Skip to main content
Erschienen in: Journal of Business Ethics 1/2022

01.02.2021 | Original Paper

Could You Ever Forget Me? Why People Want to be Forgotten Online

verfasst von: Chanhee Kwak, Junyeong Lee, Heeseok Lee

Erschienen in: Journal of Business Ethics | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The concept of people’s memory maintains the finiteness of time and capacity. However, with the advancement in technology, the amount of storage memory a person can use has increased dramatically. Given that digital traces can hardly be erased or forgotten, individuals have begun to express their desire to be forgotten in the digital world, and governments and academia are considering methods to fulfill such wishes. Capturing the difficulties in terms of a cultural lag between technological advancements and regulations on individuals’ data privacy needs, we identify six motives for individuals wishing to be forgotten online and investigate its expected effects on online content generation through a qualitative content analysis of 222 responses from open-ended surveys in Korea. Our findings provide implications for the literature on individual privacy and the right to be forgotten employing the cultural lag, as well as, elaborate further on the relationship between being forgotten online and the legitimacy of such requests of individuals. Additionally, implications for data providers, data controllers/processors, and governments to address this lag and build a balanced system of personal information are provided.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., et al. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3), 1–41.CrossRef Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., et al. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3), 1–41.CrossRef
Zurück zum Zitat Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.CrossRef Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.CrossRef
Zurück zum Zitat Ambrose, M. L. (2014). Speaking of forgetting: Analysis of possible non-EU responses to the right to be forgotten and speech exception. Telecommunications Policy, 38(8–9), 800–811.CrossRef Ambrose, M. L. (2014). Speaking of forgetting: Analysis of possible non-EU responses to the right to be forgotten and speech exception. Telecommunications Policy, 38(8–9), 800–811.CrossRef
Zurück zum Zitat Ardichvili, A., Page, V., & Wentling, T. (2003). Motivation and barriers to participation in virtual knowledge-sharing communities of practice. Journal of Knowledge Management, 7(1), 64–77.CrossRef Ardichvili, A., Page, V., & Wentling, T. (2003). Motivation and barriers to participation in virtual knowledge-sharing communities of practice. Journal of Knowledge Management, 7(1), 64–77.CrossRef
Zurück zum Zitat Beauchamp, T. L. (2001). Philosophical ethics: An introduction to moral philosophy. New York: Mcgraw-Hill. Beauchamp, T. L. (2001). Philosophical ethics: An introduction to moral philosophy. New York: Mcgraw-Hill.
Zurück zum Zitat Belanger, F., & Xu, H. (2015). The role of information systems research in shaping the future of information privacy. Information Systems Journal, 25(6), 573–578.CrossRef Belanger, F., & Xu, H. (2015). The role of information systems research in shaping the future of information privacy. Information Systems Journal, 25(6), 573–578.CrossRef
Zurück zum Zitat Bertram, T., Bursztein, E., Caro, S., Chao, H., Chin Feman, R., Fleischer, P. et al. (2019) Five years of the right to be forgotten. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019 (pp. 959–972) Bertram, T., Bursztein, E., Caro, S., Chao, H., Chin Feman, R., Fleischer, P. et al. (2019) Five years of the right to be forgotten. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019 (pp. 959–972)
Zurück zum Zitat Bharucha, A. J., London, A. J., Barnard, D., Wactlar, H., Dew, M. A., & Reynolds, C. F., III. (2006). Ethical considerations in the conduct of electronic surveillance research. The Journal of Law, Medicine & Ethics, 34(3), 611–619.CrossRef Bharucha, A. J., London, A. J., Barnard, D., Wactlar, H., Dew, M. A., & Reynolds, C. F., III. (2006). Ethical considerations in the conduct of electronic surveillance research. The Journal of Law, Medicine & Ethics, 34(3), 611–619.CrossRef
Zurück zum Zitat Bobadilla, Á. M., & Atala, F. G. (2018). Implementation of the right to be forgotten in Chile: The right to one’s image as an essential part of all people. Journal of Information Policy, 8, 346–361.CrossRef Bobadilla, Á. M., & Atala, F. G. (2018). Implementation of the right to be forgotten in Chile: The right to one’s image as an essential part of all people. Journal of Information Policy, 8, 346–361.CrossRef
Zurück zum Zitat Brinkman, R. L., & Brinkman, J. E. (1997). Cultural lag: Conception and theory. International Journal of Social Economics, 24(6), 609–627.CrossRef Brinkman, R. L., & Brinkman, J. E. (1997). Cultural lag: Conception and theory. International Journal of Social Economics, 24(6), 609–627.CrossRef
Zurück zum Zitat Brose, H.-G. (2004). An introduction towards a culture of non-simultaneity? Time & Society, 13(1), 5–26.CrossRef Brose, H.-G. (2004). An introduction towards a culture of non-simultaneity? Time & Society, 13(1), 5–26.CrossRef
Zurück zum Zitat Burkell, J. A. (2016). Remembering me: Big data, individual identity, and the psychological necessity of forgetting. Ethics and Information Technology, 18(1), 17–23.CrossRef Burkell, J. A. (2016). Remembering me: Big data, individual identity, and the psychological necessity of forgetting. Ethics and Information Technology, 18(1), 17–23.CrossRef
Zurück zum Zitat Burnard, P. (1991). A method of analysing interview transcripts in qualitative research. Nurse Education Today, 11(6), 461–466.CrossRef Burnard, P. (1991). A method of analysing interview transcripts in qualitative research. Nurse Education Today, 11(6), 461–466.CrossRef
Zurück zum Zitat Camp, L. J. (2015). Respecting people and respecting privacy. Communications of the ACM, 58(7), 27–28.CrossRef Camp, L. J. (2015). Respecting people and respecting privacy. Communications of the ACM, 58(7), 27–28.CrossRef
Zurück zum Zitat Chenou, J.-M., & Radu, R. (2019). The “right to be forgotten”: Negotiating public and private ordering in the European Union. Business & Society, 58(1), 74–102.CrossRef Chenou, J.-M., & Radu, R. (2019). The “right to be forgotten”: Negotiating public and private ordering in the European Union. Business & Society, 58(1), 74–102.CrossRef
Zurück zum Zitat Cho, J. Y., & Lee, E.-H. (2014). Reducing confusion about grounded theory and qualitative content analysis: Similarities and differences. The Qualitative Report, 19(32), 1–20. Cho, J. Y., & Lee, E.-H. (2014). Reducing confusion about grounded theory and qualitative content analysis: Similarities and differences. The Qualitative Report, 19(32), 1–20.
Zurück zum Zitat Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media & Society, 11(3), 395–416.CrossRef Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media & Society, 11(3), 395–416.CrossRef
Zurück zum Zitat Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data: How it’s changing the way we think about the world. Foreign Affairs, 92(3), 28–40. Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data: How it’s changing the way we think about the world. Foreign Affairs, 92(3), 28–40.
Zurück zum Zitat De Hert, P., Papakonstantinou, V., Malgieri, G., Beslay, L., & Sanchez, I. (2018). The right to data portability in the GDPR: Towards user-centric interoperability of digital services. Computer Law & Security Review, 34(2), 193–203.CrossRef De Hert, P., Papakonstantinou, V., Malgieri, G., Beslay, L., & Sanchez, I. (2018). The right to data portability in the GDPR: Towards user-centric interoperability of digital services. Computer Law & Security Review, 34(2), 193–203.CrossRef
Zurück zum Zitat DeNardis, L. (2014). The global war for internet governance. London: Yale University Press.CrossRef DeNardis, L. (2014). The global war for internet governance. London: Yale University Press.CrossRef
Zurück zum Zitat Dey, I. (2003). Qualitative data analysis: A user friendly guide for social scientists. London: Routledge.CrossRef Dey, I. (2003). Qualitative data analysis: A user friendly guide for social scientists. London: Routledge.CrossRef
Zurück zum Zitat Dhir, A., Kaur, P., Chen, S., & Lonka, K. (2016). Understanding online regret experience in Facebook use–Effects of brand participation, accessibility & problematic use. Computers in Human Behavior, 59, 420–430.CrossRef Dhir, A., Kaur, P., Chen, S., & Lonka, K. (2016). Understanding online regret experience in Facebook use–Effects of brand participation, accessibility & problematic use. Computers in Human Behavior, 59, 420–430.CrossRef
Zurück zum Zitat Dinev, T., Bellotto, M., Hart, P., Russo, V., & Serra, I. (2006). Internet users’ privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management, 14(4), 57–93.CrossRef Dinev, T., Bellotto, M., Hart, P., Russo, V., & Serra, I. (2006). Internet users’ privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management, 14(4), 57–93.CrossRef
Zurück zum Zitat Elo, S., & Kyngäs, H. (2008). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107–115.CrossRef Elo, S., & Kyngäs, H. (2008). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107–115.CrossRef
Zurück zum Zitat Erickson, P. I., & Kaplan, C. P. (2000). Maximizing qualitative responses about smoking in structured interviews. Qualitative Health Research, 10(6), 829–840.CrossRef Erickson, P. I., & Kaplan, C. P. (2000). Maximizing qualitative responses about smoking in structured interviews. Qualitative Health Research, 10(6), 829–840.CrossRef
Zurück zum Zitat European Parliament. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46. Official Journal of the European Union (OJ), 59(1–88), 294. European Parliament. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46. Official Journal of the European Union (OJ), 59(1–88), 294.
Zurück zum Zitat Flick, U. (2009). An introduction to qualitative research. Thousand Oaks: Sage. Flick, U. (2009). An introduction to qualitative research. Thousand Oaks: Sage.
Zurück zum Zitat Garcia-Murillo, M., & MacInnes, I. (2018). Così fan tutte: A better approach than the right to be forgotten. Telecommunications Policy, 42(3), 227–240.CrossRef Garcia-Murillo, M., & MacInnes, I. (2018). Così fan tutte: A better approach than the right to be forgotten. Telecommunications Policy, 42(3), 227–240.CrossRef
Zurück zum Zitat George, E. J. (2017). The pursuit of happiness in the digital age: Using bankruptcy and copyright law as a blueprint for implementing the right to be forgotten in the US. The Georgetown Law Journal, 106, 905–932. George, E. J. (2017). The pursuit of happiness in the digital age: Using bankruptcy and copyright law as a blueprint for implementing the right to be forgotten in the US. The Georgetown Law Journal, 106, 905–932.
Zurück zum Zitat Gewirth, A. (1978). Reason and morality. Chicago: University of Chicago Press. Gewirth, A. (1978). Reason and morality. Chicago: University of Chicago Press.
Zurück zum Zitat Gurevich, Y., Hudis, E., & Wing, J. M. (2016). Inverse privacy. Communications of the ACM, 59(7), 38–42.CrossRef Gurevich, Y., Hudis, E., & Wing, J. M. (2016). Inverse privacy. Communications of the ACM, 59(7), 38–42.CrossRef
Zurück zum Zitat Hartwick, J., & Barki, H. (1994). Explaining the role of user participation in information system use. Management Science, 40(4), 440–465.CrossRef Hartwick, J., & Barki, H. (1994). Explaining the role of user participation in information system use. Management Science, 40(4), 440–465.CrossRef
Zurück zum Zitat Hoehle, H., Aloysius, J. A., Goodarzi, S., & Venkatesh, V. (2018). A nomological network of customers’ privacy perceptions: Linking artifact design to shopping efficiency. European Journal of Information Systems, 28(1), 1–23. Hoehle, H., Aloysius, J. A., Goodarzi, S., & Venkatesh, V. (2018). A nomological network of customers’ privacy perceptions: Linking artifact design to shopping efficiency. European Journal of Information Systems, 28(1), 1–23.
Zurück zum Zitat Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.CrossRef Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.CrossRef
Zurück zum Zitat Howison, J., Wiggins, A., & Crowston, K. (2011). Validity issues in the use of social network analysis with digital trace data. Journal of the Association for Information Systems, 12(12), 767–797.CrossRef Howison, J., Wiggins, A., & Crowston, K. (2011). Validity issues in the use of social network analysis with digital trace data. Journal of the Association for Information Systems, 12(12), 767–797.CrossRef
Zurück zum Zitat Hsieh, H.-F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277–1288.CrossRef Hsieh, H.-F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277–1288.CrossRef
Zurück zum Zitat Korea Communications Commission. (2016). KCC takes measures to guarantee “right to be forgotten.” Gwacheon-si: Korea Communications Commission. Korea Communications Commission. (2016). KCC takes measures to guarantee “right to be forgotten.” Gwacheon-si: Korea Communications Commission.
Zurück zum Zitat Lally, L. (1996). Privacy versus accessibility: The impact of situationally conditioned belief. Journal of Business Ethics, 15(11), 1221–1226.CrossRef Lally, L. (1996). Privacy versus accessibility: The impact of situationally conditioned belief. Journal of Business Ethics, 15(11), 1221–1226.CrossRef
Zurück zum Zitat Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.CrossRef Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.CrossRef
Zurück zum Zitat Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200.CrossRef Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200.CrossRef
Zurück zum Zitat Malgieri, G., & Custers, B. (2018). Pricing privacy–the right to know the value of your personal data. Computer Law & Security Review, 34(2), 289–303.CrossRef Malgieri, G., & Custers, B. (2018). Pricing privacy–the right to know the value of your personal data. Computer Law & Security Review, 34(2), 289–303.CrossRef
Zurück zum Zitat Mantelero, A. (2013). The EU proposal for a general data protection regulation and the roots of the ‘right to be forgotten.’ Computer Law & Security Review, 29(3), 229–235.CrossRef Mantelero, A. (2013). The EU proposal for a general data protection regulation and the roots of the ‘right to be forgotten.’ Computer Law & Security Review, 29(3), 229–235.CrossRef
Zurück zum Zitat Marshall, K. P. (1999). Has technology introduced new ethical problems? Journal of Business Ethics, 19(1), 81–90.CrossRef Marshall, K. P. (1999). Has technology introduced new ethical problems? Journal of Business Ethics, 19(1), 81–90.CrossRef
Zurück zum Zitat Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551–569.CrossRef Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551–569.CrossRef
Zurück zum Zitat Martin, K., & Shilton, K. (2016). Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices. The Information Society, 32(3), 200–216.CrossRef Martin, K., & Shilton, K. (2016). Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices. The Information Society, 32(3), 200–216.CrossRef
Zurück zum Zitat Mayer-Schönberger, V. (2011). Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.CrossRef Mayer-Schönberger, V. (2011). Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.CrossRef
Zurück zum Zitat Merriam, S. B. (2002). Qualitative research in practice: Examples for discussion and analysis. San Francisco: Jossey-Bass Inc Pub. Merriam, S. B. (2002). Qualitative research in practice: Examples for discussion and analysis. San Francisco: Jossey-Bass Inc Pub.
Zurück zum Zitat Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRef Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRef
Zurück zum Zitat Neville, A. (2017). Is it a human right to be forgotten: Conceptualizing the world view. Santa Clara Jounal of International Law, 15, 157–172. Neville, A. (2017). Is it a human right to be forgotten: Conceptualizing the world view. Santa Clara Jounal of International Law, 15, 157–172.
Zurück zum Zitat Newman, A. L. (2015). What the “right to be forgotten” means for privacy in a digital age. Science, 347(6221), 507–508.CrossRef Newman, A. L. (2015). What the “right to be forgotten” means for privacy in a digital age. Science, 347(6221), 507–508.CrossRef
Zurück zum Zitat Nunan, D., & Di Domenico, M. (2017). Big data: A normal accident waiting to happen? Journal of Business Ethics, 145(3), 481–491.CrossRef Nunan, D., & Di Domenico, M. (2017). Big data: A normal accident waiting to happen? Journal of Business Ethics, 145(3), 481–491.CrossRef
Zurück zum Zitat Ogburn, W. F. (1957). Cultural lag as theory. Sociology & Social Research, 41, 167–174. Ogburn, W. F. (1957). Cultural lag as theory. Sociology & Social Research, 41, 167–174.
Zurück zum Zitat Padova, Y. (2019). Is the right to be forgotten a universal, regional, or ‘glocal’right? International Data Privacy Law, 9(1), 15–29.CrossRef Padova, Y. (2019). Is the right to be forgotten a universal, regional, or ‘glocal’right? International Data Privacy Law, 9(1), 15–29.CrossRef
Zurück zum Zitat Rachovitsa, A. (2016). Engineering and lawyering privacy by design: Understanding online privacy both as a technical and an international human rights issue. International Journal of Law and Information Technology, 24(4), 374–399.CrossRef Rachovitsa, A. (2016). Engineering and lawyering privacy by design: Understanding online privacy both as a technical and an international human rights issue. International Journal of Law and Information Technology, 24(4), 374–399.CrossRef
Zurück zum Zitat Richards, N. M., & King, J. H. (2013). Three paradoxes of big data. Stanford Law Review Online, 66, 41–46. Richards, N. M., & King, J. H. (2013). Three paradoxes of big data. Stanford Law Review Online, 66, 41–46.
Zurück zum Zitat Roberts, J. A., & Wasieleski, D. M. (2012). Moral reasoning in computer-based task environments: Exploring the interplay between cognitive and technological factors on individuals’ propensity to break rules. Journal of Business Ethics, 110(3), 355–376.CrossRef Roberts, J. A., & Wasieleski, D. M. (2012). Moral reasoning in computer-based task environments: Exploring the interplay between cognitive and technological factors on individuals’ propensity to break rules. Journal of Business Ethics, 110(3), 355–376.CrossRef
Zurück zum Zitat Robin, D. (2009). Toward an applied meaning for ethics in business. Journal of business ethics, 89(1), 139–150.CrossRef Robin, D. (2009). Toward an applied meaning for ethics in business. Journal of business ethics, 89(1), 139–150.CrossRef
Zurück zum Zitat Rosen, J. (2011). The right to be forgotten. Stanford Law Review Online, 64, 88–92. Rosen, J. (2011). The right to be forgotten. Stanford Law Review Online, 64, 88–92.
Zurück zum Zitat Rustad, M. L., & Kulevska, S. (2014). Reconceptualizing the right to be forgotten to enable transatlantic data flow. Harvard Journal of Law & Technology, 28(2), 349–417. Rustad, M. L., & Kulevska, S. (2014). Reconceptualizing the right to be forgotten to enable transatlantic data flow. Harvard Journal of Law & Technology, 28(2), 349–417.
Zurück zum Zitat Shahin, S. (2016). Right to be forgotten: How national identity, political orientation, and capitalist ideology structured a trans-Atlantic debate on information access and control. Journalism & Mass Communication Quarterly, 93(2), 360–382.CrossRef Shahin, S. (2016). Right to be forgotten: How national identity, political orientation, and capitalist ideology structured a trans-Atlantic debate on information access and control. Journalism & Mass Communication Quarterly, 93(2), 360–382.CrossRef
Zurück zum Zitat Singer, M. (2000). Ethical and fair work behaviour: A normative-empirical dialogue concerning ethics and justice. Journal of Business Ethics, 28(3), 187–209.CrossRef Singer, M. (2000). Ethical and fair work behaviour: A normative-empirical dialogue concerning ethics and justice. Journal of Business Ethics, 28(3), 187–209.CrossRef
Zurück zum Zitat Sleeper, M., Cranshaw, J., Kelley, P. G., Ur, B., Acquisti, A., Cranor, L. F., et al. (2013) I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets. In Proceedings of the SIGCHI conference on human factors in computing systems, 2013 (pp. 3277–3286). ACM Sleeper, M., Cranshaw, J., Kelley, P. G., Ur, B., Acquisti, A., Cranor, L. F., et al. (2013) I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets. In Proceedings of the SIGCHI conference on human factors in computing systems, 2013 (pp. 3277–3286). ACM
Zurück zum Zitat Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.CrossRef Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.CrossRef
Zurück zum Zitat Sprecher, S., & Hendrick, S. S. (2004). Self-disclosure in intimate relationships: Associations with individual and relationship characteristics over time. Journal of Social and Clinical Psychology, 23(6), 857–877.CrossRef Sprecher, S., & Hendrick, S. S. (2004). Self-disclosure in intimate relationships: Associations with individual and relationship characteristics over time. Journal of Social and Clinical Psychology, 23(6), 857–877.CrossRef
Zurück zum Zitat Sproull, N. L. (2002). Handbook of research methods: A guide for practitioners and students in the social sciences. Lanham, MD: Scarecrow Press. Sproull, N. L. (2002). Handbook of research methods: A guide for practitioners and students in the social sciences. Lanham, MD: Scarecrow Press.
Zurück zum Zitat Strauss, A., & Corbin, J. (1990). Basics of qualitative research (Vol. 15). Newbury Park, CA: Sage. Strauss, A., & Corbin, J. (1990). Basics of qualitative research (Vol. 15). Newbury Park, CA: Sage.
Zurück zum Zitat Tavani, H. T. (1999). Privacy online. ACM SIGCAS Computers and Society, 29(4), 11–19.CrossRef Tavani, H. T. (1999). Privacy online. ACM SIGCAS Computers and Society, 29(4), 11–19.CrossRef
Zurück zum Zitat Tavani, H. T. (2018). Should we have a right to be forgotten?: A critique of key arguments underlying this question. Journal of Information Ethics, 27(2), 26–46. Tavani, H. T. (2018). Should we have a right to be forgotten?: A critique of key arguments underlying this question. Journal of Information Ethics, 27(2), 26–46.
Zurück zum Zitat Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570.CrossRef Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570.CrossRef
Zurück zum Zitat Tesch, R. (2013). Qualitative research: Analysis types and software. London: Routledge.CrossRef Tesch, R. (2013). Qualitative research: Analysis types and software. London: Routledge.CrossRef
Zurück zum Zitat Tirosh, N. (2017). Reconsidering the ‘Right to be Forgotten’–memory rights and the right to memory in the new media era. Media, Culture & Society, 39(5), 644–660.CrossRef Tirosh, N. (2017). Reconsidering the ‘Right to be Forgotten’–memory rights and the right to memory in the new media era. Media, Culture & Society, 39(5), 644–660.CrossRef
Zurück zum Zitat Udo, G., Bagchi, K., & Maity, M. (2016). Exploring factors affecting digital piracy using the norm activation and UTAUT models: The role of national culture. Journal of Business Ethics, 135(3), 517–541.CrossRef Udo, G., Bagchi, K., & Maity, M. (2016). Exploring factors affecting digital piracy using the norm activation and UTAUT models: The role of national culture. Journal of Business Ethics, 135(3), 517–541.CrossRef
Zurück zum Zitat Ünal, A. F., Warren, D. E., & Chen, C. C. (2012). The normative foundations of unethical supervision in organizations. Journal of Business Ethics, 107(1), 5–19.CrossRef Ünal, A. F., Warren, D. E., & Chen, C. C. (2012). The normative foundations of unethical supervision in organizations. Journal of Business Ethics, 107(1), 5–19.CrossRef
Zurück zum Zitat van de Kerkhof, M. (2006). Making a difference: On the constraints of consensus building and the relevance of deliberation in stakeholder dialogues. Policy Sciences, 39(3), 279–299.CrossRef van de Kerkhof, M. (2006). Making a difference: On the constraints of consensus building and the relevance of deliberation in stakeholder dialogues. Policy Sciences, 39(3), 279–299.CrossRef
Zurück zum Zitat Voss, W. G., & Castets-Renard, C. (2015). Proposal for an international taxonomy on the various forms of the right to be forgotten: A Study on the Convergence of Norms. Journal on Telecommunications and High Technology Law, 14(2), 281–344. Voss, W. G., & Castets-Renard, C. (2015). Proposal for an international taxonomy on the various forms of the right to be forgotten: A Study on the Convergence of Norms. Journal on Telecommunications and High Technology Law, 14(2), 281–344.
Zurück zum Zitat Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., & Cranor, L. F. (2011). I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the seventh symposium on usable privacy and security (pp. 10): ACM Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., & Cranor, L. F. (2011). I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the seventh symposium on usable privacy and security (pp. 10): ACM
Zurück zum Zitat Weber, R. H. (2010). Internet of things-new security and privacy challenges. Computer Law & Security Review, 26(1), 23–30.CrossRef Weber, R. H. (2010). Internet of things-new security and privacy challenges. Computer Law & Security Review, 26(1), 23–30.CrossRef
Zurück zum Zitat Wheeless, L. R., & Grotz, J. (1976). Conceptualization and measurement of reported self-disclosure. Human Communication Research, 2(4), 338–346.CrossRef Wheeless, L. R., & Grotz, J. (1976). Conceptualization and measurement of reported self-disclosure. Human Communication Research, 2(4), 338–346.CrossRef
Zurück zum Zitat Whetstone, J. T. (2001). How virtue fits within business ethics. Journal of Business Ethics, 33(2), 101–114.CrossRef Whetstone, J. T. (2001). How virtue fits within business ethics. Journal of Business Ethics, 33(2), 101–114.CrossRef
Zurück zum Zitat Winslow, B. W. (2003). Family caregivers’ experiences with community services: A qualitative analysis. Public Health Nursing, 20(5), 341–348.CrossRef Winslow, B. W. (2003). Family caregivers’ experiences with community services: A qualitative analysis. Public Health Nursing, 20(5), 341–348.CrossRef
Zurück zum Zitat Xie, W., & Kang, C. (2015). See you, see me: Teenagers’ self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398–407.CrossRef Xie, W., & Kang, C. (2015). See you, see me: Teenagers’ self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398–407.CrossRef
Zurück zum Zitat Youm, K. H., & Park, A. (2016). The “right to be forgotten” in European Union Law: Data protection balanced with free speech? Journalism & Mass Communication Quarterly, 93(2), 273–295.CrossRef Youm, K. H., & Park, A. (2016). The “right to be forgotten” in European Union Law: Data protection balanced with free speech? Journalism & Mass Communication Quarterly, 93(2), 273–295.CrossRef
Metadaten
Titel
Could You Ever Forget Me? Why People Want to be Forgotten Online
verfasst von
Chanhee Kwak
Junyeong Lee
Heeseok Lee
Publikationsdatum
01.02.2021
Verlag
Springer Netherlands
Erschienen in
Journal of Business Ethics / Ausgabe 1/2022
Print ISSN: 0167-4544
Elektronische ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-021-04747-x

Weitere Artikel der Ausgabe 1/2022

Journal of Business Ethics 1/2022 Zur Ausgabe

Premium Partner