إدارة البصمة الرقمية لمستخدمي الإنترنت في ضوء نظرية إدارة خصوصية الاتصالات - دراسة ميدانية على عينة من مستخدمي الإنترنت بجمهورية مصر العربية

نوع المستند : المقالة الأصلية

المؤلف

کلية الإعلام - جامعة الأهرام الکندية

المستخلص

يستكشف هذا البحث الدور المحوري للتكنولوجيا في مختلف جوانب حياة الناس، ويسلط الضوء على هيمنة الميزات التكنولوجية، حيث تتم الاتصالات وتنتشر المعرفة وتصاغ الأفكار على نحو اعتيادي في بيئة رقمية، وتؤدي شركات التكنولوجيا والاتصالات الكبرى دورًا حاسمًا في هذا المشهد. ومن خلال الاعتماد على آليات خوارزمية لتتبع تصرفات المستخدم وسلوكياته، فضلًا عن تسجيل البيانات ودمج آثار وجودهم على الإنترنت وعمليات تفاعل الأفراد في البيئة الرقمية في ملف شخصي متكامل، وفي ظل صعوبة إسناد حماية البيانات للقوانين والتشريعات وحدها في هذا الفضاء الافتراضي؛ هدفت هذه الدراسة إلى فهم كيفية إدراك المستخدمين لبصمتهم الرقمية، والأنشطة الرقمية التي تعمل على تشكيلها، فضلاً عن تصوراتهم للتأثيرات المحتملة ومستوى إدارتهم لبصمتهم الرقمية.
وقد أشارت النتائج إلى اعتبار وعي الأفراد أداة داعمة للتحكم في آثاره الرقمية، لا سيما مع وجود عديد من المعلومات يمكن أن تكون حساسة بالنسبة للمستخدمين، مثل المعلومات المالية والحسابات المصرفية، والصور والفيديوهات الشخصية. ولأن المعلومات الشخصية لا تحمل الدرجة نفسها من الأهمية، فإن بعض المعلومات يمكن الكشف عنها أو حجبها وفقًا للمخاطر التي يتصورها المستخدم إزاء الإفصاح عنها أو قناعته بوجود فائدة ستعود عليه، لذا تظهر أهمية وزن القرارات وتطوير المستخدمين لقواعد إدارة بصمتهم الرقمية بما يتناسب مع احتياجاتهم.
وقد بيَّنت النتائج اعتقاد المبحوثين حول المدد الزمنية التي يسمح لجهات تجميع بياناتهم أن يحتفظوا ببياناتهم، كما بيَّنت النتائج وجود قدر معقول من الوعي لدى المبحوثين بالبصمة الرقمية، إضافة إلى معرفتهم الجيدة بالأنشطة التي تعمل على تشكيلها، كما أظهروا مستوى جيدًا تجاه إدارتها.

الكلمات الرئيسية

الموضوعات الرئيسية


  • Tomasello, F. (2023). From industrial to digital citizenship: rethinking social rights in cyberspace. Theory and society, 52(3), 463-486.‏
  • Montag, C., Lachmann, B., Herrlich, M., & Zweig, K. (2019). Addictive features of social media/messenger platforms and freemium games against the background of psychological and economic theories. International journal of environmental research and public health, 16(14), 2612.‏
  • Council of Europe (2014). Recommendation CM/Rec(2014)6 of the Committee of Ministers to member States on a Guide to human rights for Internet users. (Adopted by the Committee of Ministers on 16 April 2014 at the 1197th meeting of the Ministers’ Deputies)
  • Buchanan, R., Southgate, E., & Smith, S. P. (2019). ‘The whole world’s watching really’: Parental and educator perspectives on managing children’s digital lives. Global Studies of Childhood, 9(2), 167-180.‏
  • Chalklen, C., & Anderson, H. (2017). Mothering on Facebook: Exploring the privacy/openness paradox. Social Media+ Society, 3(2), 2056305117707187.
  • Buchanan, R., Southgate, E., Smith, S. P., Murray, T., & Noble, B. (2017). Post no photos, leave no trace: Children’s digital footprint management strategies. E-learning and digital Media, 14(5), 275-290.‏
  • Marinelli, A., & Parisi, S. (2022). Apps, Platforms, and Everyday Practices: How People Perceive and Care (or not) About the Digital Traces They Leave Online. American Behavioral Scientist, 00027642221144852.‏
  • The Australian Communications and Media Authority, Digital Footprints and Identities, Retrieved from: www.acma.gov.au/theACMA/Library/researchacma. Date: 12-10-2020.
  • Camacho, M., Minelli, J., & Grosseck, G. (2012). Self and identity: raising undergraduate students' awareness on their digital footprints. Procedia-Social and Behavioral Sciences, 46, 3176-3181.‏
  • Holloway, D. (2019). Surveillance capitalism and children’s data: the Internet of toys and things for children. Media International Australia, 170(1), 27-36..
  • Montag, C., & Elhai, J. D. (2023). On Social Media Design,(Online-) Time Well-spent and Addictive Behaviors in the Age of Surveillance Capitalism. Current Addiction Reports, 1-7.‏
  • Michael, M., & Lupton, D. (2017). ‘Depends on who’s got the data’: public understandings of personal digital dataveillance.‏
  • Di Bene, E. (2022). Online Privacy: a Qualitative Inquiry About Privacy Perceptions and Behavior in the Age of Surveillance Capitalism (Doctoral dissertation, Capella University).‏
  • Sindermann, C., Kuss, D. J., Throuvala, M. A., Griffiths, M. D., & Montag, C. (2020). Should we pay for our social media/messenger applications? Preliminary data on the acceptance of an alternative to the current prevailing data business model. Frontiers in Psychology, 11, 1415.‏
  • Andrew, J., Baker, M., & Huang, C. (2021). Data breaches in the age of surveillance capitalism: do disclosures have a new role to play?. Critical Perspectives on Accounting, 102396.
  • Salah aldiyn alnashar, ghadati. (2018). 'iidarat alkhususiat eabr mawaqie altawasul alaijtimaeaa bialtatbiq ealaa mawqie fisbuk. almajalat aleilmiat libuhuth al'iidhaeat waltilfizyuni, 2018(14), 271-335.
  • Ibrahim alsaman, hani. (2022). yatbae alshabab aljamieia nahw antihak alhayaat alkhasat eabr shabakat altawasul aliajtimaeii waliaat alkhususiati. majalat alakhir waldirasat almanshurati, 20(20), 1-77.
  • Ahmad muhamad tah, hudir. (2022). 'iidarat almar'at almisriat likhususiatiha ealaa mawqie altawasul aliajtimaeii fisbuk. majalat 'ahdath waldirasat almanshurata, 20(20), 1-72.
  • Saed judih 'iibrahim, sali. (2021). mawaqie altawasul alaijtimaeii waintihakat alkhususiati: namudhaj alsanab shat/alfis buk. majalat 'ahdath waldirasat almanshurati, 18(18), 1-81.
  • Ahmad ghurib, sahr. (2021). 'iidrak aljumhur liaintihakat alkhususiat alraqamiat eabr al'iielam aljadid fi daw' tathir alshakhs althaalithi. majalat 'ahdath waldirasat almanshurata, 18(18), 1-69.
  • Hasan zidan, salimata. (2022). taemim almaelumat alshakhsiat ealaa wasayil altawasul alaijtimaeii. alhudud waikhtiraqat safahat almar'at ealaa alfis buk nmwdhjaan. majalat alakhir waldirasat almanshurati, 21(21), 1-19.
  • Bakhayt, maha mustafi, talabahu, hana' eakashihi. (2022). qam bitanfidh al'ahdaf almisriat fi 'iitar namudhajiin yata'athar bialakhrin. almajalat almisriat libuhuth alraay aleama, 21(4), 619-673..
  • Mahmud muhamad muhamad, alniqabatu. (2022). astikhdam altaswiq al'iiliktrunii litatbiqat tiknulujia aldhaka' alaistinaeii watahlil albayanat alraqmiat bikamiyaat kabirat ealaa alkhususiat fi aleasra. majalat mustaqbal aleulum alaijtimaeiati, 8(3), 205-264.
  • Albaradiei, maha eabd muhamad alhamidi. (2022). tahdif 'iilaa khususiat almustakhdimin altatbiqat altaswiqiat fi 'iitar nazar litathir alakhrin. majalat alakhir waldirasat almanshurati, 22(22), 493-578.
  • Hinds, J., & Joinson, A. N. (2018). What demographic attributes do our digital footprints reveal? A systematic review. PloS one, 13(11), e0207112.‏
  • Pew Research Center, The Digital Footprint of Europe’s Refugees, 2017, Available at: www.pewglobal.org/2017/06/08/digital-footprint-of-europes-refugees/.
  • Hilbert, M., Vásquez, J., Halpern, D., Valenzuela, S., & Arriagada, E. (2017). One step, two step, network step? Complementary perspectives on communication flows in Twittered citizen protests. Social science computer review, 35(4), 444-461.‏
  • Robards, B., Lyall, B., & Moran, C. (2021). Confessional data selfies and intimate digital traces. New Media & Society, 23(9), 2616-2633.‏
  • Wang, X., Fang, Z., & Guo, X. (2016). Tracking the digital footprints to scholarly articles from social media. Scientometrics, 109, 1365-1376..
  • Wang, X., Xu, S., & Fang, Z. (2016). Tracing digital footprints to academic articles: An investigation of PeerJ publication referral data. arXiv preprint arXiv:1601.05271.‏
  • Lambiotte, R., & Kosinski, M. (2014). Tracking the digital footprints of personality. Proceedings of the IEEE, 102(12), 1934-1939.
  • Önder, I., Koerbitz, W., & Hubmann-Haidvogel, A. (2016). Tracing tourists by their digital footprints: The case of Austria. Journal of Travel Research, 55(5), 566-573.
  • Girardin, F., Calabrese, F., Dal Fiore, F., Ratti, C., & Blat, J. (2008). Digital footprinting: Uncovering tourists with user-generated content. IEEE Pervasive computing, 7(4), 36-43.
  • Golder, S. A., & Macy, M. W. (2014). Digital footprints: Opportunities and challenges for online social research. Annual Review of Sociology, 40, 129-152.‏ 141.
  • Heba Goda, alhimayat alqanuniat lilkhususiat alraqamiat fi alduwal alearabiati. majalat 'ahdath waldirasat almanshurati, 20(20), 1-94.
  • Eayishati, ghazil (2023). alhimayat aldawliat lihaqi alkhususiat fi almajal alraqmay. majalat aksi, 27(4), 404-427.
  • Ashri barae, 'asma'. (2022). aitijahat alnukhab nahw himayat albayanat eabr mawaqie altawasul wadawriha fi himayat alkhususiat alraqamiat lahum. majalat 'ahdath waldirasat almanshurata, 20(20), 1-68.
  • Stainforth, E. (2022). Collective memory or the right to be forgotten? Cultures of digital memory and forgetting in the European Union. Memory Studies, 15(2), 257-270.
  • Grimm, C., & Chiasson, S. (2014, February). Survey on the fate of digital footprints after death. In Workshop on Usable Security (USEC), Internet Society.‏
  • Bunn, A. (2019). Children and the ‘Right to be Forgotten’: what the right to erasure means for European children, and why Australian children should be afforded a similar right. Media International Australia, 170(1), 37-46.‏
  • Mitrou, L., & Karyda, M. (2012, February). EU's data protection reform and the right to be forgotten: A legal response to a technological challenge?. In 5th International Conference of Information Law and Ethics (pp. 29-30)..
  • Koops, B. J. (2011). Forgetting footprints, shunning shadows: A critical analysis of the right to be forgotten in big data practice. SCRIPTed, 8, 229.‏ 230a.
  • Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Suny Press.‏ 1‏
  • CPM Developed Glossary of Terms, Communication Privacy Management Center, Retrieved from: https://cpmcenter.iupui.edu/Teach/Glossary, Date: 17 of September 2023.‏
  • Petronio, S. (2010). Communication privacy management theory: What do we know about family privacy regulation?. Journal of family theory & review, 2(3), 175-196.‏‏
  • Hollenbaugh, E. E. (2019). Privacy management among social media natives: An exploratory study of Facebook and Snapchat. Social Media+ Society, 5(3), 2056305119855144.‏
  • Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13(1), 6-14.‏
  • Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2), 335-361.‏
  • Thompson, S. K. (2012). Sampling (Vol. 755). John Wiley & Sons.‏ 54.
  • Thatcher, J. (2014). Big data, big questions| Living on fumes: Digital footprints, data fumes, and the limitations of spatial big data. International Journal of Communication, 8, 19.
  • Ward, C., Ellis, D., D’Ambrosio, L. A., & Coughlin, J. F. (2018). Digital breadcrumbs: A lack of data privacy and what people are doing about it. In Human-Computer Interaction. Theories, Methods, and Human Issues: 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I 20 (pp. 599-612). Springer International Publishing.‏ 605.
  • Van Baalen, S. (2018). ‘Google wants to know your location’: The ethical challenges of fieldwork in the digital age. Research Ethics, 14(4), 1-17.‏
  • Oxley, C. (2011). Digital citizenship: Developing an ethical and responsible online culture. Access, 25(3), 5-9.‏
  • Mayda, M. (2022). Digital Footprint Management In Dıigital Visual Culture. Erciyes İletişim Dergisi, 9(2), 1031-1044
  • Comunello, F., Martire, F., & Sabetta, L. (2022). Brushing Society Against the Grain: Digital Footprints, Scraps, Non-Human Acts, Crumbs, and Other Traces. American Behavioral Scientist, 00027642221144844.‏ ‏
  • Mayda, M. (2022). Digital Footprint Management In Dıigital Visual Culture. Erciyes İletişim Dergisi, 9(2), 1031-1044.
  • Madden, M., Fox, S., Smith, A., & Vitak, J. (2007). Digital Footprints. PEW Internet & American Life Project. Pew Internet & American life project, December.‏/
  • Hengstler, J. (2011). Managing your digital footprint: Ostriches v. Eagles. Education for a digital world, 2, 89-139.
  • Alhamami, F. M. A. (2020). Digital Footprints of University Students (Doctoral dissertation, Flinders University, College of Science and Engineering.).‏‏
  • Büchi, M., Lutz, C., & Micheli, M. (2017, May). Life online: The digital footprint gap. In International scientific conference for the Partnership for Progress on the Digital Divide.‏ Also see: Büchi, M. (2017). Digital inequalities: Differentiated Internet use and social implications (Doctoral dissertation, University of Zurich).‏ Also see: Robinson, L., Cotten, S. R., Ono, H., Quan-Haase, A., Mesch, G., Chen, W., ... & Stern, M. J. (2015). Digital inequalities and why they matter. Information, communication & society, 18(5), 569-582.‏
  • Arakerimath, A., & Gupta, P. K. (2015). Digital footprint: Pros, cons, and future. International Journal of Latest Technology in Engineering, 4(10), 52-56.‏
  • Sjöberg, M., Chen, H. H., Floréen, P., Koskela, M., Kuikkaniemi, K., Lehtiniemi, T., & Peltonen, J. (2017). Digital me: Controlling and making sense of my digital footprint. In Symbiotic Interaction: 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29–30, 2016, Revised Selected Papers 5 (pp. 155-167). Springer International Publishing.‏
  • Denise Seguin, What Does Your Digital Footprint Say About You?, Retrieved from: https://paradigmeducation.com/2016/12/30/digital-footprint-say/. Date: 3-12-2021
  • Natasha Singer (2013) They Loved Your G.P.A. Then They Saw Your Tweets. Retrieved from: www.nytimes.com/2013/11/10/business/they-loved-your-gpa-then-they-saw-your-tweets.html.
  • Beal, A., & Strauss, J. (2009). Radically transparent: Monitoring and managing reputations online. John Wiley & Sons.‏ 111.
  • Mitrou, L., & Karyda, M. (2012, February). EU's data protection reform and the right to be forgotten: A legal response to a technological challenge?. In 5th International Conference of Information Law and Ethics (pp. 29-30).‏
  • Esposito, E. (2017). Algorithmic memory and the right to be forgotten on the web. Big Data & Society, 4(1), 2053951717703996.‏
  • No, R. (1999). Rec (99) 5 of the Committee of Ministers to member states on the protection of privacy on the Internet (adopted by the Committee of Ministers on 23 February 1999 at the 660th meeting of the Ministers' Deputies). Council of Europe.‏
  • General Data Protection Regulation. Retrieved from: https://gdpr-info.eu. Date: 12-12-2023.
  • Squires, J. (2014). Google Spain SL v Agencia Espanola de Proteccion de Datos (European Court of Justice, C-131/12, 13 May 2014). Adelaide Law Review, The, 35(2), 463-471.‏