IEEE Technology and Society Magazine - March 2022 - 60

Feature
[65] describes South Korean approach (PIPA 2011)
as innovative and transparent, whereas Taiwan's
approach (PDPA 2010 and Enforcement Rules)
is comprehensive but with limited evidence of
enforcement efficacy at the time of publication.6
In contrast, despite the apparent comprehensiveness
of a data protection law developed in the
Philippines (Data Privacy Act 2012) that ostensibly
has a number of features similar to the European
Union, Greenleaf [65] describes the approach as
ultimately ambiguous, unimplemented, and lacking
measures for systematic enforcement concluding
that it as window dressing. Thus, ICS professionals
must consider both the formal regulation and the
informal social norms and conventions of a society
and community.
Attitudes toward privacy and security
technologies
Beyond the academic and legal definitions of
privacy, subjective beliefs concerning privacy and
security must also be considered during the design
process. At a granular level, privacy concerns are a
frequent topic of international surveys. In a Canadian
survey conducted by the Privacy Commissioner
of Canada in 2016, 57% of Canadians surveyed
expressed concern about personal information protection.
Within the United Kingdom, a survey conducted
by the Information Commissioner's Office
found that only 27% of respondents had high trust in
how organizations used their information. They also
noted that the reason for this lack of trust stemmed
from a variety of concerns including " data hacking "
(16%), data leaks/breaches (13%), data misuse
(12%), and security (9%). Although each of these
issues can be classified as a violation of user trust,
these observations require qualification.
Insights can also be drawn by examining attitudes
toward homeland security systems. Sanquist et al.
[66] had participant rate attributes that would attenuate
or amplified risk perception. Despite the increase
in acceptance of these technologies based on their
perceived accuracy, validity, control, and transparency,
rejection of these technologies stemmed from
perceived threats to privacy, including disclosure,
embarrassment, intrusion, rights, as well as threats
that compromise financial information.
6It is crucial to note here that these policies have been updated (e.g., Taiwan's PDPA
2015), with Greenleaf's work reflecting a recent, historical account.
Research on cyber hygiene practices provides
insights into the extent to which individuals are sensitive
and vulnerable to threats. In recent years, scales
have been developed to assess cyber hygiene behavior
[67]. Some of these studies have suggested that
relationships exist between cyber hygiene practices
and personality traits, for example, conscientiousness
appears to be related to changing passwords
and updating software [68]. In research examining
unintentional insider threat detection, Schoenherr
[69] found that individuals high in the emotionality
facet of fear were more likely to disclose information
on social media, whereas those high in the facet of
anxiety were less likely to engage in behaviors that
would make them susceptible to intrusion, for example,
using public WiFi, download files from unknown
sources. Thus, personality differences are likely to
relate to the extent that individuals are aware and
make themselves more susceptible to loss of privacy
and security.
Socioeconomic and cultural differences
Rho et al. [70] provided respondents from numerous
countries with a security and privacy questionnaires.
Crucially, they found that individuals from
countries with higher GDPs expressed more privacy
concerns than those from countries with lower
GDPs. How this result should be interpreted remains
an open question given the factors correlated with
GDP. For instance, respondents from countries with
higher GDP might have greater exposure to technology
and have more experience considering privacy
and security issues. Concomitantly, these respondents
might also have a greater exposure to risk
given their embeddedness within a sociotechnical
system (e.g., datafication of personal information,
use of IoT devices). Finally, individuals from high
GDP countries might perceive themselves as having
higher status and disinclined to share information
due to the comparative lose if their information
is compromised.
Using methods developed by Milberg et al. [62],
Bellman et al. [79] attempted to differentiate the
sources of privacy concerns in terms of individual
experiences, social norms, and political institutions.
In addition to cultural values, they found that the
most important determinant of privacy concerns
was individual experience. Similar results were also
obtained by Cullen [71]. In a study that compared
Japanese and New Zealander respondents, she
60
IEEE Technology and Society Magazine

IEEE Technology and Society Magazine - March 2022

Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - March 2022

Contents
IEEE Technology and Society Magazine - March 2022 - Cover1
IEEE Technology and Society Magazine - March 2022 - Cover2
IEEE Technology and Society Magazine - March 2022 - Contents
IEEE Technology and Society Magazine - March 2022 - 2
IEEE Technology and Society Magazine - March 2022 - 3
IEEE Technology and Society Magazine - March 2022 - 4
IEEE Technology and Society Magazine - March 2022 - 5
IEEE Technology and Society Magazine - March 2022 - 6
IEEE Technology and Society Magazine - March 2022 - 7
IEEE Technology and Society Magazine - March 2022 - 8
IEEE Technology and Society Magazine - March 2022 - 9
IEEE Technology and Society Magazine - March 2022 - 10
IEEE Technology and Society Magazine - March 2022 - 11
IEEE Technology and Society Magazine - March 2022 - 12
IEEE Technology and Society Magazine - March 2022 - 13
IEEE Technology and Society Magazine - March 2022 - 14
IEEE Technology and Society Magazine - March 2022 - 15
IEEE Technology and Society Magazine - March 2022 - 16
IEEE Technology and Society Magazine - March 2022 - 17
IEEE Technology and Society Magazine - March 2022 - 18
IEEE Technology and Society Magazine - March 2022 - 19
IEEE Technology and Society Magazine - March 2022 - 20
IEEE Technology and Society Magazine - March 2022 - 21
IEEE Technology and Society Magazine - March 2022 - 22
IEEE Technology and Society Magazine - March 2022 - 23
IEEE Technology and Society Magazine - March 2022 - 24
IEEE Technology and Society Magazine - March 2022 - 25
IEEE Technology and Society Magazine - March 2022 - 26
IEEE Technology and Society Magazine - March 2022 - 27
IEEE Technology and Society Magazine - March 2022 - 28
IEEE Technology and Society Magazine - March 2022 - 29
IEEE Technology and Society Magazine - March 2022 - 30
IEEE Technology and Society Magazine - March 2022 - 31
IEEE Technology and Society Magazine - March 2022 - 32
IEEE Technology and Society Magazine - March 2022 - 33
IEEE Technology and Society Magazine - March 2022 - 34
IEEE Technology and Society Magazine - March 2022 - 35
IEEE Technology and Society Magazine - March 2022 - 36
IEEE Technology and Society Magazine - March 2022 - 37
IEEE Technology and Society Magazine - March 2022 - 38
IEEE Technology and Society Magazine - March 2022 - 39
IEEE Technology and Society Magazine - March 2022 - 40
IEEE Technology and Society Magazine - March 2022 - 41
IEEE Technology and Society Magazine - March 2022 - 42
IEEE Technology and Society Magazine - March 2022 - 43
IEEE Technology and Society Magazine - March 2022 - 44
IEEE Technology and Society Magazine - March 2022 - 45
IEEE Technology and Society Magazine - March 2022 - 46
IEEE Technology and Society Magazine - March 2022 - 47
IEEE Technology and Society Magazine - March 2022 - 48
IEEE Technology and Society Magazine - March 2022 - 49
IEEE Technology and Society Magazine - March 2022 - 50
IEEE Technology and Society Magazine - March 2022 - 51
IEEE Technology and Society Magazine - March 2022 - 52
IEEE Technology and Society Magazine - March 2022 - 53
IEEE Technology and Society Magazine - March 2022 - 54
IEEE Technology and Society Magazine - March 2022 - 55
IEEE Technology and Society Magazine - March 2022 - 56
IEEE Technology and Society Magazine - March 2022 - 57
IEEE Technology and Society Magazine - March 2022 - 58
IEEE Technology and Society Magazine - March 2022 - 59
IEEE Technology and Society Magazine - March 2022 - 60
IEEE Technology and Society Magazine - March 2022 - 61
IEEE Technology and Society Magazine - March 2022 - 62
IEEE Technology and Society Magazine - March 2022 - 63
IEEE Technology and Society Magazine - March 2022 - 64
IEEE Technology and Society Magazine - March 2022 - 65
IEEE Technology and Society Magazine - March 2022 - 66
IEEE Technology and Society Magazine - March 2022 - 67
IEEE Technology and Society Magazine - March 2022 - 68
IEEE Technology and Society Magazine - March 2022 - 69
IEEE Technology and Society Magazine - March 2022 - 70
IEEE Technology and Society Magazine - March 2022 - 71
IEEE Technology and Society Magazine - March 2022 - 72
IEEE Technology and Society Magazine - March 2022 - 73
IEEE Technology and Society Magazine - March 2022 - 74
IEEE Technology and Society Magazine - March 2022 - 75
IEEE Technology and Society Magazine - March 2022 - 76
IEEE Technology and Society Magazine - March 2022 - 77
IEEE Technology and Society Magazine - March 2022 - 78
IEEE Technology and Society Magazine - March 2022 - 79
IEEE Technology and Society Magazine - March 2022 - 80
IEEE Technology and Society Magazine - March 2022 - 81
IEEE Technology and Society Magazine - March 2022 - 82
IEEE Technology and Society Magazine - March 2022 - 83
IEEE Technology and Society Magazine - March 2022 - 84
IEEE Technology and Society Magazine - March 2022 - 85
IEEE Technology and Society Magazine - March 2022 - 86
IEEE Technology and Society Magazine - March 2022 - 87
IEEE Technology and Society Magazine - March 2022 - 88
IEEE Technology and Society Magazine - March 2022 - 89
IEEE Technology and Society Magazine - March 2022 - 90
IEEE Technology and Society Magazine - March 2022 - 91
IEEE Technology and Society Magazine - March 2022 - 92
IEEE Technology and Society Magazine - March 2022 - 93
IEEE Technology and Society Magazine - March 2022 - 94
IEEE Technology and Society Magazine - March 2022 - 95
IEEE Technology and Society Magazine - March 2022 - 96
IEEE Technology and Society Magazine - March 2022 - Cover3
IEEE Technology and Society Magazine - March 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com