Understanding Privacy-Control Arrangements Based on a Theory of Interactive Computation in B2C Service Models
The impact of surveillance and social control, the dangers of big data, and other highly relevant topics have recently come to the forefront of current digital privacy discussions. However, the dynamics of dominant service models in relation to privacy-control arrangements between corporations and c...
Gespeichert in:
| Veröffentlicht in: | 2016 49th Hawaii International Conference on System Sciences (HICSS) S. 5348 - 5357 |
|---|---|
| 1. Verfasser: | |
| Format: | Tagungsbericht Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
01.01.2016
|
| Schlagworte: | |
| ISSN: | 1530-1605, 1530-1605 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The impact of surveillance and social control, the dangers of big data, and other highly relevant topics have recently come to the forefront of current digital privacy discussions. However, the dynamics of dominant service models in relation to privacy-control arrangements between corporations and consumers are not well understood. As such, the main focus of this paper is to explore how to understand emerging and existing individual privacy arrangements in the Business-To-Consumer (B2C) domain. By re-addressing the dominant model based on one-off "encounters" to consider another that is based on ongoing interactions, we can begin to envision the possibility for, and consequences of, new pro-consumer control arrangements. This paper does not recommend which arrangement should prevail, but seeks to serve as a starting point for this understanding and subsequent debate by exploring how we can make sense of privacy-control arrangements in B2C service models. |
|---|---|
| AbstractList | The impact of surveillance and social control, the dangers of big data, and other highly relevant topics have recently come to the forefront of current digital privacy discussions. However, the dynamics of dominant service models in relation to privacy-control arrangements between corporations and consumers are not well understood. As such, the main focus of this paper is to explore how to understand emerging and existing individual privacy arrangements in the Business-To-Consumer (B2C) domain. By re-addressing the dominant model based on one-off "encounters" to consider another that is based on ongoing interactions, we can begin to envision the possibility for, and consequences of, new pro-consumer control arrangements. This paper does not recommend which arrangement should prevail, but seeks to serve as a starting point for this understanding and subsequent debate by exploring how we can make sense of privacy-control arrangements in B2C service models. |
| Author | Morizio, Patricia |
| Author_xml | – sequence: 1 givenname: Patricia surname: Morizio fullname: Morizio, Patricia email: p.morizio@alumni.lse.ac.uk |
| BookMark | eNpNkMFPwjAYxavBRECvXrz06GXYdls7jrCokGA0Ac7L1-0b1mwttoWE_14SPHh6v-T98g5vRAbWWSTkgbMJ52z6vFiW6_VEMC4nUrIrMmJKTvNcKsavyZDnKUu4ZPngH9-SUQjfjAmWcTkk_dY26EME2xi7o5_eHKE-JaWz0buOzrwHu8MebQx0DgEb6iwFuvlC50_UtXRpI3qoozkiLV2_P0SI5uwYS-eipGv0R1MjfXcNduGO3LTQBbz_yzHZvr5sykWy-nhblrNVYgQrYoJNoUSbC9BcQwog2kyDYrLNUaZ1o2vNAaeoc8h1mkGrUpUhR9DYFryoIR2Tp8vu3rufA4ZY9SbU2HVg0R1CxYvzFZlQIjurjxfVIGK196YHf6rUuSyyIv0FA55rrg |
| CODEN | IEEPAD |
| ContentType | Conference Proceeding Journal Article |
| DBID | 6IE 6IL CBEJK RIE RIL 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/HICSS.2016.660 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Psychology Computer Science |
| EISBN | 0769556701 9780769556703 |
| EISSN | 1530-1605 |
| EndPage | 5357 |
| ExternalDocumentID | 7427848 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IL 6IN AAJGR AAWTH ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK M43 OCL RIE RIL 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-i208t-ed872f52ab1ba3aa2f4ba706f5e63cdbcb1ae9eb5a5b34af7374e1eabef818ca3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000432711505047&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1530-1605 |
| IngestDate | Fri Jul 11 07:15:56 EDT 2025 Wed Aug 27 02:04:37 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i208t-ed872f52ab1ba3aa2f4ba706f5e63cdbcb1ae9eb5a5b34af7374e1eabef818ca3 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Conference-1 ObjectType-Feature-3 content type line 23 SourceType-Conference Papers & Proceedings-2 |
| PQID | 1816042724 |
| PQPubID | 23500 |
| PageCount | 10 |
| ParticipantIDs | proquest_miscellaneous_1816042724 ieee_primary_7427848 |
| PublicationCentury | 2000 |
| PublicationDate | 2016-01-01 |
| PublicationDateYYYYMMDD | 2016-01-01 |
| PublicationDate_xml | – month: 01 year: 2016 text: 2016-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | 2016 49th Hawaii International Conference on System Sciences (HICSS) |
| PublicationTitleAbbrev | HICSS |
| PublicationYear | 2016 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0020416 ssj0001968150 |
| Score | 2.061733 |
| Snippet | The impact of surveillance and social control, the dangers of big data, and other highly relevant topics have recently come to the forefront of current digital... |
| SourceID | proquest ieee |
| SourceType | Aggregation Database Publisher |
| StartPage | 5348 |
| SubjectTerms | B2C Big data Biological system modeling Conferences control Data privacy Digital digital advertising digital privacy Dynamical systems Dynamics Interactive marketing personal data store Positioning Privacy Privacy by design Psychology service models Surveillance |
| Title | Understanding Privacy-Control Arrangements Based on a Theory of Interactive Computation in B2C Service Models |
| URI | https://ieeexplore.ieee.org/document/7427848 https://www.proquest.com/docview/1816042724 |
| WOSCitedRecordID | wos000432711505047&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB5UPKwXdV1xfRHBo3HT9JH2qIuiICKo4G2ZJBNY0Fb2IfjvbdK6LujFWy99kElmpjPzfR_AaSTRV_MFT9Nc8IQU8sLKnDsiU4g4xtwGdv07dX-fv7wUDytwtsDCEFEYPqNzfxl6-bYyc18qGyivC5Hkq7CqVNZgtX7qKUWWR75D1_5siSTIntYHWvCoztlbwsZIFIOb2-Hjo5_qys4DNWWQVfnli0OAud7836dtQe8HqcceFjFoG1ao7MLmt1QDa09uFzaWeAe70Fm4vc8deHtexrfUTxt_oPnkw2aGnV1MJh5_EJBw7LKOeZZVJUPWgPpZ5VgoKmLwm6x5c7A2G5fsUg5Z642YV117nfbg-frqaXjDWxEGPpYin3GyuZIulagjjTGidIlGJTKXUhYbq42OkArSKaY6TtCpWCUUEWpydS5gMN6FtbIqaQ9YUjhLAl1hY88yJ7VBnUqrhXGSMkd92PELO3pveDZG7Zr24eTbMqN67_uGBpZUzaejOjvJvFaITPb_vvUAOt7MTcnkENZmkzkdwbr5mI2nk-Owgb4AyIzHfg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB7BUgl6oV2oCoXWlXrE4DjO6wgr0CK2KyRA4haN7bG0Ek2qfSDtvyd2woIEF2655CGPPTOZme_7AP5EEn01X_AkyQVXlCEvrMy5IzKFiGPMbWDXH2XjcX5_X1yvwdEKC0NEYfiMjv1l6OXb2ix8qewk87oQKl-HjUQpKVq01ktFpUjzyPfout8toYLwaXOkBY-arL2jbIxEcTK8HNzc-Lmu9DiQUwZhlTfeOISYi-2PfdwX2H3B6rHrVRT6CmtU9WH7WayBdWe3D59fMQ_2YWvl-JY78O_uNcKledrkEc2SD9opdnY6nXoEQsDCsbMm6llWVwxZC-tntWOhrIjBc7L2zcHebFKxMzlgnT9iXnftYbYLdxfnt4Mh72QY-ESKfM7J5pl0iUQdaYwRpVMaM5G6hNLYWG10hFSQTjDRsUKXxZmiiFCTa7IBg_E36FV1Rd-BqcJZEugKG3ueOakN6kRaLYyTlDragx2_sOX_lmmj7NZ0D34_W6Zsdr9vaWBF9WJWNvlJ6tVCpNp__9ZfsDm8_TsqR5fjqx-w5U3eFlAOoDefLugQPpnH-WQ2_Rk20xNObMrF |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+49th+Hawaii+International+Conference+on+System+Sciences+%28HICSS%29&rft.atitle=Understanding+Privacy-Control+Arrangements+Based+on+a+Theory+of+Interactive+Computation+in+B2C+Service+Models&rft.au=Morizio%2C+Patricia&rft.date=2016-01-01&rft.pub=IEEE&rft.issn=1530-1605&rft.eissn=1530-1605&rft.spage=5348&rft.epage=5357&rft_id=info:doi/10.1109%2FHICSS.2016.660&rft.externalDocID=7427848 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-1605&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-1605&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-1605&client=summon |