The success of an organization is often dependent on the trust of its clients and customers. Consumer trust usually revolves around issues of securing information that consumers provide and maintaining privacy protection. Privacy has the potential to be violated any time that personal information is
Users' Perspective on Regulation to Protect Privacy on the Web
✍ Scribed by BYUNG LEE
- Book ID
- 102574062
- Publisher
- Elsevier Science
- Year
- 2000
- Tongue
- English
- Weight
- 208 KB
- Volume
- 32
- Category
- Article
- ISSN
- 1057-2317
No coin nor oath required. For personal study only.
✦ Synopsis
This research employed Q methodology to examine how much privacy the public wants and what regulation it wants to impose on on-line companies. Respondents were 23 adults who sorted 40 Q-sample statements. Results revealed three factors or types: ''absolute privacy advocates'', ''consumer ¢rst advocates'' and ''objective privacy advocates'' . The three types shared some viewpoints: All strongly agreed that consumers deserve notice and choice when a company uses personal information on themselves, even after they provide personal information for the company. Beyond this overlap, they had their own traits. Absolute privacy advocates believed in absolute privacy protection. They also understood power of on-line technology and were suspicious of companies selling data without considering consumer's bene¢ts, but still did not want to regulate the private sector. Consumer ¢rst advocates were interested in consumer protection of privacy while ignoring companies' need to collect data on consumers. Objective privacy advocates wanted to restrict a company in its use of personal data while acknowledging the company's need to collect personal data. Who should be an on-line privacy regulator didn't seem to be a salient issue to the adult groups yet. Direct government intervention or legislation as a privacy protection method did not register strongly with the three groups. Ages and occupations seemed to be no type determiner. But when it comes to online purchasing experience, consumer ¢rst advocates and objective privacy advocates seemed to do more on-line shopping than absolute privacy advocates.
📜 SIMILAR VOLUMES
In the superdistribution system proposed at present, the superdistribution label is attached to the superdistribution software that is interpreted by the superdistribution label leader for billing. In this system, system common key is used for security coding the superdistribution label for protecti
## Abstract Although libraries have employed policies to protect the data about use of their services, these policies are rarely specific or standardized. Since 1996, the U.S. health care system has been grappling with the Health Insurance Portability and Accountability Act (HIPAA; Health Insurance
## Abstract While libraries have employed policies to protect the data about use of their services, these policies are rarely specific or standardized. Since 1996 the U.S. healthcare system has been grappling with the Health Insurance Portability and Accountability Act (HIPAA), which is designed to