Is P3P an Answer to Protecting Information Privacy?

Author(s):  
Noushin Ashrafi ◽  
Jean-Pierre Kuilboer

Increasingly the Internet is used as a common tool for communication, information gathering, and online transactions. Information privacy is threatened as users are expected to reveal personal information without knowing the consequences of sharing their information. To that end, research groups, both from academia and industry, have embarked on the development of privacy enhancement technologies. One such technology is platform for privacy preferences (P3P). Developed by the World Wide Web Consortium (W3C), P3P has a number of prominent stakeholders such as IBM, Microsoft, and AT&T. Yet there is little general knowledge on what P3P is and the extent of its deployment by e-business organizations. This study is exploratory in nature and aims at addressing these questions; in particular, we look at P3P both as a new technology and as a standard. We use our empirical data on top-500 interactive companies to assess its adoption.

Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


Author(s):  
Tziporah Stern

Privacy, or the right to hold information about oneself in secret (Masuda, 1979; O’Brien & Yasnof, 1999), has become increasingly important in the information society. With the rapid technological advances and the digitalization of information, retrieval of specific records is more rapid; personal information can be integrated into a number of different data files; and copying, transporting, collecting, storing, and processing large amounts of information is easier. Additionally, the advent of the World Wide Web and the fast-paced growth of the Internet have created further cause for concern. The vast amounts of digital information and the pervasiveness of the Internet facilitate new techniques for gathering information—for example, spyware, phishing, and cookies. Hence, personal information is much more vulnerable to being inappropriately used. This article outlines the importance of privacy in an e-commerce environment, the specific privacy concerns individuals may have, antecedents to these concerns, and potential remedies to quell them.


1996 ◽  
Vol 21 (1) ◽  
pp. 4-7 ◽  
Author(s):  
John Thomson ◽  
Joye Volker

Electronic networking has been welcomed in Australia not least because of its potential to help solve problems of distances within Australia and of the isolation of Australia. In the world as a whole, the Internet, and the World Wide Web in particular, is transforming the communication of art information and access to art images. Three Australian Web servers focus on the visual arts: Art Serve, Diva, and AusArts. A number of initiatives intended to provide online bibliographic databases devoted to Australian art were launched in the 1980s. More recently a number of CD-ROMs have been published. As elsewhere, art librarians in Australia need new skills to integrate these products of new technology into the art library, and to transform the latter into a multimedia resource centre.


10.28945/2556 ◽  
2002 ◽  
Author(s):  
Sanjeev Phukan

Issues of IT Ethics have recently become immensely more complex. The capacity to place material on the World Wide Web has been acquired by a very large number of people. As evolving software has gently hidden the complexities and frustrations that were involved in writing HTML, more and more web sites are being created by people with a relatively modest amount of computer literacy. At the same time, once the initial reluctance to use the Internet and the World Wide Web for commercial purposes had been overcome, sites devoted to doing business on the Internet mushroomed and e-commerce became a term permanently to be considered part of common usage. The assimilation of new technology is almost never smooth. As the Internet begins to grow out of its abbreviated infancy, a multitude of new issues surface continually, and a large proportion of these issues remain unresolved. Many of these issues contain a strong ethics content. As the ability to reach millions of people instantly and simultaneously has passed into the hands of the average person, the rapid emergence of thorny ethical issues is likely to continue unabated.


Author(s):  
Marc Pelteret ◽  
Jacques Ophoff

The privacy of personal information is an important area of focus in today’s electronic world, where information can so easily be captured, stored, and shared. In recent years it has regularly featured as a topic in news media and has become the target of legislation around the world. Multidisciplinary privacy research has been conducted for decades, yet privacy remains a complex subject that still provides fertile ground for further investigation. This article provides a narrative overview of the nature of information privacy, describing the complexities and challenges that consumers and organizations face when making decisions about it, in order to demonstrate its importance to both groups. Based on this work, we present a transdisciplinary view of information privacy research linking the consumer and organization. It illustrates areas of concern for consumers and organizations together with the factors that influence the decisions they make about information privacy. By providing such a view we hope to encourage further cross-disciplinary research into this highly pertinent area.


Author(s):  
Edward J. Szewczak

The collection of personal information by electronic technology (e-technology) and the possibility of misuse of that information are primary reasons why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of e-technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, and PC software. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world.


Author(s):  
Américo Sampaio

The growth of the Internet and the World Wide Web has contributed to significant changes in many areas of our society. The Web has provided new ways of doing business, and many companies have been offering new services as well as migrating their systems to the Web. The main goal of the first Web sites was to facilitate the sharing of information between computers around the world. These Web sites were mainly composed of simple hypertext documents containing information in text format and links to other documents that could be spread all over the world. The first users of this new technology were university researchers interested in some easier form of publishing their work, and also searching for other interesting research sources from other universities.


1999 ◽  
Vol 17 (2) ◽  
pp. 385-387 ◽  
Author(s):  
Bernard J. Hibbitts

Legal historians have had an ambivalent relationship with new technology. As students and spokespersons of the somewhat-stodgy legal past, our sympathies have predictably been with traditional methods of doing things rather than with the latest and greatest devices of our own age. In the twentieth century we have tended to champion writing and books more than radio, television, and computers. Today we may use new tools to help us create our scholarship and even to help us teach, but like most of our academic colleagues in law and in history we generally employ those tools as extensions of established media instead of exploiting their potential to deploy information and develop ideas in new ways.


2017 ◽  
Vol 18 (3_suppl) ◽  
pp. S203-S205 ◽  
Author(s):  
Ajay K. Kohli

The concept of market orientation was introduced in the early 1990s as entailing three sets of activities: generation, dissemination and responsiveness to market intelligence. Since then the World Wide Web has ushered in a sea change in the way people communicate and interact. This article explores the impact of the still-developing digital technologies on market orientation. In particular, it examines how the practice of each of the three components of market orientation is being impacted by digital technologies, and whether market orientation continues to be important for business organizations. The discussion identifies opportunities presented by digital technologies as well as difficulties generated by them.


Author(s):  
Edward J. Szewczak

The use of various e-technologies for e-commerce, e-government, and mobile commerce is characterized by the collection of personal information—both routinely as well as surreptitiously—and the possibility of misuse of that information. Various uses of e-technologies that collect or disseminate personal information include corporate and government databases, e-mail, and wireless communications. (For a discussion of clickstream tracking and spyware, hardware and software watermarks, and biometric devices, see Szewczak, 2005) The main challenge to personal information privacy is the surreptitious monitoring of user behavior without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. In light of this reality, people limit their use of e-technologies, even to the point of limiting the success of e-commerce (Szewczak, 2004). Our focus is primarily on e-technology use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world. Also, in light of the 9/11 terrorist attacks on the World Trade Center and the Pentagon and the U.S. government’s response to them, the issue of information privacy takes on a new urgency (for more information, see www.privacyinternational.org).


Sign in / Sign up

Export Citation Format

Share Document