Research Article

Philosophical Review of Privacy and Identity in Modern Technology and Marketing

Jitae Kim 1, Jongmin Kim 2 *
More Detail
1 Korea International School; Seongnam 13453, South Kore2 Department of Civil Engineering, University of Seoul; Seoul 02504, Korea* Corresponding Author
International Journal of Business Studies and Innovation, 4(4), 2024, 1-7, https://doi.org/10.35745/ijbsi2024v04.04.0001
Published: 31 October 2024
OPEN ACCESS   152 Views   91 Downloads
Download Full Text (PDF)

ABSTRACT

Technological advancements necessitate the philosophical understanding of privacy and identity more than ever. The intricate relationships between privacy, identity, and technologies must be considered vital to raise user interests by enhancing privacy protection. Recent technologies such as AI, blockchain, and augmented/virtual reality have opportunities and challenges in protecting user privacy and identity. In philosophy, privacy is thought to reflect an individual's control of personal information and personal identity. Privacy makes people selectively disclose information with a multifaceted concept. Philosophical perspectives on identity are individualistic. The aspects of identity are shared with others and decided on the concept of privacy as identity is defined by what is shared by a person. In the technology era, digital privacy and digital identity have emerged for protecting personal information, online behavior, and interactions. As artificial intelligence algorithms are widely used, the protection of digital privacy and identity is critical. Thus, technologies need to be developed to improve the interests, autonomy, and rights of users by considering the philosophical concepts of privacy and identity. The user perception and preference for Apple’s products are apparent evidence of the importance of privacy and identity policy, which considerably affects the market position of its products. To improve digital privacy and identity, multifaceted strategies are required. Strong authentication methods need to be developed, and educating users and businesses is demanded. Ethical practices, self-sovereign identity, and the application of regulations must be integrated by combining technology, education, and ethical considerations for better protection of digital privacy and identity and the increase in the marketing performance of technologies and related products.

CITATION (APA)

Kim, J., & Kim, J. (2024). Philosophical Review of Privacy and Identity in Modern Technology and Marketing. International Journal of Business Studies and Innovation, 4(4), 1-7. https://doi.org/10.35745/ijbsi2024v04.04.0001

REFERENCES

  1. Alcatraz AI. (2004). Facial Biometrics vs. Iris Biometrics: Which is Better? Available online: https://alcatraz.ai/blog/facial-biometrics-vs-iris-biometrics-which-is-better (accessed on July 15, 2024)
  2. Amadeo, Ron. (2024). Apple Hits “All-Time High” Smartphone Market Share, Takes #1 Spot for 2023. Available online: https://arstechnica.com/gadgets/2024/01/apple-hits-all-time-high-smartphone-market-share-takes-1-spot-for-2023/ (accessed on July 15, 2024)
  3. Bergfeld, Marc-M. & Spitz, S. (2011). Privacy and Identity Management on Mobile Devices: Emerging Technologies and Future Directions for Innovation. (Fischer-Hübner, Simon, Duquenoy, Penny, Hansen, Marit, Leenes, Ronald, & Zhang Ed.) In Privacy and Identity Management for Life. Berlin/Heidelberg, Germany: Springer. https://doi.org/10.1007/978-3-642-20317-6_22.
  4. Burton, Joe. (2022). Digital Identity: Where We Began, Where We Are And Where We Are Going. Available online: https://www.forbes.com/sites/forbestechcouncil/2022/03/24/digital-identity-where-we-began-where-we-are-and-where-we-are-going/. (accessed on July 15, 2024)
  5. Camp, L. Jean. (2004). Digital identity. IEEE Technology and Society Magazine, 23, 34–41. https://doi.org/10.1109/MTAS.2004.1337889.
  6. Christopher, Gill. (2012). Ancient Concepts of Personal Identity. (Graziosi, Barbara, Vasunia, Phiroze, and Boys-Stones, George Ed.) In The Oxford Handbook of Hellenic Studies. Oxford, UK: Oxford University Press. https://doi.org/10.1093/oxfordhb/9780199286140.013.0023.
  7. Christopher, Gorog, (2021). A Synergistic Approach to Digital Privacy. Available online: https://doi.org/10.48550/arXiv.2103.14783. (accessed on July 15, 2024)
  8. Gavison, Ruth. (2011). Privacy: Legal Aspects. Available online: https://www.researchgate.net/publication/228154411_Privacy_Legal_Aspects. (accessed on July 15, 2024)
  9. Falcon, Ronnie. (2023). I/O 2023: What's new in Android Security and Privacy. Available online: https://security.googleblog.com/2023/05/io-2023-android-security-and-privacy.html. (accessed on July 15, 2024)
  10. Hammack, L. Phillip. (2014). Theoretical Foundations of Identity. (McLean, C. Kate C. and Syed, Moin Ed.) In The Oxford Handbook of Identity Development, Oxford Library of Psychology. Oxford, UK: Oxford University. https://doi.org/10.1093/oxfordhb/9780199936564.013.027.
  11. Hannah, Sutor. (2024). Safeguarding Identity and Privacy: Fundamental Human Rights in the Digital Age. Available online: https://idpro.org/safeguarding-identity-and-privacy-fundamental-human-rights-in-the-digital-age/.(accessed on July 15, 2024)
  12. Harvard Business Review. (2024). Apple’s Dilemma: Balancing Privacy and Safety Responsibilities. Available online: https://hbr.org/podcast/2024/02/apples-dilemma-balancing-privacy-and-safety-responsibilities. (accessed on July 15, 2024)
  13. Hongladarom, Soraj. (2015). Philosophical Foundations of Privacy. (Hongladarom, Soraj) In A Buddhist Theory of Privacy. Singapore: SpringerBriefs in Philosophy. https://doi.org/10.1007/978-981-10-0317-2_2.
  14. IEEE Digital Privacy. (2024). Understanding Privacy in the Digital. Available online: https://digitalprivacy.ieee.org/publications/topics/understanding-privacy-in-the-digital-age. (accessed on July 15, 2024)
  15. Kayas, Oliver G., Matikonis Karl, Cranmer, Eleanor E. & Pereira C. Jorge. (2024). Socially Negotiating Privacy Boundaries and Academic Identities, Studies in Higher Education. Studies in Higher Education 49, 1241–1252. https://digitalprivacy.ieee.org/publications/topics/understanding-privacy-in-the-digital-age 80/03075079.2023.2262507
  16. Klosowski, Thorin. (2022). How Mobile Phones Became a Privacy Battleground—and How to Protect. Available online: https://www.nytimes.com/wirecutter/blog/protect-your-privacy-in-mobile-phones/.(accessed on July 15, 2024)
  17. Komamura, Keigo. (2019). Privacy’s Past: The Ancient Concept and Its Implications for the Current Law of Privacy. Washington University Law Review, 96, 1337–1343. https://openscholarship.wustl.edu/law_lawreview/vol96/iss6/8/.
  18. Leith, J. Douglas. (2021). Mobile Handset Privacy: Measuring the Data iOS and Android Send to Apple and Google. (Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., and Yung, M. Ed.) In Security and Privacy in Communication Networks. SecureComm 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 399. Berlin, Germany: Springer. https://doi.org/10.1007/978-3-030-90022-9_12.
  19. Lin, Jinghuai, & Marc, Latoschik, E. (2022). Digital Body, Identity And Privacy In Social Virtual Reality: A Systematic Review. Frontiers in Virtual Reality, 3. https://doi.org/10.3389/frvir.2022.974652.
  20. Lucas, D. Introna. (1997). Privacy and The Computer: Why We Need Privacy In The Information Society. Metaphilosophy, 28, 259–275. https://www.jstor.org/stable/24439066.
  21. Markithome (2024). The Apple Effect: How Apple’s Marketing Strategy Continues to Revolutionize the Tech Industry. Available online: https://markitome.com/blog/apples-marketing-strategy-for-the-tech-industry/.(accessed on July 15, 2024)
  22. Mendes, Ricarado, Cunha, Mariana, Vilela, João P., Beresford, R. Alastair. (2022). Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences. (Atluri, V., Di Pietro, R., Jensen, C.D., & Meng, W. Ed.) In Computer Security –ESORICS 2022. Lecture Notes in Computer Science, Vol. 13554. Berlin/Heidelberg, Germany: Springer. https://doi.org/10.1007/978-3-031-17140-6_8.
  23. Michelfelder, P. Diane. (2010). Philosophy, privacy, and pervasive computing. AI & Society, 25, 61–70. https://doi.org/10.1007/s00146-009-0233-2.
  24. Mikhail J. Atallah, & Frikken Keith B. (2007). Privacy-Preserving Cryptographic Protocols. (Acquisti, Alessandro, Gritzalis, Stefanos Lambrinoudakis, Costos, & di Vimercati, Sabrina di Ed.) In Digital Privacy: Theory, Technologies, and Practices 1st ed. New York, NY, USA: Auerbach Publications. https://doi.org/10.1201/9781420052183.
  25. MIT Initiative on the Digital Economy. (2016). Digital Identity: The Key to Privacy and Security in the Digital World. Available online: https://ide.mit.edu/insights/digital-identity-the-key-to-privacy-and-security-in-the-digital-world/.(accessed on July 15, 2024)
  26. Muhammad, Kahlid, A., & Vida, Viktoria. (2023). Strategic Marketing Plan for APPLE Inc. Available online: https://www.researchgate.net/profile/Muhammad-Anas-Khalid/publication/371902832_Strategic_Marketing_Plan_for_APPLE_Inc/links/649b0cd1b9ed6874a5df0478/Strategic-Marketing-Plan-for-APPLE-Inc.pdf. (accessed on July 15, 2024)
  27. Piatos, Taziana. (2024). iOS vs. Android Security: Which One is More Secure? Available online: https://privacysavvy.com/security/mobile/ios-iphone-vs-android-security/.(accessed on September 22, 2024)
  28. Pereira, Danie. (2024). Apple Marketing Strategy. Available online: https://businessmodelanalyst.com/apple-marketing-strategy/. (accessed on September 22, 2024)
  29. Quach, Sara, Thaichon, Park, Martin, D. Kelly, Weaven Scott, & Palmatier, W. Robert. (2022) Digital Technologies: Tensions in Privacy And Data. Journal of the Academy of Marketing Science, 50, 1299–1323. https://doi.org/10.1007/s11747-022-00845-y.
  30. Scoccia G. Luca, Autili Marco, Giovanni Stilo, & Inverardi Paola. (2022). An Empirical Study of Privacy Labels On The Apple Ios Mobile App Store. Proceedings of the 9th IEEE/ACM International Conference. 113–124. https://doi.org/10.1145/3524613.3527813.
  31. Sedlmeir, Johannes, Smethurst, Reuilly, Rieger, Alexander, & Fridgen Gilbert. (2021). Digital Identities and Verifiable Credentials. Business & Information Systems Engineering, 63, 603–613. https://doi.org/10.1007/s12599-021-00722-y.
  32. Smith, H. Jeff, Dinev, Tamara, & Xu, Heng. (2011). Information Privacy Research: An Interdisciplinary Review. Available online: http://dx.doi.org/10.2307/41409970. (accessed on September 22, 2024)
  33. Søe, S. Obelitz & Mai, Jens-Erik. (2022). Data Identity: Privacy and the Construction Of Self. Synthese, 200, 492. https://doi.org/10.1007/s11229-022-03968-5.
  34. Daniel, Sokol, D, & Feng, Zhu. (2021). Harming Competition and Consumers under the Guise of Protecting Privacy: An Analysis of Apple’s iOS 14 Policy Updates. Cornell Law Review Online, 107, 2021. https://www.cornelllawreview.org/2022/07/21/harming-competition-and-consumers-under-the-guise-of-protecting-privacy-an-analysis-of-apples-ios-14-policy-updates/.
  35. Statistica. (2021). Do you agree with Apple's new privacy policies? Available online: https://www.statista.com/statistics/1224850/user-opinion-on-apple-s-new-privacy-policies-us/. (accessed on July 15, 2024)
  36. van Rijmenam, Mark. 2023. Privacy In the Age of AI: Risks, Challenges and Solutions. Available online: https://www.thedigitalspeaker.com/privacy-age-ai-risks-challenges-solutions/.(accessed on July 15, 2024)
  37. Walker, Justin. (2024). The history of Digital Identity. Available online: https://www.business-reporter.co.uk/technology/the-history-of-digital-identity. (accessed on July 15, 2024)
  38. Westin, F. Alan. (1968). Privacy and Freedom. Washington University Law Review, 25, 166–170. https://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?article=3659&context=wlulr&ref=hackernoon.com.
  39. Yasmeen Elsantil. (2020). User Perceptions of the Security of Mobile Applications. International Journal of E-Services and Mobile Applications. 12. 18. http://dx.doi.org/10.4018/IJESMA.2020100102.