𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Users' Perspective on Regulation to Protect Privacy on the Web

✍ Scribed by BYUNG LEE


Book ID
102574062
Publisher
Elsevier Science
Year
2000
Tongue
English
Weight
208 KB
Volume
32
Category
Article
ISSN
1057-2317

No coin nor oath required. For personal study only.

✦ Synopsis


This research employed Q methodology to examine how much privacy the public wants and what regulation it wants to impose on on-line companies. Respondents were 23 adults who sorted 40 Q-sample statements. Results revealed three factors or types: ''absolute privacy advocates'', ''consumer ¢rst advocates'' and ''objective privacy advocates'' . The three types shared some viewpoints: All strongly agreed that consumers deserve notice and choice when a company uses personal information on themselves, even after they provide personal information for the company. Beyond this overlap, they had their own traits. Absolute privacy advocates believed in absolute privacy protection. They also understood power of on-line technology and were suspicious of companies selling data without considering consumer's bene¢ts, but still did not want to regulate the private sector. Consumer ¢rst advocates were interested in consumer protection of privacy while ignoring companies' need to collect data on consumers. Objective privacy advocates wanted to restrict a company in its use of personal data while acknowledging the company's need to collect personal data. Who should be an on-line privacy regulator didn't seem to be a salient issue to the adult groups yet. Direct government intervention or legislation as a privacy protection method did not register strongly with the three groups. Ages and occupations seemed to be no type determiner. But when it comes to online purchasing experience, consumer ¢rst advocates and objective privacy advocates seemed to do more on-line shopping than absolute privacy advocates.


📜 SIMILAR VOLUMES


Influence of the Privacy Bird® user agen
✍ Kim-Phuong L. Vu; Vanessa Chambers; Beth Creekmur; Dongbin Cho; Robert W. Procto 📂 Article 📅 2010 🏛 Elsevier Science 🌐 English ⚖ 351 KB

The success of an organization is often dependent on the trust of its clients and customers. Consumer trust usually revolves around issues of securing information that consumers provide and maintaining privacy protection. Privacy has the potential to be violated any time that personal information is

An SD system based on SD label distribut
✍ Toshinari Suematsu; Hideki Imai 📂 Article 📅 2000 🏛 John Wiley and Sons 🌐 English ⚖ 142 KB

In the superdistribution system proposed at present, the superdistribution label is attached to the superdistribution software that is interpreted by the superdistribution label leader for billing. In this system, system common key is used for security coding the superdistribution label for protecti

Using lessons from health care to protec
✍ Scott Nicholson; Catherine Arnott Smith 📂 Article 📅 2007 🏛 John Wiley and Sons 🌐 English ⚖ 239 KB 👁 3 views

## Abstract Although libraries have employed policies to protect the data about use of their services, these policies are rarely specific or standardized. Since 1996, the U.S. health care system has been grappling with the Health Insurance Portability and Accountability Act (HIPAA; Health Insurance

Using lessons from health care to protec
✍ Scott Nicholson; Catherine Arnott Smith 📂 Article 📅 2006 🏛 Wiley (John Wiley & Sons) 🌐 English ⚖ 48 KB

## Abstract While libraries have employed policies to protect the data about use of their services, these policies are rarely specific or standardized. Since 1996 the U.S. healthcare system has been grappling with the Health Insurance Portability and Accountability Act (HIPAA), which is designed to