Skip to main content

Service Users’ Requirements for Tools to Support Effective On-line Privacy and Consent Practices

  • Conference paper
  • 850 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7127))

Abstract

The work presented in this paper explores how privacy dialogues within an on-line service might be constructed by conducting field experiments those identify privacy practices used when engaging with on-line services and elicit service user requirements for privacy dialogues. The findings are considered against the established design principles for general CRM dialogue design such as: frequency, initiation, signalling, service provider disclosure and richness [1] as well as privacy specific design principles including: transparency, service user disclosure and the agreement of privacy norms and rules [12].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Leuthesser, L., Kohli, A.K.: Relational Behaviour in Business Markets Implications for Relationship Management. Journal of Business Research 34, 221–233 (1995)

    Article  Google Scholar 

  2. Coles-Kemp, L., Kani-Zabihi, E.: On-line Privacy and Consent: A Dialogue, Not a Monologue. In: NSPW, Concord, MA (2010)

    Google Scholar 

  3. Ardagna, C.A., Di Vimercati, S.D.C., Neven, G., Paraboschi, S., Preiss, F.S., Samarati, P., Verdicchio, M.: Enabling Privacy-Preserving Credential-Based Access Control with XACML and SAML. In: 10th IEEE International Conference on Computer and Information Technology, p. 1090. IEEE Computer Society, Bradford (2010)

    Google Scholar 

  4. Bogdanovic, D., Crawford, C., Coles-Kemp, L.: The need for enhanced privacy and consent dialogues. Information Security Technical Report 14(3), 167–172 (2009)

    Article  Google Scholar 

  5. McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ISJLP 4, 543–897 (2009)

    Google Scholar 

  6. McDonald, A.M., Cranor, L.F.: An Empirical Study of How People Perceive Online Behavioral Advertising. CyLab, p. 2 (2009)

    Google Scholar 

  7. Coles-Kemp, L., Lai, Y., Ford, M.: Privacy: Contemporary Developments in Users’ Attitudes and Behaviours (2009), http://www.vome.org.uk/index.php/publications/

  8. Buchanan, T., Reips, U.-D., Paine, C., Joinson, A.N.: Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology 58(2), 157–165 (2007)

    Article  Google Scholar 

  9. Horn, D., Feinberg, R., Salvendy, G.: Determinant Elements of Customer Relationshjp Management in e-Business. Behaviour and Information Technology 24(2) (2005)

    Google Scholar 

  10. Bruhn, M., Grund, M.: Theory, Development and Implementation of National Customer Satisfaction Indices: The Swiss Index of Customer Satisfaction (SWICS). Total Quality Management 11(7) (2000)

    Google Scholar 

  11. A Joint Report of the Information and Privacy Commissioner of Ontario and the Canadian Marketing Association (2004), Incorporating Privacy into Marketing and Customer Relationship Management, http://www.ipc.on.ca/images/Resources/priv-mkt.pdf (last accessed August 5, 2010)

  12. Information Commissioner’s Office (2008) Privacy by Design, http://www.ico.gov.uk/upload/documents/pdb_report_html/index.html (last accessed August 5, 2010)

  13. Whitworth, B.: The Social Requirements of Technical Systems. In: Whitworth, B., de, M. (eds.) Socio-Technical Design and Social Networking Systems, pp. 1–22 (2009)

    Google Scholar 

  14. Tsai, J., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behaviour: An experimental study. In: The 6th Workshop on the Economics of Information Security (WEIS), Citeseer (2008)

    Google Scholar 

  15. Daft, R.L., Lengel, R.H., Trevino, L.K.: Message Equivocality, Media Selection, and Manager Performance: Implications for Information Systems. MIS Quarterly 11(3), 355–366 (1987)

    Article  Google Scholar 

  16. Solove, D.J.: Understanding Privacy. Harvard University Press (2008)

    Google Scholar 

  17. Kani-Zabihi, E., Ghinea, G., Chen, S.: User perceptions of online public library catalogues. International Journal of Information Management 28, 492–502 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kani-Zabihi, E., Coles-Kemp, L. (2012). Service Users’ Requirements for Tools to Support Effective On-line Privacy and Consent Practices. In: Aura, T., Järvinen, K., Nyberg, K. (eds) Information Security Technology for Applications. NordSec 2010. Lecture Notes in Computer Science, vol 7127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27937-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27937-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27936-2

  • Online ISBN: 978-3-642-27937-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics