The Impact of Information Technology on Personal Identity Rights and Privacy in the Modern World

Authors

DOI:

https://doi.org/10.59535/jece.v2i1.264

Keywords:

Technology, Personal Identity, Privacy, Digital Age, Perceptions

Abstract

The intersection of information technology and personal identity rights presents a pressing challenge in the contemporary digital landscape. This study explores the impact of technology on personal identity rights and privacy perceptions among individuals affiliated with Women Online University. A convenience sample of 120 participants was recruited from the Women Online University community to participate in an online survey. The survey instrument included structured questions designed to assess participants' perceptions and attitudes regarding technology's impact on personal identity rights and privacy. Quantitative data analysis was conducted using descriptive statistics to summarize participants' responses and inferential statistics to examine relationships between variables. The results of the study reveal diverse perspectives among participants regarding the impact of technology on personal privacy and identity. While a significant proportion of respondent’s express confidence in existing legal protections for personal data, others harbor reservations about their efficacy. Additionally, the study highlights the nuanced relationship between technology and personal identity, with varying degrees of influence attributed to technological advancements. In conclusion, the findings underscore the need for robust regulatory frameworks and ethical guidelines to address the complex challenges posed by technological innovation to personal identity rights and privacy in the digital age. By fostering a deeper understanding of these issues, policymakers, technologists, and researchers can work towards ensuring the protection of individual autonomy and dignity in an increasingly digitalized society.

Downloads

Download data is not yet available.

References

A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, "A survey on homomorphic encryption schemes: Theory and implementation," ACM Computing Surveys (CSUR), vol. 51, no. 4, pp. 1-79, 2018.

I. Adjerid, A. Acquisti, R. Telang, R. Padman, and J. Adler-Milstein, "The impact of privacy regulation and technology incentives: The case of health information exchanges," Management Science, vol. 62, no. 4, pp. 1042-1063, 2016. [Online]. Available: https://doi.org/10.1287/mnsc.2015.2194

A. Al Badawi, B. Veeravalli, C. F. Mun, and K. M. M. Aung, "High-performance FV somewhat homomorphic encryption on GPUs: An implementation using CUDA," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2, pp. 70–95, 2018. [Online]. Available: https://doi.org/10.13154/tches.v2018.i2.70-95

R. J. Anderson, "Security Engineering: A Guide to Building Dependable Distributed Systems," Indianapolis, IN: Wiley, 2008.

D. Baars, "Towards Self-Sovereign Identity using Blockchain Technology," Ph.D. Thesis, University of Twente, 2016.

A. Back, U. Möller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Information Hiding. Berlin: Springer, 2001, pp. 245–257.

A. Beduschi, "Technology dominates our lives – That’s why we should teach human rights law to software engineers," Retrieved from https://theconversation.com/technology-dominates-our-lives-thats-why-we-should-teachhuman-rights-law-to-software-engineers-102530, 2018.

H. Belson et al., "Keys under doormats: Mandating insecurity by requiring government access to all data and communications," Journal of Cybersecurity, vol. 1, no. 1, pp. 69–79, 2015.

P. Brey, "Ethical aspects of information security and privacy," in Security, privacy, and trust in modern data management, 2007, pp. 21-36. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-540-69861-6_3

DTA. (2019). Digital identity programme. Retrieved from https://www.dta.gov.au/what-we-do/policies-and-programs/identity/

e-Estonia. (2019). e-identity. Retrieved from https://e-estonia.com/solutions/e-identity/id-card/

M. Finck, "Blockchains and data protection in the European Union," European Data Protection Law Review, vol. 4, no. 1, pp. 17–35, 2018.

S. Fredman, "Substantive equality revisited," International Journal of Constitutional Law, vol. 14, p. 712, 2016.

M. J. Haenssgen and P. Ariana, "The place of technology in the capability approach," Oxford Development Studies, vol. 46, p. 98, 2018.

W. Pieters, "Beyond individual-centric privacy: Information technology in social systems," The Information Society, vol. 33, no. 5, pp. 271-281, 2017. [Online]. Available: https://doi.org/10.1080/01972243.2017.1354108

M. S. Price, "Internet privacy, technology, and personal information," Ethics and Information Technology, vol. 22, no. 2, pp. 163-173, 2020. [Online]. Available: https://link.springer.com/article/10.1007/s10676-019-09525-y

C. D. Raab, "Information privacy, impact assessment, and the place of ethics," Computer Law & Security Review, vol. 37, p. 105404, 2020. [Online]. Available: https://doi.org/10.1016/j.clsr.2020.105404

J. Van den Hoven, M. Blaauw, W. Pieters, and M. Warnier, "Privacy and information technology." [Online]. Available: https://plato.stanford.edu/entries/it-privacy/

Downloads

Published

2024-04-24

How to Cite

Sweeta Khuram, Mursal Akrami, Fazila Akrami, Khatera Akrami, & Tamanna Quraishi. (2024). The Impact of Information Technology on Personal Identity Rights and Privacy in the Modern World. Journal Electrical and Computer Experiences, 2(1), 23–31. https://doi.org/10.59535/jece.v2i1.264

Issue

Section

Telecommunication System and Technology