125
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A study of web privacy policies across industries

ORCID Icon &

References

  • Bhatia, J., Breaux, T. D., & Schaub, F. (2016). Mining privacy goals from privacy policies using hybridized task recomposition. ACM Transactions on Software Engineering and Methodology (TOSEM), 25(3), 22. doi:10.1145/2907942
  • Brown, D. H., & Layne Blevins, J. (2002). The safe-harbor agreement between the United States and Europe: A missed opportunity to balance the interests of e-commerce and privacy online? Journal of Broadcasting & Electronic Media, 46(4), 549–564. doi:10.1207/s15506878jobem4604_5
  • Cha, J. (2011). Information privacy: A comprehensive analysis of information request and privacy policies of most-visited web sites. Asian Journal of Communication, 21(6), 613–631. doi:10.1080/01292986.2011.615942
  • COPPA. (1998). Coppa: Children’s online privacy protection act. Retrieved from http://www.coppa.org
  • Cranor, L. F., Egelman, S., Sheng, S., McDonald, A. M., & Chowdhury, A. (2008). P3p deployment on websites. Electronic Commerce Research and Applications, 7(3), 274–293. doi:10.1016/j.elerap.2008.04.003
  • Cranor, L. F., Leon, P. G., & Ur, B. (2016, August). A large-scale evaluation of U.S. financial institutions’ standardized privacy notices. ACM Transactions Web, 10(3), 17:1–17: 33. doi:10.1145/2911988
  • Culnan, M. J. (1999). Georgetown Internet privacy policy survey: Report to the federal trade commission. Washington, DC: Georgetown University, The McDonough School of Business.
  • Disconnect Me. (2014). disconnect me privacy icons. Retrieved from https://disconnect.me/icons
  • FTC. (1998). Privacy online: A report to congress. Retrieved from https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-report-congress/priv-23a.pdf
  • FTC. (2000). Privacy online: Fair information practices in the electronic marketplace: A federal trade commission report to congress. Retrieved from https://www.ftc.gov/reports/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission
  • FTC. (2002). Protecting children’s privacy under COPPA: A survey on compliance. Retrieved from https://www.ftc.gov/reports/protecting-childrens-privacy-under-coppa-survey-compliance
  • FTC. (2010). Exploring privacy: An FTC roundtable discussion. Retrieved from https://www.ftc.gov/sites/default/files/documents/public_events/exploring-privacy-roundtable-series/privacyroundtable_march2010_transcript.pdf
  • FTC. (2012). Protecting consumer privacy in an era of rapid change: Recommendations for businesses and policymakers. Retrieved from https://www.ftc.gov/reports/protecting-consumer-privacy-era-rapid-change-recommendations-businesses-policymakers
  • Graber, M. A. D., Alessandro, D. M., & Johnson-West, J. (2002). Reading level of privacy policies on internet health web sites. Journal of Family Practice, 51(7), 642–642.
  • ICB. (2006). Industry classification benchmark (ICB): A single standard defining the market. Retrieved from http://www.icbenchmark.com
  • Kohavi, R. (2001). Mining e-commerce data: The good, the bad, and the ugly. In International Conference on Knowledge Discovery and Data Mining, 8–13.
  • Li, Y., Stweart, W., Zhu, J., & Ni, A. (2012). Online privacy policy of the thirty Dow Jones corporations: Compliance with FTC fair information practice principles and readability assessment. Communications of the IIMA, 12(3), 5.
  • Liu, C., & Arnett, K. P. (2002). Raising a red flag on global www privacy policies. Journal of Computer Information Systems, 43(1), 117–127.
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. doi:10.1287/isre.1040.0032
  • McDonald, A. M., & Cranor, L. F. (2008). Cost of reading privacy policies, the. I/S: A Journal of Law and Policy for the Information Society, 4, 543.
  • Meinert, D. B., Peterson, D. K., Criswell, J. R., & Crossland, M. D. (2006). Privacy policy statements and consumer willingness to provide personal information. Journal of Electronic Commerce in Organizations, 4(1), 1. doi:10.4018/jeco.2006010101
  • Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15–29. doi:10.1002/dir.20009
  • Milne, G. R., Culnan, M. J., & Greene, H. (2006). A longitudinal assessment of online privacy notice readability. Journal of Public Policy & Marketing, 25(2), 238–249. doi:10.1509/jppm.25.2.238
  • Nasdaq. (2015). Nasdaq. Retrieved from http://www.nasdaq.com
  • Nokhbeh Zaeem, R., German, R. L., & Barber, K. S. (2015). Privacycheck: Automatic summarization of privacy policies using data mining. ACM Transactions on Internet Technology. (Submitted)
  • Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82(4), 331–338. doi:10.1016/j.jretai.2006.08.006
  • Rains, S. A., & Bosch, L. A. (2009). Privacy and health in the information age: A content analysis of health web site privacy policy statements. Health Communication, 24(5), 435–446. doi:10.1080/10410230903023485
  • Regard, H. (1980). Recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data, OECD.
  • Romanosky, S., Telang, R., & Acquisti, A. (2011). Do data breach disclosure laws reduce identity theft? Journal of Policy Analysis and Management, 30(2), 256–286. doi:10.1002/pam.20567
  • Ryker, R., Lafleur, E., McManis, B., & Cox, K. C. (2002). Online privacy policies: An assessment of the fortune e-50. Journal of Computer Information Systems, 42(4), 15–20.
  • Shalhoub, Z. K. (2006). Content analysis of web privacy policies in the GCC countries. Information Systems Security, 15(3), 36–45. doi:10.1201/1086.1065898X/46183.15.3.20060701/94186.6
  • Storey, V. C., Kane, G. C., & Schwaig, K. S. (2009). The quality of online privacy policies: A resource- dependency perspective. Journal of Database Management, 20(2), 19. doi:10.4018/jdm.2009040102
  • Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268. doi:10.1287/isre.1090.0260
  • Turow, J., & Center, A. P. P. (2003). Americans & online privacy: The system is broken. Philadelphia, PA, USA: Annenberg Public Policy Center, University of Pennsylvania.
  • Usable Privacy. (2016). Usable privacy project website. Retrieved from https://usableprivacy.org/
  • UT CID. (2015). Privacycheck. Retrieved from https://chrome.google.com/webstore/detail/privacycheck/poobeppenopkcbjejfjenbiepifcbclg
  • Wilson, S., Schaub, F., Dara, A., Cherivirala, S. K., Zimmeck, S., Andersen, M. S., … Sadeh, N. (2016). Demystifying privacy policies using language technologies: Progress and challenges. In TA-COS ’16: LREC workshop on text analytics for cybersecurity and online safety.
  • Wilson, S., Schaub, F., Dara, A. A., Liu, F., Cherivirala, S., Leon, P. G., et al (2016). The creation and analysis of a website privacy policy corpus. Annual meeting of the association for computational linguistics (pp. 1330–13340).
  • Zahir Irani, P. C., Sipior, J. T., Ward, B., & Connolly, R. (2013). Empirically assessing the continued applicability of the IUIPC construct. Journal of Enterprise Information Management, 26(6), 661–678. doi:10.1108/JEIM-07-2013-0043
  • Zhang, X., Toru, S., & Kennedy, M. (2007). A cross-cultural analysis of privacy notices of the global 2000. Journal of Information Privacy and Security, 3(2), 18–36. doi:10.1080/15536548.2007.10855814

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.