Web Privacy: Issues, Legislations, and Technological Challenges

Web Privacy: Issues, Legislations, and Technological Challenges

A. Mishra (Atilim University, Turkey)
DOI: 10.4018/978-1-59904-804-8.ch001
OnDemand PDF Download:


People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private organizations, governments and employers. Privacy relates to issues regarding collection, secure transmission, storage, authorized access, usage, and disclosure of personal information. This information is used for commercial gain by many organizations..Individual privacy concerns significantly affects consumer willingness to engage in electronic commerce over the Internet. The increased use of the Internet and Web for everyday activities is bringing new threats to personal privacy. This chapter assessed various issues related to individual privacy on the Web, growing concerns among the Web users, technologies employed for collecting and protecting information on the Web, privacy-enhancing technologies and the legal provisions to curb the Web privacy. This chapter also reported detailed discussion about Platform for Privacy Preferences (P3P), its structure, present scenario of its implementation and its future success. Global consistency on Internet privacy protection is important to promote the growth of electronic commerce. To protect consumers in a globally consistent manner, legislation, self-regulation, technical solutions and combination solutions are different ways that can be implemented

Complete Chapter List

Search this Book:
Table of Contents
Ramesh Subramanian
Ramesh Subramanian
Chapter 1
A. Mishra
People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private... Sample PDF
Web Privacy: Issues, Legislations, and Technological Challenges
Chapter 2
John Thomas
This chapter traces the development in the United States of legal protections of the right to privacy. It begins with the common law “right to be... Sample PDF
Is It Safe to Talk,Yet? The Evolution of Electronic Privacy Law
Chapter 3
Sushma Mishra, Amita Goyal Chin
Given the recent monumental events including the September 11th attack on the World Trade Center and the Pentagon as well as the Enron and MCI... Sample PDF
Assessing the Impact of Governmental Regulations on the IT Industry: A Neo Institutional Theory Perspective
Chapter 4
Bernd Carsten Stahl
Privacy is one of the central issues in the information society. New technologies pose new threats to privacy but they may also facilitate new ways... Sample PDF
The Impact of the UK Human Rights Act 1998 on Privacy Protection in the Workplace
Chapter 5
Madhu V. Ahluwalia, Aryya Gangopadhyay
This chapter gives a synopsis of the techniques that exist in the area of privacy preserving data mining. Privacy preserving data mining is... Sample PDF
Privacy Preserving Data Mining: Taxonomy of Existing Techniques
Chapter 6
Yue Liu
The increasing use of biometric technology is often accompanied by grandiose claims about its ability to enhance security and the debate.over the... Sample PDF
Rational Concerns about Biometric Technology: Security and Privacy
Chapter 7
Roger Clarke
Many categories of e-business continue to under-achieve. Their full value cannot be unlocked while key parties distrust the technology or other... Sample PDF
Business Cases for Privacy-Enhancing Technologies
Chapter 8
Ian Allison, Craig Strangwick
The chapter discusses how one small business planned for, and implemented, the security of its data in a new enterprise-wide system. The company’s... Sample PDF
Privacy through Security: Policy and Practice in a Small-Medium Enterprise
Chapter 9
Richard V. McCarthy, Martin Grossman
Enterprise Architecture is a relatively new concept that has been adopted by large organizations for legal, economic, and strategic reasons. It has... Sample PDF
Privacy and Security: where do they fit into the Enterprise Architecture Framework?
Chapter 10
Frederick Ip, Yolande E. Chan
This study assists organizations and researchers in examining investments in IS security. A questionnaire was developed and administered to managers... Sample PDF
Information Systems Security: A Survey of Canadian Executives
Chapter 11
Sue Conger
With each new technology, new ethical issues emerge that threaten both individual and household privacy. This chapter investigates issues relating... Sample PDF
Emerging Technologies, Emerging Privacy Issues
Chapter 12
Anza A. Akram
The purpose of the chapter is to discuss the effects of information and communication technologies on democracy and focuses on the driving forces... Sample PDF
Digital Democracy: Democracy in the Light of Information and Communication Technology
Chapter 13
Zheng Yan, Silke Holtmanns
This chapter introduces trust modeling and trust management as a means of managing trust in digital systems. Transforming from a social concept of... Sample PDF
Trust Modeling and Management: From Social Trust to Digital Trust
Chapter 14
Dan Manson
This chapter introduces the interrelationships of security, privacy and politics in higher education. University curriculum politics are ingrained... Sample PDF
Security, Privacy, and Politics in Higher Education
About the Contributors