{"title":"Creating a sense of digital privacy in the private sector","authors":"Richard Charles Hornberger","doi":"10.1080/19393555.2020.1797948","DOIUrl":null,"url":null,"abstract":"ABSTRACT The research question explores factors that create a feeling of privacy violation and discusses steps organizations can take to improve the perception of digital privacy for employees answering, “What intrusion, interference, and information access factors can be implemented by organizations to create a sense of digital privacy for employees in for-profit organizations?” Moor’s Theory of Privacy guides the research examining three components of normative privacy in a digital age: intrusion protection, interference protection, and information access protection. The method of inquiry is a systematic review of twenty-one articles containing published in peer-reviewed academic journals over the last five years. Intrusion protection recommendations include monitoring and compliance with existing legislation, exhibition of transparency on policies and procedures, creating or revisiting existing organizational policies, and providing or enhancing training practices. Interference protection recommendations include gaining consent on policies, and encouraging systems that allow self-control of privacy. Information access protection recommendations involve weighing benefits and costs of security controls, limiting excessive data collection, anonymizing or obfuscating data collection, deleting data when use is complete, creating sanctions for information security misbehavior, and reviewing mobile device management environments. This discovered framework can decrease levels of stress, improve task performance, and decrease bad behavior will improving levels of job satisfaction and organizational commitment.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Journal: A Global Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393555.2020.1797948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
ABSTRACT The research question explores factors that create a feeling of privacy violation and discusses steps organizations can take to improve the perception of digital privacy for employees answering, “What intrusion, interference, and information access factors can be implemented by organizations to create a sense of digital privacy for employees in for-profit organizations?” Moor’s Theory of Privacy guides the research examining three components of normative privacy in a digital age: intrusion protection, interference protection, and information access protection. The method of inquiry is a systematic review of twenty-one articles containing published in peer-reviewed academic journals over the last five years. Intrusion protection recommendations include monitoring and compliance with existing legislation, exhibition of transparency on policies and procedures, creating or revisiting existing organizational policies, and providing or enhancing training practices. Interference protection recommendations include gaining consent on policies, and encouraging systems that allow self-control of privacy. Information access protection recommendations involve weighing benefits and costs of security controls, limiting excessive data collection, anonymizing or obfuscating data collection, deleting data when use is complete, creating sanctions for information security misbehavior, and reviewing mobile device management environments. This discovered framework can decrease levels of stress, improve task performance, and decrease bad behavior will improving levels of job satisfaction and organizational commitment.