Reference Hub3
Creepy Technologies and the Privacy Issues of Invasive Technologies

Creepy Technologies and the Privacy Issues of Invasive Technologies

Rochell R. McWhorter, Elisabeth E. Bennett
ISBN13: 9781799829140|ISBN10: 1799829146|ISBN13 Softcover: 9781799829157|EISBN13: 9781799829164
DOI: 10.4018/978-1-7998-2914-0.ch010
Cite Chapter Cite Chapter

MLA

McWhorter, Rochell R., and Elisabeth E. Bennett. "Creepy Technologies and the Privacy Issues of Invasive Technologies." Disruptive and Emerging Technology Trends Across Education and the Workplace, edited by Julie Anne Delello and Rochell R. McWhorter, IGI Global, 2020, pp. 243-268. https://doi.org/10.4018/978-1-7998-2914-0.ch010

APA

McWhorter, R. R. & Bennett, E. E. (2020). Creepy Technologies and the Privacy Issues of Invasive Technologies. In J. Delello & R. McWhorter (Eds.), Disruptive and Emerging Technology Trends Across Education and the Workplace (pp. 243-268). IGI Global. https://doi.org/10.4018/978-1-7998-2914-0.ch010

Chicago

McWhorter, Rochell R., and Elisabeth E. Bennett. "Creepy Technologies and the Privacy Issues of Invasive Technologies." In Disruptive and Emerging Technology Trends Across Education and the Workplace, edited by Julie Anne Delello and Rochell R. McWhorter, 243-268. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2914-0.ch010

Export Reference

Mendeley
Favorite

Abstract

Technology has become increasingly invasive and corporate networks are expanding into public and private spaces to collect unprecedented data and provide new services such as artificial intelligence and through unsettling human-like personas. The term “creepy technology” is appearing in the literature along with concerns for privacy, ethical boundaries, cybersecurity, and mistaken identity but is also in news articles to inform the public about technology advances that affect consumer privacy. Invasive technology provides the impetus for external adaptation for many organizations and current trends require rapid adaption to potential threats to security. Also, usability addresses how users respond and adapt to new technology. This chapter includes the presentation of an exploratory study of how the public responded to various technology announcements (N=689 responses) and results indicated a significant response to invasive technologies and some sense of freedom to opine. This chapter also provides discussion of interventions that are critical to both public and private sectors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.