Preview

Privacy Protection in Electronic Commerce – a Theoretical Framework

Good Essays
Open Document
Open Document
7913 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Privacy Protection in Electronic Commerce – a Theoretical Framework
Privacy Protection in Electronic Commerce – A Theoretical Framework
Milena Head and Yufei Yuan
Michael G. DeGroote School of Business
McMaster University
Hamilton, Ontario, Canada headm@mcmaster.ca; yuanyuf@mcmaster.ca
Head, M., Yuan, Y. (2001). “Privacy Protection in Electronic Commerce: A Theoretical
Framework”, Human Systems Management, 20, pp.149-160.

Abstract
In this paper, a theoretical framework for privacy protection in electronic commerce is provided. This framework allows us to identify the key players and their interactions in the context of privacy violation and protection. It also helps to discover the responsibilities of the key players and areas for further research.
Keywords: Electronic commerce, Privacy protection, Privacy policy, Privacy Violation,
Self-regulation, Anonymity
Milena M. Head is an assistant professor of management science and information systems in the Michael G. DeGroote School of Business at McMaster University. Her research interests are in topics that relate to electronic commerce and human-computer interaction, including World Wide Web navigation, Web-based agents, electronic commerce intermediaries, online privacy, information retrieval and interface design. She holds a Ph.D. (1998) and a Master of Business Administration (1993) from McMaster
University and a BMath (1991) from the University of Waterloo. She has published in
International Journal of Human-Computer Studies, Interacting with Computers, and has presented articles at several conferences.
Yufei Yuan is a professor of information systems in the Michael G. DeGroote School of
Business at McMaster University. He received his Ph.D. in Computer Information
Systems from the University of Michigan in 1985. His research interests are in the area of matching problems, approximate reasoning with fuzzy logic, decision support in health care, Web-based negotiation support system, electronic commerce and privacy. He has published more than 30



References: [2] P. Benassi, TRUSTe: An Online Privacy Seal Program, Communications of the ACM, February, 42(2), 1999, pp /0399ecom.html, 1999. Payment Systems, Proceedings of the 20th Symposium on Information Theory in the Benelux, Haasrode, Belgium, May 27-28, 1999, pp [6] Coursey, D., Your Privacy: Uncle Sam Isn’t the Real Threat. Here’s Who Is, ZDNet AnchorDesk, January 26, 2001, Users’ Attitudes About Online Privacy, AT&T Labs-Research Technical Report TR 99.4.3, 1999, http://www.research.att.com/library/trs/TRs/99/99.4/99.4/. [8] M.J. Culnan, Georgetown Internet Privacy Survey: Report to the Federal Trade Commission, 1999, http://www.msb.edu/faculty/culnanm/gippshome.html. [9] C. Dembeck, Online Privacy Inside and Out, E-Commerce Times, April 25, 2000, http://www.ecommercetimes.com/news/articles2000/000425-1a.shtml. [11] European Commission, Directive 95/46/EC of the European Parliament, 1999, http://europa.eu.int/eur-lex/en/lif/dat/1995/en_395L0046.html. [12] Federal Trade Commission, Privacy Online: A Report to Congress, 1998, http://www.ftc.gov/reports/privacy3/. [13] Federal Trade Commission, New Rule Will Protect Privacy of Children Online, 1999, http://www.ftc.gov/opa/1999/9910/childfinal.htm. [14] Federal Trade Commission, Final Report of the FTC Advisory Committee on Online Access and Security, May 15, 2000, http://www.ftc.gov/acoas/finalreport.htm. [15] K. Girard, IBM to Pull Web Ads Over Privacy Concerns, CNET News.com, 1999, http://news.cnet.com/news/0-1005-200-340588.html. [17] J. Kornblum, Navy, AOL settle privacy case, CNET News.com, June 12, 1998, http://news.cnet.com/news/0-1005-200-330209.html. Off-Line, PC Magazine, January 19, 2000, http://www.zdnet.com/pcmag/stories/trends/ 0,7607,2423811,00.html. [19] M. McGinity, Surfing Your Turf, Communications of the ACM, April, 43(4), 2000, pp [20] A.L. Nggroni, Privacy and the prying eyes of cyberspace, Mortgage Banking, 60(7), 2000, pp [21] R. O 'Harrow, Jr., Fla. Governor Cancels Sale of Driver 's License Photos to Company, Washington Post, February 2, 1999, [22] Privacy Commissioner of Canada, BillC-6 : A Private Sector Privacy Law, 2000, http://www.privcom.gc.ca/english/02_06_e.htm. [23] J. Reagle, and L.F. Cranor, The Platform for Privacy Preferences, Communications of the ACM, 42(2), 1999, pp [24] E. Turban, J. Lee, D. King, and H.M. Chung, Electronic Commerce: A Managers Perspective, Prentice Hall: NJ, 2000, pp [25] C. Walker, E-mail cleanup: Take a lesson from Microsoft: Clean up your mail files or you could be all washed up, eWEEK, October 26, 1998, [26] H. Wang, M. Lee, and C. Wang, Consumer Privacy Concerns about Internet Marketing, Communications of the ACM, 41(3), 1998, pp

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Podesta, J., USA Patriot Act (n.d.) The Good, the Bad, and the Sunset. Retrieved December 4, 2006 from website http://www.epic.org/privacy/terrorism/usapatriot/…

    • 714 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the past few months new discoveries have been made uncovering the activities of several government agencies. There has been an unearthing of facts that outline the collaboration between several large companies in possession of massive amounts of information concerning the whereabouts and habits of citizens with agencies that intended to analyze this data, these partnerships being PRISM. The most frightening part of these events is not the unconstitutional acts of the government but the response of the citizens. Even with full knowledge of data harvesting and tracking, many choose to simply adopt the philosophy of, “I have nothing to hide, let them read my stuff.” People that follow this channel of thinking are making the mistake of assuming that they know what the government is looking for. What they fail to realize is, is that this attitude directly enables the government to take more and more control. The erosion of civil liberties is something to fear, not because of the idea of an immediate shift, but because those liberties will be gone before a realization of what is happening, and at which point a recourse is no longer on option.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Our phone calls, computer's browsing histories, social security, and zip code numbers are accessible by the government. Cameras record us on the daily, spying on our routines. Always being monitored…

    • 774 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Indivdual Assignment

    • 358 Words
    • 2 Pages

    “Does the massive use of Big Brother surveillance technologies make you feel safer because it can protect you from crime, or less safe because of possible violations of your civil liberties? Will you be more careful now using communication technologies, knowing that anything you type or send electronically could be reconstructed and used to judge your lawfulness or your character?”…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    No, the NSA Does Not Spy on Everyone, Everywhere: Why the National Security Agency’s Data Surveillance Programs are Both Legal and Necessary…

    • 1237 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The World Wide Web was created far enough back for most people not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all the good things it brings, there are some negatives as well. The internet, once a new place of discovery, is now a place of caution with danger lurking around every corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Andrews describes data aggregators as people or companies…

    • 1630 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sheehan, K.B. and Hoy, M.G. (2000), “Dimensions of privacy concern among online consumers”. Journal of Public Policy & Marketing. Vol. 19 No.1. pp 62-73.…

    • 962 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Argument Against NSA

    • 1450 Words
    • 6 Pages

    In 2005, government contractor, Edward J. Snowden, leaked classified documents to the public, revealing a classified government surveillance program headed by our own National Security Agency. This leakage confirmed that the NSA has stolen trillions of U.S. citizens’ emails, phone calls, and other information from both the Internet and our phones. It is understood that the collection and analysis of all information is part of the NSA’s mission to keep the United States safe, however, it’s troubling that our own government has to sneak around us. Regardless of whether or not U.S. citizens’ are committing illegal crimes, we should be concerned that the government and NSA steal our private information without our consent. As the government…

    • 1450 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Kerr, Orin S. “Internet Surveillance Law After the USA Patriot Act: the Big Brother That…

    • 2726 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Reno V. Aclu

    • 1029 Words
    • 5 Pages

    The parties involved were Janet Reno, attorney general (1993-2001) of the United States, which also makes her the head of the U.S. Department of Justice, she is the first woman in this position#, and the American Civil Liberty Union (ACLU). The ACLU is a nonpartisan organization dedicated to preserve and extend the basic rights of the U.S. constitution.#…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Good Essays

    America has become a surveillance society, and we need to find a better balance to protect American civil right. Recent revelations about the National Security Agency’s surveillance programs have triggered diverse responses from the American public. The American Civil Liberties Union has expressed virulent opposition to the government’s alleged privacy intrusions as well as filed a lawsuit over the NSA’s collection of citizens’ telecommunications data. The National Security Agency's mass tracking and collection of Americans' phone call data violates the constitution, has a chilling effect on fourth amendment rights and should be stopped. It has been public information for a decade that the US government secretly, illegally, and unconstitutionally spies on its citizens.…

    • 544 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In today’s electronic age, many employers are faced daunting task of making a legal call when determining if monitoring employee behavior is appropriate at all times. In essence, “Little Brother” is always watching. According to Schulman (2013), Little Brother represents the tremendous capabilities technology as provided for employers to keep track of what their work force is up to. Several programs are available that search e-mails, as well as software to block objectionable websites. The most brazen of manager and supervisors can simply go enter your hard drive and review one’s cookies and history, as well as access any employee’s company e-mail. As much as an employee deletes his/her history, or sends unwanted emails to the recycle bin, much of this information still exists on the company server, and many corporations are willing to pay computer consultants to unearth any desired information.…

    • 1036 Words
    • 5 Pages
    Better Essays
  • Good Essays

    domestic surveillance

    • 842 Words
    • 3 Pages

    Domestic Surveillance (DS) is one of three of the National Security Agency’s intelligence activities. DS involves the collection and warehousing of all domestically-generated information streams. The mission of the Domestic Surveillance Directorate is simple: Collect, process, and store U.S. citizen data for the good of the Nation. The National Security Agency cope with the overload of information in their environment and turn that overload to their strategic advantage. They provide the ability for ubiquitous, secure collaboration both within their agency and through its interactions with various partners. The Natural Security Agency penetrate into the "hard" targets that threaten the nation wherever, whenever, or whomever they may be.…

    • 842 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Henning, A. C., et al. (2010). Government collection of private information: background and issues related to the USA Patriot Act Reauthorization. Retrieved February 23, 2012 from: http://www.fas.org/sgp/crs/intel/R40980.pdf…

    • 1068 Words
    • 5 Pages
    Better Essays