Data Protection Laws for Digital Communication: Are They Enough?
VerifiedAdded on 2023/06/12
|23
|5024
|383
AI Summary
This study analyzes the appropriateness of the current data protection laws for digital communication. It identifies whether the environmental protection laws are sufficient to protect the internet users. The study finds that there has been significant improvement in the environmental protection laws but still is not enough to protect the privacy of the online users.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: MEDIA AND COMMUNICATION
Media and Communication
Name of the student
Name of the university
Author note
Media and Communication
Name of the student
Name of the university
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1MEDIA AND COMMUNICATION
Executive Summary
Digitalization had decreased the level of privacy of the general population and those who surf the
online medium leave behind a trail of their digital footprint. The majority of the general
population use the online medium to connect to different people where they leave a large amount
of personal data. On the hand, with the advent of web 2.0 there has been significant increase in
online transaction and online shopping so a large chunk of consumer data is always available on
company databases. The study had identified whether the environmental protection laws are
sufficient to protect the internet users. The findings of the study shows that there has been
significant improvement in the environmental protection laws but still is not enough to protect
the privacy of the online users.
Executive Summary
Digitalization had decreased the level of privacy of the general population and those who surf the
online medium leave behind a trail of their digital footprint. The majority of the general
population use the online medium to connect to different people where they leave a large amount
of personal data. On the hand, with the advent of web 2.0 there has been significant increase in
online transaction and online shopping so a large chunk of consumer data is always available on
company databases. The study had identified whether the environmental protection laws are
sufficient to protect the internet users. The findings of the study shows that there has been
significant improvement in the environmental protection laws but still is not enough to protect
the privacy of the online users.
2MEDIA AND COMMUNICATION
Table of Contents
Introduction......................................................................................................................................3
Background of the study..................................................................................................................3
Research Aim.................................................................................................................................11
Research Objectives.......................................................................................................................11
Research questions.........................................................................................................................11
Rationale of research methodology...............................................................................................12
Research Methodology..................................................................................................................12
Findings and Analysis....................................................................................................................15
Conclusion.....................................................................................................................................17
References......................................................................................................................................18
Appendix........................................................................................................................................22
Table of Contents
Introduction......................................................................................................................................3
Background of the study..................................................................................................................3
Research Aim.................................................................................................................................11
Research Objectives.......................................................................................................................11
Research questions.........................................................................................................................11
Rationale of research methodology...............................................................................................12
Research Methodology..................................................................................................................12
Findings and Analysis....................................................................................................................15
Conclusion.....................................................................................................................................17
References......................................................................................................................................18
Appendix........................................................................................................................................22
3MEDIA AND COMMUNICATION
Topic: “The digital age of communication regards data protection as a key factor for the
protection of individuals. Are the current laws enough?”
Introduction
Digitalization has decreased the level of privacy of the general population and those who
surf the online medium leave behind a trail of their digital footprint. The majority of the general
population use the online medium to connect to different people where they leave a large amount
of personal data. On the hand, with the advent of web 2.0 there has been significant increase in
online transaction and online shopping so a large chunk of consumer data is always available on
company databases (Kerber 2016). Moreover, it is has been seen that security breaches has been
as common phenomenon in major organizations where large amount of consumer data has been
stolen. Therefore, the study will analyze the appropriateness of the current data protection laws.
Background of the study
European Union has made attempts to update the data protection laws of 1995 by
modifying the previous laws. European commission proposed changes in the current privacy
protection laws to adapt to the current need of the society. The factors that has been taken into
consideration while making the changes in the current reforms are new legal basis, choosing the
appropriate legal instruments, application scope, strengthening the data subject rights, processor
and controller enhancement responsibility, assisting in international personal data transfer,
assurance regarding independent enforcement, and guaranteeing personal data protection by
criminal justice authorities and police (Montgomery and Chester 2015). However, cross border
issues arise as the boundaries between countries can be determined on the online platform.
Topic: “The digital age of communication regards data protection as a key factor for the
protection of individuals. Are the current laws enough?”
Introduction
Digitalization has decreased the level of privacy of the general population and those who
surf the online medium leave behind a trail of their digital footprint. The majority of the general
population use the online medium to connect to different people where they leave a large amount
of personal data. On the hand, with the advent of web 2.0 there has been significant increase in
online transaction and online shopping so a large chunk of consumer data is always available on
company databases (Kerber 2016). Moreover, it is has been seen that security breaches has been
as common phenomenon in major organizations where large amount of consumer data has been
stolen. Therefore, the study will analyze the appropriateness of the current data protection laws.
Background of the study
European Union has made attempts to update the data protection laws of 1995 by
modifying the previous laws. European commission proposed changes in the current privacy
protection laws to adapt to the current need of the society. The factors that has been taken into
consideration while making the changes in the current reforms are new legal basis, choosing the
appropriate legal instruments, application scope, strengthening the data subject rights, processor
and controller enhancement responsibility, assisting in international personal data transfer,
assurance regarding independent enforcement, and guaranteeing personal data protection by
criminal justice authorities and police (Montgomery and Chester 2015). However, cross border
issues arise as the boundaries between countries can be determined on the online platform.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4MEDIA AND COMMUNICATION
These have posed concerns and it is tough for the European Union to address this duality
effectively.
The prime media for communication in the current society are Facebook, YouTube,
Twitter and Instagram. It has quite difficult for the organizations to safeguard and protect the
privacy of the individuals over the world. The data protection law of 1995 has been considered
as the only effective legal instrument for data protection of the consumers. The internet platform
is diffusive and universal so all the end user agreements and privacy policies are generic in
global context. Moreover, the national parliaments are only responsible for determining the data
protection laws. Wachter et al. (2017) stated that the presence of data protection principles is
required to implement in the UK workplace for the reason of purpose limitation and data
minimization. The General Data Protection Regulation (GDPR) hence provides benefit to the
European Data Protection Board for information exchange in transmitting the data for
communication (Goodman and Flaxman 2016). This chapter provides a detailed discussion of
the current privacy protection laws for digital communication in UK and advantage and
disadvantage of the data protection legislation.
Data protection for the details of the users taken from the company need to be managed
in an efficient ways and for the same reason the government of the UK has formulated five
legations. These five legislations are- Data Protection Act 1998, The Privacy and Electronic
Communications (EC Directives) Regulations 2003), Data Retention and Investigatory Powers
Act 2014 (DRIPA) and Freedom of Information Act 2000. This law come into action from 16th
July 1998 and is the primary legal basis for protecting the data (Hornung 2012). The data
protection act only implements for collecting the data, processing the same utilizing the personal
data of living and natural persons. This data protection legislation processes all the private or
These have posed concerns and it is tough for the European Union to address this duality
effectively.
The prime media for communication in the current society are Facebook, YouTube,
Twitter and Instagram. It has quite difficult for the organizations to safeguard and protect the
privacy of the individuals over the world. The data protection law of 1995 has been considered
as the only effective legal instrument for data protection of the consumers. The internet platform
is diffusive and universal so all the end user agreements and privacy policies are generic in
global context. Moreover, the national parliaments are only responsible for determining the data
protection laws. Wachter et al. (2017) stated that the presence of data protection principles is
required to implement in the UK workplace for the reason of purpose limitation and data
minimization. The General Data Protection Regulation (GDPR) hence provides benefit to the
European Data Protection Board for information exchange in transmitting the data for
communication (Goodman and Flaxman 2016). This chapter provides a detailed discussion of
the current privacy protection laws for digital communication in UK and advantage and
disadvantage of the data protection legislation.
Data protection for the details of the users taken from the company need to be managed
in an efficient ways and for the same reason the government of the UK has formulated five
legations. These five legislations are- Data Protection Act 1998, The Privacy and Electronic
Communications (EC Directives) Regulations 2003), Data Retention and Investigatory Powers
Act 2014 (DRIPA) and Freedom of Information Act 2000. This law come into action from 16th
July 1998 and is the primary legal basis for protecting the data (Hornung 2012). The data
protection act only implements for collecting the data, processing the same utilizing the personal
data of living and natural persons. This data protection legislation processes all the private or
5MEDIA AND COMMUNICATION
public sector data. Gellert and Gutwirth (2013) highlighted that the data protection law is
formulated to meet the requirement of EU Data Protection Directive 95/46/EC The data
protection laws have total of 75 provisions and detailed information of exception of this
legislation, implementation and final provision. In case of Data Protection Act (DPA), data
personal to an individual must be processed fairly and b maintaining all the laws and cannot be
processed if any conditions under the Schedule 2 of the DPA, any one of the conditions from
Schedule 3 of the DPA should be met while handling the sensitive data (Lynskey 2015).
Moreover, the personal data of an individual must be adequate, relevant, accurate and of recent
date.
This legislation is implemented for sector-specific laws especially for the online marketing
companies. The organization handles the cookies for storing the information of the preferred
objects and products of the consumers. The Privacy and Electronic Communications (EC
Directives) Regulations 2003) thus implements the provisions of EU directive 2002/58/EC and
2009/136/EU for regulating cookies (Hornung 2012). The additional obligation of this legislation
is in relation to the electronic communications industry and electronic marketing. The legislation
covers that a person shall not utilize any electronic communications network for storing their
personal information (Legislation.gov.uk 2018). The person is also not allowed to access the
stored information. This law also considered the consent of the individual and imposes any site
to provide clear and comprehensive information regarding the storage and access of the
information. The law also stated that the person is also free to refuse the storage of or access to
that information (Legislation.gov.uk 2018).
This regulation is mainly formatted for the telecommunication industry and organizations to save
connection data of the customers (Legislation.gov.uk 2018). This legislation covers the grounds
public sector data. Gellert and Gutwirth (2013) highlighted that the data protection law is
formulated to meet the requirement of EU Data Protection Directive 95/46/EC The data
protection laws have total of 75 provisions and detailed information of exception of this
legislation, implementation and final provision. In case of Data Protection Act (DPA), data
personal to an individual must be processed fairly and b maintaining all the laws and cannot be
processed if any conditions under the Schedule 2 of the DPA, any one of the conditions from
Schedule 3 of the DPA should be met while handling the sensitive data (Lynskey 2015).
Moreover, the personal data of an individual must be adequate, relevant, accurate and of recent
date.
This legislation is implemented for sector-specific laws especially for the online marketing
companies. The organization handles the cookies for storing the information of the preferred
objects and products of the consumers. The Privacy and Electronic Communications (EC
Directives) Regulations 2003) thus implements the provisions of EU directive 2002/58/EC and
2009/136/EU for regulating cookies (Hornung 2012). The additional obligation of this legislation
is in relation to the electronic communications industry and electronic marketing. The legislation
covers that a person shall not utilize any electronic communications network for storing their
personal information (Legislation.gov.uk 2018). The person is also not allowed to access the
stored information. This law also considered the consent of the individual and imposes any site
to provide clear and comprehensive information regarding the storage and access of the
information. The law also stated that the person is also free to refuse the storage of or access to
that information (Legislation.gov.uk 2018).
This regulation is mainly formatted for the telecommunication industry and organizations to save
connection data of the customers (Legislation.gov.uk 2018). This legislation covers the grounds
6MEDIA AND COMMUNICATION
for issuing warrants and obtaining data in order to detect serious crime and safeguarding the
UK’s economic (Legislation.gov.uk 2018). The main purpose of this legislation is to allow with
the provision to security services to have access to phone and internet records concerning an
individual following by previous repeal of these rights by the “Court of Justice of the European
Union”. However, argument has been represented for this legislation that is Data Retention and
Investigatory Powers Act (Dripa) 2014 is not consistent with European Union law
(Theguardian.com 2018).
According to this legislation, any person can access data and a right to free access to all the
information like copies of government documents and other records from public organizations
(Burri and Schar 2016). The main objectives for the formulation of this law is to make
government more transparent, more accountable, improve the decision- making, better
understand decision making processes to the public, engage the participation of the public in
politics and endear public trust concerning government work (Hon et al. 2016).
According to this legislation, any person can access data and a right to free access to all
the information like copies of government documents and other records from public
organizations (Burri and Schar 2016). The main objectives for the formulation of this law is to
make government more transparent, more accountable, improve the decision- making, better
understand decision making processes to the public, engage the participation of the public in
politics and endear public trust concerning government work (Hon et al. 2016).
The disadvantage of the Data Protection Act (DPA) is there are many exceptions
involved in the process which does not allow a transparent data sharing among the individuals.
The exempted data for this data protection legislations are- national security, crime and
for issuing warrants and obtaining data in order to detect serious crime and safeguarding the
UK’s economic (Legislation.gov.uk 2018). The main purpose of this legislation is to allow with
the provision to security services to have access to phone and internet records concerning an
individual following by previous repeal of these rights by the “Court of Justice of the European
Union”. However, argument has been represented for this legislation that is Data Retention and
Investigatory Powers Act (Dripa) 2014 is not consistent with European Union law
(Theguardian.com 2018).
According to this legislation, any person can access data and a right to free access to all the
information like copies of government documents and other records from public organizations
(Burri and Schar 2016). The main objectives for the formulation of this law is to make
government more transparent, more accountable, improve the decision- making, better
understand decision making processes to the public, engage the participation of the public in
politics and endear public trust concerning government work (Hon et al. 2016).
According to this legislation, any person can access data and a right to free access to all
the information like copies of government documents and other records from public
organizations (Burri and Schar 2016). The main objectives for the formulation of this law is to
make government more transparent, more accountable, improve the decision- making, better
understand decision making processes to the public, engage the participation of the public in
politics and endear public trust concerning government work (Hon et al. 2016).
The disadvantage of the Data Protection Act (DPA) is there are many exceptions
involved in the process which does not allow a transparent data sharing among the individuals.
The exempted data for this data protection legislations are- national security, crime and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7MEDIA AND COMMUNICATION
taxation, health, education and social, regulatory activity, journalism, literature and art,
research, history and statistics, manual data held by public authorities, information available
to the public, disclosures required by law and domestic purposes (Burri and Schar 2016). Thus,
it can be said that public cannot get proper data from many sources as they are protected by other
regulations. However, the main changes bring in the data protection rules are easier access to
personal data, which will be beneficial for the user to get the information how their data are
handled, provision to delete the data in case they want to remove the data, right to have data
portability to the provider and where they intends to give their data (Diker Vanberg and Maunick
2018).
General Data Protection Regulation (GDPR) is also taking action to maintain the
communication with the customers especially for the e-commerce marketers (Gellert and
Gutwirth 2013). The chat system adopted by e-commerce organization analyze the data like
visitor’s location, IP address and company through different software in order to identify whether
or not the person on chat is a returned customer. The chat system also asks of the customer
details like name, email, and address. Wachter et al. (2017) stated that in many cases, company
uses the data on the consent of the users but in many cases, even if the customer do not press the
enter button, the data is saved in their database which then beaches the legislation of the data
protection. The General Data Protection Regulation (GDPR) implements three main steps to
strictly follow in order to gather data and personal information from the users (Goodman and
Flaxman 2016). The first instance is that the organization have a comprehensive privacy policy
set up that includes the details of their authenticity, what kind of data they receive, what are their
business functions and how they utilize the data for accomplishing their business functions
(Diker Vanberg and Maunick 2018). The policy should also define clearly how the customers
taxation, health, education and social, regulatory activity, journalism, literature and art,
research, history and statistics, manual data held by public authorities, information available
to the public, disclosures required by law and domestic purposes (Burri and Schar 2016). Thus,
it can be said that public cannot get proper data from many sources as they are protected by other
regulations. However, the main changes bring in the data protection rules are easier access to
personal data, which will be beneficial for the user to get the information how their data are
handled, provision to delete the data in case they want to remove the data, right to have data
portability to the provider and where they intends to give their data (Diker Vanberg and Maunick
2018).
General Data Protection Regulation (GDPR) is also taking action to maintain the
communication with the customers especially for the e-commerce marketers (Gellert and
Gutwirth 2013). The chat system adopted by e-commerce organization analyze the data like
visitor’s location, IP address and company through different software in order to identify whether
or not the person on chat is a returned customer. The chat system also asks of the customer
details like name, email, and address. Wachter et al. (2017) stated that in many cases, company
uses the data on the consent of the users but in many cases, even if the customer do not press the
enter button, the data is saved in their database which then beaches the legislation of the data
protection. The General Data Protection Regulation (GDPR) implements three main steps to
strictly follow in order to gather data and personal information from the users (Goodman and
Flaxman 2016). The first instance is that the organization have a comprehensive privacy policy
set up that includes the details of their authenticity, what kind of data they receive, what are their
business functions and how they utilize the data for accomplishing their business functions
(Diker Vanberg and Maunick 2018). The policy should also define clearly how the customers
8MEDIA AND COMMUNICATION
can access their details and remove if they do not find any relevance of the saved data with the
information that they have shared with the company. In the second phase, these company need to
have consent system prior to data collection that is the company, also known as data controllers
have to show a permission checkbox in pre-chat surveys and web forms (Goodman and Flaxman
2016). Lastly, the companies have to present a proof that the data they have stored is legal and in
case, the organization on using the cloud technology should select a high security data centre
located in an EU-approved country (Hon et al. 2016). The stored data should also implement the
security protected system like passwords, encryption and firewalls. Moreover, all these three
phases will be implemented by 25 May 2018. It is also imposed by the government that, if any
organization failed to follow these three phases, they have to pay the penalties of 2-4% of their
annual revenues or up to $25 million (The Economic Times 2018). Thus, the planned changes
seem to be safe for protection of the personal data from the users in the live chat support system.
In case of e-mail marketing, problem of e-mail spam has been witnessed and for the same
reason the General Data Protection Regulation (GDPR) implemented span regulations imposed
by the organization to protect their citizens from such unsolicited email (Lynskey 2015). In
Countries like UK, Australia, Germany, Spain and Netherlands, the marketers need to ask for the
consent from the users whether or not they want to take participation in the e-mail survey.
However, in US no consent form has been provided as they follow CAN-SPAM Act through
which the data are protected (Woods 2017).
can access their details and remove if they do not find any relevance of the saved data with the
information that they have shared with the company. In the second phase, these company need to
have consent system prior to data collection that is the company, also known as data controllers
have to show a permission checkbox in pre-chat surveys and web forms (Goodman and Flaxman
2016). Lastly, the companies have to present a proof that the data they have stored is legal and in
case, the organization on using the cloud technology should select a high security data centre
located in an EU-approved country (Hon et al. 2016). The stored data should also implement the
security protected system like passwords, encryption and firewalls. Moreover, all these three
phases will be implemented by 25 May 2018. It is also imposed by the government that, if any
organization failed to follow these three phases, they have to pay the penalties of 2-4% of their
annual revenues or up to $25 million (The Economic Times 2018). Thus, the planned changes
seem to be safe for protection of the personal data from the users in the live chat support system.
In case of e-mail marketing, problem of e-mail spam has been witnessed and for the same
reason the General Data Protection Regulation (GDPR) implemented span regulations imposed
by the organization to protect their citizens from such unsolicited email (Lynskey 2015). In
Countries like UK, Australia, Germany, Spain and Netherlands, the marketers need to ask for the
consent from the users whether or not they want to take participation in the e-mail survey.
However, in US no consent form has been provided as they follow CAN-SPAM Act through
which the data are protected (Woods 2017).
9MEDIA AND COMMUNICATION
Image 1: Consent requirement in case of e-mail marketing
(Source: Woods 2017)
Woods (2017) also highlighted that the e-mail that is sent to the user must contain the
details of the option for unsubscribing, clear identification of the sender, postal address and
information about the contact details of the sender. All these criteria in the e-mail marketing
legislation are followed Germany and Canada. However, UK, US, Netherlands, France and
Spain do not provide the contact details of the sender, which results in authenticity issue of the
sender.
Image 1: Consent requirement in case of e-mail marketing
(Source: Woods 2017)
Woods (2017) also highlighted that the e-mail that is sent to the user must contain the
details of the option for unsubscribing, clear identification of the sender, postal address and
information about the contact details of the sender. All these criteria in the e-mail marketing
legislation are followed Germany and Canada. However, UK, US, Netherlands, France and
Spain do not provide the contact details of the sender, which results in authenticity issue of the
sender.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10MEDIA AND COMMUNICATION
Image 2: Criteria followed by every E-mail marketer
(Source: Woods 2017)
Under the international e-mail law charges a penalty of some cost that has to be paid by
the organization that sends such mails. This penalty is different for different nation and on
breaching this regulation results in closure of their business functions from the government. The
UK government charges the penalty of GBP 500,000, in USA the provider has to give USD
16,000 per e-mail, government of Canada charges up to CAD 10 million, Netherlands charges up
to EUR 450,000, France government charges up to EUR 750 per mail, Australian government
charges up to AUD 1.7 million; while, Italy imposes up to 3 years of imprisonment (Woods
2017). However, Diker Vanberg and Maunick (2018) presented an argument that some
developed countries imposes only small amount of monetary penalties, which might not affect
the provider much and thus, strict rule have to be imposed on breaching the international e-mail
laws.
Image 2: Criteria followed by every E-mail marketer
(Source: Woods 2017)
Under the international e-mail law charges a penalty of some cost that has to be paid by
the organization that sends such mails. This penalty is different for different nation and on
breaching this regulation results in closure of their business functions from the government. The
UK government charges the penalty of GBP 500,000, in USA the provider has to give USD
16,000 per e-mail, government of Canada charges up to CAD 10 million, Netherlands charges up
to EUR 450,000, France government charges up to EUR 750 per mail, Australian government
charges up to AUD 1.7 million; while, Italy imposes up to 3 years of imprisonment (Woods
2017). However, Diker Vanberg and Maunick (2018) presented an argument that some
developed countries imposes only small amount of monetary penalties, which might not affect
the provider much and thus, strict rule have to be imposed on breaching the international e-mail
laws.
11MEDIA AND COMMUNICATION
Research Aim
The research will aim to identify whether the data protection laws in the present era is
enough to protect the rights of the users and consumers. This will highlight the different privacy
protection law and practices in European Union in order to narrow down the scope of the study.
Research Objectives
The research objectives of the study are examining the present privacy protection laws
for digital communication in European Union and to identify the changes in the present privacy
protection laws for digital communication in European Union.
Research questions
What are the present privacy protection laws for digital communication in European
Union?
What are the changes required in the privacy protection laws for digital communication
in European Union?
Research Aim
The research will aim to identify whether the data protection laws in the present era is
enough to protect the rights of the users and consumers. This will highlight the different privacy
protection law and practices in European Union in order to narrow down the scope of the study.
Research Objectives
The research objectives of the study are examining the present privacy protection laws
for digital communication in European Union and to identify the changes in the present privacy
protection laws for digital communication in European Union.
Research questions
What are the present privacy protection laws for digital communication in European
Union?
What are the changes required in the privacy protection laws for digital communication
in European Union?
12MEDIA AND COMMUNICATION
Rationale of research methodology
In this study, qualitative content analysis will be used as it will provide better in depth
answers which can be analyzed to provide relevant findings in the study. The descriptive answers
obtained will address different issues so the issues can be easily identified using the qualitative
content analysis. This will also make the research framework flexible which will assist in
shifting the focus of the study from one specific area to another specific area (Lewis 2015). The
gathered data is based on the human experience so the data collected will be more relevant in this
context. The personal experience of the respondents can be effectively portrayed using the study.
The study will use small sample sizes to reduce the cost so qualitative data analysis is
appropriate.
However, the subjectivity of the qualitative research is one of its biggest problems as
analyzing and mining the data for key facts is tough as very minute details have to be evaluated
which makes the process very time consuming (Alvesson and Sköldberz, 2017). Moreover,
representing the data that has been collected is quite difficult as framing the information into a
database is tough. Moreover, the researchers’ point of view affects the observation when there is
biasness regarding a particular topic. Moreover, reliability in these studies is low due to the
inability of the study to reproduce the same data due to the difference in human perceptions.
Research Methodology
Research methodology is chosen based on the objective and nature of the study. This
study is an applied research where data will be explored to develop relevant findings for the
Rationale of research methodology
In this study, qualitative content analysis will be used as it will provide better in depth
answers which can be analyzed to provide relevant findings in the study. The descriptive answers
obtained will address different issues so the issues can be easily identified using the qualitative
content analysis. This will also make the research framework flexible which will assist in
shifting the focus of the study from one specific area to another specific area (Lewis 2015). The
gathered data is based on the human experience so the data collected will be more relevant in this
context. The personal experience of the respondents can be effectively portrayed using the study.
The study will use small sample sizes to reduce the cost so qualitative data analysis is
appropriate.
However, the subjectivity of the qualitative research is one of its biggest problems as
analyzing and mining the data for key facts is tough as very minute details have to be evaluated
which makes the process very time consuming (Alvesson and Sköldberz, 2017). Moreover,
representing the data that has been collected is quite difficult as framing the information into a
database is tough. Moreover, the researchers’ point of view affects the observation when there is
biasness regarding a particular topic. Moreover, reliability in these studies is low due to the
inability of the study to reproduce the same data due to the difference in human perceptions.
Research Methodology
Research methodology is chosen based on the objective and nature of the study. This
study is an applied research where data will be explored to develop relevant findings for the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13MEDIA AND COMMUNICATION
study (Flick 2015). The study has used mono method where only a single research design has
been used to develop effective research findings.
In this study, positivism is the chosen research methodology which will consist of
secondary analysis of data by collecting data from journals, articles and websites. Positivism is
objective in nature and will include human element (Silverman 2016). Social construction can
only be used to gain access in this research philosophy. Therefore, diverse approaches are
clubbed together such as hermeneutics, phenomenology and constructivism to apply the
subjective view.
In this study, inductive approach will be used to developed new theories and frameworks
for solving the identified problem (Smith 2015). In this approach, the theories are based on the
observations made in the study by exploring different data in the articles.
Research design describes the methods that will be used for data collection and
interpretation. There are generally two research designs and they are exploratory and conclusive.
In this study, exploratory research design will be used where different data will be explored to
draw relevant conclusion (Humphries 2017).
In this study, primary data will be collected by conducting pilot testing which will consist
of developing open ended questionnaire for the study. The patterns from the answers of the
respondents will be evaluated to develop relevant findings (Lu and Wang 2017). The open ended
questionnaire is used for the respondents that have considerable amount of knowledge in this
field.
Sampling is a method where sample population is chosen from the total available
population to reduce the complexity of the study. In this study, non probabilistic sampling has
study (Flick 2015). The study has used mono method where only a single research design has
been used to develop effective research findings.
In this study, positivism is the chosen research methodology which will consist of
secondary analysis of data by collecting data from journals, articles and websites. Positivism is
objective in nature and will include human element (Silverman 2016). Social construction can
only be used to gain access in this research philosophy. Therefore, diverse approaches are
clubbed together such as hermeneutics, phenomenology and constructivism to apply the
subjective view.
In this study, inductive approach will be used to developed new theories and frameworks
for solving the identified problem (Smith 2015). In this approach, the theories are based on the
observations made in the study by exploring different data in the articles.
Research design describes the methods that will be used for data collection and
interpretation. There are generally two research designs and they are exploratory and conclusive.
In this study, exploratory research design will be used where different data will be explored to
draw relevant conclusion (Humphries 2017).
In this study, primary data will be collected by conducting pilot testing which will consist
of developing open ended questionnaire for the study. The patterns from the answers of the
respondents will be evaluated to develop relevant findings (Lu and Wang 2017). The open ended
questionnaire is used for the respondents that have considerable amount of knowledge in this
field.
Sampling is a method where sample population is chosen from the total available
population to reduce the complexity of the study. In this study, non probabilistic sampling has
14MEDIA AND COMMUNICATION
been chosen where initially 10 respondents were selected. However, non probabilistic sampling
has been used to reduce the sample size to 5 respondents and these respondents will represent the
overall sample (Fraley and Hudson 2014). These respondents are all cyber security experts
working for different companies in United Kingdom such as Clearswift, Sophos and British
Telecom.
Reliability is the ability of the study to reproduce similar result using different data in
same or different study. It is essential to maintain a high reliability in the study for obtaining
better results. In this study, test rated reliability has been implemented to check whether similar
answers are derived using different respondents or not (LoBiondo-Wood and Haber 2014). The
study has used construct validity to examine whether all the prescribed methodology has been
followed or not.
Research ethics have been maintained in the study where authentic journals and articles
have been used to evaluate the research topic (Resnik 2015). Moreover, the data provided in the
study is not subjected to plagiarism and none of the findings in the study has been manipulated to
obtain the desired result.
been chosen where initially 10 respondents were selected. However, non probabilistic sampling
has been used to reduce the sample size to 5 respondents and these respondents will represent the
overall sample (Fraley and Hudson 2014). These respondents are all cyber security experts
working for different companies in United Kingdom such as Clearswift, Sophos and British
Telecom.
Reliability is the ability of the study to reproduce similar result using different data in
same or different study. It is essential to maintain a high reliability in the study for obtaining
better results. In this study, test rated reliability has been implemented to check whether similar
answers are derived using different respondents or not (LoBiondo-Wood and Haber 2014). The
study has used construct validity to examine whether all the prescribed methodology has been
followed or not.
Research ethics have been maintained in the study where authentic journals and articles
have been used to evaluate the research topic (Resnik 2015). Moreover, the data provided in the
study is not subjected to plagiarism and none of the findings in the study has been manipulated to
obtain the desired result.
15MEDIA AND COMMUNICATION
Findings and Analysis
Content Analysis
Question Comment Count
What perception do you have
about the privacy protection
laws in European Union?
“The privacy laws are sufficient
and the new amendments will
facilitate in both cross border and
national communication laws”
“The privacy laws are not
sufficient and a major change is
required”
2
3
What are the challenges you
have faced while
communicating on the online
medium?
I have faced challenges like
unwanted pop ups and websites
which keep track of my data
I don’t feel safe while using the
online platform and I use
advertisements blockers to
protect my privacy information.
Moreover, I use software to hide
by location and IP address as
there are many sites accessing
my location and other crucial
2
3
Findings and Analysis
Content Analysis
Question Comment Count
What perception do you have
about the privacy protection
laws in European Union?
“The privacy laws are sufficient
and the new amendments will
facilitate in both cross border and
national communication laws”
“The privacy laws are not
sufficient and a major change is
required”
2
3
What are the challenges you
have faced while
communicating on the online
medium?
I have faced challenges like
unwanted pop ups and websites
which keep track of my data
I don’t feel safe while using the
online platform and I use
advertisements blockers to
protect my privacy information.
Moreover, I use software to hide
by location and IP address as
there are many sites accessing
my location and other crucial
2
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16MEDIA AND COMMUNICATION
details.
What measures do you take
while shopping on online
platforms?
I do not take measures while
shopping on online platform as I
buy products from trusted
websites
I do not share any personal data
on the online platform and I
prefer using cash on delivery as
the mode of payment in most of
the occasions so that I do not
have shared my personal details.
1
4
Discussion
The majority of the respondents feel that there are not secure while communicating on the
online medium and they do not think that the privacy laws are enough to protect the online users.
This is the very reason that they resort to measures to ensure that their privacy has been
protected. They use the online medium cautiously such as advertisement blockers and other pops
which extract information about the consumers and users. Moreover, the buying behaviour of the
consumers has already changing where they prefer to buy products with cash payments. They
prefer using encrypted applications for chatting instead of suing normal chat options. These
shows that the privacy protection laws require further upgradation due to the changing nature of
technology.
details.
What measures do you take
while shopping on online
platforms?
I do not take measures while
shopping on online platform as I
buy products from trusted
websites
I do not share any personal data
on the online platform and I
prefer using cash on delivery as
the mode of payment in most of
the occasions so that I do not
have shared my personal details.
1
4
Discussion
The majority of the respondents feel that there are not secure while communicating on the
online medium and they do not think that the privacy laws are enough to protect the online users.
This is the very reason that they resort to measures to ensure that their privacy has been
protected. They use the online medium cautiously such as advertisement blockers and other pops
which extract information about the consumers and users. Moreover, the buying behaviour of the
consumers has already changing where they prefer to buy products with cash payments. They
prefer using encrypted applications for chatting instead of suing normal chat options. These
shows that the privacy protection laws require further upgradation due to the changing nature of
technology.
17MEDIA AND COMMUNICATION
The result from the study shows that there have been improvements in the privacy policy
in all aspects where there has been increase in consistency and independency of the laws where
the authorities can effectively provide assistance in privacy issues. However, the rules and
regulations are still not clear and consistent throughout. Lack of consistency and unambiguity is
a specific issue GDPR and privacy shield will face especially for those countries where the data
protection laws have not yet been updated.
Conclusion
The technological companies from different parts of the world will be able to gain access
to personal data which shows the vagueness and lack of transparency is a major problem.
However, the new data protection law such as the GDPR and Privacy shield will have a positive
affect on the privacy policies of the organization. European have been instrumental in
addressing all the issues faced by the individuals on the online platform where all the websites in
Europe will be considered under the data protection law of EU irrespective of the origin of the
website and the company.
However, this is just a ground work for the organizations as with the advancement in the
field of technology significant areas grey areas will have to be addressed. Therefore, laws will
have to be changed and interpreted depending upon the changing nature of the online platform.
Therefore, it cannot be said that the current laws are sufficient to provide protection to the users
on the online platform as significant grey still remain due to lack of borders on the online
platform.
The result from the study shows that there have been improvements in the privacy policy
in all aspects where there has been increase in consistency and independency of the laws where
the authorities can effectively provide assistance in privacy issues. However, the rules and
regulations are still not clear and consistent throughout. Lack of consistency and unambiguity is
a specific issue GDPR and privacy shield will face especially for those countries where the data
protection laws have not yet been updated.
Conclusion
The technological companies from different parts of the world will be able to gain access
to personal data which shows the vagueness and lack of transparency is a major problem.
However, the new data protection law such as the GDPR and Privacy shield will have a positive
affect on the privacy policies of the organization. European have been instrumental in
addressing all the issues faced by the individuals on the online platform where all the websites in
Europe will be considered under the data protection law of EU irrespective of the origin of the
website and the company.
However, this is just a ground work for the organizations as with the advancement in the
field of technology significant areas grey areas will have to be addressed. Therefore, laws will
have to be changed and interpreted depending upon the changing nature of the online platform.
Therefore, it cannot be said that the current laws are sufficient to provide protection to the users
on the online platform as significant grey still remain due to lack of borders on the online
platform.
18MEDIA AND COMMUNICATION
References
Alvesson, M. and Sköldberg, K., 2017. Reflexive methodology: New vistas for qualitative
research. Sage.
Burri, M. and Schar, R., 2016. The Reform of the EU Data Protection Framework. Journal of
Information, 6.
Burri, M. and Schär, R., 2016. The reform of the EU data protection framework: outlining key
changes and assessing their fitness for a data-driven economy. Journal of Information
Policy, 6(1), pp.479-511.
Diker Vanberg, A. and Maunick, M., 2018. Data protection in the UK post-Brexit: the only
certainty is uncertainty. International Review of Law, Computers & Technology, 32(1), pp.190-
206.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Fraley, R.C. and Hudson, N.W., 2014. Review of intensive longitudinal methods: an introduction
to diary and experience sampling research.
Gellert, R. and Gutwirth, S., 2013. The legal construction of privacy and data
protection. Computer Law & Security Review, 29(5), pp.522-530.
Goodman, B. and Flaxman, S., 2016. European Union regulations on algorithmic decision-
making and a" right to explanation". arXiv preprint arXiv:1606.08813.
Hoel, T. and Chen, W., 2016. Implications of the European data protection regulations for
learning analytics design. In Workshop paper accepted for presentation at The International
Workshop on Learning Analytics and Educational Data Mining (LAEDM 2016) in conjunction
References
Alvesson, M. and Sköldberg, K., 2017. Reflexive methodology: New vistas for qualitative
research. Sage.
Burri, M. and Schar, R., 2016. The Reform of the EU Data Protection Framework. Journal of
Information, 6.
Burri, M. and Schär, R., 2016. The reform of the EU data protection framework: outlining key
changes and assessing their fitness for a data-driven economy. Journal of Information
Policy, 6(1), pp.479-511.
Diker Vanberg, A. and Maunick, M., 2018. Data protection in the UK post-Brexit: the only
certainty is uncertainty. International Review of Law, Computers & Technology, 32(1), pp.190-
206.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Fraley, R.C. and Hudson, N.W., 2014. Review of intensive longitudinal methods: an introduction
to diary and experience sampling research.
Gellert, R. and Gutwirth, S., 2013. The legal construction of privacy and data
protection. Computer Law & Security Review, 29(5), pp.522-530.
Goodman, B. and Flaxman, S., 2016. European Union regulations on algorithmic decision-
making and a" right to explanation". arXiv preprint arXiv:1606.08813.
Hoel, T. and Chen, W., 2016. Implications of the European data protection regulations for
learning analytics design. In Workshop paper accepted for presentation at The International
Workshop on Learning Analytics and Educational Data Mining (LAEDM 2016) in conjunction
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19MEDIA AND COMMUNICATION
with the International Conference on Collaboration Technologies (CollabTech 2016),
Kanazawa, Japan-September (pp. 14-16).
Hon, W.K., Millard, C., Singh, J., Walden, I. and Crowcroft, J., 2016. Policy, legal and
regulatory implications of a Europe-only cloud. International Journal of Law and Information
Technology, 24(3), pp.251-278.
Hornung, G., 2012. A General Data Protection Regulation for Europe: Light and Shade in the
Commission's Draft of 25 January 2012. SCRIPTed, 9, p.64.
Humphries, B., 2017. Re-thinking social research: anti-discriminatory approaches in research
methodology. Taylor & Francis.
Kerber, W., 2016. Digital markets, data, and privacy: competition law, consumer law and data
protection. Journal of Intellectual Property Law & Practice, 11(11), pp.856-866.
Legislation.gov.uk., 2018., Data Retention and Investigatory Powers Act 2014. [online]
Available at: http://www.legislation.gov.uk/ukpga/2014/27/pdfs/ukpga_20140027_en.pdf
[Accessed 26 Apr. 2018].
Legislation.gov.uk., 2018., Electric Communication- The Privacy and Electronic
Communications (EC Directive) Regulations 2003. [online] Available at:
http://www.legislation.gov.uk/uksi/2003/2426/pdfs/uksi_20032426_en.pdf [Accessed 26 Apr.
2018].
Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five
approaches. Health promotion practice, 16(4), pp.473-475.
with the International Conference on Collaboration Technologies (CollabTech 2016),
Kanazawa, Japan-September (pp. 14-16).
Hon, W.K., Millard, C., Singh, J., Walden, I. and Crowcroft, J., 2016. Policy, legal and
regulatory implications of a Europe-only cloud. International Journal of Law and Information
Technology, 24(3), pp.251-278.
Hornung, G., 2012. A General Data Protection Regulation for Europe: Light and Shade in the
Commission's Draft of 25 January 2012. SCRIPTed, 9, p.64.
Humphries, B., 2017. Re-thinking social research: anti-discriminatory approaches in research
methodology. Taylor & Francis.
Kerber, W., 2016. Digital markets, data, and privacy: competition law, consumer law and data
protection. Journal of Intellectual Property Law & Practice, 11(11), pp.856-866.
Legislation.gov.uk., 2018., Data Retention and Investigatory Powers Act 2014. [online]
Available at: http://www.legislation.gov.uk/ukpga/2014/27/pdfs/ukpga_20140027_en.pdf
[Accessed 26 Apr. 2018].
Legislation.gov.uk., 2018., Electric Communication- The Privacy and Electronic
Communications (EC Directive) Regulations 2003. [online] Available at:
http://www.legislation.gov.uk/uksi/2003/2426/pdfs/uksi_20032426_en.pdf [Accessed 26 Apr.
2018].
Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five
approaches. Health promotion practice, 16(4), pp.473-475.
20MEDIA AND COMMUNICATION
LoBiondo-Wood, G. and Haber, J., 2014. Reliability and validity. Nursing research-ebook:
Methods and critical appraisal for evidencebased practice. Missouri: Elsevier Mosby, pp.289-
309.
Lu, B. and Wang, S., 2017. Data Collection and Analysis. In Container Port Production and
Management (pp. 31-71). Springer, Singapore.
Lynskey, O., 2015. The foundations of EU data protection law. Oxford University Press.
Montgomery, K.C. and Chester, J., 2015. Data Protection for Youth in the Digital Age. Eur.
Data Prot. L. Rev., 1, p.277.
Resnik, D.B., 2015, December. What is ethics in research & why is it imp
Silverman, D. ed., 2016. Qualitative research. Sage.
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
The Economic Times., 2018. Europe's data protection law may have severe implications for
India’s IT industry. [online] Available at:
https://economictimes.indiatimes.com/tech/internet/europes-data-protection-law-may-have-
severe-implications-for-indias-it-industry/articleshow/63741020.cms [Accessed 26 Apr. 2018].
Theguardian.com., 2018. High court rules data retention and surveillance legislation unlawful.
[online] Available at: https://www.theguardian.com/world/2015/jul/17/data-retention-and-
surveillance-legislation-ruled-unlawful [Accessed 26 Apr. 2018].
Wachter, S., Mittelstadt, B. and Floridi, L., 2017. Why a right to explanation of automated
decision-making does not exist in the general data protection regulation. International Data
Privacy Law, 7(2), pp.76-99.
LoBiondo-Wood, G. and Haber, J., 2014. Reliability and validity. Nursing research-ebook:
Methods and critical appraisal for evidencebased practice. Missouri: Elsevier Mosby, pp.289-
309.
Lu, B. and Wang, S., 2017. Data Collection and Analysis. In Container Port Production and
Management (pp. 31-71). Springer, Singapore.
Lynskey, O., 2015. The foundations of EU data protection law. Oxford University Press.
Montgomery, K.C. and Chester, J., 2015. Data Protection for Youth in the Digital Age. Eur.
Data Prot. L. Rev., 1, p.277.
Resnik, D.B., 2015, December. What is ethics in research & why is it imp
Silverman, D. ed., 2016. Qualitative research. Sage.
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods. Sage.
The Economic Times., 2018. Europe's data protection law may have severe implications for
India’s IT industry. [online] Available at:
https://economictimes.indiatimes.com/tech/internet/europes-data-protection-law-may-have-
severe-implications-for-indias-it-industry/articleshow/63741020.cms [Accessed 26 Apr. 2018].
Theguardian.com., 2018. High court rules data retention and surveillance legislation unlawful.
[online] Available at: https://www.theguardian.com/world/2015/jul/17/data-retention-and-
surveillance-legislation-ruled-unlawful [Accessed 26 Apr. 2018].
Wachter, S., Mittelstadt, B. and Floridi, L., 2017. Why a right to explanation of automated
decision-making does not exist in the general data protection regulation. International Data
Privacy Law, 7(2), pp.76-99.
21MEDIA AND COMMUNICATION
Woods, L., 2017. Automated Number Plate Recognition: Data Retention and the Protection of
Privacy in Public Places. Journal of Information Rights, Policy and Practice, 2(1).
Woods, L., 2017. Automated Number Plate Recognition: Data Retention and the Protection of
Privacy in Public Places. Journal of Information Rights, Policy and Practice, 2(1).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22MEDIA AND COMMUNICATION
Appendix
1. What perception do you have about the privacy protection laws in European Union?
2. What are the challenges you have faced while communicating on the online medium?
3. What measures do you take while shopping on online platforms?
Appendix
1. What perception do you have about the privacy protection laws in European Union?
2. What are the challenges you have faced while communicating on the online medium?
3. What measures do you take while shopping on online platforms?
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.