IDEAS home Printed from https://ideas.repec.org/a/bla/jinfst/v71y2020i9p1030-1043.html
   My bibliography  Save this article

“The dearest of our possessions”: Applying Floridi's information privacy concept in models of information behavior and information literacy

Author

Listed:
  • David Bawden
  • Lyn Robinson

Abstract

This conceptual article argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics. This approach involves achieving informational privacy, through the features of anonymity and obscurity, through an optimal balance of ontological frictions. This approach may be used to modify models for information behavior and for information literacy, giving them a fuller and more effective coverage of privacy issues in the infosphere. For information behavior, the Information Seeking and Communication Model and the Information Grounds conception are most appropriate for this purpose. For information literacy, the metaliteracy model, using a modification a privacy literacy framework, is most suitable.

Suggested Citation

  • David Bawden & Lyn Robinson, 2020. "“The dearest of our possessions”: Applying Floridi's information privacy concept in models of information behavior and information literacy," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 1030-1043, September.
  • Handle: RePEc:bla:jinfst:v:71:y:2020:i:9:p:1030-1043
    DOI: 10.1002/asi.24367
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/asi.24367
    Download Restriction: no

    File URL: https://libkey.io/10.1002/asi.24367?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Philip Fei Wu, 2019. "The privacy paradox in the context of online social networking: A self‐identity perspective," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 70(3), pages 207-217, March.
    2. Philip Fei Wu & Jessica Vitak & Michael T. Zimmer, 2020. "A contextual approach to information privacy research," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(4), pages 485-490, April.
    3. Gerard Salton, 1980. "A progress report on information privacy and data security," Journal of the American Society for Information Science, Association for Information Science & Technology, vol. 31(2), pages 75-83, March.
    4. Alan Rubel & Ryan Biava, 2014. "A framework for analyzing and comparing privacy states," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 65(12), pages 2422-2431, December.
    5. Asimina Vasalou & Adam Joinson & David Houghton, 2015. "Privacy as a fuzzy concept: A new conceptualization of privacy for practitioners," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 66(5), pages 918-929, May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Gavurova, Beata & Skare, Marinko & Hynek, Nik & Moravec, Vaclav & Polishchuk, Volodymyr, 2024. "An information-analytical system for assessing the level of automated news content according to the population structure – A platform for media literacy system development," Technological Forecasting and Social Change, Elsevier, vol. 200(C).
    2. Michael Zimmer & Jessica Vitak & Philip Wu, 2020. "Editorial introduction: “Information privacy in the digital age”," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 997-1001, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Xi Wang & Zhiya Zuo & Xing Tong & Yushan Zhu, 2024. "Talk more about yourself: a data-driven extended theory of reasoned action for online health communities," Information Technology and Management, Springer, vol. 25(3), pages 233-246, September.
    2. Felix Pomeranz, 1988. "Technological Security," The ANNALS of the American Academy of Political and Social Science, , vol. 498(1), pages 70-81, July.
    3. Haifei Yu & Shanshan Zheng & Hao Wu, 2023. "User Privacy Awareness, Incentive and Data Supply Chain Pricing Strategy," Sustainability, MDPI, vol. 15(4), pages 1-24, February.
    4. Epstein, Dmitry & Medzini, Rotem, 2022. "Conversations with fellow leaders: Privacy framing in congressional hearings after Cambridge Analytica," Telecommunications Policy, Elsevier, vol. 46(10).
    5. Sarah Eskens, 2020. "The personal information sphere: An integral approach to privacy and related information and communication rights," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 1116-1128, September.
    6. Rong Tang & Bharat Mehra & Jia Tina Du & Yuxiang (Chris) Zhao, 2021. "Framing a discussion on paradigm shift(s) in the field of information," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 72(2), pages 253-258, February.
    7. Isha Ghosh & Vivek Singh, 2022. "“Not all my friends are friends”: Audience‐group‐based nudges for managing location privacy," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(6), pages 797-810, June.
    8. Chanchai Phonthanukitithaworn & Carmine Sellitto, 2022. "A Willingness to Disclose Personal Information for Monetary Reward: A Study of Fitness Tracker Users in Thailand," SAGE Open, , vol. 12(2), pages 21582440221, May.
    9. Liyanaarachchi, Gajendra, 2021. "Managing privacy paradox through national culture: Reshaping online retailing strategy," Journal of Retailing and Consumer Services, Elsevier, vol. 60(C).
    10. Jiling Li & Zekai Lin & Xiaheng Zhang, 2023. "The Study on the Effectiveness of Sustainable Customer Relationship Management: Evidence from the Online Shopping Industry," Sustainability, MDPI, vol. 15(7), pages 1-21, March.
    11. Luke Stark & Amanda Stanhaus & Denise L. Anthony, 2020. "“I Don't Want Someone to Watch Me While I'm Working”: Gendered Views of Facial Recognition Technology in Workplace Surveillance," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 1074-1088, September.
    12. Britt Paris & Rebecca Reynolds & Catherine McGowan, 2022. "Sins of omission: Critical informatics perspectives on privacy in e‐learning systems in higher education," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(5), pages 708-725, May.
    13. Dassel, Katharina Sophie & Klein, Stefan, 2023. "To Zoom or not: Diverging responses to privacy and security risks," Journal of Business Research, Elsevier, vol. 161(C).
    14. Michael Zimmer & Jessica Vitak & Philip Wu, 2020. "Editorial introduction: “Information privacy in the digital age”," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 71(9), pages 997-1001, September.
    15. Kao, Yu-Hui & Sapp, Stephen G., 2022. "The effect of cultural values and institutional trust on public perceptions of government use of network surveillance," Technology in Society, Elsevier, vol. 70(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jinfst:v:71:y:2020:i:9:p:1030-1043. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.asis.org .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.