IT, Social Media and Privacy: The Triple Constraint
by
ACKNOWLEDGEMENT
I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.
DECLARATION
I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.
Signed __________________ Date _________________
ABSTRACT
In this study we try to explore the concept of “Triple Constraint” in a holistic context. The main focus of this research is on developing an understanding about the relation between three constraints, namely: Information Technology, Social Media and Privacy. This concept is further enhanced by analysing relation of privacy individually with Information technology and social media.
TABLE OF CONTENTS
ACKNOWLEDGEMENTII
DECLARATIONIII
ABSTRACTIV
CHAPTER 1: INTRODUCTION1
Research Background1
Research Aims and Objectives2
Research Questions2
CHAPTER 2: LITERATURE REVIEW3
Privacy Concept3
Gap between Individual Preferences and behaviour4
The “I've Got Nothing to Hide” Argument6
People's Trust8
Privacy and Technology in the Postmodern World10
Typology of Internet Users13
Internet Privacy Dilemma15
The Online Privacy Controversy16
Social Media Sites17
Characteristics and Aspects of the New Threat to Privacy18
Trust and Internet Privacy24
CHAPTER 3: METHODOLOGY25
Research Method25
Research Approach25
Rationale for a Qualitative Study27
Data collection procedure27
Data Sources28
Limitations28
Validity29
Reliability30
Ethical Considerations31
CHAPTER 4: DISCUSSION AND ANALYSIS33
The Importance of Social Networks in Business33
Barriers and Risks Social Networks33
Relation between Social media and Privacy34
Relation between Privacy and Information Technology38
Technology and Privacy Concerns40
Triple constraint concept - Technology, Social Media and Privacy43
CHAPTER 5: CONCLUSION44
REFERENCES47
CHAPTER 1: INTRODUCTION
Research Background
Internet has emerged as one of the most important innovation in the digital world. In the Internet era, the private lives of people increasingly impact their professional and public images. When people place personal information on social media web sites, they run the risk of having that information used against them by other people (Elahi, Chowdhury & Noll, 2008, 131).
Privacy is an important concept and one that has been defined in a number of different ways. In one of the earliest legal definitions of privacy Marshall (2002) referred to it as “the right to be let alone” (p. 93). More recently, Marchewka & Yu (2004) defined the general right to privacy as “the right of persons to determine what, to whom, and how much information about themselves will be disclosed to other parties” (p. 129). The Internet has changed the way many view the idea of privacy. It is no longer simply a question of being left alone or of controlling information about ourselves and its disclosure. Websites, whether engaged in e-commerce or social networking, collect information on users that access the site. Some of this information is voluntarily provided when registering, filling out surveys, making purchases, etc., while other information is collected without consent as individuals interact with a website. In order to be complete, the definition of Internet privacy may need to be expanded to include not only, as implied by Davis, personal information that is voluntarily disclosed, but also personal information that is captured by a website without ...