Informational Privacy and Registered Certified Mail: What Do the People Want?
- 875 Downloads
The increasing use of digital channels for communication, both domestic and commercial, has led National Postal Operators (NPOs) to explore other revenue streams. The increase in use of all things digital has been described as ‘among the most consequential thing to happen to humanity’ (Bostron 2007). There is evidence that it is indeed impacting society in terms of communication, healthcare, governance and education levels.
KeywordsTrusted Third Party Fair Exchange Informational Privacy Fair Information Practice Letter Mail
- Accenture. (2009). How global organisations approach the challenge of protecting personal data, s.l.: Accenture.Google Scholar
- Allen, A. L. (1998). Coercing privacy. William & Mary Law Review, 40, 723.Google Scholar
- Bostron, N. (2007). Technological revolutions: Ethics and policy in the dark. In N. M. de S. Cameron & M. E. Mitchell (Eds.), Nanoscale: Issues and perspectives for the nano century (pp. 129–152). Hoboken: Wiley.Google Scholar
- Cavoukian, A. (2010). Privacy by design: Origins, meaning, and prospects for assuring privacy and trust in the information era. In G. O. Yee (Ed.), Privacy protection measures and technologies in business organizations: Aspects and standards (pp. 170–208). Chicago: IGI Global.Google Scholar
- Cavoukian, A. (2014). Privacy by design. Report of the Information & Privacy Commissioner Ontario, Canada.Google Scholar
- Chun, S. A., Shulman, S., Sandoval, R., & Hovy, E. (2010). Government 2.0: Making connections between citizens, data and government. Information Polity, 15(1–2), 1–9.Google Scholar
- Copenhagen Institute for Future Studies. (2011). Role of mail 2020. s.l.: International Post Corporation.Google Scholar
- Electronic Privacy Information Centre. (2010). EU data protection directive. [Online]. http://epic.org/privacy/intl/eu_data_protection_directive.html. Accessed 28 Jan 2011.
- Federal Trade Commission. (2012). Protecting consumer privacy in an era of rapid change: A proposed framework for businesses and policymakers. [Online]. http://online.wsj.com/public/resources/documents/PrivacyReport_FINAL.pdf. Accessed 11 Nov 2012.
- Gellman, R. (2012). Fair information practices: A basic history. [Online]. http://bobgellman.com/rg-docs/rg-FIPShistory.pdf. Accessed 6 Nov 2012.
- Hearn, J. (2014). Delivering the goods to households: Would further regulation help or hinder? In The role of the postal and delivery sector in a digital age (p. 146). Cheltenham: Elgar.Google Scholar
- Introna, L. D. (1997). Privacy and the computer: Why we need privacy in the information society. Metaphilosophy, 28(3), 259–275.Google Scholar
- Introna, L. D. (2000). Workplace surveillance, privacy and distributive justice. ACM SIGCAS Computers and Society, 30(4), 33–39.Google Scholar
- Kelly, G., Mulgan, G., & Muers, S. (2002). Creating public value. An analytical framework for public service reform. [Online]. Strategy Unit discussion paper accessed at: http://webarchive.nationalarchives.gov.uk/+/http://www.cabinetoffice.gov.uk/strategy/downloads/files/public_value2.pdf. Accessed Oct 2011.
- Kim, K., & Prabhakar, B. (2000). Initial trust, perceived risk, and the adoption of internet banking. Proceedings of the international conference on information systems (Vol. 21, pp. 537–543). Brisbane: Association for Information Systems Atlanta.Google Scholar
- Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.Google Scholar
- Microsoft.com. (2014). Get delivery and read receipt confirmations. Microsoft Office Support. http://office.microsoft.com/en-ie/outlook-help/get-delivery-and-read-receipt-confirmations-HP010080428.aspx
- Moloney, M., & Church, L. (2012). Informational privacy preservation through universal service obligations. Journal of Internet Technology and Secured Systems, 1(1/2), 11–14.Google Scholar
- Moore, A. D. (2007). Toward informational privacy rights. San Diego Law Review, 44(4), 809–845.Google Scholar
- Ofcom. (2013). Review: Mail integrity and postal common operational procedures. Review report from Ofcom. http://stakeholders.ofcom.org.uk/binaries/consultations/mail-integrity/summary/condoc.pdf
- Office of Inspector General for USPS. (2013). Primer on postal challenges. Washington, DC: U.S. Postal Service Office of Inspector General.Google Scholar
- Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015.Google Scholar
- Tauber, A. (2010). Requirements and properties of qualified electronic delivery systems in eGovernment: An Austrian experience. International Journal of E-Adoption, 2, 45–58.Google Scholar
- The Irish Data Protection Commissioner. (2012). EU Directive 95/46/EC – The data protection directive, Chapter I – General provisions. [Online]. http://dataprotection.ie/viewdoc.asp?DocID=92. Accessed 6 June 2012.
- The Ponemon Institute. (2010). 2010 privacy trust study of the United States Government. Traverse City: The Ponemon Institute.Google Scholar
- UN News Centre. (2013). Posts consider postal e-services strategically important for future, 23.01.2012. Retrieved 31 October, from news.upu.int/no_cache/nd/posts-consider-postal-e-services-strategically-important-for-future/Google Scholar