透過您的圖書館登入
IP:3.145.44.118
  • 期刊

Group Privacy: Literature Review and Research Prospects

摘要


Group privacy is often violated, because individuals often upload information on social media or application software, but when the information is jointly constructed by individuals and others, the so‐called "personal information" disclosed by individuals often does not belong to a person, but to the group. Group privacy and related issues stimulate the continuing attention of academia, industry and society. This study sorted out the literature related to group privacy, summarized the concept of group privacy, the willingness of individuals and groups to disclose private information, group privacy protection and other main research directions, and confirmed that group privacy is a field with great potential and needs to be built a research system, which enriches the knowledge map of group privacy research. The research on group privacy has attracted increasing attention from many scholars, and has obtained fruitful research results and broadened the research vision. However, a unified theoretical framework system has not been formed, the research methods and theories of group privacy are not rich enough, the research results are scarce, and there is a lack of research on group privacy of active groups and empirical research. Therefore, this paper proposes a framework for future research on group privacy.

參考文獻


M. Loi, M. Christen: Two Concepts of Group Privacy (Philosophy & Technology), Vol. 33 (2020) No. 2, p.207-224.
J. Kim, R.L. Baskerville and D.Yi: Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online (Information Systems Frontiers), Vol. 22 (2020) No. 1, p.171-185.
L. Floridi: Open data, data protection, and group privacy (Philosophy & Technology), Vol. 27 (2014) No. 1, p.1-3.
L. Taylor: Safety in numbers? Group privacy and big data analytics in the developing world (Group privacy: Springer, 2017).
H. Jia, E.P.S. Baumer: Birds of a feather: Collective privacy of online social activist groups (Computers & Security), Vol. (2022) , p.115.

延伸閱讀