It, Social Media And Privacy: The Triple Constraint

Read Complete Research Material



IT, Social Media and Privacy: The Triple Constraint

by

ACKNOWLEDGEMENT

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

ABSTRACT

In this study we try to explore the concept of “Triple Constraint” in a holistic context. The main focus of this research is on developing an understanding about the relation between three constraints, namely: Information Technology, Social Media and Privacy. This concept is further enhanced by analysing relation of privacy individually with Information technology and social media.

TABLE OF CONTENTS

ACKNOWLEDGEMENTII

DECLARATIONIII

ABSTRACTIV

CHAPTER 1: INTRODUCTION1

Research Background1

Research Aims and Objectives2

Research Questions2

CHAPTER 2: LITERATURE REVIEW3

Privacy Concept3

Gap between Individual Preferences and behaviour4

The “I've Got Nothing to Hide” Argument6

People's Trust8

Privacy and Technology in the Postmodern World10

Typology of Internet Users13

Internet Privacy Dilemma15

The Online Privacy Controversy16

Social Media Sites17

Characteristics and Aspects of the New Threat to Privacy18

Trust and Internet Privacy24

CHAPTER 3: METHODOLOGY25

Research Method25

Research Approach25

Rationale for a Qualitative Study27

Data collection procedure27

Data Sources28

Limitations28

Validity29

Reliability30

Ethical Considerations31

CHAPTER 4: DISCUSSION AND ANALYSIS33

The Importance of Social Networks in Business33

Barriers and Risks Social Networks33

Relation between Social media and Privacy34

Relation between Privacy and Information Technology38

Technology and Privacy Concerns40

Triple constraint concept - Technology, Social Media and Privacy43

CHAPTER 5: CONCLUSION44

REFERENCES47

CHAPTER 1: INTRODUCTION

Research Background

Internet has emerged as one of the most important innovation in the digital world. In the Internet era, the private lives of people increasingly impact their professional and public images. When people place personal information on social media web sites, they run the risk of having that information used against them by other people (Elahi, Chowdhury & Noll, 2008, 131).

Privacy is an important concept and one that has been defined in a number of different ways. In one of the earliest legal definitions of privacy Marshall (2002) referred to it as “the right to be let alone” (p. 93). More recently, Marchewka & Yu (2004) defined the general right to privacy as “the right of persons to determine what, to whom, and how much information about themselves will be disclosed to other parties” (p. 129). The Internet has changed the way many view the idea of privacy. It is no longer simply a question of being left alone or of controlling information about ourselves and its disclosure. Websites, whether engaged in e-commerce or social networking, collect information on users that access the site. Some of this information is voluntarily provided when registering, filling out surveys, making purchases, etc., while other information is collected without consent as individuals interact with a website. In order to be complete, the definition of Internet privacy may need to be expanded to include not only, as implied by Davis, personal information that is voluntarily disclosed, but also personal information that is captured by a website without ...
Related Ads