O Paradoxo da Privacidade e a Utilização de Tecnologias da Internet Das Coisas
Abstract
RESUMO
Objetivo: O presente estudo objetivou investigar os aspectos que determinam a ação dos usuários de tecnologias da Internet das Coisas ao fornecerem informações pessoais em ambientes inteligentes.
Metodologia: Caracterizou-se como quantitativa, do tipo exploratória e descritiva, implementada por meio da pesquisa de campo, utilizando-se de um questionário autoaplicável.
Originalidade: O presente estudo apresenta os aspectos que determinam a disponibilização de dados pessoais em ambientes inteligentes por parte de usuários brasileiros, explorando o comportamento de uso de uma tecnologia em expansão, no contexto de um país de economia emergente.
Resultados: O ambiente de uso se configura como um aspecto determinante ao fornecimento de informação ao ambiente inteligente de maior influência entre os outros aspectos encontrados. Foi percebido que os usuários tendem a dedicar considerável atenção a segurança e a privacidade das informações que possuem, disponibilizando-as com ressalvas e cuidados. Contudo por vezes, transferem a responsabilidade pela segurança das informações para terceiros, buscando reduzir ao máximo o número de critérios a serem analisados antes de tomar a decisão de disponibilizar seus dados.
Implicações práticas: Numa perspectiva interdisciplinar, este estudo apresenta contributos para o campo da gestão ao fornecer sustentação teórico-empírica para a criação de estratégias de captação de informação e melhoria na experiência dos clientes.
Limitações da investigação: A principal limitação foi a amostra utilizada, recomenda-se que novos estudos sejam realizados para investigar em outros países com contextos culturais e econômicos diferentes, a fim de observar se os aspectos encontrados na amostra brasileira se repetem.
Palavras-chaves: Internet das Coisas; Privacidade; Ambiente Inteligente; Paradoxo da Privacidade.
Full Text:
PDFReferences
Ashraf, Q. M., & Habaebi, M. H. (2015). Autonomic schemes for threat mitigation in Internet of Things. Journal of Network and Computer Applications, 49, 112–127. https://doi.org/10.1016/j.jnca.2014.11.011
Asthon, K. (2010). That ’ Internet of Things ’ Thing. RFID Journal, 4986. https://doi.org/10.1038/nature03475
Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010
Axelson, M., & Bjurström, E. (2019). The Role of Timing in the Business Model Evolution of Spinoffs: The Case of C3 Technologies. Research Technology Management, 62(4), 19–26. https://doi.org/10.1080/08956308.2019.1613116
Baiyere, A., Topi, H., & Venkatesh, V. (2020). Internet of Things (IoT)–A Research Agenda for Information Systems.
Barth, S., & de Jong, M. D. T. (2017). The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review. Telematics and Informatics, 34(7), 1038–1058. https://doi.org/10.1016/j.tele.2017.04.013
Berners-lee, T., & Hara, K. O. (2013). The read – write Linked Data Web Subject Areas :
Bies, R. J., & Culnan, M. J. (2003). Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59(2), 323–342. http://www.blackwell-synergy.com/doi/abs/10.1111/1540-4560.00067%5Cnhttp://www.blackwell-synergy.com.ezproxy.lib.utexas.edu/doi/full/10.1111/1540-4560.00067
Botterman, M. (2009). for the European Commission Information Society and Media Directorte General. Networked Enterprise & RFID Unit–D4, Internet of Things: An Early Reality of the Future Internet, Report of the Internet of Things Workshop, Prague, Czech Republic.
Chabridon, S., Laborde, R., Desprats, T., Oglaza, A., Marie, P., & Marquez, S. M. (2014). A survey on addressing privacy together with quality of context for context management in the Internet of Things. Annales Des Telecommunications/Annals of Telecommunications, 69(1–2), 47–62. https://doi.org/10.1007/s12243-013-0387-2
Chatterjee, S. (2020). Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective. International Journal of Information Security and Privacy (IJISP), 14(4), 92–112.
Cusumano, M. Goeldi, Andreas, D. (2013). New businesses and new business models. The Oxford Handbook of Internet, 239–261.
Danezis, G., & Gürses, S. (2010). A critical review of 10 years of Privacy Technology. Surveill. Cult. A Glob. Surveill. Soc., 1–16.
Domingo, M. C. (2012). An overview of the internet of underwater things. Journal of Network and Computer Applications, 35(6), 1879–1890. https://doi.org/10.1016/j.jnca.2012.07.012
Donaldson, T., & Walsh, J. P. (2015). Toward a theory of business. Research in Organizational Behavior, 35, 181–207. https://doi.org/10.1016/j.riob.2015.10.002
dos Direitos Humanos, O. N. U. D. U. (2016). Disponível em. Acesso Em, 5. https://nacoesunidas.org/wp-content/uploads/2018/10/DUDH.pdf
Dutton, W. H., & William, H. D. (2014). Putting things to work: social and policy challenges for the Internet of things. Info, 16(3), 1–21. https://doi.org/10.1108/info-09-2013-0047
Eurich, M., Oertel, N., & Boutellier, R. (2010). The impact of perceived privacy risks on organizations’ willingness to share item-level event data across the supply chain. Electronic Commerce Research, 10(3), 423–440. https://doi.org/10.1007/s10660-010-9062-0
Gama, M. R., & Santos, C. C. (2019). Capital informacional das comunidades sociais virtuais como suporte a gestão de MPE’s. Ciência Da Informação Em Revista, 6(1), 58. https://doi.org/10.28998/cirev.2019v6n1d
Gerami, M., & Sarihi, S. (2020). The impacts of Internet of Things (IOT) in Supply Chain Management. JOURNAL OF MANAGEMENT AND ACCOUNTING STUDIES, 8(3).
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660. https://doi.org/10.1016/j.future.2013.01.010
Hassan, M., Jincai, C., Iftekhar, A., & Cui, X. (2020). Future of the Internet of Things Emerging with Blockchain and Smart Contracts. Future, 11(6).
Hutchison, D., & Mitchell, J. C. (1973). Lecture Notes in Computer Science. In Lecture Notes in Computer Science (Vol. 9, Issue 3). https://doi.org/10.1016/0020-7101(78)90038-7
Ju, H., Chen, Y., & CB, S. (2020). Energy optimised IoT assisted multiple fuzzy aggravated energy scheduling approach for smart scheduling systems. Enterprise Information Systems, 1–15.
Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers and Security, 64, 122–134. https://doi.org/10.1016/j.cose.2015.07.002
Kranz Matthias, L. R., Michahelles, F., Kranz, M., & Roalter, L. (2010). Things that twitter: social networks and the internet of things. What Can the Internet of Things Do for the Citizen (CIoT) Workshop at The Eighth International Conference on Pervasive Computing (Pervasive 2010). http://www.eislab.net/publications/2010/ThingsThatTwitter_preprint.pdf
Krause, M., & Hochstatter, I. (2005). Challenges in Modelling and Using Quality of Context (QoC) BT - Mobility Aware Technologies and Applications (T. Magedanz, A. Karmouch, S. Pierre, & I. Venieris (eds.); pp. 324–333). Springer Berlin Heidelberg.
Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems Frontiers, 17(2), 243–259.
Maati, B., & Saidouni, D. E. (2020). CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks. Journal of Ambient Intelligence and Humanized Computing, 1–30.
Martin, K. (2020). Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms. Business Ethics Quarterly, 30(1), 65–96. https://doi.org/10.1017/beq.2019.24
Marx, G. T. (2001). Murky conceptual waters: The public and the private. Ethics and Information Technology, 3(3), 157–169. https://doi.org/10.1023/A:1012456832336
Meirelles, F. de S. (2020). 31a Pesquisa Anual do Uso de TI. https://eaesp.fgv.br/sites/eaesp.fgv.br/files/u68/fgvcia2020pesti-resultados_0.pdf
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516. https://doi.org/10.1016/j.adhoc.2012.02.016
Palomino, H. J. A., Orjuela, S., & Acevedo, C. (2020). The Internet of Things IoT, a new ecosystem in an interconnected world: Bibliometric Analysis of 2009-2018.
Pamplona Filho, R. (2014). LEI No 12.965, DE 23 ABRIL DE 2014. Direito UNIFACS–Debate Virtual, 167.
Paul, B. (2015). The next digital gold rush: how the internet of things will create liquid, transparent markets. Strategy & Leadership, 43(1), 36–41. https://doi.org/10.1108/SL-11-2014-0094
Peoples, C., Parr, G., McClean, S., Scotney, B., & Morrow, P. (2013). Performance evaluation of green data centre management supporting sustainable growth of the internet of things. Simulation Modelling Practice and Theory, 34, 221–242. https://doi.org/10.1016/j.simpat.2012.12.008
Prakash, C., & Saini, R. K. (2020). A Model on IoT Security Method and Protocols for IoT Security Layers. In Mobile Radio Communications and 5G Networks (pp. 771–780). Springer.
Santos, C. C. (2015). Investimentos em capacitação empresarial como base para implementação de inovações nas EPP: uma análise da cadeia de metal mecânica em Aracaju. Revista Brasileira de Administração Científica, 6(1), 186–196.
Santos, C. C., & Sales, J. D. A. (2018). Internet of things: is there a new technological position? International Journal of Innovation, 6(3), 287–297. https://doi.org/10.5585/iji.v6i3.178
Santos, C. C., Ufs, P., Sales, J., & Ufs, P. (2015). O DESAFIO DA PRIVACIDADE NA INTERNET DAS COISAS - The Challenge of Privacy on the Internet of Things. Computer Networks, 13(1), 212. https://doi.org/10.1145/2966986.2967034
Saxby, S. (2015). The 2014 CLSR-LSPI Lisbon seminar on “the digital citizen” - Presented at the 9th International Conference on Legal, Security and Privacy Issues in IT law (LSPI) 15-17 October 2014, Vieira De Almeida & Associados, Lisbon, Portugal. Computer Law and Security Review, 31(2), 163–180. https://doi.org/10.1016/j.clsr.2015.01.011
Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 477–564. https://doi.org/10.5771/0943-7444-2016-4-285
Solove, D. J. (2008). Privacy: A Concept in Disarray Privacy. Understanding Privacy, May, 1–11. https://doi.org/10.1191/0969733006nej901oa
Steventon, Alan; Wriht, S. (2010). Intelligent spaces: The application of pervasive ICT. Springer Science & Business Media.
Sun, Z., & Badi, S. (2020). Evaluating the Impacts of IoT Implementation on Inter-organisational Value Co-creation in the Chinese Construction Industry. European, Mediterranean, and Middle Eastern Conference on Information Systems, 698–714.
Thomaz, F., Salge, C., Karahanna, E., & Hulland, J. (2020). Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing. Journal of the Academy of Marketing Science, 48(1), 43–63. https://doi.org/10.1007/s11747-019-00704-3
Turchet, L., Fazekas, G., Lagrange, M., Ghadikolaei, H. S., & Fischione, C. (2020). The Internet of Audio Things: state-of-the-art, vision, and challenges. IEEE Internet of Things Journal.
Valéry, N. (2012). Welcome to the Thingternet: Things, Rather than People, are About to Become the Biggest Users of the Internet. The Economist, 21.
Vasseur, J., Agarwal, N., Hui, J., Shelby, Z., Bertrand, P., & Cedric, C. (2011). RPL: The IP routing protocol designed for low power and lossy networks Internet Protocol for Smart Objects (IPSO) Alliance. April, 20. http://www.ipso-alliance.org/wp-content/media/rpl.pdf
Weber, R. H. (2010). Internet of Things - New security and privacy challenges. Computer Law and Security Review, 26(1), 23–30. https://doi.org/10.1016/j.clsr.2009.11.008
Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., & Borriello, G. (2009). Building the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing, 13(3), 48–55. https://doi.org/10.1109/MIC.2009.52
Zhu, Y., Cambou, B., Hely, D., & Assiri, S. (2020). Extended Protocol Using Keyless Encryption Based on Memristors. Science and Information Conference, 494–510.
Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today’s INTRAnet of things to a future INTERnet of things: A wireless- and mobility-related view. IEEE Wireless Communications, 17(6), 44–51. https://doi.org/10.1109/MWC.2010.5675777
Copyright (c) 2020 European Journal of Applied Business and Management
European Journal of Applied Business and Management
ISSN: 2183-5594
DOI: https://doi.org/10.58869/EJABM
Indexing:
EBSCO | CROSSREF | GOOGLE SCHOLAR | LATINDEX | DRJI | ICI JOURNALS MASTER | REDIB | MIAR
