International Journal of Finance and Accounting
p-ISSN: 2168-4812 e-ISSN: 2168-4820
2012; 1(6): 148-161
doi: 10.5923/j.ijfa.20120106.03
Madan Lal Bhasin
Department of Accounting & Finance, Bang College of Business, KIMEP University, Almaty, Republic of Kazakhstan
Correspondence to: Madan Lal Bhasin , Department of Accounting & Finance, Bang College of Business, KIMEP University, Almaty, Republic of Kazakhstan.
Email: |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
The proliferation of the Internet as a business medium has exacerbated violation of individual privacy. New e-business technologies have increased the ability of online merchants to collect, monitor, target, profile, and even sell personal information about consumers to third parties. Governments, business houses and employers collect data and monitor people, but their practices often threaten an individual’s privacy. Because vast amount of data can be collected on the Internet and due to global ramifications, citizens worldwide have expressed concerns over increasing cases of privacy violations. Several privacy groups, all around the world, have joined hands to give a boost to privacy movement. Consumer privacy, therefore, has attracted the widespread attention of regulators across the globe. With the European Directive already in force, “trust seals” and “government regulations” are the two leading forces pushing for more privacy disclosures. Of course, privacy laws vary throughout the globe but, unfortunately, it has turned out to be the subject of legal contention between the European Union and the United States. The EU has adopted very strict laws to protect its citizens’ privacy, in sharp contrast, to ‘lax-attitude’ and ‘self-regulated’ law of the US. For corporations that collect and use personal information, now ignoring privacy legislative and regulatory warning signs can prove to be a costly mistake. An attempt has been made in this paper to summarize the privacy legislation prevalent in Australia, Canada, the US, the EU, India and Japan. It is expected that a growing number of countries will adopt privacy laws to foster e-commerce. As a discussion-oriented paper, the main purpose is to share the information with the reader’s.
Keywords: Online Privacy, Security, Trust Seals, Government Regulation, Australia, USA, EU, Canada, Japan, India, Technology-Based Solutions
Cite this paper: Madan Lal Bhasin , "Online Privacy Protection:Privacy Seals and Government Regulations in Select Countries", International Journal of Finance and Accounting , Vol. 1 No. 6, 2012, pp. 148-161. doi: 10.5923/j.ijfa.20120106.03.
|
|
[1] | Laudon, K.C. and Laudon, J.P. (2012), “Management Information Systems: Managing the digital firm,” Pearson, 12 edition. |
[2] | Slyke, C.V., and Belanger, F. (2012), “E-Business Technologies: Supporting the Net-Enhanced Organization,” John Wiley & Sons, Inc. |
[3] | Stevens, G. (2011) “Privacy protections for personal information online,” April, Congressional Research Service Report 7-5700, available at www.crs.gov. |
[4] | UNESCO (2011) “Global Survey on Internet Privacy: Calls for proposals,” June, 2011. Available electronically at www.unesco.org. |
[5] | Tsai, J.Y., Egelman, S., Cranor, L. and Acquisti, A. (2011) “The Effect of online privacy information on purchasing behavior: An experimental study,” Information Systems Research, Volume 22, No. 2, June, pp. 254-268. |
[6] | Punch, L. (2000), “Big Brother Goes Online,” Credit Card Management 13(3): 22-32. |
[7] | Wirtz, J., Lewin, M.O. and Williams, J.D. (2007), “Causes and Consequences of conumer online privacy concern,” International Journal of Service Industry Management, Volume 18, No. 4, pp. 326-348. |
[8] | The Department of Commerce, Internet Policy Task Force Report (2010), “Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework,” available at www.ntia.doc.gov. |
[9] | Fuchs, C. (2011), “The political economy of privacy on Facebook,” The internet & Surveillance, Research paper 9 series, Vienna, Australia. Available at www.uti.at. |
[10] | Debatin, B., Lovejoy, J.P., Horn, M.A. and Hughes, B.N. (2009), “Facebook and Online Privacy: Attitudes, behaviors and unintended consequences,” Journal ofComputer-Mediated Communications, Volume 15, pp. 83-108. |
[11] | Aleecia, M. McDonald and Cranor, L.F. (2008) “The cost of reading privacy policies,” Information System: A journal of law and policy for the information society. Available at www.is-journal.org. |
[12] | Chaffey, D. and White, G. (2011), “Business Information Management,” Prentice-Hall, Financial Times, 2 edition. |
[13] | Turban, E., Leidner, D., Mclean, E., and Wetherbe, J. (2008) “Information Technology Management: Transforming organizations in the digital economy,” 6 edition, John Wiley & Sons, Inc. |
[14] | Kalakota, R. and Whinston, A.B. (1996), “Frontiers of Electronic Commerce,” Reading, Mass, Addison-Wesley. |
[15] | Hoffman, D., Novak, T.P. and Peralta, M. (1999), “Building Consumer Trust Online, ” Communications of the ACM, 42 (4): 80-85. |
[16] | Bhasin, M.L. (2005) “Challenges of Guarding Privacy: Practices Prevalent in Major Countries,” The Chartered Accountant Journal, November 2005, published by The Institute of Chartered Accountants of India, New Delhi, pp. 739-749. |
[17] | Federal Trade Commission (2010), “Protecting Consumer Privacy in an Era of Rapid Change: A proposed framework for business and policymakers,” December. Available at www.ftc.org. |
[18] | Haag, Cummings, McCubbrey (2004), “Management Information Systems for the Information Age,” Mc Graw- Hill Irwin, Fourth edition. |
[19] | Organization for Economic Co-operation and Development (1980), “OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data,” available at http://www.oecd.org. |
[20] | Branscum, D. (2000), “Guarding On-Line Privacy,” Newsweek 135 (23): 77-78. |
[21] | Stair, R. and Reynolds, G. (2006), “Fundamentals of Information Systems,” Third Edition, Thomson Course Technology, USA. |
[22] | Harris Interactive (1999), “IBM Multinational Consumer Privacy Survey,” Study Commissioned by IBM Global Services, October 1999. Available at www.ibm.com. |
[23] | Pew Internet and American Life Project (2000), “Trust and Privacy Online: Why Americans Want to Rewrite the Rules,” available at:http://www.pewinternet.org/reports/toc.asp?Report=19. |
[24] | Goldberg, I. (2007), “Privacy enhancing technologies for the Internet III: Ten years later,” Digital Privacy: Theory, Technologies, and Practices, Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati, editors. Auerbach, December 2007. |
[25] | Tang, Z., Hu, Y.J. and Smith, M.D. (2007), “Gaining Trust through online Privacy Protection: Self-regulation,mandatory standards, or caveat emptor,” Heinz College Research paper 49, available atwww.repository.cmu.edu/heinzworks/49. |
[26] | Markert, B.K. (2002) Comparison of Three Online Privacy Seal Programs, GSEC Practical Assignment Version 1.2e, SANS Institute, |
[27] | Ahmad, T. (2009), “Right of Privacy: Constitutional Issues and Judicial Responses in USA and India, particularly in Cyber age,” available at www.ssrn.com/abstract=1440665. |
[28] | Culnan, M. (2002), “Georgetown Internet Privacy Policy Study,” McDonough School of Business, Georgetown University, see http://www.msb.edu/faculty/culnan/gippshome.html. |
[29] | Green, H., Yang, C. and Judge, P.C. (1998), “A Little Privacy, Please,” Business Week 3569: 98-99. |
[30] | Shah, A. and Zacharias, N. (2001), “Right to privacy and data protection,” Nitin Desai Associates, Mumbai. |
[31] | Privacy Working Group of the National Information and Infrastructure Task Force (1995), “Privacy and the National Information Infrastructure: Principles for Providing and Using Personal Information,” 6 June. Available at: http://nsi.org/Liberty/Comm/niiprivp.htm. |
[32] | Krill, Paul (2002), “DoubleClick Discontinues Web Tracking Service,” InfoWorld, 9 January, available at: http://www.infoworld.com/articles. |
[33] | EOS-Privacy & Data Protection Task Force (2010), “EU policies on privacy and data protection and their impact on the implementation of security solutions,” September, European Organization for Security, pp.1-17. |
[34] | European Commission (2011), “Workshop on Privacy protection and ICT: Research ideas,” Workshop report, September 21, Brussels. |
[35] | Bowman, L.M. (2001), “House Pulls Carnivore into the Light,” ZDNet News (23 July):http://zdnet.com/2100-1106-270406.html. |
[36] | Oz, Effy (2002), “Foundations of E-Commerce,” Prentice Hall, NJ. |
[37] | Laudon, K.C and Traver, C.G. (2003), “E-commerce,” 2nd edition, Addison Wesley, NY. |
[38] | Bayardo, R.J. and Srikant, R. (2003) “Technological Solutions for Protecting Privacy,” Web Technologies, September, available atwww.almaden.ibm.com/cs/projects/iis/hdb/Publication. |