{"title":"Information privacy and the digital generation gap: An exploratory study","authors":"Ruth Halperin, Y. Dror","doi":"10.1080/15536548.2016.1243852","DOIUrl":null,"url":null,"abstract":"ABSTRACT Over the past decade, the demise of privacy has been repeatedly pronounced by renowned technology executives such as Mark Zuckerberg, who have declared privacy to be passé and anachronistic—“so 20th century”—or the concern of old people. However, there has been relatively little research into privacy perception and behavior among different generations that may relate to how people navigate their private lives in online settings. Furthermore, recent research has revealed the ways in which privacy concerns of young Internet users are enacted, thus challenging overgeneralized claims of a clear-cut generation gap associated with online privacy. As information privacy problems are becoming thornier, unfounded statements voiced by stakeholders with vested interests should be put to one side. Instead, systematic research is needed to understand how privacy is perceived and managed by people of different age groups, and what measures can and should be taken to address current and future concerns of Internet users across generations. We explore these questions and account for the results using a representative sample from Israel.","PeriodicalId":44332,"journal":{"name":"International Journal of Information Security and Privacy","volume":"47 1","pages":"166 - 180"},"PeriodicalIF":0.5000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15536548.2016.1243852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 11
Abstract
ABSTRACT Over the past decade, the demise of privacy has been repeatedly pronounced by renowned technology executives such as Mark Zuckerberg, who have declared privacy to be passé and anachronistic—“so 20th century”—or the concern of old people. However, there has been relatively little research into privacy perception and behavior among different generations that may relate to how people navigate their private lives in online settings. Furthermore, recent research has revealed the ways in which privacy concerns of young Internet users are enacted, thus challenging overgeneralized claims of a clear-cut generation gap associated with online privacy. As information privacy problems are becoming thornier, unfounded statements voiced by stakeholders with vested interests should be put to one side. Instead, systematic research is needed to understand how privacy is perceived and managed by people of different age groups, and what measures can and should be taken to address current and future concerns of Internet users across generations. We explore these questions and account for the results using a representative sample from Israel.
期刊介绍:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.