Understanding Privacy-Control Arrangements Based on a Theory of Interactive Computation in B2C Service Models

The impact of surveillance and social control, the dangers of big data, and other highly relevant topics have recently come to the forefront of current digital privacy discussions. However, the dynamics of dominant service models in relation to privacy-control arrangements between corporations and c...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2016 49th Hawaii International Conference on System Sciences (HICSS) s. 5348 - 5357
Hlavní autor: Morizio, Patricia
Médium: Konferenční příspěvek Journal Article
Jazyk:angličtina
Vydáno: IEEE 01.01.2016
Témata:
ISSN:1530-1605, 1530-1605
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The impact of surveillance and social control, the dangers of big data, and other highly relevant topics have recently come to the forefront of current digital privacy discussions. However, the dynamics of dominant service models in relation to privacy-control arrangements between corporations and consumers are not well understood. As such, the main focus of this paper is to explore how to understand emerging and existing individual privacy arrangements in the Business-To-Consumer (B2C) domain. By re-addressing the dominant model based on one-off "encounters" to consider another that is based on ongoing interactions, we can begin to envision the possibility for, and consequences of, new pro-consumer control arrangements. This paper does not recommend which arrangement should prevail, but seeks to serve as a starting point for this understanding and subsequent debate by exploring how we can make sense of privacy-control arrangements in B2C service models.
AbstractList The impact of surveillance and social control, the dangers of big data, and other highly relevant topics have recently come to the forefront of current digital privacy discussions. However, the dynamics of dominant service models in relation to privacy-control arrangements between corporations and consumers are not well understood. As such, the main focus of this paper is to explore how to understand emerging and existing individual privacy arrangements in the Business-To-Consumer (B2C) domain. By re-addressing the dominant model based on one-off "encounters" to consider another that is based on ongoing interactions, we can begin to envision the possibility for, and consequences of, new pro-consumer control arrangements. This paper does not recommend which arrangement should prevail, but seeks to serve as a starting point for this understanding and subsequent debate by exploring how we can make sense of privacy-control arrangements in B2C service models.
Author Morizio, Patricia
Author_xml – sequence: 1
  givenname: Patricia
  surname: Morizio
  fullname: Morizio, Patricia
  email: p.morizio@alumni.lse.ac.uk
BookMark eNpNkMFPwjAYxavBRECvXrz06GXYdls7jrCokGA0Ac7L1-0b1mwttoWE_14SPHh6v-T98g5vRAbWWSTkgbMJ52z6vFiW6_VEMC4nUrIrMmJKTvNcKsavyZDnKUu4ZPngH9-SUQjfjAmWcTkk_dY26EME2xi7o5_eHKE-JaWz0buOzrwHu8MebQx0DgEb6iwFuvlC50_UtXRpI3qoozkiLV2_P0SI5uwYS-eipGv0R1MjfXcNduGO3LTQBbz_yzHZvr5sykWy-nhblrNVYgQrYoJNoUSbC9BcQwog2kyDYrLNUaZ1o2vNAaeoc8h1mkGrUpUhR9DYFryoIR2Tp8vu3rufA4ZY9SbU2HVg0R1CxYvzFZlQIjurjxfVIGK196YHf6rUuSyyIv0FA55rrg
CODEN IEEPAD
ContentType Conference Proceeding
Journal Article
DBID 6IE
6IL
CBEJK
RIE
RIL
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/HICSS.2016.660
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Psychology
Computer Science
EISBN 0769556701
9780769556703
EISSN 1530-1605
EndPage 5357
ExternalDocumentID 7427848
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
AAWTH
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
M43
OCL
RIE
RIL
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-i208t-ed872f52ab1ba3aa2f4ba706f5e63cdbcb1ae9eb5a5b34af7374e1eabef818ca3
IEDL.DBID RIE
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000432711505047&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1530-1605
IngestDate Fri Jul 11 07:15:56 EDT 2025
Wed Aug 27 02:04:37 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i208t-ed872f52ab1ba3aa2f4ba706f5e63cdbcb1ae9eb5a5b34af7374e1eabef818ca3
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Conference-1
ObjectType-Feature-3
content type line 23
SourceType-Conference Papers & Proceedings-2
PQID 1816042724
PQPubID 23500
PageCount 10
ParticipantIDs proquest_miscellaneous_1816042724
ieee_primary_7427848
PublicationCentury 2000
PublicationDate 2016-01-01
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – month: 01
  year: 2016
  text: 2016-01-01
  day: 01
PublicationDecade 2010
PublicationTitle 2016 49th Hawaii International Conference on System Sciences (HICSS)
PublicationTitleAbbrev HICSS
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020416
ssj0001968150
Score 2.0618396
Snippet The impact of surveillance and social control, the dangers of big data, and other highly relevant topics have recently come to the forefront of current digital...
SourceID proquest
ieee
SourceType Aggregation Database
Publisher
StartPage 5348
SubjectTerms B2C
Big data
Biological system modeling
Conferences
control
Data privacy
Digital
digital advertising
digital privacy
Dynamical systems
Dynamics
Interactive
marketing
personal data store
Positioning
Privacy
Privacy by design
Psychology
service models
Surveillance
Title Understanding Privacy-Control Arrangements Based on a Theory of Interactive Computation in B2C Service Models
URI https://ieeexplore.ieee.org/document/7427848
https://www.proquest.com/docview/1816042724
WOSCitedRecordID wos000432711505047&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS-wwEB5UPPguPlflqU-J4NFo0qZNe9RF0YsIKnhbJskEFrSV_SH435ukdRX04i2XpCWTzExm5psP4MiRktrlNbfKCB78W8tRFwUvHJJXskJbYiKb0Dc31eNjfbsExwssDBGl4jM6icOUy3etncdQ2amOvBCqWoZlrcsOq_UZT6nLSsYMXf_YEirRnoYLLbgMPnvfsFGK-vTqenh3F6u6ypPUmjLRqnzTxcnAXK7_7tf-wtYnUo_dLmzQBixRM4D1D6oG1t_cAfz50ndwAGsLtfe2Cc8PX_EtYbXxK9o3Puxq2NnZZBLxBwkJx86DzXOsbRiyDtTPWs9SUBGT3mTdl5O02bhh59mQ9dqIRda1p-kWPFxe3A-veE_CwMeZqGacXKUzX2RopMEcMfPKoBalL6jMrTPWSKSaTIGFyRV6nWtFktCQD76AxXwbVpq2oX_AciVIOl-ZMDHYxOCZShFWdl4rn9la7MBm3NjRS9dnY9Tv6Q4cfkhmFM5-TGhgQ-18OgreSRm5QjK1-_PUPViLYu5CJv9hZTaZ0z6s2tfZeDo5SAfoHQCwxus
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PSx0xEB6sLdRebJ-W2mqbQo-NJrvZze6xPpQntQ9BBW_LJJnAA7tb3g_B_75Jdn0K7cXbXpIsmWRmMjPffADfHCmpXV5zq4zgwb-1HHVR8MIheSUrtCUmsgk9nVY3N_XFBnxfY2GIKBWf0WH8TLl819lVDJUd6cgLoaoX8LJQ4d3To7UeIyp1WcmYoxueW0Il4tNwpQWXwWsfWjZKUR9NzsaXl7GuqzxMzSkTsco_2jiZmNPt5_3cW9h9xOqxi7UVegcb1I5g-4GsgQ13dwRvnnQeHMHWWvHd78Dv66cIlzDb7A7tPR_3Vezsx3weEQgJC8eOg9VzrGsZsh7WzzrPUlgRk-Zk_cpJ3mzWsuNszAZ9xCLv2u1iF65PT67GEz7QMPBZJqolJ1fpzBcZGmkwR8y8MqhF6Qsqc-uMNRKpJlNgYXKFXudakSQ05IM3YDF_D5tt19IHYLkSJJ2vTBgYrGLwTaUIMzuvlc9sLfZgJ25s86fvtNEMe7oHXx8k04TTH1Ma2FK3WjTBPykjW0imPv5_6Bd4Pbn6dd6cn01_foKtKPI-gLIPm8v5ig7glb1bzhbzz-kw_QWBB8oy
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+49th+Hawaii+International+Conference+on+System+Sciences+%28HICSS%29&rft.atitle=Understanding+Privacy-Control+Arrangements+Based+on+a+Theory+of+Interactive+Computation+in+B2C+Service+Models&rft.au=Morizio%2C+Patricia&rft.date=2016-01-01&rft.pub=IEEE&rft.issn=1530-1605&rft.eissn=1530-1605&rft.spage=5348&rft.epage=5357&rft_id=info:doi/10.1109%2FHICSS.2016.660&rft.externalDocID=7427848
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-1605&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-1605&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-1605&client=summon