Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-jr42d Total loading time: 0 Render date: 2024-04-20T04:13:50.842Z Has data issue: false hasContentIssue false

29 - Privacy Notices

Limitations, Challenges, and Opportunities*

from Part V - New Approaches to Improve the Status Quo

Published online by Cambridge University Press:  18 April 2018

Evan Selinger
Affiliation:
Rochester Institute of Technology, New York
Jules Polonetsky
Affiliation:
Future of Privacy Forum
Omer Tene
Affiliation:
International Association of Privacy Professionals
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Awad, Naveen F. and Krishan, M. S. Krishan. 2006. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS Quarterly, 30(1): 1328.CrossRefGoogle Scholar
Balebako, Rebecca, Jung, Jaeyeon, Lu, Wei, Cranor, Lorrie Faith, and Nguyen, Carolyn. 2013. “Little Brother’s Watching You”: Raising Awareness of Data Leaks on Smartphones. In Symposium on Usable Privacy and Security (SOUPS). Newcastle. https://cups.cs.cmu.edu/soups/2013/proceedings/a12_Balebako.pdf.Google Scholar
Balebako, Rebecca, Shay, Richard, and Cranor, Lorrie Faith. 2014. Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy. Workshop on Usable Security (USEC 2014), San Diego. http://lorrie.cranor.org/pubs/usec14-inseam.pdfCrossRefGoogle Scholar
Bambauer, Jane R., Loe, Jonathan, and Winkelman, D. Alex. 2017. A Bad Education. University of Illinois Law Review, 2017(1): 109166.Google Scholar
Ben-Shahar, Omri and Schneider, Carl. 2011. The Failure of Mandated Discourse. University of Pennsylvania Law Review, 159(3): 647749.Google Scholar
Calo, Ryan. 2012. Against Notice Skepticism in Privacy (and Elsewhere). Notre Dame Law Review, 87(3): 10271072.Google Scholar
Calo, Ryan. 2013. Consumer Subject Review Boards: A Thought Experiment. In Big Data & Privacy: Making Ends Meet Digest. Washington: Future of Privacy Forum. http://www.futureofprivacy.org/big-data-privacy-workshop-paper.Google Scholar
Cate, Fred H. 2006. The Failure of Fair Information Practice Principles. In Winn, Jane K. (ed.), Consumer Protection in the Age of the Information Economy: 360363. Burlington: Ashgate.Google Scholar
Cate, Fred H. and Mayer-Schoenberger, Viktor. 2012. Notice and Consent in a World of Big Data, Microsoft Global Privacy Summary Report and Outcomes. http://www.techpolicy.com/NoticeConsent-inWorldBigData.aspx.Google Scholar
Cavoukian, Ann. 2011. Privacy by Design: The Seven Foundational Principles. Information and Privacy Commissioner of Ontario, Canada. https://www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf.Google Scholar
Centre for Information Policy Leadership. 2006. Ten Steps to Develop a Multilayered Privacy Notice. https://www.huntonprivacyblog.com/wp-content/files/2012/07/Centre-10-Steps-to-Multilayered-Privacy-Notice.pdf.Google Scholar
Citron, Danielle Keats and Pasquale, Frank A. 2014. The Scored Society: Due Process for Automated Protections. Washington Law Review, 89(1): 233.Google Scholar
Cranor, Lorrie Faith. 2002. Web Privacy with P3P. Sebastapol: O’Reilly & Associates.Google Scholar
Cranor, Lorrie Faith, Idouchi, Kelly, Leon, Pedro Giovanni, Sleeper, Manya, and Ur, Blase. 2013. Are They Actually Any Different? Comparing Thousands of Financial Institutions’ Privacy Policies. In Twelfth Workshop on the Economics of Information Security (WEIS), Washington, DC. http://weis2013.econinfosec.org/papers/CranorWEIS2013.pdf.Google Scholar
Crawford, Kate and Schultz, Jason. 2014. Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms. Boston College Law Review, 55(1): 93127. http://bclawreview.org/files/2014/01/03_crawford_schultz.pdf.Google Scholar
Culnan, Mary J. and Bies, Robert J. 2003. Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues, 59(2): 323342.CrossRefGoogle Scholar
Culnan, Mary J. and Williams, Cynthia Clark. 2009. How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches. MIS Quarterly, 33(4): 673687.CrossRefGoogle Scholar
Duhigg, Charles. 2012. How Companies Learn Your Secrets. New York Times Magazine, February 16. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=0Google Scholar
4A’s. 2012. DAA Announces “Your AdChoices” Consumer Education Campaign. Press Release, Jan. 20. http://www.aaaa.org/news/press/Pages/012012_daa_adchoices.aspx.Google Scholar
Fung, Archon, Graham, Mary, and Weil, David. 2007. Full Disclosure: The Perils and Promise of Transparency. New York: Cambridge University Press.Google Scholar
Gellman, Robert. 2016. Fair Information Practices: A Basic History. Version 2.16. http://bobgellman.com/rg-docs/rg-FIPShistory.pdf.Google Scholar
Hadden, Susan G. 1986. Read the Label: Reducing Risk by Providing Information. Boulder: Westview Press.Google Scholar
Hoofnagle, Chris Jay. 2016. Federal Trade Commission: Privacy Law and Policy. New York: Cambridge University Press.Google Scholar
Jensen, Carlos and Potts, Colin. 2004. Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices. In CHI 04 Proceedings: 471478, Vienna.CrossRefGoogle Scholar
Kaye, Kate. 2014. Study: Consumers Don’t Know What AdChoices Privacy Icon Is. Advertising Age: January 29. http://adage.com/article/privacy-and-regulation/study-consumers-adchoices-privacy-icon/291374/.Google Scholar
Kelley, Patrick Gage, Cesca, Lucian, Bresee, Joanna, and Cranor, Lorrie Faith. 2010. Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach, Carnegie Mellon CyLab Report CMU-CyLab-09–014. https://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab09014.pdf.Google Scholar
Komanduri, Saranga, Shay, Richard, Norcie, Greg, Ur, Blase, and Cranor, Lorrie Faith. 2011. AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements. Carnegie Mellon CyLab Report 11–005. https://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab11005.pdf.Google Scholar
Laughery, Kenneth R. and Hammond, Amy. 1999. Overview. In Wogalter, Michael S., DeJoy, David M., and Laughery, Kenneth R. (eds.). Warnings and Risk Communication: 111. Philadelphia: Taylor & Frances Inc.Google Scholar
Levy, Alan S. and Hastak, Manoj. 2008. Consumer Comprehension of Financial Privacy Notices. http://www.ftc.gov/privacy/privacyinitiatives/Levy-Hastak-Report.pdf.Google Scholar
Martin, Kirsten. 2015. Privacy Notices as Tabula Rasa: An Empirical Investigation into How Complying with a Privacy Notice Is Related to Meeting Privacy Expectations Online. Journal of Public Policy and Marketing, 34(2): 210227.Google Scholar
McDonald, Alecia M. and Cranor, Lorrie Faith. 2008. The Cost of Reading Privacy Policies. I/S, A Journal of Law and Policy for the Information Society, 4(3):540565.Google Scholar
McDonald, Alecia M., Reeder, Robert W., Kelley, Patrick Gage, and Cranor, Lorrie Faith. 2009. A Comparative Study of Online Privacy Policies and Formats. In Goldberg, Ian and Atallah, Mikhail J. (eds.). Privacy Enhancing Technologies: 9th International Symposium PETS 2009: 3755, Seattle.CrossRefGoogle Scholar
Milne, George R. and Culnan, Mary J. 2004. Strategies of Reducing Online Privacy Risks: Why Consumers Read (or Don’t Read) Online Privacy Notices. Journal of Interactive Marketing, 18(3): 1529.CrossRefGoogle Scholar
Milne, George R., Culnan, Mary J., and Greene, Henry. 2006. A Longitudinal Assessment of Online Privacy Notice Readability. Journal of Public Policy and Marketing, 25(2): 238249.CrossRefGoogle Scholar
National Cyber Security Alliance. 2015. Results of Consumer Data Privacy Survey Reveal Critical Need for All Digital Citizens to Participate in Data Privacy Day. https://staysafeonline.org/about-us/news/results-of-consumer-data-privacy-survey-reveal-critical-need-for-all-digital-citizens-to-participate-in-data-privacy-day.Google Scholar
Nissenbaum, Helen. 2010. Privacy in Context. Palo Alto: Stanford Law Books.Google Scholar
Nissenbaum, Helen. 2011. A Contextual Approach to Privacy Online. Daedalus, 140(4): 3248.Google Scholar
Organization for Economic Co-operation and Development (OECD). 1980. Guidelines Governing the Protection of Privacy and Transborder Data Flow of Personal Data. http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm.Google Scholar
Reidenberg, Joel R., Russell, N. Cameron, Callen, Alexander J., Qasir, Sophia, and Norton, Thomas B. 2014. Privacy Harms and the Effectiveness of the Notice and Choice Framework. TPRC, 42nd Research Conference on Communication, Information, and Internet Policy. http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2418247.Google Scholar
Richards, Neil M. and Hartzog, Woodrow. 2016. Taking Trust Seriously in Privacy Law. Stanford Technology Law Review. 19(3): 431472.Google Scholar
Schaub, Florian, Balebako, Rebecca, Durity, Adam L., and Cranor, Lorrie Faith. 2015. A Design Space for Effective Privacy Notices. In Symposium on Usable Privacy and Security (SOUPS). Ottawa, Canada. http://ra.adm.cs.cmu.edu/anon/isr2015/CMU-ISR-15–105.pdf.Google Scholar
Schnackenberg, A. K. and Tomlinson, E. C. 2016. Organizational Transparency: A New Perspective on Managing Trust in Organization–Stakeholder Relationships. Journal of Management. 42(7): 17841810.Google Scholar
Smith, Aron. 2014. Half of Online Americans Don’t Know What a Privacy Policy Is. Fact Tank. Pew Research Center. December 4. http://www.pewresearch.org/fact-tank/2014/12/04/half-of-americans-dont-know-what-a-privacy-policy-is/.Google Scholar
Smith, H. Jeff. 1993. Privacy Policies and Practices: Inside the Organizational Maze. Communications of the ACM, 36(12): 105–22.Google Scholar
Solove, Daniel J. and Hartzog, Woodrow. 2014. The FTC and the New Common Law of Privacy. Columbia Law Review, 114(3): 583676.Google Scholar
Soltani, Ashkan. 2015. Privacy Trade-offs in Retail Tracking. Federal Trade Commission, Apr. 30. https://www.ftc.gov/news-events/blogs/techftc/2015/04/privacy-trade-offs-retail-tracking.Google Scholar
Tsai, Janice Y, Egelman, Serge, Cranor, Lorrie Faith, and Acquisiti, Alessandro. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research, 22(2): 254–68.Google Scholar
Turow, Joseph, Hennessy, Michael, and Draper, Nora. 2015. The Tradeoff Fallacy. Philadelphia: Annenberg School of Communication, University of Pennsylvania. https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf.Google Scholar
U.S. Department of Commerce. 1995. Privacy and the NII: Safeguarding Telecommunications-Related Personal Information. https://www.ntia.doc.gov/legacy/ntiahome/privwhitepaper.html.Google Scholar
U.S. Department of Commerce. 1997. Privacy and Self Regulation in the Information Age. http://www.ntia.doc.gov/report/1997/privacy-and-self-regulation-information-age.Google Scholar
U.S. Department of Commerce, National Telecommunications & Information Administration. 2013. Short Form Notice Code of Conduct to Promote Transparency in Mobile App Practices. https://www.ntia.doc.gov/files/ntia/publications/july_25_code_draft.pdf.Google Scholar
U.S. Department of Health Education and Welfare. 1973. Records, Computers and the Rights of Citizens: Report of the Secretary’s Advisory Committee on Automated Personal Data Systems. http://epic.org/privacy/hew1973report/default.html.Google Scholar
U.S. Federal Trade Commission. 1996. Staff Report: Public Workshop on Consumer Privacy on the Global Information Infrastructure. http://www.ftc.gov/reports/staff-report-public-workshop-consumer-privacy-global-information-infrastructure.Google Scholar
U.S. Federal Trade Commission. 1999. Self-Regulation and Privacy Online: FTC Report to Congress. https://www.ftc.gov/news-events/press-releases/1999/07/self-regulation-and-privacy-online-ftc-report-congress.Google Scholar
U.S. Federal Trade Commission. 2000. Privacy Online: Fair Information Practices in the Electronic Marketplace: A Report to Congress. https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission-report/privacy2000text.pdf.Google Scholar
U.S. Federal Trade Commission. 2009a. Final Model Privacy Form Under the Gramm-Leach-Bliley-Act, Final Rule. 16 CFR Part 313. https://www.ftc.gov/sites/default/files/documents/federal_register_notices/final-model-privacy-form-under-gramm-leach-bliley-act-16-cfr-part-313/091201gramm-leach.pdf.Google Scholar
U.S. Federal Trade Commission. 2012. Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf.Google Scholar
U.S. National Information Infrastructure Task Force. 1995. Privacy and the National Information Infrastructure: Options for Providing and Using Personal Information. https://aspe.hhs.gov/report/options-promoting-privacy-national-information-infrastructure).Google Scholar
U.S. Privacy Protection Study Commission. 1977. Personal Privacy in an Information Society: The Report of the Privacy Protection Study Commission. Washington. https://www.epic.org/privacy/ppsc1977report/Google Scholar
Westin, Alan F. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
The White House. 1997. A Framework for Global Electronic Commerce. Washington, DC. http://clinton4.nara.gov/WH/New/Commerce.Google Scholar
The White House. 2012. Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy. https://www.whitehouse.gov/sites/default/files/privacy-final.pdf.Google Scholar
The While House. 2016. National Privacy Research Strategy. https://www.whitehouse.gov/sites/default/files/nprs_nstc_review_final.pdf.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×