Проблема охорони приватності в Інтернеті: роль конфіденційності, урядового регулювання і технологічних рішень
Назва: (Title) |
Проблема охорони приватності в Інтернеті: роль конфіденційності, урядового регулювання і технологічних рішень |
Інші назви: (Other titles) |
Challenge of guarding online privacy: role of privacy seals, government regulations and technological solutions |
Автори: (Authors) |
Бхасін, Мадан Бхасин, Мадан Bhasin, Madan |
Бібліографічний опис: | Бхасін M. Проблема охорони приватності в Інтернеті: роль конфіденційності, урядового регулювання і технологічних рішень / Мадан Лал Бхасін // Соціально-економічні проблеми і держава. — 2016. — Вип. 2 (15). — С. 85-104. |
Bibliographic description (International): | Bhasin, M. (2016). Challenge of guarding online privacy: role of privacy seals, government regulations and technological solutions. Socìalʹno-ekonomìčnì Problemì ì Deržava. 15 (2), 85-104. |
Дата публікації: (Date of publication) |
31-Жов-2016 |
УДК: (UDC) | 342.9 340.11 |
Ключові слова: (Key words) |
guarding online privacy trust seals government regulation technology-based solutions |
Короткий огляд (реферат): (Short preview) |
The state of privacy in the 21st century is a worldwide concern, given the Internet’s global reach. The privacy violation on the internet is a significant problem and internet users have a right to adequate privacy. New e-business technologies have increased the ability of online merchants to collect, monitor, target, profile, and even sell personal information about consumers to third parties. Governments, business houses and employers collect data and monitor people, but their practices often threaten an individual’s privacy. Because vast amount of data can be collected on the Internet and due to global ramifications, citizens worldwide have expressed concerns over increasing cases of privacy violations. Several privacy groups, all around the world, have joined hands to give a boost to privacy movement. Consumer privacy, therefore, has attracted the widespread attention of regulators across the globe. With the European Directive already in force, “trust seals” and “government regulations” are the two leading forces pushing for more privacy disclosures. Of course, privacy laws vary throughout the globe but, unfortunately, it has turned out to be the subject of legal contention between the European Union and the United States. The EU has adopted very strict laws to protect its citizens’ privacy, in sharp contrast, to ‘lax-attitude’ and ‘self-regulated’ law of the US. For corporations that collect and use personal information, now ignoring privacy legislative and regulatory warning signs can prove to be a costly mistake. An attempt has been made in this paper to summarize the privacy legislation prevalent in Australia, Canada, the US, the EU, India, Japan, Hong Kong, Malaysia and Singapore. It is expected that a growing number of countries will adopt privacy laws to foster e-commerce. Accountability for privacy and personal data protection needs to be a joint effort among governments, privacy commissioners, organizations and individuals themselves. |
URI: | http://elartu.tntu.edu.ua/handle/123456789/18216 |
ISSN: | 2223-3822 |
References: | 1. Ahmad, T. (2009). Right of Privacy: Constitutional Issues and Judicial Responses in USA and India, particularly in Cyber age, available at http://www.ssrn.com/abstract=1440665. 2. Aleecia, M. McDonald & Cranor, L.F. (2008). The cost of reading privacy policies, Information System: A journal of law and policy for the information society. Available at http://www.is-journal.org. 3. Bayardo, R.J. & Srikant, R. (2003). Technological Solutions for Protecting Privacy. Web Technologies, September, available at http://www.almaden.ibm.com/cs/projects/iis/hdb/Publication. 4. Bauer, C., Korunovska, J., & Spiekermann, S., (2012). On the value of information – what Facebook users are willing to pay. ECIS 2012 Proceedings. Paper 197. Available at: http://aisel.aisnet.org/ecis2012/197. 5. Bhasin, M.L. (2005). Challenges of Guarding Privacy – Practices Prevalent in Major Countries, The Chartered Accountant, January, 735-745. 6. Bhasin, M.L. (2006). Guarding Privacy on the Internet, Global Business Review, 7(1), January-June 2006, IMI, Sage Publications, 137-156. 7. Bhasin, M. L. (2006a). Data Mining: A Competitive Tool for Banking and Retail Industries, The Chartered Accountant, October, 588-594. 8. Bhasin, M.L. (2006b). Privacy Protection on the Internet: Privacy Policy, Government Regulation and Technology Solutions, Amity Business Review, July-December, 44-59. 9. Bhasin, M. L. (2007). Mitigating Cyber Threats to Banking Industry, The Chartered Accountant, 50(10), April, 1618-1624. 10. Bhasin, M.L. (2008). Guarding Privacy on the Internet: Privacy Policy, Government Regulations and Technology Solutions, International Journal of Internet Marketing and Advertising, 4(2/3), Special Issue on SME’s, 213-240. 11. Bhasin, M. L. (2012). Online Privacy Protection: Privacy Seals and Government Regulations in Select Countries, International Journal of Finance and Accounting, 1(6), Nov., 148-161. 12. Bhasin, M. L. (2012a). Guarding Online Privacy: Privacy Seals and Government Regulations, European Journal of Business and Social Sciences, 1(9), Dec. 2012, 1-20. 13. Bhasin, M.L. (2015). Menace of Frauds in Banking Industry: Experience of a Developing Country, Australian Journal of Business and Management Research, 4(12), April 21-33. 14. Bhasin, M.L. (2016). Integration of Technology to Combat Bank Frauds: Experience of a Developing Country, Wulfenia Journal, 23(2), Feb., 201-233. 15. Bowman, L.M. (2001). House Pulls Carnivore into the Light. ZDNet News (23 July). 16. Branscum, D. (2000). Guarding On-Line Privacy. Newsweek 135 (23): 77-78. 17. Chaffey, D. and White, G. (2011). Business Information Management. Prentice-Hall, Financial Times, 2 editions. 18. Council of Advisors on Science & Technology (2014), Big Data and Privacy: A Technological Perspective, Executive Office of the President. Available at http://www.whitehouse.gov. 19. Conroy, P., Milano, F., Narula & Singhal, R. (2014). Building Consumer Trust: Protecting Personal Data in the Consumer Product Industry, Deloitte University Press, 13 November. Available at http://www.dupress.com. 20. Culnan, M. (2002). Georgetown Internet Privacy Policy Study. McDonough School of Business, Georgetown University, see http://www.msb.edu/faculty/culnan/gippshome.html. 21. Debatin, B., Lovejoy, J.P., Horn, M.A. & Hughes, B.N. (2009). Facebook and Online Privacy: Attitudes, behaviors and unintended consequences. Journal of Computer-Mediated Communications, 15(2), 83-108. 22. EOS-Privacy & Data Protection Task Force (2010). EU policies on privacy and data protection and their impact on the implementation of security solutions. September, European Organization for Security, 1-17. 23. European Commission (2011). Workshop on Privacy protection and ICT: Research ideas. Workshop report, Sept.21, Brussels. 24. E&Y (2014) Privacy Trends 2014: Privacy Protection in the age of Technology. Available at http://www.ey.com. 25. Federal Trade Commission (2010). Protecting Consumer Privacy in an Era of Rapid Change: A proposed framework for business and policymakers. December. Available at http://www.ftc.org. 26. Fuchs, C. (2011). The political economy of privacy on Facebook. The internet & Surveillance, Research paper 9 series, Vienna, Australia. Available at http://www.uti.at. 27. Geller, T. (2016). In Privacy Law, It is the U.S. vs. the World, Communications of the ACM, 59(2), 21-23. 28. Goldberg, I. (2007). Privacy enhancing technologies for the Internet III: Ten years later. Digital Privacy: Theory, Technologies, and Practices, Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati, editors. Auerbach, Dec. 29. Goldfarb, A., & Tucker, C. E. (2011). Privacy regulation and online advertising. Management Science, 57 (1), 57-71. 30. Green, H., Yang, C. & Judge, P.C. (1998). A Little Privacy, Please. Business Week 3569, 98-99. 31. Greenleaf, G. (2015). Global Data Privacy Laws 2015: 109 Countries, with European Laws Now a Minority, 33 Privacy Laws & Business International Report, February, UNSW Law Research Paper No. 2015-21. 32. Haag, Cummings & McCubbrey (2014). Management Information Systems for the Information Age. McGraw-Hill Irwin. 33. Hoffman, D., Novak, T.P. & Peralta, M. (1999). Building Consumer Trust Online. Communications of the ACM, 42 (4), 80-85. Available at http://zdnet.com/2100-1106-270406.html. 34. Joinson, A. N., Reips, U. D., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Human–Computer Interaction, 25(1), 1-24. 35. Kalakota, R. & Whinston, A. B. (1996). Frontiers of Electronic Commerce. Reading, Mass, Addison-Wesley. 36. Krill, P. (2002). DoubleClick Discontinues Web Tracking Service. InfoWorld, 9 January. Available at: http://www.infoworld.com/articles. 37. Kuglee, L. (2015). Online Privacy: Regional Differences, Communications of the ACM, 58(2), 18-20. 38. Laudon, K.C & Traver, C.G. (2014). E-commerce 10th edition, Addison Wesley, NY. 39. Laudon, K.C. and Laudon, J.P. (2016) Management Information Systems: Managing the digital firm. Pearson, 14th edition. 40. Markert, B.K. (2002). Comparison of Three Online Privacy Seal Programs, GSEC Practical Assignment Version 1.2e, SANS Institute. 41. Morando, F., Iemma, R., & Raiteri, R. (2014). Privacy evaluation: what empirical research on users’ valuation of personal data tells us, Internet Policy Review, 3(2), May, available at http://policyreview.info. 42. Office of the Privacy Commissioner of Canada (2016). The Internet of Things: An introduction to privacy issues with a focus on the retail and home environments, available at https://www.priv.gc.ca. 43. Organization for Economic Co-operation and Development (1980). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Available at http://www.oecd.org. 44. Perry, W.J (2010). Protecting Individual Privacy in the Struggle against Terrorists, Journal of Privacy and Confidentiality, 2(1), 57-71. 45. Pew Internet and American Life Project (2000). Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Available at: http://www.pewinternet.org/reports/toc.asp?Report=19. 46. Privacy Working Group of the National Information and Infrastructure Task Force (1995). Privacy and the National Information Infrastructure: Principles for Providing and Using Personal Information. 6 June. Available at: http://nsi.org/Liberty/Comm/niiprivp.htm. 47. Punch, L. (2000). Big Brother Goes Online. Credit Card Management, 13(3), 22-32. 48. Schwaig, K. S., Segars, A. H., Grover, V., & Fiedler, K. D. (2013). A model of consumers’ perceptions of the invasion of information privacy. Information & Management, 50 (1), 1-12. 49. Slyke, C.V., & Belanger, F. (2012). E-Business Technologies: Supporting the Net-Enhanced Organization. John Wiley & Sons. 50. Stair, R. & Reynolds, G. (2014). Fundamentals of Information Systems. 7th Edition, Thomson Course Technology, USA. 51. Stevens, G. (2011). Privacy protections for personal information online, April, Congressional Research Service Report 7-5700, available at http://www.crs.gov. 52. Swire, P., Hemmings, J. & Kirkland, A. (2016). Online Privacy and ISPS, working paper of The Institute for Information Security & Privacy, Fen. 29. Available at http://www.iisp.gatech.edu. 53. Tang, Z., Hu, Y.J. & Smith, M.D. (2007). Gaining Trust through online Privacy Protection: Self-regulation, mandatory standards, or caveat emptor. Heinz College Research paper 49, available at http://www.repository.cmu.edu/heinzworks/49. 54. The Department of Commerce, Internet Policy Task Force Report (2010). Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework. Available at http://www.ntia.doc.gov. 55. Tsai, J.Y., Egelman, S., Cranor, L. & Acquisti, A. (2011). The Effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), June, 254-268. 56. Turban, E., Leidner, D., Mclean, E., & Wetherbe, J. (2008). Information Technology Management: Transforming organizations in the digital economy. 6th edition, John Wiley & Sons, Inc. 57. UNESCO (2011). Global Survey on Internet Privacy: Calls for proposals. June, 2011. Available at http://www.unesco.org. 58. UNESCO (2012). Preserving Privacy in the Information Society. Available at http://www.unesco.org. 59. Weiss, M.A. & Archick, K. (2016), U.S.-EU Data Privacy: From Safe Harbor to Privacy Shield, Congressional Research Service, 7-5700. 1-16. Available at http://www.crs.gov. 60. Wirtz, J., Lewin, M.O. & Williams, J.D. (2007). Causes and Consequences of consumer online privacy concern. International Journal of Service Industry Management, 18(4), 326-348. |
Розташовується у зібраннях: (Is situated in collections) |
Журнал „Соціально-економічні проблеми і держава“, 2016, Випуск 2(15) |