IDEAS home Printed from https://ideas.repec.org/a/kap/jbuset/v179y2022i1d10.1007_s10551-021-04747-x.html
   My bibliography  Save this article

Could You Ever Forget Me? Why People Want to be Forgotten Online

Author

Listed:
  • Chanhee Kwak

    (Kangnam University)

  • Junyeong Lee

    (Korea University of Technology and Education)

  • Heeseok Lee

    (Korea Advanced Institute of Science and Technology)

Abstract

The concept of people’s memory maintains the finiteness of time and capacity. However, with the advancement in technology, the amount of storage memory a person can use has increased dramatically. Given that digital traces can hardly be erased or forgotten, individuals have begun to express their desire to be forgotten in the digital world, and governments and academia are considering methods to fulfill such wishes. Capturing the difficulties in terms of a cultural lag between technological advancements and regulations on individuals’ data privacy needs, we identify six motives for individuals wishing to be forgotten online and investigate its expected effects on online content generation through a qualitative content analysis of 222 responses from open-ended surveys in Korea. Our findings provide implications for the literature on individual privacy and the right to be forgotten employing the cultural lag, as well as, elaborate further on the relationship between being forgotten online and the legitimacy of such requests of individuals. Additionally, implications for data providers, data controllers/processors, and governments to address this lag and build a balanced system of personal information are provided.

Suggested Citation

  • Chanhee Kwak & Junyeong Lee & Heeseok Lee, 2022. "Could You Ever Forget Me? Why People Want to be Forgotten Online," Journal of Business Ethics, Springer, vol. 179(1), pages 25-42, August.
  • Handle: RePEc:kap:jbuset:v:179:y:2022:i:1:d:10.1007_s10551-021-04747-x
    DOI: 10.1007/s10551-021-04747-x
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10551-021-04747-x
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10551-021-04747-x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Godwin Udo & Kallol Bagchi & Moutusy Maity, 2016. "Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture," Journal of Business Ethics, Springer, vol. 135(3), pages 517-541, May.
    2. Ambrose, Meg Leta, 2014. "Speaking of forgetting: Analysis of possible non-EU responses to the right to be forgotten and speech exception," Telecommunications Policy, Elsevier, vol. 38(8), pages 800-811.
    3. Jon Hartwick & Henri Barki, 1994. "Explaining the Role of User Participation in Information System Use," Management Science, INFORMS, vol. 40(4), pages 440-465, April.
    4. Kirsten Martin, 2016. "Understanding Privacy Online: Development of a Social Contract Approach to Privacy," Journal of Business Ethics, Springer, vol. 137(3), pages 551-569, September.
    5. David Wasieleski & Jeffrey Roberts, 2012. "Moral Reasoning in Computer-Based Task Environments: Exploring the Interplay between Cognitive and Technological Factors on Individuals’ Propensity to Break Rules," Post-Print hal-01514781, HAL.
    6. Daniel Nunan & Marialaura Di Domenico, 2017. "Big Data: A Normal Accident Waiting to Happen?," Journal of Business Ethics, Springer, vol. 145(3), pages 481-491, October.
    7. Ali Ünal & Danielle Warren & Chao Chen, 2012. "The Normative Foundations of Unethical Supervision in Organizations," Journal of Business Ethics, Springer, vol. 107(1), pages 5-19, April.
    8. Sandra J. Milberg & H. Jeff Smith & Sandra J. Burke, 2000. "Information Privacy: Corporate Management and National Regulation," Organization Science, INFORMS, vol. 11(1), pages 35-57, February.
    9. Garcia-Murillo, Martha & MacInnes, Ian, 2018. "Così fan tutte: A better approach than the right to be forgotten," Telecommunications Policy, Elsevier, vol. 42(3), pages 227-240.
    10. Jeffrey Roberts & David Wasieleski, 2012. "Moral Reasoning in Computer-Based Task Environments: Exploring the Interplay between Cognitive and Technological Factors on Individuals’ Propensity to Break Rules," Journal of Business Ethics, Springer, vol. 110(3), pages 355-376, October.
    11. Tamara Dinev & Massimo Bellotto & Paul Hart & Vincenzo Russo & Ilaria Serra, 2006. "Internet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States," Journal of Global Information Management (JGIM), IGI Global, vol. 14(4), pages 57-93, October.
    12. Godwin Udo & Kallol Bagchi & Moutusy Maity, 2016. "Erratum to: Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture," Journal of Business Ethics, Springer, vol. 135(3), pages 605-605, May.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kresimir Zigic & Jiri Strelicky & Michal Kunin, 2020. "Private and Public IPR Protection in a Vertically Differentiated Software Duopoly," CERGE-EI Working Papers wp671, The Center for Economic Research and Graduate Education - Economics Institute, Prague.
    2. Dan Wu & Guofang Nan & Minqiang Li, 2020. "Optimal Piracy Control: Should a Firm Implement Digital Rights Management?," Information Systems Frontiers, Springer, vol. 22(4), pages 947-960, August.
    3. Andrea North-Samardzic, 2020. "Biometric Technology and Ethics: Beyond Security Applications," Journal of Business Ethics, Springer, vol. 167(3), pages 433-450, December.
    4. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong, 2021. "Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective," Journal of Business Ethics, Springer, vol. 168(3), pages 539-564, January.
    5. Ahmad, Wasim & Kim, Woo Gon & Choi, Hyung-Min & Haq, Junaid Ul, 2021. "Modeling behavioral intention to use travel reservation apps: A cross-cultural examination between US and China," Journal of Retailing and Consumer Services, Elsevier, vol. 63(C).
    6. José Roberto Díaz-Reza & Jorge Luis García-Alcaraz & José Roberto Mendoza-Fong & Valeria Martínez-Loya & Emilio Jiménez Macías & Julio Blanco-Fernández, 2017. "Interrelations among SMED Stages: A Causal Model," Complexity, Hindawi, vol. 2017, pages 1-10, August.
    7. Shalini Sarin Jain & Joon Sung Lee, 2022. "Allegations of Sexual Misconduct: A View from the Observation Deck of Power Distance Belief," Journal of Business Ethics, Springer, vol. 175(2), pages 391-410, January.
    8. Kos Koklic, Mateja & Kukar-Kinney, Monika & Vida, Irena, 2022. "Consumers’ de-ownership as a predictor of dark-side digital acquisition behavior: Moderating role of moral intensity and collectivism," Journal of Business Research, Elsevier, vol. 138(C), pages 108-116.
    9. Žigić, Krešimir & Střelický, Jiří & Kúnin, Michael, 2023. "Copyright and firms’ own IPR protection in a software market: Monopoly versus duopoly," Economic Modelling, Elsevier, vol. 123(C).
    10. He, Ke & Zhang, Junbiao & Zeng, Yangmei, 2018. "Rural households' willingness to accept compensation for energy utilization of crop straw in China," Energy, Elsevier, vol. 165(PA), pages 562-571.
    11. Janne O. Y. Chung & Sylvia H. Hsu, 2017. "The Effect of Cognitive Moral Development on Honesty in Managerial Reporting," Journal of Business Ethics, Springer, vol. 145(3), pages 563-575, October.
    12. Malgorzata Ciesielska & Dariusz Jemielniak, 2022. "Fairness in digital sharing legal professional attitudes toward digital piracy and digital commons," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 899-912, July.
    13. Omar S. Itani & Fernando Jaramillo & Larry Chonko, 2019. "Achieving Top Performance While Building Collegiality in Sales: It All Starts with Ethics," Journal of Business Ethics, Springer, vol. 156(2), pages 417-438, May.
    14. Hwang, ShinYoung & Kim Seongcheol, 2017. "What triggers the use of mIM service provider’s sequel O2O service extensions?," 14th ITS Asia-Pacific Regional Conference, Kyoto 2017: Mapping ICT into Transformation for the Next Information Society 168494, International Telecommunications Society (ITS).
    15. Anthony Simonofski & Estefanía Serral Asensio & Johannes Smedt & Monique Snoeck, 2019. "Hearing the Voice of Citizens in Smart City Design: The CitiVoice Framework," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 61(6), pages 665-678, December.
    16. Jongwoo Kim & Richard L. Baskerville & Yi Ding, 2020. "Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online," Information Systems Frontiers, Springer, vol. 22(1), pages 171-185, February.
    17. Vishal K. Gupta & Suman Niranjan & Banu A. Goktan & John Eriskon, 2016. "Individual entrepreneurial orientation role in shaping reactions to new technologies," International Entrepreneurship and Management Journal, Springer, vol. 12(4), pages 935-961, December.
    18. Wang, Guoqiang & Tan, Garry Wei-Han & Yuan, Yunpeng & Ooi, Keng-Boon & Dwivedi, Yogesh K., 2022. "Revisiting TAM2 in behavioral targeting advertising: A deep learning-based dual-stage SEM-ANN analysis," Technological Forecasting and Social Change, Elsevier, vol. 175(C).
    19. Wang, Lu-Yao & Hu, Hai-Hua & Wang, Le & Qin, Jian-Qun, 2022. "Privacy assurances and social sharing in social commerce: The mediating role of threat-coping appraisals," Journal of Retailing and Consumer Services, Elsevier, vol. 67(C).
    20. Samuel Hunter, 2012. "(Un)Ethical Leadership and Identity: What Did We Learn and Where Do We Go from Here?," Journal of Business Ethics, Springer, vol. 107(1), pages 79-87, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:jbuset:v:179:y:2022:i:1:d:10.1007_s10551-021-04747-x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.