Examining Internet Privacy Policies Within the Context of User Privacy Values

2005 ◽  
Vol 52 (2) ◽  
pp. 227-237 ◽  
Author(s):  
J.B. Earp ◽  
A.I. Anton ◽  
L. Aiman-Smith ◽  
W.H. Stufflebeam
2021 ◽  
Author(s):  
Siena Gioia ◽  
Irma M Vlassac ◽  
Demsina Babazadeh ◽  
Noah L Fryou ◽  
Elizabeth Do ◽  
...  

UNSTRUCTURED Abstract: Over the last decade, health apps have become an increasingly popular tool utilized by clinicians and researchers to track food consumption and exercise. However, as consumer apps have primarily focused on tracking dietary intake and exercise, many lack technological features to facilitate the capture of critical food timing details. To determine a viable app that recorded both dietary intake and food timing for use in our clinical study, we evaluated the timestamp data, usability, privacy policies, accuracy of nutrient estimates, and general features of 11 mobile apps for dietary assessment. Apps were selected using a keyword search of related terms and the following apps were reviewed: Bitesnap, Cronometer, DiaryNutrition, DietDiary, FoodDiary, FoodView, Macros, MealLogger, myCircadianClock, MyFitnessPal, and MyPlate. Our primary goal was identifying apps that record food timestamps, which 8 of the reviewed apps did (73%). Of those, only 4/11 (36%) allowed users to edit the timestamps, an important feature. Next, we sought to evaluate the usability of the apps, using the System Usability Scale (SUS) across 2 days, with 82% of the apps receiving favorable scores for usability (9/11 apps). To enable use in research and clinic settings, the privacy policies of each app were systematically reviewed using common criteria with 1 Health Insurance Portability and Accountability Act (HIPAA) compliant app (Cronometer). Furthermore, protected health information is collected by 9/11 (81%) of the apps. Lastly, to assess the accuracy of nutrient estimates generated by these apps, we selected 4 sample food items and one researcher’s 3-day dietary record to input into each app. The caloric and macronutrient estimates of the apps were compared to nutrient estimates provided by a registered dietitian using the Nutrition Data System for Research (NDSR). Compared to the 3-day food record, the apps were found to consistently underestimate calories and macronutrients compared to NDSR. Overall, we find the Bitesnap app to provide flexible dietary and food timing functionality capable for research or clinical use with the majority of apps lacking in necessary food timing functionality or user privacy.


2021 ◽  
Author(s):  
Daria Ilkina

This thesis investigates the privacy risks that m-learning app users face by identifying the personal information that m-learning apps collect from their users, and the privacy policies of these apps. It reveals that most of the m-learning applications have similar privacy policies, which seem to protect the interest of the providers rather than the users. The Privacy by Design framework is reviewed to determine whether it can help the developers address user privacy practices. The results from the sample of 260 participants suggest that users are less concerned with the collection of personal information that is non-identifiable. The survey also revealed that the users are more concerned when an app shares their personal information with third parties for commercial purposes than when it is shared with the government.


Teknologi ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 46-58
Author(s):  
Syifa Ilma Nabila Suwandi ◽  
◽  
Xavier Wahyuadi Seloatmodjo ◽  
Alexandra Situmorang ◽  
Nur Aini Rakhmawati ◽  
...  

The presence of user contact applications in the community as a means of preventing and overcoming the spread of COVID-19 can pose another risk to the potential dangers of protecting data privacy from contact tracing. This research examines more deeply related to user privacy policies through 3 (three) samples of android-based user contact applications that are used as a means of preventing, overcoming and controlling the spread of the COVID-19 virus in today's society and by reviewing the rules contained in the Presidential Regulation of the Republic. Indonesian No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE). The study in this study was prepared using the method of literature study, observation and qualitative analysis. A comparison was made regarding the data privacy of the three samples, which was then evaluated and matched with the form of the privacy policy according to Presidential Regulation No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE) and according to the ideal form of data privacy policy based on several experts. Comparative data is obtained through related applications and other electronic media which are then discussed together to conclude and evaluate the data privacy policies of the three sample applications. Based on this research, it can be concluded that privacy intervention to deal with damage and save lives is legal as long as its use is in accordance with regulations in the health, disaster, telecommunications, informatics and other related fields; in this case listed in the Presidential Decree No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE) and there needs to be an increase in efforts to maintain the security and confidentiality of user data privacy through continuous system and data maintenance, encryption of data privacy storage in the manager's data warehouse and added with other data privacy policies can guarantee the security and confidentiality of the privacy of user data.


2019 ◽  
Vol 33 (2) ◽  
pp. 502-534 ◽  
Author(s):  
Aikaterini Soumelidou ◽  
Aggeliki Tsohou

Purpose The purpose of this paper is to propose visualization techniques as a new representation for privacy policies instead of traditional textual representation and to examine empirically their effects on users’ information privacy awareness level. Design/methodology/approach The authors selected as a case the privacy policy of Instagram and conducted two empirical investigations, each one with three interventions and each representing a different version of the Instagram privacy policy to users. Through a pre- and a post-questionnaire, the authors examined the effects that each representation technique had on the users’ privacy awareness level. Findings The paper finds that visualized privacy policies lead to higher privacy awareness levels than conventional textual ones, especially when icons are included. Research limitations/implications The authors implemented two new representation techniques offering beneficial guidelines for designing more attractive privacy policy representations. However, the samples are rather limited for generalization to the wide population; nonetheless, they are significant to demonstrate the effect of visualized techniques. The findings might also be subject to bias (e.g. brand bias), although the authors took necessary methodological actions to prevent bias. Practical implications The results and the methodology of the paper could guide practitioners for the representation of a privacy policy, given that the authors provide systematic and concrete steps. Originality/value This paper examines the value of privacy policy visualization as a new approach for enabling user privacy awareness, as well as implements two visualization techniques for a given privacy policy. The paper and its findings should be useful for researchers, as well as for practitioners.


2012 ◽  
Vol 3 (4) ◽  
pp. 48-55 ◽  
Author(s):  
Syed Hassan Faraz ◽  
Syed Hassan Tanvir ◽  
Saqib Saeed

Social web has changed the concept of leisure time. As a result street neighbors have been replaced by e-neighbors and walls have become e-walls to share ideas and gossips. Despite so many advantages we cannot ignore potential threats to user privacy and security. In order to be extremely usable, such systems should have strict security and privacy policies in place. In this paper the authors focus on “Facebook” to understand privacy and security problems by carrying out a web based survey. Based on the findings from empirical data the authors propose different enhancements for the improvement of user privacy and potential threats to user account security.


Author(s):  
Alan R. Peslak

Privacy on the Internet has been of increasing concern with the explosive growth of electronic commerce. A series of past surveys by the Federal Trade Commission and other organizations measured the implementation of fair information practices and industry self-regulation of privacy. This report includes two important additional factors in the review—enforcement and simplicity. Using historical studies and this more comprehensive analysis, this article reviews the current Internet privacy polices of the 50 largest U.S. companies in 2003 and updates this review for 2006.


2010 ◽  
Vol 71 (3) ◽  
pp. 254-272 ◽  
Author(s):  
Trina J. Magi

Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content analysis to determine the degree to which the privacy policies of 27 major vendors meet standards articulated by the library profession and information technology industry. While most vendors have privacy policies, the policy provisions fall short on many library profession standards and show little support for the library Code of Ethics.


Author(s):  
Georgia M. Kapitsaki

Privacy protection plays a vital role in pervasive and web environments, where users contact applications and services that may require access to their sensitive data. The current legislation, such as the recent European General Data Protection Regulation, is putting more emphasis on user protection and on placing users in the center of privacy choices. SOAP (simple object access protocol)-based and RESTful services may require access to sensitive data for their proper functioning, but users should be able to express their preferences on what should and should not be accessed. In this chapter, the above issues are discussed and a solution is presented for reconciling user preferences expressed in privacy policies and the service data needs tailored to SOAP-based services. A use example is provided and the main open issues providing directions for future research are discussed.


Sign in / Sign up

Export Citation Format

Share Document