O Paradoxo da Privacidade e a Utilização de Tecnologias da Internet Das Coisas

Carlos Cesar Santos, Jefferson David Araujo Sales

Abstract


RESUMO

Objetivo: O presente estudo objetivou investigar os aspectos que determinam a ação dos usuários de tecnologias da Internet das Coisas ao fornecerem informações pessoais em ambientes inteligentes.

Metodologia: Caracterizou-se como quantitativa, do tipo exploratória e descritiva, implementada por meio da pesquisa de campo, utilizando-se de um questionário autoaplicável.

Originalidade: O presente estudo apresenta os aspectos que determinam a disponibilização de dados pessoais em ambientes inteligentes por parte de usuários brasileiros, explorando o comportamento de uso de uma tecnologia em expansão, no contexto de um país de economia emergente.

Resultados: O ambiente de uso se configura como um aspecto determinante ao fornecimento de informação ao ambiente inteligente de maior influência entre os outros aspectos encontrados. Foi percebido que os usuários tendem a dedicar considerável atenção a segurança e a privacidade das informações que possuem, disponibilizando-as com ressalvas e cuidados. Contudo por vezes, transferem a responsabilidade pela segurança das informações para terceiros, buscando reduzir ao máximo o número de critérios a serem analisados antes de tomar a decisão de disponibilizar seus dados.

Implicações práticas: Numa perspectiva interdisciplinar, este estudo apresenta contributos para o campo da gestão ao fornecer sustentação teórico-empírica para a criação de estratégias de captação de informação e melhoria na experiência dos clientes.

Limitações da investigação: A principal limitação foi a amostra utilizada, recomenda-se que novos estudos sejam realizados para investigar em outros países com contextos culturais e econômicos diferentes, a fim de observar se os aspectos encontrados na amostra brasileira se repetem.

Palavras-chaves: Internet das Coisas; Privacidade; Ambiente Inteligente; Paradoxo da Privacidade.



Full Text:

PDF

References


Ashraf, Q. M., & Habaebi, M. H. (2015). Autonomic schemes for threat mitigation in Internet of Things. Journal of Network and Computer Applications, 49, 112–127. https://doi.org/10.1016/j.jnca.2014.11.011

Asthon, K. (2010). That ’ Internet of Things ’ Thing. RFID Journal, 4986. https://doi.org/10.1038/nature03475

Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010

Axelson, M., & Bjurström, E. (2019). The Role of Timing in the Business Model Evolution of Spinoffs: The Case of C3 Technologies. Research Technology Management, 62(4), 19–26. https://doi.org/10.1080/08956308.2019.1613116

Baiyere, A., Topi, H., & Venkatesh, V. (2020). Internet of Things (IoT)–A Research Agenda for Information Systems.

Barth, S., & de Jong, M. D. T. (2017). The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review. Telematics and Informatics, 34(7), 1038–1058. https://doi.org/10.1016/j.tele.2017.04.013

Berners-lee, T., & Hara, K. O. (2013). The read – write Linked Data Web Subject Areas :

Bies, R. J., & Culnan, M. J. (2003). Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59(2), 323–342. http://www.blackwell-synergy.com/doi/abs/10.1111/1540-4560.00067%5Cnhttp://www.blackwell-synergy.com.ezproxy.lib.utexas.edu/doi/full/10.1111/1540-4560.00067

Botterman, M. (2009). for the European Commission Information Society and Media Directorte General. Networked Enterprise & RFID Unit–D4, Internet of Things: An Early Reality of the Future Internet, Report of the Internet of Things Workshop, Prague, Czech Republic.

Chabridon, S., Laborde, R., Desprats, T., Oglaza, A., Marie, P., & Marquez, S. M. (2014). A survey on addressing privacy together with quality of context for context management in the Internet of Things. Annales Des Telecommunications/Annals of Telecommunications, 69(1–2), 47–62. https://doi.org/10.1007/s12243-013-0387-2

Chatterjee, S. (2020). Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective. International Journal of Information Security and Privacy (IJISP), 14(4), 92–112.

Cusumano, M. Goeldi, Andreas, D. (2013). New businesses and new business models. The Oxford Handbook of Internet, 239–261.

Danezis, G., & Gürses, S. (2010). A critical review of 10 years of Privacy Technology. Surveill. Cult. A Glob. Surveill. Soc., 1–16.

Domingo, M. C. (2012). An overview of the internet of underwater things. Journal of Network and Computer Applications, 35(6), 1879–1890. https://doi.org/10.1016/j.jnca.2012.07.012

Donaldson, T., & Walsh, J. P. (2015). Toward a theory of business. Research in Organizational Behavior, 35, 181–207. https://doi.org/10.1016/j.riob.2015.10.002

dos Direitos Humanos, O. N. U. D. U. (2016). Disponível em. Acesso Em, 5. https://nacoesunidas.org/wp-content/uploads/2018/10/DUDH.pdf

Dutton, W. H., & William, H. D. (2014). Putting things to work: social and policy challenges for the Internet of things. Info, 16(3), 1–21. https://doi.org/10.1108/info-09-2013-0047

Eurich, M., Oertel, N., & Boutellier, R. (2010). The impact of perceived privacy risks on organizations’ willingness to share item-level event data across the supply chain. Electronic Commerce Research, 10(3), 423–440. https://doi.org/10.1007/s10660-010-9062-0

Gama, M. R., & Santos, C. C. (2019). Capital informacional das comunidades sociais virtuais como suporte a gestão de MPE’s. Ciência Da Informação Em Revista, 6(1), 58. https://doi.org/10.28998/cirev.2019v6n1d

Gerami, M., & Sarihi, S. (2020). The impacts of Internet of Things (IOT) in Supply Chain Management. JOURNAL OF MANAGEMENT AND ACCOUNTING STUDIES, 8(3).

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660. https://doi.org/10.1016/j.future.2013.01.010

Hassan, M., Jincai, C., Iftekhar, A., & Cui, X. (2020). Future of the Internet of Things Emerging with Blockchain and Smart Contracts. Future, 11(6).

Hutchison, D., & Mitchell, J. C. (1973). Lecture Notes in Computer Science. In Lecture Notes in Computer Science (Vol. 9, Issue 3). https://doi.org/10.1016/0020-7101(78)90038-7

Ju, H., Chen, Y., & CB, S. (2020). Energy optimised IoT assisted multiple fuzzy aggravated energy scheduling approach for smart scheduling systems. Enterprise Information Systems, 1–15.

Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers and Security, 64, 122–134. https://doi.org/10.1016/j.cose.2015.07.002

Kranz Matthias, L. R., Michahelles, F., Kranz, M., & Roalter, L. (2010). Things that twitter: social networks and the internet of things. What Can the Internet of Things Do for the Citizen (CIoT) Workshop at The Eighth International Conference on Pervasive Computing (Pervasive 2010). http://www.eislab.net/publications/2010/ThingsThatTwitter_preprint.pdf

Krause, M., & Hochstatter, I. (2005). Challenges in Modelling and Using Quality of Context (QoC) BT - Mobility Aware Technologies and Applications (T. Magedanz, A. Karmouch, S. Pierre, & I. Venieris (eds.); pp. 324–333). Springer Berlin Heidelberg.

Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems Frontiers, 17(2), 243–259.

Maati, B., & Saidouni, D. E. (2020). CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks. Journal of Ambient Intelligence and Humanized Computing, 1–30.

Martin, K. (2020). Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms. Business Ethics Quarterly, 30(1), 65–96. https://doi.org/10.1017/beq.2019.24

Marx, G. T. (2001). Murky conceptual waters: The public and the private. Ethics and Information Technology, 3(3), 157–169. https://doi.org/10.1023/A:1012456832336

Meirelles, F. de S. (2020). 31a Pesquisa Anual do Uso de TI. https://eaesp.fgv.br/sites/eaesp.fgv.br/files/u68/fgvcia2020pesti-resultados_0.pdf

Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516. https://doi.org/10.1016/j.adhoc.2012.02.016

Palomino, H. J. A., Orjuela, S., & Acevedo, C. (2020). The Internet of Things IoT, a new ecosystem in an interconnected world: Bibliometric Analysis of 2009-2018.

Pamplona Filho, R. (2014). LEI No 12.965, DE 23 ABRIL DE 2014. Direito UNIFACS–Debate Virtual, 167.

Paul, B. (2015). The next digital gold rush: how the internet of things will create liquid, transparent markets. Strategy & Leadership, 43(1), 36–41. https://doi.org/10.1108/SL-11-2014-0094

Peoples, C., Parr, G., McClean, S., Scotney, B., & Morrow, P. (2013). Performance evaluation of green data centre management supporting sustainable growth of the internet of things. Simulation Modelling Practice and Theory, 34, 221–242. https://doi.org/10.1016/j.simpat.2012.12.008

Prakash, C., & Saini, R. K. (2020). A Model on IoT Security Method and Protocols for IoT Security Layers. In Mobile Radio Communications and 5G Networks (pp. 771–780). Springer.

Santos, C. C. (2015). Investimentos em capacitação empresarial como base para implementação de inovações nas EPP: uma análise da cadeia de metal mecânica em Aracaju. Revista Brasileira de Administração Científica, 6(1), 186–196.

Santos, C. C., & Sales, J. D. A. (2018). Internet of things: is there a new technological position? International Journal of Innovation, 6(3), 287–297. https://doi.org/10.5585/iji.v6i3.178

Santos, C. C., Ufs, P., Sales, J., & Ufs, P. (2015). O DESAFIO DA PRIVACIDADE NA INTERNET DAS COISAS - The Challenge of Privacy on the Internet of Things. Computer Networks, 13(1), 212. https://doi.org/10.1145/2966986.2967034

Saxby, S. (2015). The 2014 CLSR-LSPI Lisbon seminar on “the digital citizen” - Presented at the 9th International Conference on Legal, Security and Privacy Issues in IT law (LSPI) 15-17 October 2014, Vieira De Almeida & Associados, Lisbon, Portugal. Computer Law and Security Review, 31(2), 163–180. https://doi.org/10.1016/j.clsr.2015.01.011

Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 477–564. https://doi.org/10.5771/0943-7444-2016-4-285

Solove, D. J. (2008). Privacy: A Concept in Disarray Privacy. Understanding Privacy, May, 1–11. https://doi.org/10.1191/0969733006nej901oa

Steventon, Alan; Wriht, S. (2010). Intelligent spaces: The application of pervasive ICT. Springer Science & Business Media.

Sun, Z., & Badi, S. (2020). Evaluating the Impacts of IoT Implementation on Inter-organisational Value Co-creation in the Chinese Construction Industry. European, Mediterranean, and Middle Eastern Conference on Information Systems, 698–714.

Thomaz, F., Salge, C., Karahanna, E., & Hulland, J. (2020). Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing. Journal of the Academy of Marketing Science, 48(1), 43–63. https://doi.org/10.1007/s11747-019-00704-3

Turchet, L., Fazekas, G., Lagrange, M., Ghadikolaei, H. S., & Fischione, C. (2020). The Internet of Audio Things: state-of-the-art, vision, and challenges. IEEE Internet of Things Journal.

Valéry, N. (2012). Welcome to the Thingternet: Things, Rather than People, are About to Become the Biggest Users of the Internet. The Economist, 21.

Vasseur, J., Agarwal, N., Hui, J., Shelby, Z., Bertrand, P., & Cedric, C. (2011). RPL: The IP routing protocol designed for low power and lossy networks Internet Protocol for Smart Objects (IPSO) Alliance. April, 20. http://www.ipso-alliance.org/wp-content/media/rpl.pdf

Weber, R. H. (2010). Internet of Things - New security and privacy challenges. Computer Law and Security Review, 26(1), 23–30. https://doi.org/10.1016/j.clsr.2009.11.008

Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., & Borriello, G. (2009). Building the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing, 13(3), 48–55. https://doi.org/10.1109/MIC.2009.52

Zhu, Y., Cambou, B., Hely, D., & Assiri, S. (2020). Extended Protocol Using Keyless Encryption Based on Memristors. Science and Information Conference, 494–510.

Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today’s INTRAnet of things to a future INTERnet of things: A wireless- and mobility-related view. IEEE Wireless Communications, 17(6), 44–51. https://doi.org/10.1109/MWC.2010.5675777




Copyright (c) 2020 European Journal of Applied Business and Management

 

European Journal of Applied Business and Management

ISSN: 2183-5594

DOI: https://doi.org/10.58869/EJABM

Indexing:

EBSCO | CROSSREF | GOOGLE SCHOLAR | LATINDEX | DRJI | ICI JOURNALS MASTER | REDIB | MIAR