Skip to main content
Top
Published in: Journal of Business Ethics 1/2022

01-02-2021 | Original Paper

Could You Ever Forget Me? Why People Want to be Forgotten Online

Authors: Chanhee Kwak, Junyeong Lee, Heeseok Lee

Published in: Journal of Business Ethics | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The concept of people’s memory maintains the finiteness of time and capacity. However, with the advancement in technology, the amount of storage memory a person can use has increased dramatically. Given that digital traces can hardly be erased or forgotten, individuals have begun to express their desire to be forgotten in the digital world, and governments and academia are considering methods to fulfill such wishes. Capturing the difficulties in terms of a cultural lag between technological advancements and regulations on individuals’ data privacy needs, we identify six motives for individuals wishing to be forgotten online and investigate its expected effects on online content generation through a qualitative content analysis of 222 responses from open-ended surveys in Korea. Our findings provide implications for the literature on individual privacy and the right to be forgotten employing the cultural lag, as well as, elaborate further on the relationship between being forgotten online and the legitimacy of such requests of individuals. Additionally, implications for data providers, data controllers/processors, and governments to address this lag and build a balanced system of personal information are provided.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., et al. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3), 1–41.CrossRef Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., et al. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3), 1–41.CrossRef
go back to reference Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.CrossRef Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.CrossRef
go back to reference Ambrose, M. L. (2014). Speaking of forgetting: Analysis of possible non-EU responses to the right to be forgotten and speech exception. Telecommunications Policy, 38(8–9), 800–811.CrossRef Ambrose, M. L. (2014). Speaking of forgetting: Analysis of possible non-EU responses to the right to be forgotten and speech exception. Telecommunications Policy, 38(8–9), 800–811.CrossRef
go back to reference Ardichvili, A., Page, V., & Wentling, T. (2003). Motivation and barriers to participation in virtual knowledge-sharing communities of practice. Journal of Knowledge Management, 7(1), 64–77.CrossRef Ardichvili, A., Page, V., & Wentling, T. (2003). Motivation and barriers to participation in virtual knowledge-sharing communities of practice. Journal of Knowledge Management, 7(1), 64–77.CrossRef
go back to reference Beauchamp, T. L. (2001). Philosophical ethics: An introduction to moral philosophy. New York: Mcgraw-Hill. Beauchamp, T. L. (2001). Philosophical ethics: An introduction to moral philosophy. New York: Mcgraw-Hill.
go back to reference Belanger, F., & Xu, H. (2015). The role of information systems research in shaping the future of information privacy. Information Systems Journal, 25(6), 573–578.CrossRef Belanger, F., & Xu, H. (2015). The role of information systems research in shaping the future of information privacy. Information Systems Journal, 25(6), 573–578.CrossRef
go back to reference Bertram, T., Bursztein, E., Caro, S., Chao, H., Chin Feman, R., Fleischer, P. et al. (2019) Five years of the right to be forgotten. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019 (pp. 959–972) Bertram, T., Bursztein, E., Caro, S., Chao, H., Chin Feman, R., Fleischer, P. et al. (2019) Five years of the right to be forgotten. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019 (pp. 959–972)
go back to reference Bharucha, A. J., London, A. J., Barnard, D., Wactlar, H., Dew, M. A., & Reynolds, C. F., III. (2006). Ethical considerations in the conduct of electronic surveillance research. The Journal of Law, Medicine & Ethics, 34(3), 611–619.CrossRef Bharucha, A. J., London, A. J., Barnard, D., Wactlar, H., Dew, M. A., & Reynolds, C. F., III. (2006). Ethical considerations in the conduct of electronic surveillance research. The Journal of Law, Medicine & Ethics, 34(3), 611–619.CrossRef
go back to reference Bobadilla, Á. M., & Atala, F. G. (2018). Implementation of the right to be forgotten in Chile: The right to one’s image as an essential part of all people. Journal of Information Policy, 8, 346–361.CrossRef Bobadilla, Á. M., & Atala, F. G. (2018). Implementation of the right to be forgotten in Chile: The right to one’s image as an essential part of all people. Journal of Information Policy, 8, 346–361.CrossRef
go back to reference Brinkman, R. L., & Brinkman, J. E. (1997). Cultural lag: Conception and theory. International Journal of Social Economics, 24(6), 609–627.CrossRef Brinkman, R. L., & Brinkman, J. E. (1997). Cultural lag: Conception and theory. International Journal of Social Economics, 24(6), 609–627.CrossRef
go back to reference Brose, H.-G. (2004). An introduction towards a culture of non-simultaneity? Time & Society, 13(1), 5–26.CrossRef Brose, H.-G. (2004). An introduction towards a culture of non-simultaneity? Time & Society, 13(1), 5–26.CrossRef
go back to reference Burkell, J. A. (2016). Remembering me: Big data, individual identity, and the psychological necessity of forgetting. Ethics and Information Technology, 18(1), 17–23.CrossRef Burkell, J. A. (2016). Remembering me: Big data, individual identity, and the psychological necessity of forgetting. Ethics and Information Technology, 18(1), 17–23.CrossRef
go back to reference Burnard, P. (1991). A method of analysing interview transcripts in qualitative research. Nurse Education Today, 11(6), 461–466.CrossRef Burnard, P. (1991). A method of analysing interview transcripts in qualitative research. Nurse Education Today, 11(6), 461–466.CrossRef
go back to reference Camp, L. J. (2015). Respecting people and respecting privacy. Communications of the ACM, 58(7), 27–28.CrossRef Camp, L. J. (2015). Respecting people and respecting privacy. Communications of the ACM, 58(7), 27–28.CrossRef
go back to reference Chenou, J.-M., & Radu, R. (2019). The “right to be forgotten”: Negotiating public and private ordering in the European Union. Business & Society, 58(1), 74–102.CrossRef Chenou, J.-M., & Radu, R. (2019). The “right to be forgotten”: Negotiating public and private ordering in the European Union. Business & Society, 58(1), 74–102.CrossRef
go back to reference Cho, J. Y., & Lee, E.-H. (2014). Reducing confusion about grounded theory and qualitative content analysis: Similarities and differences. The Qualitative Report, 19(32), 1–20. Cho, J. Y., & Lee, E.-H. (2014). Reducing confusion about grounded theory and qualitative content analysis: Similarities and differences. The Qualitative Report, 19(32), 1–20.
go back to reference Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media & Society, 11(3), 395–416.CrossRef Cho, H., Rivera-Sánchez, M., & Lim, S. S. (2009). A multinational study on online privacy: Global concerns and local responses. New Media & Society, 11(3), 395–416.CrossRef
go back to reference Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data: How it’s changing the way we think about the world. Foreign Affairs, 92(3), 28–40. Cukier, K., & Mayer-Schoenberger, V. (2013). The rise of big data: How it’s changing the way we think about the world. Foreign Affairs, 92(3), 28–40.
go back to reference De Hert, P., Papakonstantinou, V., Malgieri, G., Beslay, L., & Sanchez, I. (2018). The right to data portability in the GDPR: Towards user-centric interoperability of digital services. Computer Law & Security Review, 34(2), 193–203.CrossRef De Hert, P., Papakonstantinou, V., Malgieri, G., Beslay, L., & Sanchez, I. (2018). The right to data portability in the GDPR: Towards user-centric interoperability of digital services. Computer Law & Security Review, 34(2), 193–203.CrossRef
go back to reference DeNardis, L. (2014). The global war for internet governance. London: Yale University Press.CrossRef DeNardis, L. (2014). The global war for internet governance. London: Yale University Press.CrossRef
go back to reference Dey, I. (2003). Qualitative data analysis: A user friendly guide for social scientists. London: Routledge.CrossRef Dey, I. (2003). Qualitative data analysis: A user friendly guide for social scientists. London: Routledge.CrossRef
go back to reference Dhir, A., Kaur, P., Chen, S., & Lonka, K. (2016). Understanding online regret experience in Facebook use–Effects of brand participation, accessibility & problematic use. Computers in Human Behavior, 59, 420–430.CrossRef Dhir, A., Kaur, P., Chen, S., & Lonka, K. (2016). Understanding online regret experience in Facebook use–Effects of brand participation, accessibility & problematic use. Computers in Human Behavior, 59, 420–430.CrossRef
go back to reference Dinev, T., Bellotto, M., Hart, P., Russo, V., & Serra, I. (2006). Internet users’ privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management, 14(4), 57–93.CrossRef Dinev, T., Bellotto, M., Hart, P., Russo, V., & Serra, I. (2006). Internet users’ privacy concerns and beliefs about government surveillance: An exploratory study of differences between Italy and the United States. Journal of Global Information Management, 14(4), 57–93.CrossRef
go back to reference Elo, S., & Kyngäs, H. (2008). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107–115.CrossRef Elo, S., & Kyngäs, H. (2008). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107–115.CrossRef
go back to reference Erickson, P. I., & Kaplan, C. P. (2000). Maximizing qualitative responses about smoking in structured interviews. Qualitative Health Research, 10(6), 829–840.CrossRef Erickson, P. I., & Kaplan, C. P. (2000). Maximizing qualitative responses about smoking in structured interviews. Qualitative Health Research, 10(6), 829–840.CrossRef
go back to reference European Parliament. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46. Official Journal of the European Union (OJ), 59(1–88), 294. European Parliament. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46. Official Journal of the European Union (OJ), 59(1–88), 294.
go back to reference Flick, U. (2009). An introduction to qualitative research. Thousand Oaks: Sage. Flick, U. (2009). An introduction to qualitative research. Thousand Oaks: Sage.
go back to reference Garcia-Murillo, M., & MacInnes, I. (2018). Così fan tutte: A better approach than the right to be forgotten. Telecommunications Policy, 42(3), 227–240.CrossRef Garcia-Murillo, M., & MacInnes, I. (2018). Così fan tutte: A better approach than the right to be forgotten. Telecommunications Policy, 42(3), 227–240.CrossRef
go back to reference George, E. J. (2017). The pursuit of happiness in the digital age: Using bankruptcy and copyright law as a blueprint for implementing the right to be forgotten in the US. The Georgetown Law Journal, 106, 905–932. George, E. J. (2017). The pursuit of happiness in the digital age: Using bankruptcy and copyright law as a blueprint for implementing the right to be forgotten in the US. The Georgetown Law Journal, 106, 905–932.
go back to reference Gewirth, A. (1978). Reason and morality. Chicago: University of Chicago Press. Gewirth, A. (1978). Reason and morality. Chicago: University of Chicago Press.
go back to reference Gurevich, Y., Hudis, E., & Wing, J. M. (2016). Inverse privacy. Communications of the ACM, 59(7), 38–42.CrossRef Gurevich, Y., Hudis, E., & Wing, J. M. (2016). Inverse privacy. Communications of the ACM, 59(7), 38–42.CrossRef
go back to reference Hartwick, J., & Barki, H. (1994). Explaining the role of user participation in information system use. Management Science, 40(4), 440–465.CrossRef Hartwick, J., & Barki, H. (1994). Explaining the role of user participation in information system use. Management Science, 40(4), 440–465.CrossRef
go back to reference Hoehle, H., Aloysius, J. A., Goodarzi, S., & Venkatesh, V. (2018). A nomological network of customers’ privacy perceptions: Linking artifact design to shopping efficiency. European Journal of Information Systems, 28(1), 1–23. Hoehle, H., Aloysius, J. A., Goodarzi, S., & Venkatesh, V. (2018). A nomological network of customers’ privacy perceptions: Linking artifact design to shopping efficiency. European Journal of Information Systems, 28(1), 1–23.
go back to reference Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.CrossRef Hong, W., & Thong, J. Y. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37(1), 275–298.CrossRef
go back to reference Howison, J., Wiggins, A., & Crowston, K. (2011). Validity issues in the use of social network analysis with digital trace data. Journal of the Association for Information Systems, 12(12), 767–797.CrossRef Howison, J., Wiggins, A., & Crowston, K. (2011). Validity issues in the use of social network analysis with digital trace data. Journal of the Association for Information Systems, 12(12), 767–797.CrossRef
go back to reference Hsieh, H.-F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277–1288.CrossRef Hsieh, H.-F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative health research, 15(9), 1277–1288.CrossRef
go back to reference Korea Communications Commission. (2016). KCC takes measures to guarantee “right to be forgotten.” Gwacheon-si: Korea Communications Commission. Korea Communications Commission. (2016). KCC takes measures to guarantee “right to be forgotten.” Gwacheon-si: Korea Communications Commission.
go back to reference Lally, L. (1996). Privacy versus accessibility: The impact of situationally conditioned belief. Journal of Business Ethics, 15(11), 1221–1226.CrossRef Lally, L. (1996). Privacy versus accessibility: The impact of situationally conditioned belief. Journal of Business Ethics, 15(11), 1221–1226.CrossRef
go back to reference Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.CrossRef Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.CrossRef
go back to reference Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200.CrossRef Lowry, P. B., Cao, J., & Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27(4), 163–200.CrossRef
go back to reference Malgieri, G., & Custers, B. (2018). Pricing privacy–the right to know the value of your personal data. Computer Law & Security Review, 34(2), 289–303.CrossRef Malgieri, G., & Custers, B. (2018). Pricing privacy–the right to know the value of your personal data. Computer Law & Security Review, 34(2), 289–303.CrossRef
go back to reference Mantelero, A. (2013). The EU proposal for a general data protection regulation and the roots of the ‘right to be forgotten.’ Computer Law & Security Review, 29(3), 229–235.CrossRef Mantelero, A. (2013). The EU proposal for a general data protection regulation and the roots of the ‘right to be forgotten.’ Computer Law & Security Review, 29(3), 229–235.CrossRef
go back to reference Marshall, K. P. (1999). Has technology introduced new ethical problems? Journal of Business Ethics, 19(1), 81–90.CrossRef Marshall, K. P. (1999). Has technology introduced new ethical problems? Journal of Business Ethics, 19(1), 81–90.CrossRef
go back to reference Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551–569.CrossRef Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551–569.CrossRef
go back to reference Martin, K., & Shilton, K. (2016). Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices. The Information Society, 32(3), 200–216.CrossRef Martin, K., & Shilton, K. (2016). Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices. The Information Society, 32(3), 200–216.CrossRef
go back to reference Mayer-Schönberger, V. (2011). Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.CrossRef Mayer-Schönberger, V. (2011). Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.CrossRef
go back to reference Merriam, S. B. (2002). Qualitative research in practice: Examples for discussion and analysis. San Francisco: Jossey-Bass Inc Pub. Merriam, S. B. (2002). Qualitative research in practice: Examples for discussion and analysis. San Francisco: Jossey-Bass Inc Pub.
go back to reference Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRef Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.CrossRef
go back to reference Neville, A. (2017). Is it a human right to be forgotten: Conceptualizing the world view. Santa Clara Jounal of International Law, 15, 157–172. Neville, A. (2017). Is it a human right to be forgotten: Conceptualizing the world view. Santa Clara Jounal of International Law, 15, 157–172.
go back to reference Newman, A. L. (2015). What the “right to be forgotten” means for privacy in a digital age. Science, 347(6221), 507–508.CrossRef Newman, A. L. (2015). What the “right to be forgotten” means for privacy in a digital age. Science, 347(6221), 507–508.CrossRef
go back to reference Nunan, D., & Di Domenico, M. (2017). Big data: A normal accident waiting to happen? Journal of Business Ethics, 145(3), 481–491.CrossRef Nunan, D., & Di Domenico, M. (2017). Big data: A normal accident waiting to happen? Journal of Business Ethics, 145(3), 481–491.CrossRef
go back to reference Ogburn, W. F. (1957). Cultural lag as theory. Sociology & Social Research, 41, 167–174. Ogburn, W. F. (1957). Cultural lag as theory. Sociology & Social Research, 41, 167–174.
go back to reference Padova, Y. (2019). Is the right to be forgotten a universal, regional, or ‘glocal’right? International Data Privacy Law, 9(1), 15–29.CrossRef Padova, Y. (2019). Is the right to be forgotten a universal, regional, or ‘glocal’right? International Data Privacy Law, 9(1), 15–29.CrossRef
go back to reference Rachovitsa, A. (2016). Engineering and lawyering privacy by design: Understanding online privacy both as a technical and an international human rights issue. International Journal of Law and Information Technology, 24(4), 374–399.CrossRef Rachovitsa, A. (2016). Engineering and lawyering privacy by design: Understanding online privacy both as a technical and an international human rights issue. International Journal of Law and Information Technology, 24(4), 374–399.CrossRef
go back to reference Richards, N. M., & King, J. H. (2013). Three paradoxes of big data. Stanford Law Review Online, 66, 41–46. Richards, N. M., & King, J. H. (2013). Three paradoxes of big data. Stanford Law Review Online, 66, 41–46.
go back to reference Roberts, J. A., & Wasieleski, D. M. (2012). Moral reasoning in computer-based task environments: Exploring the interplay between cognitive and technological factors on individuals’ propensity to break rules. Journal of Business Ethics, 110(3), 355–376.CrossRef Roberts, J. A., & Wasieleski, D. M. (2012). Moral reasoning in computer-based task environments: Exploring the interplay between cognitive and technological factors on individuals’ propensity to break rules. Journal of Business Ethics, 110(3), 355–376.CrossRef
go back to reference Robin, D. (2009). Toward an applied meaning for ethics in business. Journal of business ethics, 89(1), 139–150.CrossRef Robin, D. (2009). Toward an applied meaning for ethics in business. Journal of business ethics, 89(1), 139–150.CrossRef
go back to reference Rosen, J. (2011). The right to be forgotten. Stanford Law Review Online, 64, 88–92. Rosen, J. (2011). The right to be forgotten. Stanford Law Review Online, 64, 88–92.
go back to reference Rustad, M. L., & Kulevska, S. (2014). Reconceptualizing the right to be forgotten to enable transatlantic data flow. Harvard Journal of Law & Technology, 28(2), 349–417. Rustad, M. L., & Kulevska, S. (2014). Reconceptualizing the right to be forgotten to enable transatlantic data flow. Harvard Journal of Law & Technology, 28(2), 349–417.
go back to reference Shahin, S. (2016). Right to be forgotten: How national identity, political orientation, and capitalist ideology structured a trans-Atlantic debate on information access and control. Journalism & Mass Communication Quarterly, 93(2), 360–382.CrossRef Shahin, S. (2016). Right to be forgotten: How national identity, political orientation, and capitalist ideology structured a trans-Atlantic debate on information access and control. Journalism & Mass Communication Quarterly, 93(2), 360–382.CrossRef
go back to reference Singer, M. (2000). Ethical and fair work behaviour: A normative-empirical dialogue concerning ethics and justice. Journal of Business Ethics, 28(3), 187–209.CrossRef Singer, M. (2000). Ethical and fair work behaviour: A normative-empirical dialogue concerning ethics and justice. Journal of Business Ethics, 28(3), 187–209.CrossRef
go back to reference Sleeper, M., Cranshaw, J., Kelley, P. G., Ur, B., Acquisti, A., Cranor, L. F., et al. (2013) I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets. In Proceedings of the SIGCHI conference on human factors in computing systems, 2013 (pp. 3277–3286). ACM Sleeper, M., Cranshaw, J., Kelley, P. G., Ur, B., Acquisti, A., Cranor, L. F., et al. (2013) I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets. In Proceedings of the SIGCHI conference on human factors in computing systems, 2013 (pp. 3277–3286). ACM
go back to reference Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.CrossRef Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.CrossRef
go back to reference Sprecher, S., & Hendrick, S. S. (2004). Self-disclosure in intimate relationships: Associations with individual and relationship characteristics over time. Journal of Social and Clinical Psychology, 23(6), 857–877.CrossRef Sprecher, S., & Hendrick, S. S. (2004). Self-disclosure in intimate relationships: Associations with individual and relationship characteristics over time. Journal of Social and Clinical Psychology, 23(6), 857–877.CrossRef
go back to reference Sproull, N. L. (2002). Handbook of research methods: A guide for practitioners and students in the social sciences. Lanham, MD: Scarecrow Press. Sproull, N. L. (2002). Handbook of research methods: A guide for practitioners and students in the social sciences. Lanham, MD: Scarecrow Press.
go back to reference Strauss, A., & Corbin, J. (1990). Basics of qualitative research (Vol. 15). Newbury Park, CA: Sage. Strauss, A., & Corbin, J. (1990). Basics of qualitative research (Vol. 15). Newbury Park, CA: Sage.
go back to reference Tavani, H. T. (1999). Privacy online. ACM SIGCAS Computers and Society, 29(4), 11–19.CrossRef Tavani, H. T. (1999). Privacy online. ACM SIGCAS Computers and Society, 29(4), 11–19.CrossRef
go back to reference Tavani, H. T. (2018). Should we have a right to be forgotten?: A critique of key arguments underlying this question. Journal of Information Ethics, 27(2), 26–46. Tavani, H. T. (2018). Should we have a right to be forgotten?: A critique of key arguments underlying this question. Journal of Information Ethics, 27(2), 26–46.
go back to reference Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570.CrossRef Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570.CrossRef
go back to reference Tesch, R. (2013). Qualitative research: Analysis types and software. London: Routledge.CrossRef Tesch, R. (2013). Qualitative research: Analysis types and software. London: Routledge.CrossRef
go back to reference Tirosh, N. (2017). Reconsidering the ‘Right to be Forgotten’–memory rights and the right to memory in the new media era. Media, Culture & Society, 39(5), 644–660.CrossRef Tirosh, N. (2017). Reconsidering the ‘Right to be Forgotten’–memory rights and the right to memory in the new media era. Media, Culture & Society, 39(5), 644–660.CrossRef
go back to reference Udo, G., Bagchi, K., & Maity, M. (2016). Exploring factors affecting digital piracy using the norm activation and UTAUT models: The role of national culture. Journal of Business Ethics, 135(3), 517–541.CrossRef Udo, G., Bagchi, K., & Maity, M. (2016). Exploring factors affecting digital piracy using the norm activation and UTAUT models: The role of national culture. Journal of Business Ethics, 135(3), 517–541.CrossRef
go back to reference Ünal, A. F., Warren, D. E., & Chen, C. C. (2012). The normative foundations of unethical supervision in organizations. Journal of Business Ethics, 107(1), 5–19.CrossRef Ünal, A. F., Warren, D. E., & Chen, C. C. (2012). The normative foundations of unethical supervision in organizations. Journal of Business Ethics, 107(1), 5–19.CrossRef
go back to reference van de Kerkhof, M. (2006). Making a difference: On the constraints of consensus building and the relevance of deliberation in stakeholder dialogues. Policy Sciences, 39(3), 279–299.CrossRef van de Kerkhof, M. (2006). Making a difference: On the constraints of consensus building and the relevance of deliberation in stakeholder dialogues. Policy Sciences, 39(3), 279–299.CrossRef
go back to reference Voss, W. G., & Castets-Renard, C. (2015). Proposal for an international taxonomy on the various forms of the right to be forgotten: A Study on the Convergence of Norms. Journal on Telecommunications and High Technology Law, 14(2), 281–344. Voss, W. G., & Castets-Renard, C. (2015). Proposal for an international taxonomy on the various forms of the right to be forgotten: A Study on the Convergence of Norms. Journal on Telecommunications and High Technology Law, 14(2), 281–344.
go back to reference Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., & Cranor, L. F. (2011). I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the seventh symposium on usable privacy and security (pp. 10): ACM Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., & Cranor, L. F. (2011). I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the seventh symposium on usable privacy and security (pp. 10): ACM
go back to reference Weber, R. H. (2010). Internet of things-new security and privacy challenges. Computer Law & Security Review, 26(1), 23–30.CrossRef Weber, R. H. (2010). Internet of things-new security and privacy challenges. Computer Law & Security Review, 26(1), 23–30.CrossRef
go back to reference Wheeless, L. R., & Grotz, J. (1976). Conceptualization and measurement of reported self-disclosure. Human Communication Research, 2(4), 338–346.CrossRef Wheeless, L. R., & Grotz, J. (1976). Conceptualization and measurement of reported self-disclosure. Human Communication Research, 2(4), 338–346.CrossRef
go back to reference Whetstone, J. T. (2001). How virtue fits within business ethics. Journal of Business Ethics, 33(2), 101–114.CrossRef Whetstone, J. T. (2001). How virtue fits within business ethics. Journal of Business Ethics, 33(2), 101–114.CrossRef
go back to reference Winslow, B. W. (2003). Family caregivers’ experiences with community services: A qualitative analysis. Public Health Nursing, 20(5), 341–348.CrossRef Winslow, B. W. (2003). Family caregivers’ experiences with community services: A qualitative analysis. Public Health Nursing, 20(5), 341–348.CrossRef
go back to reference Xie, W., & Kang, C. (2015). See you, see me: Teenagers’ self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398–407.CrossRef Xie, W., & Kang, C. (2015). See you, see me: Teenagers’ self-disclosure and regret of posting on social network site. Computers in Human Behavior, 52, 398–407.CrossRef
go back to reference Youm, K. H., & Park, A. (2016). The “right to be forgotten” in European Union Law: Data protection balanced with free speech? Journalism & Mass Communication Quarterly, 93(2), 273–295.CrossRef Youm, K. H., & Park, A. (2016). The “right to be forgotten” in European Union Law: Data protection balanced with free speech? Journalism & Mass Communication Quarterly, 93(2), 273–295.CrossRef
Metadata
Title
Could You Ever Forget Me? Why People Want to be Forgotten Online
Authors
Chanhee Kwak
Junyeong Lee
Heeseok Lee
Publication date
01-02-2021
Publisher
Springer Netherlands
Published in
Journal of Business Ethics / Issue 1/2022
Print ISSN: 0167-4544
Electronic ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-021-04747-x

Other articles of this Issue 1/2022

Journal of Business Ethics 1/2022 Go to the issue