk is cheap" problem. It costs a consumer nothing to express a desire for federal law to protect privacy. But if such law became a reality, it will cost the economy as a whole, and consumers in particular, significant amounts that surveys do not and cannot reveal. By contrast, more objective measures of consumer actions show that, whatever consumers may say, they are going online and buying online in droves. In 1999, several forecasters predicted that electronic commerce would grow slowly because of the public's concerns about privacy. But this gloomy scenario has not come to pass, with electronic commerce revenues growing far faster than projected. The authors conclude that the craze for privacy surveys may be chalked up partly to the fact that for much of the debate no other information about the costs and benefits of privacy has been available. They further conclude that the surveys are not a sound basis for public policy.
Article
Highly portable information collection and transmission technologies such as radio frequency identification (RFID) tags and smart cards are becoming ubiquitous in government and business—employed in functions including homeland security, information security, physical premises security, and even the control of goods in commerce. And, directly or indirectly, in many of these applications, it is individuals and their activities that are tracked. Yet, a significant unknown is (a) whether the public understands these technologies and the manner in which personally identifiable information may be collected, maintained, used, and disseminated; and (b) whether the public consents to these information practices. To answer these and related questions, we surveyed a select group of citizens on the uses of this technology for business as well as homeland security purposes. We found a significant lack of understanding, a significant level of distrust even in the context of homeland security applications, and a very significant consensus for governmental regulation. We conclude that a primary objective for any organization deploying these technologies is the promulgation of a comprehensive Technology Privacy Policy, and we provide detailed specifications for such an effort. © 2005 Wiley Periodicals, Inc.
Vertrauen der ÖsterreicherInnen in den Datenschutz Oekonsult Communication & Consulting A Survey on EU Citizen's Trust in ID Systems and Authorities
  • K Allwinger
  • J M A Schillab
  • J Backhouse
  • R Halperin
  • S Bellman
  • E J Johnson
  • S J Kobrin
  • G L Lohse
ALLWINGER, K. & SCHILLAB, J. M. A. (2008): Vertrauen der ÖsterreicherInnen in den Datenschutz, Baden, Austria, Oekonsult Communication & Consulting. http://www.oekonsult.eu/datensicherheit2008.pdf BACKHOUSE, J. & HALPERIN, R. (2007): A Survey on EU Citizen's Trust in ID Systems and Authorities, FIDIS Deliverable 4.4, London, London School of Economics and Political Science. http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp4-del4.4.survey.pdf BELLMAN, S., JOHNSON, E. J., KOBRIN, S. J. & LOHSE, G. L. (2004): "International Differences in Information Privacy Concerns: A Global Survey of Consumers", The Information Society, 20, 313–324.
With A Grain of Salt: What Consumer Privacy Surveys Don't Tell Us Public Awareness Survey 2008, Portarlington, Ireland, Data Protection CommissionerStudying Surveillance in Greece: Methodological and Other Problems Related to an Authoritarian Surveillance Culture
  • J Harper
  • S M Singleton
HARPER, J. & SINGLETON, S. M. (2001): "With A Grain of Salt: What Consumer Privacy Surveys Don't Tell Us". http://ssrn.com/abstract=299930 Landsdowne Market Research (2008): Public Awareness Survey 2008, Portarlington, Ireland, Data Protection Commissioner. http://www.dataprotection.ie/documents/press/Survey08.pdf MURPHY, O. (2007): A Surveillance Society: Qualitative Research Report, Report prepared for COI on behalf of ICO Wilmslow, Cheshire, UK. http://www.ico.gov.uk/upload/documents/library/corporate/research_and_reports/surv eillance_report_v6_final.pdf SAMATAS, M. (2005): "Studying Surveillance in Greece: Methodological and Other Problems Related to an Authoritarian Surveillance Culture", Surveillance & Society, 3, 181-197.