2020
DOI: 10.1002/asi.24353
|View full text |Cite
|
Sign up to set email alerts
|

Disaster privacy/privacy disaster

Abstract: Privacy expectations during disasters differ significantly from nonemergency situations. This paper explores the actual privacy practices of popular disaster apps, highlighting location information flows. Our empirical study compares content analysis of privacy policies and government agency policies, structured by the contextual integrity framework, with static and dynamic app analysis documenting the personal data sent by 15 apps. We identify substantive gaps between regulation and guidance, privacy policies… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…In the past, these breaches of privacy and surveillance have been found to be context‐specific, and discontinued when the crisis subsided (Reuter & Kaufhold, 2018). However, with growth of private technologies used by the government, companies shirk due diligence around privacy protection because of how lucrative these data can be (Sanfilippo et al, 2020). Soden and Palen (2018) interrogate the failed, culturally a‐contextual aid distribution decisions and efforts in the aftermath of the 2010 earthquake in Haiti by the IMF and World Bank as a case context, noting crisis informatics deployment carry unintended consequences that critical interrogation can demonstrate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the past, these breaches of privacy and surveillance have been found to be context‐specific, and discontinued when the crisis subsided (Reuter & Kaufhold, 2018). However, with growth of private technologies used by the government, companies shirk due diligence around privacy protection because of how lucrative these data can be (Sanfilippo et al, 2020). Soden and Palen (2018) interrogate the failed, culturally a‐contextual aid distribution decisions and efforts in the aftermath of the 2010 earthquake in Haiti by the IMF and World Bank as a case context, noting crisis informatics deployment carry unintended consequences that critical interrogation can demonstrate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Examination of policy documents as data sources occur frequently in information policy scholarship (Brown & Klein, 2020; Sanfilippo et al, 2020), critical legal theory (Crenshaw, 1989; Zalesne, 2013), and Black feminist standpoint epistemology (Collins, 1990). We combine the case study method with discourse analysis to compare language within extant policy documents; past work has employed this combination of methods for instance to understand how organizations that comprise the analytical units of the case study, determine and enforce policy (Allan et al, 2009; Sanfilippo et al, 2020). The case study method can reveal analytically significant problems related to power imbalances, such as discursive deception in policy documents, and the mismatch between promises and actual material processes among stakeholders.…”
Section: Methodsmentioning
confidence: 99%
“…We also employed computational linguistic methods, including sentiment analysis of privacy policies, specifically assessing assertiveness and tentativeness around data collection (Boukes et al, 2020), and automated annotation relative to an ontology of modal normative language (Siddiki et al, 2019) and a taxonomy of privacy considerations (Solove, 2005). As part of static app analysis, we examined permissions leveraged by apps, drawing on established methodologies to assess data collection by mobile applications, platforms, and devices of specific data types (e.g., Sanfilippo et al, 2020), and compared outcomes around governance and practice.…”
Section: Methodsmentioning
confidence: 99%