Digital Privacy Legislation Awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Digital Privacy Legislation Awareness

Authors: Henry Foulds, Magda Huisman, Gunther R. Drevin

Abstract:

Privacy is regarded as a fundamental human right and it is clear that the study of digital privacy is an important field. Digital privacy is influenced by new and constantly evolving technologies and this continuous change makes it hard to create legislation to protect people’s privacy from being exploited by misuse of these technologies.

This study aims to benefit digital privacy legislation efforts by evaluating the awareness and perceived importance of digital privacy legislation among computer science students. The chosen fixed variables for the population are study year and gamer classification.

The use of location based services in mobile applications and games are a concern for digital privacy. For this reason the study focused on computer science students as they have a high likelihood to use and develop this type of software. Surveys were used to evaluate awareness and perceived importance of digital privacy legislation.

The results of the study show that privacy legislation and awareness of privacy legislation are important to people. The perception of the importance of privacy legislation increases with academic experience. Awareness of privacy legislation increases from non-gamers to pro gamers. 

Keywords: Digital privacy, Legislation awareness, Gaming.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1088724

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1998

References:


[1] J. Cameron, “Law and privacy: the debate over Radio Frequency Identification (RFID) legislation,” in Proc. 3rd annual conference on Information security curriculum development, New York, 2006, pp. 151.
[2] B. Schneier, and D. Banisar, The electronic privacy papers: documents on the battle for privacy in the age of surveillance. New York: John Wiley & Sons, 1997.
[3] E. de Kock, “Protection of personal information in South Africa,” retrieved May 31, 2012 from De Kock attorneys: http://www.dekock.co.za/protection-of-personal-information-in-south-africa/.
[4] N. Mawson, “Start moving on privacy law now,” retrieved Aug 9, 2013 from ITWeb Business: http://www.itweb.co.za/ index.php?option=com_content&view=article&id=63894.
[5] B. Korb, “Implementation of POPI Act means companies must secure their information”, retrieved Aug 9, 2013 from ITWebTechforum: http://www.itweb.co.za/index.php?option=com_content&view=article&id=63461.
[6] L. Michalson, “Protection of Personal Information Bill – the implications for you,” retrieved Aug 9, 2013 from Michalsons: http://www.michalsons.co.za/protection-of-personal-information-bill-the-implications-for-you.
[7] United Nations, “The Universal Declaration of Human Rights”, retrieved Aug 9, 2013 from http://www.un.org/en/documents/udhr/.
[8] E. King, “Privacy in constitutions: The data,” retrieved Aug 9, 2013 from Privacy International: https://www.privacyinternational.org/ blog/privacy-in-constitutions-the-data.
[9] P. M. Regan, Legislating Privacy: Technology, Social Values, and Public Policy.Univ of North Carolina Press, 1995.
[10] J. Rachels, “Why Privacy Is Important,” Philosophy & Public Affairs, vol. 4, no. 4, pp. 323-333, Summer 1975.
[11] J. J. Thomson, “The Right To Privacy,” Philosophy & Public Affairs, vol. 4, no. 4, pp. 295-314.
[12] Constitution of the Republic of South Africa no. 108 of 1996, retrieved on Aug 9, 2013 from: http://www.info.gov.za/documents/ constitution/1996/a108-96.pdf.
[13] South Africa, “Promotion of access to information act, 2000,” Act no. 2 of 2000. Government Gazette, no. 20852, Feb 3, 2000.
[14] South Africa, “Electronic communications and transactions act, 2002,” Act no. 25 of 2002. Government Gazette, no. 23708, Aug 2, 2002.
[15] G. van Zyl, “Privacy laws in SA 30 years behind Europe,” retrieved Aug 9, 2013 from ITWeb Africa: http://www.itwebafrica.com/cloud/517-south-africa/231146-privacy-laws-in-sa-30-years-behind-europe.
[16] Phoenix SPI, “Survey of Canadians on Privacy-Related Issues. Final report,” retrieved Aug 9, 2013 from Office of the Privacy Commissioner of Canada: http://www.priv.gc.ca/information/por-rop/2013/ por_2013_01_e.asp.
[17] Anon. “Privacy Awareness Week 2013,” retrieved Aug 9, 2013 from Office of the Australian Information Commissioner: http://oaic.gov.au/ news-and-events/privacy-awareness-week.
[18] K. Steininger, and D. Rückel, “Legal Literacy and Users’ Awareness of Privacy, Data Protection and Copyright Legislation in the Web 2.0 Era,” in Proc 11th international conference on Wirtschaftsinformatik, University of Leipzig, Germany, 2013.
[19] The White House, “The Comprehensive National Cybersecurity Initiative,” retrieved Aug 9, 2013 from The White House Foreign Policy: http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative.
[20] G. Myles, A. Friday, and N. Davies, “Preserving privacy in environments with location-based applications,” Pervasive Computing, IEEE , vol.2, no.1, pp.56-64, Jan-Mar 2003.
[21] A. R. Beresford, and F. Stajano, “Location privacy in pervasive computing,” Pervasive Computing, IEEE, vol.2, no.1, pp.46-55, Jan-Mar 2003.
[22] Y. Poullet, “About the E-Privacy Directive: Towards a Third Generation of Data Protection Legislation?” in Data Protection in a Profiled World, S. Gutwirth, Ed., Y. Poullet, Ed., and P. de Hert Ed. Springer Netherlands, 2010, pp. 3-30.
[23] M. Duckham and L. Kulik, “Location privacy and location-aware computing,” in Dynamic & mobile GIS: investigating change in space and time, J. Dtummond, Ed. CRC Press, 2006, pp 34-51.
[24] R.P. Minch, “Privacy issues in location-aware mobile devices,” in Proc. 37th Annual Hawaii International Conference onSystem Sciences, Hawaii, 2004.
[25] J. Krumm, “A survey of computational location privacy,” Personal Ubiquitous Computing, vol. 13, no. 6, pp. 391-399, Aug 2009.
[26] L.S. Strickland, and L.E. Hunt, “Technology, security, and individual privacy: New tools, new threats, and new public perceptions,” Journal of the American Society for Information Science and Technology, vol. 56, no. 3, pp. 221-234, 2005.
[27] J. C. Cannon, Privacy: What Developers and it Professionals should Know, Addison-Wesley Professional, 2004.
[28] M. Decker, “Location Privacy – An Overview,” in Proc 7th International Conference on Mobile Business, Barcelona, 2008, pp. 221-230.