Share This Article:

Privacy Negotiation in Socio-Technical Systems

Abstract Full-Text HTML XML Download Download as PDF (Size:209KB) PP. 13-17
DOI: 10.4236/ti.2012.31003    4,711 Downloads   7,441 Views   Citations

ABSTRACT

A socio-technical system (STS) is an approach to complex organizational work design that recognizes the interaction between people and technology in workplaces. The term also refers to the interaction between society’s complex infra-structures and human behavior. In this sense, society itself, and most of its substructures, are complex socio-technical systems. This paper addresses a class of socio-technical systems, represented by web services in a number of domains and attempts to understand the possibility of empowering the web users and consumers to have a say in the develop-ment of privacy agreements. This paper examines the likelihood of the web users and consumers leveraging such a capability, should it exist. This should improve the way privacy agreements are handled that benefits both the service providers and the web users.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

M. Rallapalli and D. Verma, "Privacy Negotiation in Socio-Technical Systems," Technology and Investment, Vol. 3 No. 1, 2012, pp. 13-17. doi: 10.4236/ti.2012.31003.

References

[1] G. Yee and L. Korba, “Privacy Policy Compliance for Web Services,” IEEE International Conference on Web Services (ICWS’04), San Diego, 6-9 June 2004, pp. 158-165. doi:10.1109/ICWS.2004.1314735
[2] W. Xu, R. Sekar, I. V. Ramakrishna and V. N. Venkatakrishnan, “A Framework for Building Privacy-Conscious Composite Web Services,” IEEE International Conference on Web Services (ICWS’06), Chicago, 18-22 September 2006, pp. 655-662. doi:10.1109/ICWS.2006.4
[3] B. Carminati, E. Ferrari and P. C. K. Hung, “Exploring Privacy Issues in Web Services Discovery Agencies,” IEEE Security and Privacy, Vol. 3, No. 5, 2005, pp. 14-21. doi:10.1109/MSP.2005.121
[4] OUT-LAW News, “Regulators Demand Clearer Privacy Policies,” 2009. http://www.out-law.com//default.aspx?page=9795
[5] A. Figueroa, “Privacy Issues Hit Facebook Again,” 2010. http://www.csmonitor.com/Business/new-economy/2010/0730/Privacy-issues-hit-Facebook-again
[6] Nick O’Neill, “10 Privacy Settings Every Facebook User Should Know,” 2009. http://www.allfacebook.com/facebook-privacy-2009-02
[7] Federal Trade Commission, “ChoicePoint Settles Data Security Breach Charges; to Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress,” 2011. http://www.ftc.gov/opa/2006/01/choicepoint.shtm
[8] EPIC Staff Publication, “Choice Point: Introduction and Background,” 2001. http://epic.org/privacy/choicepoint/
[9] K. Tedder, “Don’t Wait for a Data Compromise,” 2010. https://www.firstdata.com/downloads/thought-leadership/fd-data-compromise-wp.pdf
[10] Ponemon Institute, “Ponemon Institute Research,” 2010. http://www.ponemon.org/about-ponemon-research
[11] PrivacyRights Group Compilation, “Chronology of Data Breaches Security Breaches 2005 to Present,” 2011. http://www.privacyrights.org/data-breach
[12] Pew Research Center Report, “Internet & American Life Project,” http://www.pewinternet.org/Press-Releases/2000/86-of-Intenet-Users-Want-to-Prohibit-Online-Companies-From-Disclosing-Their-Personal-Inf.aspx

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.